Corega COR-BAR-AWLA-54 User Manual Download Page 36

Appendix D: Glossary

10Base-T

An adaptation of the Ethernet standard for Local Area Networks (LANs). 10Base-T uses a twisted pair cable with maximum lengths of 100 meters.

Adapter

A device that makes the connection to a network segment, such as Ethernet and modem cards and adapters.

ADSL

Asymmetric Digital Subscriber Line (ADSL), as it’s name indicates, is an asymmetrical data trasmission technology with higher traffic rate downstream and lower traffic rate
upstream. ADSL technology satifies the bandwidth requirements of applications which demand “asymmetric” traffic, such as web surfing, file downloads and telecommuting.

ATM

(Asynchronous Transfer Mode) A network technology supports real time voice, video, and data transmission. The topology uses switches that establish a logical circuit from
end to end, which guarantees quality of service (QoS). ATM works by transmitting all traffic as fixed-length, 53-byte cells. This fixed unit allows very fast switches to be
built ATM is widely used as a backbone technology in carrier networks and large enterprises. ATM is highly scalable and supports transmission speeds of 1.5, 25, 100, 155,
622, 2488 and 9953 Mbps. ATM is also running as slow as 9.6 Kbps between ships at sea.

Bandwidth

The amount of data that can be transmitted in a fixed amount of time.

Browser

A software application used to locate and display web pages. Examples include Netscape Navigator and Microsoft Internet Explorer.

Communications Protocols

Communications between devices requires they agree on the format in which thedata is to be transmitted, sent and received. The communications protocols are a set of
rules that define the data format.

DHCP

DHCP, short for Dynamic Host Configuration Protocol, is a protocol for assigning dynamic IP Addresses to devices on a network. Dynamic Addressing means that a device
can have a different IP Address each time it connects to the network.

Domain Name

A name that identifies one or more IP Addresses. For example, the domain name microsoft.com represents about a dozen IP Addresses. Domain names are used in URLs to
identify particular web pages. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com.

DNS

Short for Domain Name Server, translates domain names into IP Addresses. To help us recognize and remember domain names they are alphabetic in form, however, the
Internet actually runs on numbered IP Addresses. DNS servers translate domain names into their respective IP Addresses.

Encapsulation

A method for transmitting multiple protocols within the same network. The frames of one type of protocol are carried within the frames of another.

Ethernet

One of the most common Local Area Network (LAN) protocols. Ether uses a bus topology which supports a data transfer rate of 10 Mbps.

Firewall

A security system used to enforce an access control policy between an organisation’s networks and the internet.

IEEE

Short for Institute of Electrical and Electronics Engineers, an organization best known for developing standards for the computer and electronics industry.

Internet

A global network connecting millions of computers for the exchange of data, news and opinions.

Intranet

A network based on TCP/IP Protocol (an internet) belonging to an organization, and accessible only by that organization's members, employees, or others with authoriza-
tion.

IP Address

An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP Protocol route messages based on the IP Address of the destination. The format of
an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be from zero to 255.

IPSec

Internet Protocol Security is a security standard for network transmission. It provides authentication and packet encryption over the internet.

ISP

Short for Internet Service Provider, a company that provides access to the internet for a monthly fee. The ISP provides a software package, username, password and access
phone number allowing users to log on to the internet, browse the World Wide Web and send and receive e-mail.

LLC

Logical Link Control is the sublayer of data link layer defined in IEEE 802.2. The LLC provides a common interface point to the MAC layers, which specify the access 

ENGLISH

34

Summary of Contents for COR-BAR-AWLA-54

Page 1: ...LECTRIC SHOCK HAZARD Install product in accordance with local and National Electrical Codes To de energise equipment disconnect the power cord D Warnhinweise STROMSCHLAGGEFAHR Dieses Produkt muss ents...

Page 2: ...ADSL WIRELESS 802 11g 54MBPS ROUTER HUBS SWITCHES ADAPTERS WIRELESS LAN USB KVMs MEDIA CONVERTERS ROUTERS ADSL COR BAR AWLA 54 COR BAR AWLB 54 ALL IN ONE ROUTER...

Page 3: ...CONFIGURATION 14 4 4 WEB CONTROL 15 4 5 TIME OF DAY ToD CONTROL 15 4 6 ACCESS CONTROL 16 4 7 VIRTUAL SERVER SETTINGS 17 4 8 SPECIAL APPLICATIONS 19 4 9 DMZ HOST 19 4 10 DYNAMIC ROUTING 20 4 11 STATIC...

Page 4: ...es without notice and does not represent a commitment on the part of vendor No warranty or representation either expressed or implied is made with respect to the quality accuracy or fitness for any pa...

Page 5: ...apter The front panel of the router is shown in Figure 3 Figure 3 Front Panel Power 0ff No power applied Green Power to the router Diag Transaction Red Glows when the router performs a self test on po...

Page 6: ...I VCI Operating Mode LLC Encapulation with Dynamic IP LLC Encapulation with Static IP Gateway Classical IP PPPoE PPPoA Router using Classical IP PPP Authentication Login Name Password Depending on you...

Page 7: ...f the router This is the address that is used to configure the router The default values are 192 168 1 1 for IP Address and 255 255 255 0 for Subnet Mask Changing this factory default setting is optio...

Page 8: ...ton Four 64 bit encryption keys or one 128 bit encryption key will be created automatically You can enter the WEP key manually You may need to enter the WEP key manually to join the existing wireless...

Page 9: ...disconnection because the system on the ISP site may need a little time to restore You may need to check with your ISP to find out how much time is required before the router can start to re build th...

Page 10: ...ons 1 You want to employ NAT NAT allows you to use a single IP address as the external one to share internet access for all of your PCs as well as protect them from outside intruders 2 Your ISP uses C...

Page 11: ...apply for the service However as you have chosen to make this device act as an modem you have to know how to configure your PCs When you have properly configured the Setup page click Apply You can now...

Page 12: ...y Number Note The Tunnel name set here does not always have to match the name used at the other end of the Tunnel However certain VPN applications require a Tunnel to have the same name at both ends o...

Page 13: ...e WAN IP Address of that VPN router in this section For more detail refer to the description of Example establish the VPN connection on the next few pages IP Address Use IP Address to identify the rem...

Page 14: ...oblem exists preventing the successful creation of the Tunnel In this case you should firstly ensure that your wiring is securely connected Next double check that correct values have been entered in t...

Page 15: ...sure security at the IP packet level Keep Alive Check the box to re establish the VPN Tunnel connection whenever it is dropped After the Tunnel has been created this function will keep the connection...

Page 16: ...ion to Disable Starting IP Address Enter a numerical value from 2 to 254 for the DHCP server to start at when assigning IP Addresses Number of Users Enter the maximum number of PCs that you want the D...

Page 17: ...y LAN PCs that will not be restricted by this rule Click the Apply button after making any changes or click the Cancel button to exit the screen without saving any changes 4 5 Time of Day ToD Control...

Page 18: ...e rule the PCs which have the MAC addresses matching in MAC field and their IP addresses matching in the Source IP field will be allowed blocked for certain applications Protocol Select the protocol t...

Page 19: ...of the router is set to the default value of 192 168 1 1 Ports Enter the desired service port numbers in the Ports fields You can specify the protocol type as TCP or UDP from the drop down list If you...

Page 20: ...numbers for incoming and outgoing data packets In this case you have to enter the port number used by the incoming data packets Protocol Specify the protocol type as TCP or UDP which is used by speci...

Page 21: ...ar applications Figure 33 Popular Application Port Numbers 4 9 DMZ Host The DMZ Host application allows unrestricted 2 way communication between a single LAN PC and other internet users or servers Thi...

Page 22: ...to five public IP addresses can be entered 2 Click the Apply button after making any changes or click the Cancel button to exit the screen without saving any changes 4 10 Dynamic Routing The Dynamic R...

Page 23: ...P Address and Subnet Mask of the destination LAN that the immediate LAN is to communicate with Taking the above diagram as an example enter 192 168 2 0 in the Destination LAN IP field and 255 255 255...

Page 24: ...Filter Enabled Yellow MAC Address have been blocked see MAC Filter Table Red MAC Address Filter Disabled Wireless Station MAC Filter This function allows you to restrict wireless users access to the i...

Page 25: ...tem so a system that allocates domain name such as www dyndns org provides an easier method If you type 66 37 215 53 or www dyndns org in the web browser s address bar the browser will show the same w...

Page 26: ...about this router or have the authority to change the configuration Also the administrator can define any specific community and configure its limits as Read Only or Read Write from the right side dro...

Page 27: ...or Static IP on the OnePage Setup page Device Status This section shows the connection information of the router The Modem status shows Up or Down to indicate that the router is connected or disconne...

Page 28: ...your ISP s outgoing e mail server You may find this information when you apply for e mail service from your ISP E mail Alert to Enter the e mail address you wish to send to Return Address Enter the e...

Page 29: ...o the latest version of firmware to keep your router up to date Before you upgrade the firmware you have to get the latest firmware and save it on the PC you use to configure the router Figure 46 Upgr...

Page 30: ...tion between the router and the destination device Chapter 6 0 Macintosh Setup This chapter provides information on using Macintosh computers in your network The instructions given here are for system...

Page 31: ...er 3 0 Internet Access section 3 3 To configure advanced settings see Chapter 4 0 Advanced Configuration 6 4 Adding router to Existing Network If the router is to be added to an existing Macintosh com...

Page 32: ...to verify the network connection Ping 127 0 0 1 to check the TCP IP stack of your computer Ping gateway IP Default 192 168 1 1 to check the internal link of network If you re not able to get to the we...

Page 33: ...users The router combines the following technologies to enable this function NAT Network address translation NAT is a technology which can create a private network domain behind a public IP It is usu...

Page 34: ...on configuring the Microsoft Windows 2000 server at the Microsoft website Microsoft KB Q252735 How to Configure IPSec Tunneling in Windows 2000 http support microsoft com support kb articles Q252 7 35...

Page 35: ...on key Perfect Forward Secrecy PFS and remember to check the PFS option on the Broadband VPN Router and then click the OK button 5 From the Authentication Methods tab click the Edit button 6 Change th...

Page 36: ...Addresses Domain names are used in URLs to identify particular web pages For example in the URL http www pcwebopedia com index html the domain name is pcwebopedia com DNS Short for Domain Name Server...

Page 37: ...ver standard telephone lines between devices from different manufacturers PPPoE Short for PPP over Ethernet relying on two widely accepted standards Ethernet and the Point to Point Protocol It s a com...

Page 38: ...ENGLISH 36 THIS PAGE IS INTENTIONALLY LEFT BLANK...

Page 39: ...37 ENGLISH THIS PAGE IS INTENTIONALLY LEFT BLANK...

Page 40: ...ENGLISH 38 THIS PAGE IS INTENTIONALLY LEFT BLANK...

Reviews: