background image

 

 

patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for 
the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in 
a country, would infringe one or more identifiable patents in that country that you have reason to believe are 
valid. 

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by 
procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the 
covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then 
the patent license you grant is automatically extended to all recipients of the covered work and works based on 
it. 

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise 
of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this 
License. You may not convey a covered work if you are a party to an arrangement with a third party that is in 
the business of distributing software, under which you make payment to the third party based on the extent of 
your activity of conveying the work, and under which the third party grants, to any of the parties who would 
receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered 
work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific 
products or compilations that contain the covered work, unless you entered into that arrangement, or that 
patent license was granted, prior to 28 March 2007. 

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to 
infringement that may otherwise be available to you under applicable patent law. 

12. No Surrender of Others' Freedom. 

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the 
conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a 
covered work so as to satisfy simultaneously your obligations under this License and any other pertinent 
obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that 
obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only 
way you could satisfy both those terms and this License would be to refrain entirely from conveying the 
Program. 

13. Use with the GNU Affero General Public License. 

Notwithstanding any other provision of this License, you have permission to link or combine any covered work 
with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and 
to convey the resulting work. The terms of this License will continue to apply to the part which is the covered 
work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction 
through a network will apply to the combination as such. 

14. Revised Versions of this License. 

The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from 
time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to 
address new problems or concerns. 

Each version is given a distinguishing version number. If the Program specifies that a certain numbered version 
of the GNU General Public License “or any later version” applies to it, you have the option of following the terms 
and conditions either of that numbered version or of any later version published by the Free Software 
Foundation. If the Program does not specify a version number of the GNU General Public License, you may 
choose any version ever published by the Free Software Foundation. 

If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be 
used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that 
version for the Program. 

Later license versions may give you additional or different permissions. However, no additional obligations are 
imposed on any author or copyright holder as a result of your choosing to follow a later version. 

Summary of Contents for AC750

Page 1: ...WLR 4100 User Manual ...

Page 2: ...s 21 Firewall Settings 28 Advanced Settings 32 Toolbox Settings 37 Addendum A GNU GPL Leaflet 44 Addendum B GNU GPL 45 Addendum C Declaration of Conformity 53 Revision 1 0 Sitecom Europe BV 2012 Note All the information contained in this manual was correct at the time of publication However as our engineers are always updating and improving the product your device s software may have a slightly di...

Page 3: ...outer encodes all wireless transmissions with WEP WPA or WPA2 encryption With the built in DHCP Server powerful SPI firewall the router protects your computers against intruders and most known Internet attacks and also provides safe VPN pass through With the incredible speed and QoS function of 802 11n the router is ideal for media centric applications like streaming video gaming and VoIP telephon...

Page 4: ... Virtual Server Mapping DMZ IP Filter ICMP Blocking SPI Avoids the attacks of Hackers or Viruses from Internet Support 802 1x authenticator 802 11i WPA WPA2 AES VPN pass through Provide mutual authentication Client and dynamic encryption keys to enhance security Sitecom Cloud Security Protect your home against cybercrime while browsing Theoretical wireless signal rate based on IEEE standard of 802...

Page 5: ...none of the items listed below are missing Do not discard the packing materials in case of return the unit must be shipped back in its original package The WLR 4100 WiFi Router X4 N300 A 110V 240V to 12V 1A Switching Power Adapter A Quick Install Guide An UTP cable ...

Page 6: ...the router yourself you might damage the router or endanger yourself Disposing of the Router When you dispose of the router be sure to dispose it appropriately Some countries may regulate disposal of an electrical device please consult with your local authority Others When using this router please do not let it come into contact with water or other liquids If water is accidentally spilled on the r...

Page 7: ...these ports WAN Blue Connect your ADSL Cable modem to this port Backlabel and Network Details Folder The Network Details Folder describes the IP address login details network name security code and OPS button functionality Button Description OPS BUTTON Press 0 5 seconds for OPS mode Press 15 Seconds to reset the router to factory defaults ...

Page 8: ...OPS activity Power Red Shows the device is turned on 2 4GHz Blue Shows 2 4GHz WiFi activity WAN Blue Shows the WAN cable is connected LAN Blue Shows the cable is connected LAN Blue Shows the cable is connected LAN Blue Shows the cable is connected LAN Blue Shows the cable is connected ...

Page 9: ...quirements PC Notebook Operating System Microsoft Windows XP VISTA 7 or Mac OSX 1 Free Ethernet port WiFi card USB dongle 802 11 a b g n optional External xDSL ADSL or Cable modem with an Ethernet port RJ 45 PC with a Web Browser Internet Explorer Safari Firefox Opera Ethernet compatible CAT5e cables ...

Page 10: ...rference such as a metal wall or microwave oven This location must be close to a power connection and your ADSL Cable modem Connect the supplied power adapter to the power inlet port and connect it to a wall outlet Switch the router on by flipping the switch on the back of the device The router automatically enters the self test phase During self test phase the Power LED will be lit continuously t...

Page 11: ...lect the Sitecom network The correct network name can be found on the sticker on bottom of the router or in the Network Details Folder Fill in the password for the wireless network The correct password can be found on the sticker on the bottom of the router or in the Network Details Folder Wait for the icon to display that it s connected to the network ...

Page 12: ...stem Tray next to the clock Select the Sitecom network The correct network name can be found on the sticker on bottom of the router or in the Network Details Folder Push the OPS Button on the router Keep the button pushed for 0 5 seconds Wait for the icon to display that it s connected to the network ...

Page 13: ...twork The correct network name can be found on the sticker on bottom of the router or in the Network Details Folder Fill in the password for the wireless network The correct password can be found on the sticker on the bottom of the router or in the Network Details Folder Wait for the icon to display that it s connected to the network ...

Page 14: ...rnet Explorer Type http 192 168 0 1 in the address bar and press Enter Type user name and password The default username is admin the password can be found on the back label on the bottom of your router Click OK You will see the home page of the WiFi Router X4 N300 ...

Page 15: ...tion From the menu select Internet Settings Depending on the chosen setting you may need to enter your user name and password MAC address or hostname in the following window After you have entered the correct information click Apply ...

Page 16: ... status of your router the UP time hardware information and serial number as well as firmware version information is displayed here DHCP Server The DHCP Server tab gives you the opportunity to change the IP settings of the router Click Apply at the bottom of this screen to save any changes ...

Page 17: ...time expires Lease Time One Week In the Lease Time setting you can specify the time period that the DHCP lends an IP address to your LAN clients The DHCP will change your LAN client s IP address when this time threshold period is reached IP Address Pool You can select a particular IP address range for your DHCP server to issue IP addresses to your LAN Clients The default IP range is 192 168 0 100 ...

Page 18: ...nt Status This page shows all DHCP clients LAN PCs currently connected to your network The table shows the assigned IP address MAC address and expiration time for each DHCP leased client Use the Refresh button to update the available information You can check Enable Static DHCP IP It is possible to add more static DHCP IPs They are listed in the table Current Static DHCP Table IP can be deleted at...

Page 19: ...ed during or after system start up At the bottom of the page the system log can be saved Save to a local file for further processing or the system log can be cleared Clear or it can be refreshed Refresh to get the most updated information When the system is powered down the system log will disappear if not saved to a local file ...

Page 20: ...Statistics Shows the counters of packets sent and received on WAN LAN WLAN ...

Page 21: ...tion Enable or Disable Wireless function here Click Apply and wait for module to be ready loaded Basic Settings Band Allows you to set the AP fixed at 802 11b or 802 11g mode You can also select B G mode to allow 802 11b and 802 11g clients at the same time ESSID This is the name of the wireless signal which is broadcasted All the devices in the same wireless LAN should have the same ESSID ...

Page 22: ...lients that you want to connect to the device are also setup with the same encryption key Fragment Threshold Fragment Threshold specifies the maximum size of a packet during the fragmentation of data to be transmitted If you set this value too low it will result in bad performance RTS Threshold When the packet size is smaller then the RTS threshold the wireless router will not use the RTS CTS mech...

Page 23: ...802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the AP will be a little lower due to a lot of frame network that is transmitted TX Power The transmit power can be set to a bare minimum or maximum power for better performance or power saving WMM WiFi Multi Media If enabled this supports QoS for experiencing better audio video and voice in applications Sec...

Page 24: ...nerate the key by yourself and enter it You can enter four WEP keys and select one of them as a default key Then the router can receive any packets encrypted by one of the four keys Key Length You can select the WEP key length for encryption 64 bit or 128 bit The larger the key will be the higher level of security is used but the throughput will be lower Key Type You may select ASCII Characters al...

Page 25: ...ity standard You can use a pre shared key to authenticate wireless stations and encrypt data during communication It uses TKIP or CCMP AES to change the encryption key frequently so the encryption key is not easy to be cracked by hackers This is the best security available WPA Radius Wi Fi Protected Access WPA is an advanced security standard You can use an external RADIUS server to authenticate w...

Page 26: ...and then click Delete Selected If you want to remove all the MAC addresses from the list just click the Delete All button Click Reset will clear your current selections Click Apply at the bottom of the screen to save the above configurations You can now configure other sections by choosing Continue or choose Apply to apply the settings and reboot the device WPS Wi Fi Protected Setup WPS is the sim...

Page 27: ...nfigured message here Otherwise you ll see UnConfigured Self Pin Code This is the WPS PIN code of the wireless router You may need this information when connecting to other WPS enabled wireless devices SSID This is the network broadcast name SSID of the router Authentication Mode It shows the active authentication mode for the wireless connection Passphrase Key It shows the passphrase key that is ...

Page 28: ...nt PC that cannot run an Internet application e g Games properly from behind the NAT firewall then you can open up the firewall restrictions to unrestricted two way Internet access by defining a DMZ Host The DMZ function allows you to re direct all packets going to your WAN port IP address to a particular IP address in your LAN The difference between the virtual server and the DMZ function is that...

Page 29: ...ular host in your LAN that will receive all the packets originally going to the WAN port Public IP address above Click Apply at the bottom of the screen to save the above configurations Denial of Service DoS The Broadband router s firewall can block common hacker attacks including Denial of Service Ping of Death Port Scan and Sync Flood If Internet attacks occur the router can log the events ...

Page 30: ...t accept for the clients in the list below Allow If you select Allow then all clients will be denied to access Internet accept for the PCs in the list below Filter client PCs by IP Fill in IP Filtering Table to filter PC clients by IP Add PC You can click Add PC to add an access control rule for users by IP addresses Remove PC If you want to remove some PCs from the IP Filtering Table select the P...

Page 31: ...ing a full URL address or just keywords of the Web site Enable URL Blocking Enable disable URL Blocking Add URL keyword Fill in URL Keyword and then click Add You can enter the full URL address or the keyword of the web site you want to block Remove URL keyword If you want to remove some URL keywords from the Current URL Blocking Table select the URL keyword you want to remove in the table and the...

Page 32: ...on from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Public IP Addresses for key services such as Websites and FTP Select Disable to disable the NAT function Port Forwarding Port Forwarding allows you to re direct a particular range of service port numbers from the Internet WAN Port to a particular LAN IP address It helps you to host servers behind the router ...

Page 33: ... Port Forwarding settings from the table just click Delete All button Click Reset will clear your current selections Click Apply at the bottom of the screen to save the above configuration Virtual Server Use the Virtual Server function when you want different servers clients in your LAN to handle different service Internet application type e g Email FTP Web server etc from the Internet Computers u...

Page 34: ...ed If you want to remove all Virtual Server settings from the table just click the Delete All button Click Reset will clear your current selections Click Apply at the bottom of the screen to save the above configuration Special Applications Some applications require multiple connections such as Internet games video Conferencing Internet telephony and others In this section you can configure the ro...

Page 35: ...Delete Selected If you want remove all Special Application settings from the table just click the Delete All button Click Reset will clear your current selections Click Apply at the bottom of the screen to save the above configuration UPnP With UPnP all PCs in you Intranet will discover this router automatically so you don t have to configure your PC and it can easily access the Internet through t...

Page 36: ...Add a QoS rule into the table Click Add then enter a form of the QoS rule Click Apply after filling out the form the rule will be added into the table Remove QoS rules from the table If you want to remove QoS rules from the table select the QoS rules you want to remove in the table and then click Delete Selected If you want remove all QoS rules from the table just click the Delete All button Click...

Page 37: ...d Security After you have set up your Sitecom device for internet access open the web browser and enter http www sitecomcloudsecurity com in the address bar If the device has been properly configured the following web page should be shown Here you can see which security features are activated The Sitecom Cloud Security service offers the following protection options Anti Malware Anti Phishing Prot...

Page 38: ...d Security If you wish to change your security options or to extend your subscription at any time open http www sitecomcloudsecurity com from your web browser You will be asked for a username and password These can be found on the backlabel on the bottom of your Sitecom router or modem If the login succeeded you can click on Settings to change your security options ...

Page 39: ...sabling Sitecom Cloud Security If you wish to disable to Sitecom cloud security at any time open the webpage of your Sitecom product and log in with the supplied credentials these can be found on the back label on the bottom of your Sitecom device ...

Page 40: ...eric characters and are case sensitive Current Password Fill in the current password to allow changing to a new password New Password Enter your new password Confirmed Password Enter your new password again for verification purposes Click Apply at the bottom of the screen to save the above configuration Time Zone The Time Zone allows your router to base its time on the settings configured here whi...

Page 41: ... Savings Time Click Apply at the bottom of the screen to save the above configuration Remote Management The remote management function allows you to designate a host in the Internet the ability to configure the Broadband router from a remote site Enter the designated host IP Address in the Host IP Address field Host Address This is the IP address of the host in the Internet that will have manageme...

Page 42: ...and enter that file name and path in the appropriate field on this page You can also use the Browse button to find the firmware file on your PC Once you ve selected the new firmware file click Apply at the bottom of the screen to start the upgrade process Backup Settings The Backup screen allows you to save Backup the current configuration settings When you save the configuration setting Backup yo...

Page 43: ...router s system DDNS DDNS allows you to map the static domain name to a dynamic IP address You must get an account password and your static domain name from the DDNS service providers This router supports DynDNS TZO and other common DDNS service providers Enable Disable Enable or disable the DDNS function of this router Provider Select a DDNS service provider Domain name Fill in your static domain...

Page 44: ...ttp www netfilter org projects iptables index html 14 iptables v1 4 4 http www netfilter org projects iptables index html 15 linuxigd v1 x http linux igd sourceforge net index php 16 wireless_tools v28 http www hpl hp com personal Jean_Tourrilhes Linux Tools html 17 igmpproxy v0 1 beta2 http sourceforge net projects igmpproxy 18 pptp client v1 7 1 http pptpclient sourceforge net 19 accel pptp pppd...

Page 45: ...ents the same freedoms that you received You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights Developers that use the GNU GPL protect your rights with two steps 1 assert copyright on the software and 2 offer you this License giving you legal permission to copy distribute and or modify it For the developers and authors prot...

Page 46: ...urce code for a work means the preferred form of the work for making modifications to it Object code means any non source form of a work A Standard Interface means an interface that either is an official standard defined by a recognized standards body or in the case of interfaces specified for a particular programming language one that is widely used among developers working in that language The S...

Page 47: ...on of technological measures 4 Conveying Verbatim Copies You may convey verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice keep intact all notices stating that this License and any non permissive terms added in accord with section 7 apply to the code keep intact all noti...

Page 48: ...onvey the object code using peer to peer transmission provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d A separable portion of the object code whose source code is excluded from the Corresponding Source as a System Library need not be included in conveying the object code work A User P...

Page 49: ...c Prohibiting misrepresentation of the origin of that material or requiring that modified versions of such material be marked in reasonable ways as different from the original version or d Limiting the use for publicity purposes of names of licensors or authors of the material or e Declining to grant rights under trademark law for use of some trade names trademarks or service marks or f Requiring ...

Page 50: ...est if the predecessor has it or can get it with reasonable efforts You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License For example you may not impose a license fee royalty or other charge for exercise of rights granted under this License and you may not initiate litigation including a cross claim or counterclaim in a lawsuit alleging th...

Page 51: ... the conditions of this License If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not convey it at all For example if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program the only way you could satisfy both thos...

Page 52: ...IES AND OR CONVEYS THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF SUCH HOLD...

Page 53: ...Addendum C Declaration of Conformity ...

Page 54: ......

Reviews: