background image

 

 13 

 

13 

c)  The ability to access real-time information 

Doctors/nurses,  point-of-sale  employees,  and  warehouse  workers  can  access  real-time  information  while  dealing  with 
patients, serving customers and processing information. 

d)  Frequently changed environments 

Show rooms, meeting rooms, retail stores, and manufacturing sites where frequently rearrange the workplace. 

e)  Small Office and Home Office (SOHO) networks 

SOHO users need a cost-effective, easy and quick installation of a small network. 

f)  Wireless extensions to Ethernet networks 

Network  managers  in  dynamic  environments  can  minimize  the  overhead  caused  by  moves,  extensions  to  networks,  and 
other changes with wireless LANs. 

g)  Wired LAN backup 

Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks. 

h)  Training/Educational facilities 

Training  sites  at  corporations  and  students  at  universities  use  wireless  connectivity  to  ease  access  to  information, 
information exchanges, and learning. 

Содержание ESR-9855G

Страница 1: ...User s Manual ESR9855G Wireless 300N Gigabit Gaming Router Gigabit StreamEngine Support ...

Страница 2: ...2 2 ...

Страница 3: ...N 17 3 LOGGIN IN 19 4 INTERNET SETTINGS 20 4 1 INTERNET CONNECTION TYPE 21 4 1 1 DHCP Connection Dynamic IP Address 22 4 1 2 PPPoE Point to Point Protocol over Ethernet 23 4 1 3 PPTP Point to Point Tunneling Protocol 25 4 1 4 Static IP Address Configuration 27 4 2 OTHER INTERNET SETTINGS 28 4 2 1 RIP Routing Information Protocol 28 4 2 2 DNS Settings 29 4 2 3 MTU Settings 29 4 2 4 WAN Ping 30 4 2 ...

Страница 4: ... Mode 55 6 2 4 2 WEP Wired Equivalent Privacy 56 6 2 4 3 WPA Personal Wi Fi Protected Access 57 6 2 4 4 WPA Enterprise Wi Fi Protected Access 802 1x 58 6 3 ADVANCED 60 6 3 1 Advanced Wireless 61 6 3 2 Virtual Server 63 6 3 3 Special Applications 65 6 3 4 Port Forwarding 66 6 3 5 StreamEngine 67 6 3 6 Routing 70 6 3 7 Access Control 71 6 3 8 Web Filter 75 6 3 9 MAC Address Filter 76 6 3 10 Firewall...

Страница 5: ...6 4 7 Schedules 97 6 5 STATUS 98 6 5 1 Wireless Status 99 6 5 2 Logs Status 100 6 5 3 Statistics 101 6 5 4 WISH Session Status 102 6 5 5 Routing 104 6 5 6 Internet Session Status 105 6 5 7 Firewall 107 APPENDIX A GLOSSARY 108 8 109 A 109 B 110 C 111 D 111 E 113 F 113 G 114 H 114 I 115 J 116 K 116 L 117 M 117 N 118 O 119 P 119 Q 120 R 120 S 121 T 122 U 122 V 123 ...

Страница 6: ...6 6 W 123 X 124 Y 124 APPENDIX C FCC INTERFERENCE STATEMENT 126 ...

Страница 7: ...ect the data and privacy the Router can encode all wireless transmissions with 64 128 bit encryption It can serve as your network s DHCP Server has a powerful SPI firewall to protect your PCs against intruders and most known Internet attacks and supports VPN pass through The router also provide easy configuration with the web browser based configuration utility The incredible speed and QoS functio...

Страница 8: ... from Internet Support 802 1x authenticator 802 11i WPA WPA2 AES VPN pass thru mechanisms Provide mutual authentication Client and dynamic encryption keys to enhance security WDS Wireless Distribution System Make wireless AP and Bridge mode simultaneously as a wireless repeater Universal Plug and Play UPnP Works with most Internet gaming and instant messaging applications for automatic Internet ac...

Страница 9: ...jury please adhere to the following safety guidelines Carefully follow the instructions in this manual also follow all instruction labels on this device Except for the power adapter supplied this device should not be connected to any other adapters Do not spill liquid of any kind on this device Do not place the unit on an unstable stand or table This unit may drop and become damaged Do not expose ...

Страница 10: ...10 10 1 4 Wireless SOHO Router Description Rear Panel Power Switch LAN Ports WAN Internet Port DC Jack ...

Страница 11: ...11 11 Front Panel WPS button LED panel Antenna Antenna connector ...

Страница 12: ...Switch Turn on or off the device 1 5 System Requirements The following are the minimum system requirements in order configure the device PC AT compatible computer with a Ethernet interface Operating system that supports HTTP web browser 1 6 Applications The wireless LAN products are easy to install and highly efficient The following list describes some of the many applications made possible throug...

Страница 13: ...etworks SOHO users need a cost effective easy and quick installation of a small network f Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves extensions to networks and other changes with wireless LANs g Wired LAN backup Network managers implement wireless LANs to provide backup for mission critical applications running on wir...

Страница 14: ...SOHO LANs b Infrastructure for enterprise LANs a Ad hoc peer to peer Mode This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client is peer to peer would only have access to the resources of the other client and does not require an access point This is the easies...

Страница 15: ...en two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater which effectively doubles the distance between wireless stations The image below depicts a network in infrastructure mode ...

Страница 16: ...ce and another end into your PC Notebook 3 Plug one end of another Ethernet cable to WAN port of the device and the other end into you cable DSL modem Internet 4 Insert the DC inlet of the power adapter into the port labeled DC IN and the other end into the power socket on the wall This diagram depicts the hardware configuration WLAN Router PC Power Outlet Ethernet AC DC cable Ethernet Cable DSL M...

Страница 17: ...lt IP address of the device is 192 168 1 1 In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the control panel double click Network Connections and then double click on the connection of your Network Interface Card NIC You will then see the following screen ...

Страница 18: ...click on the Properties button This will allow you to configure the TCP IP settings of your PC Notebook Select Obtain an IP address automatically radio button 3 Click on the OK button to close this window and once again to close LAN properties window ...

Страница 19: ... browser and press Enter Make sure that the device and your computers are configured on the same subnet Refer to previous chapter in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Enter admin for both User Name and Password Click on Login to enter the administration page ...

Страница 20: ...OTICE The configuration wizard for each connection type is described below Click on the Internet Settings to begin the process Internet Settings Page contains various settings related to WAN Internet service Usually you only need to configure Internet Connection Type section to connect to the Internet Unless your ISP specified otherwise please keep the default settings if you are unsure of the con...

Страница 21: ...his option if your internet connection requires a user name and password Most DSL modems use this type of connection o PPTP Point to Point Tunneling Protocol Choose this type of connection if your ISP requires you to use PPTP Your ISP should provide you with a user name and password o Static IP address Choose this option if you have a dedicated IP address Page content will change in accords to the...

Страница 22: ...ng This option is normally turned off and should remain off as long as the WAN side DHCP server correctly provides an IP address to the router However if the router cannot obtain an IP address from the DHCP server the DHCP server may be one that works better with unicast responses In this case turn the unicasting option on and observe whether the router can obtain an IP address In this mode the ro...

Страница 23: ...s in the next field is not required However if you select the Static IP radio button then the IP address in the next field is required IP Address specify the IP address if required User Name Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field Verify Password enter the password again for veri...

Страница 24: ...tion if you want the device to automatically connect o Manual Connect choose this option if you want the device to connection on demand Maximum Idle Time specify the maximum idle time disconnect when device is idled over the specified period ...

Страница 25: ...y your ISP to gain access to the Internet The supported authentication protocols are PAP and CHAP Address Mode PPTP can be used with a dynamic or static IP address If you select the Dynamic IP radio button then the IIP address in the next field is not required However if you select the Static IP radio button then the IP address in the next field is required PPTP IP Address Specify the IP address P...

Страница 26: ...verify it once again in the next field Verify Password enter the password again for verification Reconnect Mode o Keep Connection choose this option if you want a continuous connection o Automatic Connect choose this option if you want the device to automatically connect o Manual Connect choose this option if you want the device to connection on demand Maximum Idle Time specify the maximum idle ti...

Страница 27: ...e IP address for this device which is assigned by your ISP Subnet Mask Specify the subnet mask for this IP address which is assigned by your ISP Gateway Address Specify the IP address of the default gateway which is assigned by your ISP Usually Static IP Address needs to specify DNS setting please configure your DNS setting Primary Secondary DNS Address Specify the primary and secondary IP address...

Страница 28: ...t to this connection Internet Settings Page contains various settings related to WAN Internet service Usually you only need to configure Internet Connection Type section to connect to the Internet Unless your ISP specified otherwise please keep the default settings if you are unsure of the configuration Please consult your local ISP for your Internet Connection Type and account information ...

Страница 29: ...termines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downs...

Страница 30: ...ts from the Internet that are sent to the WAN IP Address Enable WAN Ping Respond checking the box You can specify the Inbound Filter and choose whether to Allow All or Deny All 4 2 5 Multicast Streams Enable Multicast Streams checking the box if you have multicast streaming service on your local network ...

Страница 31: ...31 31 4 2 6 MAC Cloning MAC Address specify the MAC address Click on Clone Your PC s MAC address button to enter the MAC address of your PC laptop automatically ...

Страница 32: ...s network settings such as the SSID and security WEP WPA Please refer to Chapter 6 in order to configure the more advanced features of the device 5 1 Wireless Network Wizard Setup Click on the Wizard_Wireless link under the Basic menu and then click on the Wireless Network Setup Wizard button ...

Страница 33: ... inform you that there are two options auto and manual 5 1 1 Automatic Network Setup If you select the Auto option then the device will automatically configure the SSID and security mode Click on the Next button to continue ...

Страница 34: ...twork Setup If you select the Manual option then you will be required to specify the SSID and select the appropriate network security Click on the Next button to continue The wireless wizard will inform you that there are three major steps in the process o Name your wireless network o Secure your wireless network o Set your wireless security password ...

Страница 35: ...Wireless Network Name SSID for the device The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters Click on the Next button to continue ...

Страница 36: ... your wireless adapters do not support WPA but support WEP instead o None Select this option if you do not want to activate any security features In order to protect your network from hackers and unauthorized users it is highly recommended to secure the network using encryption and authentication Select a level of security and then click on the Next button to continue If you do not want to setup s...

Страница 37: ...o button which supports WPA2 encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Страница 38: ... 2 Wireless Security Level BETTER WPA Select the BETTER radio button which supports WPA encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button ...

Страница 39: ...n and then reboot the device 5 1 2 3 Wireless Security Level GOOD WEP 64 128 bit Select the GOOD radio button which supports WEP encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button ...

Страница 40: ...plete Click on the Save button and then reboot the device 5 1 2 4 Wireless Security Level None Security Disabled Select the NONE radio button if you do not want to activate any security features Then click on the Next button ...

Страница 41: ...41 41 The setup is complete Click on the Save button and then reboot the device ...

Страница 42: ... then leave the password field blank After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into six main sections 1 Basic This menu includes the wireless wizard network settings wireless settings and WAN settings 2 Advanced This menu includes virtual server special applications port forwarding routing access control web filter MAC add...

Страница 43: ...the navigation drop down menu 6 2 1 Internet Settings Refer to Chapters 4 in order to use the wizard The other options are described below 6 2 2 Wizard Wireless Refer to Chapters 5 in order to use the wizard The other options are described below ...

Страница 44: ...s a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly Select the Bridge Mode radio button WAN Port Mode Select the Bridge Mode radio button Router IP Address Specify the IP address of this device Subnet Mask Specify the subnet mask for the IP address Default Gateway Specify the IP address of the upstream router Primary Secondary DNS Spe...

Страница 45: ...t here and you have a LAN side laptop with a name of chris that laptop will be known as chris mynetwork net Note however the entered domain name can be overridden by the one obtained from the router s upstream DHCP server Enable DNS Relay Check this box to enable the DNS relay feature When DNS Relay is enabled the router plays the role of a DNS server DNS requests sent to the router are forwarded ...

Страница 46: ...his is the only rounter on the LAN or if all the routers support Version 2 Router Metric The additional cost of routing a packet through this router The normal value for a simple network is 1 This metric is added to routes learned from other routers it is not added to static or system routes Act as default router Make this router the preferred destination for packets that are not otherwise destine...

Страница 47: ...es option controls whether the router updates its routing tables when it receives RIP messages from other LAN devices Disable Accept RIP Updates if not needed or if RIP messages could originate from an insecure device on the LAN Enable Accept RIP Updates only if operation of your network requires updates from other routers and if you have assured the security of RIP messages on your network ...

Страница 48: ...er Settings DHCP stands for Dynamic Host Configuration Protocol The DHCP section is where you configure the built in DHCP Server to assign IP addresses to the computers and other devices on your local area network LAN ...

Страница 49: ...8 0 254 can be made available for allocation by the DHCP Server DHCP Lease Time The amount of time that a computer may have an IP address before it is required to renew the lease The lease functions just as a lease on an apartment would The initial lease designates the amount of time before the lease expires If the tenant wishes to retain the address when the lease is expired then a new lease is e...

Страница 50: ...erform NetBIOS name registration and discovery Broadcast only Local network broadcast only This setting is useful where there are no WINS servers available however it is preferred you try Mixed Mode operation first This setting has no effect if the Learn NetBIOS information from WAN is activated Point to Point Use WINS servers only This setting is useful to force all NetBIOS operation to the confi...

Страница 51: ... Web and FTP Servers on your network should either use a static IP address or use this option Computer Name You can assign a name for each computer that is given a reserved IP address This may help you keep track of which computers are assigned this way Example Game Server IP Address The LAN address that you want to reserve MAC Address To input the MAC address of your system enter it in manually o...

Страница 52: ... highlighted and the Edit DHCP Reservation section is activated for editing Number of Dynamic DHCP Clients In this section you can see what LAN devices are currently leasing IP addresses Revoke The Revoke option is available for the situation in which the lease table becomes full or nearly full you need to recover space in the table for new entries and you know that some of the currently allocated...

Страница 53: ...m the drop down list For example if you are sure that the wireless network will be using only IEEE 802 11g clients then it is recommended to select 802 11g only instead of 2 4 GHz B G which will reduce the performance of the wireless network You may also select Mixed 802 11n 802 11g and 802 11b If all of the wireless devices you want to connect with this router can connect in the same transmission...

Страница 54: ...nnel Width Select a channel width from the drop down list Visibility Status Select Visible or Invisible This is the SSID broadcast feature When this option is set to Visible your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When Invisible mode is enabled you must enter the Wireless Network Name S...

Страница 55: ...our privacy this mode supports several types of wireless security WEP WPA WPA2 and WPA Mixed WEP is the original wireless encryption standard WPA provides a higher level of security The following section describes the security configuration in detail ...

Страница 56: ...rk Four keys can be defined so that you can change keys easily A default key is selected for use on the network WEP Key Length Select a 64 bit or 128 bit WEP key length from the drop down list WEP Key 1 4 You may enter four different WEP keys Default WEP Key You may use up to four different keys for four different networks Select the current key that will be used Authentication Select Open or Shar...

Страница 57: ...l provides per packet key generation and is based on WEP AES Use AES only AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES TKIP and AES The bridge negotiates the cipher type with the access point and uses AES when available Group Ke...

Страница 58: ...P WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with This option works with a RADIUS Server to authenticate wireless clients Wireless clients should have established the necessary credentials before attempting to authen...

Страница 59: ...efore the group key used for broadcast and multicast data is changed Authentication Timeout Specify the number of minutes after which the client will be required to re authenticate RADIUS Server IP Address Specify the IP address of the RADIUS server RADIUS Server Port Specify the port number of the RADIUS server the default port is 1812 RADIUS Server Shared Secret Specify the pass phrase that is m...

Страница 60: ...60 60 6 3 Advanced Click on the Advanced link on the navigation drop down menu The configuration steps for each option are described below ...

Страница 61: ...cking on Advanced tab you will be able to access Advanced Wireless page If you are not familiar with Advanced Wireless settings please refer to help before changing these settings Transmit Power Set the power output of the wireless signal ...

Страница 62: ...also known as L2 Isolation prevents associated wireless clients from communicating directly with each other by using low level link layer protocols and without passing through the router Multicast to Unicast When multiple wireless clients are receiving streaming media enabling this option can provide better performance in some cases by transforming each multicast packet into multiple unicast packe...

Страница 63: ...tual server for example Web Server Several well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address Specify the IP address for the virtual server entry Protocol Specify a protocol or select one from the drop down list Public Port Specify the...

Страница 64: ...lter Select an inbound filter from the drop down list If an inbound filter does not exist you may create it from Advanced Inbound Filter section Click on the Save button to insert the entry into the Virtual Server list ...

Страница 65: ...eral well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server Triggering Ports Specify the outgoing port range that is used by the application Firewall Ports Specify the port range that you would like to open for Internet traffic Schedule Select a sche...

Страница 66: ...Web Server Several well known types of virtual server are available from the Application Name drop down list Selecting one of these entries fills some of the remaining parameters with standard values for that type of server IP Address Specify the IP address for the virtual server entry TCP UDP Ports Specify the TCP or UDP port numbers Schedule Select a schedule Always or Never from the drop down l...

Страница 67: ...ed this option causes the router to automatically measure the useful uplink bandwidth each time the WAN interface is re established after a reboot for example Measured Uplink Speed Displays the uplink speed This is the uplink speed measured when the WAN interface was last re established The value may be lower than that reported by your ISP as it does not include all of the network protocol overhea...

Страница 68: ...onfigure either Static or DHCP in the WAN settings setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize that it needs to shape traffic slightly differently in order to give the best performance Choosing xDSL or Other Frame Relay Network causes the measured uplink speed to be reported slightly lower than before on such connections but gives much better res...

Страница 69: ...StreamEngine supports overlaps between rules where more than one rule can match for a specific message flow If more than one rule is found to match the rule with the highest priority will be used Enable Check this box to enable the StreamEngine rule Name Specify a name for the rule Priority Specify a priority for the rule 0 being the highest and 255 the lowest priority Protocol Specify a protocol ...

Страница 70: ... Metric Specify the number of routing hops The route metric is a value from 1 to 16 that indicates the cost of using this route A value of 1 is the lowest cost and 15 is the highest cost A value of 16 indicates that the route is not reachable from this router When trying to reach a particular destination computers on your network will select the best route ignoring unreachable routes Interface Sel...

Страница 71: ...ed access to the Internet However if you enable Access Control Internet access is restricted for those devices that have an Access Control Policy configured for them All other devices have unrestricted access to the Internet Check the Enable Access Control check box and then click on the Add Policy button This will bring up the Add New Policy wizard The wireless wizard will inform you that there a...

Страница 72: ...72 72 Click on the Next button to continue Specify a policy name and then click on the Next button to continue ...

Страница 73: ...radio button IP Address If you selected IP address above then specify the IP address here MAC Address If you need to change the MAC address of the router s WAN side Ethernet interface either type in an alternate MAC address for example the MAC address of the router initially connected to the ISP or click on Clone Your PCs MAC Address Click on the OK button to insert the entry into the table Click ...

Страница 74: ...s Only Select this radio but in order to log web access Block All Access Select this radio but in order to block all web access Block Some Access Select this radio but in order to block some web access Click on the Save button to store the changes ...

Страница 75: ...to restrict certain websites from being accessed through your network These filters can be used for securing and restricting your network Website URL Domain Specify the web address that you would like to filter Do not use http Click on the Save button to store the changes ...

Страница 76: ...o control network access Turn MAC Filtering ON and ALLOW computers listed to access the network When ALLOW is selected only computers with MAC addresses listed in the MAC Filtering Rules list are granted network access Turn MAC Filtering ON and DENY computers listed to access the network When DENY is selected any computer with a MAC address listed in the MAC Filtering Rules list is refused access ...

Страница 77: ...ways of opening the firewall to address the needs of specific types of applications Enable SPI Check this box to enable SPI SPI stateful packet inspection also known as dynamic packet filtering helps to prevent cyberattacks by tracking more state per session It validates that the traffic passing through that session conforms to the protocol When the protocol is TCP SPI checks that packet sequence ...

Страница 78: ...ract with other port restrictions Endpoint Independent Filtering takes priority over inbound filters or schedules so it is possible for an incoming session request related to an outgoing session to enter through a port in spite of an active inbound filter on that port However packets will be rejected as expected when sent to blocked ports whether blocked by schedule or by inbound filter for which ...

Страница 79: ...uch as web FTP email and DNS servers DMZ IP Address Specify the IP address of the DMZ host Non UDP TCP ICMP LAN Sessions Check this box to enable this feature When a LAN application that uses a protocol other than UDP TCP or ICMP initiates a session to the Internet the router s NAT can track such a session even though it does not recognize the protocol This feature is useful because it enables cer...

Страница 80: ...connecting with your corporate network try disabling this option Check with the system administrator of your corporate network whether your VPN client supports NAT traversal RTSP Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet QuickTime and Real Player are some of the common applications using this protocol Windows MSN Messenger Supports use o...

Страница 81: ...you trust to access your LAN through the ports that you have opened Inbound Filters can be used for limiting access to a server on your network to a system or group of systems Filter rules can be used with Virtual Server Gaming or Remote Administration features Name Specify a name for the inbound filter Action Select Allow or Deny from the drop down list This will apply the inbound filter rule on ...

Страница 82: ...assifier This allows the device to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic Such streams are frequently used by digital media players Windows Media Center Check this box to add HTTP as a classifier This enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above ...

Страница 83: ...r most applications the priority classifiers ensure the right priorities and specific WISH Rules are not required WISH supports overlaps between rules If more than one rule matches for a specific message flow the rule with the highest priority will be used Name Assign a meaningful name to the WISH rule Priority Select a priority from the drop down list The four priority message flows are BK Backgr...

Страница 84: ...eck this box to lock the wireless security settings and prevent the settings from being changed by any new external registrar using its PIN Devices can still be added to the wireless network using Wi Fi Protected Setup Reset PIN to Default Press this button to reset the PIN to its default setting Generate NEW PIN Press this button to generate a new random PIN Add Wireless Device Wizard Please refe...

Страница 85: ... can work with other UPnP devices and software Allow Users to disable Internet Access Check this box if you would like to allow to user to terminate the WAN session Allow Users to modify Virtual Server Mappings Check this box if you would like the users to add modify or delete server mapping entries Enable WAN Ping Respond Check this box if you would like this device to be pinged from the WAN side...

Страница 86: ... have a multimedia LAN application that is not receiving content as expected try enabling this option Enable PPPoE Pass Through Check this box to enable PPPoE pass through This option controls whether LAN computers can act as PPPoE clients and negotiate the PPP sessions through the router over the WAN ethernet link Enabling this option allows LAN computers to act as PPPoE clients Disabling this op...

Страница 87: ...ols Click on the Tools on the navigation drop down menu You will then see seven options Time System Firmware SysLog Dynamic DNS System Check and Schedules The configuration steps for each option are described below ...

Страница 88: ...e and time of the device can be configured manually or by synchronizing with a time server Note If the device losses power for any reason it will not be able to keep its clock running and will not display the correct time once the device has been restarted Therefore you must re enter the correct date and time Current Router Time Displays the current time on the device Time Zone Select your time zo...

Страница 89: ... in this box if you would like to synchronize the device s clock to a Network Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Used Specify the NTP server or select one from the drop down list Set the Date and Time Select a date and time from the drop down list or do to use computer s time and d...

Страница 90: ... by using the Save or Save to Disk button in the dialog box 6 4 2 2 Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the device Click on the Browse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting p...

Страница 91: ...restores al configuration settings back to the settings that were in effect at the time when the device was shipped from the factory Once the dialog box appears click on the OK button to confirm the action Note The current settings will be lost Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do not un plug the device during thi...

Страница 92: ...k on the OK button to confirm the action Once the dialog box appears click on the OK button to confirm the action Note The current settings will be lost Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do not un plug the device during this process as this may cause permanent damage ...

Страница 93: ... and performance This page also displays the current firmware version and its release date Ensure that you have downloaded the appropriate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface Click on the Browse button to select the firmware and then click on the Upload button ...

Страница 94: ...an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes Enable Logging to a Syslog Server Check this box to enable syslog logging Syslog Server IP Address Specify the IP address of the syslog server Click on the Save Settings button once you have modified the settings ...

Страница 95: ...ess is Enable Dynamic DNS Check this box to enable the DDNS feature Service Address Select a DDNS service provider from the drop down list DynDNS is a free service while TZO offers a 30 day free trial Host Name Specify the website URL User Name Specify the user name for the DDNS service Password Specify the password for the DDNS service and verify it once again in the next field Timeout Specify th...

Страница 96: ...ystem Check Click on the System Check link in the navigation menu This page allows you to ping a host name or IP address Host Name or IP address Specify the host name or IP address and then click on the Ping button ...

Страница 97: ...i and enter a Start Time of 3pm and End Time of 8pm Name Specify a name for the schedule Day s Select the days at which you would like the schedule to be effective All Day 24 hrs Check this box if you would like the schedule to be active for 24 hours Start Time If you do not use the 24 hours option you may specify a start time End Time If you do not use the 24 hours option you may specify an end t...

Страница 98: ...tus Click on the Status on the navigation drop down menu You will then see six options Wireless Logs Statistics WISH Sessions Routing and Internet Sessions The configuration steps for each option are described below ...

Страница 99: ... being used by the client Values are 11a 11b 11g or 11n for 802 11a 802 11b 802 11g or 802 11n respectively Rate The actual transmission rate of the client in megabits per second Signal This is a relative measure of signal quality The value is expressed as a percentage of theoretical best quality Signal quality can be reduced by distance by interference from other radio frequency sources such as c...

Страница 100: ...view the router logs You can define what types of events you want to view and the level of events to view This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility What to View Select the features of which you would like to view the logs Firewall Security System or Router Status View Levels Select the warning le...

Страница 101: ... Click on the Statistics link in the navigation drop down menu This page displays the transmitted and received packet statistics of the wired LAN WAN and wireless interface Click on the Refresh button to refresh the statistics ...

Страница 102: ...e port number of the computer to which a network connection has been made Protocol The communications protocol used for the conversation State State for sessions that use the TCP protocol NO None This entry is used as a placeholder for a future connection that may occur SS SYN Sent One of the systems is attempting to start a connection EST Established the connection is passing data FW FIN Wait The...

Страница 103: ...nd least urgent BE Best Effort VI Video VO Voice most urgent Time Out The number of seconds of idle time until the router considers the session terminated The initial value of Time Out depends on the type and state of the connection 300 seconds UDP connections 240 seconds Reset or closed TCP connections The connection does not close instantly so that lingering packets can pass or the connection ca...

Страница 104: ...104 104 6 5 5 Routing This function shows current routing table ...

Страница 105: ... connection that may occur SS SYN Sent One of the systems is attempting to start a connection EST Established the connection is passing data FW FIN Wait The client system has requested that the connection be stopped CW Close Wait the server system has requested that the connection be stopped TW Time Wait Waiting for a short time while a connection that was in FIN Wait is fully closed LA Last ACK W...

Страница 106: ...P connections 240 seconds Reset or closed TCP connections The connection does not close instantly so that lingering packets can pass or the connection can be re established 7800 seconds Established or closing TCP connections ...

Страница 107: ...107 107 6 5 7 Firewall This page displays the full details about firewall holes in your router ports that accept unsolicited messages from the WAN ...

Страница 108: ...108 108 Appendix A Glossary ...

Страница 109: ...ts Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions Ad hoc network Peer to Peer network between wireless clients ADSL Asymmetric Digital Subscriber Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and receive RF signals AppleTalk A set of Loca...

Страница 110: ... computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network B Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or bits per second that can be transmitted to and from a network device Basic Input Output S...

Страница 111: ...ta path DMA and consumes less voltage CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time Cookie Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer...

Страница 112: ...A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network but that is not protected by the same security as the Local Network DHCP Dynamic Host Configuration Protocol Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that request them Digital certificate An electronic method o...

Страница 113: ...will always by linked to their changing IP address The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS whenever the IP address changes Dynamic IP address IP address that is assigned by a DHCP server and that may change Cable Internet providers usually use this method to assign IP addresses to their customers E EAP Extensible Authentica...

Страница 114: ...t tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Gateway A device that connects your network to another like the internet Gbps Gigabits per...

Страница 115: ...P over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information Server is a WE...

Страница 116: ...vides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32 bit number when talking about Internet Protocol Version 4 that identifies each computer that transmits data on the Internet or on an Intranet IPsec Interne...

Страница 117: ...Local Area Network A group of computers in a building that usually access files from a server LPR LPD Line Printer Requestor Line Printer Daemon A TCP IP protocol for transmitting streams of printer data M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight...

Страница 118: ...vice to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet or another network through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protocol This is an updated version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the...

Страница 119: ... range of 10 meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier Ping A utility program that verifies that a given Internet address exists and can receive messages The utility sends a control packet to the given address and waits for a response PoE Power over Ethernet is the means of transmitting electricity over t...

Страница 120: ... operating software or firmware from nonvolatile storage Rendezvous Apple s version of UPnP which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a netwo...

Страница 121: ...l Governs the management and monitoring of network devices SIP Session Initiation Protocol A standard protocol for initiating a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure ...

Страница 122: ...l File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less features Throughput The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between you computer and specific destination U UDP User Datagram Protocol Unicast Communication between a single sender and receiver Universal Plug and Play A s...

Страница 123: ...information over the Internet as opposed to the PSTN VoIP Voice over IP W Wake on LAN Allows you to power up a computer though it s Network Interface Card WAN Wide Area Network WCN Windows Connect Now A Microsoft method for configuring and bootstrapping wireless networking hardware access points and wireless clients including PCs and other devices WDS Wireless Distribution System A system that ena...

Страница 124: ...entication as well as encryption Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802 11 wireless standards WISP Wireless Internet Service Provider WLAN Wireless Local Area Network WPA Wi Fi Protected Access A Wi Fi security enhancement that provides improved data encryption relative to W...

Страница 125: ...ESR9855G Wireless N Gaming Router 125 ...

Страница 126: ... measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void th...

Отзывы: