Sitecom WL-309 User Manual Download Page 34

 
 

 

34

 

A

GE 

34

 

PPPoE  connection.  If  the  router's  MTU  is  set  too  high,  packets  will  be 
fragmented  downstream.  If  the  router's  MTU  is  set  too  low,  the  router  will 
fragment  packets  unnecessarily  and  in  extreme  cases  may  be  unable  to 
establish some connections. In either case, network performance can suffer.  

 

MAC Address

: If you need to change the MAC address  of the router's WAN-

side Ethernet interface, either type in an alternate MAC address (for example, 
the MAC address of the router initially connected to the ISP) or click on 

Clone 

Your PCs MAC Address

 
Click on the 

Apply

 button to store these settings.  

 

Summary of Contents for WL-309

Page 1: ...Wireless Gaming Router II WL 309 Full Manual ...

Page 2: ...G THE PUSH BUTTON 16 4 ADVANCED WEB CONFIGURATION 17 LOGGING IN 17 4 1 HOME 18 Device 18 Wireless 18 Logs 20 Stats 21 DHCP 22 Firewall 23 4 2 BASIC 24 Network 24 Wireless 26 WAN 31 Advanced Wireless 39 Advanced Network 40 4 3 FIREWALL 42 Virtual Server 42 Special Application 43 Port Forwarding 44 Access Control 45 Website Filter 48 Schedules 49 4 4 ADVANCED SETTINGS 50 Dynamic DNS 50 StreamEngine ...

Page 3: ...WL 309 Wireless Gaming router II Full Manual Time Configuration 64 System Settings 65 Firmware 69 Syslog 69 Administrator Settings 70 APPENDIX A FCC INTERFERENCE STATEMENT 72 ...

Page 4: ...ess channel The robust signal travels farther maintaining wireless connections up to 3 times farther than standard 802 11g eliminating dead spots and extending network range To protect the data and privacy the Router can encode all wireless transmissions with 64 128 bit encryption It can serve as your network s DHCP Server has a powerful SPI firewall to protect your PCs against intruders and most ...

Page 5: ...internal IP addresses for keeping hacker out Hide SSID Avoids unallowable users sharing bandwidth increases efficiency of the network Firewall supports Virtual Server Mapping DMZ IP Filter ICMP Blocking SPI Avoids the attacks of Hackers or Viruses from Internet Support 802 1x authenticator 802 11i WPA WPA2 AES VPN pass thru mechanisms Provide mutual authentication Client and dynamic encryption key...

Page 6: ... adhere to the following safety guidelines Carefully follow the instructions in this manual also follow all instruction labels on the device Except for the power adapter supplied the device should not be connected to any other adapters Do not spill liquid of any kind on the device Do not place the device on an unstable stand or table The device may drop and become damaged Do not expose the device ...

Page 7: ...e the power cable and connect the adapter to the power socket on the wall and the DC inlet into the DC connector 4 USB port The USB port can be used to connect a USB memory stick or hard disk 5 WPS on the top of the router WPS Wireless Push Button is used for Wi Fi Protected Setup By pressing this button the security settings of the device will automatically synchronize with other wireless devices...

Page 8: ...e is enabled 4 Power LED This LED will light up once the power cable is connected to the DC connector System Requirements The following are the minimum system requirements in order configure the device PC Notebook Operating System Microsoft Windows XP 2000 Vista Seven 1 Free Ethernet port Wi Fi card USB dongle 802 11 b g n optional External xDSL ADSL or Cable modem with an Ethernet port RJ 45 PC w...

Page 9: ...tial source of interference such as a metal wall or microwave oven This location must be close to a power connection and your ADSL Cable modem Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC Notebook Plug one end of another Ethernet cable to the WAN port of the device and the other end into you cable DSL modem Internet Insert the DC outlet of the pow...

Page 10: ...ouble click Network Connections and then double click on the connection of your Network Interface Card NIC You will then see the following screen 2 Select Internet Protocol TCP IP and then click on the Properties button This will allow you to configure the TCP IP settings of your PC Notebook Select both Obtain an IP address automatically and Obtain DNS server address automatically 3 Click on the O...

Page 11: ... Chapter 6 in order to configure the more advanced features of the device Logging In To configure the device open a web browser Type http 192 168 0 1 in the address bar and press Enter After connecting to the IP address the web browser will display the login page Fill in the username and password The default credentials are shown below Click on the Wizard button to begin the process Username admin...

Page 12: ...ur internet provider Click Next Depending on the chosen provider you may need to enter your user name and password MAC address or hostname in the following window After you have entered the correct information click Next Click APPLY to complete the configuration ...

Page 13: ...s PIN Devices can still be added to the wireless network using Wi Fi Protected Setup Please refer to Chapter 5 in order to configure the more advanced features of the device Logging In Open a web browser and type in the IP address default http 192 168 0 1 the web browser will display the login page Fill in the username and password The default credentials are shown below Username admin Password ad...

Page 14: ...able options o PIN Select this radio button if your wireless device supports PIN o Push Button Select this radio button if your wireless device supports push button o Manual Select the radio button if you would like to setup your wireless device manually Refer to chapter 5 in order to manually configure the device The wizard will either display the wireless network settings to guide you through ma...

Page 15: ...e entered the PIN or pressed a special Wi Fi Protected Setup button on the device The router acts as a registrar for the network although other devices may act as a registrar as well Using the PIN A PIN is a unique number that can be used to add the router to an existing network or to create a new network The default PIN may be printed on the bottom of the router For extra security a new PIN can b...

Page 16: ...supports Wi Fi Protected Setup and has a configuration button you can add it to the network by pressing the configuration button on the device and then the one the router within 60 seconds The status LED on the router will flash three times if the device has been successfully added to the network Select the Push Button radio button and then click on the Next button Press the WPS button on the devi...

Page 17: ... is divided into six main sections 1 Home This shows the basic status of the router 2 Wizard The setup wizard which will guide you through the initial setup 3 Basic This menu includes the network settings wireless settings and WAN settings 4 Firewall This menu includes virtual server special applications port forwarding access control etc 5 Advanced Settings This menu includes DDNS the Stream engi...

Page 18: ... network connection details are displayed on this page The firmware version is also displayed here Wireless Click on the Wireless link in the navigation menu The wireless section allows you to view the wireless clients that are connected to the device ...

Page 19: ...en WISH has been enabled A WISH session is a conversation between a program or application on a wirelessly connected LAN side computer and another computer however connected Originator The IP address and where appropriate port number of the computer that originated a network connection Target The IP address and where appropriate port number of the computer to which a network connection has been ma...

Page 20: ...lingering packets can pass or the connection can be re established o 7800 seconds Established or closing TCP connections Logs Click on the Logs link in the navigation menu The router automatically logs records events of possible interest in its internal memory If there is not enough internal memory for all events logs of older events are deleted but logs of the latest events are retained The Logs ...

Page 21: ... Click on the Statistics link in the navigation menu This page displays the transmitted and received packet statistics of the wired LAN WAN and wireless interface Click on the Refresh button to refresh the statistics ...

Page 22: ...server system has requested that the connection be stopped o TW Time Wait Waiting for a short time while a connection that was in FIN Wait is fully closed o LA Last ACK Waiting for a short time while a connection that was in Close Wait is fully closed o CL Closed The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending Priority T...

Page 23: ...23 AGE 23 Firewall Click on the Firewall link in the navigation menu This page displays the details about firewall holes in your router ...

Page 24: ... a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly Select the Bridge Mode radio button WAN Port Mode Select the Bridge Mode radio button Router IP Address Specify the IP address of this device Subnet Mask Specify the subnet mask for the IP address Default Gateway Specify the IP address of the upstream router Primary Secondary DNS Spec...

Page 25: ...and you have a LAN side laptop with a name of mark that laptop will be known as mark mynetwork net Note however the entered domain name can be overridden by the one obtained from the router s upstream DHCP server Enable DNS Relay Place a check in this box to enable the DNS relay feature When DNS Relay is enabled the router plays the role of a DNS server DNS requests sent to the router are forwarde...

Page 26: ...of the wireless network and cannot exceed 32 characters 802 11 Mode Select the IEEE 802 11 mode from the drop down list For example if you are sure that the wireless network will be using only IEEE 802 11g clients then it is recommended to select 802 11g only instead of 2 4 GHz B G which will reduce the performance of the wireless network You may also select Mixed 802 11n 802 11g and 802 11b If al...

Page 27: ...To protect your privacy this router supports several types of wireless security WEP WPA WPA2 and WPA Mixed WEP is the original wireless encryption standard WPA provides a higher level of security The following section describes the security configuration in detail WEP Wired Equivalent Privacy Select the WEP radio button if your wireless network uses WEP encryption WEP is an acronym for Wired Equiv...

Page 28: ...entication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Click on the Apply button to store these settings WPA Personal Wi Fi Protected Access Select the WPA Personal radio button if you...

Page 29: ...pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Click on the A...

Page 30: ... o TKIP and AES The bridge negotiates the cipher type with the access point and uses AES when available Group Key Update Interval Specify the number of seconds before the group key used for broadcast and multicast data is changed Authentication Timeout Specify the number of minutes after which the client will be required to re authenticate RADIUS Server IP Address Specify the IP address of the RAD...

Page 31: ...ss PPPoE PPTP Select the type of Internet Connection from the drop down list Static IP Address Configuration The WAN interface can be configured as Static IP address In this type of connection your ISP provides you with a dedicated IP address which does not change as DHCP Select Static IP from the My Internet Connection drop down list ...

Page 32: ...maller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connec...

Page 33: ...ver the DHCP server may be one that works better with unicast responses In this case turn the Unicasting option on and observe whether the router can obtain an IP address In this mode the router accepts unicast responses from the DHCP server instead of broadcast responses Primary Secondary DNS Address Specify the primary and secondary IP address which are assigned by your ISP MTU The Maximum Trans...

Page 34: ...eme cases may be unable to establish some connections In either case network performance can suffer MAC Address If you need to change the MAC address of the router s WAN side Ethernet interface either type in an alternate MAC address for example the MAC address of the router initially connected to the ISP or click on Clone Your PCs MAC Address Click on the Apply button to store these settings ...

Page 35: ...t field is required User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field Service Name Specify the name of the ISP Reconnect Mode Select a reconnection time Always on A connection to the Internet is always maintained On demand A connection to the Internet is made as needed Manual You...

Page 36: ...0 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections In either case network performance can suffer MAC Address If you need to change the MAC address of the rou...

Page 37: ...dynamic or static IP address If you select the Dynamic IP radio button then the IIP address in the next field is not required However if you select the Static IP radio button then the IP address in the next field is required PPTP Address Specify the IP address PPTP Subnet Mask Specify the subnet mask for the IP address PPTP Gateway IP Address Specify the IP address of the PPTP gateway PPTP Server ...

Page 38: ... bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set to...

Page 39: ...eriod Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 1 and 65535 T...

Page 40: ...ures cannot be used at the same time A WDS link is bidirectional so this AP must know the MAC Address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel number WDS AP MAC Address Specify one half of the WDS link The other AP must also have the MAC address of this AP to create the WDS link back to this AP Cli...

Page 41: ...plications on the LAN participate in a multicast group If you have a multimedia LAN application that is not receiving content as expected try enabling this option Enable PPPoE Pass Through Place a check in this box to enable PPPoE pass through This option controls whether LAN computers can act as PPPoE clients and negotiate the PPP sessions through the router over the WAN ethernet link Enabling th...

Page 42: ...plication Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address Specify the IP address for the virtual server entry Protocol Specify a protocol or select one from the drop down list Public Port Specify the public port number Private Port Specify the private port number Schedule Select a schedule Always or N...

Page 43: ... Several well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server Triggering Ports Specify the outgoing port range that is used by the application Firewall Ports Specify the port range that you would like to open for Internet traffic Schedule Select a ...

Page 44: ...mple Web Server Several well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address Specify the IP address for the virtual server entry TCP UDP Ports Specify the TCP or UDP port numbers Schedule Select a schedule Always or Never from the drop d...

Page 45: ...nternet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet Place a check in the Enable Access Control check box and then click on the Add Policy button This will bring up the Add New Policy wizard The wireless wizard will inform you that there are six major steps in the process o Choose a unique n...

Page 46: ...s radio button IP Address If you selected IP address above then specify the IP address here MAC Address If you need to change the MAC address of the router s WAN side Ethernet interface either type in an alternate MAC address for example the MAC address of the router initially connected to the ISP or click on Clone Your PCs MAC Address Click on the OK button to insert the entry into the table Clic...

Page 47: ...ss Only Select this radio but in order to log web access Block All Access Select this radio but in order to block all web access Block Some Access Select this radio but in order to block some web access Click on the Apply button to store the changes ...

Page 48: ... to restrict certain websites form being accessed through your network These filters can be used for securing and restricting your network Website URL Domain Specify the web address that you would like to filter Do not use http Click on the Save button to store the changes ...

Page 49: ...nter a Start Time of 3pm and End Time of 8pm Name Specify a name for the schedule Day s Select the days at which you would like the schedule to be effective All Day 24 hrs Place a check in this box if you would like the schedule to be active for 24 hours Start Time If you do not use the 24 hours option you may specify a start time End Time If you do not use the 24 hours option you may specify an e...

Page 50: ...r IP address is Enable Dynamic DNS Place a check in this box to enable the DDNS feature Service Address Select a DDNS service provider from the drop down list DynDNS is a free service while TZO offers a 30 day free trial Host Name Specify the website URL User Name Specify the user name for the DDNS service Password Specify the password for the DDNS service and verify it once again in the next fiel...

Page 51: ...ful uplink bandwidth each time the WAN interface is re established after a reboot for example Measured Uplink Speed Displays the uplink speed This is the uplink speed measured when the WAN interface was last re established The value may be lower than that reported by your ISP as it does not include all of the network protocol overheads associated with your ISP s network Typically this figure will ...

Page 52: ...easured uplink speed to be reported slightly lower than before on such connections but gives much better results Click on the Apply button to store these settings Routing This section adds a new entry into the routing table Enable Place a check in this box to enable the routing table entry Name Specify a name for the rule Destination IP Specify the destination IP address Netmask Specify the subnet...

Page 53: ...control network access o Turn MAC Filtering ON and ALLOW computers listed to access the network When ALLOW is selected only computers with MAC addresses listed in the MAC Filtering Rules list are granted network access o Turn MAC Filtering ON and DENY computers listed to access the network When DENY is selected any computer with a MAC address listed in the MAC Filtering Rules list is refused acces...

Page 54: ...ket sequence numbers are within the valid range for the session discarding those packets that do not have valid sequence numbers Whether SPI is enabled or not the router always tracks TCP connection states and ensures that each TCP packet s flags are valid for the current state TCP UDP NAT Endpoint Filtering options control how the router s NAT manages incoming connection requests to ports that ar...

Page 55: ...s problems when communicating with certain other types of NAT router symmetric NATs in particular but leaves inbound filters and scheduled access working as expected Enable Port Preservation Place a check in this box to enable Port Preservation NAT Port preservation on by default tries to ensure that when a LAN host makes an Internet connection the same LAN port is also used as the Internet visibl...

Page 56: ...yload to make them work with network address translation NAT Each ALG provides special handling for a specific protocol or application A number of ALGs for common applications are enabled by default o PPTP Allows multiple machines on the LAN to connect to their corporate networks using PPTP protocol When the PPTP ALG is enabled LAN computers can establish PPTP VPN connections either with the same ...

Page 57: ...lows H 323 specifically Microsoft Netmeeting clients to communicate across NAT server o SIP Allows devices and applications using VoIP Voice over IP to communicate across NAT Some VoIP applications and devices have the ability to discover NAT devices and work around them This ALG may interfere with the operation of such devices If you are having trouble making VoIP calls try turning this ALG off o...

Page 58: ...ecognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic Such streams are used by systems known as Windows Media Extenders such as the Xbox 360 Automatic Place a check in this box for the device to automatically configure the classifiers When enabled this option causes the router to automatically attempt to prioritize traffic strea...

Page 59: ... rule Priority Select a priority from the drop down list The four priority message flows are o BK Background least urgent o BE Best Effort o VI Video o VO Voice most urgent Protocol Select a protocol from the drop down list Host 1 IP Range Specify the IP range for the rule Host 1 Port Range Specify the port range for the rule Host 2 IP Range Specify the IP range for the rule Host 2 Port Range Spec...

Page 60: ...ou trust to access your LAN through the ports that you have opened Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can be used with Virtual Server Gaming or Remote Administration features Name Specify a name for the inbound filter Action Select Allow or Deny from the drop down list This will apply the inbound filter rule on t...

Page 61: ...m type total space on the device and available space is shown in the table Click the Safely remove button to safely remove the USB disk Note Only FAT12 FAT16 and FAT32 drives are supported For information regarding partitioning and formatting of a drive see the manual of your operating system ...

Page 62: ...GE 62 Share On this page the sharing mode can be changed Choose to share all folders with all users or to restrict the sharing of folders When Sharing mode is set to restrict shares can be added and changed ...

Page 63: ...ce Password Enter a password for the selected user Share Name Select a shared folder The Shared folders can be configured on the Share tab Access Select Read Only to allow the user to read files in the selected share Select Read Write to also allow users to write to the selected share ...

Page 64: ...time Current Router Time Displays the current time on the device Time Zone Select your time zone from the drop down list Enable Daylight Saving Place a check in this box to enable daylight savings time Daylight Saving Offset Select the offset from the drop down list Daylight Saving Date Select the daylight savings date from the drop down list Select the starting and ending times for the change to ...

Page 65: ... Computer s Time Settings button Click on the Apply button once you have modified the settings System Settings Click on the System link in the navigation menu This page allows you to reboot the device using the current settings or restore all the settings to the factory defaults Save To Local Hard Drive This option allows you to save the current configuration of the device into a file Click on the...

Page 66: ...owse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no unplug the device during this process as this may cause permanent damage ...

Page 67: ...Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no unplug the device during this process as this may cause permanent damage Reboot The Device Click on the Reboot the Device button to reboot the device using its current settings Once the dialog box appears click on the OK button to confirm the action Once the dialog box appea...

Page 68: ...68 AGE 68 Please wait while the system is rebooting Note Do no unplug the device during this process as this may cause permanent damage ...

Page 69: ...riate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface Click on the Browse button to select the firmware and then click on the Upload button Syslog Logs display a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the...

Page 70: ...he settings Administrator Settings Admin Password You can change the password required to log into the broadband router s system web based management By default the password is admin Passwords can contain 0 to 12 alphanumeric characters and are case sensitive Username Fill in the current username default admin Password Enter your new password Verify Password Enter your new password again for verif...

Page 71: ...tivity Time Out Time after which you will be automatically logged out of the web interface HTTPS Server Enable HTTPS connection for the web interface Enable Remote Management Select Enabled to enable the remote management function Remote Admin Port The port number of the remote management web interface Click Apply at the top of the screen to save the above configurations ...

Page 72: ...ient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s autho...

Reviews: