This device complies with Part 15 of FCC rule. Operation is subject to the following two
conditions:
9 This device may not cause harmful interference.
9 This device must accept any interference received, including interference that
may cause undesired operation.
This 11g Wireless Security Router has been tested and found to comply with the limits
for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate radio frequency energy and,
if not installed and used according to the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occ ur in
a particular installation.
If this equipment does cause harmful interference to radio or television reception, which
is found by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
9 Reorient or relocate the receiving antenna.
9 Increase the separation between the equipment or device.
9 Connect the equipment to an outlet other than the receiver’s.
9 Consult a dealer or an experienced radio/TV technician for assistance.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled anvironment. This equipment should be installed and operated with
minimum distance 20cm between the radiator and your body.
CE Declaration of Conformity:
This equipment complies with the specifications relating to electromagnetic
compatibility, EN 55022/A1 Class B, and EN 50082-1. This meets the reasonable
protection requirements set out in the European Council Directive on the approximation
of the laws of the member states relating to Electromagnetic Compatibility Directive
(89/336/EEC).
- ii -
11g Wireless Security Router User Guide
Manufacturer’s Disclaimer State
The information in this document is subject to change without notice and does not
represent a commitment on the part of vendor. No warranty or representation, either
expressed or implied, is made with respect to the quality, accuracy or fitness for any
particular prupose of this document. The manufacturer reserves the right to make change
to the content of this document and/or the products associated with it at any time without
obligation to notify any person or organization. In no event will the manufacturer be
liable for direct, indirect, special, incidental or consequential damages arising out of the
use or inability to use this product or documentation, even if advised of the possibility of
such damages. This document contains materials protected by copyright. All rights are
reserved. No part of this manual may be reproduced or transmitted in any form, by any
means or for any purpose without expressed written consent of its authors. Product
names appearing in this document are mentioned for identification purchases only. All
trademarks, product names or brand names appearing in this document are registered
property of their respective owners.
About this Guide............................................................................................................................................ 1
Chapter 1: Get to know your 11g Wir eless Security Router..........................................................................1
Chapter 3: Internet Access ............................................................................................................................2
CHAPTER 1: GETTING TO KNOW YOUR 11G WIRELESS SECURITY ROUTER................................ 3
1-1ABOUT THE 11G WIRELESS SECURITY ROUTER ............................................................................................3
Ethernet / Fast Ethernet ................................................................................................................................ 3
Wireless LAN ................................................................................................................................................. 3
1-2CONTENTS OF THE 11G WIRELESS SECURITY ROUTER PACKAGE .................................................................. 4
1-3FEATURES OF THE 11G WIRELESS SECURITY ROUTER ................................................................................... 4
4-4WEB CONTROL ........................................................................................................................................... 31
CLIENT SIDE (COMPUTERS)...............................................................................................................................62
Broadband VPN Router” and “Broadband VPN RouterÆWinXP”. 68
- vi -
11g Wireless Security Router User Guide
Introduction
Congratulations on your purchase of this 11g W ireless Security Router .This router is the
perfect design product combining wireless and Ethernet network technology together.
Fully compatible with IEEE 802.11g wireless standard, this device not only allows you to
take advantage of mobility, but also to have fast Ethernet connection with built-in four
10/100 auto-sensing switch Ethernet ports. Users on wireless LAN and Ethernet LAN
can share files, printers, and other networking resource each other at a blazing speed.
Best of all, with NAT technology, all users can share single account of Internet access by
having this device connect to a DSL/Cable modem.
Integrated 802.11g wireless AP and 4-port 10/100 Mbps switch, it is quick and easy to
deploy wireless and wire LAN without spending extra cost of a wireless access point, hub
or switch. All LAN users are able to share internal network data, like files, printers, and
other networking resources in a blazing speed. The wireless Router’s efficient antenna
offers a covered range up to 30 meters indoor (150 meters outdoor) and seamless roaming
throughout wireless LAN infrastructure. More over, the wireless operation provides 64
bit key and 128 bit WEP data encryption for high-level security.
With built-in NAT , this device not only provides natural firewall, protecting your network
from access by outside users but also extends your LAN connection. Users on the LAN
can share a single account of Internet access by having this device connect to a
DSL/Cable modem. This Firewall Router allows up to 253 users on the Ethernet LAN
simultaneously but makes IP configuration simple and easy. Configured as a DHCP
server, the 1 1g W ireless Security Router assigns an IP Address to every connected PC on
Ethernet LAN automatically. Also, DHCP client helps WAN port obtain IP address
dynamically assigned by ISP.
With a web-based UI (U ser Interface), this 1 1g Wireless Security Router is easy to setup
and maintain. With this exclusive user friendly interface, all functions can be configured
easily via a web browser such as Netscape Communicator and Internet Explorer.
About this Guide
This guide contains information about installing and configuring your 11g Wireless
Security Router . It is designed to guide users through the correct setup procedures for
appropriate hardware installation and basic configuration. Later, it shows how to
complete advanced configurations to get the best operating performance from this 11g
Wireless Security Router .
Chapter 1: Get to know your 11g Wireless Security Router
This chapter describes thepackage contents and provides a list of features and
applications illustrations of the 11g Wireless Security Router .
Chapter 2: Hardware Installation & Setup
This chapter describes the steps for the hardware installation of the 1 1g W ireless Secu rity
Router .
- 1 -
11g Wireless Security Router User Guide
Chapter 3: Internet Access
This chapter describes the steps for the basic configuration and start up of the 11g
Wireless Security Router .
Chapter 4: Advanced Applications
This chapter describes how to configure advanced functions in order to get the most from
your 11g Wireless Security Router .
Chapter 5: Management
This Chapter describes how to configure management functions in order to manage and
get the setting information of your 11g Wireless Security Router .
Chapter 6: Macintosh Setup
This Chapter provides instructions on how to set up your Macintosh computers in your
network.
Chapter 7: Trouble Shooting
This chapter describes any potential problems you may encounter and the suggested
remedies.
Conventions
The following explains the conventions used throughout this document.
Italics New words, terms, or special emphasis. E.g. Getting to know your
11g Wireless Security Router .
“Boldface” Buttons, checkboxes, or items that you can select from screens,
menus, or dialog boxes. E.g. Click “OK” to restart
Boldface Italics Items in Bold Italics are samples only and you should enter other
names, numbers, or words to substitute.
- 2 -
11g Wireless Security Router User Guide
Chapter 1: Getting to know your 11g Wireless Security Router
This chapter describes thepackage contents and provides a list of features and
application illustrations of the 11g Wireless Security Router.
1-1 About The 11g Wireless Security Router
The 11g Wireless Security Router is a hybrid design product which combines Ethernet
technology and wireless access into a single stand-alone unit. The device allows you take
advantages of both mobility and fast connection. All PCs whenever on wireless LAN or
Ethernet LAN can share files, printers and other network resource. Moreover, all users
can share single account of Internet access by having this device connect to a DSL/Cable
modem.
Ethernet / Fast Ethernet
Ethernet is the most widely-used network access method, especially in a Local Area
Nnetwork (LAN) and is defined by the IEEE as the 802.3 standard. Normally , Ethernet is
a shared media LAN. All station s on the se gm ent share the total bandwidth, which could
be 10Mbps (Ethernet), 100Mbps (Fast Ethernet), or 1000Mbps (Gigabit Ethernet). With
a switched Ethernet, each sender and receiver has the full bandwidth.
Fast Ethernet is defined as IEEE 802.3u standard, a high-speed version of Ethernet with
100Mbps transmission rate.
Wireless LAN
Wireless Local Area Network systems (WLANs) transmit and receive data through the
air by using radio frequency (RF). This offers some advantages like mobility, ease of
installation, and scalability over traditional wired systems.
Mobility: WLANs combine data connectivity with user m obility. This provides users
with access to network anywhere in their organization. For example, users can roam from
a conference room to their office without being disconnected from the LAN. This is
impossible with wired networks.
Ease of Installation: Eliminating the need to deploy network cable in walls and ceilings,
Installing WLANs is easy for novice and expert users alike.
Scalability: WLAN topologies are easy to change in various ways from peer-to-peer
networks for a small group of users to full infrastructure networks for hundreds of users
roaming over a broad area.
Wireless LAN is suitable f or difficult-to-wire and frequently changing environm ents. It’s
also an ideal solution for mobile workers to access network resource and for setting a
temporary LAN when necessary
Wireless LANs can be set as “Aad-hoc” network and “Infrastructure” network. Unlike
the “Aad-hoc network”, where users on the LAN send data directly to each other, the
“Infrastructure” network includes an access point and users on the “Infrastructure”
- 3 -
11g Wireless Security Router User Guide
network send data to that dedicated access point. 11g Wireless Security Router uses
“Infrastructure” network as Wireless LANs. Each wireless LAN PC within the range of
the access point can communicate with other wireless LAN PCs within the range.
1-2 Contents of the 11g Wireless Security Router Package
After carefully unpacking the shipping carton, check the contents listed below.
1. 11g Wireless Security Router.
2. Power Adapter.
3. User’s Manual
4. UTP Cable (not showing)
1-3 Features of the11g Wireless Security Router
Your 11g Wireless Security Router contains the following features that make it excellent
for network connections.
9Allows multiple users to access the Internet at the same time by providing
maximum Internet utilization to multiple users sharing a single public IP Address.
9Allows users on Ethernet LAN and Wireless LAN to transfer data to each other
through wireless-to-wire bridge.
9Provides wireless access roaming, best access point selection, loading balance,
network traffic filtering included in wireless roaming function.
9Provides 64bits/128bits key WEP (Wired Equivalent Privacy) wireless data
encryption to secure wireless communication.
9 Fully supports 802.11 open and shared key authentications.
9 Integrates four 10/100BASE-T/TX auto-sensing switch ports.
9 Uses NAT to allow your entire network’s PCs to connect to the Internet using
only one (purchased) IP address.
9Supports PPPoE that enable user to seamlessly connect to ISPs with the familiar
“dial-up” connection interface.
9Built-in web-based user interface for easy configuration and management
through common web browsers such as Netscape Communication 6.0 or later and
- 4 -
11g Wireless Security Router User Guide
Internet Explorer 5.0 or later.
9 Built-in firewall to protect your PCs from outside intruders (NAT).
9 Supports DHCP client to receive both a dynamic IP Address and a fixed IP
Address from ISP.
9 Built-in DHCP server to automatically assign and manage LAN IP addresses.
9 Allow administrators to block specific internal users from accessing specified
applications or services.
9Allows external Internet users to access information from the internal target host
by setting the Virtual Server.
9Provides unrestricted two-way communication between one PC on your LAN
and certain Internet services such as conferencing, video and gaming
applications.
9 Enhances routing performance by using Dynamic and Static routing settings.
9 Allow administrators to change the WAN MAC address of the router.
9 Compatible with all popular Internet applications.
- 5 -
11g Wireless Security Router User Guide
Chapter 2: Hardware Installation & Setup
This chapter provides information about your 11g Wireless Security Router ’sphysical
features and gives step-by-step installation instructions.
2-1 Rear Panel & Connections
The following figure shows the rear view of the 11g Wireless Security Router and
illustrates how the cables connect to the interfaces on the rear panel.
1. Plug one end of the UTP cable into the WAN port, the other into the RJ45
Ethernet jack on your ADSL or Cable modem.
2. Connect a PC, which must have an Ethernet NIC (Network Interface Card)
installed, to one of the LAN Ports.
3. Connect the external power supply to the 11g Wireless Security Router.
4. The Reset button is used to reboot and re-initialize the device (press once quickly),
or for clearing configuration settings back to factory default values (press for
longer than 3 seconds).
2-2 Front Panel LEDs
The following figure shows the front view of the 11g Wireless Security Router .
The LEDs on the front panel indicate the status of the unit. You can easily view the
operation of your 11g Wireless Security Router from this panel.
- 6 -
11g Wireless Security Router User Guide
Power: Green The Power LED illuminates when the Wireless 11g Router is
powered on.
Diag Red The Diag LED illuminates when Router goes through its
self-diagnosis mode during boot-up. It will turn off upon
successful completion of the diagnostic.
For WLAN
Enable
/Activity:
Green The Links LED illuminates when the wireless option is
enabled. When the wireless option is disabled (through the
web-based utility), the LED is off.
Blinking when there is wireless connection activity.
For WAN port & LAN ports (x4)
Link/Act &
10/100:
2-3 System Requirements and Setup
To connect to the Internet, an external ADSL or Cable modem and an Internet access
account from an ISP is required. In order to operate with the 11g Wireless Security
Router , each PC that is to be connected to the 11g Wireless Security Router should have
the following things installed:
Green Steady on when a successful 100Mbps connection is made
trough the corresponding port.
Blinking when data is flowing through this port.
Yellow Steady on when a successful 10Mbps connection is made
trough the corresponding port.
Blinking when data is flowing through this port.
1. Ethernet NIC (Network Interface Card: a 10Base-T or 10/100Base-T/TX
Ethernet card), or wireless client card for wireless connection.
2. Standard twisted-pair Ethernet cable (UTP network cable) with RJ-45
connectors.
3. System OS: Windows 95/98, Windows NT4.0, or Windows 2000/XP
4. TCP/IP network protocol.
5. Web browser, such as Microsoft Internet Explorer 5.0 or later, or Netscape
Navigator 6.0 or later.
Installing the TCP/IP Protocol
If you are not sure whether the TCP/IP Protocol has been installed, follow these steps to
check, and if necessary, install TCP/IP onto your PCs.
1. Click the “Start” button. Choose “Settings”, then “Control Panel”.
Double-click the “Network” icon. Your Network window should appear.
- 7 -
11g Wireless Security Router User Guide
Select the “Configuration” tab.
Note: For Windows 2000 & Windows XP Setting
Click the “Local Area Connection” icon on the lower right hand side of
your desktop screen.
In the “Local Area Connection Status” window, click the “Properties”
button then your Network window will appear.
- 8 -
11g Wireless Security Router User Guide
There is only one tab, “General”, in the Network window.
2. Check whether the TCP/IP Protocol has already been installed onto your
computer’s Ethernet card. Note that TCP/IP Protocol can be installed for a
computer’s Dial-Up Adapter as well as for the Ethernet card.
- If yes, go to step 7.
- If no, click the “Add” button.
3. Double-click “Protocol” in the Select Network Component Type or
highlight “Protocol” then click “Add”.
- 9 -
11g Wireless Security Router User Guide
4. Highlight “Microsoft” under the list of manufacturers.
Double-click “TCP/IP” from the list on the right or highlight “TCP/IP”
then click “OK” to install TCP/IP.
5. After a few seconds, you will be returned to the Network window. The
TCP/IP Protocol should now be on the list of installed network components
(see 2 above).
6. Click the “Properties” button.
The TCP/IP Properties window consists of several tabs. Choose the “IP Address” tab.
7. Select “Obtain an IP address automatically”. Click “OK”. Restart your
PC to complete the TCP/IP installation.
- 10 -
11g Wireless Security Router User Guide
Fixed IP Addresses Configuration
Fixed IP addresses may be assigned to network devices for many reasons, such as the
server PCs or printers which are consistently accessed by multiple users. To set up
computers with fixed IP Addresses, go to the “IP Addr ess” tab of the “TCP/IP Properties” window as shown above.
Select “Specify an IP address” and enter “192.168.1.***” in the “IP Address” location
(where *** is a number between 2 and 254 used by the 11g Wireless Security Router to
identify each computer), and the default “Subnet Mask”255.255.255.0”. Note that no
two computer on the same LAN can have the same IP address.
- 11 -
11g Wireless Security Router User Guide
Click on the “DNS Configuration” tab and select “Enable DNS”. Enter the “DNS IP
Address” obtained from your ISP in the “Server Search Order” location. Then click
the “Add” button.
Click on the “Gateway” tab and enter the 11g Wireless Security Router ’s default
gateway value 192.168.1.1 in the “New gateway” field, then click “Add” Botton.
Click “OK”. Restart your PC to complete the TCP/IP installation.
- 12 -
11g Wireless Security Router User Guide
Chapter 3: Internet Access
This chapter describes the procedures necessary to configure the basic functions and
begin using your 11g W ireless Security Router . If you follow these procedures correctly,
there should be no problem in accessing the Internet via your 11g Wireless Security
Router .
3-1 Prepare your network information
In order to allow quick referencing when setting up your 11g W ireless Security Router ,it
is suggested you complete the table below with the necessary information. This should be
supplied by your ISP.
Provided by some ISPs Host Name:
Domain Name:
IP address given by ISP: | Obtain IP Address automatically
| Static IP
IP Address:
. . .
Subnet Mask:
. . .
Default Gateway:
. . .
DNS Server Primary:
. . .
DNS Server Secondary:
. . .
DNS Server Third:
. . .
PPP authentication: | PPPoE
| PPTP
Login Name:
Password: ________________
3-2 Web-based User Interface
Your 11g Wireless Security Router is designed to use a Web-based User Interface for
configuration. Open your web browser and type http://192.168.1.1 in the browser’s
address box. This address is the factory set IP Address of your 11g Wireless Security
Router . Press “Enter”.
The “Username and Password Required” prompt box will appear. Leave the
Username field empty and type “admin” (default password) in the Password field. Click
“OK”. The setup screen will then appear.
- 13 -
11g Wireless Security Router User Guide
3-3 Initial Configuration – Setup
The “OnePage Setup” screen is the first screen you will see when you access the Utility.
If the router has already been successfully installed and set up, this screen’s values will
already be properly configured.
Host Name: This entry is required by certain ISPs.
Domain Name: This entry is required by certain ISPs.
Time Zone: Select the time zone of your location from the drop down list.
- 14 -
11g Wireless Security Router User Guide
Private IP Address: The “Device IP Address” and “Subnet Mask” of the router are
used for the internal LAN. The default values are 192.168.1.1 for
the IP Address and 255.255.255.0 for the Subnet Mask.
Wireless: Check “Enable” or “Disable” to make the wireless LAN
function active or inactive.
SSID:
As the acronym for Service Set Identifier, SSID is the
unique name shared among all clients and W ireless Security
Router in a same wireless network. The SSID must be
identical for all points and must not exceed 32 characters.
SSID Broadcast:
Channel:
WEP:
WEP Key Setting:
Router will broadcast the SSID to let WLANs clients easily
search and connect to this wireless router by leaving this
item as default setting “Allow”. Click “Disallow” to disable
the broadcast.
Select the appropriate channel number from the drop-down.
The permissible channels are different from Regulatory
Domains. Make sure that all nodes in the same wireless
LAN network use the same channel, or the channel usage is
automatic when a connection between client and access
point are made.
As the acronym for Wir ed Equivalent Privacy, WEP is an
encryption mechanism used to protect your wireless data
communications. WEP uses a combination of
64-bit/128-bit keys to encrypt data that is transmitted
between all points in a wireless network to insure data
security. To code/decode the data transmission, all points
must use the identical key. To make the WEP encryption
active or inactive, select “Mandatory” or “Disable”.
As the WEP is active, click the button of “WEP Key
Setting” to go to the setting page. Select “64Bit” or
“128Bit” encryption algorithm from the drop-down list.
There are two ways to generate WEP key:
1. Passphrase: Enter a alphanumeric text string in this
column then click “Generate” button, and four 64-bit
or 128-bit encryption key will be created
automatically.
2. You can enter the WEP key manually.
You may need to enter the WEP key manually in case to
join the existing wireless network. However, if not, the Pass
phrase method is recommended. If you are not sure which
way to use, check with your network administrator.
- 15 -
11g Wireless Security Router User Guide
Default TX Key:
Select one of the four keys to be the encryption key you are
going to use in the wireless network. To be sure that all the
points in a same wireless network have to have the same
encryption key.
Click “Apply” after making any changes.
WAN Connection Type:
There are four options for WAN connection types, Obtain IP automatically, Static IP,
PPPoE, and PPTP.
The connection type you need to choose is dependent upon the settings assigned by
your ISP. Which connection type you need to choose may differ from ISPs as well as the
service you applied for. It depends on your ISP’s assignment. If you are unsure which
connection type you currently use, contact your ISP to obtain the correct information.
Obtain IP automatically
It is the default option for the router. If your ISP automatically assign a IP address and
other values to the 11g Wireless Security Router , leave them there without making any
changes.
Static IP
The Public IP Address and Subnet Mask of the router are used by external users of the
Internet (including your ISP). If your ISP assigned a fixed IP address, select this item and
enter the IP Address and Subnet Mask provided by your ISP.
- 16 -
11g Wireless Security Router User Guide
Specify WAN IP Address:
Enter the IP address provided by your ISP.
Subnet Mask:
Default Gateway IP
Address:
Domain Name Server
(DNS):
Enter the subnet mask values provided by your ISP.
Your ISP will provide you with the Default Gateway IP
Address.
Your ISP will provide you with at least one DNS IP
Address. Multiple DNS IP settings are common. The first
available DNS entry is used in most cases.
PPPoE
PPPoE is a dial-up connection type provided by some ISPs. It is a cost–effective way for
a user to access this connection type. If your ISP provides PPPoE connectivity, you
should choose this item from the drop-down list. Note that if you select PPPoE, please
remove any existing PPPoE application on any PCs on your LAN.
User Name:
Password:
Connect-on-demand:
Enter the user name your ISP provides you.
Enter the password your ISP provides you.
It is a utility used to trigger the PPPoE session when there
is a packet being sent through the WAN port while it is on
disconnected situation. Check the radio button to make
this function active, and then you must enter the number
of minutes you wish the network to remain idle before
- 17 -
11g Wireless Security Router User Guide
disconnection occurs in the “Max Idle Time” location.
Keep Alive:
This function keeps your PPPoE connection enable even
if it remains idle. However, in some situation, PPPoE
session cannot be established immediately after
disconnection. This is because the system on the ISP’s
site may need a little time to restore itself. You may need
to check with your ISP to obtain detail of how long you
need to wait before re-establish the PPPoE session. Enter
this information in the “Redial Period” field.
RAS(for SingTel)
If your ISP uses RAS to establish the connection, you should select this item and follow
the steps below.
User Name:
Password:
RAS Plan:
Connect-on-demand:
Keep Alive:
Enter the user name your ISP provides you.
Enter the password your ISP provides you.
Choose the connection method that you want to use.
It is a utility used to trigger the RAS session when there is
a packet being sent through the WAN port while it is on
disconnected situation. Check the radio button to make
this function active, and then you must enter the number
of minutes you wish the network to remain idle before
disconnection occurs in the “Max Idle Time” location.
This function keeps your RAS connection enable even if
it remains idle. However, in some situation, RAS session
cannot be established immediately after disconnection.
This is because the system on the ISP’s site may need a
little time to restore itself. You may need to check with
your ISP to obtain detail of how long you need to wait
before re-establish the RAS session. Enter this
information in the “Redial Period” field.
- 18 -
11g Wireless Security Router User Guide
PPTP
PPTP is the acronym of Point to Point Tunneling Protocol. Usually, it is used to
encapsulate other protocols’ packets for transmission over IP network. Some ISPs use
this protocol as way to establish the initial connection between the CPE (end-user side)
and DSLAM (ISP side). If your ISP uses PPTP to establish the connection, you should
select this item and follow the steps below.
Specify WAN IP Address:
Subnet Mask:
Default Gateway IP
Address:
User Name:
Password:
Connect-on-demand:
Enter the IP address provided by your ISP. If your ISP
provides you an Alcatel Speed TouchTM modem, it is
suggested that you enter 10.0.0.150 in this column.
Enter the subnet mask values provided by your ISP.
Your ISP will provide you with the Default Gateway IP
Address. If your ISP provides you an Alcatel Speed
TouchTM modem, it is suggested that you enter the
10.0.0.138 in this column.
Enter the user name provided by your ISP.
Enter the password provided by your ISP.
It is a utility used to trigger the PPTP session when there
is packet being sent through the WAN port while it is on
disconnected situation. Check the radio button to make
this function active, and then you must enter the number
of minutes you wish the network to remain idle before
disconnection occurs in the “Max Idle Time” location.
Keep Alive:
This function keeps your PPTP connection enable even if
it remains idle. However, in some situation, PPTP session
cannot be established immediately after disconnection.
This is because the system on the ISP’s site may need a
little time to restore itself. You may need to check with
your ISP to obtain detail of how long you need to wait
before re-establish the PPTP session. Enter this
- 19 -
11g Wireless Security Router User Guide
information in the “Redial Period” field.
HBS
If your ISP uses HBS to establish the connection, you should select this item and follow
the steps below.
User Name:
Enter the user name provided by your ISP.
Password:
Heart Beat Server:
Connect-on-demand:
Keep Alive:
Enter the password provided by your ISP.
Enter the IP address provided by your ISP. This setting is
available only for some areas. Check your ISP for more
detailed information.
It is a utility used to trigger the HBS session when there is
packet being sent through the WAN port while it is on
disconnected situation. Check the radio button to make
this function active, and then you must enter the number
of minutes you wish the network to remain idle before
disconnection occurs in the “Max Idle Time” location.
This function keeps your HBS connection enable even if
it remains idle. However, in some situation, HBS session
cannot be established immediately after disconnection.
This is because the system on the ISP’s site may need a
little time to restore itself. You may need to check with
your ISP to obtain detail of how long you need to wait
before re-establish the HBS session. Enter this
information in the “Redial Period” field.
When you have properly configured the Setup page, click “Apply”. You can now test to
see if the settings are all correct by attempting to connect to the Internet.
- 20 -
11g Wireless Security Router User Guide
Chapter 4: Advanced Applications
This chapter provides information on how to set up and use the advanced functions of
your 11g Wireless Security Router .
4-1 Firewall
The settings page allows you to configure advanced Firewall functions, providing
superior security for your network environment.
Firewall Option:
Web Filter:
Enabling this function will prevent DoS (Denial of Service)
attacks and activates the SPI (Stateful Packet Inspection). The
SPI function will check any incoming data packets, particularly
whenever there is a TCP connection initiated by your LAN PCs.
This feature provides options allowing you to filter any
potential risk contained in some web technologies by
individually checking “Allow” or “Deny”.
Web proxy is a server your device will connect to when you
access any web site. Setting web proxy can speed up access
time but also can create other potential security issue. For
example, if you configure the W ireless Security Router to block
access to 216.115.102.76, which is the IP address of
www.yahoo.com
, it will fail. This is because your PC will
connect to web proxy server instead of connecting to Y ahoo’s IP
address.
Java & Active X are programming languages for web page.
However, some potentially harmful Trojan programs and
- 21 -
11g Wireless Security Router User Guide
viruses are also written in these languages. If you deny access to
either of these, you may run the risk of not having access to
certain web pages.
A cookie is a small piece of data (usually in the form of a text
file), which is stored on your PC when you visit certain web
sites. This allows the server to identify your machine at a future
date. The cookie normally contains an ID number but can also
contain other information.
Apply:
Click this button after making any changes for activating the
settings.
Cancel:
Click this button if you are not satisfied with the settings in this
page before clicking Apply.
4-2 VPN Settings
This page allows you to set configuration for Virtual Private Network. Please choose
Advanced – VPN to get into the following screen.
Select Tunnel Entry:
This Tunnel:
Tunnel Name:
When you wish to establish a “Tunnel” to transfer security data
or information between specific points, you must first select a
“Tunnel” number from the drop-down box. This will allow you
to identify the setting of each individual tunnel.
Check “Enable” on the next column to activate the tunnel.
Once the tunnel is enabled, you should enter the name of the
tunnel in this field. This allows you to differentiate a new tunnel
- 22 -
Loading...
+ 63 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.