background image

 

12 

2. WPA/WPA2 

Wi-Fi Protected Access (WPA) is the most dominating security mechanism in industry. It is 
separated  into  two  categories:  WPA-personal  or  called  WPA  Pre-Share  Key  (WPA/PSK), 
and WPA-Enterprise  or  called WPA/802.1x.  WPA2  means Wi-Fi  Protected  Access  2,  it  is 
the current most secure method of wireless security and required for 802.11n performance. 

TKIP

--Temporal Key Integrity Protocol is one cipher for data encryption supported by WPA. 

AES--

Advanced Encryption Standard is another cipher for data encryption supported by 

WPA.

 

 

 

Pre-Shared Key Format/Pre-Shared Key: 

This is a pre-defined key used for encryption 

during  data  transmission.  It has  two formats:  Passphrase  and  Hex  (64  characters).  Then 
you need to enter the Pre-Shared Key, either 8~63 ASCII characters, such as 012345678 
or 64 Hexadecimal digits leading by 0x, such as “0x321253abcde…”). 

 

2. WPA2-Mixed (Recommended) 

This option mixes WPA/WPA2 together. It will provide the best security for your router. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Summary of Contents for ND300V2

Page 1: ...4 EASY SETUP 9 4 1 Accessing Web page 9 4 2 Easy Setup 10 4 2 1 ISP Setting 10 4 2 2 Wireless Setting Security 11 5 ADVANCED SETUP 13 5 1 Setup 13 5 1 1 WAN 13 5 1 1 1 WAN 13 5 1 1 2 Auto PVC 15 5 1 1 3 ATM 15 5 1 1 4 ADSL 16 5 1 2 LAN 16 5 1 2 1 LAN 17 5 1 2 2 DHCP 17 5 1 2 3 DHCP Static 18 5 1 2 4 LAN IPv6 19 5 1 3 WLAN 20 5 1 3 1 Basic 20 5 1 3 2 Security 21 5 1 3 3 MBSSID 21 5 1 3 4 Access Con...

Page 2: ... 4 CWMP 34 5 2 5 Port Mapping 35 5 2 6 Others 36 5 2 6 1 Bridge Setting 37 5 2 6 2 Client Limit 37 5 2 6 3 Tunnel Configuration 37 5 2 6 4 Others 38 5 3 Service 39 5 3 1 IGMP 39 5 3 1 1 IGMP Proxy 39 5 3 1 2 MLD 40 5 3 2 UPnP 40 5 3 3 SNMP 41 5 3 4 DNS 42 5 3 4 1 DNS 42 5 3 4 2 IPv6 DNS 42 5 3 5 DDNS 43 5 3 6 FTP Server 44 5 4 Firewall 44 5 4 1 MAC Filter 44 5 4 2 IP Port Filter 45 5 4 2 1 IP Port...

Page 3: ...tement All the photos and product specifications mentioned in this manual are for references only as the upgrading of software and hardware They are subject to change without notice No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from TOTOLINK If you want to know more abou...

Page 4: ...tegrates functions of high speed ADSL Modem wireless router and 4 port switch It complies with the most advanced IEEE 802 11n standard and can deliver up to 300Mbps wireless data rate It also supports the latest ADSL 2 2 standards to provide higher performance for users and make the transmission coverage wider than other devices 2 2 Features Complies with IEEE 802 11n g b standards for 2 4GHz Wire...

Page 5: ... CPU When the router powered on this indicator keeps lighting ADSL It is on when ADSL port is connected and blinking when there are data transmitting Internet It is on when Internet is connected WLAN This indicator lights when the wireless connection enabled 1 2 3 4 LAN When the LAN port has a successful connection the indicator lights While transmitting or receiving data through the LAN port the ...

Page 6: ...itch 2 3 4 LAN This port is used to connect the router to local PC 1 LAN WAN This port is where you will connect the DSL cable Modem Ethernet or local PC WPS RST WPS If you have client devices you can press this button to quickly establish secured connections between this router and client devices RST There is a RST button on the opposite side of the rear panel which is used to reset the router to...

Page 7: ...al status 2 After a few seconds the LAN LED indicators without connection go out and WLAN indicator will light up 3 3 Set up PC The default IP address of the Router is 192 168 0 1 the default Subnet Mask is 255 255 255 0 Both of these parameters can be changed as you want In this guide we will use the default values for description Connect the local PC to the LAN port on the Router There are then ...

Page 8: ...imilar to that shown in the above figure it means that your PC has not connected to the Router successfully Please check it following below steps 1 Is the connection between your PC and the Router correct If correct the LAN port on the Router and LED on your PC s adapter should be lit 2 Is the TCP IP configuration for your PC correct Since the Router s IP address is 192 168 0 1 your PC s IP addres...

Page 9: ...ndow will pop up that requires you to enter valid User Name and Password Enter admin for User Name and Password both in lower case letters Then click OK button or press Enter key Now you have logged into the web interface of the Modem Router First you can see the Easy Setup page Note If the above screen does not prompt it means that your web browser has been set to using a proxy Go to Tools menu I...

Page 10: ... of the Modem Router step by step Select language at first and click NEXT button 4 2 1 ISP Setting You re required to choose one ISP Connection Type after configuration is finished please click NEXT to continue the setting Country please select the correct country name ISP Connection Type there are five ISP connection type supported PPPoE PPPoA ...

Page 11: ...ble or enable SSID broadcast change the Wireless SSID and also the encryption mode after changing settings please click APPLY to finish easy setup Encryption choose an encryption method for this wireless network WEP WPA WPA2 and WPA2 Mixed can be selected here 1 WEP WEP Wired Equivalent Privacy is based on the IEEE 802 11 standard and uses the RC4 encryption algorithm WEP is the oldest security al...

Page 12: ...grity Protocol is one cipher for data encryption supported by WPA AES Advanced Encryption Standard is another cipher for data encryption supported by WPA Pre Shared Key Format Pre Shared Key This is a pre defined key used for encryption during data transmission It has two formats Passphrase and Hex 64 characters Then you need to enter the Pre Shared Key either 8 63 ASCII characters such as 0123456...

Page 13: ...up interface allows you to configure WAN LAN and WLAN settings 5 1 1 WAN 5 1 1 1 WAN The ADSL router provides ADSL WAN or Ethernet WAN for you to connect to Internet Select one type accordingly and enter the parameters provided by your ISP ...

Page 14: ...14 ...

Page 15: ... Identifier this is based on the region you are living generally provided by ISP VCI Virtual Channel Identifier this is based on the region you are living generally provided by ISP 5 1 1 3 ATM VPI Virtual Path Identifier this is based on the region you are living generally provided ...

Page 16: ...ou are living generally provided by ISP ATM QoS Choose the ATM QoS type provided by your ISP By default it is UBR selected 5 1 1 4 ADSL This interface allows you to choose some ADSL parameters that your modem router will support You could keep the default value 5 1 2 LAN ...

Page 17: ...an change it as well Subnet Mask Subnet Mask of this ADSL Router is 255 255 255 0 Please just keep the value 5 1 2 2 DHCP Dynamic Host Configuration Protocol DHCP service will supply IP settings to computers which are connected to this Router and configured to obtain IP settings automatically ...

Page 18: ...18 IP Pool Range enter an IP address for the DHCP server Since the default IP address of the Modem Router is 192 168 0 1 the IP pool range is from 192 168 1 100 to 192 168 1 200 5 1 2 3 DHCP Static ...

Page 19: ...19 5 1 2 4 LAN IPv6 ...

Page 20: ...Wireless LAN client that may connect to your Access Point Band Specifies the standards this Modem Router complies with Generally it is 2 4GHz B G N selected SSID This is your wireless network name Others can access Internet wirelessly by searching for this SSID and connecting to it ...

Page 21: ...t will deliver the best performance of the device 5 1 3 2 Security You can setup wireless security in this page Setup different encryptions for different SSIDs so that makes your wireless network more secure 5 1 3 3 MBSSID In this page you can enable and set multiple VAP function It is practical to set different SSID with encryption for different clients or friends ...

Page 22: ...22 5 1 3 4 Access Control List Mode you could choose to allow or deny the following addresses entered by you MAC Address enter the MAC address that you want to deny or allow ...

Page 23: ...f the wireless network use cases RTS Threshold determines the packet size of a transmission and through the use of an access point helps control traffic flow The range is 0 2347 bytes The default value is 2347 which means that RTS is disabled Beacon Interval By default it is set to 100ms Higher Beacon interval will improve the device s wireless performance and is also power saving for client side ...

Page 24: ...less Distribution System It is a protocol for connecting two access points wirelessly Usually it can be used for the following application Provide bridge traffic between two LANs though the air Extend the coverage range of a WLAN To meet the above requirement you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable ...

Page 25: ...25 5 1 3 8 Repeater The Repeater methods can help you to expand the wireless coverage and allow more terminals to access Internet ...

Page 26: ...26 5 2 Advanced 5 2 1 Route 5 2 1 1 Static Route This page allows you to specify that a specific target IP addresses passes through a determined gateway manually ...

Page 27: ...hich portion of an IP Address is the network portion and which portion is the host portion Metric Enter the metric or priority of the route The metric range is 1 to 15 the lowest number 1 being the highest priority 5 2 1 2 IPv6 Static Route This page allows you to configure a static route to an Internet Protocol version 6 IPv6 network ...

Page 28: ...Z DMZ means Demilitarized Zone It can be enabled and used as a place where services can be placed such as Web Servers Proxy Servers and E mail Servers such that these services can still serve the local network and are at the same time isolated from it for additional security ...

Page 29: ...l server is defined as a service port and all requests from Internet to this service port will be redirected to the computer specified by the server IP Any PC used for a virtual server must have a static or reserved IP address because its IP address may change when using DHCP function ...

Page 30: ...r Gateway consists of a security component that augments a firewall or NAT employed in a computer network 5 2 2 4 NAT Exclude IP NAT Exclude IP page is help to exclude addresses in the configured network range from being assigned to DHCP clients on the private network 5 2 2 5 Port Trigger Port Trigger is used to realize that when there comes the Outbound streaming from a ...

Page 31: ... streams will forward to the triggered ports You can achieve some special purposes by this setting 5 2 2 6 FTP ALG Configuration FTP ALG may use separate connections for passing control commands and for exchanging data between the client and a remote server After enabled FTP ALG in ALG page you can setup FTP ALG Port in this page ...

Page 32: ...32 5 2 2 7 NAT IP Mapping NAT Mapping function is very useful for a domestic network with one wireless router and a few devices with private IP addresses 5 2 3 QoS ...

Page 33: ...that all applications receive the service levels required and sufficient bandwidth to meet performance expectations is indeed one important aspect of modern enterprise network 5 2 3 2 Traffic Shaping For better traffic control you can setup upstream and downstream speeds in this page ...

Page 34: ... 4 CWMP The Modem Router offers CWMP feature This function supports TR 069 protocol which collects information diagnoses the devices and configures the devices automatically via ACS Auto Configuration Server ...

Page 35: ...ed by the ACS server to login the Modem Router Password Enter the password that provided by the ACS server to login the Modem Router Path Enter the path that connects to the ACS server Port Enter the port that connects to the ACS server 5 2 5 Port Mapping Port Mapping function allows a computer in a private network behind a NAT router to automatically configure the router to allow parties outside ...

Page 36: ...36 5 2 6 Others ...

Page 37: ...between adjacent switches It helps to ensure a loop free topology for any bridged Ethernet local area network 5 2 6 2 Client Limit After enabled client limit capability you can setup the maximum devices that are allowed to access to Internet 5 2 6 3 Tunnel Configuration V6inv4 tunnel or v4inv6 tunnel can be configured in this page ...

Page 38: ...38 V6inV4 is an Internet transition mechanism for migrating from Internet Protocol version 4 IPv4 to IPv6 5 2 6 4 Others In this page you can enable or disable half bridge ...

Page 39: ...Management Protocol is used to manage multicasting on TCP IP networks Some ISPs use IGMP to perform remote configuration for client devices such as the Modem Router 5 3 1 1 IGMP Proxy IGMP Proxy and Multicast allowed can be configured in this page ...

Page 40: ...it allows the router to find out if there is an IPv6 multicast group listeners on their directly connected network segments 5 3 2 UPnP The Universal Plug and Play UPnP devices can be automatically discovered by the UPnP service application on the LAN ...

Page 41: ...rnet standard protocol for managing devices on IP networks It is used mostly in network management systems to monitor network attached devices for conditions that warrant administrative attention System Name Location set the administrator name and physical location ...

Page 42: ...nternet host must have a unique IP address also they may have a human friendly easy to remember name The DNS server converts the user friendly name into its equivalent IP address 5 3 4 2 IPv6 DNS This page allows you to configure the DNS server IPv6 address ...

Page 43: ... to the Internet via your ISP It means that the public IP address assigned to your router changes each time you access the Internet The Dynamic DNS feature lets you assign a domain name to a dynamic WAN IP address Before you user the Dynamic DNS feature you have to apply for free DDNS service to the DDNS service providers ...

Page 44: ...ns or distance learning security has been always the most concerned The firewall of this router helps to protect your local network against attack from unauthorized access 5 4 1 MAC Filter MAC Filter function is useful for restricting certain types of data packets from your local network to Internet through the Gateway ...

Page 45: ...corresponding value Source MAC enter the starting IP address that you want to deny or allow Destination MAC enter the ending IP address that you want to deny or allow 5 4 2 IP Port Filter 5 4 2 1 IP Port Filter This page is used to set IP Port filter rule ...

Page 46: ...46 5 4 2 2 IPv6 Port Filter This page is used to set IPv6 Port filter rule ...

Page 47: ...47 5 4 3 URL Filter This page is used to set URL filter rule You can active this function and enter URL links that want to filter ...

Page 48: ...trol the access of this Modem Router 5 4 4 1 ACL Direction Select Set the ACL rule for LAN or WAN Secure IP Address Enter the secure IP address range that you allow to access this Modem Router Current ACL Table This form lists all information about the current ACL rule ...

Page 49: ...e attacks are usually categorized into two types the flooding type attacks and the vulnerability attacks The flooding type attacks will attempt to exhaust all your system s resource while the vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the protocol or operation system ...

Page 50: ...50 5 5 Maintenance This section includes settings for Administration Time Zone Firmware Log and ...

Page 51: ...ugs Following the steps show below so as to realize upgrading This page allows you to upgrade the Access Point firmware to new version Please note DO NOT power off the device during the upload because it may crash the system 5 5 1 2 Backup Restore This webpage allows you to save current settings to a file and reload the settings from the file ...

Page 52: ...5 5 2 Password In this section you can modify the administrator password to protect your device from unauthorized configuration The default administrator s password should be changed on the very first system setup 5 5 3 Reboot You can just click Reboot to restore the router to default factory setting ...

Page 53: ...h Mean Time or copy computer time as the current time only by clicking the Copy Computer Time button Time Zone Select Select the Time Zone where the router is located SNTP server Please choose the corresponding SNTP server to get right time 5 5 5 Log Log page shows the working status of the wireless router user can check the running status information here ...

Page 54: ...54 5 5 6 Diagnostics This section is useful for testing unless you know what effect the configuration will have on your wireless router 5 5 6 1 Ping ...

Page 55: ...acket takes through the network 5 5 6 4 Traceroute6 Traceroute6 is an IPv6 varaint of the IPv4 traceroute tool a computer network tool used to determine the route taken by packets across an IP network 5 5 6 5 OAM Loopback OAM Loopback capability allows the router to automatically detect the connectivity of the VCC ...

Page 56: ...56 5 5 6 6 ADSL Diagnostic Click Start button to enable diagnose function and then you can see ADSL status in this page ...

Page 57: ...57 5 5 6 7 Diagnostic Test It is useful for checking connection status Please press Run Diagnostic Test button ...

Reviews: