Help |
Setup Wizard |
Status |
Logout |
Advanced Setup |
Network Configuration |
Wireless Configuration |
Static Routing Table |
|
Virtual Server |
Firewall Rule |
DNS Configuration |
|
URL Blocking |
|
|
Management Tool |
PPP Monitor |
Reboot |
Initialization |
|
Change Password |
Upgrade Firmware |
Backup/Restore |
|
Log Information |
Save Maintenance |
Ping |
|
About |
|
|
|
|
|
Setup
Wizard
The Setup
Wizard
will
guide you to complete the necessary steps for the setup,
which include LAN setting and WAN setting.
|
Status
The Status option presents the
administrator with a wide range of valuable runtime parameters and settings not normally found
in this class of wireless routers. The runtime settings are easily
accessible by a simple click of the "Status" button. By a single click of the Status
button, the administrator can view:
-
LAN information - shows current
LAN IP address and subnet mask. In PPPoE unnumbered environment,
router will have two IP address, and this is displayed as LAN IP 2 Address. Shows if DHCP
is enabled or disabled and DHCP IP assignment range with starting address and ending address.
-
DHCP Lease Table - show DHCP
daemon enable/disable and lease pool range and Time To Live(TTL).
-
WAN connection information, shows
WAN IP address, subnet mask, gateway and DNS information.
-
LAN Ethernet Status
-
WAN Ethernet Status
-
Wireless Status - shows wireless
information and also associated client information.
-
ARP Table, displays the cache of IP/MAC address mappings.
-
DHCP Lease Table
-
Routing Table
-
UPnP Port Mapping Table.
UPnP enables automatic discovery, whereby a device can dynamically join
a network, obtain an IP address, announce its name, convey its
capabilities upon request, and learn about the presence and capabilities
of other devices. It is very useful among online gamers.
|
Logout
Pressing Logout,
close the current session and shutdown the configuration utility.
Note: The system will logout automatically after 180 seconds of idle time.
|
|
Wireless
Configuration
Provide following
configurable items.
Parameter Field |
Explanation |
Region |
Show
current region information, this filed is configure by
factory. |
HW Info |
Show
current wireless card module. |
RF Type |
RF
type, configurable for 802.11g / 802.11g turbo. |
Channel |
Available channels depend on wireless card and region setting.
All available channel would be selectable in combo box. |
SSID |
Router
SSID configuration. |
Rate |
RF
rate configuration. |
Hidden SSID |
Configurable enable/disable hidden SSID, default is enable.
Enable this setting to prevent SSID been scannable. |
Authentication Type |
Configurable for following setting
open system / shared key / 802.1x / WPA / WPA Pre-shared key |
WEP |
Configurable for following setting
disable / 64 bits / 128 bits / 152 bits |
WEP Default Key |
Configurable for the following settings
Key 1 / Key 2 / Key 3 / Key 4 |
WEP Key |
WEP
key in hex format. |
WPA Encryption |
TKIP |
Passphrase |
8-63 characters Pre-shared key |
WPA Re-key Timer |
WPA Re-key Timer (minutes) |
WPA 802.1x using RADIUS
If you have been using Wi-Fi for a while, you are probably familiar with the 802.1X authentication protocol. This protocol
allows users to authenticate into a wireless network by means of a RADIUS Server. In standard Wi-Fi, 802.1X
authentication is optional. However, 802.1X authentication is a requirement for WPA.
If your environment does not have a RADIUS server in place, you can still use WPA in spite of the 802.1X requirement. As
an alternative to RADIUS, WPA supports the use of a preshared key.
WPA Pre-shared key
One of the biggest drawbacks to traditional WEP security is that changing the encryption key is optional. Even if you do
switch encryption keys from time to time, there is no option for globally rekeying all access points and all wireless NICs.
Instead, rekeying is a tedious manual process and is completely impractical for large organizations. After all, the instant
you rekey an access point, none of the clients will be able to access it until they are also rekeyed.
But with WPA, the rekeying of global encryption keys is required. In the case of unicast traffic, the encryption key is
changed after every frame using Temporary Key Integrity Protocol (TKIP). This protocol allows key changes to occur on a
frame by frame basis and to be automatically synchronized between the access point and the wireless client. Global
rekeying works by advertising the new keys to wireless clients.
The TKIP is really the heart and soul of WPA security. TKIP replaces WEP encryption. And although WEP is optional in
standard Wi-Fi, TKIP is required in WPA. The TKIP encryption algorithm is stronger than the one used by WEP but works
by using the same hardware-based calculation mechanisms WEP uses.
The TKIP protocol actually has several functions. First, it determines which encryption keys will be used and then verifies
the client's security configuration. Second, it is responsible for changing the unicast encryption key for each frame. Finally,
TKIP sets a unique starting key for each authenticated client that is using a preshared key.
MAC Access Control
- Provide configurable enable/disable MAC access control. Supports up
to 32 MAC address settings.
802.1x
- Provide following configurable items.
Parameter Field |
Explanation |
RADIUS Server IP |
RADIUS server IP configuration. For security reasons, the RADIUS
server should located behind the LAN side. The IP address of the
RADIUS server should be reachable from the LAN side. |
RADIUS Server Port |
RADIUS protocol port configuration. |
Shared Secret |
Shared
secret configuration. |
Rekey |
Configurable enable / disable |
Wireless Distribution System (WDS) Bridging
- Input Bridge Router(s) MAC address parameters.
The MAC Address format is alpha-numeric: XX:XX:XX:XX:XX:XX
|
Static
Routing Table
Supports up to 4 static routing rules and RIP configuration.
|
Virtual
Server
Virtual server settings are
split into two different case. Case 1 is router having only one global
IP address, that is, PPPoE/DHCP/Static. Case 2 is router having
more than one global IP address, normally having from 8 to 16 IP address,
PPPoE unnumbered is this case. In Case 1, the virtual server only needs
to configure LAN host information, because WAN IP address are always the
same, but in Case 2, the virtual server also needs to configure which WAN
IP address needs redirection to an internal LAN host.
DMZ
Support
- Provide configurable enable/disable DMZ host setting. While DMZ is
enabled, all connections to the router except those packets
configured to a virtual server will redirected to the DMZ host. Also, the DMZ
host will reside outside the firewall and will have all its ports open, exposing the computer to the Internet.
PPPoE/DHCP/Static
Type - Provides the following
user configurable items.
Parameter Field |
Explanation |
Interface |
Interface settings can apply to the main session, sub-session 1, or
sub-session 2.
Setting "*" will apply to all sessions.
Setting "1&2" will apply to the main session and sub-session 1.
Setting "1&3" will apply to the main session and sub-session 2.
Setting "2&3" will apply to sub-session 1 and sub-session 2.
Setting "1" will apply to the main session.
Setting "2" will apply to sub-session 1.
Setting "3" will apply to sub-session 2. |
Protocol |
Supports all of the following protocols
TCP
UDP
TCP&UDP
GRE
ESP |
Port |
Port
settings only apply in TCP, UDP, TCP&UDP protocols.
Protocols GRE and ESP must use the port setting "*".
Acceptable port setting formats are as follows:
"*", All ports.
"80", Specific port(s).
"80-100", Range
specification |
Virtual Server IP |
Real
server IP address located at the LAN side |
Enable |
Configurable enable / disable |
PPPoE
Unnumbered Type - The following
configurable items are available.
Parameter Field |
Explanation |
Global IP |
Global IP address |
Protocol |
Supports the following protocol settings
TCP
UDP
TCP&UDP
GRE
ESP |
Port |
Port
settings only apply for protocols TCP, UDP, TCP&UDP.
Protocol GRE and ESP must use port setting: "*".
Acceptable port setting format are as follows:
"*", All ports.
"80", Specific port(s).
"80-100", Range
specification |
Virtual Server IP |
Real
server IP address locate at LAN side |
Enable |
Configurable enable / disable |
|
Firewall
Rule
Security Configuration
-
Access to router's configuration and administration from the
WAN (Internet) side is prohibited.
-
The access from Global-IP to Private-IP is prohibited inside
LAN.
-
Prohibit this router's privatly assigned IP addresses from being broadcasted to the Internet.
-
Prevent file and printer sharing from outside the router's network.
VPN
Pass Through
- Enable/Disable VPN Pass Through.
If the administrator configures a host to enable VPN Pass Through, the router
will automatically setup virtual server and firewall settings for
this host. All VPN packets will be transparent and will directed to
this host. VPN Pass Through works between either a VPN server inside the private LAN
and/or VPN server located at the WAN side. In other VPN Pass
Through settings, only one host can be configured as a pass through.
Supported VPN types are as follows:
-
PPTP Pass Through
-
IPSec Pass Through
-
L2TP Pass Through
Static
Rule - Support up to 64 static
firewall rules, configurable fields are as follows.
Parameter Field |
Explanation |
Rule Number |
Ranging from
1 through 64. Rule 1 has highest priority, rule 64 has lowest
priority. |
Session |
Session effect to main session, sub 1 session, and sub 2
session.
Setting "*" will apply to all session.
Setting "1&2" will apply to main session and sub-session 1.
Setting "1&3" will apply to main session and sub-session 2.
Setting "2&3" will apply to sub-session 1 and sub-session 2.
Setting "1" will apply to main session.
Setting "2" will apply to sub-session 1.
Setting "3" will apply to sub-session 2. |
Policy |
accept/drop |
Direction |
W->L,
WAN to LAN.
L->W, LAN to WAN. |
Source IP |
Source IP |
Source Port |
Source Port |
Destination IP |
Destination IP |
Destination Port |
Destination Port |
Protocol |
Supports the following protocol settings:
TCP
UDP
TCP&UDP
TCPEST
ICMP
GRE
ESP
|
Log |
enable/disable log for this rule. |
|
DNS Configuration
DNS Relay: configuration setting for enable/disable. In multi-session
environment, DNS relay need to be configured as 'enable'.
Dynamic DNS: configuration setting for enable/disable.
Parameter Field |
Explanation |
Service Provider |
Support follow Dynamic DNS Server:
dyndns.org (www.dyndns.org)
dhs.org (www.dhs.org)
ods.org (www.ods.org)
dyns.cx (www.dyns.cx)
|
Domain Name |
Input your domain name for Dynamic DNS Server.
|
Login Name |
Input your Login name for Dynamic DNS Server.
|
Password |
Input your Password for Dynamic DNS Server.
|
Wildcards |
setting for enable/disable.
|
|
URL Keyword Blocking
Block certain URL domain names based on keywords. Configuration settings include enable/disable this function, and port numbers to be monitored (up to 4 port numbers).
Supports blocking of up to 10 keywords. Only one keyword per line allowed. Only keywords part of the formal URL website name will be blocked. i.e., if you choose to block the keyword "Sex" you are not allowed to go to "www.sex.com", but "www.geocities.com/search/sex/index.html" would not be blocked.
|
|
PPP
Monitor
Provides the function to monitor/connect/disconnect
to a PPP connection.
|
Reboot the Router
Restart the router. The Reboot won't change any router settings.
|
Initialization
Restore router settings to factory defaults.
|
Change
Password
Change
administrator's ID/password.
|
Upgrade
Firmware
Upgrade firmware to another firmware version. Current firmware
version will be displayed in the About Router page.
|
Backup/Restore
Backup the
current router settings to a file.
Restore the router settings from a backup file.
|
Log
Information
Logging information is kept
as long as the router is powered on. The log record will be
discarded and new log instance started after every restart. The following log messages are
supported by the Router.
Firewall Log - Shows
firewall log information.
WAN
Connection - Shows PPPoE &
Dynamic IP address negotiate log information.
UPnP
Log - Shows UPnP add port & delete port
log information.
|
Save
Maintenance
Save current settings and log
information to file. In this function, WAN password
connection settings will be removed.
|
Ping
Utility for testing the Router's connection.
|
About Router
Shows the Router's
model name and version information.
|
|
|
|