background image

Protocol 

A protocol is a rule that governs the communication of data. 

RIP 

RIP (Routing Information Protocol) is a routing protocol that is integrated in the 
TCP/IP protocol. RIP finds a route that is based on the smallest number of hops 
between the source of a packet and its destination. 

RTS 

RTS (Request To Send) is a signal sent from the transmitting station to the receiving 
station requesting permission to transmit data. 

Server 

Servers are typically powerful and fast machines that store programs and data. The 
programs and data are shared by client machines (workstations) on the network. 

SMTP 

SMTP (Simple Mail Transfer Protocol) is the standard Internet e-mail protocol. SMTP 
is a TCP/IP protocol defining message format and includes a message transfer agent 
that stores and forwards mail. 

Subnet Mask 

Subnet Masks (SUBNETwork masks) are used by IP protocol to direct messages into 
a specified network segment (i.e., subnet). A subnet mask is stored in the client 
machine, server or router and is compared with an incoming IP address to determine 
whether to accept or reject the packet. 

SysLog Server 

A SysLog server monitors incoming Syslog messages and decodes the messages for 
logging purposes. 

TCP 

(Transmission Control Protocol) is the transport protocol in TCP/IP that ensures 
messages over the network are transmitted accurately and completely. 

TCP/IP 

TCP/IP (Transmission Control Protocol/Internet Protocol) is the main Internet 
communications protocol. The TCP part ensures that data is completely sent and 
received at the other end. Another part of the TCP/IP protocol set is UDP, which is 
used to send data when accuracy and guaranteed packet delivery are not as important 
(for example, in real-time video and audio transmission).    The IP component of 
TCP/IP provides data routability, meaning that data packets contain the destination 
station and network addresses, enabling TCP/IP messages to be sent to multiple 
networks within the LAN or in the WAN. 

UDP 

(User Datagram Protocol) is a protocol within TCP/IP that is used to transport 

 

55

Summary of Contents for WBR-3405TX

Page 1: ...LevelOne WBR 3405TX 11g Wireless AP Router User s Manual ...

Page 2: ...5 3 1 LAN Setting 15 3 1 1 LAN DHCP Server 15 3 1 2 WAN 16 3 1 3 Password 18 3 1 4 Time 18 3 1 5 Dynamic DNS 20 3 2 Wireless 21 3 2 1 Basic 21 3 2 2 Authentication 22 3 2 3 802 1X 24 3 2 4 WPA PSK 25 3 3 Advanced 26 3 3 Status 27 3 3 1 Device Information 27 3 3 2 Log 28 3 3 3 Log Setting 29 3 3 4 Statistic 30 3 3 5 Wireless 31 3 4 Routing 32 3 4 1 Static 32 3 4 2 Dynamic 33 3 4 3 Routing Table 34 ...

Page 3: ...3 5 4 DMZ 42 3 5 5 Firewall Rule 43 3 6 Management 46 3 6 1 SNMP 46 3 6 2 Remote Management 47 3 7 Tools 48 3 7 1 Restart 48 3 7 2 Settings 49 3 7 3 Firmware 50 3 7 4 Ping Test 51 4 Glossary 51 3 ...

Page 4: ...ps raw data rate for 802 11g Quick and easy setup with Web based management utility 1 2 System Requirements Windows 98 98SE Millennium Edition ME 2000 and XP operating systems Microsoft Internet Explorer 5 5 or higher DSL Cable Modem Broadband Internet connection and ISP account PCs equipped with 10Mbps or 10 100 Mbps Ethernet connection to support TCP IP protocol One CD ROM drive 1 3 Applications...

Page 5: ... Enables remote access to corporate network information for example e mail and the company home page 2 Getting Start 2 1 Know the 11g Wireless Router WBR 3405TX Ports 5 ...

Page 6: ...cket transmit or receive activity WLAN No Link activity Indicates connection is established Blinking Data transmissions LAN No LAN connections 2 2 Connect to the 11g Wireless Router 2 2 1 Access the Setting Menu You could start to access the configuration menu anytime by opening a web browser window by typing the IP address of this wireless router The default IP is 192 168 1 1 The below window wil...

Page 7: ...Now the main menu screen is popup 7 ...

Page 8: ...low the step by step process to get your wireless router configuration ready to run in 6 easy steps by clicking on the Wizard button on the function menu The following screen will appear Please click Next to continue Step 1 Set your new Password You can change the password as you like and then click Next to continue 8 ...

Page 9: ...et LAN connection and DHCP server Set your IP address and mask The default IP is 192 168 1 1 If you like to enable DHCP please click Enabled DHCP enabled is able to automatically assign IP addresses Please assign the range of IP addresses in the fields of Range start and Range end Please click Next to continue 9 ...

Page 10: ...btain IP automatically PPPoE with a fixed IP address PPTP Obtain IP automatically DHCP client If you have enabled DHCP server choose Obtain IP automatically DHCP client to have the router assign IP addresses automatically Fixed IP Address If Fixed IP address is assigned the below screen will pop up Please set the WAN address and DNS server 10 ...

Page 11: ...PPPoE to obtain IP automatically 11 ...

Page 12: ...PPPoE with a fixed IP address 12 ...

Page 13: ...PPTP 13 ...

Page 14: ...el must be the same as wireless devices attempting communication to the router Step 6 Restart The Setup wizard is now completed The new settings will be effective after the Wireless router restarted Please click Restart to reboot the router If you do not want to make any changes please click exit to quit without any changes You also can go back to modify the setting by clicking Back 14 ...

Page 15: ...N and DHCP properties such as the host name IP address subnet mask and domain name LAN and DHCP profiles are listed in the DHCP table at the bottom of the screen Host Name Type the host name in the text box The host name is required by some ISPs The default host name is AP Router IPAddress This is the IP address of the router The default IP address is 192 168 1 1 Subnet Mask Type the subnet mask f...

Page 16: ...ype an IP address to serve as the start of the IP range that DHCP will use to assign IP addresses to all LAN devices connected to the router End IP Type an IP address to serve as the end of the IP range that DHCP will use to assign IP addresses to all LAN devices connected to the router Domain Name Type the local domain name of the network in the text box This item is optional 3 1 2 WAN This scree...

Page 17: ... selected type the IP address subnet mask and default gateway in the text boxes Your ISP will provide you with this information DNS 1 2 3 Type up to three DNS numbers in the text boxes Your ISP will provide you with this information MAC Address If required by your ISP type the MAC address of the router WAN interface in this field DNS 1 2 3 Type up to three DNS numbers in the text boxes Your ISP wi...

Page 18: ...cess to the router interface Administrator Type the password the Administrator will use to log in to the system The password must be typed again for confirmation 3 1 4 Time This screen enables you to set the time and date for the router s real time clock select your time zone and enable or disable daylight saving 18 ...

Page 19: ... the local time and date Time Zone Select your time zone from the drop down list Daylight Saving Enables you to enable or disable daylight saving time When enabled select the start and end date for daylight saving time 19 ...

Page 20: ...ddress Entering the Server Address For example if you would like to apply the address at dyndns org please entering members dyndns org Host Name Entering the address you applied before For example user dyndns org User Name Entering the account you used for applying DDNS address Password Entering the password of the user 20 ...

Page 21: ...cations Enable Disable Enables and disables wireless LAN via the router SSID Type an SSID in the text box The SSID of any wireless device must match the SSID typed here in order for the wireless device to access the LAN and WAN via the router Channel Select a transmission channel for wireless communications The channel of any wireless device must match the channel selected here in order for the wi...

Page 22: ...e level of encryption you want from the drop down list The router supports 64 and 128 bit encryption WEP Key Select WEP Key 64 or 128 bits from the drop down list Key 1 Key 4 Enables you to create an encryption scheme for Wireless LAN transmissions Manually enter a set of values for each key Select which key you want to use by clicking the radio button next to the key Click Clear to erase key valu...

Page 23: ...23 ...

Page 24: ...thentication Protocol EAP Please follow the steps below to configure 802 1X security 1 Select the Encryption Key Length Size ranging from 64 to 128 Bits that you would like to use Select the Lifetime of the Encryption Key from 5 Minutes to 1 Day As soon as the lifetime of the Encryption Key is over the Encryption Key will be renewed by the Radius server 2 Enter the IP address of and the Port used ...

Page 25: ...router reboots itself Note As soon as 802 1X security is enabled all the wireless client stations that are connected to the Router currently will be disconnected The wireless clients must be configured manually to authenticate themselves with the Radius server to be reconnected 3 2 4 WPA PSK Allows user to set WPA PSK for security reason Set the devices in the same Passphrase will block undesired ...

Page 26: ...ion Threshold Type the fragmentation threshold in the text box If packet transfer error rates are high choose values between 256 and 2432 until packet transfer rates are minimized NOTE set this fragmentation threshold value may diminish system performance DTIM Interval Type a DTIM Delivery Traffic Indication Message interval in the text box You can specify a value between 1 and 65535 The default v...

Page 27: ...ols Firmware check this to ensure that your firmware was successfully updated LAN This field displays the router s LAN interface MAC address IP address subnet mask and DHCP server status Click DHCP Table to view a list of client stations currently connected to the router LAN interface Wireless Displays the router s wireless connection information including the router s wireless interface MAC addre...

Page 28: ... by new entries The Log screen commands are as follows Click First Page to view the first page of the log Click Last Page to view the final page of the log Click Previous Page to view the page just before the current page Click Next Page to view the page just after the current page Click Clear Log to delete the contents of the log and begin a new log Click Refresh to renew log statistics Time Disp...

Page 29: ...pe the IP address of the Syslog Server if you want the router to listen and receive incoming Syslog messages Log Type Enables you to select what items will be included in the log System Activity Displays information related to router operation Debug Information Displays information related to errors and system malfunction Attacks Displays information about any malicious activity on the network Dro...

Page 30: ...Statistic This screen displays a table that shows the rate of packet transmission via the router LAN and WAN ports in bytes per second Click Reset to erase all statistics and begin logging statistics again 30 ...

Page 31: ...w information about wireless devices that are connected to the wireless router Connected Time Displays how long the wireless device has been connected to the LAN via the router MAC Address Displays the devices wireless LAN interface MAC address 31 ...

Page 32: ...ress your network uses to access the Internet Your ISP or network administrator provides you with this information Network Mask Type the network subnet mask for your network If you do not type a value here the network mask defaults to 255 255 255 255 Your ISP or network administrator provides you with this information Gateway Address Type the gateway address for your network Your ISP or network ad...

Page 33: ...the static IP address table at the bottom of the page and click Delete to remove the entry New Click New to clear the text boxes and add required information to create a new entry 3 4 2 Dynamic This screen enables you to set NAT parameters NAT Click the radio buttons to enable or disable NAT Transmit Click the radio buttons to set the desired transmit parameters disabled RIP 1 or RIP 2 Receive Cli...

Page 34: ... network subnet mask of the connected node Gateway Address Displays the gateway address of the connected node Interface Displays whether the node is connected via a WAN or LAN Metric Displays the metric of the connected node Type Displays whether the node has a static or dynamic IP address 3 5 Access This page enables you to define access restrictions set up protocol and IP filters create virtual ...

Page 35: ...isable Once the function of MAC filter is disable those listed in the MAC Table are allowed Internet access Enable All users are allowed Internet access except those user in the MAC Table are deny Internet access MAC Table Use this section to create a user profile which Internet access is denied or allowed The user profiles are listed in the table at the bottom of the page Note Click anywhere in t...

Page 36: ...ation for the user if you have changed any of the fields Delete Select a user from the table at the bottom of the list and click Delete to remove the user profile New Click New to erase all fields and enter new information URL Blocking You could enable URL blocking to deny the users from accessing the specified URL Add those specified URL in the text box 36 ...

Page 37: ...er Range Start Type the minimum address for the IP range IP addresses falling between this value and the Range End are not allowed to access the Internet Range End Type the minimum address for the IP range IP addresses falling between this value and the Range Start are not allowed to access the Internet Add Click to add the IP range to the table at the bottom of the screen Update Click to update i...

Page 38: ...Domain Blocking You could specify the domains which allow users to access or deny by clicking one of the two items Also add the specified domains in the text box 38 ...

Page 39: ...ations protocol list you create The protocol filter profiles are listed in the table at the bottom of the page Note When selecting items in the table at the bottom click anywhere in the item The line is selected and the fields automatically load the item s parameters which you can edit 39 ...

Page 40: ...here in the item The line is selected and the fields automatically load the item s parameters which you can edit Enable Click to enable or disable the virtual server Name Type a descriptive name for the virtual server Protocol Select the protocol TCP or UDP you want to use for the virtual server Private Port Type the port number of the computer on the LAN that is being used to act as a virtual ser...

Page 41: ...are listed in the table at the bottom of the page Note When selecting items in the table at the bottom click anywhere in the item The line is selected and the fields automatically load the item s parameters which you can edit Enable Click to enable or disable the application profile When enabled users will be able to connect to the application via the router WAN connection Click Disabled on a prof...

Page 42: ... Add Click to add the special application profile to the table at the bottom of the screen Update Click to update information for the special application if you have selected a list item and have made changes Delete Select a list item and click Delete to remove the item from the list New Click New to erase all fields and enter new information 3 5 4 DMZ This screen enables you to create a DMZ for t...

Page 43: ...unlimited Internet access Apply Click to save the settings 3 5 5 Firewall Rule This screen enables you to set up the firewall The router provides basic firewall functions by filtering all the packets that enter the router using a set of rules The rules are in an order sequence list the lower the rule number the higher the priority the rule has 43 ...

Page 44: ... the start IP address that the rule is applied to IP Range End Type the end IP address that the rule is applied to Destination Defines the destination of the incoming packet that the rule is applied to Interface Select which interface WAN or LAN the rule is applied to IP Range Start Type the start IP address that the rule is applied to IP Range End Type the end IP address that the rule is applied ...

Page 45: ...nformation Priority Up Select a rule from the list and click Priority Up to increase the priority of the rule Priority Down Select a rule from the list and click Priority Down to decrease the priority of the rule Update Priority After increasing or decreasing the priority of a rule click Update Priority to save the changes 45 ...

Page 46: ... the router System Location Displays the location of the router normally the DNS name System Contact Displays the contact information for the person responsible for the router Community SNMP system name for exchanging SNMP community messages The name can be used to limit SNMP messages passing through the network The default name is public Trap Receiver Type the name of the destination PC that will...

Page 47: ...niversal Plug and Play which is a networking architecture that provides compatibility among networking equipment software and peripherals The Router is a UPnP enabled router and will only work with other UPnP devices softwares If you do not want to use the UPnP functionality it can be disabled by selecting Disabled GAMING MODE If you are experiencing difficulties when playing online games or even ...

Page 48: ...7 Tools This page enables you to restart the system save and load different settings as profiles restore factory default settings run a setup wizard to configure router settings upgrade the firmware and ping remote IP addresses 3 7 1 Restart Click Restart to restart the system in the event the system is not performing correctly 48 ...

Page 49: ...terface Save Settings Click to save the current configuration as a profile that you can load when necessary Load Settings Click Browse and go to the location of a stored profile Click Load to load the profile s settings Restore Factory Default Settings Click to restore the default settings All configuration changes you have made will be lost Setup Wizard click to run a setup wizard that configures...

Page 50: ... Please follow the below instructions 1 Download the latest firmware from the manufacturer s Web site and save it to your disk 2 Click Browse and go to the location of the downloaded firmware file Select the file and click Upgrade to update the firmware to the latest release 50 ...

Page 51: ...ary Access Point An interview networking device that seamlessly connects wired and wireless networks Authentication Authentication refers to the verification of a transmitted message s integrity DMZ DMZ DeMilitarized Zone is a part of a network that is located between a secure LAN and an insecure WAN DMZs provide a way for some clients to have unrestricted access to the Internet 51 ...

Page 52: ...ewalls are methods used to keep networks secure from malicious intruders and unauthorized access Firewalls use filters to prevent unwanted packets from being transmitted Firewalls are typically used to provide secure access to the Internet while keeping an organization s public Web server separate from the internal LAN Firmware Firmware refers to memory chips that retain their content without elec...

Page 53: ...ess refers to the address of a computer attached to a TCP IP network Every client and server station must have a unique IP address Clients are assigned either a permanent address or have one dynamically assigned to them via DHCP IP addresses are written as four sets of numbers separated by periods for example 211 23 181 189 ISP An ISP is an organization providing Internet access service via modems...

Page 54: ...also the destination IP address Ping Ping Packet INternet Groper is a utility used to find out if a particular IP address is present online and is usually used by networks for debugging Port Ports are the communications pathways in and out of computers and network devices routers and switches Most PCs have serial and parallel ports which are external sockets for connecting devices such as printers...

Page 55: ...bnet A subnet mask is stored in the client machine server or router and is compared with an incoming IP address to determine whether to accept or reject the packet SysLog Server A SysLog server monitors incoming Syslog messages and decodes the messages for logging purposes TCP Transmission Control Protocol is the transport protocol in TCP IP that ensures messages over the network are transmitted a...

Page 56: ...smitting the data Virtual Servers Virtual servers are client servers such as Web servers that share resources with other virtual servers i e it is not a dedicated server WAN WAN Wide Area Network is a communications network that covers a wide geographic area such as a country contrasted with a LAN which covers a small area such as a company building ...

Reviews: