background image

 

 

 

 

Internet Connection 
Setup 

Step 1

 

Set  the  local  connection  of  your  computer  to 

Obtain  an  IP  address  automatically

  and 

Obtain  DNS 

server  address  automatically

.  See  Configure  IP  Address  of  Your  Computer  in  Appendix  1  for  detailed 

instructions. 

 

Step 2

 

Start a browser, enter 

tendawifi.com

 or 

192.168.0.1

, and press 

Enter

. Click 

Start

Summary of Contents for W15E

Page 1: ...Q1 AC1200 Wireless Hotspot Router W15E User Guide...

Page 2: ...any form or by any means without the prior written permission of Shenzhen Tenda Technology Co Ltd Disclaimer Pictures images and product specifications herein are for references only To improve intern...

Page 3: ...ols that may be found in this document are defined as follows Symbol Meaning This format is used to highlight information of importance or special interest Ignoring this type of note may result in ine...

Page 4: ...ator VLAN Virtual Local Area Network VPN Virtual Private Network WISP Wireless Internet Service Provider WPS WiFi Protected Setup Additional Information For more information search this product model...

Page 5: ...ronmental Requirements 4 2 2 Installing the Router 5 2 3 Connecting the Router 5 3 Internet Connection Setup 7 4 Managing Devices 11 4 1 Log in to the Router Web UI 11 4 2 Log out of the Router Web UI...

Page 6: ...1 2 Modifying Basic Parameters 35 6 2 Advanced Settings 36 6 2 1 Overview 36 6 2 2 Modifying Advanced Parameters 38 6 3 WMM Settings 38 6 3 1 Overview 38 6 3 2 Changing WMM Advanced Parameters 41 6 4...

Page 7: ...7 4 1 Overview 67 7 4 2 Adding the Port Filter Rule 68 7 4 3 Example of Port Filter 69 7 5 Web Filter 72 7 5 1 Overview 72 7 5 2 Add a Web Filter Rule 73 7 5 3 Adding a Web Category 75 7 5 4 Example o...

Page 8: ...guration procedure 104 9 5 4 Verification 107 10 Security 108 10 1 IP MAC Binding 108 10 1 1 Overview 108 10 1 2 Adding an IP MAC Binding Rule 109 10 1 3 Example of IP MAC Binding 110 10 2 Firewall 11...

Page 9: ...ure 129 12 3 4 Verification 132 13 WiFi via WeChat 135 13 1 WiFi via WeChat 135 13 1 1 Overview 135 13 1 2 Enabling WiFi via WeChat 139 13 2 Example of WiFi via WeChat 139 13 2 1 Networking requiremen...

Page 10: ...pgrade 158 15 4 1 Overview 158 15 4 2 Steps for Local Upgrade 159 15 4 3 Steps for Online Upgrade 159 15 5 Restore Factory Settings 160 15 5 1 Overview 160 15 5 2 Restoring Factory Settings via WEB UI...

Page 11: ...16 System Status 168 16 1 System Info 168 16 2 Live Users 169 16 3 Traffic Statistics 171 16 4 Defense Logs 172 16 5 System Logs 173...

Page 12: ...omnidirectional antennas and the built in independent low noise power amplifier it can provide stable coverage for an area of 300 square meters Support multi WAN policy to effectively prevent network...

Page 13: ...By default they are LAN port LEDs Solid on No data is transmitted Blinking Data is transmitted Off No device connects to these ports or connection is faulty 5 LAN port 5 LED Solid on No data is transm...

Page 14: ...to the wireless network and log in to the web UI of the router for setting After the router connects to the internet if the WiFi name has not been changed the wireless client can scan and connect to i...

Page 15: ...ironment Temperature Humidity Operating environment 0 40 10 RH 90 RH non condensing Storage environment 40 70 5 RH 90 RH non condensing Anti static Precautions To prevent static interference keep the...

Page 16: ...e router right side up on the workbench and adjust the position of the antennas See the following figure 2 3 Connecting the Router Step 1 Connect the Ethernet cable to the WAN port Step 2 Connect the...

Page 17: ...6 adapter included with the package...

Page 18: ...your computer to Obtain an IP address automatically and Obtain DNS server address automatically See Configure IP Address of Your Computer in Appendix 1 for detailed instructions Step 2 Start a browse...

Page 19: ...Step 3 The system automatically detects your internet connection type Enter related values according to the on screen instructions and click Next Step 4 Set your SSID and WiFi password and click Next...

Page 20: ...9 End By default the Set the wireless password as login password is enabled You can also disable this option and customize your login password...

Page 21: ...etwork has no password You need to reconnect to the WiFi signal once the SSID and or WiFi password is changed By default the SSID of the 2 4 GHz network is Tenda_XXXXXX see the label at the bottom of...

Page 22: ...omputer to Obtain an IP address automatically and Obtain DNS server address automatically See Configure IP Address of Your Computer in Appendix 1 for detailed instructions Step 2 Start a browser enter...

Page 23: ...outer and perform no operation within 5 minutes the router logs you out Clicking Logout in the upper right corner of the web UI can log you out as well 4 3 Web UI Layout The web UI is composed of thre...

Page 24: ...f the router When you select a function in level 2 navigation bar the configuration of the function appears in the configuration area Configuration area It enables you to view and modify configuration...

Page 25: ...This module enables you to set the port mirroring function of the router Static Routing This module enables you to view the routing information and configure static routing Any IP By default this fun...

Page 26: ...oE username and password if your computer is connected to the ISP without a router Dynamic IP The ISP such as China Telecom and China Unicom does not provide the username or password To access the int...

Page 27: ...the ISP to access the internet The following describes the configuration steps Step 1 Choose Network Internet Settings The page displays the parameters for the function Step 2 Connection Type Select...

Page 28: ...parameters for the function Step 2 Connection Type Select Static IP Step 3 IP Address Subnet Mask Gateway Primary Secondary DNS Enter the relevant values provided by your ISP Step 4 Click OK End Wait...

Page 29: ...se you can try to clone the MAC address and access the internet again Current MAC It specifies the current MAC address of the WAN port of the router Default MAC It is used to restore the MAC address o...

Page 30: ...at can access the internet without the router 5 3 LAN Settings 5 3 1 Overview This section enables you to modify the IP address of the LAN port DHCP server parameters and to bind unbind the MAC addres...

Page 31: ...clients connected to the router If this function is disabled you have to manually configure the IP address of your client to access the internet You are recommended to retain the DHCP Server enabled...

Page 32: ...is optional DHCP Reservation The client obtains the same IP address assigned by the DHCP server all the time so as to ensure proper usage of functions such as filter management bandwidth control and V...

Page 33: ...CP Reservation module enables you to manually bind the IP address and MAC address of the client Adding a Rule Step 1 To access the Manual DHCP Reservation module choose Network LAN Settings Step 2 Cli...

Page 34: ...ble the IP MAC bind rule Action It enables you to do the following actions It is used to disable the rule It is used to enable the rule It is used to edit the rule including the MAC address IP address...

Page 35: ...t connected to the router It is recommended that you retain the default DHCP server settings to ensure internet connectivity 5 3 4 DHCP Reservation Step 1 Choose Network LAN Settings Step 2 Bind the I...

Page 36: ...ccessfully See the following figure 5 4 Port Mirroring 5 4 1 Overview Port mirroring is used to copy the data packets from one or more ports of a device to the monitoring port It is an approach for th...

Page 37: ...the mirroring port should be installed with monitoring software The default mirroring port is LAN5 which cannot be changed Mirrored Port It specifies the ports being monitored After the Port Mirroring...

Page 38: ...on procedure Step 1 Choose Network Port Mirroring Step 2 Click Enable check box of Port Mirroring Step 3 Select the mirrored ports such as WAN1 LAN2 LAN3 and LAN4 and click OK End Verification Verify...

Page 39: ...and the added Static Routing Destination Network It specifies the destination address namely the IP address that the packets can reach Subnet Mask It specifies the subnet mask of the destination netw...

Page 40: ...mpany s intranet server information IP Address 172 16 0 0 Subnet Mask 255 255 0 0 The following figure shows the topology Configuration procedure Step 1 Set the WAN port according to the company s net...

Page 41: ...onfigure a static routing rule 1 Click Add 2 In the window that appears configure the relevant parameters 1 Destination Network Enter the IP address of the destination network which is 172 16 0 0 in t...

Page 42: ...ork can access the internet and the intranet 5 6 Any IP By default the clients connected to the router can access the internet either by automatically obtaining the IP address or with a manually confi...

Page 43: ...NS resolving information of the websites accessed by the user If the website addresses the user wants to access are stored in the cache the system calls the cached information from the DNS cache of th...

Page 44: ...ptimization It is used to test the wireless performance of the router which is designed for the advanced users Guest Network It is used to set the guest network parameters Wireless Repeater It is used...

Page 45: ...d to change the SSID and password and retain the default configuration of other values WPA PSK boasts better compatibility while WPA2 PSK boasts better security You can choose the security type as req...

Page 46: ...ers Security It specifies the encryption type of the wireless network None No security mode is selected WPA PSK It is a standard interoperable and enhanced WLAN security solution adopting an encryptio...

Page 47: ...ou to set the advanced wireless parameters Without the guidance of professional personnel you are only recommended to modify the wireless channel and retain the default configuration of other options...

Page 48: ...eless transmission rate of 300 Mbps Available options at 5 GHz include 11a 11ac and 11a n The default value is 11ac 11a It indicates that only 802 11a complaint clients can connect to the router In th...

Page 49: ...width option 40 MHz is selected 6 2 2 Modifying Advanced Parameters Step 1 Choose Wireless Advanced Step 2 Modify the relevant parameters as required such as the wireless channel Step 3 Click OK End 6...

Page 50: ...o with more than 10 users If more than 10 clients are connected to the router you are recommended to select this mode to ensure client capacity Custom This mode enables you to set the WMM EDCA paramet...

Page 51: ...lost packets are not sent again if this policy is adopted This leads a higher packet loss rate EDCA Enhanced Distributed Channel Access EDCA It is a channel competition mechanism to ensure that packe...

Page 52: ...BK AC_VI AC_VO The WMM mechanism divides WLAN traffic by priority in descending order into the AC VO voice stream AC VI video stream AC BE best effort and AC BK background access categories Packets in...

Page 53: ...n RSSI Threshold It specifies the minimum strength of received signals acceptable to the RF of the router The default value is 90 dBm If the strength of the signals transmitted by a wireless device is...

Page 54: ...g Probe Request packets that include the SSID field to scan their nearby wireless networks After receiving such packets the AP determines whether the wireless devices are allowed to access the wireles...

Page 55: ...Modify the parameters as required Step 3 Click OK End 6 5 Guest Network 6 5 1 Overview A guest network is a network dedicated to guests Clients connected to a guest network can access the internet and...

Page 56: ...It specifies whether to enable the Guest Network It is disabled by default Isolate Client It specifies whether to isolate the wireless clients connected to the guest network Enable It indicates that t...

Page 57: ...at Security It specifies the encryption type of the guest network None It indicates that any wireless client can connect to the network WPA PSK It is a standard interoperable and enhanced WLAN securit...

Page 58: ...SSID It specifies to select the SSID of the peer network device you want to repeat You can manually enter the SSID or select the SSID after scanning 6 6 2 Example of Configuring of Wireless Repeater N...

Page 59: ...to set the wireless repeater Step 1 Choose Wireless Wireless Repeater Step 2 Wireless Repeater Click Enable Click to scan Step 3 Select the SSID you want to repeat from the drop down list box Step 4 E...

Page 60: ...to SSID of Router 2 can access the internet You can access the Wireless Basic page to see the SSID If you cannot log in to the web UI using the original IP address after rebooting the router do the fo...

Page 61: ...ent access control based on MAC addresses of wireless clients To use the function choose Wireless Access Control For limitation on connection time or connection of wired clients see 7 3 MAC Filter By...

Page 62: ...an be performed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rule including MAC address and remark It is used to delete the rule 6 7 2 Example of Co...

Page 63: ...52 Step 4 Enter the MAC address in the corresponding text box Step 5 Optional Enter the remark Step 6 Click OK Step 7 Return to the Access Control page and click OK...

Page 64: ...53 End Verification Verify that only devices with MAC address of CC 3A 61 71 1B 6E can access the internet over Tenda_888888...

Page 65: ...54 7...

Page 66: ...ant to implement access control based on MAC address Port Filter This module enables you to set the specified ports inaccessible to the clients Web Filter This module enables you to set the specified...

Page 67: ...56 7 1 2 Adding a Time Group Step 1 Click Add Step 2 Configure the rule parameters in the window that appears 1 Name Set the name of the rule 2 Time Day Set the specific time and day 3 Click OK End...

Page 68: ...to the filter management functions 3 Click OK End 7 2 IP Filter 7 2 1 Overview Generally a device can access the internet either by obtaining a dynamic IP address from the router or using a static IP...

Page 69: ...t specifies the time when the IP filter rule takes effect Status It specifies the current status of the rule including Enabled and Disabled Operation The following operations can be preformed on the r...

Page 70: ...ng an IP Filter Rule Step 1 To access the page choose Filter Management IP Filter Step 2 Enable IP Filter and click OK Step 3 Click Add Step 4 Configure the rule parameters in the window that appears...

Page 71: ...ution The IP filter function is recommended to address this problem Configuration procedure Step 1 Set the Time Group 8 00 18 00 See 7 1 2 Adding the Time Group for detailed configuration steps Step 2...

Page 72: ...e Internet in this example 4 IP Group Select the IP group to which the rule is applied from the drop down list box 5 Time Group Select the time group to which the rule is applied from the drop down li...

Page 73: ...00 7 3 MAC Filter 7 3 1 Overview Clients such as notebooks and pads all have MAC addresses Mac filter function enables you to implement access control on clients on LAN network MAC filter includes two...

Page 74: ...when the corresponding device on the list can or cannot access the internet Status It specifies the current status of the rule including Enabled and Disabled Operation The following operations can be...

Page 75: ...he MAC Filter Rule Step 1 To access the page choose Filter Management MAC Filter Step 2 Enable the MAC Filter and click OK Step 3 Click Add Step 4 Configure the rule parameters in the window that appe...

Page 76: ...owed to access the internet is CC 3A 61 71 1B 6E Configuration procedure Step 1 Set the Time Group 8 00 18 00 See 7 1 2 Adding the Time Group for detailed configuration steps Step 2 Add the MAC Filter...

Page 77: ...ional Enter the remark of this rule which is HR in this example 8 Click OK 9 Return to the MAC Filter page disable Allow hosts covered by disabled rules of not covered by the preceding rules to access...

Page 78: ...1 Overview Specific port numbers are often used to identify specific services 0 1023 are common port numbers reserved for specific service types The port filter function can be used to control the acc...

Page 79: ...annot access the internet Port It specifies the inaccessible service port Protocol Type It specifies the protocol of the inaccessible service It is recommended to retain the default settings Status It...

Page 80: ...s regulations devices on LAN covered by the IP group of 192 168 0 2 192 168 0 250 cannot browse web pages default port number is 80 during 8 00 18 00 working hours from Monday to Friday Solution The p...

Page 81: ...nge 192 168 0 2 192 168 0 250 See 7 1 3 Adding the IP Group for detailed configuration steps Step 3 Add the Port Filter rule 1 To access the page choose Filter Management Port Filter 2 Enable the Port...

Page 82: ...group to which the rule is applied from the drop down list box 6 Ports Set the port or ports inaccessible from the LAN network 7 Protocol Type Set the protocol type used by the inaccessible service I...

Page 83: ...5 Web Filter 7 5 1 Overview This module enables you to set the web filter function Web filter function disallows the specified clients on LAN network to access the specified websites such as shopping...

Page 84: ...he IP group cannot access the websites Category It specifies the website category inaccessible to the clients Status It specifies the current status of the rule including Enabled and Disabled Operatio...

Page 85: ...74 Step 3 Click Add Step 4 Configure the rule parameters in the window that appears including IP group time group websites and so on...

Page 86: ...75 End 7 5 3 Adding a Web Category Step 1 To access the page choose Filter Management Web Filter Step 2 Select the check box of the Web Filter and click OK...

Page 87: ...76 Step 3 Click Website Management Step 4 Click New Step 5 Set the website category parameters in the window that appears End...

Page 88: ...bsites Solution The web filter function is recommended to resolve this problem Configuration procedure Step 1 Set the Time Group 8 00 8 00 See 7 1 2 Adding the Time Group for detailed configuration st...

Page 89: ...st box 2 Time Group Select the time group to which the rule is applied from the drop down list box 3 Category Select the website category inaccessible to the clients 4 Please select Select the website...

Page 90: ...79 End The entry shown in the following figure appears...

Page 91: ...he router Smart Load Balancing The system automatically uses the WAN port with the lightest traffic to communicate Custom Policy It allows users to specify the corresponding WAN port for a certain sou...

Page 92: ...es the IP Group to which the rule is applied Specified WAN It specifies the WAN port of ingoing and out going packet of a IP group Status It specifies the current status of the rule including Enabled...

Page 93: ...procedure Step 1 Add the IP group which is 192 168 0 2 192 168 0 250 in this example See 7 1 3 Adding the IP Group for detailed configuration steps Step 2 Set the WAN port policy rule 1 To access the...

Page 94: ...83 End The entry shown in the following figure appears Verification Data of devices on the LAN network covered by the IP group of 192 168 0 2 192 168 0 250 is transmitted over WAN1...

Page 95: ...known to you Control Mode It specifies the control mode used by the current WAN port Disable It indicates that the bandwidth control function is disabled Automatic bandwidth control It specifies that...

Page 96: ...the enabled bandwidth control rule Concurrent Sessions Per Device It specifies the maximum number of connections that can be set up on each computer covered by the corresponding rule Mode It specifies...

Page 97: ...t specifies the maximum upload download rate of each client connected to the guest network 8 4 Example of Manual Bandwidth Control 8 4 1 Networking requirement A company uses W15E to deploy a network...

Page 98: ...n list box of the Control Mode and click OK 3 Click Add 4 IP Group Select the IP group to which the rule is applied from the drop down list box 5 Time Group Select the time group to which the rule is...

Page 99: ...ients maximum upload download rate 9 Click OK End The entry shown in the following figure appears 8 4 3 Verification During 8 00 18 00 devices covered by the rule can reach a maximum uploading rate of...

Page 100: ...nce it consists of only logical connections The VPN technology allows employees at a branch of an enterprise and employees at the headquarter to exchange resources without exposing these resources to...

Page 101: ...for PPTP L2TP client Server IP Address Domain Name It specifies the IP address domain name of the VPN server to be connected Generally it indicates the WAN IP of the peer router that functions as the...

Page 102: ...tatus of the VPN client 9 2 PPTP L2TP Server PPTP L2TP server allows dial up connection of specified clients For example for simple and secure mutual access between the branch offices and the headquar...

Page 103: ...ess Domain Name as the IP address of the WAN port Encryption It specifies whether to enable the data encryption Apply the same settings to both the client and server It is only applicable to PPTP IP A...

Page 104: ...L2TP is a network It indicates the LAN subnet mask of the PPTP L2TP client Remark It is used to briefly describe the rule which is optional Operation The following operations can be preformed on the...

Page 105: ...sulating Security Payload is used to check the data integrity and encrypt data If the encrypted data is intercepted by third parties they are unable to easily crack the data Remote Gateway Domain Name...

Page 106: ...otocol SA Security Association IKE Internet Key Exchange Description of advanced IPSec tunnel parameters To access the page click Advanced Parameter description Parameter Description Mode It specifies...

Page 107: ...to generate the key to encrypt an IKE tunnel Key Expiration It specifies the lifetime of IPSec SA PFS Keys made with Perfect Froward Secrecy PFS in IKE period 2 have nothing to do with the previous ke...

Page 108: ...es the security parameter index SPI together with the gateway address and protocol type of the peer router is used to identity an IPSec security association which shall be identical with the ingoing S...

Page 109: ...ss the page choose VPN PPTP L2TP Server Step 2 Enable VPN Server 1 VPN Server Click Enable 2 Server Type Click PPTP 3 WAN Select the WAN port used by router 1 for the VPN server which is WAN1 in this...

Page 110: ...he VPN client is a network which is Yes in this example 4 Network Segment Subnet Mask Enter the LAN network segment and subnet mask of the client which are 192 168 1 0 and 255 255 255 0 respectively i...

Page 111: ...nt which is WAN1 in this example 5 Server IP Address Domain Name Enter the IP address or corresponding domain name of the WAN port used by the VPN server 6 Username Password Enter the username and pas...

Page 112: ...connection is established when the status on VPN PPTP L2TP page shows connected and an IP address is obtained Employees from headquarter and branch office can securely access each other s intranet res...

Page 113: ...roject materials are stored in FTP server Assume that the information of the FTP server is as follows IP address 192 168 0 159 Server port 21 Login username admin Login password admin Follow the follo...

Page 114: ...103 Step 2 Enter the login username and password in the window that appears which are admin in this example Step 3 Click Login The internal resources are displayed...

Page 115: ...ude internal materials OA system ERP system CRM system and project management system and so on 9 5 2 Solution It is recommended that the VPN service of the router be used to address this requirement I...

Page 116: ...e choose VPN IPSec 2 Click Add 3 Set a rule 1 IPSec Click Enable 2 WAN Select the WAN port used by the tunnel which is WAN1 in this example 3 Connection Name Set the name of the tunnel which is IPSec_...

Page 117: ...dd 2 Set the rule 1 IPSec Click Enable 2 WAN Select the WAN port used by the tunnel which is WAN1 in this example 3 Connection Name Set the name of the tunnel which is IPSec_1 in this example 4 Remote...

Page 118: ...r the remote LAN network segment subnet mask which is 192 168 0 0 24 7 Pre shared Key Enter the pre shared key which is 12345678 in this example 8 Click OK End The entry shown in the following figure...

Page 119: ...recommended to change the default settings only under the instruction of professional staff 10 1 IP MAC Binding 10 1 1 Overview IP MAC binding function allows only clients matching with the IP address...

Page 120: ...f any Operation It is used to edit or delete the selected rules Dynamic Binding It displays the information of clients connected to the router This button is used to add the selected rule to the Bindi...

Page 121: ...y recruitment employees can access the internet using the specified computer and IP address Solution The IP MAC Binding function is recommended to address the requirement Assume that the IP addresses...

Page 122: ...ct to the router see the following instructions 1 Click Add 2 Enter the IP address and MAC address as required and click OK If the clients to be configured have connected to the router you can locate...

Page 123: ...lient on LAN network with MAC address of C8 3A 35 13 05 18 can access the internet only when configured with the IP address of 192 168 0 11 and the client with MAC address of C8 3A 35 D5 75 A6 can acc...

Page 124: ...g the following special IP options IP Timestamp Option IP Security Option IP Stream Option IP Record Route Option IP Loose Source Route Option and Invalid IP Option Block WAN Pinging When the host on...

Page 125: ...ves per second exceeds the specified value IP Attack Defense IP Timestamp Option It checks whether the specified IP range includes the Internet Timestamp option IP Security Option It checks whether th...

Page 126: ...enables you to manage clients that must be authenticated and authentication free hosts Example of Captive Portal This module elaborates the captive portal application through examples 11 1 Basic Setti...

Page 127: ...OK End Parameter description Parameter Description Captive Portal It specifies whether to enable the captive portal function Session Timeout Interval When the session times out the user needs to perf...

Page 128: ...being authenticated For example if the client accesses baidu com before authentication it redirects to baidu com after being authenticated completes Specified Page The client redirects to the website...

Page 129: ...authentication free host including Enabled and Disabled Operation The following operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edi...

Page 130: ...dialog box that appears Step 4 Click OK End 11 2 3 Adding a Web Account Step 1 Choose Captive Portal User Management Step 2 In User Management module click Add Step 3 Enter the username and password...

Page 131: ...guration procedure Step 1 Set the Basic Settings of captive portal 1 Choose Captive Portal Basic Settings 2 Select the Enable check box of Captive Portal 3 Session Timeout Interval Enter the expiratio...

Page 132: ...Choose Captive Portal User Management 2 In User Management module click Add 3 Username Enter the username 4 Password Enter the password for authentication 5 Remark Enter the description of the accoun...

Page 133: ...ess in this example 4 Address Enter the MAC address which is CC 3A 61 71 1B 6E in this example 5 Remark Enter the description of the client which is administrator in this example This item is optional...

Page 134: ...123 The following figure displays the captive portal page on PC The following figure displays the captive portal page on mobile devices...

Page 135: ...entication This module elaborates the application of PPPoE authentication through examples 12 1 Basic Settings 12 1 1 Overview By default the clients connected to the router can access the internet if...

Page 136: ...ngs Policy Name It displays the name of the policy which cannot be changed If the PPPoE authentication is enabled the Flow Control Settings rules replace the Bandwidth Control function of the router U...

Page 137: ...s It displays the MAC addresses of clients free from authentication Remark It displays the description of the clients free from authentication if any Operation The following operations can be preforme...

Page 138: ...nt 12 2 1 Overview This section explains how to add a PPPoE account One account username and password can be used by only one user at a time To access the page choose PPPoE Authentication User Managem...

Page 139: ...operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rule It is used to delete the rule It is used to export cfg configuration...

Page 140: ...matically obtained IP address and without a login username and password The alter page will appear when an account is about to expire 12 3 2 Solution The PPPoE authentication function of the router is...

Page 141: ...se is due to expire 1 Click Configure 2 Configure the alter contents in the window that appears Web Title Change the web title as required Web Content Change the web content as required Click OK 4 Ret...

Page 142: ...ministrator in this example This item is optional 6 Click OK Step 2 Add PPPoE Authenticated Users 1 Choose PPPoE Authentication User Management 2 Click Add 3 Username Enter the username for PPPoE auth...

Page 143: ...al up Connection Example Windows 7 Step 1 Click in the lower left corner of the desktop Step 2 Click Control Panel Network and Sharing Center Set up a new connection or network Step 3 Select Connect t...

Page 144: ...133 Step 4 Click Broadband PPPoE Step 5 Enter the username and password which are rosemary and 12345678 respectively in this example Click Connect...

Page 145: ...134 Wait until the dial up connection completes End...

Page 146: ...ccess the page choose WiFi via WeChat 13 1 WiFi via WeChat 13 1 1 Overview By default the clients connected to the router can access the internet if the router has been connected to the internet The c...

Page 147: ...elevant information about your WeChat account including SSID shopped appID and secretKey If you have not registered a WeChat account or the WiFi via WeChat function has not been enabled click https ad...

Page 148: ...equest which uniquely verifies your identity To get the secretKey login to the WeChat official account admin platform Session Timeout Interval It specifies the validity connection duration for a clien...

Page 149: ...o add clients free from WeChat authentication It is used to delete the selected rule Address Type It specifies the address type of authentication free hosts including IP address and MAC address Addres...

Page 150: ...ired Step 5 Add clients free from authentication Step 6 Click OK End 13 2 Example of WiFi via WeChat 13 2 1 Networking requirement A restaurant uses W15E to deploy the network It requires that guests...

Page 151: ...to set WiFi via WeChat 1 Choose WiFi via WeChat 2 Select the Enable check box of WiFi via WeChat 3 Enter SSID shopID appID and secretKEy as required 4 Configure WeChat authentication page settings as...

Page 152: ...free from authentication 1 Click Add 2 Address Type Select the address type of the clients free from authentication 3 Address Enter the address of the client 4 Remark Enter the description of the clie...

Page 153: ...een instructions to open the WeChat login page click Connect Your mobile client is connected to the internet In addition the Follow us button on the connected page allows more fans to follow you thus...

Page 154: ...s the changeable WAN IP address of the router onto a fixed domain name allowing users to remotely access the router using the domain name 14 1 Port Forwarding 14 1 1 Overview By default hosts on the i...

Page 155: ...Choose Virtual Server Port Forwarding Step 2 Click Add Step 3 Enter the relevant parameters in the dialog box that appears as required Step 4 Click OK End Parameter description Parameter Description I...

Page 156: ...atus of the rule including Enabled and Disabled Operation The following operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rul...

Page 157: ...hen virtual server function is used Configuration procedure Step 1 Choose Virtual Server Port Forwarding Step 2 Click Add Step 3 Internal Host IP Enter the IP address of the local computer that functi...

Page 158: ...of the WAN port External port after the rule takes effect 14 2 UPnP Universal Plug and Play UPnP is a set of networking protocols that makes automatic port forwarding possible It can identify devices...

Page 159: ...verage the DMZ host to attack your LAN Therefore enable the DMZ function only when necessary Manually set the IP address of the LAN computer that functions as a DMZ host to prevent IP address changes...

Page 160: ...router is unavailable The DMZ host that responds to the external VPN request Host IP It specifies the IP address of the DMZ host 14 4 DDNS 14 4 1 Overview Dynamic Domain Name System DDNS is a method u...

Page 161: ...pplicable to oray com Username It specifies the DDNS login username registered on the DDNS provider website Password It specifies the DDNS login password registered on the DDNS provider website Domain...

Page 162: ...p 5 Click OK End 14 4 3 Example of DDNS Networking requirement A company uses W15E to deploy its network environment and the WAN IP of the router is dynamic It requires that employees can access the c...

Page 163: ...hows the topology Configuration procedure Step 1 Register a domain name 1 Choose Virtual Server DDNS enable DDNS select a DDNS provider such as oray com and click Register 2 Register a domain name fol...

Page 164: ...this example 3 Username Password Enter the username and password registered on the website of the DDNS provider 4 Click OK 2 Refresh the current page and wait a second Connection succeeds when the con...

Page 165: ...ort forwarding function See 14 1 Port Forwarding for detailed steps End Verification Employees on business travel can access the intranet resources by accessing ftp 171y0a4291 iok la and entering the...

Page 166: ...nables you to upgrade the router for more stable performance and new features Restore Factory Settings It is used when the router works improperly System Time This module allows you to set the system...

Page 167: ...ord Enter the new login password again Step 5 Click OK End You will be redirected to the login page Enter the new login password and click Login to login to the web UI of the router 15 2 Reboot 15 2 1...

Page 168: ...truction End 15 2 3 Automatic Reboot Step 1 Choose Maintenance Reboot Step 2 Reboot Schedule Click Enable Step 3 Reboot Time Select the reboot time from the drop down list box such as 23 30 Step 4 Reb...

Page 169: ...Backing up Configuration Step 1 Choose Maintenance Backup Restore Step 2 Click Backup Step 3 Follow the on screen instructions to backup End 15 3 3 Steps for Restoring the Configuration Step 1 Choose...

Page 170: ...latest firmware to your computer Step 2 Choose Maintenance Firmware Upgrade Step 3 Upgrade Type Select Local Upgrade Step 4 Click Browse and select the downloaded firmware Step 5 Click Upgrade End Wai...

Page 171: ...forget the login password The router can be reset using software or hardware The default login IP address of the router is 192 168 0 1 When the factory settings are restored your configuration is los...

Page 172: ...s Sync with Internet Time and Manual Setup The default configuration of the router is Sync with Internet Time After connected to the internet the router synchronizes the system time at a specified int...

Page 173: ...ogin to the web UI of the router over the internet To access the page choose Maintenance Remote WEB Management Enable the rule see the following figure Parameter description Parameter Description Remo...

Page 174: ...revent port conflicts 15 7 2 Configuring Remote WEB Management Step 1 Choose Maintenance Remote WEB Management Step 2 Remote WEB Management Click Enable Step 3 WAN Select the WAN port as required Step...

Page 175: ...End Verification The network administrator can login to the web UI of the router to manage by entering http 202 105 106 55 8088 in browser of the remote computer which is connected to the internet and...

Page 176: ...2 Diagnosis with the Ping Command Ping command is used to check the connectivity of the internet The following describes how to check the connectivity between the router and www baidu com Step 1 Choo...

Page 177: ...tion IP or the domain name To detect the route from the router to www baidu com do the following Step 1 Choose Maintenance Diagnostics Step 2 Select Traceroute from the drop down menu box list of Tool...

Page 178: ...167 End The results displays in the Traceroute Results text box The record is numbered from 1 Each record indicates one hop and each hop represents a gateway...

Page 179: ...the router Traffic Statistics It allows you to view the traffic statistics of the current clients connected to the router Defense Logs It records the attacks on LAN network System Logs This module al...

Page 180: ...stem Info It displays the basic information of the router including device name system time uptime and firmware version and so on LAN Info It displays the LAN MAC address and LAN IP address of the rou...

Page 181: ...ifies the current connection speed of the client Duration It specifies the connection duration of a client Connected SSID It specifies the SSID connected by the wireless client Frequency It specifies...

Page 182: ...IPSec tunnel data on the LAN network Security Protocol It specifies the security protocol used by the IPSec tunnel AH Verification Algorithm It specifies the AH verification algorithm used by the IPSe...

Page 183: ...172 16 4 Defense Logs To access the page choose System Status Defense Logs It records the attack history of the router The following figure displays the ARP attack logs...

Page 184: ...173 16 5 System Logs To access the page choose System Status System Logs The system logs can be used for troubleshooting when the router is faulty...

Page 185: ...s operating system exmaple Windows 7 Choose the appropriate one according to your operating system Step 1 Right click in the lower right corner of the desktop and choose Open Network and Sharing Cente...

Page 186: ...175 Step 4 Select Obtain an IP address automatically and Obtain DNS server address automatically and click OK On the Local Area Connection Properties dialog box that appears click OK...

Page 187: ...mm C FAQ Q1 I cannot access the web UI of the router after entering 192 168 0 1 What should I do A1 Check the following items Ensure the Ethernet cables are correctly connected and have no loosening...

Page 188: ...ttings A3 Hold down the Reset button using a paper clip for 8 seconds and wait about 1 minute After the factory settings are restored configure the router again The default login IP address of the rou...

Page 189: ...Declaration of Conformity Hereby SHENZHEN TENDA TECHNOLOGY CO LTD declares that the radio equipment type W15E is in compliance with Directive 2014 53 EU The full text of the EU declaration of conformi...

Page 190: ...ence will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user...

Page 191: ...equipment This transmitter must not be co located or operating in conjunction with any other antenna or transmitter NOTE 1 The manufacturer is not responsible for any radio or TV interference caused...

Reviews: