1. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause har mful interference.
(2) This device must accept any interference received, including interference that may cause undesired operation.
2. Changes or modifications not expressly approved by the party responsible for compli anc e could void the user's authority
to operate the equipment.
NOTE: This equip ment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation.
This equipment generates uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to
correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver.Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
FCC Radiation Exposure Statement
This equipment comp lies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment
should be installed and operated with minimum distance 20cm between the radiator & your body
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
G2wifiIII, a WiFi Router with a WAN port, is the perfect option to connect a small group of PCs to a
high-speed broadband Internet connection or to an Ethernet backbone. Configurable as a DHCP
server, G2wifiIII acts as the only externally recognized Internet device on your local area network
(LAN). The G2wifiIII also serves as an Internet firewall to protect your network from being accessed
by outside users.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The following information contains the physical description of the G2wifiIII. This includes the
functions and the locations of each connector and indicator. This information provides useful
reference when installing the product. Please familiarize yourself with the G2wifiIII.
2.1 Panels
2.1.1 Front Panel
For more related description, please refer to the Section 2.2 and Section 2.2.1.
3
1
2
4
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
This chapter instructs you how to configure and manage the G2wifiIII through the web user interface
it supports. With this facility, you can easily access and monitor through the LAN port of the G2wifiIII.
After the G2wifiIII has been connected to your PC via RJ45 network cable, type http://10.10.10.254
in IE browser, it will show the following screen and ask you to input the user name and password in
order to login and access authentication. The default user name and the password are both “admin”.
For the first time to use, please enter this default user name and the password, then click the OK
button. The root setup page for G2wifiIII will be displayed once the login process is successful. The
user will be able to fully access and configure the system.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In the G2wifiIII, it supports a simple user management function to configure the system. As the figure
below shows, for example, left section is the whole function tree with web user interface while each
of main functions, including INTERNET SETTINGS, WIRELESS SETTINGS, FIREWALL, and
MANAGEMENT is selected.
By means of the hyperlink of St atus, Statistic or Management in this root setup page, you can directly
jump to the related pages if you would like to realize the basic information of the system.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The WAN (Wide Area Network) section is where you configure your Internet connection type. There
are three WAN connection modes to choose from: Static (Fixed IP), DHCP(Auto Config) and
PPPoE(ADSL). If you are unsure of your connection method, please contact your Internet Service
Provider before configuring the required parameters.Note: If using the PPPoE option, you will need
to ensure that any PPPoE client software on your computers is removed or disabled.
:
:
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Used when your ISP provides you a set IP address that does not change. The IP information is
manually entered in your IP configuration settings. You must enter the IP address, Subnet Mask,
DefaultGateway, Primary DNS Server, and Secondary DNS Server. Your ISP provides you with
all of this information.
3.1.1.2 DHCP(Auto Config) WAN Mode
A method of connection where the ISP assigns your IP address when your router requests one from
the ISP's server. Some ISP's require you to make some settings on your side before your router can
connect to the Internet.
Hostname: Some ISP's may check your computer's hostname. The hostname identifies your
system to the ISP's server. This way they know your computer is eligible to receive an IP
address. In other words, they know that you are paying for their service.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Select this option if your ISP requires you to use a PPPoE (Point to Point Protocol over Ethernet)
connection. DSL providers typically use this option. This method of connection requires you
to enter a User Name and Password (provided by your Internet Service Provider) to gain
access to the Internet.
Operation Mode: Typically, connections are not always on. The router allows you to set the
reconnection mode. The setting is:
Keep Alive: A connection to the Internet is always maintained. When this option is
selected, please enter a value in the field of Redial Period which is the time
interval the machine will be redialed before the PPPoE connection is disconnected.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
These are the settings of the LAN (Local Area Network) interface for the AP. The AP's local
network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this
section. The IP address is also used to access this web-based management interface. It is
recommended that you use the default settings if you do not have an existing network.
IP Address: The IP address of your router’s LAN port. Default: 10.10.10.254.
Subnet Mask: Subnet Mask of your LAN (default: 255.255.255.0). All devices on the network
must have the same subnet mask to communicate on the network.
DHCP Type: DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is
where you configure the built-in DHCP Server to assign IP addresses to the computers and
other devices on your local area network (LAN).When you select Server item from this
pull-down list to enable this function, the following parameters will be displayed. You must enter
the IP address, Subnet Mask, Primary DNS Server and/or Secondary DNS Server.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In this section, you can see clearly which devices are currently leasing IP addresses that you had
defined for the DHCP Server‘s allocation of
addresses to computers and devices on your Local Area
Network.
Host Name: A name for each computer or d e v i c e that is given an IP address by the
Server
. This may help you keep track of which computers are assigned this way.
MAC Address: A MAC address is usually located on a sticker at the bottom of a network
device. The MAC address is comprised of twelve digits. Each pair of hexadecimal digits are
DHCP
usually separated by dashes or colons such as 00-0D-88-11-22-33 or 00:0D:88:11:22:33.
IP Address: The address which is obtained from the
DHCP Server
.
Expires in: The remaining time of the IP address’s lease. A specific LAN device no longer
needs the leased IP address when the time ends up, and this device will also free the IP
address it had leased.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In Static Routing Settings, the user can set up a route rule (table) here. Refer to the description of the
following parameters to set up the necessary route rule, and click the Apply button when you
complete.
Destination: The IP address of packets that will take this route.
Range: Includes Host and Net options. When selecting “Net”, there is another “Netmask”
column that needs to be filled out.
Netmask: The bits in the mask specify which bits of the IP address must match.
Gateway: The gateway for the routing.
Interface: Specifies the interface -- LAN or WAN -- that the IP packet must use to transit out of the router when this route is used. Or you can choose the user-definedwayby selecting the
Custom option.
Comment: Memo for the routing rule.
Routing Table: Lists the current route rules you have added before. Click on the Delete button
to delete the selected route rule.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The wireless section is used to configure the wireless settings for your router. Please note that
changes made on this section may also need to be duplicated on your wireless client.
To protect your privacy, use the wireless security mode to configure the wireless security features.
This device supports three wireless security modes including: WEP(WEPAUTO), WPA-PSK, and
WPA2-PSK. WEP is the original wireless encryption standard. WPA provides a higher level of
security. In WPA encryption, it supports TKIP or AES of WPA-PSK/WPA2-PSK.
3.2.1 Basic Wireless Settings
Through the basic wireless setting page, the user can control the ON/OFF status of WiFi function,
and set up the 802.11 mode, Network Name (SSID) as well as Channel. Besides, you can do the
further settings related to the HT Physical Mode.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
WiFi On/Off: This option turns on and off the wireless connection feature of the router.Simply
click on the WiFi ON / WiFi OFF button. The system will automatically detect the current status
of the router and switch the button accordingly.
Network Mode: There are 5 modes including, 802.11b/g mixed mode, 802.11b only, 802.11g
only, 802.11/b/g/n mixed mode, and 802.11n only(2.4G) can be chosen.
Network Name(SSID): When you are browsing for available wireless networks, this is the
name that will appear in the list (unless you set it to Hidden, see below). This name is also
referred to as the SSID. For security purposes, it is highly recommended to change from the
pre-configured network name. Default is “default”.
Hidden:The option allows you to hide your wireless network. When this option is
unchecked, your wireless network name is broadcast to anyone within the range of your
signal. If you're not using encryption then they could connect to your network. When you
click on this checkbox to enable this function, you must enter the Wireless Network Name
(SSID) on the client manually to connect to the network.
Multiple SSID 1 ~ 3: Up to three SSIDs you can additionally set up for this wireless network.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Broadcast Network Name (SSID): Enable/Disable the SSID broadcast function. This function
is used to control the broadcast status of all SSIDs. If this function is disabled, all SSIDs you
had set up for the router will be hidden.To cancel the hidden status for the specific SSID, you
can uncheck the “Hidden” option in the back of your desired SSID.
AP Isolation: Enable/Disable this function. Create a separate virtual network for your wireless
network. When this feature is enabled, each of your wireless clients will be in its own virtual
network and will not be able to communicate with each other. You may want to utilize this
feature if you have many guests that frequent your wireless network.
MBSSID AP Isolation: Enable/Disable the MBSSID AP Isolation function. The router supports
multiple SSIDs. You can decide whether the clients associated to different SSIDs on the device
can see each other or not. Enable the option to block it. Default is “Disable”.
Frequency (Channel): A wireless network uses specific channels in the 2.4GHz wireless
spectrum to handle communication between clients. Some channels in your area may have
interference from other electronic devices. Choose the clearest channel to help optimize the
performance and coverage of your wireless network. If you select AutoSelect, the router
automatically finds the channel with least interference and uses that channel for wireless
networking.
Rate: Exist only when selecting 802.11b/g mixed mode, 802.11b only, 802.11g only as the
Network Mode for the router. You can set up the desired transmitting rate for these network
modes. Default is Auto.
HT Physical Mode Settings:
This mode settings exist only when 802.
11b/g/n mixed mode or
802.11n only(2.4G) is chosen as your router’s Network Mode.
Operating Mode: Select the option to enable the Mixed Mode or the Green Field Mode for
physical layer transceivers. Default: Mixed Mode.
Mixed mode: In this mode the device transmits the packets with preamble compatible
legacy (802.11g), so they can be decoded by legacy devices. The device receives and
decodes both Mixed Mode packets and legacy packets.
Green Field mode: The device transmits HT packets without legacy compatible part. But
the device receives and decodes both Green Field and legacy packets.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Channel BandWidth: This option only works when selecting Network mode in 11b/g/n mixed
mode and 11n mode. Select the option to choose 20 MHz or 20/40MHz. This option affects the
Phy data rate of radio. Please refer to the table below, which shows the relationship among Phy
data rate, Bandwidth and Guard Interval.
Guard Interval: The 11n device inserts the Guard Interval into the signal. You can choose the
interval between ”Long” and “Auto”. This option affects the Phy data rate of radio. For more
details, please refer to the table below.
MCS: It means “Modulation Coding Scheme”. The available options are “Auto, 0, 1, …15, and
32”. It changes the modulation of this device and effect the maximum Phy data rate. We
recommend “Auto” setting. For more details, please refer to the table below.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Reverse Direction Grant(RDG): This is the 11n performance parameter. Enable it if needed.
Extension Channel: Exist only when selecting “20/40” as the Channel BandWidth for the
router. For example, if channel 6 is selected, it means you can select channel 2 or channel 10
as the extension channel. Choose the unused channel as the extension channel.
Aggregation MSDU(A-MSDU): The multiple HT packets can be transmitted with single ACK
reply packet. Enable it to apply this function and reduce the network congestion.
Auto Block ACK: It is another aggregation technique which prevents sending ACK in the
communication to increase the throughput. If this option is enabled, the device will activate this
function when transmitting massive data.
Decline BA Request: Enable this option to decline the Block ACK request addressed by the
other devices.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In this section, you can configure the wireless security and encryption to prevent from unauthorized
access and monitoring. Please choose a SSID you had created for this router in the Wireless SettingsÆBasic setting page from the SSID Choice pull-down list.
There are 4 encryption modes, including Disable, WEPAUTO(WEP), WPA-PSK and WPA2-PSK
offered for your selection. Please also pull down the Security Mode list and select the desired mode
for your router’s wireless security. For more details about the setup in these different modes, please
refer to the following sections.
3.2.2.1 Disable Mode
In this mode, wireless clients can directly connect to the router without inputting any key.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
WEP is a method of encrypting data for wireless communication intended to provide the same level
of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP
network, you must know the key. The key is a string of characters that you create. When using WEP,
you must determine the level of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in
HEX (hexadecimal - using characters 0-9, A-F(a-f)) or ASCII (American Standard Code for
Information Interchange - alphanumeric characters) format. ASCII format is provided so you can
enter a string that is easier to remember. The ASCII string is converted to HEX for use over the
network.
Example,
64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string
of 10 characters for 64-bit encryption.)
128-bit hexadecimal keys are exactly 26 characters in length.
(456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit encryption.)
64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters
for 64-bit encryption.)
128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of
13 characters for 128-bit encryption.)
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
WEP Keys: Select “ASCII” or “Hex” from the pull-down list to set up the key value. ASCII
(American Standard Code for Information Interchange) is a code for representing char as
numbers from 0-127. Hexadecimal digits consist of the numbers 0-9 and the letters A-F (a-f).
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
WPA (Wi-Fi Protected Access) is the older standard; select this option if the clients that will be used
with the router only support the older standard. WPA2 is the newer implementation of the stronger
IEEE 802.11i security standard.
PSK(Pre-Shared Key) is the key which is entered as a pass-phrase of up to 63 alphanumeric
characters in ASCII (American Standard Code for Information Interchange) format or 64 digits in
HEX format at both ends of the wireless connection. When inputting ASCII strings, it cannot be
shorter than eight characters, although for proper security it needs to be of ample length and should
not be a commonly known phrase. This phrase is used to generate session keys that are unique for
each wireless client.
WPA Algorithms: Mark the option to enable modes of TKIP or AES.
Pass Phrase: This mode requires only an access point and client station that supports
WPA-PSK. The WPA-PSK settings include Key Format, Length and Value. They must be as
same as each wireless client in your wireless network. When Key format is Passphrase, the
key value should have 8-63 ASCII characters or 64 digits in HEX format.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Key Renewal Interval: Enter a value to set up the WPA key renewal interval. The device
regenerates the key in every interval seconds that you have setup without disconnection. The
WPA Algorithm will regroup the key for a period. The default value is 3600 seconds, and you
can adjust the time interval (Valid Range: 0 ~ 4194303).
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
From the list of Station, you can see
wireless way through the MAC address. You also can have a clear realization of status, including Aid,
PSM, MimoPS, MCS, BW(Bandwidth), SGI and STBC for each Wifi connection.
which devices are
currently
connecting to your G2wifiIII in the
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The G2wifiIII offers the counter function to collect all wireless traffic counting information about the
transmitting/ receiving packets of this router.The system will automatically update these wireless
data per 3 seconds. To restart the counting, please click on the Reset Counters button.
Tx Success: Display the transmitted number of the successful packets.
Tx Retry Count: Display the transmitted number of the retry packets.
Tx Fail after retry: Display the transmitted number of the unsuccessful packets after retry.
RTS Successfully Receive CTS: Display the transmitted number of RTS(Request To Send)
packets which receive CTS(Clear To Send) packets successfully.
RTS Fail To Receive CTS: Display the transmitted number of RTS(Request To Send) packets
which receive CTS(Clear To Send) packets unsuccessfully.
Frames Received Successfully: Display the received number of the successful frames.
Frames Received With CRC Error: Display the received number of frames with CRC error
packets.
SNR: Signal-to-Noise ratio (SNR). It stands that how fast wireless data of the router can travel
and how far a wireless signal of the router can reach.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The router could filter the outgoing packets for security or management consideration. You can set
up the filter against the IP addresses to block specific internal users from accessing the Internet. The
firewall could not only obstruct outside intruders from intruding your system, but also restricting the
LAN users. Port filter restricts certain type of data packets from your LAN to Internet through the
router.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
This function offers the way of Port Forwarding / Virtual Server in order to help redirect requests from
computers on the LAN to a server set up on the LAN. You can set up an Internet service on the
computer on local network, without exposing it on Internet directly. You can also build many sets of
port redirection, to provide many different Internet services on different local computers via a single
Internet IP address.
3.3.2.1 Create a Port Forwarding
In this section, you can add a new port forwarding to the port forwarding table below or delete an
existing entry from this table.
Port Forwarding: Enable/Disable the function of Port Forwarding.
IP Address: Fill in the IP address of your LAN Server.
Port Range: Fill in the port range that you wish to filter.
Protocol: Select the protocol type, including TCP, UDP or TCP&UDP used by the service.
Comment: Input any text to describe this mapping. Up to 16 alphanumeric characters can be
filled in.
Port Forwarding Mapping List: After completing the above settings,please click on the
Apply button. The entry of Port Forwarding you had added will be listed on this table if it is
created successfully. Clicking on the Delete Selected button will remove the existing entry you
select from this table.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In this section, you can add a new virtual server to the virtual server table below or delete an existing
entry from this table.
The Virtual Server option gives Internet users access to services on your LAN. This feature is
useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you
define a public port on your router for redirection to an internal LAN IP Address and LAN port. For
Example,
You are hosting a Web Server on a PC that has LAN IP Address of 10.10.10.50 and your
ISP is blocking Port 80.
1. Enter the IP Address of the machine on your LAN (for example: 10.10.10.50)
2. Enter the Public Port as [8888]
3. Enter the Private Port as [80]
4. Select the Protocol - TCP
5. Click the Apply button to add the settings to the Virtual Server Table
6. Repeat these steps for each Virtual Server Rule you wish to add. With this Virtual
Server entry, all Internet traffic on Port 8888 will be redirected to your internal web
server on port 80 at IP Address 10.10.10.50.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Virtual Server: Enable/Disable the function of Virtual Server.
IP Address: The IP address of the system on your internal network that will provide the virtual service, for example, 10.10.10.50.
Public Port: The port that will be accessed from the Internet.
Private
Port:
The port that will be used on your internal network.
Protocol: Select the protocol type, including TCP, UDP or TCP&UDP used by the service.
Comment: Input any text to describe this mapping. Up to 16 alphanumerical characters can be
filled in.
Virtual Server Mapping List: After completing the above settings, please click on the Apply
button. The entry of Virtual Server you had added will be listed on this table if it is created
successfully. Clicking on the Delete Selected button will remove the existing entry you select
from this table.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
The DMZ (Demilitarized Zone) is used to enable protocols, which needs to open ports on the router.
The router will forward all unspecified incoming traffic to the host specified in this setting page. To
configure it, mark to enable virtual DMZ and then enter the Host IP (private IP address) and click the
Apply button to enact the setting.
Note: Putting a computer in the DMZ may expose that computer to a variety of security risks. Use of
this option is only recommended as a last resort.
DMZ Settings: Enable/Disable the function of DMZ.
DMZ IP Address: Specify the IP address of the computer on the LAN that you want to have
unrestricted Internet communication. If this computer obtains its address automatically using
DHCP, then you may want to make a static reservation in the field of Statically Assignedon
the Internet SettingsÆLAN setting page so that the IP address of the DMZ machine does not
change.
Except TCP port 80: If you click on the checkbox in front of Except TCP port 80 function, it
means that TCP port 80 cannot be used for DMZ; otherwise, you can use this port for DMZ.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
To improve the safety of the internal network environment, G2wifiIII offers a variety of basic firewall
management functions, including Remote management (via WAN), Ping from WAN Filter, Block port
scan, Block SYN Flood and SPI Firewall. By the configuration the following system security settings,
you can protect the router itself from being attacked, scanned or intruded.
Remote management (via WAN): Allow or Not Allow the user to log in the system with the
WAN IP.
Ping from WAN Filter: Enable/Disable the function of Ping from WAN Filter. If the function is
enabled, the system will reject to response the ICMP(ping) packets coming from the WAN.
Block port scan: Enable/Disable the function of Block port scan. The port scan actions will b e
dropped if you enable this function.
Block SYN Flood: Block TCP SYN Flood or not. If this function is enabled, it can prevent the
system from being attacked by a large amount of SYN packets.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
SPI Firewall: SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps
to prevent cyberattacks by tracking more state per session. It validates that the traffic passing
through that session conforms to the protocol.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
TimeZone: It is an offset time off GMT. You have to select the time zone first and then
perform time sync via NTP because the router will combine this time zone offset and
updated NTP time to come out the local time, otherwise, you will not able to get the correct
time. The router supports configurable time zone from –11 to +12 step 1 hour. Default
Time zone: -11 Hrs.
NTP Sever: NTP is Network Time Protocol and is used to sync the network time based
Greenwich Mean Time (GMT). If you manually specify an IP address of user-defined NTP
server as well as Time Zone, the router will sync the time immediately after pressing the
Apply button.
NTP Synchronization: Though it synchronizes the time automatically, NTP does not
update the time periodically without user’s processing. You can set up the time interval
(Valid range: 1 ~ 300 hours) to have the assigned NTP server do the synchronization of
time for your router.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Due to the built-in TR-069 function, G2wifiIII will allow the administrator to remotely do the firmware
upgrade, system configuration, management, troubleshooting via the Auto-Configuration Server
(ACS) in the method of HTTP Internet network connection. ACS is a TR-069_based automatic
configuration server, implementing CPE WAN Management Protocol (CWMP). For more details on
the ACS, please refer to our ACS Administrator’s User Manual.
URL of ACS Server: For G2wifiIII’s access of TR-069 service from ACS through the web
browser, please fill in the path in which the ACS is built. For example,
http://61.56.193.38:8080/openacs/acs)
Interval Time of Periodic Inform Settings: Enter a value to set up or change the Periodic
Inform Interval of the G2wifiIII. Upon this time interval you had set up, G2wifiIII will
communicate with ACS periodically and automatically. Please note that the value of Periodic Inform Interval Time must be more than 30 seconds, and the maximum of this Interval Time
can be 4294967295 in seconds.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
Software upgrade tool is used to help upgrade the software function in order to fix or improve the
function. User can upgrade the firmware in this page. Please note that power cannot be off in the
pro ce s s o f the s of t w ar e upgrade
Specify the filename and directory where the file is located via the Browse…button, and click on the
Apply button when it is completed. When the upload is finished, the router will start upgrading
software. A reboot message will be pr ompted after completing upgrading software. At this time, you
must reboot the router to have the new software worked.
If your upload is unsuccessful, an error message will be shown in the webpage, and it will not
upgrade the software as well.
For G2wifiIII‘s NVRAM value update, you should press the Reset button (more than 2 seconds)
when the device is on and have it restart. And then power off the router and power on for its normal
working.
. You must do it carefully.
Location: File path and filename stored the image file you would like to upgrade.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
With this function, user can back up or reload the config files by exporting/ importing settings.
Besides through the press of the RESET button in the front panel to execute the hardware reset
function as we had mentioned in Section 2.2.1 for the router. The software reset function provided
here takes the same effect as the RESET button on the front panel of the router. It will take about
30~60 seconds to complete the system boot.
Export: To export the current settings stored in the flash to a config file, just press the Export
button.
Import: Import the config file into your router. Specify the filename and directory where the file
is located via the Browse…button, and press the Import button when completed.
Factory Defaults: Restoring the unit to the factory default settings will erase all settings,
including any rules that you had created. To have the router’s settings be returned to the factory
default, just press the Load Default button. Please note that the router cannot be powered off
while resetting to the factory default.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
In the Status page, it tells you the basic information of the system. You can check the device status,
including the firmware version, system up time, WAN/Local IP address, MAC address and so on.
They will be refreshed per 3 seconds. With these information, it is helpful while malfunctioning.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
G2wifiIII offers the counter function to collect all counting information about the memory status and
all interfaces’ receiving/transmitting packets of this router.
Copyright of 3JTech Co., Ltd. (also doing business as A3J Engineering Inc.)
49
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.