EnGenius ESR-9710 Скачать руководство пользователя страница 89

Wireless N Gigabit Router   

 

 

 

 

 

                         Version 1.0 

 

 

 89 

 

Appendix B – Specifications  

 

Hardware Summary 

Physical Interface 

ƒ

 

WAN: One 10/100/1000 Gigabit RJ-45 

ƒ

 

LAN: Four 10/100/1000 Gigabit RJ-45 

ƒ

 

Reset Button (1 second for Reboot, 5 second for Reset to 
Factory Default ) 

ƒ

 Power 

Jack 

ƒ

 

JTAG (for debug only) 

LED Status 

ƒ

 Power/ 

Status 

ƒ

 WAN 

(Internet 

connection) 

ƒ

 LAN1~LAN4 

(10/100/1000Mbps) 

ƒ

 WLAN 

(Wireless 

Connection) 

Power 
Requirements 

ƒ

 

Power Supply: 90 to 240 VDC ± 10

 (depends on 

different countries) 

ƒ

 

Device: 12 V/ 1.25A 

 

Radio Specifications 

Frequency Band 

2.400

2.484 GHz 

Media Access 
Protocol 

Carrier sense multiple access with collision avoidance 
(CSMA/CA) 

Modulation 
Technology 

OFDM: BPSK, QPSK, 16-QAM, 64-QAM 

DBPSK, DQPSK, CCK 

Operating Channels 

11 for North America, 14 for Japan, 13 for Europe 

Receive Sensitivity 
(Typical)  

ƒ

 2.412~2.472G(IEEE802.11b) 

(1Rx) 

-93dBm @ 1Mbps 

-91dBm @ 11Mbps 

ƒ

 2.412~2.472G(IEEE802.11g) 

(2Rx) 

-92dBm @ 6Mbps 

-79dBm @ 54Mbps 

ƒ

 2.412~2.472G(IEEE802.11N) 

(2Rx) 

-90 dBm MCS 8 

-70 dBm MCS 15 

Available transmit 
power  

ƒ

 2.412~2.472G(IEEE802.11b) 

19dBm @1~11Mbps 

ƒ

 2.412~2.472G(IEEE802.11g) 

19 dBm @6Mbps 

16 dBm @54Mbps 

ƒ

 2.412~2.472G(IEEE802.11N) 

20 dBm MCS 8 

Содержание ESR-9710

Страница 1: ...Wireless N Gigabit Router User s Manual Version 1 0 ...

Страница 2: ...2 4 1 LOGGING IN 22 4 2 ADD A WIRELESS DEVICE 22 4 2 1 USING THE PIN 23 4 2 2 USING THE PUSH BUTTON 24 5 WIRELESS NETWORK SETUP WIZARD 25 5 1 LOGGING IN 25 5 2 WIRELESS NETWORK SETUP 25 5 2 1 AUTOMATIC NETWORK SETUP 26 5 2 2 MANUAL NETWORK SETUP 26 5 2 2 1 WIRELESS SECURITY LEVEL BEST WPA2 28 5 2 2 2 WIRELESS SECURITY LEVEL BETTER WPA 29 5 2 2 3 WIRELESS SECURITY LEVEL GOOD WEP 64 128 BIT 30 5 2 2...

Страница 3: ...12 WISH 62 6 3 13 WI FI PROTECTED SETUP 63 6 3 14 ADVANCED NETWORK UPNP WAN PING 64 6 4 TOOLS 66 6 4 1 TIME ZONE SETTING 66 6 4 2 SYSTEM 67 6 4 2 1 SAVE CONFIGURATION TO A FILE 67 6 4 2 2 RESTORE THE CONFIGURATION FROM A FILE 68 6 4 2 3 RESTORE SETTINGS TO DEFAULT 69 6 4 2 4 SYSTEM REBOOT 69 6 4 3 FIRMWARE UPGRADE 70 6 4 4 SYSTEM LOGS 70 6 4 5 DYNAMIC DNS 71 6 4 6 SYSTEM CHECK 71 6 4 7 SCHEDULES 7...

Страница 4: ...ESR 9710 Wireless N Gigabit Router Version 1 0 4 Revision History Version Date Notes 1 0 September 12 2007 Initial Version ...

Страница 5: ...upports VPN pass through The router also provide easy configuration with the web browser based configuration utility The incredible speed and QoS function of 802 11n draft2 0 Gigabit Router is ideal for media centric applications like streaming video gaming and VoIP telephony It is designed to run multiple media intense data streams through the network at the same time with no degradation in perfo...

Страница 6: ...ing Do not discard the packing materials in case of return the unit must be shipped in its original package h One Wireless N Gigabit Router h One 12V 1 25A 90V 240V Power Adapter h Three 2dBi 2 4GHz Dipole Antennas h One CD ROM with User s Manual h Once Quick Guide 1 3 Safety Guidelines In order to reduce the risk of fire electric shock and injury please adhere to the following safety guidelines h...

Страница 7: ...hree antennas to the SMA connectors Connection Activity LED This LED will light up once an Ethernet cable is connected to one of the LAN ports WAN LED This LED will light up once an Ethernet cable is connected to WAN Internet port WLAN LED This LED will light up once the RF wireless LAN feature is enabled Power LED This LED will light up once the power cable is connected to the DC connector Reset ...

Страница 8: ...disaster recovery temporary offices and construction sites where one wants a temporary WLAN established and removed c The ability to access real time information Doctors nurses point of sale employees and warehouse workers can access real time information while dealing with patients serving customers and processing information d Frequently changed environments Show rooms meeting rooms retail store...

Страница 9: ... within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other client and does not require an access point This is the easiest and least expensive way for the SOHO to set up a wireless network The image below depicts a network in ad hoc mode b Infrastructure Mode The infrastructure mode requires the use of an access point AP In this mod...

Страница 10: ...the power adapter into the port labeled DC IN and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 IP Address Configuration This device can be configured as a Bridge Router or Access Point The default IP address of the device is 192 168 1 2 In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the c...

Страница 11: ...our PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example Device IP address 192 168 1 2 PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Страница 12: ...lect Admin from the drop down list and then leave the password field blank Click on the Log In button to continue This device supports several types of WAN connections o DHCP Connection Dynamic IP address Choose this connection type if your ISP provides you the IP address Most cable modems use this type of connection o PPPoE Poinit to Point Protocol over Ethernet Choose this option if your interne...

Страница 13: ... The Wizard requires that you configure the password time zone and Internet WAN connection Click on the Next button to continue By default the device does not use a password Specify a password for administrator access to the device then type the password once more in the Verify Password field Click on the Next button to continue ...

Страница 14: ... 14 Select your time zone from the drop down list Click on the Next button to continue The next step in the wizard is the Internet Connection select the WAN connection type from the list and then click on the Next button to continue with the wizard ...

Страница 15: ...own as Dynamic IP Select the DHCP Connection Dynamic IP Address radio button and then click on the Next button You have the option of cloning your PCs MAC address onto the device Click on the Clone Your PCs MAC Address to automatically copy the MAC address You may also specify a host name Click on the Next button to continue The WAN configuration is complete Click on the Connect button to connect ...

Страница 16: ...n the Next button Address Mode PPPoE can be used with a dynamic or static IP address If you select the Dynamic IP radio button then the IIP address in the next field is not required However if you select the Static IP radio button then the IP address in the next field is required User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your I...

Страница 17: ...et The supported authentication protocols are PAP and CHAP Select the Username Password Connection PPTP radio button and then click on the Next button Address Mode PPTP can be used with a dynamic or static IP address If you select the Dynamic IP radio button then the IIP address in the next field is not required However if you select the Static IP radio button then the IP address in the next field...

Страница 18: ...Connect button to connect to the Internet 3 1 4 L2TP Layer 2 Tunneling Protocol The WAN interface can be configured as L2TP L2TP Layer Two Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection requires you to enter a user name and password provided by your Internet Service Provider to gain access to the Internet The supported authentication protocols ar...

Страница 19: ... address of the L2TP gateway L2TP Server IP Address If the L2TP Server s IP address is different from the default gateway then you may specify it here User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field Click on the Next button to continue The WAN configuration is complete Click on...

Страница 20: ...is assigned by your ISP Subnet Mask Specify the subnet mask for this IP address which is assigned by your ISP Gateway Address Specify the IP address of the default gateway which is assigned by your ISP Primary Secondary DNS Address Specify the primary and secondary IP address which is assigned by your ISP The WAN configuration is complete Click on the Connect button to connect to the Internet ...

Страница 21: ...o button and then click on the Next button User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field BingPond Server Specify the server name or IP address as specified by your ISP Click on the Next button to continue The WAN configuration is complete Click on the Connect button to connec...

Страница 22: ...nfigure the device through the web browser enter the IP address of the device default 192 168 1 2 into the address bar of the web browser and press Enter Make sure that the device and your computers are configured on the same subnet Refer to Chapter 2 in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Select Admin fr...

Страница 23: ...evice supports Wi Fi Protected Setup and has a configuration button you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds The status LED on the router will flash three times if the device has been successfully added to the network There are several ways to add a wireless device to your network Access to the wireless network is...

Страница 24: ...y synchronize with other wireless devices on your network that support Wi Fi Protected Setup If the device supports Wi Fi Protected Setup and has a configuration button you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds The status LED on the router will flash three times if the device has been successfully added to the netw...

Страница 25: ...to the address bar of the web browser and press Enter Make sure that the device and your computers are configured on the same subnet Refer to Chapter 2 in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Select Admin from the drop down list and then leave the password field blank Click on the Log In button to continue...

Страница 26: ...d the SSID and security mode for the device Click on the Save button to complete the setup 5 2 2 Manual Network Setup If you select the Manual option then you will be required to specify the SSID and select the appropriate network security Click on the Next button to continue The wireless wizard will inform you that there are three major steps in the process o Name your wireless network o Secure y...

Страница 27: ... The following options are available o BEST Select this option if your wireless adapters support WPA2 o BETTER Select this option if your wireless adapters support WPA o GOOD Select this option if your wireless adapters do not support WPA but support WEP instead o None Select this option if you do not want to activate any security features In order to protect your network from hackers and unauthor...

Страница 28: ...curity Level BEST WPA2 Select the BEST radio button which supports WPA2 encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Страница 29: ...urity Level BETTER WPA Select the BETTER radio button which supports WPA encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Страница 30: ...ty Level GOOD WEP 64 128 bit Select the GOOD radio button which supports WEP encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Страница 31: ... 0 31 5 2 2 4 Wireless Security Level None Security Disabled Select the NONE radio button if you do not want to activate any security features Then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Страница 32: ... the drop down list and then leave the password field blank After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into six main sections 1 Basic This menu includes the wireless wizard network settings wireless settings and WAN settings 2 Advanced This menu includes virtual server special applications port forwarding routing access con...

Страница 33: ...reless wizard The other options are described below 6 2 2 Network Settings This device can be configured at a Router or a Bridge Select Router mode if the WAN port is connected to the Internet Select Bridge if the device is connected to a local network downstream from another router 6 2 2 1 Bridge Mode In this mode the device functions as a bridge between the network on its WAN port and the device...

Страница 34: ...uter Mode In this mode the device functions as a NAT router and is connected to the Internet Select the Router Mode radio button WAN Port Mode Select the Router Mode radio button Router IP Address Specify the IP address of this device Subnet Mask Specify the subnet mask for the IP address Local Domain Name This entry is optional Enter a domain name for the local network LAN computers will assume t...

Страница 35: ... The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters 802 11 Mode Select the IEEE 802 11 mode from the drop down list For example if you are sure that the wireless network will be using only IEEE 802 11g clients then it is recommended to select 802 11g only instead of 2 4 GH...

Страница 36: ...reless encryption standard WPA provides a higher level of security The following section describes the security configuration in detail 6 2 3 1 1 WEP Wired Equivalent Privacy Select the WEP radio button if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired ...

Страница 37: ...uesting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Click on the Save Changes button to store these settings 6 2 3 1 2 WPA Personal Wi Fi Protected Access Select the WPA...

Страница 38: ...ction It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Click on the Save Changes button to store these settings 6 2 3 1 3 WPA Enterprise Wi Fi Protected Access 802 1x Select the WPA Enterprise radio button if your wire...

Страница 39: ...mber of seconds before the group key used for broadcast and multicast data is changed Authentication Timeout Specify the number of minutes after which the client will be required to re authenticate RADIUS Server IP Address Specify the IP address of the RADIUS server RADIUS Server Port Specify the port number of the RADIUS server the default port is 1812 RADIUS Server Shared Secret Specify the pass...

Страница 40: ...amic IP Address o PPPoE o PPTP o L2TP o BigPond Select the type of Internet Connection from the drop down list 6 2 4 1 Static IP Address Configuration The WAN interface can be configured as Static IP address In this type of connection your ISP provides you with a dedicated IP address which does not change as DHCP Select the Static IP from the My Internet Connection drop down list ...

Страница 41: ...l values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections In either case network performance can suffer MAC Address If you need to change the MAC ad...

Страница 42: ...d larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in ex...

Страница 43: ...Secondary DNS Address Specify the primary and secondary IP address which is assigned by your ISP MTU The Maximum Transmission Unit MTU is a parameter that determines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typica...

Страница 44: ...e IP address PPTP Subnet Mask Specify the subnet mask for the IP address PPTP Gateway IP Address Specify the IP address of the PPTP gateway PPTP Server IP Address If the PPTP Server s IP address is different from the default gateway then you may specify it here User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify ...

Страница 45: ...SP or click on Clone Your PCs MAC Address Click on the Save Settings button to store these settings 6 2 4 5 L2TP Layer 2 Tunneling Protocol The WAN interface can be configured as L2TP L2TP Layer Two Tunneling Protocol uses a virtual private network to connect to your ISP This method of connection requires you to enter a user name and password provided by your Internet Service Provider to gain acce...

Страница 46: ...tes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too l...

Страница 47: ...outer will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in extreme cases may be una...

Страница 48: ...rding StreamEngine Routing Access Control Web Filter MAC Address Filter Firewall Inbound Filter WISH Wi Fi Protected Setup and Advanced Network The configuration steps for each option are described below 6 3 1 Advanced Wireless This page allows you to configure the fragmentation threshold RTS threshold beacon period transmit power DTIM interval wireless isolation WMM and WDS wireless distribution ...

Страница 49: ... receive the broadcast and multicast messages The default value is 1 Valid settings are between 1 and 255 Wireless Isolation Place a check in this box in order to prevent associated wireless clients from communicating with each other WMM Enable Enable WMM in order to help control latency and jitter when transmitting multimedia content over a wireless connection WDS Place a check in this box to ena...

Страница 50: ...a schedule Always or Never from the drop down list If a schedule does not exist you may create it in the Tools Schedule section Inbound Filter Select an inbound filter from the drop down list If an inbound filter does not exist you may create it from Advanced Inbound Filter section Click on the Save button to insert the entry into the Virtual Server list 6 3 3 Special Applications An application r...

Страница 51: ...a range of ports in your router and redirect data through those ports to a single PC on your network Enable Place a check in this box to enable the port forwarding rule Name Assign a meaningful name to the virtual server for example Web Server Several well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining...

Страница 52: ...network connections Manual Uplink Speed Specify an uplink speed or select it from the drop down list If Automatic Uplink Speed is disabled this options allows you to set the uplink speed manually Uplink speed is the speed at which data can be transferred from the router to your ISP Connection Type By default the router automatically determines whether the underlying connection is an xDSL Frame rel...

Страница 53: ...gine Rule A StreamEngine Rule identifies a specific message flow and assigns a priority to that flow For most applications automatic classification will be adequate and specific StreamEngine Rules will not be required StreamEngine supports overlaps between rules where more than one rule can match for a specific message flow If more than one rule is found to match the rule with the highest priority...

Страница 54: ...reach a particular destination computers on your network will select the best route ignoring unreachable routes Interface Select the interface from the drop down list Click on the Save button to insert the entry into the Routing table 6 3 7 Access Control The Access Control section allows you to control access in and out of devices on your network Use this feature as Parental Controls to only gran...

Страница 55: ... New Policy wizard The wireless wizard will inform you that there are six major steps in the process o Choose a unique name for your policy o Select a schedule o Select the machine to which the policy applies o Select filtering method o Configure web access logging Click on the Next button to continue Specify a policy name and then click on the Next button to continue ...

Страница 56: ...e the MAC address of the rounter s WAN side Ethernet interface either type in an alternate MAC address for example the MAC address of the router initially connected to the ISP or click on Clone Your PCs MAC Address Click on the OK button to insert the entry into the table Click on the Next button to continue Select a filtering method Log Web Access Only Select this radio but in order to log web ac...

Страница 57: ...for securing and restricting your network Configure MAC Filtering Select one of the options from the drop down list o Turn MAC Filtering OFF When OFF is selected MAC addresses are not used to control network access o Turn MAC Filtering ON and ALLOW computers listed to access the network When ALLOW is selected only computers with MAC addresses listed in the MAC Filtering Rules list are granted netw...

Страница 58: ...sequence numbers Whether SPI is enabled or not the router always tracks TCP connection states and ensures that each TCP packet s flags are valid for the current state TCP UDP NAT Endpoint Filtering options control how the router s NAT manages incoming connection requests to ports that are already being used Select one of the radio buttons o End Point Independent Once a LAN side application has cre...

Страница 59: ...his ensures best compatibility for internet communications Under some circumstances it may be desirable to turn off this feature Enable anti spoof checking Place a check in this box to enable anti spoof checking Enabling this option can provide protection from certain kinds of spoofing attacks However enble this option with care With some modems the WAN connection may be lost when this option is e...

Страница 60: ...ncoming VPN connections to a LAN side VPN server refer to Advanced Virtual Server o IPSec VPN Allows multiple VPN clients to connect to their corporate networks using IPSec Some VPN clients support traversal of IPSec through NAT This option may interfere with the operation of such VPN clients If you are having trouble connecting with your corporate network try disabling this option Check with the ...

Страница 61: ...be increasing the exposure of your LAN to cyberattacks from the Internet In these cases you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can be used with V...

Страница 62: ...he router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic Such streams are used by systems known as Windows Media Extenders such as the Xbox 360 Automatic Place a check in this box for the device to automatically configure the classifiers When enabled this option causes the router to automatically attempt to prioritize...

Страница 63: ... Click on the Save button to insert the entry into the WISH rules list 6 3 13 Wi Fi Protected Setup Wi Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN Devices can still be added to the wireless network using Wi Fi Protected Setup Enable Place a check in this box to enable this feature...

Страница 64: ...ability and can work with other UPnP devices and software Allow Users to disable Internet Access Place a check in this box if you would like to allow to user to terminate the WAN session Allow Users to modify Virtual Server Mappings Place a check in this box if you would like the users to add modify or delete server mapping entries Enable WAN Ping Respond Place a check in this box if you would lik...

Страница 65: ...multicast group If you have a multimedia LAN application that is not receiving content as expected try enabling this option Enable PPPoE Pass Through Place a check in this box to enable PPPoE pass through This option controls whether LAN computers can act as PPPoE clients and negotiate the PPP sessions through the router over the WAN ethernet link Enabling this option allows LAN computers to act a...

Страница 66: ...k on the Time link in the navigation menu This feature allows you to configure update and maintain the correct time on the device s internal system clock as well as configure the time zone The date and time of the device can be configured manually or by synchronizing with a time server Note If the device losses power for any reason it will not be able to keep its clock running and will not display...

Страница 67: ...ize the device s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Used Specify the NTP server or select one from the drop down list Set the Date and Time Select a date and time from the drop down list or do to use computer s time and date click on the Copy Your Computer s Time...

Страница 68: ...to the device Click on the Browse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage ...

Страница 69: ...ettings will be lost Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage 6 4 2 4 System Reboot Click on the Reboot the Device button to reboot the device using its current settings Once the dialog box appears click on the OK button to confirm the action...

Страница 70: ...dor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface Click on the Browse button to select the firmware and then click on the Upload button 6 4 4 System Logs Logs display a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when ...

Страница 71: ... Select a DDNS service provider from the drop down list DynDNS is a free service while TZO offers a 30 day free trial Host Name Specify the website URL User Name Specify the user name for the DDNS service Password Specify the password for the DDNS service and verify it once again in the next field Timeout Specify the time between periodic updates to the Dynamic DNS if the dynamic IP address has no...

Страница 72: ...e Wed Thu and Fri and enter a Start Time of 3pm and End Time of 8pm Name Specify a name for the schedule Day s Select the days at which you would like the schedule to be effective All Day 24 hrs Place a check in this box if you would like the schedule to be active for 24 hours Start Time If you do not use the 24 hours option you may specify a start time End Time If you do not use the 24 hours opti...

Страница 73: ...g or 802 11n respectively Rate The actual transmission rate of the client in megabits per second Signal This is a relative measure of signal quality The value is expressed as a percentage of theoretical best quality Signal quality can be reduced by distance by interference from other radio frequency sources such as cordless telephones or neighboring wireless networks and by obstacles between the r...

Страница 74: ...e logs Firewall Security System or Router Status View Levels Select the warning levels for the logs Critical Warning or Informational Click on the Apply Log Settings Now to make the new log effective 6 5 3 Statistics Click on the Statistics link in the navigation drop down menu This page displays the transmitted and received packet statistics of the wired LAN WAN and wireless interface Click on th...

Страница 75: ...d the connection is passing data o FW FIN Wait The client system has requested that the connection be stopped o CW Close Wait the server system has requested that the connection be stopped o TW Time Wait Waiting for a short time while a connection that was in FIN Wait is fully closed o LA Last ACK Waiting for a short time while a connection that was in Close Wait is fully closed o CL Closed The co...

Страница 76: ...shed the connection is passing data o FW FIN Wait The client system has requested that the connection be stopped o CW Close Wait the server system has requested that the connection be stopped o TW Time Wait Waiting for a short time while a connection that was in FIN Wait is fully closed o LA Last ACK Waiting for a short time while a connection that was in Close Wait is fully closed o CL Closed The...

Страница 77: ...tion Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and receive RF signals AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions can be made in both dire...

Страница 78: ...cally broadcasts network control data to other wireless stations Bit rate The amount of bits that pass in given amount of time Bit sec Bits per second BOOTP Bootstrap Protocol Allows for computers to be booted up and given an IP address with no user intervention Bottleneck A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencie...

Страница 79: ...ysical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by ...

Страница 80: ...r changing IP address The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS whenever the IP address changes Dynamic IP address IP address that is assigned by a DHCP server and that may change Cable Internet providers usually use this method to assign IP addresses to their customers E EAP Extensible Authentication Protocol Email Electroni...

Страница 81: ...1 billion bits per second GUI Graphical user interface H H 323 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F Hop The action of data p...

Страница 82: ...net Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks comin...

Страница 83: ...second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the sign...

Страница 84: ...l O OFDM Orthogonal Frequency Division Multiplexing is the modulation technique for both 802 11a and 802 11g OSI Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table are sent to all the other rou...

Страница 85: ...synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which al...

Страница 86: ...mple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only...

Страница 87: ...ch other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus...

Страница 88: ...ur LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of th...

Страница 89: ...countries Device 12 V 1 25A Radio Specifications Frequency Band 2 400 2 484 GHz Media Access Protocol Carrier sense multiple access with collision avoidance CSMA CA Modulation Technology OFDM BPSK QPSK 16 QAM 64 QAM DBPSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 93dBm 1Mbps 91dBm 11Mbps 2 412 2 472G IEEE80...

Страница 90: ...PPPoE PPTP Clone MAC DNS Relay DDNS 8 Verified Services Router NAT NAPT Static Routing RIPv2 Dynamic Route Virtual server mapping IP address mapping Port Forwarding Port Triggering MAC address Filtering ALG Application Layer Gateway support RTP RTSP AOL FTP ICMP WMP MMS NetMeeting SIP Firewall Blocking Ping ICMP Bolcking SPI Stateful Packet Inspection Rule Based IP Address Ranges Port Ranges Sched...

Страница 91: ... in beacons Wi Fi Protection Setup WPS Auto Channel Selection QoS WMM Intelligent Stream Handling Wireless Intelligent Stream Handling o Automatic Traffic Classification Prioritization o Dynamic Traffic Shaping Packet Fragmentation o Automatic Configuration Management Configuration Web based configuration HTTP Firmware Upgrade Upgrade firmware via web browser Administrator Setting Administrator pa...

Страница 92: ...it Router Version 1 0 92 Environment Physical Temperature Range 0 to 50 C 32 F to 122 F Operating 40 to 70 C 40 F to158 F Storage Humidity non condensing 15 95 typical Dimensions 167mm L x 108mm W x 25mm H Weight 295g ...

Страница 93: ...asures z Reorient or relocate the receiving antenna z Increase the separation between the equipment and receiver z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could vo...

Страница 94: ... 77 Group Key Update Interval 38 39 H H 323 60 81 Hardware Installation 2 10 I Inbound Filter 3 48 50 51 61 64 Infrastructure 9 82 91 Internet Connection Wizard 2 12 Internet Session Status 3 76 IP Address Configuration 2 10 19 40 IPSec 60 L LED 7 23 24 83 90 Logging In 2 12 22 25 32 Logs Status 3 73 M MAC Address Filter 3 48 57 MIMO 5 MMS 61 91 MPEG 5 MTU 41 42 43 44 46 47 84 N NAT 5 34 51 58 59 ...

Страница 95: ...92 Traffic Shaping 52 92 Transmission Rate 36 Transmit Power 49 U UPNP 3 64 91 V Virtual Server 3 5 48 49 50 60 61 64 Visibility Status 36 VPN 5 6 59 60 82 86 88 92 W Wake On LAN 61 WDS 6 48 49 89 91 Web Filter 3 48 57 WEP 2 25 27 30 36 37 38 39 89 92 Wi Fi Protected Setup 2 3 7 22 23 24 48 63 Windows Media Center 62 Windows MSN Messenger 60 Wireless Isolation 49 Wireless Status 3 73 WISH 3 48 62 ...

Отзывы: