INOVIA RNC-1004WL User Manual Download Page 21

User’s Manual  -

  

RNC-1004WL Wireless Router  -  www.inovia.co.kr 

WPA  Authentication  Mode:  Keys  can  be  managed  using  two 

different mechanisms. WPA can either use an external authentication 
server (e.g., RADIUS) and EAP just like IEEE 802.1X is using or pre-
shared  keys  without  need  for  additional  servers.  Wi-Fi  calls  these 
"WPA-Enterprise" 

and 

"WPA-Personal", 

respectively. 

Both 

mechanisms will generate a master session key for the Authenticator 
(AP) and Supplicant (client station). 

802.1x: The original security mechanism of IEEE 802.11 standard 

was not designed to be strong and has proven to be insufficient for 
most  networks  that  require  some  kind  of  security.  Task  group  I 
(Security)  of  IEEE  802.11  working  group  has  worked  to  address  the 
flaws of the base standard and in practice completed its work in May 
2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was 
approved in June 2004 and published in July 2004. 

WPA  Cipher  suite/WPA2  Cipher  Suite:  The  encryption  piece  of 

WPA  and  WPA2  mandates  the  use  of  TKIP  or,  because  it's 
considered to be more secure than TKIP, preferably AES encryption. 

Pre-Shared Key Format: You can select PASSPHRASE or HEX (64 

characters). 

Pre-Shared Key: You can input 128 characters key. 
Authentication  RADIUS  Server:  Input  Port  and  IP  Address  and 

Password. 

 

4.3.4 Wireless Access Control 

 

If you choose 'Allowed Listed', only those clients whose wireless 

MAC addresses are in the access control list will be able to connect 
to your Access Point. When 'Deny Listed' is selected, these wireless 
clients on the list will not be able to connect the Access Point. 

 

4.3.5 WDS Settings 

Wireless 

Distribution 

System 

uses 

wireless 

media 

to 

communicate with other AP’s, like the Ethernet does. To do this, you 
must  set  these  AP’s  in  the  same  channel  and  set  MAC  address  of 
other AP’s which you want to communicate with in the table and then 
enable the WDS 

 

20

Summary of Contents for RNC-1004WL

Page 1: ...R RN NC C 1 10 00 04 4W WL L 5 54 4M M W Wi ir re el le es ss s R Ro ou ut te er r U Us se er r s s M Ma an nu ua al l Ver1 1 A S 82 2 6309 1330 www rncinnotek co kr English www inovia co kr Korean...

Page 2: ...ect to change without notice This document contains of proprietary technical information that is the property of our company And no part of this documentation may be reproduced stored in a retrieval s...

Page 3: ...ck Installation Guide 8 3 1 TCP IP configuration 8 3 2 Quick Setup Wizard 9 Chapter Four Configuration Guide 16 4 1 Login 16 4 2 Status Show 17 4 2 1 Status 17 4 2 2 Statistics 17 4 2 3 Log 17 4 3 Wir...

Page 4: ...te Control 27 4 7 4 Dynamic DNS Setting 27 4 8 QoS 28 4 8 1 Wan Speed Setting 28 4 8 2 IP QoS 28 4 9 Management 28 4 9 1 Operation mode 28 4 9 2 Time Zone Setting 29 4 9 3 Upgrade Firmware 30 4 9 4 Sa...

Page 5: ...d is defined by the IEEE as the 802 3 standard Normally Ethernet is a shared media LAN All stations on the segment share the total bandwidth which could be 10 Mbps Ethernet 100 Mbps Fast Ethernet With...

Page 6: ...ts Auto MDI MDIX Supports Wireless Roaming can move among different AP and no break Supports 54 48 36 24 18 12 9 6 11 5 5 3 2 1Mbps wireless LAN data transfer rates Provides 64 128 bit WEP encryption...

Page 7: ...ess Radio function disabled WLAN Flashing Wireless Radio function enabled ON Router initializing Flashing WAN Port working properly WAN OFF WAN Port not work OFF No device linked to the corresponding...

Page 8: ...pe Navigator 6 0 or later 2 3 Installation Environment Requirements Not in direct sunlight or near a heater or heating vent Not cluttered or crowded There should be at least 2 inches 5 cm of clear spa...

Page 9: ...68 1 1 and the default Subnet Mask is 255 255 255 0 These values can be seen from the LAN They can be changed as you desire as an example we use the default values for description in this guide Connec...

Page 10: ...t following these steps 1 Is the connection between your PC and the router correct Note The 1 2 3 4 LEDs of LAN port on the router and LEDs on your PC s adapter should be lit 2 Is the TCP IP configura...

Page 11: ...the OK button or press the Enter key Note If the above screen does not prompt it means that your web browser has been set to a proxy Go to Tools Internet Options Connections LAN Settings in the screen...

Page 12: ...ovia co kr The router supports three modes Gateway Bridge and Wireless ISP You can setup different modes to LAN and WLAN interface for NAT and bridging function Click Next Time Zone Setting will appea...

Page 13: ...Mask An address code that determines the size of the network Normally use 255 255 255 0 as the subnet mask Note The same to all PCs Subnet Mask with router in you LAN Click Next WAN Interface will app...

Page 14: ...User s Manual RNC 1004WL Wireless Router www inovia co kr User Name and Password Enter the User Name and Password provided by your ISP Services name Default is blank 13...

Page 15: ...he IP parameters from your ISP without needing to enter any parameters If you Choose PPTP the Static IP settings page will appear shown in the figure You can get IP Address Subnet Mask server IP Addre...

Page 16: ...255 0 Default Gateway Enter the gateway into the box if required DNS Enter the DNS Server IP address into the boxes if required Click Next wireless basic setting will appear This page is used to confi...

Page 17: ...wireless channel unless there are interference problems with another nearby access point Click Next Wireless Security Setup will appear This page allows you set up the security You can select None WEP...

Page 18: ...me basic settings of the device you can check system Information LAN Interface Information WAN Interface Information 4 2 2 Statistics This page shows the packet counters for transmission and reception...

Page 19: ...is AP you can select Client WDS AP WDS Network Type Default is Infrastructure when mode is client Network Type should be set as AD HOC SSID Enter a value of up to 32 characters The same name SSID mus...

Page 20: ...eless security setup This page allows you setup the wireless security Turn on WEP or WPA by using Encryption Keys could prevent any unauthorized access to your wireless network Encryption you can sele...

Page 21: ...the IEEE 802 11 standard was approved in June 2004 and published in July 2004 WPA Cipher suite WPA2 Cipher Suite The encryption piece of WPA and WPA2 mandates the use of TKIP or because it s consider...

Page 22: ...oE or PPTP by click the item value of WAN Access type WAN Access Type User name password Service you can refer to 3 2 Quick Installation Guide Connection Type You can select continuous connect on dema...

Page 23: ...onnection Enable PPTP pass through on VPN connection 4 5 LAN Setting 4 5 1 LAN Interface setup This page is used to configure the parameters for local area network which connects to the LAN port of yo...

Page 24: ...p prevention and redundant link configuration You can select disable or enable if your mode was set WDS or AP WDS this item should be set enable Clone MAC Address you can enter a MAC then click clone...

Page 25: ...Address e g 192 168 1 23 Protocol you can select both TCP UDP Current Filter table The list of IP filter 4 6 3 MAC Filtering Entries in this table are used to restrict certain types of data packets f...

Page 26: ...rvice A denial of service DoS attack is characterized by an explicit attempt by hackers to prevent legitimate users of a service from using that service Enable DOS Prevention Select it you can modify...

Page 27: ...in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of server like a...

Page 28: ...It is useful when you are hosting your own website FTP server or other server behind the router Before using this feature you need to sign up for DDNS service providers such as www oray net or www com...

Page 29: ...Router www inovia co kr 4 8 QoS IP QoS enables user to control upload and downloading speed between the maximum and minimum on PC with specified IP address 4 8 1 Wan Speed Setting 4 8 2 IP QoS 4 9 Ma...

Page 30: ...together and the wireless client will connect to ISP access point The NAT is enabled and PCs in Ethernet ports share the same IP to ISP through wireless LAN You must set the wireless to client mode f...

Page 31: ...ad because it may crash the system 4 9 4 Save Reload settings This page allows you save current settings to a file or reload the settings from the file which was saved previously Besides you could res...

Page 32: ...User s Manual RNC 1004WL Wireless Router www inovia co kr 4 10 Logout This page is used to logout 31...

Page 33: ...left of your browser and click LAN Interface submenu On the WAN page select DHCP for Client finish by clicking apply changes 2 Some ISPs require that you register the MAC Address of your adapter which...

Page 34: ...eld using 192 168 1 169 as an example remember to click the Apply changes button 4 The wireless stations cannot connect to the router 1 Make sure the Disable Wireless LAN Interface is not select 2 Mak...

Page 35: ...Four 10 100M Auto Negotiation LAN RJ45 ports Supporting Auto MDI MDIX Cabling Type 10BASE T UTP category 3 4 5 cable max 100m EIA TIA 568 100 STP max100m 100BASE TX UTP category 5 5e cable max 100m EI...

Page 36: ...L messages that convey the shared key information critical for wireless security Ad hoc Mode The 802 11 standard define two modes infrastructure mode and ad hoc mode Ad hoc mode also called peer to pe...

Page 37: ...rvice Set BSS An Extended Service Set ESS is a set of two or more BSSs forming a single subnetwork Since most corporate WLANs require access to the wired LAN for services file servers printers Interne...

Page 38: ...ddresses of a local area network to a different IP address for the Internet NTP Network Time protocol client It is designed for fetching the current timestamp from internet via Network Time protocol U...

Page 39: ...via wireless channel like the wireless bridge or repeater service WEP Wired Equivalent Privacy Data privacy mechanism based on a 64 bit or128 bit or 152 bit shared key algorithm as described in the I...

Page 40: ...members of the IEEE 802 11i task group to develop a significant near term enhancement to Wi Fi security Together this team developed Wi Fi Protected Access To upgrade a WLAN network to support WPA Ac...

Reviews: