background image

BROWAN COMMUNICATIONS                                                                                             

 

                                          Page 99 

 

Router. Then select the appropriate level, Full (Default), 

Half, Quarter, Eighth, or Min, from the drop-down menu. 

The default is Full (Default). 

 

 

 

 

CTS Protection Mode   

CTS (Clear-To-Send) Protection Mode should be set to 

Auto (Default). The Router will automatically use CTS 

Protection Mode when your Wireless-G products are 

experiencing severe problems and are not able to transmit 

to the Router in an environment with heavy 802.11b traffic. 

This function boosts the Router's ability to catch all 

Wireless-G transmissions but will severely decrease 

performance. If you do not want to use CTS Protection 

Mode at all, select Disabled. 

 

 

 

Frame Burst Mode 

Frame burst

 is a term in wireless technology supported by 

the 802.11e QoS specification. Suggesting to enable this 

option on point to point should provide your network with 

greater performance, depending on the manufacturer of 

your wireless products. If you are not sure how to use this 

option, keep the default, Enabled. 

 

Summary of Contents for BW1230

Page 1: ......

Page 2: ...N reserves the right to change specifications without prior notice While the information in this document has been compiled with great care it may not be deemed an assurance of product characteristics BROWAN shall be liable only to the degree specified in the terms of sale and delivery The reproduction and distribution of the documentation and software supplied with this product and the use of its...

Page 3: ... or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the deale...

Page 4: ...ed and operated with minimum distance 20cm between the radiator your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by t...

Page 5: ...ess telecommunication systems with the basic restrictions or the reference levels related to human exposure to radio frequency electromagnetic fields 110MHz 40 GHz General public EN 300 328 V1 6 1 2004 11 Electromagnetic compatibility and Radio spectrum Matters ERM Wideband transmission systems Data transmission equipment operating in the 2 4 GHz ISM band and using wide band modulation techniques ...

Page 6: ...public access to telecommunications and or network services This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 2483 5 MHz For detailed information the end user should contact the national spectrum authority in France Česky Czech Jméno výrobce tímto prohlašuje že tento typ zařízen...

Page 7: ...Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ name of manufacturer ΔΗΛΩΝΕΙ ΟΤΙ type of equipment ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ Français French Par la présente nom du fabricant déclare que l appareil type d appareil est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 CE Italiano Italian Con la presente no...

Page 8: ... Polish Niniejszym nazwa producenta oświadcza że nazwa wyrobu jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999 5 EC Português Portuguese Nome do fabricante declara que este tipo de equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE Slovensko Slovenian Ime proizvajalca izjavlja da je ta tip opreme v skladu...

Page 9: ...COMMUNICATIONS Page 9 Svenska Swedish Härmed intygar företag att denna utrustningstyp står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999 5 EG ...

Page 10: ...marks 2 FCC Warning 3 CONTENTS 10 ABOUT THIS GUIDE 15 Purpose 15 Prerequisite Skills and Knowledge 15 Conventions Used in this Document 16 Help Us to Improve this Document 17 Browan Technical Support 17 CHAPTER 1 INTRODUCTION 18 Product Overview 18 Contents ...

Page 11: ...rdware Introduction 24 General Overview 24 TOP Cover View 25 Connection View 28 Bottom Case 30 Product and Safety Label 31 Hardware Installation 35 Mounting the BW1230 35 Installing the BW1230 36 Software Installation 38 Accessing Your BW1230 38 CHAPTER 3 APPLICATION MODE 43 CHAPTER 4 REFERENCE MANUAL 44 ...

Page 12: ...elcome Wizard 77 LAN Settings Unit Configuration 78 LAN Settings Static DHCP Assignment 80 LAN Settings DHCP lease table 81 Wireless Settings Configuration 82 Wireless Settings Encryption 83 Wireless Settings WDS 89 Wireless Settings WMM 90 Wireless Settings Connection Control 95 Wireless Settings Client List 96 Wireless Settings Advanced 97 ...

Page 13: ...l Servers 120 Firewall Special Apps 126 Firewall SPI 128 Firewall QoS 131 Firewall Internet Access Plicy 141 Firewall URL Filter 145 System Tools Restart 147 System Tools Time Zone 148 System Tools Configuration 149 System Tools Upgrade 151 Advanced Static Route 152 Advanced RIP 153 Advanced DDNS 154 Advanced Security 157 ...

Page 14: ...NS Page 14 Advanced ProxyARP 161 Advanced 1 to 1 NAT 162 Advanced SNMP 163 Status and Logs Status 164 Status and Logs Logs 166 Status and Logs Routing Table 168 Status and Logs Syslog 169 Support Support 170 APPENDIX 171 ...

Page 15: ...concepts and wireless Internet access infrastructures In addition you should be familiar with the following Hardware installers should have a working knowledge of basic electronics and mechanical assembly and should understand related local building codes Network administrators should have a solid understanding of software installation procedures for network operating systems under Microsoft Windo...

Page 16: ...but which is not required bold Menu commands buttons and input fields are displayed in bold code File names directory names form names and system generated output such as error messages are displayed in constant width type value Placeholder for certain values e g user inputs value Input field format limitations and or restrictions Words in Bold The texts in Bold mean that those words are the Key W...

Page 17: ...e manual please send e mail directly to manuals browan com Browan Technical Support If you encounter problems when installing or using this product please consult the Browan website at www browan com for Direct contact to the Browan support centers Frequently Asked Questions FAQ Download area for the latest software user documentation and product updates ...

Page 18: ...ium Business networks Shared and Rapid Connectivity The BW1230 is designed in an attractive compact plastic enclosure with cutting edge RF technology providing shared Internet access for wireless and wired users within robust wireless network in offices or similar RF environments The BW1230 not only supports either local power supply or inline Power over Ethernet optional but also keeps full backw...

Page 19: ...he wireless connection by 128 bit enhanced encryption Wireless Protected Access with TKIP AES encryption for better security along with 64 128 bits static and dynamic WEP encryption for legacy clients Virtual AP technology BW1230 supports multiple BSSIDs so called Virtual AP which delivers multiple services from one piece of hardware It can create up to 3 virtual AP with different wireless securit...

Page 20: ...gitimate packets for different types of connections Only packets matching a known connection state will be allowed by the firewall others will be rejected TKIP TKIP Temporal Key Integrity Protocol is a security protocol used in Wi Fi Protected Access WPA TKIP ensures that every data packet is sent with its own unique encryption key AES Advanced Encryption Standard AES is a block cipher adopted as ...

Page 21: ...orted Virtual DMZ Transparent VPN pass through PPTP L2TP PPPoE PPTP L2TP client DHCP server relay client Dynamic Domain Name Service DDNS Enhanced encryption Wireless Protected Access with TKIP or AES Wired Equivalent Privacy WEP using static or dynamic key of 64 or 128 bits IP MAC WEB and Protocol filter URL and domain blocking Access Control accepting and denying rules based on MAC IP address Hi...

Page 22: ...ion instructions for the hardware and software components of the BROWAN BW1230 SMB Wireless Router It also includes the procedures for the following tasks The Product Package Hardware Introduction Hardware Installation Software Installation Chapter 2 Installation ...

Page 23: ...er 1 2 Power adapter 1 3 RJ 45 Ethernet cable 1 4 External antenna 1 5 Installation CD with BW1230 User Guide PDF Product Firmware Release Notes Adobe Acrobat Reader 1 6 Printed 2 Years Warranty Card 1 If any of these items are missing or damaged please contact your reseller or Browan sales representative immediately ...

Page 24: ...sers could share a single broadband internet connection between several wired and wireless computers Also BW1230 could present user a safe internet connection by block any unauthorized users to see your files or damage your computers And users could manage BW1230 easier with Web based configuration Figure 1 BW1230 General View ...

Page 25: ... shows the Top Cover view of BW1230 Power LED It tells you the power is on or off Wireless LED 1 If the Wireless LED is on it indicates your wireless networking is enable 2 If the Wireless LED is off it indicates your wireless networking is disable 3 If the Wireless LED is flashing it indicates your wireless networking is transmitting and receiving the data Figure 2 BW1230 Top Cover View 1 3 2 4 1...

Page 26: ... the BW1230 and your DSL Cable Modem is working fine and it is transmitting and receiving the data LAN LED Four Ports 1 If the LAN LED is on it indicates the connection between the BW1230 and your another network equipment is working fine 2 If the LAN LED is off it indicates the connection is failed 3 If the LAN LED is flashing it indicates the connection between the BW1230 and your another networ...

Page 27: ...tatus Description ON Power is ON 1 Power OFF Power is OFF ON Wireless is activated OFF Wireless is idle 2 Wireless Flashing Data is transmitting ON WAN is activated OFF WAN is idle 3 WAN Flashing Data transmitting ON LAN is activated OFF LAN is idle 4 LAN 1 LAN 4 Flashing Data is transmitting ...

Page 28: ...t You could press Reset button to restore your router back to the factory default WAN Connect your WAN port to your DSL Cable Modem for your broadband Internet access with a RJ 45 network cable LAN From LAN1 to LAN4 Connect your LAN port to your computers or any other network equipments such as hubs or switches with a RJ 45 network cable Figure 3 BW1230 Connection View 4 1 2 3 5 1 2 3 4 ...

Page 29: ...age 29 External Antenna Socket To install the BW1230 External Antenna Press the Reset button for less than 5 seconds to reboot the device Press the Reset button for more than 5 seconds to set the device to factory defaults 5 ...

Page 30: ...BROWAN COMMUNICATIONS Page 30 Bottom Case You could find the product label on the bottom case shown as Figure4 Product Label Figure 4 BW1230 Bottom Case ...

Page 31: ...W1230 has passed the requirement of RoHS 5 BW1230 has passed the requirement of WEEE 6 BW1230 has passed the requirement of FCC 7 BW1230 has passed the requirement of China RoHS 8 Browan Logo 9 The Revision of BW1230 10 This device has been made in Taiwan 11 Serial number of BW1230 12 MAC address of LAN in BW1230 Figure 5 BW1230 Product Label 1 2 3 4 5 6 7 8 9 10 11 12 ...

Page 32: ...came European Law in February 2003 setting collection recycling and recovery targets for all types of electrical goods RoHS Restriction of Hazardous Substances Directive was adopted in February 2003 by the European Union adopted in February 2003 by the European Union The RoHS directive took effect on July 1 2006 but is not a law it is simply a directive This directive restricts the use of six haza...

Page 33: ... regulation is in force on March 1 You will have to design labels and issue change orders in order to comply The standards that you have to comply with just became available in finalized versions FCC The Federal Communications Commission FCC is an independent United States government agency created directed and empowered by Congressional statute The FCC was established by the Communications Act of...

Page 34: ... COMMUNICATIONS Page 34 policy The FCC took over wire communication regulation from the Interstate Commerce Commission The FCC s jurisdiction covers the 50 states the District of Columbia and U S possessions ...

Page 35: ... 1 Please use a power drill to make two holes on the wall Step 2 Hammer the 1 Wall Plugs into the two holes Step 3 And screw the 2 Screws to the 1 Wall Plug Step 4 Now you could hang your 3 BW1230 on the wall Figure 7 Mounting the BW1230 on the wall 1 Wall Plug 2 Screw 3 BW1230 ...

Page 36: ...able into your existing Cable DSL Modem You might check the connection status of the BW1230 and Cable DSL modem from the WAN LED indicator Step3 Connect the Cable DSL modem to your internet service with a RJ 45 network cable Step4 Connect your computer to any LAN Port of BW1230 with a RJ 45 network cable You might check the LAN connection status from the LAN LED indicator Step5 The Hardware instal...

Page 37: ...nd then you could set up other computers including wireless computers after the configuration completed Directly connect a computer to the any LAN Port of BW1230 for your preliminary configuration Because you might lose contact with router if you configure the router from a wireless computer ...

Page 38: ... Page 38 Software Installation Accessing Your BW1230 Use the Web browser to access Step 1 Please setup your network connection Select Local Area Connection Status Click on Properties Figure 10 1 Local Area Connection Status ...

Page 39: ...BROWAN COMMUNICATIONS Page 39 Double click on the Internet Protocol TCP IP Figure 10 2 Local Area Connection Status ...

Page 40: ...BROWAN COMMUNICATIONS Page 40 Please select Obtain an IP address automatically and Obtain DNS sever address automatically Click on OK to apply the changes Figure 10 3 Local Area Connection Status ...

Page 41: ...BW1230 with local network Open the Web browser and enter the default IP address of the BW1230 http 192 168 1 1 check up the connection between your computer and any LAN Port of BW1230 with a RJ 45 network cable Figure 11 Setup with Web browser ...

Page 42: ...BROWAN COMMUNICATIONS Page 42 Enter the BW1230 administrator login credential to access the Web management interface The Default System Password is admin and it is case sensitive Figure 12 Login page ...

Page 43: ...BROWAN COMMUNICATIONS Page 43 You could share the internet with everybody in anywhere Chapter 3 Application Mode ...

Page 44: ...on After the network connection setup refer to Accessing Your BW1230 open the Web browser and enter the default IP address of the BW1230 http 192 168 1 1 Enter the System Password admin Click Log in button to continue the configuration or click Cancel button to quit the configuration Chapter 4 Reference Manual ...

Page 45: ...BROWAN COMMUNICATIONS Page 45 If you forget your password please click on the here After you click on the here there will be a popup window And the popup window will show you what you should do ...

Page 46: ...e Wizard feature could help you to easily configure the router The Wizard screen would display automatically for your preliminary configuration or you could manually click on Wizard tag Please click on the WIZARD button to launch the wizard feature ...

Page 47: ...NS Page 48 Welcome Wizard Setup Wizard Router Configuration Wizard This screen is the first screen appears after you start the setup wizard Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 48: ...u would like to change a new password please enter the old password in the first field And enter the new password in the other two fields Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard Browan recommand you to change a new password for your wireless network sercurity And the password is case sensitive ...

Page 49: ...Zone Please select the time zone from the drop down menu and check the Enable Daylight saving selection if necessary Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 50: ...ically DSL users only ISP provides configuration dynamically via DHCP ISP has provided a static IP address PPTP is required some DSL users in Europe Heart Beat Signal Bigpond Telstrra is required L2TP used by some European providers Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 51: ...need to use PPPoE software on your PC once the Router is installed If you are unsure you should ask your ISP whether you need to use PPPoE PPPoE User Name Enter your User Name in this box This field is required and will be provided to you by your ISP PPPoE Password Enter your password in this box This field is required and will be provided to you by your ISP PPPoE Service Name If your ISP provided...

Page 52: ...nternet Service Provider If you do not know this value just leave it at the default value Maximum Idle Time This is the amount of time that passes before your Internet Connection is dropped due to inactivity If you want to keep your Internet Connection established at all times you should select Forever Otherwise select the amount of time that you want to pass before your Router disconnects from yo...

Page 53: ...ill be obtained automatically from your ISP They are not displayed on this screen but may be viewed on the Status screen click on Status and Logs on the left hand menu bar Host Name Some ISP s require a host name to identify you when you connect If you have been provided a Host Name by your ISP you should enter it here This field is optional and so if you have not been provided a host name you may...

Page 54: ...de of your Router to be that of your old device There are three options available for cloning the Router WAN port MAC address Use the Router s original MAC address This option is selected by default When selected the Router uses the WAN port MAC address that it was assigned at the factory Use this PCs MAC address This option will assign the MAC address of the PC you are using to manage the Router ...

Page 55: ...e MAC addresses given by the previous two options are not correct then you will need to find the MAC address of the previous device used with your ISP Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 56: ...P address of your Router that will be seen from the WAN or Internet This setting is required and will be provided to you by your ISP Subnet mask This is the Subnet Mask of your Router s WAN port This setting is required and will be provided to you by your ISP ISP Gateway Address This is sometimes referred to as Default Gateway This setting is required and will be provided to you by your ISP ...

Page 57: ...etting is optional and can be left at 0 0 0 0 if it is not required Secondary DNS Address If your ISP has provided a second DNS address you should enter it here Otherwise leave this setting at its default of 0 0 0 0 This setting is optional MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Click Back to go t...

Page 58: ... your modem ask you to set up a dialup connection using a PPTP VPN tunnel then select this option Note that once the Router is installed you will not need to use the dialup VPN on your PC any more PPTP Server address This is the IP address of the PPTP server you are connecting to This setting is required and will be provided to you by your ISP The PPTP Server is typically located in your DSL modem...

Page 59: ...es If your ISP has provided you with DNS addresses you should enter them here Otherwise leave these setting at its default of 0 0 0 0 These settings are optional and most ISP s will also provide you with DNS addresses automatically When the addresses are obtained from your ISP they will be displayed on the Status screen MTU The MTU settings should be obtained from your Internet Service Provider If...

Page 60: ...e to inactivity If you want to keep your Internet Connection established at all times you should select Forever Otherwise select the amount of time that you want to pass before your Router disconnects from your ISP Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 61: ...e IP settings to be used when establishing the PPTP connection If your ISP has provided you with these settings then you should use them Otherwise if the PPTP server is located in your DSL modem you can use the Suggest button to generate suitable values for you The Suggest button will select an IP address on the same subnet as the PPTP server Initial Default Gateway The PPTP Server address and the...

Page 62: ...f the PPTP Server and Initial IP Address are in the same subnet then you can set the Initial Default Gateway to 0 0 0 0 or 0 Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 63: ... information Host Name Some ISP s require a host name to identify you when you connect If you have been provided a Host Name by your ISP you should enter it here This field is optional and so if you have not been provided a host name you may leave it blank Heart Beat Server Your ISP will provide you with the Heart Beat Server s IP Address Heart Beat User Name Enter the User Name you use when loggi...

Page 64: ...SP through a Heart Beat Signal connection MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 65: ...lect this option Note that once the Router is installed you will not need to use the dialup VPN on your PC any more L2TP Server address This is the IP address of the L2TP server you are connecting to This setting is required and will be provided to you by your ISP The L2TP Server is typically located in your DSL modem L2TP User Name Enter your User Name in this box This field is required and will ...

Page 66: ...re optional and most ISP s will also provide you with DNS addresses automatically When the addresses are obtained from your ISP they will be displayed on the Status screen MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Click Back to go to previous screen Or Click Next to continue the setup wizard Or click...

Page 67: ...e IP settings to be used when establishing the L2TP connection If your ISP has provided you with these settings then you should use them Otherwise if the L2TP server is located in your DSL modem you can use the Suggest button to generate suitable values for you The Suggest button will select an IP address on the same subnet as the L2TP server Initial Default Gateway The L2TP Server address and the...

Page 68: ...BROWAN COMMUNICATIONS Page 69 connection Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 69: ... IP address of the Router as seen by the devices on the LAN The default value is 192 168 1 1 Subnet Mask This is the Subnet Mask for the Router For devices to be on the same subnet they must have the same subnet mask The default value is 255 255 255 0 Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 70: ... Pool Start Address This defines the start address of the IP address range The default value is 192 168 1 2 IP Pool End Address This defines the end address of the IP address range The default value is 192 168 1 254 Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard ...

Page 71: ...s and has a maximum length of 32 characters Your Wireless PCs must be configured with exactly the same name or you will not establish a connection The Service Area Name may also be referred to as ESSID depending on your networking vendor By default the Router uses the name BROWAN Click Back to go to previous screen Or Click Next to continue the setup wizard Or click Cancel to quit the setup wizard...

Page 72: ...ration Summary This screen will show the configuration of your BW1230 Click Print to print out the configuration And click Back to go to previous screen Or Click Finish to complete the setup wizard Or click Cancel to quit the setup wizard ...

Page 73: ...BROWAN COMMUNICATIONS Page 74 Wizard Completed Your BW1230 settings have been completely saved Now you are ready to enjoy your wire and wireless network ...

Page 74: ...NICATIONS Page 75 Welcome Notice Board The Notice Board is used to display warning messages if you ve configured the Router in a non standard manner For example you would be warned if you had disabled the Firewall ...

Page 75: ...ministration System To do this 1 Enter the current password in the Old Password field 2 Enter the new password in the New Password field 3 Enter the new password again in the Confirm Password field 4 Click Apply to save the new password Browan recommand you to change a new password for your wireless network sercurity And the password is case sensitive ...

Page 76: ...BROWAN COMMUNICATIONS Page 77 Welcome Wizard This option allows you to run the Setup Wizard to change the configuration settings of the Router You could click WIZARD bottom to start the wizard setup ...

Page 77: ...ult value is 192 168 1 1 Subnet Mask This is the Subnet Mask for the Router For devices to be on the same subnet they must have the same subnet mask The default value is 255 255 255 0 DHCP Server Parameters The Router can act as a DHCP Dynamic Host Control Protocol Server for your LAN and can automatically allocate IP addresses to the other devices on the LAN To use the Router as a DHCP Server you...

Page 78: ... the end address of the IP address range The default value is 192 168 1 254 DHCP Relay The DHCP Relay Agent can deliver the IP address from the DHCP Server and allows you to place DHCP Clients and DHCP Servers on the same network Deploying DHCP in a single segment network is easy All DHCP messages are IP broadcast messages and therefore all the computers on the segment can listen and respond throu...

Page 79: ... PC to be assigned the same IP address when every time it reboots On the Static DHCP Client List enter the static local IP address in the Assign this IP field and enter the MAC address of the PC in the To this MAC field Then click the Enabled checkbox When you have finished your entries click the Save button to save your changes ...

Page 80: ...l see a list of DHCP clients with the following information Client Names Interfaces IP Addresses and MAC Addresses If you want to add any of the DHCP clients to the Static DHCP Client List just click the Fixed checkbox Then click the Save button To view the most up to date information click the Refresh button ...

Page 81: ...could see the selection which including mixed wireless B only wireless G only Dynamic SuperG and SuperG without turbo You could choose the proper wireless standards running on your network The default setting is mixed mode Service Area Name SSID This allows you to name your Wireless network The field will accept any alphanumeric string but not spaces and has a maximum length of 32 characters Your ...

Page 82: ...Wi Fi Protected Access WPA is an enhancement over WEP and will strongly increase the level of data protection and access control on your wireless network WPA allows you to encrypt the switched packet in network between your Wireless PC and the Router The default value of security mode is disable WPA allows you to configure 1 Type There are three types of WPA methods available Manual Pre Shared Key...

Page 83: ...e client will be unable to connect Manual Pre Shared Keys provide the greatest combination of possible Keys which provides greater security to the wireless network 3 Pre Shared Passphrase The Router also offers a method for converting plain text into hex keys The Passphrase is much easier to remember than the hex key but it relies on your wireless adapters also supporting this feature The Passphra...

Page 84: ... with a RADIUS server that uses either EAP TLS or PEAP as its authentication method This should only be used when a RADIUS server is connected to the Router First select the type of encryption method you want to use TKIP or AES Enter the RADIUS servers IP address and port number along with the authentication key shared by the Router and the server Last enter the Key Renewal period which instructs ...

Page 85: ...Key is a hexadecimal 0 9 A F number used to encrypt and decrypt the data There can be up to 4 keys and each key can be as long as 26 digits The Router also offers a number of methods for converting plain text into hex keys The text is much easier to remember than hex keys but it relies on your wireless adapters also supporting this feature Different manufacturers have developed different ways of c...

Page 86: ...string can contain any alpha numeric characters and must be between 6 and 30 characters long A single string will automatically generate 4 unique keys for 64 or 128 bit WEP 3 ASCII This method is supported by some adapter cards running under Windows XP The string must be exactly 5 characters for 64 bit WEP and 13 characters for 128 bit WEP You must enter a separate string for each of the 4 Keys Yo...

Page 87: ...nge the selected key every now and then to increase the security of your network When you apply the Mutiple SSIDs in Wireless Settings you can operate different SSID in different security mode And you must enter the correct key forward intto the SSID that you connect It means that WPA and WEP encryption modes are enabled allowing wireless client PCs to be configured to run with either WPA or the o...

Page 88: ...tings WDS WDS Wireless Distribution System is comprised of a bridging and or a repeater mode Wireless bridging is where the WDS APs communicate only with each other to bridge together 2 separate networks without allowing for wireless clients or stations to access them Wireless repeating is where the WDS APs rebroadcasts the received signals to extend reach and range at the expense of half or more ...

Page 89: ...i Multimedia WMM support to help improve the Quality of Service QoS for audio video and voice applications over the wireless network When WMM support is enabled multimedia traffic is given higher priority over other types of traffic EDCA Parameter The IEEE 802 11e standard improves the Medium Access Control MAC of the legacy 802 11 with regard to Quality of Service QoS by introducing the Enhanced ...

Page 90: ... the characteristics of these types of data to better manage your network flow AC Access Category Using 4 different ACs From high to low VO Voice VI Video BE Best Effort BK Background AIFS Arbitrary Inter frame Space An Inter frame Space for different Access Category TXOP Transmission Opportunity WMM Wireless Multimedia Transmission Opportunity defined by IEEE 802 11e the TXOP is the interval of t...

Page 91: ...ty and hence the more capacity share for a given traffic condition However the probability of collisions increases when operating with smaller CWmin Theses parameters can be used in order to differentiate the channel access among different priority traffic STA Each station maintains a Contention Window CW which is used to select the random back off counter The BC is determined as a random integer ...

Page 92: ...ty in case there are multiple stations attempting to access the channel CW min should be smaller for delay sensitive data CW max should be smaller for delay sensitive data AIFSN should be smaller for delay sensitive data TXOPLimit These will allow multiple MAC frames consecutively as long as the whole transmission time does not exceed the TXOP limit So keep it larger for delay sensitive data ACM ...

Page 93: ...BROWAN COMMUNICATIONS Page 94 Admission Mandatory could be turned on to mandatory execution of the contention control ...

Page 94: ...etwork Clicking this radio button will block wireless access by MAC Address Permit PC listed below to access the wireless network Clicking this radio button will allow wireless access by MAC Address Wireless MAC Filter List Click the Enable Access Restriction checkbox to display a list of network users by MAC Address If you want to add any of the wireless clients to the Wireless MAC Filter List ju...

Page 95: ...LAN The list is only created when Wireless Networking is enabled For each device that is connected to the Wireless LAN the MAC address Connection Speed and Client Type of that device is displayed As you connect more devices to the Wireless LAN the client list will grow to a maximum of 32 the maximum number of wireless devices that the Router can support ...

Page 96: ...is not actually one rate of transmission but a series of rates at which the Router can transmit The Router will advertise its Basic Rate to the other wireless devices in your network so they know which rates will be used The Router will also advertise that it will automatically select the best rate for transmission The default setting is Default when the Router can transmit at all standard wireles...

Page 97: ... transmission should be set depending on the speed of your wireless network You can select from a range of transmission speeds or you can select Auto Default to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default value is Auto Defaul...

Page 98: ...ransmit to the Router in an environment with heavy 802 11b traffic This function boosts the Router s ability to catch all Wireless G transmissions but will severely decrease performance If you do not want to use CTS Protection Mode at all select Disabled Frame Burst Mode Frame burst is a term in wireless technology supported by the 802 11e QoS specification Suggesting to enable this option on poin...

Page 99: ...clients of the next window for listening to broadcast and multicast messages When the Router has stored in buffer with broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Its clients hear the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Fragmentation Threshold This value specifies the maximum size for...

Page 100: ...eduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right to begin tra...

Page 101: ... allows you to name your Wireless network The field will accept any alphanumeric string but not spaces and has a maximum length of 32 characters Your Wireless PCs must be configured with exactly the same name or you will not establish a connection The Service Area Name may also be referred to as ESSID depending on your networking vendor By default the Router uses the name BROWAN You may specify up...

Page 102: ...ireless network It will prevent unauthorized clients from detecting your SSID and attempting to connect to your network If you have a wireless client that can detect all the available SSIDs in your area your client will not list the Router SSID when this feature is enabled We recommend that you install your wireless network with this feature unchecked and then enable it once your have set up the R...

Page 103: ...her Cable or DSL ISP s It is popular with Cable providers and may also be required if your modem has a built in DHCP server If this mode is selected your IP Address Subnet Mask and ISP Address will be obtained automatically from your ISP They are not displayed on this screen but may be viewed on the Status screen click on Status and Logs on the left hand menu bar Host Name Some ISP s require a hos...

Page 104: ... can change the MAC address on the WAN side of your Router to be that of your old device There are three options available for cloning the Router WAN port MAC address Use the Router s original MAC address This option is selected by default When selected the Router uses the WAN port MAC address that it was assigned at the factory Use this PCs MAC address This option will assign the MAC address of t...

Page 105: ...MMUNICATIONS Page 106 Enter a new MAC address manually If the MAC addresses given by the previous two options are not correct then you will need to find the MAC address of the previous device used with your ISP ...

Page 106: ... be provided to you by your ISP Subnet mask This is the Subnet Mask of your Router s WAN port This setting is required and will be provided to you by your ISP ISP Gateway Address This is sometimes referred to as Default Gateway This setting is required and will be provided to you by your ISP Primary DNS Address Your ISP will normally provide you with at least one DNS Domain Name Server address and...

Page 107: ...e left at 0 0 0 0 if it is not required Secondary DNS Address If your ISP has provided a second DNS address you should enter it here Otherwise leave this setting at its default of 0 0 0 0 This setting is optional MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value ...

Page 108: ...PPPoE software on your PC once the Router is installed If you are unsure you should ask your ISP whether you need to use PPPoE PPPoE User Name Enter your User Name in this box This field is required and will be provided to you by your ISP PPPoE Password Enter your password in this box This field is required and will be provided to you by your ISP PPPoE Service Name If your ISP provided you with a ...

Page 109: ... it blank MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Maximum Idle Time This is the amount of time that passes before your Internet Connection is dropped due to inactivity If you want to keep your Internet Connection established at all times you should select Forever Otherwise select the amount of time...

Page 110: ...nnel then select this option Note that once the Router is installed you will not need to use the dialup VPN on your PC any more PPTP Server address This is the IP address of the PPTP server you are connecting to This setting is required and will be provided to you by your ISP The PPTP Server is typically located in your DSL modem In the case of an Alcatel Speed Touch modem its default address is 1...

Page 111: ... ISP s will also provide you with DNS addresses automatically When the addresses are obtained from your ISP they will be displayed on the Status screen MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Maximum Idle Time This is the amount of time that passes before your Internet Connection is dropped due to ...

Page 112: ...y enter your initial IP Address Subnet Mask and Default Gateway Initial IP address and Subnet Mask You must specify some IP settings to be used when establishing the PPTP connection If your ISP has provided you with these settings then you should use them Otherwise if the PPTP server is located in your DSL modem you can use the Suggest button to generate suitable values for you The Suggest button ...

Page 113: ... may not be in the same Subnet In this case the Initial Default Gateway is necessarily to be provided to establish the PPTP connection If the PPTP Server and Initial IP Address are in the same subnet then you can set the Initial Default Gateway to 0 0 0 0 or 0 ...

Page 114: ...t If you have been provided a Host Name by your ISP you should enter it here This field is optional and so if you have not been provided a host name you may leave it blank Heart Beat Server Your ISP will provide you with the Heart Beat Server s IP Address Heart Beat User Name Enter the User Name you use when logging onto your ISP through a Heart Beat Signal connection Heart Beat Password Enter the...

Page 115: ...BROWAN COMMUNICATIONS Page 116 MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value ...

Page 116: ...he Router is installed you will not need to use the dialup VPN on your PC any more L2TP Server address This is the IP address of the L2TP server you are connecting to This setting is required and will be provided to you by your ISP The L2TP Server is typically located in your DSL modem L2TP User Name Enter your User Name in this box This field is required and will be provided to you by your ISP L2...

Page 117: ...are obtained from your ISP they will be displayed on the Status screen MTU The MTU settings should be obtained from your Internet Service Provider If you do not know this value just leave it at the default value Get IP By DHCP Some ISP may have the mechanism that automatically provides Initial IP Address Subnet Mask and Default Gateway If your ISP provides such mechanism you should check this opti...

Page 118: ...if the L2TP server is located in your DSL modem you can use the Suggest button to generate suitable values for you The Suggest button will select an IP address on the same subnet as the L2TP server Initial Default Gateway The L2TP Server address and the Initial IP Address that ISP provides sometimes may not be in the same Subnet In this case the Initial Default Gateway is necessarily to be provide...

Page 119: ...you will need to configure a Virtual Server A Virtual DMZ is a special case of a Virtual Server which can intercept all unsolicited incoming traffic not already assigned to a Virtual Server and redirects it to a specified PC on the LAN Blocking Service Requests Select the Block Request radio button in the Virtual DMZ box Redirecting to a Virtual DMZ Host 1 Select the Redirect Request radio button ...

Page 120: ...lications select None if you do not want to use any of the preset applications Select up to five preset applications For custom applications enter the name of your application in one of the available fields The preset applications are among the most widely used Internet applications They include the following 1 FTP File Transfer Protocol A protocol used to transfer files from PC to another across ...

Page 121: ...d e mail protocol on the Internet It is a TCP IP protocol that defines the message format and the message transfer agent MTA which stores and forwards the mail 4 DNS Domain Name System The way that Internet domain names are located and translated into IP addresses A domain name is a meaningful and easy to remember handle for an Internet address 5 TFTP Trivial File Transfer Protocol A version of th...

Page 122: ...lable Fingering requires entering the full user domain address 7 HTTP HyperText Transport Protocol The communications protocol used to connect to servers on the World Wide Web Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser 8 POP3 Post Office Protocol 3 A standard mail server commonly used on the Internet It provides a message s...

Page 123: ... control protocol Data is passed from SNMP agents which are hardware and or software processes reporting activity in each network device hub router bridge etc to the workstation console used to oversee the network The agents return information contained in a MIB Management Information Base which is a data structure that defines what is obtainable from the device and what can be controlled turned o...

Page 124: ...et application for more information Protocol Select the protocol s used for this application TCP and or UDP To IP Address For each application enter the IP address of the PC running the specific application Enabled Click the Enabled checkbox to enable port forwarding for the relevant application ...

Page 125: ...ork properly and are not blocked the firewall needs to be told about them In each instance there will be a trigger port and incoming port s where traffic on the trigger port tells the Firewall to open the incoming ports Authorized Application Application Name Enter the application name of the trigger Triggered Range For each application list the triggered port number range Check with the Internet ...

Page 126: ...rnet application documentation for the port number s needed In the first field enter the starting port number of the Forwarded Range In the second field enter the ending port number of the Forwarded Range Enabled Click the Enabled checkbox to enable port range triggering for the relevant application Each defined Special Application only supports a single PC user and up to 10 Special Applications c...

Page 127: ...denial of service DOS attacks Denials of Service DOS attacks are aimed at devices and networks with a connection to the Internet The goal is not to steal information but to disable a device or network so users no longer have access to network resources By using above inspected information and timeout threshold criteria the Router provide following DOS attacks prevention Ping of Death Ping flood at...

Page 128: ...ic filtering methods 1 Proxy Use of WAN proxy servers may compromise the Router s security Denying Proxy will disable access to any WAN proxy servers To enable proxy filtering click the Proxy box 2 Java Java is a programming language for websites If you deny Java you run the risk of not having access to Internet sites created using this programming language To enable Java filtering click the Java ...

Page 129: ...having access to Internet sites created using this programming language To enable ActiveX filtering click the ActiveX box 4 Cookies A cookie is the data stored on your PC and used by Internet sites when you interact with them To enable cookie filtering click the Cookies box ...

Page 130: ...cific device or the Routers LAN ports You may give a comparative metric for your selected application with High Low or Normal to prioritize bandwidth of your services Bandwidth Specify the limit for your uplink and downlink connection bandwidth in kilobit per second Remember that if you specify a speed exceeding your current broadband service capabilities you will still only be able to achieve the...

Page 131: ...ame 1 FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Internet UNIX etc For example after developing the HTML pages for a website on a local machine they are typically uploaded to the web server using FTP 2 Telnet A terminal emulation protocol commonly used on Internet and TCP IP based networks It allows a user at a terminal or computer to log onto a remote devic...

Page 132: ...ted into IP addresses A domain name is a meaningful and easy to remember handle for an Internet address 5 TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability 6 Finger A UNIX command widely used on the Internet to find out information about a particular user such as a telephone number whether the user is currently logged on and the l...

Page 133: ... HTML pages to the client web browser 8 POP3 Post Office Protocol 3 A standard mail server commonly used on the Internet It provides a message store that holds incoming e mail until users log on and download it POP3 is a simple system with little selectivity All pending messages and attachments are downloaded at the same time POP3 uses the SMTP messaging protocol 9 NNTP Network News Transfer Proto...

Page 134: ...ents return information contained in a MIB Management Information Base which is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc 11 Kazaa Kazaa uses peer to peer technology The means that individual users connect to each other directly without need for a central point of management 12 DC DC is an open source client for the Direct Connect...

Page 135: ... for Quality of Service flows The RSVP protocol is used by a host to request specific qualities of service from the network for particular application data streams or flows RSVP is also used by routers to deliver quality of service QoS requests to all nodes along the path s of the flows and to establish and maintain state to provide the requested service RSVP requests will generally result in reso...

Page 136: ...lso operate over other packet switched networks It was designed with multipoint voice and video conferencing capabilities though most users do not take advantage of the multipoint capabilities specified in the protocol 15 L2TP L2TP Layer 2 Tunneling Protocol is used to provide IP security at the network layer L2TP uses UDP to transport the PPP data this is often encapsulated in IPSec for encryptio...

Page 137: ... optional parameters such as encryption can be negotiated When LCP and NCP negotiation is done IP datagram can be sent over the link 17 IPSec Internet Protocol Security IPSec is a collection of standards that was designed specifically to create secure end to end secure connections The standards were developed by the Internet Engineering Task For IETF to secure communications over both public and p...

Page 138: ...aphy IPSec can secure data links that would otherwise be insecure and susceptible to exploitation Priority Select one of these priority levels Highest High Above Normal or Normal Port For preset applications the port number is automatically displayed For custom applications enter the appropriate port number in the Port field MAC Address Priority Client Device Name Enter the name of your network de...

Page 139: ...UNICATIONS Page 140 Select one of these priority levels Highest High Above Normal or Normal MAC Enter the MAC address of the device Enabled Click the Enabled checkbox to enable QoS for the appropriate MAC address ...

Page 140: ...en to establish an access policy after the Save Settings button is clicked Selecting a policy from the drop down menu will display those policies settings To delete a policy select policies number and click the Delete This Policy button To view all the policies click the Summary button On the Summary screen the policies are listed with the following information No Policy Name Access Days Time and ...

Page 141: ...a group of PCs After making your changes click the Save Settings button to apply your changes To create an Internet Access policy 1 Select a number from the Access Policy drop down menu 2 Enter a Policy Name in the field provided 3 To enable this policy select Enabled from the Status drop down menu 4 Click the Edit List button to select which PCs will be affected by the policy The List of PCs scre...

Page 142: ...icy will be in effect or select Everyday Then enter a range of hours and minutes during which the policy will be in effect or select 24 Hours 7 You can filter access to various applications accessed over the Internet such as FTP or telnet by selecting up to three applications from the drop down menus next to Blocked Application Port Each drop down menu offers a choice of ten preset applications se...

Page 143: ...so be filtered by URL Address the address entered to access Internet sites by entering the address in one of the Website Blocking by URL Address fields If you do not know the URL Address filtering can be done by Keyword by entering a keyword in one of the Website Blocking by Keyword fields 9 Click the Save button to save the policy settings By pressing the Cancel button all changes will be discard...

Page 144: ...the URL and not the content of the site The Deny List will compare entries in the Filter Table to that of a requested Website URL and block the user from viewing the Website if a match is found The Allow List will compare entries in the Filter Table to that of a requested Website URL and allow the Website to be viewed if a match is found All other URL requests are blocked If a user attempts to acc...

Page 145: ... Table allows the entry of either URLs or keywords For example a URL would typically look take the form www examplesite com www another site org www eg_website net Whereas a Keyword would typically be a word or letters that should be blocked for example adult xxx excite ...

Page 146: ...uration information will be lost This function may be of use if you are experiencing problems and you wish to re establish your Internet connection Any network users who are currently accessing the Internet will have their access interrupted whilst the restart takes place and they may need to reboot their computers when the restart has completed and the Router is operational again ...

Page 147: ...ime zone setting is used by the system clock when displaying the correct time in the log files The system time is automatically updated from Time Servers on the Internet The Daylight saving feature allows you to manually add 1 hour to the Internet time This is not automatically updated when the Daylight saving time ends ...

Page 148: ... be viewed or modified with a word processor or spreadsheet program Restore Configuration Data The Restore Configuration Data function is used to reinstate the configuration data previously saved to a file using the Backup Configuration function Use the Browse button to locate the backup file on your computer and then click the Restore button to copy the data into the Router s memory Note that the...

Page 149: ...nd you wish to start the configuration process from a known clean state This function should be used with caution as once a unit has been reset to its factory default state then the current configuration settings are irrevocably lost It is strongly recommended that you backup the current configuration with the Backup Configuration facility before using the Reset to Factory Defaults function unless...

Page 150: ...button to tell your web browser where this file is on your computer and then click on Apply The file will be copied to the Router and when this has completed the Router will restart Although the upgrade process has been designed to preserve your configuration settings it is recommended that you make a backup of the configuration beforehand in case the upgrade process fails for any reason for examp...

Page 151: ...et Mask The subnet mask of the static route Gateway Gateways are most commonly used to transfer data between private networks and the internet Click New button below the table to add the static route entries After adding any entry in the static routing table you could click Delete button to delete the entries you have made Click Apply button to save the changes otherwise click Cancel button to qui...

Page 152: ...n Protocol is a widely used protocol for managing router information within a self contained network such as a corporate local area network LAN or an interconnected group of such LANs Check the check box to enable RIP Mode or uncheck the check box for disable RIP Mode ...

Page 153: ...Internet domain name to be assigned to a computer with a varying dynamic IP address This makes it possible for other sites on the Internet to establish connections to the machine without needing to track the IP address themselves A common use is for running server software on a computer that has a dynamic IP address as is the case with many consumer Internet service providers The DDNS is disabled ...

Page 154: ...BROWAN COMMUNICATIONS Page 155 You could select DynDNS org to Enable the DDNS Please enter the Host Name Username and Password you acquired form your DDNS provider http www dyndns com ...

Page 155: ...BROWAN COMMUNICATIONS Page 156 You could select TZO com to Enable the DDNS Please enter the Host Name Username and Password you acquired form your DDNS provider http www tzo com ...

Page 156: ...ateful Packet Inspection SPI which is a more secure method of protection against attacks to your network When an attack is detected a log entry will be generated and the Alert LED will be lit for 2 seconds Enable universal plug and play The universal plug and play architecture enables discovery and control between devices on a network Enabling this feature will make the Router less secure as you n...

Page 157: ...stening for ICMP echo response replies Using interval timing and response rate ping estimates the round trip time and rate of packet loss if any between hosts Allow PING is enabled by Checking on the Allow PING from the Internet check box so that a tick can be seen Click the Apply button Disable NAT When NAT is Disabled the Router does not perform IP address and port translation The related featur...

Page 158: ...ecure exchange of packets at the IP layer IPSec Pass Through is enabled by default L2TP Pass through Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level L2TP Pass Through is enabled by default PPTP Pass through Point to Point Tunneling Protocol PPTP allows the Point to Point Protocol PPP to be tunneled through an IP network PPTP Pas...

Page 159: ...emote administration for a single PC all PCs in a subnet or for any PC The more PCs you enable access for the less secure your Router will be To do this 1 Select the remote administration mode you require 2 In the case of a single PC specify its IP address In the case of a subnet specify the address of a PC in the subnet and the subnet mask 3 The Remote PC can now administer the Router by entering...

Page 160: ...xy ARP allows a site to use a single IP address with two physical networks Following is the setting procedures on Proxy ARP function 1 Set the GW wan IP in static ip mode such as IP 10 0 0 2 submask 255 255 0 0 route 10 0 0 1 2 Enable Proxy ARP on WEB UI and set the Public IP range you want to set on PC in your LAN network such as from 10 0 0 3 to 10 0 0 14 3 Set PC in your LAN network with one of...

Page 161: ...The addresses must be in one continuous block in the same subnet You must have selected Static IP Address as your IP Allocation Mode and have given your VPN Firewall the first of the Internet addresses allocated by your ISP To set up One to One NAT Enable the entry of One to One NAT Enter the Internet addresses in ISP Pool field WAN IP address Enter the IP address in your LAN side to which you wan...

Page 162: ...BROWAN COMMUNICATIONS Page 163 Advanced SNMP Simple Network Management Protocol SNMP allows a management application to retrieve statistics and status from the SNMP agent in this device ...

Page 163: ... 164 Status and Logs Status This page summarizes most of the unit s configuration in one place You may be asked to print this page out if you call BROWAN Support You can refresh the information by clicking on the Refresh button ...

Page 164: ...BROWAN COMMUNICATIONS Page 165 ...

Page 165: ...suing DHCP addresses to requesting PCs However this is also where the Router would record security threats like Hacker Attacks detected Attempts to login to the admin interface from the LAN side Attempts to login to the admin interface from the Internet View Log Select Incoming Log Outgoing Log Security Log Security Log or DHCP Client Log from the Type drop down menu The Incoming Log will display ...

Page 166: ...tgoing Internet traffic The Security Log will display the login information for the WEB Utility The DHCP Client Log will display the LAN DHCP server status information The files can be downloaded and saved as a text file on your PC To do this 1 Click on the Save Log button 2 Specify a location to save the file and click OK Click the Refresh button to update the log The Clean button deletes all of ...

Page 167: ...BROWAN COMMUNICATIONS Page 168 Status and Logs Routing Table The routing table details the default routing used by the router and any routing created using Static routing or RIP ...

Page 168: ...ROWAN COMMUNICATIONS Page 169 Status and Logs Syslog Syslog allows the user to to log system information to a remote server You may need to modify your remote syslog server settings to accept remote logs ...

Page 169: ...l appear after you click Help button How to use the help system Works exactly like a browser s back button Works exactly like a browser s forward button Opens the Help Table of Contents Table of Contents This link will help you to find the keyword in help system quickly Support from BROWAN You could visit our support web page with is link ...

Page 170: ... 11 EU 13 Modulation 802 11b DBPSK 1Mbps DQPSK 2Mbps CCK 5 5Mbps 11Mbps 802 11g OFDM with BPSK QPSK 16QAM 64QAM Transmit Power 18dBm 2dBm 11Mbps not including Antenna gain 16dBm 2dBm 54Mbps not including Antenna gain Receive Sensitivity 83dBm 11Mbps IEEE 802 11b 65dBm 54Mbps IEEE 802 11g Antenna One R SMA connector for external antenna 1 detachable antenna peak 2 0dBi Radio 2 4GHz ISM band Appendi...

Page 171: ...Non condensing Power supply PoE IEEE 802 3af compliance option Power adapter 100 240 V AC 50 60 Hz input and 12V 500mA output LEDs Power WLAN WAN LAN Network Management Firewall Access control Authorized application Application port priority URL filtering Stateful packet inspection SPI Website blocking Virtual Server Virtual DMZ Internet connection Static IP DHCP PPPoE PPTP Heart Beat Signal L2TP ...

Page 172: ...BROWAN COMMUNICATIONS Page 173 Regulation Certification FCC CE Compliance RoHS WEEE Warranty Two years ...

Reviews: