background image

118

G

LOSSARY

WLAN

Wireless Local Area Network. A WLAN is a group of computers and 
devices connected together by wireless in a relatively small area (such as a 
house or office).

WPA

Wi-Fi Protected Access. A dynamically changing encryption mechanism 
for wireless networking. Encryption strength is 256 bit.

Содержание 3CRWER101A-75

Страница 1: ...http www 3Com com Part No 10016641 Rev AA Published March 2008 Wireless 11g Cable DSL Router User Guide WL 550 3CRWER101U 75 3CRWER101E 75 3CRWER101A 75 ...

Страница 2: ...umentation contained in or delivered to you in conjunction with this User Guide Unless otherwise indicated 3Com registered trademarks are registered in the United States and may or may not be registered in other countries 3Com and the 3Com logo are registered trademarks of 3Com Corporation Intel and Pentium are registered trademarks of Intel Corporation Microsoft MS DOS Windows and Windows NT are ...

Страница 3: ... Minimum System and Component Requirements 12 Physical Features 12 2 INSTALLING THE ROUTER Introduction 17 Positioning the Router 17 Powering Up the Router 18 Connecting the Router to the Internet 18 Connecting the Router to LAN 18 Setting up your computers for networking with the Router 20 3 SETTING UP YOUR COMPUTERS Obtaining an IP Address Automatically 23 Windows 2000 23 Windows XP 23 Windows V...

Страница 4: ...on Settings 32 5 CONFIGURING THE ROUTER Navigating Through the Router Configuration screens 39 Main Menu 39 Network Settings 39 Status 39 LAN Settings 41 WAN Settings 43 Wireless 48 Firewall 57 Schedule Rule 58 Access Control 60 MAC Filter 62 URL Filtering 63 Intrusion Detection 64 DMZ 69 Maintenance 70 Configuration Tools 70 Firmware Upgrade 71 Restart Router 72 Advanced Settings 72 NAT 73 ...

Страница 5: ...e Internet 90 Forgotten Password and Reset to Factory Defaults 90 Wireless Networking 91 Recovering from Corrupted Software 93 Frequently Asked Questions 94 A IP ADDRESSING The Internet Protocol Suite 95 Managing the Router over the Network 95 IP Addresses and Subnet Masks 95 How does a Device Obtain an IP Address and Subnet Mask 97 DHCP Addressing 97 Static Addressing 97 Auto IP Addressing 97 ...

Страница 6: ...TECHNICAL SPECIFICATIONS Wireless 11g Cable DSL Router 99 Standards 100 System Requirements 100 C END USER SOFTWARE LICENSE AGREEMENT D OBTAINING SUPPORT FOR YOUR PRODUCT GLOSSARY REGULATORY NOTICES INDEX ...

Страница 7: ... is shipped with the 3Com Wireless 11g Cable DSL Router and contains information that differs from the information in this guide follow the information in the release note Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format PDF on the 3Com World Wide Web site http www 3Com com Naming Convention Throughout this guide the 3Com Wireless 11g Cable DSL Rout...

Страница 8: ...njury Table 2 Text Conventions Convention Description The words enter and type When you see the word enter in this guide you must type something and then press Return or Enter Do not press Return or Enter when an instruction simply says type Keyboard key names If you must press two or more keys simultaneously the key names are linked with a plus sign Example Press Ctrl Alt Del Words in italics Ita...

Страница 9: ... Document title Document part number on the title page Page number if appropriate Example 3Com Wireless 11g Cable DSL Router User Guide Part Number 149100059700J Rev AA Page 24 Do not use this e mail address for technical support questions For information about contacting Technical Support please refer to Appendix C Related Documentation In addition to this guide each Router document set includes ...

Страница 10: ...8 ABOUT THIS GUIDE ...

Страница 11: ...vide a cost effective means of sharing a single broadband Internet connection amongst several wired and wireless computers The Router also provides protection in the form of an electronic firewall preventing anyone outside of your network from seeing your files or damaging your computers The Router can also prevent your users from accessing Web sites which you find unsuitable Figure 1 shows an exa...

Страница 12: ...When you use the Router in your network Figure 2 it becomes your connection to the Internet Connections can be made directly to the Router or to an OfficeConnect Switch expanding the number of computers you can have in your network Figure 2 Example Network Using a Firewall Router ...

Страница 13: ...tion of all network address settings DHCP Acts as a Virtual server to enable remote access to Web FTP and other services on your network Security Firewall protection against Internet hacker attacks and encryption to protect wireless network traffic Package Contents The Router kit includes the following items One Wireless 11g Cable DSL Router One power adapter for use with the Router One Ethernet c...

Страница 14: ... 10 100 Mbps NIC for each computer to be connected to the four port switch on your Router OR An 802 11b or 802 11g wireless NIC Internet access from your local telephone company or Internet Service Provider ISP using a DSL modem or cable modem A Web browser that supports JavaScript such as Netscape 4 7 or higher Internet Explorer 5 0 or higher or Mozilla 1 2 1 or higher Physical Features The top p...

Страница 15: ... LED is flashing the link is OK and data is being transmitted or received If the LED is off the WAN has been disabled in the Router or there is a problem Refer to Chapter 6 Troubleshooting 4 LAN Status LEDs Green If the LED is on the link between the port and the next piece of network equipment is OK If the LED is flashing the link is OK and data is being transmitted or received If the LED is off ...

Страница 16: ...ature which means either straight through or a crossover cable can be used 7 Power Adapter Socket Only use the power adapter that is supplied with this Router Do not use any other adapter 8 Wireless Antenna Be sure the detachable external antenna is connected to the Router before setting up your wireless LAN Try to place the Wireless 11g Router in a position that is located in the center of your w...

Страница 17: ...t All of your settings will remain upon restarting Push for 8 seconds to reset the Router to the factory default settings To perform a system reset without losing configuration settings click the Restart Router button on the web management screen The configurations that you have set previously will not be changed back to the factory default settings Refer to Restart Router ...

Страница 18: ...16 CHAPTER 1 INTRODUCING THE ROUTER ...

Страница 19: ...hat will connect to the Router A suitable location might be on top of a high shelf or similar furniture to optimize wireless connections to computers in both horizontal and vertical directions allowing wider coverage allows convenient connection to the computers that will be connected to the four LAN ports on the rear panel if desired allows easy viewing of the top panel LED indicator lights and a...

Страница 20: ... the Router 2 Plug the power adapter into a standard electrical wall socket Connecting the Router to the Internet Prepare an Ethernet cable for connecting the WAN port of the Wireless 11g Router to the RJ 45 port of the broadband xDSL or cable modem See Figure 6 Figure 6 Connecting the Router to the Internet Connecting the Router to LAN The four LAN ports on the Router auto negotiate the connectio...

Страница 21: ...d See Figure 7 Figure 7 Connecting the LAN You have now completed the hardware installation of your Router Next you need to set up your computers so that they can make use of the Router to communicate with the Internet 3Com recommends that you perform the initial Router configuration from a computer that is directly connected to one of the LAN ports If you configure the Router from a wireless comp...

Страница 22: ...ith a wireless adapter can communicate with each other as an independent wireless LAN by configuring each computer to the same radio channel However the Router can provide access to your wired wireless LAN or to the Internet for all wireless workstations Each wireless PC in this network infrastructure can talk to any computer in the wireless group via a radio link or access other computers or netw...

Страница 23: ...Setting up your computers for networking with the Router 21 Figure 8 WLAN Connections ...

Страница 24: ...22 CHAPTER 2 INSTALLING THE ROUTER ...

Страница 25: ...ased computer use the following procedure to change your TCP IP settings 1 From the Windows Start Menu select Settings Control Panel 2 Double click on Network and Dial Up Connections 3 Double click on Local Area Connection 4 Click on Properties 5 Select Internet Protocol TCP IP and click on Properties 6 Ensure that the options Obtain an IP address automatically and Obtain DNS server address automa...

Страница 26: ...tion Status will appear 5 A screen similar to Figure 9 should be displayed Select Internet Protocol TCP IP and click on Properties Figure 9 Local Area Connection Properties Screen 6 Ensure that the options Obtain an IP address automatically and Obtain DNS servers automatically are both selected as shown in Figure 10 Click OK ...

Страница 27: ... From the Windows Start Menu select Settings Network 2 Click on Organize Select Properties 3 Click on Manage network Connections 4 Double click Local Area Connection Select Properties and click continue 5 A screen similar to Figure 11 should be displayed Select Internet Protocol Version 6 Version 4 TCP IPv6 v4 and click on Properties ...

Страница 28: ...rea Connection Properties Screen 6 Ensure that the options Obtain an IPv6 v4 address automatically and Obtain DNS servers address automatically are both selected as shown in Figure 12 Click OK Figure 12 Internet Protocol Version 6 TCP IPv6 Properties Screen ...

Страница 29: ...ng procedure to change your TCP IP settings 1 From the desktop select Apple Menu Control Panels and TCP IP 2 In the TCP IP control panel set Connect Via to Ethernet 3 In the TCP IP control panel set Configure to Using DHCP Server 4 Close the TCP IP dialog box and save your changes 5 Restart your computer ...

Страница 30: ...Tab A screen similar to Figure 13 should be displayed 4 Select the Never dial a connection option Figure 13 Internet Properties Screen You may want to remove the PPPoE client software from your computer to free resources as it is not required for use with the Router Disabling Web Proxy Ensure that you do not have a web proxy enabled on your computer Go to the Control Panel and click on Internet Op...

Страница 31: ...5 or higher or Mozilla 1 2 1 or higher To use the Setup Wizard 1 Ensure that you have at least one computer connected to the Router Refer to Chapter 2 for details on how to do this 2 Launch your Web browser on the computer 3 Enter the following URL in the location or address field of your browser http 192 168 1 1 Figure 14 The Login screen displays Figure 14 Web Browser Location Field Factory Defa...

Страница 32: ...eld and click Log in Figure 15 Figure 15 Router Login Screen 5 When you have logged in if you are logging in for the first time the Country Selection screen will appear Figure 16 Please select the country form the drop down menu and click Apply Figure 16 Country Selection Screen The Status page will then launch automatically refer to Figure 17 ...

Страница 33: ...ed to the following screen and configure your Wireless Settings Setup Wizard Wireless Settings The Wireless Settings screen allows you to set up your wireless network settings You must specify a common radio channel and SSID Service Set ID to be used by the Router and all of its wireless clients Be sure you configure all of its clients to the same value For security purposes you should change the ...

Страница 34: ...des 11g only 11b only and 11b g mixed mode Default 11b g mixed mode Wi Fi Channel Number The radio channel used by the Router and its clients to communicate with each other This channel must be the same on the Router and all of its wireless clients The Router will automatically assign itself a radio channel or you may select one manually Default 6 Extend Range Increases the range of the Router Def...

Страница 35: ...TP Point to Point Tunneling Protocol providing virtual private networks see page 36 Static IP Address manually assigning IP addresses for clients see page 37 BigPond Australia s largest ISP providing Internet access via ADSL 2 Cable Next G and Dial up page 37 and click Next For further information on selecting a mode see WAN Settings on page 43 Dynamic IP Address Mode For Multiple PCs You can conf...

Страница 36: ...ou to input a Host Name type it in the Host Name field The MAC Address field will be filled automatically Check all of your settings Click NEXT to proceed or BACK to change your settings PPPoE Mode To set up the Router for use with a PPP over Ethernet PPPoE connection use the following procedure ...

Страница 37: ...ssword in the Password field 3 Re type your password in the Please retype your password field 4 If your ISP has provided you with a Service Name enter it in the Service Name field otherwise leave it blank 5 Leave the Maximum Transmission Unit MTU at the default value 1492 unless you have a particular reason to change it ...

Страница 38: ...NEXT to proceed or BACK to change your settings PPTP Mode To set up the Router for use with a PPTP connection use the following procedure Figure 22 PPTP Mode Screen 1 Enter the IP Address information required by your ISP in the appropriate fields 2 Enter the User ID and Password required by your ISP 3 Enter the IP Address of the PPTP gateway as provided by your ISP 4 Enter the Idle Time Out for th...

Страница 39: ...If your Service Provider has assigned a fixed IP address enter the assigned IP address information on the screen Figure 23 Static IP Address Screen To assign a fixed IP address 1 Enter your Internet IP address in the IP address field 2 Enter the subnet mask in the Subnet Mask field 3 Enter the default gateway IP address in the Gateway IP Address field 4 Check all of your settings 5 Click NEXT to p...

Страница 40: ...2 Enter your password in the Password field 3 Re type your password in the Please retype your password field 4 Enter the Service Name provided by your ISP in the Authentication Service Name field 5 Check all of your settings 6 Click NEXT to proceed or BACK to change your settings Your Router is now configured and ready for use See Chapter 5 for a detailed description of the Router configuration ...

Страница 41: ...d to login to the management interface The default password is admin Main Menu Clicking the Home button at any time returns you to this home page The Home screen shows the current software information The main menu is located on the left side as shown in Figure 25 When you click on an item from the main menu the corresponding screen will then appear in the center Network Settings Status The Status...

Страница 42: ... the current time INTERNET Displays WAN connection type and status Release Click on this button to disconnect from the WAN Renew Click on this button to establish a connection to the WAN Network LAN Displays system IP settings as well as DHCP Server Firewall UPnP and Wireless status ...

Страница 43: ...er is equipped with a DHCP server that will automatically assign IP addresses to each computer on your network The factory default settings for the DHCP server will work with most applications If you need to make changes to the settings you can do so The LAN settings screen allows you to Change the default IP address of the Router The default IP is 192 168 1 1 Change the Subnet Mask The default se...

Страница 44: ...1 1 2 If you want to use the Router as a DHCP Server select Enabled in the DHCP Server field 3 Enter the IP address range of Start IP and End IP in the IP Address Pool fields 4 Specify the Local Domain Name for your network this step is optional 5 Specify the DHCP Lease time by selecting the required value from the Lease Time drop down menu The lease time is the length of time the DHCP server will...

Страница 45: ...set the detailed settings There are five options available for the DSL connection mode Dynamic IP Mode for multiple PCs see page 43 PPPoE PPP over Ethernet providing routing for multiple PCs see page 44 PPTP PPP providing routing for multiple PCs see page 45 Static IP Mode for multiple PCs see page 46 BigPond providing Internet access for Australian users see page 47 Dynamic IP For Multiple PCs To...

Страница 46: ...Click SAVE SETTINGS PPPoE PPP over Ethernet provides routing for multiple PCs To configure this function correctly you should obtain the information from your ISP Figure 28 PPPoE Settings Screen 1 Enter the user name assigned to you by your ISP in the User name field And enter the password assigned to you by your ISP in the Password field Re enter your password in the Please retype your password f...

Страница 47: ... Click SAVE SETTINGS PPTP PPTP is a popular choice among European DSL providers To configure this function correctly you should obtain the information from your ISP Figure 29 PPTP Settings Screen 1 Enter the IP Address information required by your ISP in the appropriate fields 2 Enter the User ID assigned to you by your ISP in the User ID field And enter the password assigned to you by your ISP in...

Страница 48: ...as you try to access the Internet again or to keep the session alive 5 Click SAVE SETTINGS Static IP For Multiple PCs To configure the Static IP Address mode correctly you should obtain the information on this screen from your ISP Figure 30 Static IP Address Mode Screen 1 If your Service Provider has assigned a fixed IP address enter the assigned IP address subnet mask and the gateway address into...

Страница 49: ...a service provider in Australia that uses a heartbeat system to maintain the Internet connection Figure 31 BigPond Mode Screen 1 Configure the built in client with your user name password and service name to get online 2 Click SAVE SETTINGS ...

Страница 50: ... for your LAN When disabled no wireless PCs can gain access to either the Internet or other PCs on your wired or wireless LAN through this Router Figure 32 Wireless Settings Screen To use the wireless feature check the Enable checkbox and click SAVE SETTINGS After clicking SAVE SETTINGS you will be asked to log in again There are five items available Channel and SSID Wireless Security Access Contr...

Страница 51: ...should give your wireless network a unique name 2 Enable or disable Broadcast Wireless Network Name A feature of many wireless network adapters is that a computer s SSID can be set to ANY which means it looks randomly for any existing wireless network The available networks are then displayed in a site survey and your computer can select a network By clicking Disable you can block this random sear...

Страница 52: ...Router 6 Click SAVE SETTINGS Wireless Security This feature prevents any non authorized party from reading or changing your data over the wireless network Figure 34 Wireless Security Screen Select the wireless security mode that you want to use from the drop down menu and click SAVE SETTINGS There are three selections No WEP No WPA WPA2 see page 51 WEP Only see page 51 WPA WPA2 see page 52 ...

Страница 53: ...chanism to transmit your data securely over the wireless network Matching encryption keys must be setup on your Router and wireless client devices to use WEP Figure 35 WEP Only Screen To enable 64 bit WEP 1 You can enter the 64 bit WEP key manually enter the WEP key as 5 pairs of hex digits 0 9 A F Or you can generate the 64 bit WEP key automatically enter a memorable passphrase in the Passphrase ...

Страница 54: ... key manually enter your WEP key as 13 pairs of hex digits 0 9 A F Or you can generate the 128 bit WEP key automatically enter a memorable passphrase in the Passphrase box to generate a hex key automatically from the passphrase The WEP keys on each device on the wireless network must be identical In 128 bit WEP mode only one WEP key can be specified 2 Click SAVE SETTINGS WPA WPA2 Only WPA Wi Fi Pr...

Страница 55: ...WPA2 Only 3 Select 802 1X or Pre shared Key for the authentication method 802 1X for the enterprise network with a RADIUS server Pre shared key for the SOHO network environment without an authentication server 4 Select the key type to be used in the Pre shared Key 5 Type the key in the Pre shared Key field 6 Set the period of renewing the broadcast multicast key in the Group Key Re_Keying field 7 ...

Страница 56: ... MAC address field if you click Allow this means only the MAC addresses registered here in the list will be allowed to access the Router via wireless link if you click Deny this means the registered MAC addresses will not be able to access the Router via wireless link Use the MAC Address Filtering List to quickly copy the MAC addresses of the current wireless clients into the list table You can de...

Страница 57: ... time in seconds that a session will sit inactive before terminating Set to 0 if you do not want the session to timeout Default 300 seconds Re Authentication Period The interval time in seconds after which the client will be asked to re authenticate For example if you set this to 30 seconds the client will have to re authenticate every 30 seconds Set to 0 for no re authentication Default 3600 seco...

Страница 58: ...ines the request identifier of the Network Access Server The use of IEEE 802 1X offers an effective framework for authenticating and controlling user traffic to a protected network as well as dynamically varying encryption keys 802 1X ties EAP Extensible Authentication Protocol to both the wired and wireless LAN media and supports multiple authentication methods such as token cards Kerberos one ti...

Страница 59: ...ault Disable WDS implementation varies from vendor to vendor Hence there s no assured WDS interoperability with between all devices in the market Firewall From these screens you can configure settings for the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including Ping of Death PoD and Denial of Service DoS attacks You ca...

Страница 60: ... Enable the firewall feature and click SAVE SETTINGS to proceed Schedule Rule The Router can be configured to restrict access to the Internet email or other network services at specific days and times Each access control rule may be activated at a scheduled time First define the schedule time on the Schedule Rule page then apply the rule on the Access Control screen see page 60 ...

Страница 61: ...chedule Rule Screen 1 Click Add Schedule Rule to add a schedule rule a screen similar to Figure 42 will appear Figure 42 Add Schedule Rule Screen 2 Enter a name and comment for the schedule rule in the Name and Comment fields ...

Страница 62: ...ervices at specific days and times Restriction can be set for a single computer a range of computers or multiple computers You can define the traffic type permitted or not permitted to the Internet Figure 43 Access Control Screen To edit or delete specific existing filtering rules click on Edit or Delete for the appropriate filtering rule To configure a new filtering rule 1 Check the Enable Filter...

Страница 63: ...range into the Client PC IP Address fields 4 Select the services to be blocked A list of popular services is given on this screen to block a particular service check the appropriate Blocking checkbox If the service to be restricted is not listed here you can enter a custom range of ports at the bottom of the screen under User Defined Service ...

Страница 64: ...creen see page 58 6 Click OK to add the settings MAC Filter Use the MAC Filtering to block access to your network using MAC addresses Figure 45 MAC Filter Screen The Router can also limit the access of hosts within the local area network LAN The MAC Filtering Table allows the Router to enter up to 32 MAC addresses that are allowed access to the WAN port All other devices will be denied access By d...

Страница 65: ...tring xxx Figure 46 URL Filtering Screen Enter the URL address or keywords in the URL Keyword field You can define up to 30 sites or keywords here To complete this configuration you will need to create or modify an access rule in Access Control Add PC on page 60 To modify an existing rule click the Edit option next to the rule you want to modify To create a new rule click on the Add PC option From...

Страница 66: ...ects packets at the application layer maintains TCP and UDP session information including timeouts and number of active sessions and provides the ability to detect and prevent certain types of network attacks such as Denial of Service DoS attacks Figure 47 Intrusion Detection Screen ...

Страница 67: ...users no longer have access to network resources The Router protects against DoS attacks including Ping of Death Ping flood attack SYN flood attack IP fragment attack Teardrop Attack Brute force attack Land Attack IP Spoofing attack IP with zero length TCP null scan Port Scan Attack UDP port loopback Snork Attack The firewall does not significantly affect system performance so we advise enabling t...

Страница 68: ...ish to use Stateful Packet Inspection SPI for blocking packets click on the Yes radio button in the Enable SPI and Anti DoS firewall protection field and then check the inspection type that you need such as Packet Fragmentation TCP Connection UDP Session FTP Service and TFTP Service It is called a stateful packet inspection because it examines the contents of the packet to determine the state of t...

Страница 69: ...fore dropping the session TCP FIN wait 5 secs Specifies how long a TCP session will be managed after the firewall detects a FIN exchange TCP connection idle timeout 3600 secs 1 hour The length of time for which a TCP session will be managed if there is no activity UDP session idle timeout 30 secs The length of time for which a UDP session will be managed if there is no activity DoS Detect Criteria...

Страница 70: ...secs Length of time before an incomplete TCP UDP session is detected as incomplete Maximum half open fragmentation packet number from same host 30 sessions Maximum number of half open fragmentation packets from the same host Half open fragmentation detect sensitive time period 1 sec Length of time before a half open fragmentation session is detected as half open Flooding cracker block time 300 sec...

Страница 71: ... Internet access This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application Figure 48 DMZ Screen Enter the IP address of a DMZ Demilitarized Zone host on this screen Adding a client to the DMZ may expose your local network to a variety of security risks so only use this option as a last resort ...

Страница 72: ...lost or changed It is recommended that you backup your current configuration before performing a firmware update Restore from saved Configuration file backup bin The restore option will allow you to restore a previously saved configuration Check the Restore from saved Configuration file radio button and click NEXT to restore the saved backup configuration file Restore Wireless Router to Factory De...

Страница 73: ...uter s firmware Firmware updates contain improvements and fixes to problems that may have existed Figure 50 Firmware Upgrade Screen Please download the firmware file to your PC first and then click Browse and select the firmware file Click BEGIN UPGRADE to upload the firmware to the Router ...

Страница 74: ...nfigure NAT Shares a single ISP account with multiple users sets up virtual servers System Sets the local time zone the password for administrator access the IP address of a PC that will be allowed to manage the Router remotely and the IP address of a Domain Name Server UPnP Universal Plug and Play UPnP allows for simple and robust connectivity between external devices and your PC DNS Specify the ...

Страница 75: ...ows all of the computers on your home network to use one IP address Using the NAT capability of the Router you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP Figure 52 NAT Screen To use the NAT feature 1 Check the Enable radio button 2 Click SAVE SETTINGS ...

Страница 76: ... mapped to a pool of local addresses Virtual Servers The Virtual servers feature allows you to route external Internet calls for services such as a web server port 80 FTP server Port 21 or other applications through your Router to your internal network Since your internal computers are protected by a firewall machines from the Internet cannot get to them because they cannot be seen If you need to ...

Страница 77: ...o the table To manually configure your virtual servers 1 Enter the IP address and the description in the spaces provided for the internal machine 2 Select the protocol type TCP UDP or both TCP and UDP from the drop down menu 3 Specify the public port that will be seen by clients on the Internet and the LAN port which the traffic will be routed to 4 You can enable or disable each Virtual Server ent...

Страница 78: ...puter in the DMZ 1 Click the List of well known special applications link for more information 2 Specify the public port number normally associated with an application in the Trigger Port field Set the protocol type to TCP or UDP then enter the ports that the application requires The ports may be in the format of a single port or in a range e g 72 96 or a combination of both 3 Popular applications...

Страница 79: ... to move forwards and backwards As the NAT mapping is dynamic a Refresh button is provided to refresh the NAT Mapping Table with the most updated values The content of the NAT Mapping Table is described as follows Protocol protocol of the flow Local IP local LAN host s IP address for the flow Local Port local LAN host s port number for the flow Pseudo IP translated IP address for the flow Pseudo P...

Страница 80: ...is section includes all the basic configuration tools for the Router such as time settings password settings remote management and Syslog server setup Time Zone You can set the time settings for the Router on this screen Figure 57 Time Zone Screen ...

Страница 81: ...ngs The system clock may not update immediately Allow at least 15 minutes for the Router to contact the time servers on the Internet and get a response You cannot set the clock yourself You can specify which NTP servers the Router will use to update the system clock although doing this should only be necessary if you are experiencing difficulty Password Settings Use this page to restrict access ba...

Страница 82: ...in to the web management system again Setting the idle time to 0 will mean the connection never times out Default 10 minutes Remote Management By default management access is only available to users on your local network However you can also manage the Router from a remote host by entering the IP address of a remote computer on this screen Figure 59 Remote Management Screen This feature allows you...

Страница 83: ...ect Enable administration from any Internet Host this allows any computer to access the Router remotely Before you enable this function ensure that you have set the Administration Password Click SAVE SETTINGS Syslog Server Using third party syslog software this Syslog Server tool will automatically download the Router log to the specified server IP address Figure 60 Syslog Server Screen 1 Enter th...

Страница 84: ...appliances and wireless devices UPnP architecture leverages TCP IP and the web to enable seamless proximity networking in addition to control and data transfer among networked devices in the home office and everywhere in between Figure 61 UPNP Screen 1 Click Enable to turn on the Universal Plug and Play function of the Router This function allows the device to automatically and dynamically join a ...

Страница 85: ...ample com might translate to 198 105 232 4 Check with your ISP for information on this screen Figure 62 DNS Screen If your ISP provided you with specific DNS addresses to use enter them into the appropriate fields on this screen and click SAVE SETTINGS Many ISPs do not require you to enter this information into the Router If you are using a Static IP connection type you may need to enter a specifi...

Страница 86: ... IP address The Router supports two DDNS providers DynDNS org TZO com Before you set up DDNS you must obtain an account password or key and static domain name from your DDNS provider DDNS is disabled by default Figure 63 Dynamic Domain Name Server DDNS Screen 1 Check Enable Dynamic DNS 2 Select the provider and then enter the necessary information provided by your DDNS provider 3 Click SAVE SETTIN...

Страница 87: ...igure 64 Static Routes Screen This screen shows a list of current static route entries For each entry the following information is displayed Index the index of the entry Network Address the network address of the route Subnet Mask the subnet mask of the route A network address of 0 0 0 0 and a subnet mask of 0 0 0 0 indicates the default route Gateway the router used to route data to the network s...

Страница 88: ...on sends simplified routing data to other RIP enabled devices rather than full routing data 3 Select the Operation Mode Disabled RIP is not enabled for the WAN or LAN interface Enabled RIP is enabled for the WAN or LAN interface The router will transmit RIP update information to other RIP enabled devices Silent RIP is enabled however the Router only receives RIP update messages it will not transmi...

Страница 89: ...n None Switches off authentication on the specified interface Password An unencrypted text password that needs to be set on all RIP enabled devices connected to this Router RIP information is not shared between devices whose passwords do not match 7 In the Authentication Code field enter the password that is required if the Password option has been selected 8 Click SAVE SETTINGS Routing Table This...

Страница 90: ...88 CHAPTER 5 CONFIGURING THE ROUTER ...

Страница 91: ...ter configuration screens check the following Confirm that the physical connection between your computer and the Router is OK and that the LAN Status LEDs on the Router and network adapter are illuminated and indicating the same speed 10Mbps or 100Mbps Some NICs do not have status LEDs in which case a diagnostic program may be available that can give you this information Ensure that you have confi...

Страница 92: ...inated Ensure that you have entered the correct information into the Router configuration screens as required by your Internet Service Provider Use the Internet Settings screen to verify this Check that the PPPoE or PPTP user name and password are correct Ensure that your computers are not configured to use a Web proxy On Windows computers this can be found under Control Panel Internet Options Con...

Страница 93: ...ter If you have a wired and a wireless NIC in the same computer ensure that the wired NIC is disabled Check the status of the WLAN LED it should be lit if wireless is enabled and will flash when there is wireless activity If not lit go to Wireless on page 48 and enable wireless networking Ensure that the TCP IP settings for all devices are correct Ensure that the Wireless Clients are using the sam...

Страница 94: ...en try initiating a search manually if the client software supports this feature or manually set the channel on your wireless computer to correspond to the Router channel number Please refer to your wireless computer adapter documentation and vendor to do this Speed of connection The 802 11b and 802 11g standards will automatically choose the best speed depending on the quality of your connection ...

Страница 95: ...eed to reconfigure this computer to obtain an IP address automatically see Obtaining an IP Address Automatically on page 23 3 Restart the computer and re apply power to the Router 4 Using the Web browser on the computer enter the following URL in the location bar http 192 168 1 1 This will connect you to the Recovery utility in the Router 5 Follow the on screen instructions Enter the path and file...

Страница 96: ...only 4 LAN ports on the Router How are additional computers connected You can expand the number of connections available on your LAN by using hubs switches and wireless access points connected to the Router 3Com wireless access points and switches provide a simple reliable means of expanding your network contact your supplier for more information or visit http www 3com com Does the Router support ...

Страница 97: ...vice over the network the Router must be correctly configured with the following IP information An IP address A Subnet Mask IP Addresses and Subnet Masks Each device on your network must have a unique IP address to operate correctly An IP address identifies the address of the device to which data is being sent and the address of the destination network IP addresses have the format n n n x where n ...

Страница 98: ...ne 192 168 100 identifies the network on which the device resides Part two 8 identifies the device within the network This type of IP address operates on a subnet mask of 255 255 255 0 See Table 4 for an example about how a network with three computers and a Router might be configured Table 4 IP Addressing and Subnet Masking Type Two In larger networks where there are more devices the IP address o...

Страница 99: ...cated once you disconnect from the network DHCP will work on any client Operating System such as Windows 95 Windows 98 Windows NT 4 0 Windows 2000 and Windows XP Also using DHCP means that the same IP address and subnet mask will never be duplicated for devices on the network DHCP is particularly useful for networks with large numbers of users on them Static Addressing You must enter an IP Address...

Страница 100: ...a subnet mask of 255 255 0 0 If two devices allocate themselves the same address the conflict is detected and one of the devices allocates itself a new address Automatic IP addressing support was introduced by Microsoft in the Windows 98 operating system and is also supported in Windows 2000 and Windows XP ...

Страница 101: ... to 48 36 24 18 12 or 6 Mbps Maximum channels 13 Range up to 304 8m 1000ft Sensitivity 6 12 18 24 36 48 Mbps 85 dBm 54 Mbps 66 dBm typical Modulation CCK BPSK QPSK OFDM Encryption 40 64 bit WEP 128 bit WEP WPA WPA2 Maximum clients 32 O P Power 19 5dBm E I R P Standard IEEE 802 11b Direct Sequence Spread Spectrum DSSS Transmission rate 11Mbps automatic fallback to 5 5 2 or 1 Mbps Maximum channels 1...

Страница 102: ...eight 30 mm 1 1 in Weight Approximately 550 g 1 1 lbs Standards Functional ISO 8802 3 IEEE 802 3 IEEE 802 11b 802 11g Environmental EN 60068 IEC 68 See Regulatory Notices for conditions of operation System Requirements Operating Systems The Router will support the following Operating Systems Windows 98Se Windows NT 4 0 Windows ME Windows 2000 Windows XP Windows Vista Mac OS 8 5 or higher Unix ...

Страница 103: ...e IEEE 802 3i u and x specifications Cable Specifications The Router supports the following cable types and maximum lengths Category 3 Ethernet or Category 5 Fast Ethernet or Dual Speed Ethernet Twisted Pair shielded and unshielded cable types Maximum cable length of 100m 327 86 ft ...

Страница 104: ...102 APPENDIX B TECHNICAL SPECIFICATIONS ...

Страница 105: ...STALL OR OTHERWISE USE THE SOFTWARE OR DOCUMENTATION DO NOT CLICK ON THE I AGREE OR SIMILAR BUTTON AND IF YOU HAVE RECEIVED THIS SOFTWARE AND DOCUMENTATION ON PHYSICAL MEDIA PROMPTLY RETURN THE ENTIRE PRODUCT WITH THIS SOFTWARE AND DOCUMENTATION UNUSED TO THE SUPPLIER WHERE YOU OBTAINED IT IN THE EVENT THAT A SYSTEM INTEGRATOR CONSULTANT CONTRACTOR OR OTHER PARTY DOWNLOADS THE SOFTWARE FOR YOU AND...

Страница 106: ...r each such workstation or network server on which the Software is used as permitted hereunder Otherwise the Software and Documentation may be copied only as essential for backup or archive purposes in support of your use of the Software as permitted hereunder Each copy of the Software and Documentation must contain 3Com s and its licensors proprietary rights and copyright notices in the same form...

Страница 107: ...y supplier of computer programs included in the Software is a third party beneficiary of the provisions of this Section 1 and such third party may protect its rights in the Software against violations of this license EXPORT The product Software Documentation and or other technical data collectively Product are subject to U S export control laws and regulations Certain products made by 3Com are fur...

Страница 108: ...uter Software Documentation as such terms are used in 48 C F R 12 212 or 48 C F R 227 7202 as applicable Consistent with 48 C F R 12 212 or 48 C F R 227 7202 1 through 227 7202 4 as applicable the Commercial Computer Software and Commercial Computer Software Documentation are being licensed U S Government end users a only as Commercial Items and b with only those rights as are granted to all other...

Страница 109: ... laws of the Commonwealth of Massachusetts U S A excluding its conflicts of laws principles and excluding the United Nations Convention on Contracts for the International Sale of Goods SEVERABILITY In the event any provision of this Agreement is found to be invalid illegal or unenforceable the validity legality and enforceability of any of the remaining provisions shall not in any way be affected ...

Страница 110: ...108 APPENDIX C END USER SOFTWARE LICENSE AGREEMENT Copyright 2008 3Com Corporation All rights reserved 3Com is a registered trademark of 3Com Corporation ...

Страница 111: ...D OBTAINING SUPPORT FOR YOUR PRODUCT For technical support register your product and request service via our online support system at http www 3Com com esupport ...

Страница 112: ...110 APPENDIX D OBTAINING SUPPORT FOR YOUR PRODUCT ...

Страница 113: ...s Point An access point is a device through which wireless clients connect to other wireless clients and which acts as a bridge between wireless clients and a wired network such as Ethernet Wireless clients can be moved anywhere within the coverage area of the access point and still connect with each other If connected to an Ethernet network the access point monitors Ethernet traffic and forwards ...

Страница 114: ...of Twisted Pair TP cabling defined by the EIA TIA 586 standard Category 5 can be used in Ethernet 10BASE T and Fast Ethernet networks 100BASE TX and can transmit data up to speeds of 100 Mbps Category 5 cabling is better to use for network cabling than Category 3 because it supports both Ethernet 10 Mbps and Fast Ethernet 100 Mbps speeds Channel Similar to any radio device the Wireless Cable DSL r...

Страница 115: ...o levels of encryption 40 64 bit and 128 bit 128 bit is a more powerful level of encryption than 40 64 bit ESSID Extended Service Set Identifier The ESSID is a unique identifier for your wireless network You must have the same ESSID entered into the Router and each of it s wireless clients Ethernet A LAN specification developed jointly by Xerox Intel and Digital Equipment Corporation Ethernet netw...

Страница 116: ... your Router see also Ad Hoc mode IP Internet Protocol IP is a Layer 3 network protocol that is the standard for sending data through a network IP is part of the TCP IP set of protocols that describe the routing of packets to addressed devices An IP address consists of 32 bits divided into two or three fields a network number and a host number or a network number a subnet number and a host number ...

Страница 117: ...dress The NAT capability of the Router allows you to access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP Network A network is a collection of computers and other computer equipment that is connected for the purpose of exchanging information or sharing resources Networks vary in size some are within a single room others span continen...

Страница 118: ...s used to create IP address numbers used only within a particular network as opposed to valid IP address numbers recognized by the Internet which must assigned by InterNIC Subnets A network that is a component of a larger network Switch A device that interconnects several LANs to form a single logical LAN that comprises of several LAN segments Switches are similar to bridges in that they connect L...

Страница 119: ... to extend range and reach though this can affect the overall throughput of data WECA Wireless Ethernet Compatibility Alliance An industry group formed to certify cross vendor interoperability and compatibility of 802 11b and 802 11g wireless networking products and to promote the standard for enterprise small business and home environments see also 802 11b 802 11g Wi Fi WEP Wired Equivalent Priva...

Страница 120: ...WLAN is a group of computers and devices connected together by wireless in a relatively small area such as a house or office WPA Wi Fi Protected Access A dynamically changing encryption mechanism for wireless networking Encryption strength is 256 bit ...

Страница 121: ...umentation that comes with the product This product contains encryption It is unlawful to export out of the U S without obtaining a U S Export License This product does not contain any user serviceable components Any unauthorized product changes or modifications will invalidate 3Com s warranty and all applicable regulatory certifications and approvals This product can only be used with the supplie...

Страница 122: ...120 ...

Страница 123: ...er DDNS Screen 80 Dynamic IP Mode Screen 30 33 39 42 43 E Encryption Screen 46 Encryption disabling 47 F Firewall Screen 54 Forgotten Password 86 I Internet addresses 91 Internet Properties Screen 24 Internet Protocol TCP IP Properties Screen 22 IP Address 38 91 L LAN Settings Screen 38 LED 12 LEDs 12 Local Area Properties Screen 22 M mode 30 N Network addresses 91 Networking wireless 87 NIC wirel...

Страница 124: ...Route Parameters Screen 81 Subnet Mask 91 T TCP IP 21 23 91 Technical specifications 95 standards 95 Time and Time Zone screen 74 75 U URL Blocking Screen 59 60 61 V Virtual Servers Screen 71 W WDS 53 Web Browser Location Field 25 Web Proxy 24 WiFi Protected Access 48 Wireless networking 87 NIC 12 Wireless Configuration Scree 45 Wireless Settings Screen 44 Wireless WDS Settings Screen 53 WPA PSK n...

Отзывы: