background image

39 

Web User Interface 

 

Label  

Description 

WPA 

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i 
standard. Key differences between WPA and WEP are user 
authentication and improved data encryption 

WPA-PSK 

If you don't have an external RADIUS server you should use 
WPA-PSK (WPA Pre-Shared Key) that only requires a single 
(identical) password entered into wireless gateway and wireless 
client. As long as the passwords match, a client will be granted 
access to a WLAN. 

WPA2 

Advanced protocol, certified through Wi-Fi Alliance's WPA2 
program, implements the mandatory elements of 802.11i. In 
particular, it introduces a new AES-based algorithm, CCMP, that 
is considered fully secure. 

WPA2-PSK 

If you don't have an external RADIUS server you should use 
WPA2-PSK (WPA Pre-Shared Key) that only requires a single 
(identical) password entered into wireless gateway and wireless 
client. As long as the passwords match, a client will be granted 
access to a WLAN. 

WPA/WPA2 Encryption 

Switch to enable and disable WPA/WPA2 encryption. 

WPA Pre-Shared Key

 

The encryption mechanisms used for WPA and WPA-PSK are 
the same. The only difference between the two is that WPA-PSK 
uses a simple common password, instead of user-specific 
credentials. 

RADIUS Server

 

Input the IP address of RADIUS server 

RADIUS Port

 

Enter RADIUS port number when WPA or 802. 1x network 
authentication is selected. 

RADIUS Key

 

Enter RADIUS Key when WPA or 802. 1x network 
authentication is selected. 

Group Key Rotation 
Interval 

Allows the wireless router to generate best possible random 
group key and update all the key-management capable stations 
periodically. 

WPA/WPA2 Re-auth 
Interval

 

Wireless router (if using WPA-PSK key management) or 
RADIUS server (if using WPA key management) sends a new 
group key out to all clients. The re-keying process is the WPA 
equivalent of automatically changing the WEP key for an AP and 

U10C019/U10C020 

Summary of Contents for U10C019

Page 1: ...U10C019 U10C020 End User Guide 2 12 2009 Version 1 6 User s Guide ...

Page 2: ...avid Add new telnet commands 1 5 2008 08 13 John Yan Revised the format And enhance with VPN DDNS configuration merged U10C020 into this edition Update Tool options page Update user login screenshot Remove Routing pages 1 6 2009 02 11 Kyle Li Revise to comply with new Ubee format U10C019 U10C020 ...

Page 3: ... Upstream Burst 17 6 1 6 Operation Configuration 18 6 1 7 Event Log 19 6 2 Gateway 20 6 2 1 Information 21 6 2 2 Basic Setup 22 6 2 3 DHCP 23 6 2 4 DHCP static Lease 25 6 2 5 DDNS 26 6 2 6 Time 27 6 2 7 Advanced Options 28 6 2 8 Advanced MAC Filtering 28 6 2 9 Advanced IP Filtering 29 6 2 10 Advanced Port Filtering 30 6 2 11 Advanced Forwarding 31 6 2 12 Advanced Port Triggering 33 6 2 13 Advanced...

Page 4: ... 4 VPN L2TP PPTP 53 6 4 5 VPN Event Log 55 6 5 Parental Control 55 6 5 1 User Setup 55 6 5 2 Activation 58 6 5 3 TOD Filter 59 6 5 4 Event Log 61 6 6 Firewall 62 6 6 1 Content Filter 63 6 6 2 Event Log 65 6 6 3 Remote Log 66 6 7 Tools 66 6 7 1 Ping 66 6 7 2 Trace Route 67 6 7 3 Client List 68 6 7 4 Frequency Scanning Plan 69 6 7 5 Password 70 6 7 6 User Defaults 70 ...

Page 5: ... has the following features to help you access and use the Internet Wireless connectivity means that you can use your PC just about anywhere in your home 802 11b g compliance ensures interoperability with other 802 11b g compliant devices Your wireless cable modem supports transmission rates of 54 48 36 24 18 12 11 9 6 5 5 2 and 1 Mbps Two way design allows the wireless cable modem to send and rec...

Page 6: ...a To do this 1 Locate your cable outlet and ensure that it is located within proper distance of your wireless cable modem and computer Be sure not to bend the cable as this may strain the connector and cause damage 2 Place wireless cable modem as high as possible Allow sufficient airflow around the wireless cable modem to prevent overheating 3 Place wireless cable modem and wireless clients in ope...

Page 7: ...oes not support the Macintosh operating system Windows 98 First Edition and NT Windows 98 SE Windows Me Windows 2000 or Windows XP CD or disks An active USB port on your PC If using the wireless cable modem s Ethernet port A PC running Windows 95 or later operating system or a Macintosh computer running system 7 6 or later operating system An active Ethernet port on your PC or Macintosh If using t...

Page 8: ...he process for installing your wireless cable modem using the wireless feature First you will install the hardware wireless cable modem wireless client not included coax cable not included and power adapter Installing the Hardware This section explains how to connect the wireless cable modem to the computer wall cable outlet and electrical outlet To install the hardware Power off the computer Conn...

Page 9: ... wireless client If WEP Wired Equivalent Privacy is set verify that the WEP key set in the modem matches the WEP key set in the wireless client 4 Installing the Modem Using the Ethernet Port This chapter explains the process for installing your wireless cable modem using the Ethernet port Using the Ethernet port allows to you connect multiple computers to a wireless cable modem through the use of ...

Page 10: ...train the connector and cause damage If you plan to connect the wireless cable modem and television to the same wall outlet you must use a cable line splitter not included Connect one end of the Ethernet cable to the wireless cable modem s Ethernet port and the other end of the cable to the Ethernet port on the PC or network interface card NIC Plug the wireless cable modem s power adapter into the...

Page 11: ...able may be damaged Try another cable All of the LEDs on the front of my modem look correct but I cannot access the Internet If the pwr sync and ready LEDs are solidly lit the wireless cable modem is working properly Try restarting the computer so that is could re establish a connection with the wireless cable modem Power cycle the wireless cable modem by removing the power adapter from the electr...

Page 12: ...rnal power on tests usb Indicates connectivity between the USB port on the wireless cable modem and a PC s USB port sync Indicates the connection status between the wireless cable modem and the cable network The LED is lit when the wireless cable modem has established a downstream channel with the cable service provider s Cable Modem Termination System CMTS ready Indicates that the wireless cable ...

Page 13: ...d connects to the Ethernet port on the PC or NIC USB Port This is where you plug the included USB cable The other end connects to the USB port on your PC Cable Connector This is where you connect the coaxial cable not included that leads to the cable splitter not included or the cable wall outlet 6 Web User Interface Accessing the Web User Interface This chapter describes how to access the wireles...

Page 14: ...and or password the web user interface displays 401 Unauthorized User Name user Password user only can access to MODEM GATEWAY WIRELESS VPN PARENTAL CONTROL FIREWALL and TOOLS Web User Interface Home Page After login user will see the CABLE MODEM page first The layout is divided into 3 areas Menu Bar Menu Tree and Configure Area U10C019 U10C020 ...

Page 15: ...n Configure Area Below chapter is to go through page by page to ensure that you re clear about each feature and how to use it 6 1 MODEM User can select different options to view wireless cable modem s information and real time status They include Information Status Downstream Upstream Upstream Burst Operation Configuration Event Log options 6 1 1 Information This page is to show Cable Modem Inform...

Page 16: ...D number of a product Boot Code Version Software version of device driver Software version Software Hardware Version An internal ID number to identify hardware design CA Key This is required by BPI Cable modem will install a CA Key that transferred from your service provider s server after cable modem is authenticated 6 1 2 Status This page is to show Cable Modem Status U10C019 U10C020 ...

Page 17: ...ogress Connectivity State After physical layer s initialization cable modem will be configured by a DHCP server Once succeeds to get an IP that means cable modem is online In status column it shows the progress In comments Column it tells the reason why cable modem s connectivity state is not ok Boot state Shows the registration status Security If BPI is enabled status will show Enabled 6 1 3 Down...

Page 18: ...required for the downstream channel locked by cable modem This is decided by service provider Downstream Symbol Rate Display the symbol rate Current cable modem downstream symbol rate QAM64 is 5056941 sym sec QAM256 is 5360537 sym sec Downstream Interleave Depth Current cable modem downstream Interleave depth 8 16 32 64 128 other Downstream Receive Power Level Display the receiver power level afte...

Page 19: ... Current cable modem upstream frequency Hz Upstream Modulation Current cable modem upstream modulation type QPSK QAM8 QAM16 QAM32 QAM64 QAM128 QAM256 Upstream Symbol Rate Current cable modem upstream symbol rate Ksym sec Upstream transmit Power Level Current cable modem upstream transmit power dBmV Upstream Mini Slot Size Current cable modem upstream mini slot 6 1 5 Upstream Burst U10C019 U10C020 ...

Page 20: ...r of codeword parity bytes is 2 T FEC Codeword Information Bytes k Fixed 16 to 253 assuming FEC on Shortened 16 to 253 assuming FEC on Scrambler Seed 15 bits Not used if scrambler is off Maximum Burst Size 0 255 mini slots Guard Time Size 4 255 symbols Last Codeword Length Fixed shortened Scrambler on off On Off 6 1 6 Operation Configuration This page shows the running configuration of cable modem...

Page 21: ...Maximum Downstream Data Rate Display the maximum downstream data rate Maximum Upstream Data Rate Display Maximum Upstream Data Rate Maximum Upstream Channel Burst Display Maximum Upstream Channel Burst Maximum Number of CPEs Shows the maximum CPE that can be connected at LAN side to access Internet at the same time Modem Capability Displayed certain configuration like PHS enabled 6 1 7 Event Log U...

Page 22: ...r example you can see configuration file CVC validation Failure this indicates that cable modem failed to validate the CONFIG file downloaded from MSO s TFTP server maybe caused by error root key Furthermore event logs will be stored unless user clicks clear log button Power cycle reboot will not clear event logs 6 2 GATEWAY Under gateway user can configure basic parameters like WAN IP address LAN...

Page 23: ...ess Display the Internet IP address Subnet Mask Display the subnet mask of the Internet IP address Default Gateway Display the default gateway IP address DNS Display the DNS server IP address DHCP Remaining Time Display the remained DHCP lease time before expiration Refresh Click to refresh the information LOCAL SETTINGS Gateway IP Address Display the local IP address of the LAN interface U10C019 ...

Page 24: ... router is working on Private IP Range Display the private IP address assigned to DHCP client Public IP DHCP Server Range Display the Public IP DHCP Server Range Public IP Total Range Public IP DHCP Server Range System Up Time Display the accumulated time since the last power cycle 6 2 2 Basic Setup This page allows configuration of the basic features of the Wireless Cable Modem related to your MS...

Page 25: ...resh Click to refresh the status of this page WAN Connection Type Select to define the WAN connection type DHCP determine the WAN interface to be a DHCP client IP address will be assigned by ISP s DHCP server Static IP need to manually define the IP address PPTP DHCP need to input the PPP username and password and also the PPTP server s IP address Host Name Filled with your host name for the route...

Page 26: ...address Number of CPEs Define the maximum number of CPEs Lease Time Define the DHCP lease time duration Apply Click to save DHCP Clients Client list to show that all of the DHCP client currently connected to the wireless router either via Ethernet link or via wireless connection MAC Address Display the MAC address IP Address Display the IP address Subnet Mask Display the subnet mask Duration Displ...

Page 27: ...to host 001c2351abd4 Force available Click to active this rule 6 2 4 DHCP static Lease This page allows configuration of static lease option for the internal DHCP server for the private LAN Label Description Index Index number of the rule MAC Address Filled in with the MAC address that you want to statically assign this reserved IP address to IP Address Define the reserved IP address for a certain...

Page 28: ...NS service provider www DyDNS org www no ip com UserName Input your DDNS account username subscribed to the service provider Password Password of the account Host Name Input the host name of your host IP address Display the current WAN side Public IP address Status Display the DDNS status Apply Click to save Refresh Click to refresh the page U10C019 U10C020 ...

Page 29: ...ay the system time currently System Start Time Display the accumulated time since system was started Time Server 1 Define the Time server IP address or Domain name Time Server 2 Define the Time server IP address or Domain name Time Server 3 Define the Time server IP address or Domain name Time zone Offset Hours Define the time zone to 8 means GMT 08 1 means GMT 01 Minutes Define the minute offset ...

Page 30: ...er initialized PPTP VPN request to the host located behind the router NAT will make this attempt fail Enable Pass Through is to force the router to redirect the PPTP request to local host Multicast Enable Multicast optimizes the bandwidth utilization compared with unicast Especially video stream application UPnP Enable Select to activate UPnP Be aware that anyone could use an UPnP application to o...

Page 31: ...ll not be able to access Internet through the router Label Description Index Index number of the rule MAC Address MAC address to block Clear Select to delete the rule View Additional Rules Turn to view remained 10 rules Totally 20 rules are supported Apply Click to save 6 2 9 Advanced IP Filtering This page allows configuration of IP address filters in order to block internet traffic to specific n...

Page 32: ...start address End Address Fill in with end address Enabled Select to active the rule Apply Click to save 6 2 10 Advanced Port Filtering This page allows configuration of port filters in order to block specific internet services to all devices on the LAN U10C019 U10C020 ...

Page 33: ...port Protocol Define the protocol type Enabled Select to active the rule Apply Click to save 6 2 11Advanced Forwarding This page allows for incoming requests on specific port numbers to reach web servers FTP servers mail servers etc so they can be accessible from the public internet U10C019 U10C020 ...

Page 34: ...Interface IP Input the public IP address Ext Start Port Define the port that published to Internet Start port Ext End Port Define the port that published to Internet End port Protocol Define the protocol type Enabled Select to enable this rule Apply Click to save Port Map Click to show a list of common application and port Question What s the difference between Internal Port and External Port U10C...

Page 35: ...es on the LAN This allows for special applications that require specific port numbers with bi directional traffic to function properly Applications such as video conferencing voice gaming and some messaging program features may require these special settings Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side With regular port forwardin...

Page 36: ... computer IP address Ubee wireless router associates John s computer IP address with the target port range of 6970 7170 3 The Real Audio server responds to a port number ranging between 6970 7170 4 Ubee router forwards the traffic to John s computer IP address 5 Only John can connect to the Real Audio server until the connection is closed or times out U10C019 U10C020 ...

Page 37: ...ange of ports that a server on the WAN uses when it response to service requests The router forwards the traffic with this port or range of ports to the client computer on the LAN that requested the service Start Port Type a port number or the starting port number in a range of port numbers End Port Type a port number or the ending port number in a range of port numbers Protocol Define the protoco...

Page 38: ...ess Clear Select to delete this rule Apply Click to save 6 2 14 Advanced DMZ Host Exposed Host This page allows configuration of a specific network device to be exposed or visible directly to the WAN public internet This may be used when applications do not work with port triggers U10C019 U10C020 ...

Page 39: ...eless LAN adapters communicating through access points which bridge network traffic to the wired LAN Note U10C020 doesn t support wireless Label Description Wireless MAC Address Display MAC address of wireless router s wireless module Network Name SSID The SSID identifies the Service Set with which a wireless station is associated Wireless stations associating to the wireless router must have the ...

Page 40: ...n your particular region Select a channel from the drop down list box Interface When set to enabled wireless clients can access to the network Apply Click to save Restore Wireless Defaults Click to restore the factory default setting for wireless module 6 3 2 Security This page allows configuration of the WEP keys and or pass phrase U10C019 U10C020 ...

Page 41: ...ess gateway and wireless client As long as the passwords match a client will be granted access to a WLAN WPA WPA2 Encryption Switch to enable and disable WPA WPA2 encryption WPA Pre Shared Key The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials RADIUS Server Input the ...

Page 42: ...th devices 802 1x Authentication Enable to user 802 1x to do authenticate wireless client Network Key 1 You can pre define up to 4 keys for 64 bit or 128 bit 64 bit keys require 10 hexadecimal digits 128 bit key require 26 hexadecimal digits Network Key 2 As above Network Key 3 As above Network Key 4 As above Current Network Key You can select one of the four pre defined keys as the current networ...

Page 43: ...ted device tries to connect to this wireless router user has to input its PIN into current WPS configure page s STA PIN filed Apply Click to make WPS configurations to take effect WPS Method Select WPS mode to be deployed Start WPS If selected push button mode then user only needs to push the button on WPS supported host Then within 2 minutes push this WPS start button to trigger the physical nego...

Page 44: ... list of the wireless client their MAC address should be inputted here manually MAC Addresses Input the MAC address Apply Click to save Connected Clients List of current connected Wireless client MAC Address MAC of the connected wireless client Age s Duration since the wireless client connected to wireless router RSSI dBm Received signal strength in a wireless environment IP Addr Display the IP ad...

Page 45: ...y You can then assign varying levels of privilege to different SSIDs and networks associated Wireless stations can use different SSIDs to associate with the same AP A maximum of four BSSs are allowed on one AP simultaneously 1 for Admin access 3 for Guest Networks You must use different WEP keys for different BSSs If two stations have different SSIDs they are in different BSSs but have the same WE...

Page 46: ...to deploy DHCP server for this guest SSID IP Address This IP address will be the default gateway address for clients connected to this guest network Subnet Mask Define the subnet mask value Lease Pool Start Define the start IP address of this DHCP address pool Lease Pool End Define the last IP address of this DHCP address pool Lease Time Define the lease time for DHCP client Before expiration DHCP...

Page 47: ...ontent encryption VPNs for example can be used to separate the traffic of different user communities over an underlying network with strong security features 6 4 1 VPN Enable After enable or disable VPN feature wireless router needs to reboot to take effect 6 4 2 VPN Summary This page allows user to manage VPN tunnels with centralized view Label Description L2TP Server Wireless router integrated w...

Page 48: ...based VPN that offers flexible solutions for secure data communications across a public network like the Internet IPSec is built around a number of standardized cryptographic techniques to provide confidentiality data integrity and authentication at the IP layer A VPN tunnel is usually established in two phases Each phase establishes a security association SA a contract indicating what security pa...

Page 49: ...not required or not sanctioned by government encryption restrictions an AH can be employed to ensure integrity This type of implementation does not protect the information from dissemination but will allow for verification of the integrity of the information and authentication of the originator ESP Encapsulating Security Payload Protocol The ESP protocol RFC 2406 provides encryption as well as the...

Page 50: ...48 Web User Interface Label Description Tunnel Select the specific VPN tunnel to configure U10C019 U10C020 ...

Page 51: ...this wireless router by WAN IP address IP address FQDN Email address In Aggressive mode VPN concentrator uses to identify incoming SAs by ID type and content since this identifying information is not encrypted to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses In Main mode the ID type and content are encrypted to provide identity...

Page 52: ...c VPN Gateway you can select IP address usually suitable for static public IP address Fully Qualified Domain Name FQDN usually suitable for dynamic public IP address Remote address Input IP address value when choose IP address in Network address type Input FQDN value when selected FQDN in Network address type This filed is used to identify specific remote IPSec VPN gateway which your wireless rout...

Page 53: ...S applies a 128 bit key to 128 bit blocks of data AES is faster than 3DES Here you can have the choice AES 128 AES 192 AES 256 Phase 1 authentication Select which hash algorithm to use to authenticate packet data in the IKE SA Choices are SHA1 and MD5 SHA1 is generally considered stronger than MD5 but it is also slower MD5 Message Digest 5 produces a 128 bit digest to authenticate packet data SHA1...

Page 54: ...oices are Null SHA1 and MD5 SHA1 is generally considered stronger than MD5 but it is also slower Phase 2 SA lifetime Define the length of time before an IPSec SA automatically renegotiates in this field It may range from 120 to 86400 seconds Show Advanced Settings Some advanced IPSec VPN configuration is hidden by default usually you just keep it with no change Key management Key management allows...

Page 55: ...ters on the remote network and vice versa Select this check box to send NetBIOS packets through the VPN connection Dead peer detection Force wireless router to detect if the remote IPSec gateway is available or not periodically Manual Encryption Key If choose Manual in Key Management field you need to input a Manual encryption key for encryption 16 hexadecimal digits Manual Authentication Key Type...

Page 56: ...ncryption Select to enable MPPE Encryption It uses the RSA RC4 encryption algorithm Apply Click to save Users Username Manually input the L2TP PPTP username Password Manually input the L2TP PPTP password Confirm Password Double confirm with the password Add Click to add User List Display existing user list Remove Click to delete a user L2TP Server U10C019 U10C020 ...

Page 57: ...isit only the sites specified in the Allowed Domain List of his her content rule The Parental Control User Setup Page is the master page to which each individual user is linked to a specified time access rule content filtering rule and login password to get to the filtered content Each specified user may also be enabled as a trusted user which means that person will have access to all Internet con...

Page 58: ...ing the user to re login at expiration to continue using the Internet These timed logins insure that a specific user is using the Internet gateway for access and logging access can be provided appropriately Any time a change is made on this page for a particular user the Apply button at the bottom of the page needs to be pressed to activate and store the settings Label Description User configurati...

Page 59: ...ble this privilege after expiration Content Rule Select an existing content rule that defines what kind of website he can visit and what can t be visited White List Access Only Suppose admin has created a content rule which defined black list and while list Then admin can select White List Access Only checkbox to force to execute the policy to the selected user Time Access Rule Select a defined ti...

Page 60: ...eb sites When you change your Parental Control settings you must click on the appropriate Apply Add or Remove button for your new settings to take effect If you refresh your browser s display you will see the currently active settings Label Description Enable Parental Control Enable the checkbox to active the Parental Control feature Apply Click to save Content Policy Configuration Configure conte...

Page 61: ... to delete an existing keyword Blocked Domain List Domain list that s to be blocked Add Domain Click to add a new domain Remove Domain Click to delete an existing domain Allowed Domain List White list which allows users to visit Add Allowed Domain Click to insert new white list Remove Allowed Domain Click to delete the selected URL list 6 5 3 TOD Filter This page allows configuration of time acces...

Page 62: ... a selected rule Enable Select the checkbox to active this time policy rule unselect the checkbox to disable this rule Remove Click to delete a selected rule Days to Block Select the day that this time policy rule limited user to visit Internet Time to Block Define the detailed time for this policy rule All Day Select All Day to eliminate any chance for access within the day blocked Apply Click to...

Page 63: ...urrence Display the time when the last event occurred Action Display what s done by parental control drop or permit an access request Target Display the destination IP address of a certain access request User Display the user who triggered this event log Source Display the source IP address of this event U10C019 U10C020 ...

Page 64: ...sed to protect a trusted network from an untrusted network Of course firewalls cannot solve all of the security problems A firewall is one of the mechanisms used to establish a network security perimeter in support of a network security policy It should never be the only mechanism or method employed For a firewall to guard effectively you must design and deploy it appropriately This requires integ...

Page 65: ...inst Denial of Service attacks Go to the Parental Control page to block internet access to specific sites Label Description Content Filter Settings Filter Proxy A server that acts as an intermediary between a user and the Internet to provide security administrative control and caching service When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by ...

Page 66: ...all function Protection against incoming connection requests on routed subnet Enable firewall to protect all of the routed subnet connected to the wireless router Apply Click to save the configuration Note Block Fragmented IP Packets With this feature enabled all packets are checked to determine if the packet contains a fragment flag If the flag exists the CM will discard the packet This feature i...

Page 67: ...nding Firewall event log E mail Alerts If you enable the alert can appearance when have a new mail Apply Click to submit changes Description Summary of this firewall event log Count If a certain firewall event log repeated for several times value in count will increase Last Occurrence Display the time when the last of the firewall event occurred Target Display the destination IP address of this ac...

Page 68: ...Connections Select to record all of the access attempts that are blocked by firewall Known Internet Attacks Record event log for known attacks from Internet Product Configuration Events Record into event log once device configuration is modified by user or admin SysLog server Define the IP address of the Syslog server Apply Click to make the configuration to take effect 6 7 TOOLS 6 7 1 Ping This p...

Page 69: ... batch ping operation Ping Interval Define the interval between 2 ping operations Start Test Click to start test Abort Test Click to stop test Clear Results Click to clear existing testing result Results This area will display result Refresh Click to refresh old logs 6 7 2 Trace Route This page provides trace route diagnostics to help with IP connectivity problems U10C019 U10C020 ...

Page 70: ...Define the expiration time for this tracert operation Start Test Click to start tracert test Abort Test Click to stop test Clear Results Click to clear existing testing result Results This area will display tracert route operation result Refresh Click to refresh old logs 6 7 3 Client List This page shows connected computer in client list U10C019 U10C020 ...

Page 71: ...splay the method via which the DHCP client is connected to wireless router Refresh Click to refresh the client list 6 7 4 Frequency Scanning Plan Label Description Lowest Center Frequency Display the lowest center frequency Highest Center Frequency Display the highest center frequency Channel Spacing Display spectrum width In US area usually be 6000000Hz In EU area usually be 8000000Hz U10C019 U10...

Page 72: ...that has limited privilege here to modify username for this account New Password Input the value of new password Confirm Password Double confirm with the new password 6 7 6 User Defaults This page allows you to restore factory defaults to the system Label Description Restore Defaults Select to make the wireless router to reset to factory default settings only for firewall and parental settings U10...

Page 73: ...71 Web User Interface U10C019 U10C020 Reset The system Select to do a power cycle reboot ...

Page 74: ...U10C019 U10C020 ...

Reviews: