CyberTAN Technology WR214C User Manual

HHiigghh--PPeerrffoorrmmaannccee WWiirreelleessss RRoouutteerr
User’s Manual
2003/06/10
Broadband Security Router User Guide
FCC Interference Statement
This device complies with Part 15 of FCC rule. Operation is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference received, including interference that may cause
undesired operation.
This High-Performance Wireless Router has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment or device. Connect the equipment to an outlet other than the receiver’s. Consult a dealer or an experienced radio/TV technician for assistance.
CE Declaration of Conformity
This equipment complies with the specifications relating to electromagnetic compatibility, EN 55022/A1 Class B, and EN 50082-1. This meets the reasonable protection requirements set out in the European Council Directive on the approximation of the laws of the member states relating to Electromagnetic Compatibility Directive (89/336/EEC).
Manufacturer’s Disclaimer State
The information in this document is subject to change without notice and does not represent a commitment on the part of vendor. No warranty or representation, either expressed or implied, is made with respect to the quality, accuracy or fitness for any particular prupose of this document. The manufacturer reserves the right to make change to the content of this document and/or the products associated with it at any time without obligation to notify any person or organization. In no event will the manufacturer be liable for direct, indirect, special, incidental or consequential damages arising out of the use or inability to use this product or documentation, even if advised of the possibility of such damages. This document contains materials protected by copyright. All rights are reserved. No part of this manual may be reproduced or transmitted in any form, by any means or for any purpose without expressed written consent of its authors. Product names appearing in this document are mentioned for identification purchases only. All trademarks, product names or brand names appearing in this document are registered property of their respective owners.
- ii -
Broadband Security Router User Guide
Table of Contents
Preface.......................................................................................................................................1
Chapter 1: Introduction...........................................................................................................3
About The High-Performance Wireless Router.........................................................3
Features ......................................................................................................................4
Package Contents .......................................................................................................5
Chapter 2: Installation............................................................................................................. 7
Front Panel .................................................................................................................7
Rear Panel & Connections .........................................................................................8
System Requirements.................................................................................................8
Setting Up the TCP/IP Protocol................................................................................. 9
Chapter 3: Internet Access....................................................................................................15
Prepare your network information ...........................................................................15
Web-based User Interface........................................................................................ 15
Basic Configuration – Setup .................................................................................... 16
Wireless.................................................................................................................... 16
WAN Connection Type............................................................................................ 18
Chapter 4: Advanced Applications.......................................................................................23
DHCP Configuration ................................................................................................ 23
Access Control .........................................................................................................24
Virtual Server Settings............................................................................................. 27
Special Applications................................................................................................. 35
DMZ Host ................................................................................................................ 30
Dynamic Routing .....................................................................................................32
Static Routing........................................................................................................... 33
DDNS.......................................................................................................................35
Chapter 5: Management........................................................................................................ 41
Device Administration Settings ............................................................................... 41
Status Monitor..........................................................................................................43
Log ........................................................................................................................... 44
Backup & Restore ....................................................................................................46
Upgrade Firmware....................................................................................................46
Diagnostic-Ping........................................................................................................ 47
Chapter 6: Macintosh Setup..................................................................................................49
Hardware Connections............................................................................................. 49
Computer Network Configuration ........................................................................... 49
High-Performance Wireless Router Configuration..................................................50
Adding High-Performance Wireless Router to Existing Network........................... 50
- iii -
Broadband Security Router User Guide
Chapter 7: Trouble Shooting ................................................................................................51
Hardware.................................................................................................................. 51
Client Side (Computers)........................................................................................... 52
Appendix A: Technical Specifications .................................................................................. 55
Appendix B: Glossary............................................................................................................57
- iv -
Broadband Security Router User Guide
Preface
Congratulations on your purchase of this High-Performance Wireless Router. This router is the perfect design product combining wireless and Ethernet network technology together. Fully compatible with IEEE 802.11b wireless standard, this device not only allows you to take advantage of mobility, but also to have fast Ethernet connection with built-in four 10/100 auto-sensing switch Ethernet ports. Users on wireless and Ethernet LAN can share files, printers, and other networking resource each other at a blazing speed. Best of all, with NAT technology, all users can share single account of Internet access by having this device connect to a DSL/Cable modem.
Integrated 802.11b wireless AP, it is quick and easy to deploy wireless LAN without spending extra cost of a wireless access point. The wireless Router’s efficient antenna offers a covered range up to 30 meters indoor (150 meters outdoor) and seamless roaming throughout wireless LAN infrastructure. More over, the wireless operation provides 64 bit key and 128 bit WEP data encryption for high-level security.
With built-in NAT, this device not only provides natural firewall, protecting your network from access by outside users but also extends your LAN connection. Users on the LAN can share a single account of Internet access by having this device connect to a DSL/Cable modem. This Wireless Router allows up to 253 users on the Ethernet LAN simultaneously but makes IP configuration simple and easy. Configured as a DHCP server, the High-Performance Wireless Router assigns an IP Address to every connected PC on Ethernet LAN automatically. Also, DHCP client helps WAN port obtain IP address dynamically assigned by ISP.
With a web-based UI (User Interface), this High-Performance Wireless Router is easy to setup and maintain. With this exclusive user friendly interface, all functions can be configured easily via a web browser such as Netscape Communicator and Internet Explorer.
About this Guide
This manual contains information about installing and configuring your High-Performance Wireless Router. It is designed to guide users through the correct setup procedures for appropriate hardware installation and basic configuration. Later, it shows how to complete advanced configurations to get the best operating performance from this High-Performance Wireless Router.
Chapter 1: Introduction
This chapter describes the package contents and provides a list of features and
- 1 -
Broadband Security Router User Guide
applications illustrations of the High-Performance Wireless Router.
Chapter 2: Hardware Installation & Setup
This chapter describes the steps for the hardware installation of the High-Performance Wireless Router.
Chapter 3: Internet Access
This chapter describes the steps for the basic configuration and start up of the High-Performance Wireless Router.
Chapter 4: Advanced Applications
This chapter describes how to configure advanced functions in order to get the most from your High-Performance Wireless Router.
Chapter 5: Management Applications
This chapter describes how to configure Management functions for administration.
Chapter 6: Macintosh Setup
This chapter provides instructions on how to set up your Macintosh computers in your network.
Chapter 7: Trouble Shooting
This chapter describes any potential problems you may encounter and the suggested remedies.
Conventions
The following explains the conventions used throughout this document.
Italics New words, terms, or special emphasis. E.g. Getting to know your
High-Performance Wireless Router.
“Boldface” Buttons, checkboxes, or items that you can select from screens,
menus, or dialog boxes. E.g. Click “OK” to restart
Boldface Italics Items in Bold Italics are samples only and you should enter other
names, numbers, or words to substitute.
- 2 -
Broadband Security Router User Guide
Chapter 1: Introduction
This chapter describes the package contents and provides a list of features and application illustrations of the High-Performance Wireless Router.
About The High-Performance Wireless Router
High-Performance Wireless Router is a hybrid design product which combines Ethernet technology and wireless access into a single stand-alone unit. The device allows you take advantages of both mobility and fast connection. All PCs whenever on wireless LAN or Ethernet LAN can share files, printers and other network resource. Moreover, all users can share single account of Internet access by having this device connect to a DSL/Cable modem.
Ethernet / Fast Ethernet
Ethernet is the most widely-used network access method, especially in a Local Area Network (LAN) and is defined by the IEEE as the 802.3 standard. Normally, Ethernet is a shared media LAN. All stations on the segment share the total bandwidth, which could be 10Mbps (Ethernet), 100Mbps (Fast Ethernet), or 1000Mbps (Gigabit Ethernet). With a switched Ethernet, each sender and receiver has the full bandwidth.
Fast Ethernet is defined by the as the IEEE 802.3u standard, a high-speed version of Ethernet with 100Mbps transmission rate.
Wireless LAN
Wireless Local Area Network systems (WLANs) transmit and receive data through the air by using radio frequency (RF). This offers some advantages like mobility, ease of installation, and scalability over traditional wired systems.
Mobility: WLANs combine data connectivity with user mobility. This provides users with access to network anywhere in their organization. For example, users can roam from a conference room to their office without being disconnected from the LAN. This is impossible with wired networks.
Ease of Installation: Eliminating the need to deploy network cable in walls and ceilings, Installing WLANs is easy for novice and expert users alike.
Scalability: WLAN topologies are easy to change in various ways from peer-to-peer networks for a small group of users to full infrastructure networks for hundreds of users roaming over a broad area.
Wireless LAN is suitable for difficult-to-wire and frequently changing environments. It’s also an ideal
- 3 -
Broadband Security Router User Guide
solution for mobile workers to access network resource and for setting a temporary LAN when necessary
Wireless LANs can be set as “Aad-hoc” network and “Infrastructure” network. Unlike the “Aad-hoc network”, where users on the LAN send data directly to each other, the “Infrastructure” network includes an access point and users on the “Infrastructure” network send data to that dedicated access point. Advanced Wireless 11g Router uses “Infrastructure” network as Wireless LANs. Each wireless LAN PC within the range of the access point can communicate with other wireless LAN PCs within the range.
Features
Your High-Performance Wireless Router contains the following features that make it excellent for network connections.
¾ Allows multiple users to access the Internet at the same time by providing
maximum Internet utilization to multiple users, sharing a single public IP Address.
¾ Integrates four 10/100BASE-T/TX auto-sensing switch ports. ¾ Uses NAT to allow all of your network’s PCs to connect to the Internet using
only one (purchased) IP address.
¾ Supports PPPoE that enable user to seamlessly connect to ISPs with the
familiar “dial-up” connection interface.
¾ Built-in web-based user interface for easy configuration and management
through common web browsers such as Netscape Communicator 6.0 or later and Internet Explorer 5.0 or later.
¾ Built-in NAT firewall to protect your PCs from outside intruders. ¾ Supports DHCP client to receive both a dynamic IP Address and a fixed IP
Address from your ISP.
¾ Built-in DHCP server to automatically assign and manage LAN IP addresses. ¾ Allow administrators to block specific internal users from accessing specified
applications or services.
¾ Allows external Internet users to access information from the internal target
host by setting the Virtual Server.
¾ Provides unrestricted two-way communication between one PC on your LAN
and certain Internet services such as conferencing, video and gaming applications.
¾ Enhances routing performance by using Dynamic and Static routing settings. ¾ Allow administrators to change WAN MAC address. ¾ Compatible with all popular Internet applications.
- 4 -
Broadband Security Router User Guide
Package Contents
After carefully unpacking the shipping carton, check the contents listed below.
Router Power Adapter User’s Manual
The High-Performance Wireless Router Power Adapter User’s Manual
- 5 -
Broadband Security Router User Guide
- 6 -
Broadband Security Router User Guide
Chapter 2: Installation
This chapter provides information about your High-Performance Wireless Router’s physical features and gives step-by-step installation instructions for hardware installation and software configuration.
Front Panel
The following figure shows the front view of the High-Performance Wireless Router. The LEDs on the front panel indicate the status of the unit. You can easily view the operation of your High-Performance Wireless Router from this panel.
Note: Please refer to the model on your hand to find proper description.
LED Status Description
Power: Green Steady on when the power is on. Diag: Red Lights up during system checking connections and
internal operation when the power is first switched on. If the device works properly, the light should switch off automatically.
WLAN Link/Act:
Green ¾ Steady on when the wireless AP is enabled.
When the wireless AP is disabled (through the web-based utility), the LED should remain off.
¾ Blinking when data is flowing through Wireless
AP.
WAN
Green ¾ Steady on when the Ethernet link exists.
Link/Act: ¾ Blinking when data is flowing through this port. LAN 1~4
Green ¾ Steady on when the Ethernet link exists.
Link/Act: ¾ Blinking when data is flowing through this port.
- 7 -
Broadband Security Router User Guide
Rear Panel & Connections
The following figure shows the rear view of the High-Performance Wireless Router and illustrates how the cables connect to the interfaces on the rear panel.
1. Plug one end of the UTP cable into the WAN port, the other into the RJ45 Ethernet
jack on your ADSL or Cable modem.
2. Connect a PC, which must has an Ethernet NIC (Network Interface Card) installed,
to one of the LAN Ports.
3. Connect the external power supply to the High-Performance Wireless Router.
4. The Reset button is used to reboot and re-initialize the device (press once quickly),
or for clearing configuration settings back to factory default values (press for longer than 3 seconds).
Note: If you are Macintosh users, please refer to Chapter 6 Macintosh Setup for more detailed information about configuring TCP/IP, hardware installation and so on..
System Requirements
To connect to the Internet, an external ADSL or Cable modem and an Internet access account from an ISP is required. In order to operate with the High-Performance Wireless Router, each PC that is to be connected to the High-Performance Wireless Router should have the following things installed:
¾ Ethernet NIC (Network Interface Card: a 10Base-T or 10/100Base-T/TX Ethernet
card), or wireless client card for wireless connection
¾ Standard twisted-pair Ethernet cable (UTP network cable) with RJ-45 connectors ¾ System OS: Windows 95/98, Windows NT4.0, or Windows 2000/XP ¾ TCP/IP network protocol ¾ Web browser, such as Microsoft Internet Explorer 5.0 or later, or Netscape
Navigator 6.0 or later
- 8 -
Broadband Security Router User Guide
Setting Up the TCP/IP Protocol
If you are not sure whether the TCP/IP Protocol has been installed, follow these steps to check, and if necessary, install TCP/IP onto your PCs.
1. Click the “Start” button. Choose “Settings”, then “Control Panel”. Double-click
the “Network” icon. Your Network window should appear as follows:
2. Select the “Configuration” tab.
Important:
For Windows 2000 & Windows XP Setting, you will find that they differs with Windows 98/ME/NT slightly. See the following for reference.
Click the “Local Area Connection” icon on the lower right hand side of your desktop screen.
- 9 -
Broadband Security Router User Guide
In the “Local Area Connection Status” window, click the “Properties” button then your Network window will appear.
There is only one tab, “General”, in the Network window.
3. Check whether the TCP/IP Protocol has already been installed onto your
computer’s Ethernet card. Note that TCP/IP Protocol can be installed for a computer’s Dial-Up Adapter as well as for the Ethernet card.
- If yes, go to step 7.
- If no, click the “Add” button.
4. Double-click “Protocol” in the Select Network Component Type or highlight
“Protocol” then click “Add”.
- 10 -
Broadband Security Router User Guide
5. Highlight “Microsoft” under the list of manufacturers.
Double-click “TCP/IP” from the list on the right or highlight “TCP/IP” then click “OK” to install TCP/IP.
6. After a few seconds, you will be returned to the Network window. The TCP/IP
Protocol should now be on the list of installed network components (see 3 above).
7. Click the “Properties” button. The TCP/IP Properties window consists of several
tabs. Choose the “IP Addr ess” tab.
8. Select “Obtain an IP address automatically”. Click “OK”. Restart your PC to
complete the TCP/IP installation.
- 11 -
Broadband Security Router User Guide
Fixed IP Addresses Configuration
Fixed IP addresses may be assigned to network devices for many reasons, such as the server PCs or printers which are consistently accessed by multiple users. To set up computers with fixed IP Addresses, go to the “IP Address” tab of the “TCP/IP Properties” window as shown above.
Select “Specify an IP address” and enter “192.168.1.xxx” in the “IP Address” location (where xxx is a number between 2 and 254 used by the High-Performance Wireless Router to identify each computer), and the default “Subnet Mask”
255.255.255.0”. Note that no two computers on the same LAN can have the same IP address.
- 12 -
Broadband Security Router User Guide
Click on the “DNS Configuration” tab and select “Enable DNS”. Enter the “DNS IP Address” obtained from your ISP in the “Server Search Order” location. Then click
the “Add” button.
Click on the “Gateway” tab and enter the High-Performance Wireless Router’s default gateway value 192.168.1.1 in the “New gateway” field, then click “Add” Button.
- 13 -
Broadband Security Router User Guide
Click “OK”. Restart your PC to complete the TCP/IP installation.
- 14 -
Broadband Security Router User Guide
Chapter 3: Internet Access
This chapter describes the procedures necessary to configure the basic functions and begin using your High-Performance Wireless Router. If you follow these procedures correctly, there should be no problem in accessing the Internet via your High-Performance Wireless Router.
Prepare your network information
In order to allow quick referencing when setting up your High-Performance Wireless Router, it is suggested you complete the table below with the necessary information. It should be supplied by your ISP.
Provided by some ISPs Host Name:
Domain Name:
IP address given by ISP:
| Obtain IP Address automatically | Static IP
IP Address: ____.____.____.____ Subnet Mask: ____.____.____.____ Default Gateway: ____.____.____.____ DNS Server Primary: ____.____.____.____ DNS Server Secondary: ____.____.____.____ DNS Server Third: ____.____.____.____
PPP authentication: | PPPoE
| PPTP Login Name: Password: ________________
Web-based User Interface
Your High-Performance Wireless Router is designed to use a Web-based User Interface for configuration. After connecting your r outer and your computer, please open your web browser and type http://192.168.1.1 the factory set IP Address of your High-Performance Wireless Router. Press “Enter”.
in the browser’s address box. This address is
- 15 -
Broadband Security Router User Guide
The “Username and Password Required” prompt box will appear. Leave the Username field empty and type “admin” (default password) in the Password field. Click “OK”. The setup screen will then appear.
Basic Configuration – Setup
The “OnePage Setup” screen is the first screen you will see when you access the Utility. If the router has already been successfully installed and set up, this screen’s values will already be properly configured.
Host Name: This entry is required by certain ISPs. Domain Name: This entry is required by certain ISPs. Time Zone: Select the time zone of your location from the drop down list. Private IP Address: The “Device IP Address” and “Subnet Mask” of the router are
used for the internal LAN. The default values are 192.168.1.1 for the IP Address and 255.255.255.0 for the Subnet Mask.
Wireless
Check “Enable” or “Disable” to make the wireless LAN function active or inactive. SSID:
As the acronym for Extend Service Set Identifier, ESSID is the unique name shared among all clients and Wireless Broadband Router in a sam e wireless network. The ESSID must be identical for all points and must not
- 16 -
Broadband Security Router User Guide
exceed 32 characters.
Channel:
WEP:
WEP Key Setting:
Select the appropriate channel number from the drop-down. The permissible channels are different from Regulatory Domains. Make sure that all nodes in the same wireless LAN network use the same channel, or the channel usage is automatic when a connection between client and access point are made.
As the acronym for Wired Equivalent Privacy, WEP is an encryption mechanism used to protect your wireless data communications. WEP uses a combination of 64-bit/128-bit keys to encrypt data that is transmitted between all points in a wireless network to insure data security. To code/decode the data transmission, all points must use the identical key. To make the WEP encryption active or inactive, select “Mandatory” or “Disable”.
As the WEP is active, click the button of “WEP Key
Setting” to go to the setting page. Select “64Bit” or “128Bit” encryption algorithm from the drop-down list.
There are two ways to generate WEP key:
Passphrase Enter a alphanumeric text string in this column then click “Generate” button, and four 64-bit encryption key will be created automatically. Note that only one 128-bit key will be generated in 128-bit encryption mode.
Manually You may need to enter the WEP key manually in case to join the existing wireless network. However, if not, the Pass phrase method is recommended. If you are not sure which way to use, check with your network
- 17 -
Loading...
+ 46 hidden pages