background image

Can I run an application from a remote computer over the wireless network?

This will depend on whether or not the application is designed to be used over a network. Consult
the
application’s documentation to determine if it supports operation over a network.

What is the IEEE 802.11g standard?

It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless
networking hardware
from different manufacturers to communicate, provided that the hardware complies with the
802.11g standard.
The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency
of 2.4GHz.

What IEEE 802.11b features are supported?

The product supports the following IEEE 802.11b functions:
• CSMA/CA plus Acknowledge protocol
• Multi-Channel Roaming

• Automatic Rate Selection
• RTS/CTS feature
• Fragmentation
• Power Management

What is ad-hoc mode?

When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured
to
communicate directly with each other. The ad-hoc wireless network will not communicate with any
wired
network.

What is infrastructure mode?

When a wireless network is set to infrastructure mode, the wireless network is configured to
communicate with a
wired network through a wireless access point.

What is roaming?

Roaming is the ability of a portable computer user to communicate continuously while moving
freely throughout
an area greater than that covered by a single access point. Before using the roaming function, the
workstation
must make sure that it is the same channel number with the access point of dedicated coverage
area.
To achieve true seamless connectivity, the wireless LAN must incorporate a number of different
functions. Each
node and access point, for example, must always acknowledge receipt of each message. Each
node must
maintain contact with the wireless network even when not actually transmitting data. Achieving
these functions
simultaneously requires a dynamic RF networking technology that links access points and nodes.
In such a
system, the user’s end node undertakes a search for the best possible access to the system. First,
it evaluates
such factors as signal strength and quality, as well as the message load currently being carried by
each access
point and the distance of each access point to the wired backbone. Based on that information, the
node next
selects the right access point and registers its address. Communications between end node and
host computer
can then be transmitted up and down the backbone.
As the user moves on, the end node’s RF transmitter regularly checks the system to determine
whether it is in

Содержание R930706G

Страница 1: ...Windows XP PCs Chapter 6 Configuring the Router Overview How to Access the Web based Utility The Setup Tab The Wireless Tab The Security Tab The Access Restrictions Tab The Applications and Gaming Tab...

Страница 2: ...ions Appendix E SNMP Functions Appendix F Upgrading Firmware Appendix G Windows Help Appendix H Glossary Appendix I Specifications Appendix J Warranty Information Appendix K Regulatory Information App...

Страница 3: ...pass through and can be configured to filter internal users access to the Internet Configuration is a snap with the web browser based configuration utility With the Wireless AP VPN Router at the cente...

Страница 4: ...ix G Finding the MAC Address and IP Address for your Ethernet Adapter This appendix describes how to find the MAC address for your computer s Ethenet adapter so you can use the MAC filtering and or MA...

Страница 5: ...outers requires an IP address to identify its location or address on the network This applies to both the Internet and LAN connections There are two ways of assigning an IP address to your network dev...

Страница 6: ...more than one DHCP server on your network you will experience network errors such as conflicting IP addresses To disable DHCP on the Router see the DHCP section in Chapter 6 The Router s Web based Ut...

Страница 7: ...travels over the Internet Data travelling over the Internet will often pass through many different servers around the world before reaching its final destination That s a long way to go for unsecured...

Страница 8: ...ternet distance is not a factor Using the VPN the telecommuter now has a secure connection to the central office s network as if he were physically connected IMPORTANT You must have at least one VPN R...

Страница 9: ...ings etc and replace them with the factory defaults Do not reset the Router if you want to retain these settings Figure 3 1 Back Panel The Front Panel The Router s LEDs where information about network...

Страница 10: ...nect one end of an Ethernet network cable to one of the LAN ports labeled 1 4 on the back of the Router see Figure 4 1 and the other end to an Ethernet port on a PC 3 Repeat this step to connect more...

Страница 11: ...front panel will light up green as soon as the power adapter is connected properly The Power LED will flash for a few seconds then light up steady when the self test is complete If the LED flashes for...

Страница 12: ...tings and click the Control Panel icon Double click the Network icon 2 On the Configuration tab select the TCP IP line for the applicable Ethernet adapter as shown in Figure 5 1 Do not choose a TCP IP...

Страница 13: ...he following instructions assume you are running Windows XP with the default interface If you are using the Classic interface where the icons and menus look like previous Windows versions please follo...

Страница 14: ...net connection and network settings on this screen DDNS To enable the Router s Dynamic Domain Name System DDNS feature complete the fields on this screen MAC Address Clone If you need to clone a MAC a...

Страница 15: ...use of special purpose services use this screen Administration Management On this screen alter router access privileges and UPnP settings Log If you want to view or save activity logs click this tab D...

Страница 16: ...rd Screen Static See Figure 6 3 If you are required to use a permanent IP address to connect to the Internet then select Static IP IP Address This is the Router s IP address when seen from the WAN or...

Страница 17: ...the Router s Subnet Mask as seen by external users on the Internet including your ISP Your ISP will provide you with the Subnet Mask Default Gateway Your ISP will provide you with the Default Gateway...

Страница 18: ...ommended that you leave the Router enabled as a DHCP server Local DHCP Server DHCP is already enabled by factory default If you already have a DHCP server on your network set the Router s DHCP option...

Страница 19: ...d making your changes on this tab click the Save Settings button to save these changes or click the Cancel Changes button to undo your changes TZO com Tab Email Address TZO Password Key and Domain Nam...

Страница 20: ...of network data select the protocol you want RIP1 or RIP2 Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want RIP1 RIP1 Compatible or RIP2 Figure...

Страница 21: ...e Save Settings button to save these changes or click the Cancel Changes button to undo your changes Figure 6 10 Routing Table Hot Spot Tab The Hot Spot tab is for business owners who want to generate...

Страница 22: ...d Key WPA gives you one encryption method TKIP with dynamic encryption keys Select the type of algorithm TKIP Enter a WPA Shared Key of 8 63 characters Then enter a Group Key Renewal period which inst...

Страница 23: ...anumeric characters This Passphrase function is compatible with Wireless AP VPN Router wireless products only and cannot be used with Windows XP Zero Configuration If you want to communicate with non...

Страница 24: ...a WEP key for authentication For Shared Key authentication the sender and recipient use a WEP key for authentication If you want to use only Shared Key authentication then select Shared Key CTS Prote...

Страница 25: ...e Fragmentation Threshold too low may result in poor network performance Only minor modifications of this value are recommended Figure 6 19 Advanced Wireless Settings The Security Tab Firewall When yo...

Страница 26: ...kets at the IP layer To allow IPSec Passthrough click the Enabled button To disable IPSec Passthrough click the Disabled button PPTP Pass Through Point to Point Tunneling Protocol Passthrough is the m...

Страница 27: ...t traffic to the correct computer Refer to the Port Range Forwarding tab of the Applications and Gaming tab The Remote Secure Group is the computer s on the remote end of the tunnel that can access th...

Страница 28: ...6 26 Subnet Any Authentication Authentication acts as another level of security There are two types of authentication MD5 and SHA SHA is recommended because it is more secure As with encryption either...

Страница 29: ...me Authentication method Authentication Key This field specifies a key used to authenticate IP traffic and the Authentication Key is generated yourself The hexadecimal value is acceptable in this fiel...

Страница 30: ...optionally select to have the key expire at the end of a time period of your choosing Enter the number of seconds you d like the key to be used until a re key negotiation between each endpoint is comp...

Страница 31: ...rious services accessed over the Internet such as FTP or Telnet by selecting a service from the drop down menus next to Blocked Services If a service isn t listed you can click the Add Service button...

Страница 32: ...ort Triggering is used for special Internet applications whose outgoing ports differ from the incoming ports For this feature the Router will watch outgoing data for specific port numbers See Figure 6...

Страница 33: ...ware DMZ Public IP DMZ host can be assigned one public IP addr which was provided by ISP Private IP DMZ host own private IP addr It s different from LAN Hosts Figure 6 38 DMZ Figure 6 39 Management Th...

Страница 34: ...nferencing To enable UPnP click Enabled Allow User to make Configuration Changes When enabled this feature allows you to make manual changes while still using the UPnP feature Allow users to disable I...

Страница 35: ...the test Click the Clear Result button to clear the results The results of the test will display in the window Figure 6 41 Ping Test Factory Default See Figure 6 42 If you have exhausted all other op...

Страница 36: ...re check the Neo Meridian website at www Neo Meridian com Common Problems and Solutions 1 I need to set a static IP address on a PC You can assign a static IP address to a PC by performing the followi...

Страница 37: ...he OK button in the Local Area Connection Properties window 9 Restart the computer if asked For Windows XP The following instructions assume you are running Windows XP with the default interface If yo...

Страница 38: ...g followed by your Internet or WAN IP address and press the Enter key The Internet or WAN IP Address can be found on the Status screen of the Router s web based utility For example if your Internet or...

Страница 39: ...I need to remove the proxy settings or the dial up pop up window for PPPoE users 5 I can t get my Virtual Private Network VPN working through the Router Access the Router s web interface by going to...

Страница 40: ...go to For example if the web server s Ethernet adapter IP address is 192 168 1 100 you would enter 100 in the field provided Check Appendix D Finding the MAC Address and IP Address for Your Ethernet A...

Страница 41: ...o successfully use DMZ hosting since forwarding has priority over DMZ hosting In other words data that enters the Router will be checked first by the forwarding settings If the port number that the da...

Страница 42: ...configuration 12 I need to upgrade the firmware In order to upgrade the firmware with the latest features you need to go to the Neo Meridian website and download the latest firmware at www Neo Meridia...

Страница 43: ...in 3 Look for the MTU option and select Manual In the Size field enter 1492 4 Click the Save Settings button to continue If your difficulties continue change the Size to different values Try this list...

Страница 44: ...o a LAN Does the Internet connection of the Router support 100Mbps Ethernet The Router s current hardware design supports up to 100Mbps Ethernet on its Internet port however the Internet connection sp...

Страница 45: ...osting games the HL server does not need to be in the DMZ Just forward port 27015 to the local IP address of the server computer How can I block corrupted FTP downloads If you are experiencing corrupt...

Страница 46: ...ome applications require multiple TCP IP ports to be open It is recommended that you set your computer with a static IP if you want to use DMZ Hosting To get the LAN IP address see Appendix D Finding...

Страница 47: ...ith a wired network through a wireless access point What is roaming Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than t...

Страница 48: ...SS and Frequency Hopping Spread Spectrum FHSS What is DSSS What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a patt...

Страница 49: ...nd levels 64 or 128 are being used on all nodes of your wireless network How many channels frequencies are available with the Router There are eleven available channels ranging from 1 to 11 in North A...

Страница 50: ...is why most experts in wireless networking strongly recommend the use of WEP Wireless Equivalent Privacy WEP encryption scrambles your wireless signals so they can only be recognized within your wire...

Страница 51: ...the hacker will also have access to data in the wired network Further spammers can use your Internet connection and your ISP s mail server to send tens of thousands of e mails from your network witho...

Страница 52: ...net 2 Network Layout When you first lay out your network keep in mind where your wireless PCs are going to be located and try to position your router towards the center of that network radius Remember...

Страница 53: ...m MAC address or spoofing faking a MAC address 7 Firewalls You can use the same firewall technology to protect your wired network from hackers coming in through your wireless network as you did for th...

Страница 54: ...rk resources In this way multiple keys reduce your liability Finally be sure to change your WEP key regularly once a week or once a day Using a dynamic WEP key rather than one that is static makes it...

Страница 55: ...configuring the Windows 2000 server at the Microsoft website Microsoft KB Q252735 How to Configure IPSec Tunneling in Windows 2000 http support microsoft com support kb articles Q252 7 35 asp Microsof...

Страница 56: ...this section to win are references to Windows 2000 and XP Substitute the references to Router with Gateway Also the text on your screen may differ from the text in your instructions for OK or Close c...

Страница 57: ...e security option is enabled and deselect the Accept unsecured communication but always respond using IPSec check box Select Session key Perfect Forward Secrecy and click the OK button Figure C 12 Sec...

Страница 58: ...rwise proceed to the next step 15 Click the Tunnel Setting tab shown in Figure B 24 click the radio button for The tunnel endpoint is specified by this IP Address and enter the Windows 2000 XP compute...

Страница 59: ...key exchange and IKE proposals are secure You may use any combination of up to 24 numbers or letters in this field No special characters or spaces are allowed In the Key Lifetime field you may option...

Страница 60: ...something different Figure D 3 MAC Address Physical Address Note The MAC address is also called the Physical Address Appendix E SNMP Functions SNMP Simple Network Management Protocol is a widely used...

Страница 61: ...g PCs to your network Appendix H Glossary 802 11a An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz 802 11b An IEEE wireless...

Страница 62: ...ion Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning...

Страница 63: ...velops networking standards Infrastructure A wireless network that is bridged to a wired network via an access point IP Internet Protocol A protocol used to send data over a network IP Address The add...

Страница 64: ...Preamble Part of the wireless signal that synchronizes network traffic RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45...

Страница 65: ...network TX Rate Transmission Rate UDP User Datagram Protocol A network protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To repl...

Страница 66: ...RE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING When returning a product mark the Return Authorization Number clearly on the outside of the package and include a copy of your original proof of...

Страница 67: ...MERIDIAN LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT The foregoing limitations will apply even if any warranty or remedy provided under this Section fails of its essential purpose Some jur...

Страница 68: ...n between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician f...

Страница 69: ...tion Rec 70 03 For more details on legal combinations of power levels and antennas contact Neo Meridian Corporate Compliance Neo Meridian Group vakuuttaa t ten ett Instant Wireless IEEE 802 11 PC Card...

Страница 70: ...r gebruik met buitenantennes Neem contact op met verkoper voor juiste procedure Appendix L Contact Information Need to contact Neo Meridian Visit us online for information on the latest products and u...

Отзывы: