background image

1

INT-524582-UM-0309-01

Summary of Contents for 524582

Page 1: ...1 INT 524582 UM 0309 01 ...

Page 2: ...tup 26 3 1 System 26 3 1 1 Time Zone 27 3 1 2 Password Settings 27 3 1 3 Remote Management 28 3 2 WAN 30 3 2 1 Dynamic IP Address 30 3 2 2 Static IP Address 30 3 2 3 PPPoE 30 3 2 4 PPTP 30 3 2 5 L2TP 31 3 2 6 Telstra BigPond 31 3 2 7 DNS 31 3 2 8 DDNS 32 3 3 LAN 33 3 4 Wireless 34 3 4 1 Basic 35 3 4 2 Advanced 39 3 4 3 Security 40 3 4 3 1 WEP Only 40 3 4 3 2 802 1x Only 42 3 4 3 3 802 1x WEP Stati...

Page 3: ... 3 8 1 IPSec Server 65 3 8 2 L2TP Server 69 3 8 3 PPTP Server 70 Section 4 Status 72 4 1 Internet Connection 72 4 2 Device Status 73 4 3 System Log 73 4 4 Security Log 74 4 5 Active DHCP Client 74 4 6 Statistics 75 Section 5 Tools 76 5 1 Configuration Tools 76 5 2 Firmware Upgrades 77 5 3 Reset 77 Appendix How to Manually Find IP and MAC Addresses 78 Glossary 79 Specifications 82 ...

Page 4: ...coming traffic and WEP WPA and WPA2 encryption to conceal your information on the wireless LAN from eavesdroppers you can rest assured that you have taken the necessary precautions to protect the data on your network Follow the instructions in this manual and you ll soon be enjoying the benefits of these additional features Compatible with all common DSL and cable Internet service providers Up to ...

Page 5: ...en a computer mounted antenna and a person s body excluding extremities of hands wrists and feet during wireless modes of operation This device complies with Part 15 of FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Any c...

Page 6: ...FTA member states Iceland Liechtenstein Norway and Switzerland EU countries not intended for use none IMPORTANT NOTICE It has recently been discovered that the WAN Idle Time Out auto disconnect function may not work due to abnormal activities of some network application software computer viruses or hacker attacks from the Internet For example some software sends network packets to the Internet in ...

Page 7: ... or cable modem and is linked to the Internet Reset The Reset button allows you to do one of two things If problems occur with your router press the Reset button with a pencil tip for less than 4 seconds and the router will re boot itself keeping your original configurations If problems persist or you experience extreme problems or you forgot your password press the Reset button for more than 4 se...

Page 8: ...ss LAN has activity ACT data being sent WAN10 100M On WAN port 100 Mbps is connected Off WAN port 10 Mbps is connected WAN LNK ACT On WAN is connected Off No WAN connection Flashing WAN port has activity ACT data being sent LAN 10 100M 1 4 On LAN port 100 Mbps is connected Off LAN port 10 Mbps is connected LAN LNK ACT 1 4 On LAN is connected Off No LAN connection Flashing LAN port has activity ACT...

Page 9: ...9 1 3 Setup Diagram The image below depicts a typical setup for a local area network LAN ...

Page 10: ... to Login below By default the router s DHCP is on which means that you can obtain an IP address automatically once you ve configured your PC to do so The procedures for Windows XP and Vista operating systems are presented below For other operating systems Macintosh Sun etc follow the manufacturer s instructions Windows XP 1 Click the Start button and select Settings then click Network Connections...

Page 11: ...the Login section below NOTE Make sure that the Wireless G VPN Router s DHCP server is the only DHCP server available on your LAN Windows Vista 1 Click Start then click Control Panel 2 Click View Network Status and Tasks then click Manage Network Connections 3 Right click Local Area Network then select Properties 4 With the Local Area Connection Properties screen displayed select Internet Protocol...

Page 12: ... automatically and Obtain DNS server address automatically 6 Click OK to confirm the setting Your PC will now obtain an IP address automatically Proceed to the Login section below NOTE Make sure that the Wireless G VPN Router s DHCP server is the only DHCP server available on your LAN ...

Page 13: ...s obtained from your router follow these three steps 1 Enter the default IP address 192 168 2 1 the router s IP address into your PC s Web browser and press Enter 2 When the login screen displays fill in the User Name and Password fields then click OK to log in NOTE By default the username is admin and the password is 1234 For security reasons it s recommended that you change the password as soon ...

Page 14: ...atively you can just configure the General Setup section since the General Setup WAN and the Quick Setup Wizard contain the same configurations Status Information Section 4 This is for monitoring the router s current status information only Tools Section 5 If you want to reset the router because of problems or save your configurations or upgrade the firmware this is the place to do this ...

Page 15: ...ct functions such as Log entries and Firewall settings Parameter Description Set Time Zone Select the time zone of the country you are currently in The router will set its time based on your selection Time Server Address You can manually assign time server address if the default time server dose not work Enable Daylight Saving The router can also take Daylight Saving into account If you wish to us...

Page 16: ...ions that you will be using to connect your router s WAN port to your ISP see screen below Note Different ISPs require different methods of connecting to the Internet Check with your ISP as to the type of connection it requires Menu Description 2 2 2 1 Cable Modem Your ISP will automatically give you an IP address 2 2 2 2 Fixed IP xDSL Your ISP has given you an IP address already 2 2 2 3 PPPoE You...

Page 17: ... ISP connection Click Back to return to the previous screen 2 2 2 1 Cable Modem Choose Cable Modem if your ISP will automatically give you an IP address Some ISPs may also require that you fill in additional information such as Host Name and MAC address see screen below Note The Host Name and MAC address section is optional You can skip this section if your ISP does not require these settings for ...

Page 18: ...tion or use the Clone MAC Address button to replace the WAN MAC address with the MAC address of that PC you have to be using that PC for the Clone MAC Address button to work To find out the PC s MAC address see Appendix A See Glossary for an explanation of MAC address Click OK when you have finished the configuration above You have completed the configuration for the Cable Modem connection You can...

Page 19: ...255 255 0 Click OK when you have finished the configuration above You have completed the configuration for the Fixed IP x DSL connection You can start using the router now 2 2 2 3 PPPoE Select PPPoE if your ISP requires the PPPoE protocol to connect you to the Internet Your ISP should provide all the information required in this section Parameter Description User Name Enter the User Name provided ...

Page 20: ...d due to the idle timeout If the WAN line breaks down and latter links again the router will not auto connect to the ISP Idle Time You can specify an idle time threshold minutes for the WAN port This means if no packets have been sent no one is using the Internet during this specified period the router will automatically disconnect the connection with your ISP Note This idle timeout function may n...

Page 21: ...onnecting to the PPTP server Use the following IP The ISP give you a static IP to be used to connect to address the PPTP server IP Address This is the IP address that your ISP has given you to establish a PPTP connection Subnet Mask Enter the subnet mask provided by your ISP e g 255 255 255 0 Gateway Enter the IP address of the ISP gateway User ID Enter the username provided by your ISP for the PP...

Page 22: ...ace The WAN connection will not disconnected due to the idle timeout If the WAN line breaks down and latter links again the router will not auto connect to the ISP Idle Time You can specify an idle time threshold minutes for the WAN port This means if no packets have been sent no one is using the Internet throughout this specified period then the router will automatically disconnect the connection...

Page 23: ... address in order for you to connect to the Internet This MAC address is the PC s MAC address that your ISP had originally connected your Internet connection to Type in this MAC address in this section or use the Clone MAC Address button to replace the WAN MAC address with the MAC address of that PC you have to be using that PC for the Clone MAC Address button to work To find out the PC s MAC addr...

Page 24: ... and keep connected until the WAN idle timeout The router will close the WAN connection if the time period that no one is using the Internet exceeds the Idle Time If you select Manual the router will connect to the ISP only when you click Connect manually from the Web user interface The WAN connection will not disconnected due to the idle timeout If the WAN line breaks down and latter links again ...

Page 25: ...t Your ISP should provide all the information required in this section Telstra BigPond protocol is used by the ISP in Australia Parameter Description User Name Enter the username provided by your ISP for the Telstra BigPond connection Password Enter the password provided by your ISP for the Telstra BigPond connection User decide login server Select if you want to assign the IP of Telstra manually ...

Page 26: ...screen to start using the Internet General Setup contains advanced features that allow you to configure the router to meet your network s needs such as Wireless Address Mapping Virtual Server Access Control Hacker Attack Prevention Special Applications and DMZ 3 1 System The system screen allows you to specify a time zone to change the system password and to specify a remote management user for th...

Page 27: ...t Saving configuration below Start Daylight Saving Select the period in which you wish to start Daylight Time Saving Time End Daylight Saving Time Select the period in which you wish to end Daylight Saving Time Click Apply at the bottom of the screen to save the above configurations You can now configure other advanced sections or start using the router with the advanced settings in place 3 1 2 Pa...

Page 28: ...orget your password you ll have to reset the router to the factory defaults no password with the Reset button on the router s back panel Click Apply to save the above configurations You can now configure other advanced sections or start using the router with the advanced settings in place 3 1 3 Remote Management This function allows you to designate a host on the Internet so he can configure the r...

Page 29: ...they know the password Click the Enabled box to enable the Remote Management function Note To access the Web based management from a remote site you must enter the router s WAN IP address e g 10 0 0 1 into your Web browser followed by port number 8080 e g 10 0 0 1 8080 as shown below You ll also need to know the password set on the Password Setting screen in order to access the router s Web based ...

Page 30: ...ditional information such as Host Name Domain Name and MAC address see Section 2 2 2 for more details 3 2 2 Static IP Address Select if your ISP has given you a specific IP address for you to use Your ISP should provide all the information required in this section see Section 2 2 2 for more details 3 2 3 PPPoE PPP over Ethernet Select if your ISP requires the PPPoE protocol to connect to the Inter...

Page 31: ...e a Web address into your browser such as www router com a DNS server will find that name in its index and the matching IP address Most ISPs provide a DNS server for speed and convenience If your service provider connects you to the Internet with dynamic IP settings it is likely that the DNS server IP address is provided automatically However if there is a DNS server that you would rather use you ...

Page 32: ...uter supports DynDNS TZO and other common DDNS service providers Parameter Default Description Enable Disable Disable Enable Disable the DDNS function Provider Select a DDNS service provider Domain Name Your static domain name that uses DDNS Account E mail The account that your DDNS service provider assigned to you Password Key The password you set for the DDNS service account above Click Apply at...

Page 33: ...Disabled If this function is enabled this router will use Tree the spanning tree protocol to prevent network looping in the LAN ports DHCP Server Enabled When enabled the router will automatically give your LAN clients an IP address If the DHCP is not enabled you ll need to manually set your LAN clients IP addresses Make sure the LAN client is in the same subnet as this router if you want the rout...

Page 34: ...address outside this IP address pool Domain Name Specify a domain name for your LAN Click Apply at the bottom of the screen to save the above configurations You can now configure other advanced sections or start using the router with the advanced settings in place 3 4 Wireless Wireless Access Point builds a wireless LAN and lets all PCs equipped with an IEEE 802 11b or 801 11g wireless network ada...

Page 35: ...s in place 3 4 1 Basic Settings Set the parameters that are used for the wireless stations to connect to this router The screens for the six Mode options AP Station Ad Hoc Station Infrastructure AP Bridge Point to Point AP Bridge Point to Multi Point and AP Bridge WDS are presented below with the common parameters described after the last screen AP Mode Station Ad Hoc mode ...

Page 36: ...36 Station Infrastructure mode AP Bridge Point to Point mode ...

Page 37: ...37 AP Bridge Point to Multi Point mode AP Bridge WDS mode ...

Page 38: ...int WLAN MAC This is the MAC address used by the wireless interface of this AP when it s in a station mode Clone MAC Click to copy the MAC address of your PC which you re using to configure the AP to the WLAN MAC MAC address To bridge more than one network together with the wireless LAN set this access point to AP Bridge Point to Point AP Bridge Point to Multi Point or AP Bridge WDS Then enter the...

Page 39: ...u select Open System wireless stations can associate with this wireless router without WEP encryption When you select Shared Key you should also set up WEP key on the Encryption screen and wireless stations should use WEP encryption in the authentication phase to associate with this wireless router If you select Auto the wireless client can associate with this wireless router by using either of th...

Page 40: ...ng between IAPP enabled access points within the same wireless LAN 802 11g Protection Also called CTS Protection Enabling this function is recommended as it can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the AP will be a little lower Click Apply at the bottom of the screen to save the above configurations ...

Page 41: ...ey Select one of the four keys to encrypt your data Key 1 Key 4 The WEP keys are used to encrypt data transmitted in the wireless network To place entries in the text fields 64 bit WEP Input 10 digit hex values in the A F a f and 0 9 ranges or 5 digit ASCII code as the encryption keys 128 bit WEP Input 26 digit hex values in the A F a f and 0 9 ranges or 13 digit ASCII codes as the encryption keys...

Page 42: ... server RADIUS Server Port This is the service port of the external RADIUS server RADIUS Server Password Enter the password used for the external RADIUS server Click Apply at the bottom of the screen to save the above configurations You can now configure other sections or start using the router 3 4 3 3 802 1x WEP Static Key IEEE 802 1x is an authentication protocol Every user must use a valid acco...

Page 43: ...Pre Shared Key Wi Fi Protected Access WPA is an advanced security standard You can use a pre shared key to authenticate wireless stations and encrypt data during communication It uses TKIP or CCMP AES to change the encryption key frequently so the encryption key can t easily be broken by hackers which vastly improves your security ...

Page 44: ...and encrypt data transmitted in the wireless network To place entries in the text fields 64 bit WEP Input 10 digit hex values in the A F a f and 0 9 ranges or 5 digit ASCII code as the encryption keys 128 bit WEP Input 26 digit hex values in the A F a f and 0 9 ranges or 13 digit ASCII codes as the encryption keys Click Apply at the bottom of the screen to save the above configurations You can now...

Page 45: ...sed on the other communication peer Enter the IP address of the external RADIUS server RADIUS Server Port This is the service port of the external RADIUS server RADIUS Server Password Enter the password used for the external RADIUS server Click Apply at the bottom of the screen to save the above configurations You can now configure other sections or start using the router 3 4 4 Access Control Thes...

Page 46: ...Service lets you classify Internet application traffic by source destination IP address and port number You can assign a priority for each type of application and reserve bandwidth for it The packets of applications with higher priority will always go first Lower priority applications will get bandwidth after higher priority applications get enough bandwidth As a result you enjoy a better experien...

Page 47: ...ou want to edit and click Edit Then enter the detail form of the QoS rule Click Apply after editing the form and the rule will be saved Adjust QoS rule priority Select the rule and click Move Up to make its priority Higher select the rule and click Move Down to make its priority lower 3 5 1 Edit QoS Rule You can assign packet classification criteria by its local IP range remote IP range traffic ty...

Page 48: ...e of 50 ports Remote IP Address Enter the remote IP address range of the packets this rule will apply to If you assign 192 168 2 3 192 168 2 5 it affects three IP addresses 192 168 2 3 192 168 2 4 and 192 168 2 5 Remote Port Range Enter the remote port range of the packets this rule will apply to You can assign a single port number here or assign a range of port numbers by assigning the first port...

Page 49: ...all protection from hacker attacks and has the flexibility to allow you to map private IP addresses to public IP addresses for key services such as Web sites and FTP sites 3 6 1 Port Forwarding This allows you to re direct a particular range of service port numbers from the Internet WAN ports to a particular LAN IP address It also helps you host some servers behind the router s NAT firewall ...

Page 50: ... below To change or correct an entry before adding it click Clear and re enter Remove Port Forwarding Select the Port Forwarding settings you want to from the table remove from the Current Port Forwarding table and click Delete Selected To remove all Port Forwarding settings from the table click Delete All Click Reset to clear your current selections Click Apply at the bottom of the screen to save...

Page 51: ... Server Client IP Type Select the port number protocol type TCP UDP or Both If unsure leave it to the default Both Public Port Enter the service service Internet application port number from the Internet that will be re directed to the above private IP address host in your LAN Note The Virtual Server function will have priority over the DMZ function if there is a conflict between the Virtual Serve...

Page 52: ...ve configurations You can now configure other sections or start using the router Example of a Virtual Server The diagram below demonstrates one of the ways you can use the Virtual Server function Use the virtual s when you want the Web server located in your private LAN to be accessible to Internet users The configuration below means that any request coming from the Internet to access your Web ser...

Page 53: ...t numbers for this particular application Trigger Type Select whether the outbound port protocol is TCP UDP or Both Public Port Enter the incoming inbound port or port range for this type of application e g 2300 2400 47624 Note Individual port numbers are separated by a comma e g 47624 5775 6541 To input a port range use a hyphen to separate the two port number ranges e g 2300 2400 Public Type Sel...

Page 54: ... all settings from the table click Delete All Click Reset to clear your current selections Click Apply at the bottom of the screen to save the above configurations You can now configure other sections or start using the router Example of Special Applications If you need to run applications that require multiple connections specify the port outbound normally associated with that application in the ...

Page 55: ...he feature all client systems that support UPnP like Windows XP can discover this router automatically and access the Internet through this router without any configuration The NAT Traversal function provided by UPnP can allow applications that support UPnP smoothly connect to Internet sites without any incompatibility problem due to the NAPT port translation Click Apply at the bottom of the scree...

Page 56: ...s through the NAT gateway Click Apply at the bottom of the screen to save the above configurations You can now configure other sections or start using the router 3 6 6 Static Routing This router makes the Static Routing function available when NAT is disabled With Static Routing the router can forward packets according to your routing rules Note The IP sharing function and the DMZ function of the ...

Page 57: ...N Interface Select the interface that goes to the next hop router Add a Rule Fill in the Destination LAN IP Subnet Mask Default Gateway Hop Count and Interface of the rule to be added and click Add This rule will then be added into the Static Routing Table below To change or correct an entry before adding it click Reset to clear the fields then re enter Remove a Rule To remove some routing rules f...

Page 58: ...uire unrestricted access to the Internet you can configure a specific client server as a Demilitarized Zone DMZ Note To enable the Firewall settings select Enable and click Apply 3 7 1 Access Control Access Control allows you to define the traffic type permitted in your LAN and restrict users from accessing certain Internet applications services You can control which PC client can have access to t...

Page 59: ...ove a PC from the MAC Filtering Table select it and click Delete Selected To remove all PCs from the table click Delete All To clear the selection and re select click Reset Enable IP Filtering Table Select to filter client PCs by IP addresses Deny Select for all PCs to be allowed Internet access except for the PCs in the table below Allow Select for all PCs to be denied Internet access except for ...

Page 60: ...nt to apply to this Access Control rule This is the user s IP address es that you want to set up an Access Control rule for Note You need to give your LAN PC clients a fixed static IP address for the Access Control rule to work properly Client PC Service You can block clients from accessing some Internet services by checking those you want to block Protocol Select UDP TCP or Both ...

Page 61: ... to clear all fields Click Apply Changes at the bottom of the screen to save the above configurations You can now configure other sections or start using the router Example Access Control In the example below LAN client A can only access websites that use Port 80 However LAN client B is able to access websites and any other service that uses ports between 80 and 999 ...

Page 62: ...click Add You can enter the full URL address or the keyword of the Web site you want to block To change or correct an entry before adding it click Reset and re enter Remove URL Keyword To remove a URL keyword from the Current URL Blocking Table select it in the table and click Delete Selected To remove all URL keywords from the table click Delete All To clear the selection and re select click Rese...

Page 63: ...on Detection Feature Description Ping of Death Protects from Ping of Death attack Discard Ping From WAN The router s WAN port will not respond to any Ping requests Port Scan Protects the router from Port Scan Sync Flood Protects the router from Sync Flood attack Click Apply at the bottom of the screen to save the above configurations You can now configure other sections or start using the router ...

Page 64: ...Z re directs all packets regardless of services going to your WAN IP address to a particular LAN client server Parameter Description Enable DMZ Select to enable the function Note If there is a conflict between the Virtual Server and the DMZ settings the Virtual Server function will have priority over the DMZ function Public IP Address Enter the IP address of the WAN port or any other public IP add...

Page 65: ...led router It allows your home computer to be connected to your office network or can allow two home computers in different locations to connect to each over the Internet Note To enable the VPN settings select Enable and click Apply 3 8 1 IPSec Server IPSec IP Security Protocol is an extended IP protocol that enables secure data transfer It provides services similar to SSL TLS however these servic...

Page 66: ...SA Public Key Click to show the RSA public key below Current VPN Connection This table shows the current tunnel settings and the Table status of each tunnel The maximum number of tunnels is 10 WAN IP Shows the current WAN IP for this VPN server Edit a VPN Connection Select the connection you want to edit and click Edit You will enter the detail screen for the Tunnel Setting below Click Apply Chang...

Page 67: ...te or subnet Remote Site Choose a type for the remote site single site subnet any address any NAT Traversal address or L2TP client When you choose single site or subnet you need to specify the remote IP address Network Management Choose the key exchange method IKE or Manual Advanced Click for the advanced setting screen for IKE below Connection Type Select Initiator and the tunnel will automatical...

Page 68: ...the bottom of the screen to save the above configurations You can now configure other sections or start using the router Advanced VPN Setting Parameter Description Encryption Choose the encryption type with the remote peer 3DES or AES128 Note If you choose the wrong method the connection may not be established Hash Authentication Choose the hash method with the remote peer MD5 or SHA1 Note If you ...

Page 69: ...ect data transmission are not used to derive additional keys Also seeds used to create data transmission keys are not re used Click OK at the bottom of the screen to save the above configurations 3 8 2 L2TP Server The Layer Two Tunneling Protocol L2TP is an extension of the Point to Point Tunneling Protocol PPTP By enable this server you can enable the operation of a virtual private network VPN ov...

Page 70: ...or WAN IP Client IP Pool Specify the IP address for L2TP clients to use Authentication Select PAP CHAP or MSCHAP VPN Users Enter up to 10 usernames and passwords for the L2TP PPTP clients Click Apply at the bottom of the screen to save the above configurations 3 8 3 PPTP Server PPTP is a protocol from Microsoft that is used to create a virtual private network VPN over the Internet It uses Microsof...

Page 71: ...be different from the LAN IP or WAN IP Client IP Pool Specify the IP address for PPTP clients to use Authentication Select PAP CHAP or MSCHAP Encryption When you choose MSCHAP for Authentication you can use MPPE Microsoft s Point to Point Encryption to encrypt the PPTP connection VPN Users Enter up to 10 usernames and passwords for the L2TP PPTP clients Click Apply at the bottom of the screen to s...

Page 72: ... attempts to access your network information on all DHCP client PCs currently connected to your network and more 4 1 Internet Connection View the router s current Internet connection status and other related information such as whether the WAN port is connected to a cable DSL connection the WAN IP address subnet mask and ISP gateway and the primary and secondary DNS being used ...

Page 73: ...ections such as the LAN port s current LAN IP address and subnet mask and whether the DHCP Server function is enabled or disabled 4 3 System Log View the operation log of the system including any event that has occurred since system startup When the system is powered down the system log will disappear if not saved to a local file ...

Page 74: ...wn the security log will disappear if not saved to a local file Parameter Description Save Click to save the security log to a local file for further processing Clear Click to clear the log entries Refresh Click to get the most updated situation 4 5 Active DHCP Client View your LAN client s information that is currently linked to the router s DHCP server The Active DHCP Client Table displays the I...

Page 75: ...75 4 6 Statistics View the statistics of packets sent and received on WAN LAN and wireless LAN Click Refresh to get the most updated situation ...

Page 76: ... Tools This screen allows you to save back up the router s current configuration which provides added protection and convenience should problems occur and you need to reset to factory defaults When the configuration has been saved you can re load the settings into the router Parameter Description Back Up Settings Click Save to save the router s current configuration to a file named config bin on y...

Page 77: ...your PC Once you ve selected the new firmware file click Apply at the bottom of the screen to start the upgrade process You may have to wait a few minutes for the upgrade to complete Once the upgrade is complete you can start using the router 5 3 Reset The reset function essentially re boots your router s system which may be necessary in the event the system stops responding correctly or in some w...

Page 78: ...r PCs IP and MAC addresses 1 In Windows open the Command Prompt program 2 Type Ipconfig all and press Enter Your PC s IP address 192 168 1 77 The router s IP address Default Gateway 192 168 1 254 Your PC s MAC address Physical Address 00 50 FC FE 02 DB ...

Page 79: ...ve data around at up to 10 100 million bits per second Mbps Idle Timeout Idle Timeout is designed so that after there is no traffic to the Internet for a pre configured amount of time the connection will automatically be disconnected IP Address and Network Subnet Mask IP stands for Internet Protocol An IP address consists of a series of four numbers separated by periods that identifies a single un...

Page 80: ...ata that corresponds to the Manufacturer ID unique for each manufacturer plus 3 bytes often used as the product s serial number NAT Network Address Translation This process allows all of the computers on your home network to use one IP address Using this router s NAT capability you can access the Internet from any computer on your home network without having to purchase more IP addresses from your...

Page 81: ...bers recognized by the Internet which must be assigned by InterNIC TCP IP UDP Transmission Control Protocol Internet Protocol TCP IP and Unreliable Datagram Protocol UDP TCP IP is the standard protocol for data transmission over the Internet Both TCP and UDP are transport layer protocols TCP performs proper error detection and error recovery and thus is reliable UDP on the other hand is not reliab...

Page 82: ...N ports with Auto MDI MDI X Flash 4 MB Memory 16 MB SDRAM Certifications FCC Class B CE Mark RoHS Router Chipset Realtek RTL8186 Supported WAN connection types Dynamic IP DHCP for cable service Static IP PPPoE for DSL PPTP L2TP Telstra BigPond Protocols CSMA CA CSMA CD TCP IP UDP ICMP PPPoE NTP NAT network address translation DHCP DNS NAT Port forwarding Virtual server Special applications port tr...

Page 83: ...CK 17 dBm 1 dBm 11 Mbps 50 mW max Maximum coverage distance 100 m 300 ft indoor 300 m 900 ft outdoor Wireless security WEP encryption 64 128 bit WPA TKIP WPA2 AES WPA2 mixed WPA RADIUS Client access control through media access control MAC filter Antenna single detachable dipole antenna with RP SMA connector 2 dBi gain VPN Supports VPN PPTP and IPsec pass through 10 VPN user accounts VPN server pr...

Page 84: ... x 3 9 x 1 2 in Weight 0 8 kg 1 7 lbs Operating temperature 0 40 C 32 104 F Operating humidity 10 90 RH non condensing Storage temperature 20 60 C 4 149 F Power External power adapter 12 V DC 1 0 A Power consumption 5 5 Watts max Package Contents Wireless G 4 Port VPN Router User manual Power adapter Ethernet Cat5 RJ45 cable 1 0 m 3 ft ...

Reviews: