Tenda W15E User Manual

AC1200 Wireless Hotspot Router W15E
User Guide
Q1.
Copyright Statement
is a registered trademark legally held by Shenzhen Tenda Technology Co., Ltd. Other brand and
product names mentioned herein are trademarks or registered trademarks of their respective holders. Copyright of the whole product as integration, including its accessories and software, belongs to Shenzhen Tenda Technology Co., Ltd. No part of this publication can be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the prior written permission of Shenzhen Tenda Technology Co., Ltd.
Disclaimer
Pictures, images and product specifications herein are for references only. To improve internal design, operational function, and/or reliability, Tenda reserves the right to make changes to the products without obligation to notify any person or organization of such revisions or changes. Tenda does not assume any liability that may occur due to the use or application of the product described herein. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information and recommendations in this document do not constitute a warranty of any kind, express or implied.
Item
Presentation
Example
Cascading menus
>
System > Live Users
Parameter and value
Bold
Set User Name to Tom.
Variable
Italic
Format: XX:XX:XX:XX:XX:XX
UI control
Bold
On the Policy page, click the OK button.
Message
“ ”
The “Success” message appears.
Symbol
Meaning
This format is used to highlight information of importance or special interest. Ignoring this type of note may result in ineffective configurations, loss of data or damage to device.
This format is used to highlight a procedure that will save time or resources.
Acronym or Abbreviation
Full Spelling
AP
Access Point
DDNS
Dynamic Domain Name System
DHCP
Dynamic Host Configuration Protocol
DLNA
Digital Living Network Alliance
DMZ
Demilitarized Zone
DNS
Domain Name System
IPTV
Internet Protocol Television
ISP
Internet Service Provider
Preface
Thank you for choosing Tenda! Please read this user guide before you start with W15E.
Conventions
The typographical elements that may be found in this document are defined as follows.
The symbols that may be found in this document are defined as follows.
Acronyms and Abbreviations
Acronym or Abbreviation
Full Spelling
L2TP
Layer 2 Tunneling Protocol
MPPE
Microsoft Point-to-Point Encryption
PPP
Point To Point Protocol
PPPoE
Point-to-Point Protocol over Ethernet
PPTP
Point to Point Tunneling Protocol
SSID
Service Set Identifier
STB
Set Top Box
URL
Uniform Resource Locator
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
WISP
Wireless Internet Service Provider
WPS
WiFi Protected Setup
Hotline
Canada: 1-888-998-8966
Email
support@tenda.cn Hong Kong: 00852-81931998
Website
http://www.tendacn.com
Skype
tendasz
Additional Information
For more information, search this product model on our website at http://www.tendacn.com.
Technical Support
If you need more help, contact us by any of the following means. We will be glad to assist you as soon as possible.
Contents
1 Get to Know Your Device ..................................................................................................................................... 1
1.1 Overview ........................................................................................................................................................ 1
1.2 Features ......................................................................................................................................................... 1
1.3 Appearance .................................................................................................................................................... 1
1.3.1 Front Panel .......................................................................................................................................... 1
1.3.2 Rear Panel ........................................................................................................................................... 2
1.3.3 Label .................................................................................................................................................... 2
1.4 Packing List ..................................................................................................................................................... 3
2 Installing the Router ............................................................................................................................................ 4
2.1 Installation Notes ........................................................................................................................................... 4
2.1.1 Safety Precautions .............................................................................................................................. 4
2.1.2 Environmental Requirements ............................................................................................................. 4
2.2 Installing the Router....................................................................................................................................... 5
2.3 Connecting the Router ................................................................................................................................... 5
3 Internet Connection Setup .................................................................................................................................. 7
4 Managing Devices .............................................................................................................................................. 11
4.1 Log in to the Router Web UI ........................................................................................................................ 11
4.2 Log out of the Router Web UI ...................................................................................................................... 12
4.3 Web UI Layout.............................................................................................................................................. 12
5 Network Settings ............................................................................................................................................... 14
5.1 Network Settings ......................................................................................................................................... 14
5.1.1 PPPoE ................................................................................................................................................ 16
5.1.2 Dynamic IP ........................................................................................................................................ 16
5.1.3 Static IP ............................................................................................................................................. 17
5.2 WAN Parameters .......................................................................................................................................... 17
5.2.1 Overview ........................................................................................................................................... 17
5.2.2 Configuring MAC Address Cloning .................................................................................................... 18
5.3 LAN Settings ................................................................................................................................................. 19
5.3.1 Overview ........................................................................................................................................... 19
5.3.2 Modifying the LAN IP ........................................................................................................................ 23
5.3.3 Configuring the DHCP Server Parameters ......................................................................................... 24
5.3.4 DHCP Reservation ............................................................................................................................. 24
5.4 Port Mirroring .............................................................................................................................................. 25
5.4.1 Overview ........................................................................................................................................... 25
5.4.2 Example of Port Mirroring ................................................................................................................ 26
5.5 Static Routing ............................................................................................................................................... 28
5.5.1 Overview ........................................................................................................................................... 28
5.5.2 Example of Static Routing ................................................................................................................. 28
5.6 Any IP ........................................................................................................................................................... 31
5.7 DNS Cache .................................................................................................................................................... 32
6 Wireless Settings ................................................................................................................................................ 33
6.1 Basic Settings ............................................................................................................................................... 33
6.1.1 Overview ........................................................................................................................................... 33
6.1.2 Modifying Basic Parameters ............................................................................................................. 35
6.2 Advanced Settings........................................................................................................................................ 36
6.2.1 Overview ........................................................................................................................................... 36
6.2.2 Modifying Advanced Parameters ...................................................................................................... 38
6.3 WMM Settings ............................................................................................................................................. 38
6.3.1 Overview ........................................................................................................................................... 38
6.3.2 Changing WMM Advanced Parameters ............................................................................................ 41
6.4 RF Optimization ........................................................................................................................................... 41
6.4.1 Overview ........................................................................................................................................... 41
6.4.2 Modifying Advanced Parameters ...................................................................................................... 44
6.5 Guest Network ............................................................................................................................................. 44
6.5.1 Overview ........................................................................................................................................... 44
6.5.2 Changing Parameters of the Guest Network .................................................................................... 46
6.6 Wireless Repeater ........................................................................................................................................ 47
6.6.1 Overview ........................................................................................................................................... 47
6.6.2 Example of Configuring of Wireless Repeater .................................................................................. 47
6.7 Access Control.............................................................................................................................................. 50
6.7.1 Overview ........................................................................................................................................... 50
6.7.2 Example of Configuring Access Control ............................................................................................ 51
7 Filter Management ............................................................................................................................................ 55
7.1 IP Group & Time Group................................................................................................................................ 55
7.1.1 Overview ........................................................................................................................................... 55
7.1.2 Adding a Time Group ........................................................................................................................ 56
7.1.3 Adding an IP Group ........................................................................................................................... 57
7.2 IP Filter ......................................................................................................................................................... 57
7.2.1 Overview ........................................................................................................................................... 57
7.2.2 Adding an IP Filter Rule ..................................................................................................................... 59
7.2.3 Example of IP Filter ........................................................................................................................... 60
7.3 MAC Filter .................................................................................................................................................... 62
7.3.1 Overview ........................................................................................................................................... 62
7.3.2 Adding the MAC Filter Rule ............................................................................................................... 64
7.3.3 Example of MAC Filter ...................................................................................................................... 65
7.4 Port Filter ..................................................................................................................................................... 67
7.4.1 Overview ........................................................................................................................................... 67
7.4.2 Adding the Port Filter Rule ................................................................................................................ 68
7.4.3 Example of Port Filter ....................................................................................................................... 69
7.5 Web Filter .................................................................................................................................................... 72
7.5.1 Overview ........................................................................................................................................... 72
7.5.2 Add a Web Filter Rule ....................................................................................................................... 73
7.5.3 Adding a Web Category .................................................................................................................... 75
7.5.4 Example of Web Filter ....................................................................................................................... 77
7.6 Multi-WAN Policy ......................................................................................................................................... 80
7.6.1 Overview ........................................................................................................................................... 80
7.6.2 Custom Policy Rule ............................................................................................................................ 80
7.6.3 Example of Custom Policy ................................................................................................................. 82
8 Bandwidth Control ............................................................................................................................................. 84
8.1 Overview ...................................................................................................................................................... 84
8.2 Configuring Automatic Bandwidth Control .................................................................................................. 84
8.3 Manual Bandwidth Control .......................................................................................................................... 84
8.4 Example of Manual Bandwidth Control ....................................................................................................... 86
8.4.1 Networking requirement .................................................................................................................. 86
8.4.2 Configuration procedure ................................................................................................................... 86
8.4.3 Verification ........................................................................................................................................ 88
9 VPN Service ........................................................................................................................................................ 89
9.1 PPTP/L2TP Client .......................................................................................................................................... 89
9.2 PPTP/L2TP Server ......................................................................................................................................... 91
9.3 IPSec ............................................................................................................................................................. 93
9.4 Example of PPTP/L2TP Configuration .......................................................................................................... 97
9.4.1 Networking requirement .................................................................................................................. 97
9.4.2 Solution ............................................................................................................................................. 97
9.4.3 Configuration procedure ................................................................................................................... 98
9.4.4 Verification ...................................................................................................................................... 101
9.5 Example of IPSec Configuration ................................................................................................................. 104
9.5.1 Networking requirement ................................................................................................................ 104
9.5.2 Solution ........................................................................................................................................... 104
9.5.3 Configuration procedure ................................................................................................................. 104
9.5.4 Verification ...................................................................................................................................... 107
10 Security .................................................................................................................................................... 108
10.1 IP-MAC Binding ........................................................................................................................................ 108
10.1.1 Overview ....................................................................................................................................... 108
10.1.2 Adding an IP-MAC Binding Rule .................................................................................................... 109
10.1.3 Example of IP-MAC Binding .......................................................................................................... 110
10.2 Firewall ..................................................................................................................................................... 113
11 Captive Portal ........................................................................................................................................... 115
11.1 Basic Settings ........................................................................................................................................... 115
11.1.1 Overview ....................................................................................................................................... 115
11.1.2 Enabling Captive Portal ................................................................................................................. 116
11.2 User Management ................................................................................................................................... 117
11.2.1 Overview ....................................................................................................................................... 117
11.2.2 Adding Authentication-free Host .................................................................................................. 118
11.2.3 Adding a Web Account.................................................................................................................. 119
11.3 Example of Web Authentication .............................................................................................................. 120
11.3.1 Networking requirement .............................................................................................................. 120
11.3.2 Solution ......................................................................................................................................... 120
11.3.3 Configuration procedure ............................................................................................................... 120
11.3.4 Verification .................................................................................................................................... 122
12 PPPoE Authentication .............................................................................................................................. 124
12.1 Basic Settings ........................................................................................................................................... 124
12.1.1 Overview ....................................................................................................................................... 124
12.1.2 Enabling PPPoE Authentication .................................................................................................... 126
12.2 User Management ................................................................................................................................... 127
12.2.1 Overview ....................................................................................................................................... 127
12.2.2 Adding a PPPoE Account ............................................................................................................... 128
12.3 Example of PPPoE Authentication ........................................................................................................... 129
12.3.1 Networking requirement .............................................................................................................. 129
12.3.2 Solution ......................................................................................................................................... 129
12.3.3 Configuration procedure ............................................................................................................... 129
12.3.4 Verification .................................................................................................................................... 132
13 WiFi via WeChat ....................................................................................................................................... 135
13.1 WiFi via WeChat ....................................................................................................................................... 135
13.1.1 Overview ....................................................................................................................................... 135
13.1.2 Enabling WiFi via WeChat ............................................................................................................. 139
13.2 Example of WiFi via WeChat .................................................................................................................... 139
13.2.1 Networking requirement .............................................................................................................. 139
13.2.2 Solution ......................................................................................................................................... 139
13.2.3 Configuration procedure ............................................................................................................... 140
13.2.4 Verification .................................................................................................................................... 142
14 Virtual Server ........................................................................................................................................... 143
14.1 Port Forwarding ....................................................................................................................................... 143
14.1.1 Overview ....................................................................................................................................... 143
14.1.2 Adding Port Forwarding ................................................................................................................ 144
14.1.3 Example of Port Forwarding ......................................................................................................... 145
14.2 UPnP ........................................................................................................................................................ 147
14.3 DMZ Host ................................................................................................................................................. 148
14.3.1 Overview ....................................................................................................................................... 148
14.3.2 Enabling DMZ Host ....................................................................................................................... 148
14.4 DDNS ........................................................................................................................................................ 149
14.4.1 Overview ....................................................................................................................................... 149
14.4.2 Adding a DDNS rule....................................................................................................................... 150
14.4.3 Example of DDNS .......................................................................................................................... 151
15 Maintenance ............................................................................................................................................ 155
15.1 Login Password ........................................................................................................................................ 155
15.1.1 Overview ....................................................................................................................................... 155
15.1.2 Modify the Login Password ........................................................................................................... 156
15.2 Reboot ..................................................................................................................................................... 156
15.2.1 Overview ....................................................................................................................................... 156
15.2.2 Manual Reboot ............................................................................................................................. 157
15.2.3 Automatic Reboot ......................................................................................................................... 157
15.3 Backup/Restore ........................................................................................................................................ 158
15.3.1 Overview ....................................................................................................................................... 158
15.3.2 Steps for Backing up Configuration ............................................................................................... 158
15.3.3 Steps for Restoring the Configuration ........................................................................................... 158
15.4 Firmware Upgrade ................................................................................................................................... 158
15.4.1 Overview ....................................................................................................................................... 158
15.4.2 Steps for Local Upgrade ................................................................................................................ 159
15.4.3 Steps for Online Upgrade .............................................................................................................. 159
15.5 Restore Factory Settings .......................................................................................................................... 160
15.5.1 Overview ....................................................................................................................................... 160
15.5.2 Restoring Factory Settings via WEB UI of the Router.................................................................... 160
15.5.3 Restoring Factory Settings via Reset Button ................................................................................. 161
15.6 System Time ............................................................................................................................................. 161
15.6.1 Overview ....................................................................................................................................... 161
15.6.2 Manual Setup ................................................................................................................................ 161
15.7 Remote WEB Management ..................................................................................................................... 162
15.7.1 Overview ....................................................................................................................................... 162
15.7.2 Configuring Remote WEB Management ....................................................................................... 163
15.7.3 Example of Remote WEB Management ........................................................................................ 163
15.8 Diagnostics ............................................................................................................................................... 164
15.8.1 Overview ....................................................................................................................................... 164
15.8.2 Diagnosis with the Ping Command ............................................................................................... 165
15.8.3 Diagnosis with Traceroute ............................................................................................................ 166
16 System Status ........................................................................................................................................... 168
16.1 System Info .............................................................................................................................................. 168
16.2 Live Users ................................................................................................................................................. 169
16.3 Traffic Statistics ........................................................................................................................................ 171
16.4 Defense Logs ............................................................................................................................................ 172
16.5 System Logs.............................................................................................................................................. 173
SYS
5GHz
2.4GHz
WAN/LAN
1 Get to Know Your Device
1.1 Overview
Tenda W15E is a 1200 Mbps 11AC dual-band wireless router dedicated for small and medium enterprises and chain hotels. With high-performance processor operating at a frequency of as high as 900 MHz, W15E supports up to 4 WAN ports, and integrates WeChat authentication, Web authentication, multi-WAN load balancing, and intelligent bandwidth control. Powered by the Beamforming+ technology, it boasts excellent wireless stability, allowing connection to a maximum number of 50 clients, including 40 wireless clients. It also supports IPSec/PPTP/L2TP VPN service.
1.2 Features
By default, W15E has 1 WAN port and 4 LAN ports.
With two external 2.4 GHz and two external 5 GHz omnidirectional antennas, and the built-in independent low noise power amplifier, it can provide stable coverage for an area of 300 square meters.
Support multi-WAN policy to effectively prevent network congestion.
Support intelligent bandwidth control for appropriate utilization of network resources.
Support PPTP/L2TP server mode, which is mainly used by company headquarter, and the PPTP/L2TP client mode, which is mainly used by branch offices.
Support IPSec VPN service for the data integrity verification, packet replay attack protection, data encryption, and so on.
Support captive portal, PPPoE authentication, and WiFi via WeChat. Only authenticated users can access the internet through the router.
Resourceful URL database for effective internet access control on employees.
Support online firmware upgrade.
1.3 Appearance
1.3.1 Front Panel
The following describes the LED status.
1
LED
Description
SYS
When booting, Solid on indicates that the system is powered on; after the system is started, Solid on indicates that the system is faulty; Blinking indicates that the system works properly, and Off indicates that the system is not powered on.
2.4 GHz
Solid on: The 2.4 GHz wireless function is enabled but no data is transmitted; Blinking: Data is transmitted at 2.4 GHz; Off: The 2.4 GHz wireless function is disabled.
5 GHz
Solid on: The 5 GHz wireless function is enabled but no data is transmitted; Blinking: Data is transmitted at 5 GHz; Off: The 5 GHz wireless function is disabled.
1
WAN port 1 LED. Solid on: No data is transmitted through WAN port 1. Blinking: Data is transmitted through WAN port 1. Off: No device connects to WAN port 1, or connection is faulty.
2/3/4
WAN/LAN 2/3/4 LEDs. By default, they are LAN port LEDs.
Solid on: No data is transmitted. Blinking: Data is transmitted. Off: No device connects to these ports, or connection is faulty.
5
LAN port 5 LED. Solid on: No data is transmitted through LAN port 5. Blinking: Data is transmitted through LAN port 5. Off: No device connects to LAN port 5, or connection is faulty.
Port and Button
Description
Power
Power jack. Power on the device using the power adapter included with the package.
Reset
Reset button. After the wireless router is powered on, use a paper clip to hold down the Reset button for 8 seconds to restore factory settings.
1
It is the WAN port used to connect to the internet using Ethernet cable. The Ethernet cable may be cable connected to the ADSL modem, optical modem, or cable modem, or provided by the ISP.
2/3/4
They are WAN/LAN ports. By default, they are LAN ports. You can log in to the router web UI to change.
5
It is the LAN port used to connect to devices, such as computers and switches.
1.3.2 Rear Panel
1.3.3 Label
2
(2)
(1)
(3)
(1): IP address of the router. You can use this IP address to log in to the web UI of the router. (2): Serial number of the router. (3): Default wireless network name (WiFi name) of the router.
The clients can scan and connect to the wireless network, and log in to the web UI of the router for setting.
After the router connects to the internet, if the WiFi name has not been changed, the wireless client can scan and connect to it to access the internet.
1.4 Packing List
The package includes the following items:
If any item is missing, or damaged, please keep the original package and contact the local reseller or distributor immediately.
3
Environment
Temperature
Humidity
Operating environment
0 ~ 40
10%RH - 90%RH (non-condensing)
Storage environment
-40 ~ 70
5%RH - 90%RH (non-condensing)
2 Installing the Router
2.1 Installation Notes
Follow the notes below to avoid device damages or personal injuries caused by misoperation.
2.1.1 Safety Precautions
Power on the device using the power adapter included with the package.
Make sure that the input voltage matches the value specified on the label of the device.
Make sure that the device is positioned at a place with good ventilation.
Do not remove the housing of the device.
Before cleaning the device, disconnect it from the power supply. Do not scrub the device with any liquid.
Position the device away from powerline, electric lamp, and power system.
2.1.2 Environmental Requirements
Temperature and Humidity
Anti-static Precautions
To prevent static interference, keep the air in the ambient environment clean. Regularly perform dedusting. Make sure that the device is grounded properly.
Lightning Protection
To protect the device against lightning stroke or strong current, do the following:
Make sure that the power receptacle and workbench are grounded properly.
Connect the cables to the device properly to avoid generating internal lightning induction. If outdoor cabling is required, it is advisable to deploy a signal lightning arrester.
Workbench
Make sure that the workbench is stable and sturdy enough.
Place the device in a well-ventilated environment. Keep at least 10 cm space on all sides for cooling.
Do not place heavy objects on the device.
4
2.2 Installing the Router
Step 1 Place the router upside down on the workbench, and paste the four pad stickers into the round recesses
in the coroner of the device.
Step 2 Place the router right side up on the workbench, and adjust the position of the antennas. See the
following figure.
2.3 Connecting the Router
Step 1 Connect the Ethernet cable to the WAN port.
Step 2 Connect the router to other network devices (such as servers and computers) using the Ethernet cable.
Check whether the connection is proper. Connect the router with the receptacle using the power
5
adapter included with the package.
6
3 Internet Connection
Setup
Step 1 Set the local connection of your computer to Obtain an IP address automatically and Obtain DNS
server address automatically. See Configure IP Address of Your Computer in Appendix 1 for detailed
instructions.
Step 2 Start a browser, enter tendawifi.com or 192.168.0.1, and press Enter. Click Start.
7
Step 3 The system automatically detects your internet connection type. Enter related values according to the
on-screen instructions, and click Next.
Step 4 Set your SSID and WiFi password, and click Next.
8
---End
By default, the Set the wireless password as login password is enabled. You can also disable this option and customize your login password.
9
Wait a second for the completion of settings. For more settings, visit http://www.tendacn.com to download user guide of the router.
By default, the wireless network has no password. You need to reconnect to the WiFi signal once the SSID and/or WiFi password is changed.
By default, the SSID of the 2.4 GHz network is Tenda_XXXXXX (see the label at the bottom of the router), and the SSID of the 5 GHz network is Tenda_XXXXXX_5G.
The computer can connect to the WiFi signal only when a wireless adapter is installed on it.
10
4 Managing Devices
4.1 Log in to the Router Web UI
Step 1 Set the local connection of your computer to Obtain an IP address automatically and Obtain DNS
server address automatically. See Configure IP Address of Your Computer in Appendix 1 for detailed
instructions.
Step 2 Start a browser, enter tendawifi.com or 192.168.0.1, and press Enter.
Step 3 Enter your login password, and press Login.
11
Click here to logout
---End
The router web UI appears.
4.2 Log out of the Router Web UI
If you log in to the web UI of the router and perform no operation within 5 minutes, the router logs you out. Clicking Logout in the upper right corner of the web UI can log you out as well.
4.3 Web UI Layout
The web UI is composed of three parts, including the level-1 and level-2 navigation bars, and configuration area.
12
No.
Name
Description
Level-1 navigation bar
The navigation bar displays the level-1 function menu of the router. Choosing the function in level-1 navigation bar will expand the corresponding level-2 navigation bars.
Level-2 navigation bar
The navigation bars display the function menu of the router. When you select a function in level-2 navigation bar, the configuration of the function appears in the configuration area.
Configuration area
It enables you to view and modify configuration.
Button
Description
It is used to save the configuration on the current page and enable the configuration to take effect.
It is used to cancel the unsaved configuration on the current page.
It is used to log you out and redirect you back to the login page.
1
2
3
Common buttons description
13
5 Network Settings
This Chapter includes the following sections:
Internet Settings: This module enables to view and modify the internet settings of the router.
WAN Parameters: This module enables you to modify the WAN parameters, including WAN speed, MTU, and MAC address.
LAN Settings: This module enables you to modify the LAN IP, and the related parameters of DHCP server, and assign static IP address to clients.
Port Mirroring: This module enables you to set the port mirroring function of the router.
Static Routing: This module enables you to view the routing information and configure static routing.
Any IP: By default, this function is disabled. It allows clients with any IP address to access the internet through the router. After being disabled, clients that have connected to the router can access the internet with any IP address.
DNS Cache: It is used to enable/disable the DNS Cache and set the DNS cache limit.
5.1 Network Settings
This module enables you to configure internet settings. To modify the internet settings, choose Network > LAN Settings.
14
Parameter
Description
WAN Ports
It is used to configure the number of WAN ports, and view the status of RJ45 ports (connection status and types of the ports).One WAN port is enabled by default.
If you modify the number of WAN ports, the status of RJ45 ports changes as well. See the following figure.
The ports connect properly.
No devices connect to the port, or connection is faulty.
Connection Type
The router provides three connection types:
PPPoE: The ISP, such as China Telecom and China Unicom, provides the username and password. To access the internet, you have to enter the PPPoE username and password if your computer is connected to the ISP without a router.
Dynamic IP: The ISP, such as China Telecom and China Unicom, does not provide the username or password. To access the internet, you just need to connect the Ethernet cable to your computer if your computer is connected to the ISP without a router.
Static IP: The ISP, such as China Telecom and Unicom, provides a fixed IP address. To access the internet, you have to configure the static IP address on your computer if your computer is connected to the ISP without a router.
PPPoE Username and PPPoE Password
They are available when the connection type of PPPoE is enabled. To obtain the information, ask your ISP.
IP Address, Subnet Mask, Gateway,
They are available when the connection type of Static IP is enabled. To obtain the
Parameter description
15
Parameter
Description
Primary/Secondary DNS
information, ask your ISP.
Connection Status
It specifies the connection status of WAN ports. The connection status includes:
Connected: The router connects to the internet successfully.
Connecting…: The router is connecting to the internet.
Disconnected: The router is disconnected, or connection fails. In this case, check your internet settings, or ask your ISP.
For other connection status, take appropriate measures according to the on-screen instructions.
5.1.1 PPPoE
PPPoE enables you to use the username and password provided by the ISP to access the internet. The following describes the configuration steps.
Step 1 Choose Network > Internet Settings. The page displays the parameters for the function. Step 2 Connection Type: Select PPPoE. Step 3 PPPoE Username and Password: Enter the username and password provided by your ISP. Step 4 Click OK.
---End
Wait a second. You can access the internet when the connection status is Connected.
5.1.2 Dynamic IP
If the ISP does not provide information for internet connection, or your computer is set to automatically obtain the IP address, the connection type is Dynamic IP. The following describes the configuration steps.
Step 1 Choose Network > Internet Setup. The page displays the parameters for the function. Step 2 Connection Type: Select Dynamic IP. Step 3 Click OK.
16
---End
Wait a second. You can access the internet when the connection status is Connected.
5.1.3 Static IP
If your ISP provides a fixed IP address, you can choose Static IP as the connection type. The following describes the configuration steps.
Step 1 Choose Network > Internet Setup. The page displays the parameters for the function. Step 2 Connection Type: Select Static IP. Step 3 IP Address, Subnet Mask, Gateway, Primary/Secondary DNS: Enter the relevant values provided by your
ISP.
Step 4 Click OK.
---End
Wait a second. You can access the internet when the connection status is Connected.
5.2 WAN Parameters
5.2.1 Overview
This section enables you to modify the WAN parameters in case that you cannot access the internet after configuring the internet settings. To access the page, choose Network > WAN Parameters.
17
Parameter
Description
WAN Speed
It specifies the WAN speed of the router. Auto-negotiation is selected by default. You are recommended to retain the default value.
MTU
Maximum transmission unit (MTU). It specifies the size of the largest data packet that can be transmitted by the router. You are recommended to retain the default value.
MAC Address
It is used to clone a MAC address for the WAN port. If the router cannot access the internet after you configure the internet settings, it maybe that the ISP has bound the connection information with a MAC address. In this case, you can try to clone the MAC address, and access the internet again.
Current MAC: It specifies the current MAC address of the WAN port of the router.
Default MAC: It is used to restore the MAC address of the WAN port of the router to factory settings.
Clone Local Host’s MAC: It is used to clone the MAC address of the computer that is currently logged in to the router to the WAN port of the router.
Manual: Manually enter the MAC address to be cloned to the WAN port of the router.
FastNAT
It is used to improve the forwarding performance of NAT.
Parameter description
5.2.2 Configuring MAC Address Cloning
Step 1 Choose Network > WAN Parameters. Step 2 MAC address: Select Clone Local Host’s MAC or Manual from the drop-down list box. If you choose
Manual, enter the MAC address that you want to clone.
Step 3 Click OK.
---End
18
Make sure that the MAC address cloned is the MAC address of the computer that can access the internet without the router.
5.3 LAN Settings
5.3.1 Overview
This section enables you to modify the IP address of the LAN port, DHCP server parameters, and to bind/unbind the MAC address and IP address of the clients. To access the page, choose Network > LAN Settings.
19
Parameter
Description
LAN IP
It specifies the IP address of this router’s LAN port, namely the IP address for logging in to the web UI of the router.
You can log in to the web UI of the router through either IP address (default 192.168.0.1) or the domain name (tendawifi.com).
Subnet Mask
It specifies the subnet mask of the IP address of the router.
Parameter
Description
DHCP Server
It specifies whether to enable the DHCP Server. This function is enabled by default.
Start IP
It specifies the start IP address of the IP address pool of the DHCP server. The default value is 192.168.0.100.
End IP
It specifies the end IP address of the IP address pool of the DHCP server. The default value is 192.168.0.200.The start and end IP addresses must belong to the same network segment as the IP address of the LAN port of the router.
Lease Time
It specifies the validity period of an IP address assigned by the DHCP server to a client.
LAN IP
LAN IP is the management IP address of the router, which can be modified if necessary.
Parameter description
DHCP Server
If the DHCP Server is enabled, the DHCP server can automatically assign IP address, subnet mask, gateway, DNS, and so on to the clients connected to the router. If this function is disabled, you have to manually configure the IP address of your client to access the internet. You are recommended to retain the DHCP Server enabled.
Parameter description
20
When the lease time expires:
If the client is still connected to the router, the client automatically extends the lease time and continues to use this IP address.
If the client is disconnected (the client is shutdown, the Ethernet cable is plugged out, or the wireless connection is off) from the router, the router releases this IP. Then the router can assign this IP address to other clients requested for IP address.
It is recommended that you retain the default value.
Primary DNS
It specifies the primary DNS server IP address assigned by the DHCP server to LAN clients. This router supports DNS proxy function. Therefore, the Primary DNS is the LAN IP of the router by default.
Generally, you are recommended to retain the default configuration. To enable clients to access the internet, set this parameter to a correct DNS server IP address or DNS proxy IP address.
Secondary DNS
It specifies the secondary DNS server IP address assigned by the DHCP server to clients. This parameter is optional.
Parameter
Description
It is used to bind the IP addresses and MAC addresses of the selected clients. IP Address
It specifies that IP address assigned by DHCP server to the client.
MAC Address
It specifies the MAC address of the client.
Host Name
It specifies the name of the client, such as iPhone.
IP/Mac Bind
Clicking Bind enables the IP/MAC binding and allows the client to obtain the same IP address all the time. Bound indicates that IP/MAC Bind is enabled.
DHCP Reservation
The client obtains the same IP address assigned by the DHCP server all the time so as to ensure proper usage of functions, such as filter management, bandwidth control, and VPN, and so on. DHCP Reservation module enables you to dynamically bind the IP address and MAC address of the client. DHCP Reservation module enables you to view the information of clients that automatically obtain IP address from the DHCP server and bind the IP address and MAC address of the client so as to ensure that the client always obtains that IP address from the DHCP server. After binding, you can view the added binding rules of IP address and MAC address in Manual DHCP Reservation module.
Parameter description
21
Manual DHCP Reservation
The client obtains the same IP address assigned by the DHCP server all the time so as to enable the Filter Management, Bandwidth Control, and VPN, and so on. Manual DHCP Reservation module enables you to manually bind the IP address and MAC address of the client.
Adding a Rule
Step 1 To access the Manual DHCP Reservation module, choose Network > LAN Settings. Step 2 Click +Add.
Step 3 In the windrow that appears, enter the MAC address of the client and the IP address you want to bind. Step 4 Click OK.
---End
The rule is added successfully, see the following figure.
22
Parameter
Description
This button enables you to manually bind a static IP address for the client. To bind, you need to know the MAC address of the client.
It is used to delete the selected bind rule of the IP address and MAC address. IP Address
It specifies the IP address corresponding to the MAC address of the client which it assigned to.
MAC Address
It specifies the MAC address of a client.
Remark
It describes the remark information (if any) of an IP/MAC bind rule.
Status
It specifies whether to enable the IP/MAC bind rule.
Action
It enables you to do the following actions:
: It is used to disable the rule.
: It is used to enable the rule.
: It is used to edit the rule, including the MAC address, IP address, Remark, and
enable/disable the rule.
: It is used to delete the IP/MAC bind. The client corresponding to the MAC address can
obtain other IP address from the DHCP server.
Parameter description
5.3.2 Modifying the LAN IP
Step 1 To access this module, choose Network > LAN Settings. Step 2 LAN IP: Modify the IP address, which is 192.168.10.1 in this example. Step 3 Click OK.
Wait until the progress bar completes. If you cannot log in to the web UI of the router, make sure that the IP address of your computer is set to Obtain an IP address automatically.
---End
23
5.3.3 Configuring the DHCP Server Parameters
Step 1 To access the DHCP Server module, choose Network > LAN Settings. Step 2 DHCP Server: Click Enable. Step 3 Start/End IP: Set the start IP and end IP of the IP address pool that the DHCP server can automatically
assign to the clients.
Step 4 Click OK.
---End
By default, the DHCP server of the router is enabled. If disabled, you need to manually configure the IP address of every client connected to the router.
It is recommended that you retain the default DHCP server settings to ensure internet connectivity.
5.3.4 DHCP Reservation
Step 1 Choose Network > LAN Settings. Step 2 Bind the IP address with the MAC address of the client.
If the client has connected to the router and obtained an IP address assigned by the router, perform the following steps:
1. Access the DHCP Reservation module.
2. Locate the client that you want to create the IP/MAC bind, and click Bind.
If the client does not obtain an IP address assigned by the router, see the following steps:
1. Access the Manual DHCP Reservation module.
2. Click +Add.
24
3. In the windrow that appears, enter the MAC address of the client and the IP address you want to bind.
4. Click OK.
---End
Bind successfully. See the following figure.
5.4 Port Mirroring
5.4.1 Overview
Port mirroring is used to copy the data packets from one or more ports of a device to the monitoring port. It is an approach for the network administrators to monitor network traffic and troubleshoot problems. The following is the topology for port mirroring:
25
Parameter
Description
Port Mirroring
It specifies whether to enable the port mirroring function. It is disabled by default.
Mirroring Port
It is used to monitor other ports. Client connected to the mirroring port should be installed with monitoring software. The default mirroring port is LAN5, which cannot be changed.
Mirrored Port
It specifies the ports being monitored. After the Port Mirroring function is enabled, the packets of the mirrored ports are automatically copied to the mirroring port.
By default, the router uses LAN5 port (mirroring port) to monitor communication of other ports (mirrored port).To access the page, choose Network > Port Mirroring. The Port Mirroring function is disabled by default.
Parameter description
5.4.2 Example of Port Mirroring
Networking requirement
A company uses W15E to deploy a network. However, network anomaly occurs recently and the internet cannot be accessed. They need to find out the problem.
Solution
The Port Mirroring function can be used to receive and analyze the data transmitted through WAN/LAN ports.
26
Install monitoring software on the computer connected to LAN5, and set other ports as mirrored ports. The following figure shows the scenario:
Configuration procedure
Step 1 Choose Network > Port Mirroring. Step 2 Click Enable check box of Port Mirroring. Step 3 Select the mirrored ports, such as WAN1, LAN2, LAN3, and LAN4, and click OK.
---End
Verification
Verify that the computer installed with monitoring software (connected to the LAN5 port of the router) can monitor the data packets of the selected mirrored ports.
27
Parameter
Description
Static Routing
You can manually add Static Routings by clicking +Add.
Route Table
It specifies the current route table of the router, including the default and the added Static Routing.
Destination Network
It specifies the destination address, namely the IP address that the packets can reach.
Subnet Mask
It specifies the subnet mask of the destination network. Gateway
It specifies the next hop IP address of the packets forwarded by the router.
Port
It specifies the WAN port of the router forwarding data packets.
5.5 Static Routing
5.5.1 Overview
Routing is performed to select the best route for delivering data from a source address to a destination address. Astatic route is a manually configured route, which is simple, efficient, and reliable. Appropriate static route help reduce the number of route selection problems and reduce route selection load, increasing the packet forwarding speed. To access the page, choose Network > Static Routing.
Parameter description
5.5.2 Example of Static Routing
Networking requirement
A company uses W15E to deploy a network. The company intents to allow the clients connected to the router to access both the internet and the company’s intranet.
Solution
The static route funtion can address this requirement. Set the router to access the internet through WAN1 port, and to the intranet through WAN2 port, and add a static route rule. Assume that the basic information is described as the following table.
28
IP Address
192.168.58.190
Gateway
192.168.58.1
Subnet Mask
255.255.255.0
Primary DNS
192.168.58.1
User name
tenda Password
tenda
IP Address
172.16.0.0
Subnet Mask
255.255.0.0
The company’s intranet information:
The company’s internet information:
The company’s intranet server information:
The following figure shows the topology.
Configuration procedure
Step 1 Set the WAN port according to the company’s network information (WAN1 for internet and WAN2 for
intranet). Enable two WAN ports, and set the following information. See the following figure. See 5.1 Network
Settings for Internet Connection for the detailed steps.
29
Step 2 Configure a static routing rule.
1. Click +Add.
2. In the window that appears, configure the relevant parameters.
(1) Destination Network: Enter the IP address of the destination network, which is 172.16.0.0 in this
example.
30
(2) Subnet mask: Enter the subnet mask of the destination IP address, which is 255.255.0.0 in this
example.
(3) Gateway: Enter the gateway of WAN2 port of the router, which is 192.168.58.1 in this example.
(4) Interface: Select the port for the destination network, which is WAN2 in this example.
(5) Click OK.
---End
After configuring, the newly added static route rule appears in the route table.
Verification
Verify that clients on the LAN network can access the internet and the intranet.
5.6 Any IP
By default, the clients connected to the router can access the internet either by automatically obtaining the IP address, or with a manually configured IP address, gateway and DNS. The router supports internet connection of clients configured with any IP address. After the Any IP function is enabled, users can access the internet without modifying the original configuration of their clients.
After the Any IP function is enabled, the client can access the internet by automatically obtaining the IP address, or manually being configured with correct IP address, gateway and DNS.
31
To access the page, choose Network > Any IP. By default, this function is disabled. Select the corresponding check box to enable or disable as required, and click
OK.
5.7 DNS Cache
The router supports DNS cache function, that is the system can record the DNS resolving information of the websites accessed by the user. If the website addresses the user wants to access are stored in the cache, the system calls the cached information from the DNS cache of the router without requesting the DNS server, improving the access speed. To access the page, choose Network > DNS Cache. The DNS Cache Can stores a maximum of 1000 records by default, which can be modified. The upper limit is
10000.Enter a value, and click OK.
32
6 Wireless Settings
This Chapter includes the following sections:
Basic: It is used to set the basic information of the wireless network of the router, including the SSID, security type and so on.
Advanced: It is used to set the advanced parameters.
WMM Settings: It is used to set WMM application scenarios and relevant parameters.
RF Optimization: It is used to test the wireless performance of the router, which is designed for the advanced users.
Guest Network: It is used to set the guest network parameters.
Wireless Repeater: It is used to enable/disable the wireless repeater function.
Access Control: It only disallows/allows the specified clients to access the internet.
6.1 Basic Settings
6.1.1 Overview
This module enables you to set the basic wireless parameters, including SSID (the wireless network name), password and so on. To access the page, choose Wireless > Basic.
33
Parameter
Description
2.4 GHz WiFi
It specifies whether to enable the 2.4 GHz/5 GHz function.
WiFi
It specifies whether to enable the corresponding wireless network (primary SSID, secondary SSID 1 and secondary SSID 2).
By default, the SSID (wireless network name) of the device is Tenda_XXXXXX. See the label at the bottom of the router, or the LAN Settings module for the specific information.
Without the guidance of professional personnel, you are only recommended to change the SSID and password, and retain the default configuration of other values.
WPA-PSK boasts better compatibility, while WPA2-PSK boasts better security. You can choose the security type as required.
Parameter description
34
Parameter
Description
SSID Broadcast
It specifies whether to enable the SSID broadcast.
Enable: It indicates that the router broadcasts the SSID and the SSID can be detected by clients.
Disable: It indicates that the router does not broadcast the SSID and the SSID does not appear in the available network list. You need to enter the correct SSID and WiFi password when connecting the client to the wireless network.
SSID
It specifies the WiFi name of the current wireless network of the router (primary SSID, secondary SSID 1 and secondary SSID 2).
After the router is connected to the internet, the clients can access the internet by connecting to the SSID. The SSID, which is the WiFi name can be modified.
Code Format
It specifies the encoding format of Chinese characters in the current SSID (WiFi name). The default code format is UTF-8.
If 2 or more SSIDs of the router are enabled, you are recommended to set this parameter to UTF-8 for some SSIDs and to GB2312 for the other SSIDs, so that any wireless client can identify one or both SSIDs that contain Chinese characters.
Security
It specifies the encryption type of the wireless network.
None. No security mode is selected.
WPA-PSK: It is a standard, interoperable and enhanced WLAN security solution, adopting an encryption algorithm more secure than WEP.
WPA2-PSK: It provides better security than WEP or WAP.
WPA-PSK&WPA2-PSK: Both WPA-PSK and WPA2-PSK are supported.
WiFi Password
It specifies the password of the wireless network. In consideration of network security, it is strongly recommended to set the WiFi password.
Key Update Interval
It specifies the automatic update interval of a key for data encryption, which results in higher data security.
Max Connected Clients
It specifies the maximum number of wireless clients that can connect to the router with the selected SSID (WiFi name).After this upper limit is reached, the SSID rejects new connection requests from clients.
Secondary SSID 1/2
The router supports two secondary SSIDs, which are disabled by default. Configuration steps of the secondary SSIDs are same as those of primary SSID.
6.1.2 Modifying Basic Parameters
Step 1 Choose Wireless > Basic. Step 2 SSID: Modify the SSID, namely the WiFi name. Step 3 Security: Select the security mode from the drop-down menu, such as WPA-PSK&WPA2-PSK, and set the
WiFi password.
Step 4 Click OK.
35
---End
6.2 Advanced Settings
6.2.1 Overview
This module enables you to set the advanced wireless parameters. Without the guidance of professional personnel, you are only recommended to modify the wireless channel and retain the default configuration of other options. To access the page, choose Wireless > Advanced.
Parameter description
36
Parameter
Description
Country/Region
It specifies the country or region where the router is used. Different countries or regions have different channel regulations.
Transmit Power
It specifies the transmit power of the router. The unit is dBm. A greater transmission power of the router offers broader network coverage. You can slightly reduce the transmit power to improve the wireless network performance and security.
Network Mode
It specifies the wireless network mode corresponding to the frequency bands of the router. Available options for the 2.4 GHz frequency band include 11b, 11g, 11b/g and 11b/g/n. The default value is 11 b/g/n.
11b: It indicates that only 802.11b-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 11 Mbps.
11g: It indicates that only 802.11b-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 54 Mbps.
11b/g: It indicates that only 802.11b/11g-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 54 Mbps.
11b/g/n: It indicates that only 802.11b/11g/11n-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 300 Mbps.
Available options at 5 GHz include 11a, 11ac, and 11a/n. The default value is 11ac.
11a: It indicates that only 802.11a-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 54 Mbps.
11ac: It indicates that only 802.11ac-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 867 Mbps.
11a/n: It indicates that only 802.11a/n-complaint clients can connect to the router. In this network mode, the router can reach a maximum wireless transmission rate of 300 Mbps.
Isolate SSID
It specifies whether to isolate the wireless clients connected to the router with different SSIDs.
Disable: It indicates that the wireless clients connected to the router with different SSIDs can communicate with each other.
Enable: It indicates that the wireless clients connected to the router with different SSID cannot communicate with each other. This improves wireless network security.
Channel Bandwidth
It specifies the bandwidth of the operating channel of a WiFi network. The unit is MHz
20 MHz: The router uses 20 MHz channel bandwidth.
40 MHz: The router uses 40 MHz channel bandwidth.
Auto: This option is only available to 2.4 GHz networks. It indicates that the router automatically adjusts its channel bandwidth to 20 MHz or 40 MHz according to the ambient environment.
80 MHzThis option is only available at 5 GHz. The router uses 80 MHz channel
37
Parameter
Description
bandwidth.
Wireless Channel
It specifies the channel for wireless data transmission. You are recommended to choose 1, 6, or 11.
Extension Channel
It specifies an additional channel used to increase the channel bandwidth if the channel bandwidth option 40 MHz is selected.
6.2.2 Modifying Advanced Parameters
Step 1 Choose Wireless > Advanced. Step 2 Modify the relevant parameters as required, such as the wireless channel. Step 3 Click OK.
---End
6.3 WMM Settings
6.3.1 Overview
WMM is a wireless QoS protocol used to ensure that packets with high priorities are transmitted first. This ensures better voice and video service experience over wireless networks. To use the function, choose Wireless > WMM Settings.
38
By default, the WMM function of this router is enabled. Three optimization modes are provided for different application scenarios, as described in the following:
Optimized for scenario with 1 – 10 users: If 10 or less clients are connected to the router, you are recommended to select this mode to increase client throughput.
Optimized for scenario with more than 10 users: If more than 10 clients are connected to the router, you are recommended to select this mode to ensure client capacity.
Custom: This mode enables you to set the WMM EDCA parameters for manual optimization. See the following for the detailed description.
Custom WMM EDCA parameters description
The following module appears if the Custom mode is selected. Setting the EDCA AP parameters can ensure the stability of wireless service. It is recommended that you change the settings only with guidance of professional personnel.
39
Parameter
Description
No ACK
No ACK policy is applicable to scenarios where the interference is mild. According to this policy, no ACK packet is used during wireless packet transmission to acknowledge packet reception.
No ACK policy can effectively improve transmission rate. However, in case of strong interference, lost packets are not sent again if this policy is adopted. This leads a higher packet loss rate.
EDCA
Enhanced Distributed Channel Access (EDCA): It is a channel competition mechanism to ensure that packets with higher priorities are assigned more bandwidth and transmitted earlier.
EDCA AP Parameters
It specifies the EDCA parameters used by the router.
EDCA STA Parameters
It specifies the EDCA parameters of the client.
EDCA Parameters
CWmin: Exponent form of CWmin
CWmax: Exponent form of CWmaxContention window. CWmin and CWmax specify the
Parameter description
40
average backoff period. The period increases along with these two values.
Arbitration Inter Frame Spacing Number (AIFSN): Different from the fixed distributed inter-frame spacing (DIFS) specified in the 802.11 protocol family, AIFSN varies across ACs. A greater AIFSN indicates a longer backoff period.
Transmission Opportunity (TXOP): It specifies the maximum channel use duration after successful channel contention. The duration increases along with this value. The value 0 indicates that a device can send only one packet through a channel after winning contention for the channel.
AC_BE, AC_BK, AC_VI, AC_VO
The WMM mechanism divides WLAN traffic by priority in descending order into the AC-VO (voice stream), AC-VI (video stream), AC-BE (best effort), and AC-BK (background) access categories. Packets in queues with higher priority have more opportunities to access channels.
6.3.2 Changing WMM Advanced Parameters
Step 1 Choose Wireless > WMM Setup. Step 2 Select the optimization mode according to the application scenarios, such as Optimized for scenario
with more than 10 users. If the Custom mode is selected, you need to set the EDCA parameters.
Step 3 Click OK.
---End
6.4 RF Optimization
6.4.1 Overview
This module enables you to modify the RF parameters to test the wireless performance of the router and offer quality wireless network. To use the function, choose Wireless > RF Optimization.
41
Parameter
Description
Short GI
Guard Interval (GI): The data is divided into different data blocks when the RF chip uses OFDM to transmit it. For data transmission reliability, the guard intervals between data blocks are used to ensure that the receiving client can correctly resolve the data blocks. Propagation delays may occur on the receiver side due to factors such as multipath wireless network transmission. If a data block is transmitted at an overly high speed, it may interfere with the previous data block. The short GI helps prevent such interference.
If the Auto is selected, the router decides whether to enable the Short GI according to the ambient environment.
Min. RSSI Threshold
It specifies the minimum strength of received signals acceptable to the RF of the router. The default value is -90 dBm. If the strength of the signals transmitted by a wireless device is weaker than this threshold, the wireless device cannot connect to the router.
Prioritize 5 GHz
It is only available on the 5G page.
If the SSIDs and passwords both of the 2.4 GHz and 5 GHz networks are same, and the wireless device supports dual-band WiFi, this function enables the wireless client to connect to the SSID of 5 GHz networks first.
Note: 5 GHz SSID priority only supports WPA/WPA2-PSK security mode. It does not support Chinese SSID.
Signal Reception
It is only available on 2.4 GHz page. You can adjust the signal strength range acceptable to the router to meet different application scenarios.
Coverage-oriented: It is applicable to environment with large area, multiple walls, scattered
Parameter description
42
users, and no more than 10 wireless networks nearby.
Capacity-oriented: It is applicable environment with large and spacious area, intensive users, and over 25 wireless networks nearby.
Moderate Density: It specifies the standard operating mode of the router. It is applicable environment with large and spacious area, intensive users, and no more than 25 wireless networks nearby.
Low Density: It is applicable to environment with large area, multiple walls, scattered users, and no more than 20 wireless networks nearby.
Signal Transmission
It is only available on 2.4G page. You can adjust the transmit power of the device to meet the requirement of various application scenarios.
Coverage-oriented: it is applicable to areas with multiple walls.
Capacity-oriented: It is applicable to spacious areas with few walls. It is often used to environment where users are intensive.
Air Interface Scheduling
It specifies whether to enable the air interface scheduling function.
Air interface scheduling guarantees that each client shares equivalent transmission duration. If a client with low transmission rate fails to complete transmission within the duration, it has to wait until the next transmission time. Air interface scheduling prevents clients with low transmission rate occupying too many resources, improving the overall efficiency of the router, and ensuring the throughput.
Suppress Broadcast Probe Response
It specifies whether to enable the broadcast probe response suppression function.
By default, wireless devices keep sending Probe Request packets that include the SSID field to scan their nearby wireless networks. After receiving such packets, the AP determines whether the wireless devices are allowed to access the wireless networks of the AP based on the packets and responds using the Probe Response packets (including all Beacon frame parameters), which consumes a lot of wireless resources.
Enable indicates that the AP does not respond to such requests, so as to save wireless resources.
APSD
It is only available on 5G page. It specifies whether to enable the Automatic Power Save Delivery (APSD) function. This function helps save power energy. By default, it is disabled.
Interference Mitigation
It is only available on 2.4G page. it specifies the interference mitigation mode of the router.
Disable: It disables the interference mitigation.
Auto: It enables the router to automatically mitigate the interference from hardware and ambient environment.
Client Timeout Interval
It specifies the wireless client disconnection interval of the router. The router disconnects from a wireless client if no traffic is transmitted or received by the wireless client within the interval. If the wireless client starts transmitting or receiving traffic within the interval, the countdown is reset.
Mandatory Rates, Optional Rates
Mandatory Rates: It specifies the basic rate sets for normal operation of the router. The clients can connect to the router only when they meet the basic rate required by the router.
Optional Rates: It specifies the additional speed sets supported by the router. The clients meeting the basic requirement can connect to the router with higher rate.
You can adjust the mandatory rates and optional rates to deny xxx clients with low rate,
43
improving user experience.
6.4.2 Modifying Advanced Parameters
It is recommended that you change the settings only under the instruction of professional personnel, so as to prevent decreasing the wireless performance of the router.
Step 1 Choose Wireless > RF Optimization. Step 2 Modify the parameters as required. Step 3 Click OK.
---End
6.5 Guest Network
6.5.1 Overview
A guest network is a network dedicated to guests. Clients connected to a guest network can access the internet and communicate with each other, but cannot access the router web UI or the non-guest network. This enables guests to access the internet and meanwhile ensures security of the primary network.
To use the function, choose Wireless > Guest Network. The Guest Network is disabled by default.
44
Parameter
Description
Basic Settings
Guest Network
It specifies whether to enable the Guest Network. It is disabled by default.
Isolate Client
It specifies whether to isolate the wireless clients connected to the guest network.
Enable: It indicates that the wireless clients connected to the guest network cannot communicate with each other. This improves wireless network security.
Enable the Guest Network, see the following figure:
Parameter description
45
Parameter
Description
Disable: It indicates that the wireless clients connected to the guest network can communicate with each other.
SSID
It specifies the WiFi name of the guest network. By default, the SSID at 2.4 GHz is Tenda_Guest, whereas the SSID at 5 GHz is Tenda_Guest_5G.
You can modify it as required. You are recommended to set a SSID that is dtinguishable from the SSID of the non-guest network for easy identification.
Chinese SSID Encoding
It specifies the encoding format of Chinese characters in the guest network. The default code format is UTF-8.
If the wireless clients such as smart phones cannot scan the SSID, or the available SSID list includes garble characters when Chinese characters are used in the SSID, you can select the GB2312 as the encoding format.
Security
It specifies the encryption type of the guest network.
None: It indicates that any wireless client can connect to the network.
WPA-PSK: It is a standard, interoperable and enhanced WLAN security solution, adopting an encryption algorithm more secure than WEP.WPA2-PSK: It provides better security than WEP or WAP.WPA-PSK&WPA2-PSK: Both WPA-PSK and WPA2-PSK are supported.
WiFi Password
It specifies the WiFi password of the guest network.
LAN IP of Guest Network
LAN IP
It specifies the LAN IP of the guest network. By default, it is 192.168.168.1. After connected to the guest network, the wireless client obtains an IP address of 192.168.168.X.It is recommended that you retain the default value.
Subnet Mask
It specifies the subnet mask of the LAN IP of the guest network.
6.5.2 Changing Parameters of the Guest Network
Step 1 Choose Wireless > Guest Network. Step 2 Modify the relevant parameters as required. For example, modify the SSID to Tenda_Guest. Step 3 Click OK.
---End
46
Parameter
Description
Wireless Repeater
It specifies whether to enable the wireless repeater function. It is disabled by default.
Select the Upstream SSID
It specifies to select the SSID of the peer network device you want to repeat. You can manually enter the SSID, or select the SSID after scanning.
6.6 Wireless Repeater
6.6.1 Overview
The wireless repeater function helps expand the coverage of wireless network. Therefore, wireless clients At a longer distance can connect to the wireless network. To access the page, choose Wireless > Wireless Repeater. It is disabled by default.
When configuring the wireless repeater parameters, it is recommended to set the LAN IP of the two devices into the same network segment for convenient management.
Parameter description
6.6.2 Example of Configuring of Wireless Repeater
Networking requirement
A company uses W15E to deploy a network. However, due to the large area of the company, one wireless gateway cannot provide enough wireless coverage.
Solution
To expand the wireless network coverage, place a router with wireless repeater function at the range covered by the original router, enable the wireless repeater function of the newly added router so as to bridge the two routers. Two W15Es are used in this example to explain the configuration. If routers of other types or other brands are used, please see the relevant user guide for configuration. The following figure shows the topology.
47
Configuration procedure
Log in to the web UI of Router 2 to set the wireless repeater.
Step 1 Choose Wireless > Wireless Repeater. Step 2 Wireless Repeater: Click Enable. Click to scan.
Step 3 Select the SSID you want to repeat from the drop-down list box.
Step 4 Enter the WiFi password of the selected SSID. Step 5 Click OK.
48
Step 6 Click OK in the dialog box that appears.
---End
Verification
It takes effect after rebooting the router. Access the Wireless Repeater page again, repeating succeeds when the connection status is Connected. Clients connected to SSID of Router 2 can access the internet. You can access the Wireless > Basic page to see the SSID.
If you cannot log in to the web UI using the original IP address after rebooting the router, do the following:
Use www.tendawifi.com to log in.
Use the IP address of the router (Router 2 in this example) assigned by the upstream router (Router 1 in this example) to log in. You can log in to the web UI of Router 1 to see the IP address.
49
Parameter
Description
Enable Access Control
It specifies whether to enable the access control function. It is disabled by default.
6.7 Access Control
6.7.1 Overview
The access control function disallows the specified clients to connect to the WiFi. Clients, such as notebooks, pads, and smart phones have MAC addresses. The access control function of the router enables you to implement access control based on MAC addresses of wireless clients. To use the function, choose Wireless > Access Control. For limitation on connection time or connection of wired clients, see 7.3 MAC Filter. By default, the access control function is disabled.
Enable the Access Control, see the following figure:
Parameter description
50
Parameter
Description
Allow
It indicates that only the wireless clients on the access control list can connect to the SSID.
Disallow
It indicates that only the wireless clients on the access control list cannot connect to the SSID.
It is used to manually add the MAC address of the wireless client to be controlled.
It is used to delete the selected rule.
MAC Address
It specifies the MAC address of the client covered in the rule.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be performed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
: It is used to edit the rule, including MAC address, and remark.
: It is used to delete the rule.
6.7.2 Example of Configuring Access Control
Networking requirement
A company uses W15E to deploy a network. Generally, it disallows clients connected to the WiFi to access the internet. HR personnel now need to connect toTenda_888888 to access the internet.
Solution
The access control function can address this requirement. Assume that the MAC address of the HR’s computer is CC:3A:61:71:1B:6E.
Configuration procedure
Step 1 Choose Wireless > Access Control. Step 2 Locate the corresponding SSID, select the check box of Enable Access Control, and click Allow. Step 3 Click +Add.
51
Step 4 Enter the MAC address in the corresponding text box. Step 5 (Optional) Enter the remark. Step 6 Click OK.
Step 7 Return to the Access Control page, and click OK.
52
---End
Verification
Verify that only devices with MAC address of CC:3A:61:71:1B:6E can access the internet over Tenda_888888.
53
7
54
7 Filter Management
This Chapter includes the following sections:
IP Group & Time Group: Settings of IP Group & Time Group is applicable to the filter management applications.
IP Filter: This module enables you to set the IP addresses on which you want to implement access control.
MAC Filter: This module enables you to set the clients on which you want to implement access control based on MAC address.
Port Filter: This module enables you to set the specified ports inaccessible to the clients.
Web Filter: This module enables you to set the specified websites inaccessible to the clients.
Multi-WAN Policy: It is used to set the WAN port policy of the router.
7.1 IP Group & Time Group
7.1.1 Overview
This section describes how to configure the IP Group and Time Group. Filter management of the router is based on IP group and Time group. To access the page, choose Filter Management > IP Group & Time Group.
55
7.1.2 Adding a Time Group
Step 1 Click +Add.
Step 2 Configure the rule parameters in the window that appears.
1. Name: Set the name of the rule.
2. Time & Day: Set the specific time and day.
3. Click OK.
---End
56
7.1.3 Adding an IP Group
Step 1 Click +Add.
Step 2 Configure the rule parameters in the window that appears.
1. Name: Set the name of the rule.
2. IP Range: Set the specific IP address or IP address range applied to the filter management functions.
3. Click OK.
---End
7.2 IP Filter
7.2.1 Overview
Generally, a device can access the internet either by obtaining a dynamic IP address from the router or using a static IP address. This module enables you to set whether the IP group covered by a rule is accessible to the internet. To access the page, choose Filter Management > IP Filter.
Enable the IP Filter, see the following figure.
57
Parameter
Description
IP Filter
It specifies whether to enable the IP filter function. It is disabled by default.
It is used to add the IP filter rule.
It is used to delete the selected rule.
Type
It specifies whether the IP Group covered by the rule can access the internet.
Whitelist: It specifies the IP group that can access the internet.
Blacklist: It specifies the IP group cannot access the internet.
IP Group
It specifies whether the IP group on the list can or cannot access the internet.
Time Group
It specifies the time when the IP filter rule takes effect.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
It is used to edit the rule.
: It is used to delete the rule.
Allow hosts covered by disabled rules or not covered by the preceding rules to access the internet
It specifies whether the hosts not covered by any enabled rule can access the internet.
When selected, the IP groups covered by disabled rules and all IP not covered by any enabled rule can access the internet.
When unselected, only the IP groups covered by enabled whitelist rules can access the internet.
Parameter description
58
7.2.2 Adding an IP Filter Rule
Step 1 To access the page, choose Filter Management > IP Filter. Step 2 Enable IP Filter, and click OK.
Step 3 Click +Add.
Step 4 Configure the rule parameters in the window that appears, and click OK.
59
---End
7.2.3 Example of IP Filter
Networking requirement
A company uses W15E to deploy a network. According to the company’s regulation, employees are disallowed to access the internet from 8:00 ~ 18:00. The LAN IP range is 192.168.0.2 ~ 192.168.0.250.
Solution
The IP filter function is recommended to address this problem.
Configuration procedure
Step 1 Set the Time Group (8:00 ~ 18:00). See 7.1.2 Adding the Time Group for detailed configuration steps.
Step 2 Set the IP Group (IP range: 192.168.0.2 ~ 192.168.0.250). See 7.1.3 Adding the IP Group for detailed
configuration steps.
Step 3 Add the IP Filter rule
1. To access the page, choose Filter Management > IP Filter. Select the check box of IP Filter, and click OK.
60
2. Click +Add.
3. Filter Type: Select the rule as required, which is Forbid to access the Internet in this example.
4. IP Group: Select the IP group to which the rule is applied from the drop-down list box.
5. Time Group: Select the time group to which the rule is applied from the drop-down list box.
6. Remark:(Optional) Enter the remark, which is staff in this example. Click OK.
---End
61
The rule is added successfully, see the following figure.
Verification
Verify that IP address through 192.168.0.2~192.168.0.250 cannot access the internet during 8:00~18:00.
7.3 MAC Filter
7.3.1 Overview
Clients, such as notebooks and pads all have MAC addresses. Mac filter function enables you to implement access control on clients on LAN network.MAC filter includes two modes: Allow to access the Internet and Forbid to access the Internet. To access the page, choose Filter Management > MAC Filter.
Enable the MAC Filter, see the following figure.
62
Parameter
Description
MAC Filter
It specifies whether to enable the MAC filter function. It is disabled by default.
It is used to add the MAC filter rule.
It is used to delete the selected rule.
Type
It specifies whether the MAC address covered by the rule is accessible to the internet.
Whitelist: It indicates the MAC addresses that can access the internet.
Blacklist: It indicates the MAC addresses that access the internet.
MAC Address
It specifies the MAC address of a client.
Time Group
It specifies the time when the corresponding device on the list can or cannot access the internet.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
It is used to edit the rule.
: It is used to delete the rule.
Allow hosts covered by disabled rules or not covered by the preceding rules to access the internet
It specifies whether the hosts not covered by any enabled rule can access the internet.
When selected, devices covered the disabled rules and all devices not covered by any enabled rule can access the internet.
When unselected, only devices covered the whitelist rules can access the internet.
Parameter description
63
7.3.2 Adding the MAC Filter Rule
Step 1 To access the page, choose Filter Management > MAC Filter. Step 2 Enable the MAC Filter, and click OK.
Step 3 Click +Add.
Step 4 Configure the rule parameters in the window that appears, and click OK.
64
---End
7.3.3 Example of MAC Filter
Networking requirement
A company uses W15E to deploy a network. According to the company’s regulations, only HR personnel can access the internet during 8:00~18:00.
Solution
The MAC filter function is recommended to address this problem. Assume that the MAC address allowed to access the internet is CC:3A:61:71:1B:6E.
Configuration procedure
Step 1 Set the Time Group (8:00~18:00). See 7.1.2 Adding the Time Group for detailed configuration steps.
Step 2 Add the MAC Filter rule.
1. To access the page, choose Filter Management > MAC Filter.
2. Enable the MAC Filter, and click OK.
3. Click +Add.
4. Filter Type: Select the rule as required, which is Allow to access the internet in this example.
5. Time Group: Select the time group to which the rule is applied from the drop-down list box.
65
6. MAC Address: Enter the MAC address, which is CC:3A:61:71:1B:6E in this example.
7. (Optional) Enter the remark of this rule, which is HR in this example.
8. Click OK.
9. Return to the MAC Filter page, disable Allow hosts covered by disabled rules of not covered by the
preceding rules to access the internet, and click OK.
---End
The rule is added successfully, see the following figure.
66
Verification
Verify that only devices with the MAC address of CC:3A:61:71:1B:6E can access the internet during 8:00~18:00.
7.4 Port Filter
7.4.1 Overview
Specific port numbers are often used to identify specific services. 0~1023 are common port numbers reserved for specific service types. The port filter function can be used to control the access of clients to internet service ports. To access the page, choose Filter Management > Port Filter.
Enable the Port Filter, see the following figure.
67
Parameter
Description
Port Filter
It specifies whether to enable the port filter function. It is disabled by default.
It is used to add the port filter rule.
It is used to delete the selected rule. IP Group
It specifies the IP Group to which the rule is applied.
Time Group
It specifies the time when the rules take effect, that is the specified time when the specified devices in the IP group cannot access the internet.
Port
It specifies the inaccessible service port.
Protocol Type
It specifies the protocol of the inaccessible service. It is recommended to retain the default settings.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
It is used to edit the rule.
: It is used to delete the rule.
Parameter description
7.4.2 Adding the Port Filter Rule
Step 1 To access the page, choose Filter Management > Port Filter. Step 2 Enable the Port Filter, and click OK.
Step 3 Click +Add.
68
Step 4 Configure the rule parameters in the window that appears.
---End
7.4.3 Example of Port Filter
Networking requirement
A company uses W15E to deploy a network. According to the company’s regulations, devices on LAN covered by the IP group of 192.168.0.2~192.168.0.250 cannot browse web pages (default port number is 80) during 8:00~18:00 (working hours) from Monday to Friday.
Solution
The port filter function is recommended to address this requirement.
Configuration procedure
Step 1 Set the Time Group (8:00 ~ 18:00). See 7.1.2 Adding the Time Group for detailed configuration steps.
69
Step 2 Set the IP Group (IP range: 192.168.0.2 ~ 192.168.0.250). See 7.1.3 Adding the IP Group for detailed
configuration steps.
Step 3 Add the Port Filter rule
1. To access the page, choose Filter Management > Port Filter.
2. Enable the Port Filter, and click OK.
3. Click +Add.
70
4. IP Group: Select the IP group to which the rule is applied, from the drop-down list box.
5. Time Group: Select the time group to which the rule is applied from the drop-down list box.
6. Ports: Set the port or ports inaccessible from the LAN network.
7. Protocol Type: Set the protocol type used by the inaccessible service. It is recommended to retain the
default settings.
8. Click OK.
---End
The rule is added successfully, see the following figure.
71
Verification
Verify that clients covered by the IP group of 192.168.0.2~192.168.0.250 cannot access the web pages during 8:00~18:00.
7.5 Web Filter
7.5.1 Overview
This module enables you to set the web filter function. Web filter function disallows the specified clients on LAN network to access the specified websites, such as shopping, group shopping and video websites. To access the page, choose Filter Management > Web Filter.
Enable the Web Filter, see the following figure.
72
Parameter
Description
Web Filter
It specifies whether to enable the web filter function. It is disabled by default.
It is used to add a web filter rule.
It is used to delete the selected rule. IP Group
It specifies the IP Group to which the rule is applied.
Time Group
It specifies the time when the rules take effect, that is the specified time when the specified devices in the IP group cannot access the websites.
Category
It specifies the website category inaccessible to the clients.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
It is used to edit the rule.
: It is used to delete the rule.
Website Management
: It is used to view or add web category to be managed.
Parameter description
7.5.2 Add a Web Filter Rule
Step 1 To access the page, choose Filter Management > Web Filter. Step 2 Select the check box of the Web Filter, and click OK.
73
Step 3 Click +Add.
Step 4 Configure the rule parameters in the window that appears, including IP group, time group, websites and
so on.
74
---End
7.5.3 Adding a Web Category
Step 1 To access the page, choose Filter Management > Web Filter. Step 2 Select the check box of the Web Filter, and click OK.
75
Step 3 Click Website Management.
Step 4 Click +New.
Step 5 Set the website category parameters in the window that appears.
---End
76
7.5.4 Example of Web Filter
Networking requirement
A company uses W15E to deploy a network. According to the company’s regulations, the devices on LAN network belonging to the IP group of 192.168.0.2~192.168.0.250 cannot access the entertainment and shopping websites.
Solution
The web filter function is recommended to resolve this problem.
Configuration procedure
Step 1 Set the Time Group (8:00~ 8:00). See 7.1.2 Adding the Time Group for detailed configuration steps.
Step 2 Set the IP Group (IP range: 192.168.0.2~192.168.0.250). See 7.1.3 Adding the IP Group for detailed
configuration steps.
Step 3 Set the Web Filter.
1. To access the page, choose Filter Management > Web Filter.
2. Select the check box of the Web Filter, and click OK.
77
3. Click +Add.
(1) IP Group: Select the IP group to which the rule is applied from the drop-down list box.
(2) Time Group: Select the time group to which the rule is applied from the drop-down list box.
(3) Category: Select the website category inaccessible to the clients.
(4) Please select: Select the websites inaccessible to the clients. Select All and Invert allow you to
make quick selection.
(5) Click OK.
78
---End
The entry shown in the following figure appears.
79
Parameter
Description
Multi-WAN Policy
It specifies the policy on the WAN ports of the router.
Smart Load Balancing: The system automatically uses the WAN port with the lightest traffic to communicate.
Custom Policy: It allows users to specify the corresponding WAN port for a certain source address as required.
WAN Detection
After this function is enabled, the router regularly detects the communication status between the WAN port and the detection address.
Detection Address: It specifies the IP address or domain name to be detected.
Detection Interval: It specifies the interval of detection. The default interval is 5 minutes and the upper limit of the interval is 200 minutes.
Verification
Verify that computers on LAN network belonging to IP group of 192.168.0.2~192.168.0.250 cannot access the selected websites.
7.6 Multi-WAN Policy
7.6.1 Overview
This module enables you to set the WAN port policy of the router. You can enable this function when multiple WAN ports are used. The WAN ports of the router support two modes: Smart Load Balancing and Custom Policy. To access the page, choose Filter Management > Multi-WAN Policy.
Parameter description
7.6.2 Custom Policy Rule
Step 1 To access the page, choose Filter Management > Multi-WAN Policy. Step 2 Click the check box of Custom Policy, and click OK. Step 3 Click +Add.
80
Parameter
Description
It is used to add the multi-WAN policy rule.
It is used to delete the selected rule. IP Group
It specifies the IP Group to which the rule is applied.
Specified WAN
It specifies the WAN port of ingoing and out going packet of a IP group.
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
: It is used to edit the rule.
: It is used to delete the rule.
Step 4 Set the multi-WAN policy parameters.
---End
Parameter description
81
7.6.3 Example of Custom Policy
Networking requirement
A company uses W15E to deploy a network. The company uses broadband services provided by China Telecom and China Mobile. To manage the networks more conveniently, the multi-WAN policy is recommended.
Configuration procedure
Step 1 Add the IP group, which is 192.168.0.2~192.168.0.250 in this example. See 7.1.3 Adding the IP Group
for detailed configuration steps.
Step 2 Set the WAN port policy rule.
1. To access the page, choose Filter Management > Multi-WAN Policy.
2. Click the check box of Custom Policy, and click OK.
3. Click +Add.
4. IP Group: Select the IP group to which the rule is applied from the drop-down list box.
5. WAN Port: Select the WAN port for the selected IP group.
6. Click OK.
82
---End
The entry shown in the following figure appears.
Verification
Data of devices on the LAN network covered by the IP group of 192.168.0.2~192.168.0.250 is transmitted over WAN1.
83
Parameter
Description
WAN1 Bandwidth
Set the download and upload rate values according to your broadband connection. Ask your ISP if it is unknown to you.
Control Mode
It specifies the control mode used by the current WAN port.
Disable: It indicates that the bandwidth control function is disabled.
Automatic bandwidth control: It specifies that the router allocates bandwidth resources to clients intelligently according to the actual circumstance.
Manual bandwidth control: It allows you to manually set bandwidth control rules as required.
8 Bandwidth Control
8.1 Overview
This Chapter allows you to set limitation rules for various data flows so as to distribute the bandwidth resources appropriately and improve the effective utilization of the current bandwidth. To access the page, choose Bandwidth Control.
Parameter description
8.2 Configuring Automatic Bandwidth Control
To access the page, choose Bandwidth Control. Select Automatic bandwidth control from the drop-down list box of Control Mode, and click OK.
8.3 Manual Bandwidth Control
Step 1 Choose Bandwidth Control.
84
Parameter
Description
It is used to add client bandwidth control rules.
It is used to delete the selected rule. IP Group
It specifies the IP group covered by the enabled bandwidth control rule.
Time Group
It specifies the time group covered by the enabled bandwidth control rule.
Concurrent Sessions Per Device
It specifies the maximum number of connections that can be set up on each computer covered by the corresponding rule.
Mode
It specifies the mode of the bandwidth control rule.
Shared: It indicates that the total bandwidth of all IP addresses covered by a rule equals to the upload/download rate set in the rule.
Exclusive: It indicates that the bandwidth of every IP address covered by a rule is the upload/down rate set by the rule.
Upload/Download
It specifies the device’s maximum upload/download rate covered by the corresponding rule.1 Mbps=128 KB/s=1024 kb/s
Step 2 Select Manual bandwidth control from the drop-down list box of Control Mode. Step 3 Set the control rule in the window that appears. Step 4 Click OK.
---End
Parameter description
85
Status
It specifies the current status of the rule, including Enabled and Disabled.
Operation
The following operations can be preformed on the rules:
: It is used to disable the rule.
: It is used to enable the rule.
It is used to edit the rule.
: It is used to delete the rule.
Bandwidth of Unlimited Hosts
When selected, bandwidth of devices covered by the disabled rules and the bandwidth of devices not covered by any enabled rule are subject to the default parameters.
When unselected, only devices not covered by enabled rules takes effect.
QoS for Guest Network
It specifies the maximum upload/download rate of each client connected to the guest network.
8.4 Example of Manual Bandwidth Control
8.4.1 Networking requirement
A company uses W15E to deploy a network. The LAN IP of the router is 192.168.0.1, and the subnet mask is
255.255.255.0.The bandwidth control function is used to enable every client connected to the router to share a fixed bandwidth. Assume that the IP range is 192.168.0.2~192.168.0.250, and the time period to control the bandwidth is 8:00~18:00.
8.4.2 Configuration procedure
Step 1 Set the Time Group (8:00 ~ 18:00). See 7.1.2 Adding the Time Group for detailed configuration steps.
Step 2 Set the IP Group (IP range: 192.168.0.2 ~ 192.168.0.250). See 7.1.3 Adding the IP Group for detailed
configuration steps.
86
Step 3 Add the Manual bandwidth control rule.
1. Choose Bandwidth Control.
2. Select Manual bandwidth control from the drop-down list box of the Control Mode, and click OK.
3. Click +Add.
4. IP Group: Select the IP group to which the rule is applied from the drop-down list box.
5. Time Group: Select the time group to which the rule is applied from the drop-down list box.
6. Concurrent Sessions Per Device value: Generally, it is recommended to set the value to 300.
87
7. Mode: Select Shared.
8. Upload/Download: Set the clients’ maximum upload/download rate.
9. Click OK.
---End
The entry shown in the following figure appears.
8.4.3 Verification
During 8:00~18:00, devices covered by the rule can reach a maximum uploading rate of 128 KB/s and a maximum downloading rate of 512 KB/s.
88
9 VPN Service
This Chapter includes the following sections:
PPTP/L2TP Client: The router connects to the VPN server as a VPN client.
PPTP/L2TP server: The router operated as a VPN server can be connected to specified VPN clients.
IPSec: It enables VPN transmission using an IPSec tunnel.
Examples of PPTP/L2TP configuration: It uses PPTP server/client examples to introduce VPN application.
Examples of IPSec configuration: It uses IPSec tunnel examples to introduce VPN application.
Virtual Private Network (VPN) is a dedicated network set up based on a public network (usually the internet). it is called a virtual private network since it consists of only logical connections. The VPN technology allows employees at a branch of an enterprise and employees at the headquarter to exchange resources without exposing these resources to other internet users. Supported by the tunnel technology, VPN creates a virtual dedicated line between two endpoints and uses point-to-point authentication and encryption to guarantee the security of data transmission. This router is compliant with layer 2 tunnel PPTP and L2TP, and layer 3 IPSec.
9.1 PPTP/L2TP Client
The router can connect to the VPN server after the PPTP/L2TP Client is enabled. For example, for simple and secure mutual access between the branch offices and the headquarter, set the router at the headquarter as the VPN server and the routers at the branch offices to VPN client. To access the page, choose VPN.
89
Loading...