background image

 

 

2.2 

 

Installing the Router 

Step 1

 

Place the router upside down on the workbench, and paste the four pad stickers into the round recesses 
in the coroner of the device. 

Step 2

 

Place  the  router  right  side  up  on  the  workbench,  and  adjust  the  position  of  the  antennas.  See  the 
following figure. 

 

2.3 

 

Connecting the Router 

Step 1

 

Connect the Ethernet cable to the WAN port. 

 

Step 2

 

Connect the router to other network devices (such as servers and computers) using the Ethernet cable. 
Check  whether  the  connection  is  proper.  Connect  the  router  with  the  receptacle  using  the  power 

Содержание W15E

Страница 1: ...Q1 AC1200 Wireless Hotspot Router W15E User Guide...

Страница 2: ...any form or by any means without the prior written permission of Shenzhen Tenda Technology Co Ltd Disclaimer Pictures images and product specifications herein are for references only To improve intern...

Страница 3: ...ols that may be found in this document are defined as follows Symbol Meaning This format is used to highlight information of importance or special interest Ignoring this type of note may result in ine...

Страница 4: ...ator VLAN Virtual Local Area Network VPN Virtual Private Network WISP Wireless Internet Service Provider WPS WiFi Protected Setup Additional Information For more information search this product model...

Страница 5: ...ronmental Requirements 4 2 2 Installing the Router 5 2 3 Connecting the Router 5 3 Internet Connection Setup 7 4 Managing Devices 11 4 1 Log in to the Router Web UI 11 4 2 Log out of the Router Web UI...

Страница 6: ...1 2 Modifying Basic Parameters 35 6 2 Advanced Settings 36 6 2 1 Overview 36 6 2 2 Modifying Advanced Parameters 38 6 3 WMM Settings 38 6 3 1 Overview 38 6 3 2 Changing WMM Advanced Parameters 41 6 4...

Страница 7: ...7 4 1 Overview 67 7 4 2 Adding the Port Filter Rule 68 7 4 3 Example of Port Filter 69 7 5 Web Filter 72 7 5 1 Overview 72 7 5 2 Add a Web Filter Rule 73 7 5 3 Adding a Web Category 75 7 5 4 Example o...

Страница 8: ...guration procedure 104 9 5 4 Verification 107 10 Security 108 10 1 IP MAC Binding 108 10 1 1 Overview 108 10 1 2 Adding an IP MAC Binding Rule 109 10 1 3 Example of IP MAC Binding 110 10 2 Firewall 11...

Страница 9: ...ure 129 12 3 4 Verification 132 13 WiFi via WeChat 135 13 1 WiFi via WeChat 135 13 1 1 Overview 135 13 1 2 Enabling WiFi via WeChat 139 13 2 Example of WiFi via WeChat 139 13 2 1 Networking requiremen...

Страница 10: ...pgrade 158 15 4 1 Overview 158 15 4 2 Steps for Local Upgrade 159 15 4 3 Steps for Online Upgrade 159 15 5 Restore Factory Settings 160 15 5 1 Overview 160 15 5 2 Restoring Factory Settings via WEB UI...

Страница 11: ...16 System Status 168 16 1 System Info 168 16 2 Live Users 169 16 3 Traffic Statistics 171 16 4 Defense Logs 172 16 5 System Logs 173...

Страница 12: ...omnidirectional antennas and the built in independent low noise power amplifier it can provide stable coverage for an area of 300 square meters Support multi WAN policy to effectively prevent network...

Страница 13: ...By default they are LAN port LEDs Solid on No data is transmitted Blinking Data is transmitted Off No device connects to these ports or connection is faulty 5 LAN port 5 LED Solid on No data is transm...

Страница 14: ...to the wireless network and log in to the web UI of the router for setting After the router connects to the internet if the WiFi name has not been changed the wireless client can scan and connect to i...

Страница 15: ...ironment Temperature Humidity Operating environment 0 40 10 RH 90 RH non condensing Storage environment 40 70 5 RH 90 RH non condensing Anti static Precautions To prevent static interference keep the...

Страница 16: ...e router right side up on the workbench and adjust the position of the antennas See the following figure 2 3 Connecting the Router Step 1 Connect the Ethernet cable to the WAN port Step 2 Connect the...

Страница 17: ...6 adapter included with the package...

Страница 18: ...your computer to Obtain an IP address automatically and Obtain DNS server address automatically See Configure IP Address of Your Computer in Appendix 1 for detailed instructions Step 2 Start a browse...

Страница 19: ...Step 3 The system automatically detects your internet connection type Enter related values according to the on screen instructions and click Next Step 4 Set your SSID and WiFi password and click Next...

Страница 20: ...9 End By default the Set the wireless password as login password is enabled You can also disable this option and customize your login password...

Страница 21: ...etwork has no password You need to reconnect to the WiFi signal once the SSID and or WiFi password is changed By default the SSID of the 2 4 GHz network is Tenda_XXXXXX see the label at the bottom of...

Страница 22: ...omputer to Obtain an IP address automatically and Obtain DNS server address automatically See Configure IP Address of Your Computer in Appendix 1 for detailed instructions Step 2 Start a browser enter...

Страница 23: ...outer and perform no operation within 5 minutes the router logs you out Clicking Logout in the upper right corner of the web UI can log you out as well 4 3 Web UI Layout The web UI is composed of thre...

Страница 24: ...f the router When you select a function in level 2 navigation bar the configuration of the function appears in the configuration area Configuration area It enables you to view and modify configuration...

Страница 25: ...This module enables you to set the port mirroring function of the router Static Routing This module enables you to view the routing information and configure static routing Any IP By default this fun...

Страница 26: ...oE username and password if your computer is connected to the ISP without a router Dynamic IP The ISP such as China Telecom and China Unicom does not provide the username or password To access the int...

Страница 27: ...the ISP to access the internet The following describes the configuration steps Step 1 Choose Network Internet Settings The page displays the parameters for the function Step 2 Connection Type Select...

Страница 28: ...parameters for the function Step 2 Connection Type Select Static IP Step 3 IP Address Subnet Mask Gateway Primary Secondary DNS Enter the relevant values provided by your ISP Step 4 Click OK End Wait...

Страница 29: ...se you can try to clone the MAC address and access the internet again Current MAC It specifies the current MAC address of the WAN port of the router Default MAC It is used to restore the MAC address o...

Страница 30: ...at can access the internet without the router 5 3 LAN Settings 5 3 1 Overview This section enables you to modify the IP address of the LAN port DHCP server parameters and to bind unbind the MAC addres...

Страница 31: ...clients connected to the router If this function is disabled you have to manually configure the IP address of your client to access the internet You are recommended to retain the DHCP Server enabled...

Страница 32: ...is optional DHCP Reservation The client obtains the same IP address assigned by the DHCP server all the time so as to ensure proper usage of functions such as filter management bandwidth control and V...

Страница 33: ...CP Reservation module enables you to manually bind the IP address and MAC address of the client Adding a Rule Step 1 To access the Manual DHCP Reservation module choose Network LAN Settings Step 2 Cli...

Страница 34: ...ble the IP MAC bind rule Action It enables you to do the following actions It is used to disable the rule It is used to enable the rule It is used to edit the rule including the MAC address IP address...

Страница 35: ...t connected to the router It is recommended that you retain the default DHCP server settings to ensure internet connectivity 5 3 4 DHCP Reservation Step 1 Choose Network LAN Settings Step 2 Bind the I...

Страница 36: ...ccessfully See the following figure 5 4 Port Mirroring 5 4 1 Overview Port mirroring is used to copy the data packets from one or more ports of a device to the monitoring port It is an approach for th...

Страница 37: ...the mirroring port should be installed with monitoring software The default mirroring port is LAN5 which cannot be changed Mirrored Port It specifies the ports being monitored After the Port Mirroring...

Страница 38: ...on procedure Step 1 Choose Network Port Mirroring Step 2 Click Enable check box of Port Mirroring Step 3 Select the mirrored ports such as WAN1 LAN2 LAN3 and LAN4 and click OK End Verification Verify...

Страница 39: ...and the added Static Routing Destination Network It specifies the destination address namely the IP address that the packets can reach Subnet Mask It specifies the subnet mask of the destination netw...

Страница 40: ...mpany s intranet server information IP Address 172 16 0 0 Subnet Mask 255 255 0 0 The following figure shows the topology Configuration procedure Step 1 Set the WAN port according to the company s net...

Страница 41: ...onfigure a static routing rule 1 Click Add 2 In the window that appears configure the relevant parameters 1 Destination Network Enter the IP address of the destination network which is 172 16 0 0 in t...

Страница 42: ...ork can access the internet and the intranet 5 6 Any IP By default the clients connected to the router can access the internet either by automatically obtaining the IP address or with a manually confi...

Страница 43: ...NS resolving information of the websites accessed by the user If the website addresses the user wants to access are stored in the cache the system calls the cached information from the DNS cache of th...

Страница 44: ...ptimization It is used to test the wireless performance of the router which is designed for the advanced users Guest Network It is used to set the guest network parameters Wireless Repeater It is used...

Страница 45: ...d to change the SSID and password and retain the default configuration of other values WPA PSK boasts better compatibility while WPA2 PSK boasts better security You can choose the security type as req...

Страница 46: ...ers Security It specifies the encryption type of the wireless network None No security mode is selected WPA PSK It is a standard interoperable and enhanced WLAN security solution adopting an encryptio...

Страница 47: ...ou to set the advanced wireless parameters Without the guidance of professional personnel you are only recommended to modify the wireless channel and retain the default configuration of other options...

Страница 48: ...eless transmission rate of 300 Mbps Available options at 5 GHz include 11a 11ac and 11a n The default value is 11ac 11a It indicates that only 802 11a complaint clients can connect to the router In th...

Страница 49: ...width option 40 MHz is selected 6 2 2 Modifying Advanced Parameters Step 1 Choose Wireless Advanced Step 2 Modify the relevant parameters as required such as the wireless channel Step 3 Click OK End 6...

Страница 50: ...o with more than 10 users If more than 10 clients are connected to the router you are recommended to select this mode to ensure client capacity Custom This mode enables you to set the WMM EDCA paramet...

Страница 51: ...lost packets are not sent again if this policy is adopted This leads a higher packet loss rate EDCA Enhanced Distributed Channel Access EDCA It is a channel competition mechanism to ensure that packe...

Страница 52: ...BK AC_VI AC_VO The WMM mechanism divides WLAN traffic by priority in descending order into the AC VO voice stream AC VI video stream AC BE best effort and AC BK background access categories Packets in...

Страница 53: ...n RSSI Threshold It specifies the minimum strength of received signals acceptable to the RF of the router The default value is 90 dBm If the strength of the signals transmitted by a wireless device is...

Страница 54: ...g Probe Request packets that include the SSID field to scan their nearby wireless networks After receiving such packets the AP determines whether the wireless devices are allowed to access the wireles...

Страница 55: ...Modify the parameters as required Step 3 Click OK End 6 5 Guest Network 6 5 1 Overview A guest network is a network dedicated to guests Clients connected to a guest network can access the internet and...

Страница 56: ...It specifies whether to enable the Guest Network It is disabled by default Isolate Client It specifies whether to isolate the wireless clients connected to the guest network Enable It indicates that t...

Страница 57: ...at Security It specifies the encryption type of the guest network None It indicates that any wireless client can connect to the network WPA PSK It is a standard interoperable and enhanced WLAN securit...

Страница 58: ...SSID It specifies to select the SSID of the peer network device you want to repeat You can manually enter the SSID or select the SSID after scanning 6 6 2 Example of Configuring of Wireless Repeater N...

Страница 59: ...to set the wireless repeater Step 1 Choose Wireless Wireless Repeater Step 2 Wireless Repeater Click Enable Click to scan Step 3 Select the SSID you want to repeat from the drop down list box Step 4 E...

Страница 60: ...to SSID of Router 2 can access the internet You can access the Wireless Basic page to see the SSID If you cannot log in to the web UI using the original IP address after rebooting the router do the fo...

Страница 61: ...ent access control based on MAC addresses of wireless clients To use the function choose Wireless Access Control For limitation on connection time or connection of wired clients see 7 3 MAC Filter By...

Страница 62: ...an be performed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rule including MAC address and remark It is used to delete the rule 6 7 2 Example of Co...

Страница 63: ...52 Step 4 Enter the MAC address in the corresponding text box Step 5 Optional Enter the remark Step 6 Click OK Step 7 Return to the Access Control page and click OK...

Страница 64: ...53 End Verification Verify that only devices with MAC address of CC 3A 61 71 1B 6E can access the internet over Tenda_888888...

Страница 65: ...54 7...

Страница 66: ...ant to implement access control based on MAC address Port Filter This module enables you to set the specified ports inaccessible to the clients Web Filter This module enables you to set the specified...

Страница 67: ...56 7 1 2 Adding a Time Group Step 1 Click Add Step 2 Configure the rule parameters in the window that appears 1 Name Set the name of the rule 2 Time Day Set the specific time and day 3 Click OK End...

Страница 68: ...to the filter management functions 3 Click OK End 7 2 IP Filter 7 2 1 Overview Generally a device can access the internet either by obtaining a dynamic IP address from the router or using a static IP...

Страница 69: ...t specifies the time when the IP filter rule takes effect Status It specifies the current status of the rule including Enabled and Disabled Operation The following operations can be preformed on the r...

Страница 70: ...ng an IP Filter Rule Step 1 To access the page choose Filter Management IP Filter Step 2 Enable IP Filter and click OK Step 3 Click Add Step 4 Configure the rule parameters in the window that appears...

Страница 71: ...ution The IP filter function is recommended to address this problem Configuration procedure Step 1 Set the Time Group 8 00 18 00 See 7 1 2 Adding the Time Group for detailed configuration steps Step 2...

Страница 72: ...e Internet in this example 4 IP Group Select the IP group to which the rule is applied from the drop down list box 5 Time Group Select the time group to which the rule is applied from the drop down li...

Страница 73: ...00 7 3 MAC Filter 7 3 1 Overview Clients such as notebooks and pads all have MAC addresses Mac filter function enables you to implement access control on clients on LAN network MAC filter includes two...

Страница 74: ...when the corresponding device on the list can or cannot access the internet Status It specifies the current status of the rule including Enabled and Disabled Operation The following operations can be...

Страница 75: ...he MAC Filter Rule Step 1 To access the page choose Filter Management MAC Filter Step 2 Enable the MAC Filter and click OK Step 3 Click Add Step 4 Configure the rule parameters in the window that appe...

Страница 76: ...owed to access the internet is CC 3A 61 71 1B 6E Configuration procedure Step 1 Set the Time Group 8 00 18 00 See 7 1 2 Adding the Time Group for detailed configuration steps Step 2 Add the MAC Filter...

Страница 77: ...ional Enter the remark of this rule which is HR in this example 8 Click OK 9 Return to the MAC Filter page disable Allow hosts covered by disabled rules of not covered by the preceding rules to access...

Страница 78: ...1 Overview Specific port numbers are often used to identify specific services 0 1023 are common port numbers reserved for specific service types The port filter function can be used to control the acc...

Страница 79: ...annot access the internet Port It specifies the inaccessible service port Protocol Type It specifies the protocol of the inaccessible service It is recommended to retain the default settings Status It...

Страница 80: ...s regulations devices on LAN covered by the IP group of 192 168 0 2 192 168 0 250 cannot browse web pages default port number is 80 during 8 00 18 00 working hours from Monday to Friday Solution The p...

Страница 81: ...nge 192 168 0 2 192 168 0 250 See 7 1 3 Adding the IP Group for detailed configuration steps Step 3 Add the Port Filter rule 1 To access the page choose Filter Management Port Filter 2 Enable the Port...

Страница 82: ...group to which the rule is applied from the drop down list box 6 Ports Set the port or ports inaccessible from the LAN network 7 Protocol Type Set the protocol type used by the inaccessible service I...

Страница 83: ...5 Web Filter 7 5 1 Overview This module enables you to set the web filter function Web filter function disallows the specified clients on LAN network to access the specified websites such as shopping...

Страница 84: ...he IP group cannot access the websites Category It specifies the website category inaccessible to the clients Status It specifies the current status of the rule including Enabled and Disabled Operatio...

Страница 85: ...74 Step 3 Click Add Step 4 Configure the rule parameters in the window that appears including IP group time group websites and so on...

Страница 86: ...75 End 7 5 3 Adding a Web Category Step 1 To access the page choose Filter Management Web Filter Step 2 Select the check box of the Web Filter and click OK...

Страница 87: ...76 Step 3 Click Website Management Step 4 Click New Step 5 Set the website category parameters in the window that appears End...

Страница 88: ...bsites Solution The web filter function is recommended to resolve this problem Configuration procedure Step 1 Set the Time Group 8 00 8 00 See 7 1 2 Adding the Time Group for detailed configuration st...

Страница 89: ...st box 2 Time Group Select the time group to which the rule is applied from the drop down list box 3 Category Select the website category inaccessible to the clients 4 Please select Select the website...

Страница 90: ...79 End The entry shown in the following figure appears...

Страница 91: ...he router Smart Load Balancing The system automatically uses the WAN port with the lightest traffic to communicate Custom Policy It allows users to specify the corresponding WAN port for a certain sou...

Страница 92: ...es the IP Group to which the rule is applied Specified WAN It specifies the WAN port of ingoing and out going packet of a IP group Status It specifies the current status of the rule including Enabled...

Страница 93: ...procedure Step 1 Add the IP group which is 192 168 0 2 192 168 0 250 in this example See 7 1 3 Adding the IP Group for detailed configuration steps Step 2 Set the WAN port policy rule 1 To access the...

Страница 94: ...83 End The entry shown in the following figure appears Verification Data of devices on the LAN network covered by the IP group of 192 168 0 2 192 168 0 250 is transmitted over WAN1...

Страница 95: ...known to you Control Mode It specifies the control mode used by the current WAN port Disable It indicates that the bandwidth control function is disabled Automatic bandwidth control It specifies that...

Страница 96: ...the enabled bandwidth control rule Concurrent Sessions Per Device It specifies the maximum number of connections that can be set up on each computer covered by the corresponding rule Mode It specifies...

Страница 97: ...t specifies the maximum upload download rate of each client connected to the guest network 8 4 Example of Manual Bandwidth Control 8 4 1 Networking requirement A company uses W15E to deploy a network...

Страница 98: ...n list box of the Control Mode and click OK 3 Click Add 4 IP Group Select the IP group to which the rule is applied from the drop down list box 5 Time Group Select the time group to which the rule is...

Страница 99: ...ients maximum upload download rate 9 Click OK End The entry shown in the following figure appears 8 4 3 Verification During 8 00 18 00 devices covered by the rule can reach a maximum uploading rate of...

Страница 100: ...nce it consists of only logical connections The VPN technology allows employees at a branch of an enterprise and employees at the headquarter to exchange resources without exposing these resources to...

Страница 101: ...for PPTP L2TP client Server IP Address Domain Name It specifies the IP address domain name of the VPN server to be connected Generally it indicates the WAN IP of the peer router that functions as the...

Страница 102: ...tatus of the VPN client 9 2 PPTP L2TP Server PPTP L2TP server allows dial up connection of specified clients For example for simple and secure mutual access between the branch offices and the headquar...

Страница 103: ...ess Domain Name as the IP address of the WAN port Encryption It specifies whether to enable the data encryption Apply the same settings to both the client and server It is only applicable to PPTP IP A...

Страница 104: ...L2TP is a network It indicates the LAN subnet mask of the PPTP L2TP client Remark It is used to briefly describe the rule which is optional Operation The following operations can be preformed on the...

Страница 105: ...sulating Security Payload is used to check the data integrity and encrypt data If the encrypted data is intercepted by third parties they are unable to easily crack the data Remote Gateway Domain Name...

Страница 106: ...otocol SA Security Association IKE Internet Key Exchange Description of advanced IPSec tunnel parameters To access the page click Advanced Parameter description Parameter Description Mode It specifies...

Страница 107: ...to generate the key to encrypt an IKE tunnel Key Expiration It specifies the lifetime of IPSec SA PFS Keys made with Perfect Froward Secrecy PFS in IKE period 2 have nothing to do with the previous ke...

Страница 108: ...es the security parameter index SPI together with the gateway address and protocol type of the peer router is used to identity an IPSec security association which shall be identical with the ingoing S...

Страница 109: ...ss the page choose VPN PPTP L2TP Server Step 2 Enable VPN Server 1 VPN Server Click Enable 2 Server Type Click PPTP 3 WAN Select the WAN port used by router 1 for the VPN server which is WAN1 in this...

Страница 110: ...he VPN client is a network which is Yes in this example 4 Network Segment Subnet Mask Enter the LAN network segment and subnet mask of the client which are 192 168 1 0 and 255 255 255 0 respectively i...

Страница 111: ...nt which is WAN1 in this example 5 Server IP Address Domain Name Enter the IP address or corresponding domain name of the WAN port used by the VPN server 6 Username Password Enter the username and pas...

Страница 112: ...connection is established when the status on VPN PPTP L2TP page shows connected and an IP address is obtained Employees from headquarter and branch office can securely access each other s intranet res...

Страница 113: ...roject materials are stored in FTP server Assume that the information of the FTP server is as follows IP address 192 168 0 159 Server port 21 Login username admin Login password admin Follow the follo...

Страница 114: ...103 Step 2 Enter the login username and password in the window that appears which are admin in this example Step 3 Click Login The internal resources are displayed...

Страница 115: ...ude internal materials OA system ERP system CRM system and project management system and so on 9 5 2 Solution It is recommended that the VPN service of the router be used to address this requirement I...

Страница 116: ...e choose VPN IPSec 2 Click Add 3 Set a rule 1 IPSec Click Enable 2 WAN Select the WAN port used by the tunnel which is WAN1 in this example 3 Connection Name Set the name of the tunnel which is IPSec_...

Страница 117: ...dd 2 Set the rule 1 IPSec Click Enable 2 WAN Select the WAN port used by the tunnel which is WAN1 in this example 3 Connection Name Set the name of the tunnel which is IPSec_1 in this example 4 Remote...

Страница 118: ...r the remote LAN network segment subnet mask which is 192 168 0 0 24 7 Pre shared Key Enter the pre shared key which is 12345678 in this example 8 Click OK End The entry shown in the following figure...

Страница 119: ...recommended to change the default settings only under the instruction of professional staff 10 1 IP MAC Binding 10 1 1 Overview IP MAC binding function allows only clients matching with the IP address...

Страница 120: ...f any Operation It is used to edit or delete the selected rules Dynamic Binding It displays the information of clients connected to the router This button is used to add the selected rule to the Bindi...

Страница 121: ...y recruitment employees can access the internet using the specified computer and IP address Solution The IP MAC Binding function is recommended to address the requirement Assume that the IP addresses...

Страница 122: ...ct to the router see the following instructions 1 Click Add 2 Enter the IP address and MAC address as required and click OK If the clients to be configured have connected to the router you can locate...

Страница 123: ...lient on LAN network with MAC address of C8 3A 35 13 05 18 can access the internet only when configured with the IP address of 192 168 0 11 and the client with MAC address of C8 3A 35 D5 75 A6 can acc...

Страница 124: ...g the following special IP options IP Timestamp Option IP Security Option IP Stream Option IP Record Route Option IP Loose Source Route Option and Invalid IP Option Block WAN Pinging When the host on...

Страница 125: ...ves per second exceeds the specified value IP Attack Defense IP Timestamp Option It checks whether the specified IP range includes the Internet Timestamp option IP Security Option It checks whether th...

Страница 126: ...enables you to manage clients that must be authenticated and authentication free hosts Example of Captive Portal This module elaborates the captive portal application through examples 11 1 Basic Setti...

Страница 127: ...OK End Parameter description Parameter Description Captive Portal It specifies whether to enable the captive portal function Session Timeout Interval When the session times out the user needs to perf...

Страница 128: ...being authenticated For example if the client accesses baidu com before authentication it redirects to baidu com after being authenticated completes Specified Page The client redirects to the website...

Страница 129: ...authentication free host including Enabled and Disabled Operation The following operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edi...

Страница 130: ...dialog box that appears Step 4 Click OK End 11 2 3 Adding a Web Account Step 1 Choose Captive Portal User Management Step 2 In User Management module click Add Step 3 Enter the username and password...

Страница 131: ...guration procedure Step 1 Set the Basic Settings of captive portal 1 Choose Captive Portal Basic Settings 2 Select the Enable check box of Captive Portal 3 Session Timeout Interval Enter the expiratio...

Страница 132: ...Choose Captive Portal User Management 2 In User Management module click Add 3 Username Enter the username 4 Password Enter the password for authentication 5 Remark Enter the description of the accoun...

Страница 133: ...ess in this example 4 Address Enter the MAC address which is CC 3A 61 71 1B 6E in this example 5 Remark Enter the description of the client which is administrator in this example This item is optional...

Страница 134: ...123 The following figure displays the captive portal page on PC The following figure displays the captive portal page on mobile devices...

Страница 135: ...entication This module elaborates the application of PPPoE authentication through examples 12 1 Basic Settings 12 1 1 Overview By default the clients connected to the router can access the internet if...

Страница 136: ...ngs Policy Name It displays the name of the policy which cannot be changed If the PPPoE authentication is enabled the Flow Control Settings rules replace the Bandwidth Control function of the router U...

Страница 137: ...s It displays the MAC addresses of clients free from authentication Remark It displays the description of the clients free from authentication if any Operation The following operations can be preforme...

Страница 138: ...nt 12 2 1 Overview This section explains how to add a PPPoE account One account username and password can be used by only one user at a time To access the page choose PPPoE Authentication User Managem...

Страница 139: ...operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rule It is used to delete the rule It is used to export cfg configuration...

Страница 140: ...matically obtained IP address and without a login username and password The alter page will appear when an account is about to expire 12 3 2 Solution The PPPoE authentication function of the router is...

Страница 141: ...se is due to expire 1 Click Configure 2 Configure the alter contents in the window that appears Web Title Change the web title as required Web Content Change the web content as required Click OK 4 Ret...

Страница 142: ...ministrator in this example This item is optional 6 Click OK Step 2 Add PPPoE Authenticated Users 1 Choose PPPoE Authentication User Management 2 Click Add 3 Username Enter the username for PPPoE auth...

Страница 143: ...al up Connection Example Windows 7 Step 1 Click in the lower left corner of the desktop Step 2 Click Control Panel Network and Sharing Center Set up a new connection or network Step 3 Select Connect t...

Страница 144: ...133 Step 4 Click Broadband PPPoE Step 5 Enter the username and password which are rosemary and 12345678 respectively in this example Click Connect...

Страница 145: ...134 Wait until the dial up connection completes End...

Страница 146: ...ccess the page choose WiFi via WeChat 13 1 WiFi via WeChat 13 1 1 Overview By default the clients connected to the router can access the internet if the router has been connected to the internet The c...

Страница 147: ...elevant information about your WeChat account including SSID shopped appID and secretKey If you have not registered a WeChat account or the WiFi via WeChat function has not been enabled click https ad...

Страница 148: ...equest which uniquely verifies your identity To get the secretKey login to the WeChat official account admin platform Session Timeout Interval It specifies the validity connection duration for a clien...

Страница 149: ...o add clients free from WeChat authentication It is used to delete the selected rule Address Type It specifies the address type of authentication free hosts including IP address and MAC address Addres...

Страница 150: ...ired Step 5 Add clients free from authentication Step 6 Click OK End 13 2 Example of WiFi via WeChat 13 2 1 Networking requirement A restaurant uses W15E to deploy the network It requires that guests...

Страница 151: ...to set WiFi via WeChat 1 Choose WiFi via WeChat 2 Select the Enable check box of WiFi via WeChat 3 Enter SSID shopID appID and secretKEy as required 4 Configure WeChat authentication page settings as...

Страница 152: ...free from authentication 1 Click Add 2 Address Type Select the address type of the clients free from authentication 3 Address Enter the address of the client 4 Remark Enter the description of the clie...

Страница 153: ...een instructions to open the WeChat login page click Connect Your mobile client is connected to the internet In addition the Follow us button on the connected page allows more fans to follow you thus...

Страница 154: ...s the changeable WAN IP address of the router onto a fixed domain name allowing users to remotely access the router using the domain name 14 1 Port Forwarding 14 1 1 Overview By default hosts on the i...

Страница 155: ...Choose Virtual Server Port Forwarding Step 2 Click Add Step 3 Enter the relevant parameters in the dialog box that appears as required Step 4 Click OK End Parameter description Parameter Description I...

Страница 156: ...atus of the rule including Enabled and Disabled Operation The following operations can be preformed on the rules It is used to disable the rule It is used to enable the rule It is used to edit the rul...

Страница 157: ...hen virtual server function is used Configuration procedure Step 1 Choose Virtual Server Port Forwarding Step 2 Click Add Step 3 Internal Host IP Enter the IP address of the local computer that functi...

Страница 158: ...of the WAN port External port after the rule takes effect 14 2 UPnP Universal Plug and Play UPnP is a set of networking protocols that makes automatic port forwarding possible It can identify devices...

Страница 159: ...verage the DMZ host to attack your LAN Therefore enable the DMZ function only when necessary Manually set the IP address of the LAN computer that functions as a DMZ host to prevent IP address changes...

Страница 160: ...router is unavailable The DMZ host that responds to the external VPN request Host IP It specifies the IP address of the DMZ host 14 4 DDNS 14 4 1 Overview Dynamic Domain Name System DDNS is a method u...

Страница 161: ...pplicable to oray com Username It specifies the DDNS login username registered on the DDNS provider website Password It specifies the DDNS login password registered on the DDNS provider website Domain...

Страница 162: ...p 5 Click OK End 14 4 3 Example of DDNS Networking requirement A company uses W15E to deploy its network environment and the WAN IP of the router is dynamic It requires that employees can access the c...

Страница 163: ...hows the topology Configuration procedure Step 1 Register a domain name 1 Choose Virtual Server DDNS enable DDNS select a DDNS provider such as oray com and click Register 2 Register a domain name fol...

Страница 164: ...this example 3 Username Password Enter the username and password registered on the website of the DDNS provider 4 Click OK 2 Refresh the current page and wait a second Connection succeeds when the con...

Страница 165: ...ort forwarding function See 14 1 Port Forwarding for detailed steps End Verification Employees on business travel can access the intranet resources by accessing ftp 171y0a4291 iok la and entering the...

Страница 166: ...nables you to upgrade the router for more stable performance and new features Restore Factory Settings It is used when the router works improperly System Time This module allows you to set the system...

Страница 167: ...ord Enter the new login password again Step 5 Click OK End You will be redirected to the login page Enter the new login password and click Login to login to the web UI of the router 15 2 Reboot 15 2 1...

Страница 168: ...truction End 15 2 3 Automatic Reboot Step 1 Choose Maintenance Reboot Step 2 Reboot Schedule Click Enable Step 3 Reboot Time Select the reboot time from the drop down list box such as 23 30 Step 4 Reb...

Страница 169: ...Backing up Configuration Step 1 Choose Maintenance Backup Restore Step 2 Click Backup Step 3 Follow the on screen instructions to backup End 15 3 3 Steps for Restoring the Configuration Step 1 Choose...

Страница 170: ...latest firmware to your computer Step 2 Choose Maintenance Firmware Upgrade Step 3 Upgrade Type Select Local Upgrade Step 4 Click Browse and select the downloaded firmware Step 5 Click Upgrade End Wai...

Страница 171: ...forget the login password The router can be reset using software or hardware The default login IP address of the router is 192 168 0 1 When the factory settings are restored your configuration is los...

Страница 172: ...s Sync with Internet Time and Manual Setup The default configuration of the router is Sync with Internet Time After connected to the internet the router synchronizes the system time at a specified int...

Страница 173: ...ogin to the web UI of the router over the internet To access the page choose Maintenance Remote WEB Management Enable the rule see the following figure Parameter description Parameter Description Remo...

Страница 174: ...revent port conflicts 15 7 2 Configuring Remote WEB Management Step 1 Choose Maintenance Remote WEB Management Step 2 Remote WEB Management Click Enable Step 3 WAN Select the WAN port as required Step...

Страница 175: ...End Verification The network administrator can login to the web UI of the router to manage by entering http 202 105 106 55 8088 in browser of the remote computer which is connected to the internet and...

Страница 176: ...2 Diagnosis with the Ping Command Ping command is used to check the connectivity of the internet The following describes how to check the connectivity between the router and www baidu com Step 1 Choo...

Страница 177: ...tion IP or the domain name To detect the route from the router to www baidu com do the following Step 1 Choose Maintenance Diagnostics Step 2 Select Traceroute from the drop down menu box list of Tool...

Страница 178: ...167 End The results displays in the Traceroute Results text box The record is numbered from 1 Each record indicates one hop and each hop represents a gateway...

Страница 179: ...the router Traffic Statistics It allows you to view the traffic statistics of the current clients connected to the router Defense Logs It records the attacks on LAN network System Logs This module al...

Страница 180: ...stem Info It displays the basic information of the router including device name system time uptime and firmware version and so on LAN Info It displays the LAN MAC address and LAN IP address of the rou...

Страница 181: ...ifies the current connection speed of the client Duration It specifies the connection duration of a client Connected SSID It specifies the SSID connected by the wireless client Frequency It specifies...

Страница 182: ...IPSec tunnel data on the LAN network Security Protocol It specifies the security protocol used by the IPSec tunnel AH Verification Algorithm It specifies the AH verification algorithm used by the IPSe...

Страница 183: ...172 16 4 Defense Logs To access the page choose System Status Defense Logs It records the attack history of the router The following figure displays the ARP attack logs...

Страница 184: ...173 16 5 System Logs To access the page choose System Status System Logs The system logs can be used for troubleshooting when the router is faulty...

Страница 185: ...s operating system exmaple Windows 7 Choose the appropriate one according to your operating system Step 1 Right click in the lower right corner of the desktop and choose Open Network and Sharing Cente...

Страница 186: ...175 Step 4 Select Obtain an IP address automatically and Obtain DNS server address automatically and click OK On the Local Area Connection Properties dialog box that appears click OK...

Страница 187: ...mm C FAQ Q1 I cannot access the web UI of the router after entering 192 168 0 1 What should I do A1 Check the following items Ensure the Ethernet cables are correctly connected and have no loosening...

Страница 188: ...ttings A3 Hold down the Reset button using a paper clip for 8 seconds and wait about 1 minute After the factory settings are restored configure the router again The default login IP address of the rou...

Страница 189: ...Declaration of Conformity Hereby SHENZHEN TENDA TECHNOLOGY CO LTD declares that the radio equipment type W15E is in compliance with Directive 2014 53 EU The full text of the EU declaration of conformi...

Страница 190: ...ence will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user...

Страница 191: ...equipment This transmitter must not be co located or operating in conjunction with any other antenna or transmitter NOTE 1 The manufacturer is not responsible for any radio or TV interference caused...

Отзывы: