Help
Setup Wizard
Status
Logout
Advanced Setup Network Configuration Wireless Configuration Static Routing Table
  Virtual Server Firewall Rule DNS Configuration
  URL Blocking    
Management Tool PPP Monitor Reboot Initialization
  Change Password Upgrade Firmware Backup/Restore
  Log Information Save Maintenance Ping
  About    
 

 

Setup Wizard

The Setup Wizard will guide you to complete the necessary steps for the setup, which include LAN setting and WAN setting.

Status

The Status option presents the administrator with a wide range of valuable runtime parameters and settings not normally found in this class of wireless routers. The runtime settings are easily accessible by a simple click of the "Status" button. By a single click of the Status button, the administrator can view:

  • LAN information - shows current LAN IP address and subnet mask. In PPPoE unnumbered environment, router will have two IP address, and this is displayed as LAN IP 2 Address. Shows if DHCP is enabled or disabled and DHCP IP assignment range with starting address and ending address.

  • DHCP Lease Table - show DHCP daemon enable/disable and lease pool range and Time To Live(TTL).

  • WAN connection information, shows WAN IP address, subnet mask, gateway and DNS information.

  • LAN Ethernet Status

  • WAN Ethernet Status

  • Wireless Status - shows wireless information and also associated client information.

  • ARP Table, displays the cache of IP/MAC address mappings.

  • DHCP Lease Table

  • Routing Table

  • UPnP Port Mapping Table. UPnP enables automatic discovery, whereby a device can dynamically join a network, obtain an IP address, announce its name, convey its capabilities upon request, and learn about the presence and capabilities of other devices. It is very useful among online gamers.

Logout

Pressing Logout, close the current session and shutdown the configuration utility. Note: The system will logout automatically after 180 seconds of idle time.


Wireless Configuration

Provide following configurable items.

Parameter Field Explanation
Region

Show current region information, this filed is configure by factory.

HW Info

Show current wireless card module.

RF Type

RF type, configurable for 802.11g / 802.11g turbo.

Channel

Available channels depend on wireless card and region setting. All available channel would be selectable in combo box.

SSID

Router SSID configuration.

Rate

RF rate configuration.

Hidden SSID

Configurable enable/disable hidden SSID, default is enable. Enable this setting to prevent SSID been scannable.

Authentication Type

Configurable for following setting
open system / shared key / 802.1x / WPA / WPA Pre-shared key

WEP

Configurable for following setting
disable / 64 bits / 128 bits / 152 bits

WEP Default Key

Configurable for the following settings
Key 1 / Key 2 / Key 3 / Key 4

WEP Key

WEP key in hex format.

WPA Encryption

TKIP

Passphrase

8-63 characters Pre-shared key

WPA Re-key Timer

WPA Re-key Timer (minutes)

WPA 802.1x using RADIUS If you have been using Wi-Fi for a while, you are probably familiar with the 802.1X authentication protocol. This protocol allows users to authenticate into a wireless network by means of a RADIUS Server. In standard Wi-Fi, 802.1X authentication is optional. However, 802.1X authentication is a requirement for WPA. If your environment does not have a RADIUS server in place, you can still use WPA in spite of the 802.1X requirement. As an alternative to RADIUS, WPA supports the use of a preshared key.

WPA Pre-shared key One of the biggest drawbacks to traditional WEP security is that changing the encryption key is optional. Even if you do switch encryption keys from time to time, there is no option for globally rekeying all access points and all wireless NICs. Instead, rekeying is a tedious manual process and is completely impractical for large organizations. After all, the instant you rekey an access point, none of the clients will be able to access it until they are also rekeyed. But with WPA, the rekeying of global encryption keys is required. In the case of unicast traffic, the encryption key is changed after every frame using Temporary Key Integrity Protocol (TKIP). This protocol allows key changes to occur on a frame by frame basis and to be automatically synchronized between the access point and the wireless client. Global rekeying works by advertising the new keys to wireless clients. The TKIP is really the heart and soul of WPA security. TKIP replaces WEP encryption. And although WEP is optional in standard Wi-Fi, TKIP is required in WPA. The TKIP encryption algorithm is stronger than the one used by WEP but works by using the same hardware-based calculation mechanisms WEP uses. The TKIP protocol actually has several functions. First, it determines which encryption keys will be used and then verifies the client's security configuration. Second, it is responsible for changing the unicast encryption key for each frame. Finally, TKIP sets a unique starting key for each authenticated client that is using a preshared key.

MAC Access Control - Provide configurable enable/disable MAC access control. Supports up to 32 MAC address settings.

802.1x - Provide following configurable items.

Parameter Field Explanation
RADIUS Server IP

RADIUS server IP configuration. For security reasons, the RADIUS server should located behind the LAN side. The IP address of the RADIUS server should be reachable from the LAN side.

RADIUS Server Port

RADIUS protocol port configuration.

Shared Secret

Shared secret configuration.

Rekey

Configurable enable / disable

Wireless Distribution System (WDS) Bridging - Input Bridge Router(s) MAC address parameters. The MAC Address format is alpha-numeric: XX:XX:XX:XX:XX:XX

Static Routing Table

Supports up to 4 static routing rules and RIP configuration.

Virtual Server

Virtual server settings are split into two different case. Case 1 is router having only one global IP address, that is, PPPoE/DHCP/Static. Case 2 is router having more than one global IP address, normally having from 8 to 16 IP address, PPPoE unnumbered is this case. In Case 1, the virtual server only needs to configure LAN host information, because WAN IP address are always the same, but in Case 2, the virtual server also needs to configure which WAN IP address needs redirection to an internal LAN host.

DMZ Support - Provide configurable enable/disable DMZ host setting. While DMZ is enabled, all connections to the router except those packets configured to a virtual server will redirected to the DMZ host. Also, the DMZ host will reside outside the firewall and will have all its ports open, exposing the computer to the Internet.

PPPoE/DHCP/Static Type - Provides the following user configurable items.

Parameter Field Explanation
Interface

Interface settings can apply to the main session, sub-session 1, or sub-session 2.

Setting "*" will apply to all sessions.
Setting "1&2" will apply to the main session and sub-session 1.
Setting "1&3" will apply to the main session and sub-session 2.
Setting "2&3" will apply to sub-session 1 and sub-session 2.
Setting "1" will apply to the main session.
Setting "2" will apply to sub-session 1.
Setting "3" will apply to sub-session 2.

Protocol

Supports all of the following protocols

TCP
UDP
TCP&UDP
GRE
ESP

Port

Port settings only apply in TCP, UDP, TCP&UDP protocols.
Protocols GRE and ESP must use the port setting "*".
Acceptable port setting formats are as follows:
"*", All ports.
"80", Specific port(s).
"80-100", Range specification

Virtual Server IP

Real server IP address located at the LAN side

Enable

Configurable enable / disable

PPPoE Unnumbered Type - The following configurable items are available.

Parameter Field Explanation
Global IP

Global IP address

Protocol

Supports the following protocol settings
TCP
UDP
TCP&UDP
GRE
ESP

Port

Port settings only apply for protocols TCP, UDP, TCP&UDP.
Protocol GRE and ESP must use port setting: "*".
Acceptable port setting format are as follows:

"*", All ports.
"80", Specific port(s).
"80-100", Range specification

Virtual Server IP

Real server IP address locate at LAN side

Enable

Configurable enable / disable

Firewall Rule

Security Configuration

  • Security One-Touch Setting. The following OneCheck configuration is provided.

  • Access to router's configuration and administration from the WAN (Internet) side is prohibited.

  • The access from Global-IP to Private-IP is prohibited inside LAN.

  • Prohibit this router's privatly assigned IP addresses from being broadcasted to the Internet.

  • Prevent file and printer sharing from outside the router's network.

  • Stealth Mode. The following OneCheck configuration is provided.

  • The existence of the router cannot be detected from the WAN (Internet) side.

  • Unfriendly Access Detection. The following OneCheck configuration is provided.

  • Enable Stateful Packet Inspection. (Dynamic packet filtering.)

  • Denial of Service (DoS) type attacks are prevented (all such attempts will be logged).

VPN Pass Through - Enable/Disable VPN Pass Through. If the administrator configures a host to enable VPN Pass Through, the router will automatically setup virtual server and firewall settings for this host. All VPN packets will be transparent and will directed to this host. VPN Pass Through works between either a VPN server inside the private LAN and/or VPN server located at the WAN side. In other VPN Pass Through settings, only one host can be configured as a pass through. Supported VPN types are as follows:

  • PPTP Pass Through

  • IPSec Pass Through

  • L2TP Pass Through

Static Rule - Support up to 64 static firewall rules, configurable fields are as follows.

Parameter Field Explanation
Rule Number

Ranging from 1 through 64. Rule 1 has highest priority, rule 64 has lowest priority.

Session

Session effect to main session, sub 1 session, and sub 2 session.
Setting "*" will apply to all session.
Setting "1&2" will apply to main session and sub-session 1.
Setting "1&3" will apply to main session and sub-session 2.
Setting "2&3" will apply to sub-session 1 and sub-session 2.
Setting "1" will apply to main session.
Setting "2" will apply to sub-session 1.
Setting "3" will apply to sub-session 2.

Policy

accept/drop

Direction

W->L, WAN to LAN.
L->W, LAN to WAN.

Source IP

Source IP

Source Port

Source Port

Destination IP

Destination IP

Destination Port

Destination Port

Protocol

Supports the following protocol settings:

TCP
UDP
TCP&UDP
TCPEST
ICMP
GRE
ESP

Log

enable/disable log for this rule.

DNS Configuration

DNS Relay: configuration setting for enable/disable. In multi-session environment, DNS relay need to be configured as 'enable'.

Dynamic DNS: configuration setting for enable/disable.

Parameter Field Explanation
Service Provider

Support follow Dynamic DNS Server:
dyndns.org (www.dyndns.org)
dhs.org (www.dhs.org)
ods.org (www.ods.org)
dyns.cx (www.dyns.cx)

Domain Name

Input your domain name for Dynamic DNS Server.

Login Name

Input your Login name for Dynamic DNS Server.

Password

Input your Password for Dynamic DNS Server.

Wildcards

setting for enable/disable.

URL Keyword Blocking

Block certain URL domain names based on keywords. Configuration settings include enable/disable this function, and port numbers to be monitored (up to 4 port numbers). Supports blocking of up to 10 keywords. Only one keyword per line allowed. Only keywords part of the formal URL website name will be blocked. i.e., if you choose to block the keyword "Sex" you are not allowed to go to "www.sex.com", but "www.geocities.com/search/sex/index.html" would not be blocked.


PPP Monitor

Provides the function to monitor/connect/disconnect to a PPP connection.

Reboot the Router

Restart the router. The Reboot won't change any router settings.

Initialization

Restore router settings to factory defaults.

Change Password

Change administrator's ID/password.

Upgrade Firmware

Upgrade firmware to another firmware version. Current firmware version will be displayed in the About Router page.

Backup/Restore

Backup the current router settings to a file.

Restore the router settings from a backup file.

Log Information

Logging information is kept as long as the router is powered on. The log record will be discarded and new log instance started after every restart. The following log messages are supported by the Router.

Firewall Log - Shows firewall log information.

WAN Connection - Shows PPPoE &  Dynamic IP address negotiate log information.

UPnP Log - Shows UPnP add port & delete port log information.

Save Maintenance

Save current settings and log information to file. In this function, WAN password connection settings will be removed.

Ping

Utility for testing the Router's connection.

About Router

Shows the Router's model name and version information.