TP-Link TL-MR3040 User Manual

TL-MR3040
Portable 3G/3.75G Battery Powered Wireless N Router
Rev: 1.0.0 1910010615
Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from TP-LINK TECHNOLOGIES CO., LTD. Copyright © 2012 TP-LINK TECHNOLOGIES CO., LTD. All rights reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/ TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. Such modifications could void the user’s authority to operate the equipment.
I
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter.
“To comply with FCC RF exposu re compliance requirements, this grant is applicable to only Mobile Configurations. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.”
CE Mark Warning
This is a class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
National restrictions
This device is intended for home and office use in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below:
Country Restriction Reason/remark
Bulgaria None
Outdoor use limited to 10
France
Italy None
Luxembourg None
mW e.i.r.p. within the band 2454-2483.5 MHz
General authorization required for outdoor use and
public service
Military Radiolocation use. Refarming of the 2.4 GHz band has been ongoing in recent years to allow current relaxed regulation. Full implementation planned 2012
If used outside of own premises, general authorization is required
General authorization required for network and service supply(not for spectrum)
Norway Implemented
Russian Federation None Only for indoor applications
Note: Please don’t use the product outdoors in France.
This subsection does not apply for the geographical area within a radius of 20 km from the centre of Ny-Ålesund
II
Industry Canada Statement:
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions:
(1)This device may not cause harmful interference, and (2)This device must accept any interference received, including interference that may cause
undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with Canada radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Ce dispositif est conforme à la norme CNR-210 d’Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes:
(1) Le dispositif ne doit pas produire de brouillage préjudiciable, et (2) Ce dispositif doit accepter tout brouillage reçu,y compris un brouillage susceptible de
provoquer un fonctionnement indésirable. NOTE IMPORTANTE: Déclaration d’exposition aux radiations: Cet équipement est conforme aux limites d’exposition aux rayonnements IC établies pour un
environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps.
Korea Warning Statements:
당해 무선설비는 운용중 전파혼신 가능성이 있음.
NCC Notice:
經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大
功率或變更原設計之特性及功能。
低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,
並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射
頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
III
TP-LINK TECHNOLOGIES CO., LTD
DECLARATION OF CONFORMITY
For the following equipment: Product Description: Portable 3G/3.75G Battery Powered Wireless N Router Model No.: TL-MR3040 Trademark: TP-LINK We declare under our own responsibility that the above products satisfy all the technical
regulations applicable to the product within the scope of Council Directives: Directives 1999/5/EC, Directives 2004/108/EC, Directives 2006/95/EC, Directives 1999/519/EC,
Directives 2011/65/EU The above product is in conformity with the following standards or other normative documents
ETSI EN 300 328 V1.7.1: 2006
ETSI EN 301 489-1 V1.8.1:2008& ETSI EN 301 489-17 V2.1.1:2009
EN 55022:2006 +A1:2007
EN 55024:1998+A1:2001+A2:2003
EN 61000-3-2:2006+A1:2009+A2:2009
EN 61000-3-3:2008
EN60950-1:2006+A11:2009+A1:2010
EN62311:2008
The product carries the CE Mark:
Person is responsible for marking this declaration:
Yang Hongliang
Product Manager of International Business
Date of issue: 2012
TP-LINK TECHNOLOGIES CO., LTD.
Building 24 (floors 1, 3, 4, 5), and 28 (floors 1-4) Central Science and Technology Park,
Shennan Rd, Nanshan, Shenzhen, China
CONTENTS
Package Contents .......................................................................................................................... 1
Chapter 1. Introduction................................................................................................................. 2
1.1 Overview of the Router................................................................................................. 2
1.2 Conventions ................................................................................................................. 2
1.3 Main Features .............................................................................................................. 2
1.4 Panel Layout ................................................................................................................ 3
1.4.1 The Front Panel................................................................................................ 3
1.4.2 The Rear Panel ................................................................................................ 4
Chapter 2. Connecting the Router............................................................................................... 5
2.1 System Requirements..................................................................................................5
2.2 Installation Environment Requirements........................................................................ 5
Chapter 3. Quick Installation Guide............................................................................................. 6
3.1 Four Typical Working Mode.......................................................................................... 6
3.2 PC configuration........................................................................................................... 9
3.2.1 Connect to Network.......................................................................................... 9
3.2.2 Router Configuration....................................................................................... 10
Chapter 4. Configuration—3G Router Mode............................................................................. 25
4.1 Login .......................................................................................................................... 25
4.2 Status......................................................................................................................... 25
4.3 Quick Setup................................................................................................................ 26
4.4 Operation Mode.......................................................................................................... 26
4.5 Network...................................................................................................................... 27
4.5.1 Internet Access............................................................................................... 27
4.5.2 3G................................................................................................................... 28
4.5.3 WAN ............................................................................................................... 33
4.5.4 MAC Clone..................................................................................................... 43
4.5.5 LAN.................................................................................................................43
4.6 Wireless ..................................................................................................................... 44
4.6.1 Wireless Settings............................................................................................ 44
4.6.2 Wireless Security............................................................................................ 47
4.6.3 Wireless MAC Filtering................................................................................... 50
4.6.4 Wireless Advanced......................................................................................... 52
4.6.5 Wireless Statistics........................................................................................... 53
4.7 DHCP......................................................................................................................... 54
I
4.7.1 DHCP Settings ............................................................................................... 54
4.7.2 DHCP Clients List........................................................................................... 56
4.7.3 Address Reservation...................................................................................... 56
4.8 Forwarding ................................................................................................................. 57
4.8.1 Virtual Servers................................................................................................ 58
4.8.2 Port Triggering................................................................................................ 59
4.8.3 DMZ................................................................................................................ 61
4.8.4 UPnP.............................................................................................................. 62
4.9 Security...................................................................................................................... 63
4.9.1 Basic Security................................................................................................. 63
4.9.2 Advanced Security.......................................................................................... 65
4.9.3 Local Management......................................................................................... 66
4.9.4 Remote Management..................................................................................... 67
4.10 Parental Control ......................................................................................................... 68
4.11 Access Control........................................................................................................... 71
4.11.1 Rule ................................................................................................................ 71
4.11.2 Host................................................................................................................ 77
4.11.3 Target..............................................................................................................79
4.11.4 Schedule......................................................................................................... 81
4.12 Advanced Routing...................................................................................................... 82
4.12.1 Static Routing List........................................................................................... 83
4.12.2 System Routing Table..................................................................................... 84
4.13 Bandwidth Control...................................................................................................... 84
4.13.1 Control Settings.............................................................................................. 85
4.13.2 Rules List........................................................................................................ 85
4.14 IP & MAC Binding....................................................................................................... 86
4.14.1 Binding Settings.............................................................................................. 86
4.14.2 ARP List.......................................................................................................... 88
4.15 Dynamic DNS............................................................................................................. 89
4.15.1 Comexe.cn DDNS .......................................................................................... 89
4.15.2 Dyndns.org DDNS.......................................................................................... 90
4.15.3 No-ip.com DDNS............................................................................................ 90
4.16 System T ools.............................................................................................................. 91
4.16.1 Time Settings.................................................................................................. 92
4.16.2 Diagnostic....................................................................................................... 93
4.16.3 Firmware Upgrade.......................................................................................... 95
4.16.4 Factory Defaults ............................................................................................. 96
II
4.16.5 Backup & Restore........................................................................................... 96
4.16.6 Reboot............................................................................................................ 97
4.16.7 Password........................................................................................................ 98
4.16.8 System Log..................................................................................................... 98
4.16.9 Statistics .........................................................................................................99
Chapter 5. Configuration—Wireless Router / WISP Mode..................................................... 102
5.1 Login ........................................................................................................................ 102
5.2 Status....................................................................................................................... 102
5.3 Quick Setup.............................................................................................................. 104
5.4 Operation Mode........................................................................................................ 104
5.5 Network.................................................................................................................... 104
5.5.1 WAN ............................................................................................................. 104
5.5.2 MAC Clone....................................................................................................114
5.5.3 LAN................................................................................................................115
5.6 Wireless ....................................................................................................................116
5.6.1 Wireless Settings...........................................................................................116
5.6.2 Wireless Security.......................................................................................... 122
5.6.3 Wireless MAC Filtering................................................................................. 125
5.6.4 Wireless Advanced....................................................................................... 128
5.6.5 Wireless Statistics......................................................................................... 129
5.7 DHCP....................................................................................................................... 130
5.7.1 DHCP Settings ............................................................................................. 130
5.7.2 DHCP Clients List......................................................................................... 131
5.7.3 Address Reservation.................................................................................... 132
5.8 Forwarding ............................................................................................................... 133
5.8.1 Virtual Servers.............................................................................................. 133
5.8.2 Port Triggering.............................................................................................. 135
5.8.3 DMZ.............................................................................................................. 137
5.8.4 UPnP............................................................................................................ 138
5.9 Security.................................................................................................................... 139
5.9.1 Basic Security............................................................................................... 139
5.9.2 Advanced Security........................................................................................ 140
5.9.3 Local Management....................................................................................... 142
5.9.4 Remote Management................................................................................... 143
5.10 Parental Control ....................................................................................................... 144
5.11 Access Control......................................................................................................... 147
5.11.1 Rule .............................................................................................................. 147
III
5.11.2 Host.............................................................................................................. 153
5.11.3 Target............................................................................................................155
5.11.4 Schedule....................................................................................................... 157
5.12 Advanced Routing.................................................................................................... 158
5.12.1 Static Routing List......................................................................................... 159
5.12.2 System Routing Table................................................................................... 160
5.13 Bandwidth Control.................................................................................................... 160
5.13.1 Control Settings............................................................................................ 161
5.13.2 Rules List...................................................................................................... 161
5.14 IP & MAC Binding Setting ........................................................................................ 162
5.14.1 Binding Settings............................................................................................ 162
5.14.2 ARP List........................................................................................................ 164
5.15 Dynamic DNS........................................................................................................... 165
5.15.1 Comexe.cn DDNS ........................................................................................ 165
5.15.2 Dyndns.org DDNS........................................................................................ 166
5.15.3 No-ip.com DDNS.......................................................................................... 167
5.16 System T ools............................................................................................................ 168
5.16.1 Time Settings................................................................................................ 169
5.16.2 Diagnostic..................................................................................................... 170
5.16.3 Firmware Upgrade........................................................................................ 172
5.16.4 Factory Defaults ........................................................................................... 173
5.16.5 Backup & Restore......................................................................................... 173
5.16.6 Reboot.......................................................................................................... 174
5.16.7 Password...................................................................................................... 175
5.16.8 System Log................................................................................................... 175
5.16.9 Statistics .......................................................................................................176
Chapter 6. Configuration—AP Mode ....................................................................................... 179
6.1 Login ........................................................................................................................ 179
6.2 Status....................................................................................................................... 179
6.3 Quick Setup.............................................................................................................. 181
6.4 Operation Mode........................................................................................................ 181
6.5 Network.................................................................................................................... 181
6.6 Wireless ................................................................................................................... 182
6.6.1 Wireless Settings.......................................................................................... 183
6.6.2 Wireless Security.......................................................................................... 190
6.6.3 Wireless MAC Filtering................................................................................. 198
6.6.4 Wireless Advanced....................................................................................... 200
IV V
6.6.5 Wireless Statistics......................................................................................... 202
6.7 DHCP....................................................................................................................... 202
6.7.1 DHCP Settings ............................................................................................. 203
6.7.2 DHCP Clients List......................................................................................... 204
6.7.3 Address Reservation.................................................................................... 205
6.8 System Tools............................................................................................................ 206
6.8.1 Time Settin g.................................................................................................. 206
6.8.2 Diagnostic..................................................................................................... 208
6.8.3 Firmware Upgrade........................................................................................ 210
6.8.4 Factory Defaults ............................................................................................211
6.8.5 Backup & Restore..........................................................................................211
6.8.6 Reboot.......................................................................................................... 212
6.8.7 Password...................................................................................................... 213
6.8.8 System Log................................................................................................... 213
6.8.9 Statistics ....................................................................................................... 214
Appendix A: FAQ........................................................................................................................ 217
Appendix B: Configuring the PCs............................................................................................. 222
Appendix C: Security Mode....................................................................................................... 226
Appendix C: Specifications....................................................................................................... 228
Appendix D: Glossary................................................................................................................ 229
Appendix E: Compatible 3G/3.75G USB Modem ..................................................................... 231
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

Package Contents

The following items should be found in your package:
¾ TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router ¾ Power Adapter ¾ Battery ¾ USB Cable ¾ Ethernet cable ¾ Quick Installation Guide ¾ Resource CD for TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router,
including:
This Guide
Other Helpful Information
Note:
)
Make sure that the package contains the above items. If any of the listed items are damaged or missing, please contact your distributor.
-1-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

Chapter 1. Introduction

Thank you for choosing the TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router.

1.1 Overview of the Router

TL-MR3040 from TP-LINK is a truly mobile wireless networking platform that when paired with a 3G USB modem, is able to broadcast a wireless signal at up to 150Mbps around a room, creating a mobile office or entertainment network for up to five devices to access the Internet simultaneously. The device is the ideal travel companion, with pocket-sized dimensions and powered by its own powerful internal 2000mAh battery, users can work or play for hours on end. The device is also incredibly easy to use, allowing users to rapidly set up an Internet connected wireless network in as little time as it takes to plug in their 3G USB router or WAN cable and when finished, simply place the device back in their pockets.

1.2 Conventions

The Router or TL-MR3040 mentioned in this guide stands for TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router without any explanation.

1.3 Main Features

¾ Travel size design, small enough to take on the road ¾ Features a 2000mAh chargeable battery for maximum usage time ¾ Supports 3G Router Mode, WISP Client Router Mode, Wireless Router Mode and AP Mode ¾ One 10/100M Auto-Negotiation RJ45 Ethernet port, one USB 2.0 Port, one micro USB port ¾ Compatible with IEEE 802.11b/g/n, IEEE802.3/3u ¾ Compatible with UMTS/HSPA/EVDO USB 3G Modem ¾ Compatible with iPad, iTouch, Android Phone, Kindle and majority portable WiFi devices ¾ Wireless Lite N speed up to 150Mbps ¾ Provides WEP, WPA/WPA2, WPA-PSK/WPA2-PSK authentication, TKIP/AES encryption
security
¾ Powered by laptop or Power Adapter with Low Power Consumption ¾ Supports 3G/PPPoE/Dynamic IP/Static IP/PPTP/L2TP Cable Internet access ¾ Supports VPN Pass-through, Virtual Server and DMZ Host ¾ Supports UPnP, Dynamic DNS, Static Routing
-2-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Provides Automatic-connection and Scheduled Connection on certain time to the Internet ¾ Built-in NAT and DHCP server supporting automatic and dynamic IP address IP address
distribution
¾ Connects Internet on demand and disconnects from the Internet when idle for PPPoE ¾ Provides 64/128/152-bit WEP encryption security and wireless LAN ACL (Access ControlList) ¾ Supports Flow Statistics ¾ Supports firmware upgrade and Web management

1.4 Panel Layout

1.4.1 The Front Panel

Figure 1-1 Front Panel sketch
The Router’s LEDs are located on the front panel (View from bottom to top).
Name Status Indication
Solid (Green) The battery is full or the power supply is normal.
Power
Solid (Orange) The battery is being charged.
Solid (Red) The battery power is low, you need to charge it.
Flashing (Red) The battery is abnormal.
A device is linked to the corresponding port but there is no activity.
Ethernet
On
Flashing The Ethernet port is transferring data.
Off No device is linked to the corresponding port.
WLAN
On The Wireless function is enabled.
Flashing There is data being transferred through wireless.
Internet
Off The Wireless function is disabled.
Solid
The 3G Modem/Card is identified.
Flashing The Router is connected to the Internet and is transferring data.
Table 1-1 The LEDs description
-3-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

1.4.2 The Rear Panel

Figure 1-2 Rear Panel sketch
The following parts are located on the rear panel (View from left to right).
¾ Ethernet Port: This port can be LAN or WAN port depending on the working mode. ¾ 3G USB Port: This port is used to plug a 3G modem/card. ¾ Reset: With the Router powered on, press and hold the Reset button for at least 10
seconds, and then the Router will restore to the default setting.
¾ Micro USB Port: This port is used to connect the provided power adapter. ¾ Power Switch: This switch is used to switch the power status of the Router.
-4-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

Chapter 2. Connecting the Router

2.1 System Requirements

¾ 3G/3.75G Mobile Broadband Internet Access Service (With a UMTS/HSPA/EVDO USB
dongle)
¾ PCs with a working Ethernet Adapter and an Ethernet cable with RJ45 connectors ¾ TCP/IP protocol on each PC ¾ Web browser, such as Microsoft Internet Explorer 5.0 , Netscape Navigator 6.0 or above

2.2 Installation Environment Requirements

¾ Place the Router in a well ventilated place far from any heater or heating vent ¾ Avoid direct irradiation of any strong light (such as sunlight) ¾ Keep at least 2 inches (5 cm) of clear space around the Router ¾ Operating Temperature: 0 ~40 (32 ~104 )  ¾ Operating Humidity: 10%~90%RH, Non-condensing
-5-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

Chapter 3. Quick Installation Guide

This chapter will show you how to configure the basic functions of your Portable 3G/3.75G Battery Powered Wireless N Router using Quick Setup Wizard within minutes.

3.1 Four Typical Working Mode

3G Router Mode
After inserting the 3G Card/Modem to the Router’s 3G USB port and configuring the Router, the Computers/WiFi Phone/Tablet PC could connect to the Internet. In this mode, the only wired port of the Router works as LAN. The connection between TL-MR3040 and the computer is shown as the figure below.
Wireless Router Mode
In this mode, the only wired port of the Router works as WAN. It can be connected to DSL/Cable Modem with an Ethernet cable. Computers/WiFi Phone/Tablet PC could connect to the device by only wireless way. DHCP server is enabled by default.
-6-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
WISP Client Router Mode
In this mode, the TL-MR3040 is wirelessly connected to the WISP (Wireless Internet Service Provider) and share the internet to multiple users.
Standard AP Mode
The Standard AP Mode includes the following four connection types: Access Point, Repeater, Bridge with AP and Client.
¾ Access Point
In this mode, the TL-MR3040 is connected to a wired network and transforms the wired Internet access into wireless so that multiple users can share the Internet.
¾ Repeater
-7-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
TL-MR3040 is used to extend the range of wireless signal of the existing AP or wireless router. In this mode, the only wired port works as LAN. Computer could connect to the device by either wired or wireless way. The SSID of TL-MR3040should be the same as that of the device you repeat. To avoid the conflict of DHCP service with front-end devices, the DHCP server is default to be closed in this mode. If you want to log in the management page, please set your computer’s IP address manually.
¾ Bridge with AP
TL-MR3040 in Bridge mode is used to extend the range of wireless signal of the existing AP or wireless router.
In this mode, the only wired port works as LAN. Computer could connect to the device by either wired or wireless way. To avoid the conflict of DHCP service with front-end devices, the DHCP server is default to be closed on this mode. If you want to log in the management page, please set your computer’s IP address manually.
-8-
¾ Client
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
TL-MR3040 is used as a wireless network card to connect the wireless network signal or wireless router.
In this mode, the only wired port works as LAN. Computer could connect to the device by either wired or wireless way. To avoid the conflict of DHCP service with front-end devices, the DHCP server is default to be closed on this mode. If you want to log in the management page, please set your computer’s IP address manually.

3.2 PC configuration

Here we take Wireless Network Connection as an example. (You can also go to Local Are a Connection to configure the PC for wired network connection, and then configure the router. If you need instructions as to how to do this, please refer to Appendix B: "Configuring the PC."
1. For Windows XP, please go to Start Settings Control Panel Network and Internet Connections Network Connections; for Windows 7, please go to Start
-9-
)
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Settings Control Panel View network status and tasks Manage network
connection. Right click Wireless Network Connection, and select Properties.
2. For Windows XP, double click Internet Protocol (TCP/IP) in the item list; for Windows 7, double click Internet Protocol Version 4 (TCP/IPv4).
3. Select “Obtain an IP address automatically” and “Obtain DNS server address
automatically”. Click OK to finish the settings.

3.2.1 Connect to Network

1. Click the icon at the bottom of your desktop.
2. Click “Refresh network list”, and then select the network. Click Connect.
Note:
)
The default SSID of the network is TP-LINK_POCKET_3040_xxxxxx. (The xxxxxx is the last six characters of the router’s MAC address.)
3. When Connected appears, you’ve successfully connected to the wireless network.

3.2.2 Router Configuration

To access the configuration utility, open a web-browser and type the default address http://192.168.0.1 in the address field of the browser.
Figure 3-1 Login the Router
After a moment, a login window will appear, similar to the Figure 3-2. Enter admin for the User Name and Password, both in lower case letters. Then click the OK button or press the Enter key.
-10-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 3-2 Login Windows
Note:
)
If the above screen does not pop-up, it means that your Web-browser has been set to a proxy. Go to Tools menu>Internet Options>Connections>LAN Settings, in the screen that appears, cancel the Using Proxy checkbox, and click OK to finish it.
After a successfully login, you can click the Quick Setup menu to quickly configure your Router, and then click Next.
Figure 3-3 Quick Setup
Choose the Operation Mode you need, and then click Next.
Figure 3-4 Operation Mode
-11-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Then you can configure the Wireless Settings according to the mode.
1. 3G Router Mode
1. Choose the Internet Access type, and then click Next. Here we take 3G Only for example.
Figure 3-5 Quick Setup – Internet Access
¾ 3G Only - Only use 3G as the access to the Internet. The Ethernet port is used as
LAN port.
¾ 3G Preferred - Use 3G as the primary access, WAN as a backup. The Ethernet port
is used as WAN port.
¾ WAN Preferred - Use WAN as the primary access, 3G as a backup. The Ethernet
port is used as WAN port.
2. Select your location and Mobile ISP. If you don’t find your location and ISP in the pull-down
menu, tick “Set the Dial Number, APN, Username and Password manually” to manually set them according to the information your 3G ISP provided. Then click Next.
Figure 3-6 Quick Setup – 3G
3. Set your wireless parameters. It’s recommended that you edit the following two items, and
-12-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
then click Next.
1) Create a unique and easy-to-remember Wireless Network Name.
2) Select WPA-Personal/WPA2-Personal under Wireless Security and enter a password in the field.
Figure 3-7 Quick Setup – Wireless
4. Click Reboot to make the settings take effect.
Figure 3-8 Quick Setup – Finish
Note:
)
After the rebooting, please reconnect to the network according to 3.2.1 Wireless Security is enabled, you need to enter the password you’ve just set to successfully finish the connecting.
Connect to Network. If
2. Wireless Router Mode
1. Choose your WAN Connection type and click Next to continue.
-13-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 3-9 Quick Setup – WAN Connection Type
¾ If Auto-Detect is chosen, the router will detect the Internet connection type provided b y
your ISP automatically.
Figure 3-10 Quick Setup – Auto Detect
¾ If the connection type is PPPoE, the next screen will appear as shown in Figure 3-11.
Figure 3-11 Quick Setup – PPPoE
z User Name and Password - Enter the User Name and Password provided by
your ISP. These fields are case sensitive. If you have difficulty with this process, please contact your ISP.
z Confirm Password - Re-enter the pa ssword provided by your ISP to ensure the
Password you entered is correct. If the Password is different from the Confirm Password, the screen will appear as shown below. Click OK, and re-enter the Password and Confirm Password.
-14-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ If the connection type is Dynamic IP, the next screen will appear as shown in Figure
3-12.
Figure 3-12 Quick Setup – MAC Clone
z If you are visiting the Router from the main computer, please select Yes, and then
click Clone MAC Address.
z If you are visiting the Router from another computer, rather than the main
computer, please select No, and then enter the main computer’s MAC in the field WAN MAC Address.
¾ If the connection type detected is Static IP, the next screen will appear as shown in
Figure 3-13.
Figure 3-13 Quick Setup - Static IP
z IP Address - This is the WAN IP address seen by external users on the Internet
(including your ISP). Enter the IP address into the field.
-15-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z Subnet Mask - The Subnet Mask is used for the WAN IP address, it is usually
255.255.255.0.
z Default Gateway - Enter the gateway IP address into the box if required. z Primary DNS - Enter the DNS Server IP address into the box if required. z Secondary DNS - If your ISP provides another DNS server, enter it into this field.
2. Click Next to continue, the Wireless settings page will appear as shown in Figure 3-14. Set your wireless parameters. It’s recommended that you edit the following two items, and then click Next.
1) Create a unique and easy-to-remember Wireless Network Name.
2) Select WPA-Personal/WPA2-Personal under Wireless Security and enter a
password in the field.
Figure 3-14 Quick Setup – Wireless
5. Click Reboot to make the settings take effect.
Figure 3-15 Quick Setup – Finish
-16-
)
Note:
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
After the rebooting, please reconnect to the network according to 3.2.1 Wireless Security is enabled, you need to enter the password you’ve just set to successfully finish the connecting.
3. Standard AP Mode
1. Choose the Wireless Operation Mode Type and click Next.
Connect to Network. If
Figure 3-16 Quick Setup – Wireless Operation Mode
¾ If you choose Access Point (AP), the next screen will appear as shown in Figure 3-17.
This operation mode allows wireless stations to access.
Figure 3-17 Quick Setup – AP
z Wireless Network Name (SSID) - Enter a value of up to 32 characters. The same
Name (SSID) must be assigned to all wireless devices in your network. The
-17-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
default SSID is set to be TP-LINK_POCKET_3040_xxxxxx (xxxxxx indicates t he last unique six characters of each Router's MAC address), which can ensure your wireless network security. But it is recommended strongly that you change your networks name (SSID) to a different value. This value is case-sensitive. For example, MYSSID is NOT the same as MySsid.
z Region - Select your region from the pull-down list. This field specifies the region
where the wireless function of the Router can be used. It may be illegal to use the wireless function of the Router in a region other than one of those specified in this filed. If your country or region is not listed, please contact your local government agency for assistance.
z Channel - This field determines which operating frequency will be used. It is not
necessary to change the wireless channel unless you notice interference problems with another nearby access point. If you select auto, then the AP will select the best channel automatically.
z Security Mode – Please refer to the Appendix C: Security Mode.
¾ If you choose Repeater, the next screen will appear as shown in Figure 3-18. In
Repeater mode, the AP with WDS disabled will relays data to an associated root AP. AP function is enabled meanwhile. The wireless repeater relays signal between its stations and the root AP for greater wireless range. Please input the MAC address of root AP in the field "MAC Address".
Figure 3-18 Quick Setup – Repeater
-18-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z Name of remote AP (SSID) - Enter the name of a remote AP (also called the
SSID) that you want to access. Click the Survey button behind it, you can choose one of searching results to fill in this field.
z MAC Address - Enter the MAC address of AP that you want to access. When you
use the survey function to fulfill the Name of remote AP (SSID), this field will be filled in automatically.
z Region - This field determines which operating frequency will be used. To
achieve more information, you can read the same glossary in Access Point part.
z Security Mode – Please refer to the Appendix C: Security Mode.
¾ If you choose Bridge with AP, the next screen will appear as shown in Figure 3-19.
This operation mode bridges the AP and up to 4 APs also in bridge mode to connect two or more wired LANs.
Figure 3-19 Quick Setup – Bridge with AP
z Wireless Network Name (SSID) - Enter a value of up to 32 characters. To
achieve more information, you can read the same glossary in Access Point part.
z Region - This field determines which operating frequency will be used. To
achieve more information, you can read the same glossary in Access Point part.
-19-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z Channel - This field determines which operating frequency will be used. To
achieve more information, you can read the same glossary in Access Point part.
z Add a remote AP - Click the Survey button to fill in the MAC of remote AP (1-4)
field.
z MAC of remote AP (1-4) - Enter the MAC address of AP that you want to access. z Security Mode – Please refer to the Appendix C: Security Mode.
¾ If you choose Client, the next screen will appear as shown in Figure 3-20. This
operation mode bridges the AP and up to 4 APs also in bridge mode to connect two or more wired LANs.
Figure 3-20 Quick Setup – Client
z Wireless Network Name (SSID) - Enter a value of up to 32 characters. Click the
Survey button behind it, you can choose one of searching results to fill in this field.
z Security Mode – Please refer to the Appendix C: Security Mode.
2. Click Next and you will see the page as shown in Figure 3-21. Click Reboot to reboot the router and make the settings take effect.
Figure 3-21 Quick Setup – Finish
-20-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Note:
)
After the rebooting, please change the PC’s TCP/IP settings to “Use the following IP Address” and “Use the following DNS Server Addresses” and enter the address and DNS server address manually, and then reconnect to the network according to Wireless Security is enabled, you need to enter the password you’ve just set to successfully finish the connecting.
4. WISP Client Router Mode
1. Choose your WAN Connection type and click Next to continue.
3.2.1Connect to Network. If
Figure 3-22 Quick Setup – WAN Connection Type
¾ If Auto-Detect is chosen, the router will detect the Internet connection type provided b y
your ISP automatically.
Figure 3-23 Quick Setup – Auto Detect
¾ If the connection type is PPPoE, the next screen will appear as shown in Figure 3-24.
Figure 3-24 Quick Setup – PPPoE
-21-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z User Name and Password - Enter the User Name and Password provided by
your ISP. These fields are case sensitive. If you have difficulty with this process, please contact your ISP.
z Confirm Password - Re-enter the pa ssword provided by your ISP to ensure the
Password you entered is correct. If the Password is different from the Confirm Password, the screen will appear as shown below. Click OK, and re-enter the Password and Confirm Password.
¾ If the connection type is Dynamic IP, the next screen will appear as shown in Figure
3-25.
Figure 3-25 Quick Setup – MAC Clone
z If you are visiting the Router from the main computer, please select Yes, and then
click Clone MAC Address.
z If you are visiting the Router from another computer, rather than the main
computer, please select No, and then enter the main computer’s MAC in the field WAN MAC Address.
¾ If the connection type detected is Static IP, the next screen will appear as shown in
Figure 3-26.
-22-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 3-26 Quick Setup - Static IP
z IP Address - This is the WAN IP address seen by external users on the Internet
(including your ISP). Enter the IP address into the field.
z Subnet Mask - The Subnet Mask is used for the WAN IP address, it is usually
255.255.255.0.
z Default Gateway - Enter the gateway IP address into the box if required. z Primary DNS - Enter the DNS Server IP address into the box if required. z Secondary DNS - If your ISP provides another DNS server, enter it into this field.
2. Click Next to continue, the Wireless settings page will appear as shown in Figure 3-27. Click Survey button to find the available wireless networks. Select the SSID of your target network and click Connect, and the SSID and BSSID will be filled automatically. If the network security is on, please select the Key type and enter the Password.
Figure 3-27 Quick Setup – Wireless
-23-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
3. Click Next and you will see the page as shown in Figure 3-28. Click the Reboot button to make your wireless configuration take effect and finish the Quick Setup. (You’re recommended to go to Wireless > Wireless Security to set up the wireless security.)
Figure 3-28 Quick Setup – Finish
Note:
)
After the rebooting, please reconnect to the network according to 3.2.1 Wireless Security is enabled, you need to enter the password you’ve just set to successfully finish the connecting.
Connect to Network. If
-24-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

Chapter 4. Configuration—3G Router Mode

This chapter will show each Web page's key functions and the configuration way on 3G Router Mode. The default mode of the Router is 3G Router.

4.1 Login

After your successful login, you will see the main menus on the left of the Web-based utility. On the right, there are the corresponding explanations and instructions.
The detailed explanations for each Web page’s key function are listed below.

4.2 Status

The Status page provides the current status information about the Router. All information is read-only.
-25-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-1 Router Status

4.3 Quick Setup

Please refer to Chapter 3 Quick Installation Guide.

4.4 Operation Mode

On this page, you can choose the operation mode of the Router. The default mode is 3G Router. If you want to use other modes, select them as Figure 4-2 shown.
-26-

4.5 Network

TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-2 Operation Mode
Figure 4-3 the Network menu
There are five submenus under the Network menu (shown in Figure 4-3): Internet Access, 3G, WAN, MAC Clone and LAN. Click any of them, and you will be able to configure the corresponding function.

4.5.1 Internet Access

Choose menu “NetworkInternet Access”, you can configure the access mode on the screen below.
Figure 4-4 Internet Access Mode
¾ 3G Only
In this mode, the router will try 3G access only. WAN access is disabled.
-27-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ 3G Preferred
In this mode, the router will try 3G access first. When 3G access fails, or when no 3G USB modem is inserted, the router would switch to WAN access; when the router succeeds to connect to the 3G network, the router would stop the WAN connection and switch back to 3G access immediately.
¾ WAN Preferred
In this mode, the router will try WAN access first. When the WAN access fails, the router would switch to 3G access; when the router succeeds to connect to the WAN network, the router would stop the 3G connection and switch back to WAN access immediately.
Click the Save button to save your settings.
Note:
)
1) The failover/backup feature between 3G link and BigPond Cable / PPTP / L2TP will be
available in the near future. Please visit our website to download the latest firmware:
http://www.tp-link.com/support/download.asp
2) If you are using the 3G Preferred or WAN Preferred, the router would connect, disconnect
or switch the current access automatically. The Connect/Disconnect button (on 3G, PPPoE, PPTP, L2TP) and some related parameters could not be set manually.

4.5.2 3G

Choose menu “Network3G”, you can configure parameters for 3G function on the screen below. To use the 3G func tion, you should first insert your USB modem on the USB port of the Router. There are already much 3G USB modem information embedded in the Router. The USB modem parameters will be set automatically if the card is supported by the Router. If your USB modem inserted is supported by the Router, “identified” will be shown in the 3G USB Modem field as shown in Figure 4-5. Otherwise, “Unknown Modem” will be shown instead as shown in Figure 4-6. Please visit our website http://www.tp-link.com to get the latest USB modems compatibility list.
-28-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-5 3G
Figure 4-6
¾ Location - Please select the location where you're enjoying the 3G card. ¾ Mobile ISP - Please select the ISP (Internet Service Provider) you apply to for 3G service.
The router will show the default Dial Number and APN of that ISP.
-29-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Click the Connect button to connect to your 3G network. Once the connection is successful, you will find the 3G screen is similar to Figure 4-7. Click menu Status and you will see the 3G status is similar to Figure 4-8.
Figure 4-7
Figure 4-8
¾ Connect on Demand - You can configure the Router to disconnect your Internet
connection after a specified period of the Internet connectivity (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect on Demand, click the radio button. If you want your Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise, enter the number of minutes you want to have elapsed before your Internet connection terminates.
Note:
)
-30-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Sometimes the connection cannot be disconnected although you specify a time to Max Idle Time because some applications visit the Internet continually in the background.
¾ Connect Automatically - Connect automatically after the Router is disconnected. To use
this option, click the radio button.
¾ Connect Manually - You can configure the Router to make it connect or disconnect
manually. After a specified period of inactivity (Max Idle Time), the Router will disconnect your Internet connection, and not be able to re-establish your connection automatically as soon as you attempt to access the Internet again. To use this option, click the radio button. If you want your Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise, enter the number in minutes that you wish to have the Internet connecting last unless a new link requested.
Note:
)
Sometimes the connection cannot be disconnected although you specify a time to Max Idle Time because some applications visit the Internet continually in the background.
¾ Authentication Type - Some ISPs need a specific authentication type, please confirm it
with your ISP or keep it Auto.
Click the Save button to save your settings. If your location or ISP is not listed, or the default Dial number/APN is not the latest one, or your
ISP requires you to enter a new username and password. Click Advance Settings button and you will see the screen as shown in Figure 4-9.
Figure 4-9 3G USB Modem Settings
-31-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Set the Dial Number and APN manually - Check the box and fill the Dial Number and
APN blanks below if your ISP is not listed in the Mobile ISP list or the default values are not the latest ones.
¾ Dial Number - Enter the Dial Number provided by your ISP. ¾ APN - Enter the APN (Access Point Name) provided by your ISP. ¾ Username/Password - Enter the Username and Password provided by your ISP. These
fields are case-sensitive.
¾ MTU Size - The default MTU (Maximum Transmission Unit) size is 1480 bytes, which is
usually fine. For some ISPs, you need modify the MTU. This should not be done unless you are sure it is necessary for your ISP.
¾ Use the following DNS Servers - If your ISP specifies a DNS server IP address for you,
click the checkbox, and fill the Primary DNS and Secondary DNS blanks below. The Secondary DNS is optional. Otherwise, the DNS servers will be assigned dynamically from ISP.
¾ Primary DNS - Enter the DNS IP address in dotted-decimal notation provided by your ISP. ¾ Secondary DNS - (Optional) Enter another DNS IP address in dotted-decimal notation
provided by your ISP.
Click the Modem Settings button if your 3G USB Modem is not supported by the Router, and then you will see the screen as shown in Figure 4-10. Parameters of your USB modem can be configured on this page.
Figure 4-10 3G USB Modem Settings
There are already much 3G USB modem information embedded in the router. The USB modem parameters will be set automatically if the card is supported by the router. But when the router finds the card you just insert "unknown" to it, it will prompt you to set these parameters. The router can identify your "unknown" card if the correct parameters are in the list. We suggest you to do the “3G USB Modem Setting” only in such circumstance.
To add 3G USB Modem entries, follow the steps below.
-32-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
1. Download a most recent 3G USB modem configuration file from our website
(http://www.tp-link.com).
2. Click the Add New... button in Figure 4-10, and then you will see Figure 4-11.
3. Click Browse… to select the path name where you save the downloaded file on the
computer into the File blank.
4. Click the Upload button to upload the configuration.
Figure 4-11 Add or Modify a 3G USB Modem Entry

4.5.3 WAN

Choose menu “NetworkWAN”, you can configure the IP parameters of the WAN on the screen below.
Note:
)
WAN settings are unavailable when the Internet Access mode is set to 3G Only mode. Please change settings on 4.5.1 Internet Access
1. If your ISP provides the DHCP service, please choose Dynamic IP type, and the Router
will automatically get IP parameters from your ISP. You can see the page as follows (Figure 4-12):
if you want to use WAN.
-33-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-12 WAN - Dynamic IP
This page displays the WAN IP parameters assigned dynamically by your ISP, including IP address, Subnet Mask, Default Gateway, etc. Click the Renew button to renew the IP parameters from your ISP. Click the Release button to release the IP parameters.
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet
networks is 1500 Bytes. It is not recommended that you change the default MTU Size unless required by your ISP.
¾ Use These DNS Servers - If your ISP gives you one or two DNS addresses, select Use
These DNS Servers and enter the primary and secondary addresses into the correct fields.
Otherwise, the DNS servers will be assigned dynamically from your ISP.
Note:
)
If you get Address not found error when you access a Web site, it is likely that your DNS
servers are set up improperly. You should contact your ISP to get DNS server addresses.
¾ Host Name - This option specifies the Host Name of the Router. ¾ Get IP with Unicast DHCP - A few ISPs' DHCP servers do not support the broadcast
applications. If you cannot get the IP Address normally, you can choose this option. (It is rarely required.)
-34-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
2. If your ISP provides a static or fixed IP Address, Subnet Mask, Gateway and DNS setting,
select Static IP. The Static IP settings page will appear, shown in Figure 4-13.
Figure 4-13 WAN - Static IP
¾ IP Address - Enter the IP address in dotted-decimal notation provided by your ISP. ¾ Subnet Mask - Enter the subnet Mask in dotted-decimal notation provided by your ISP,
usually is 255.255.255.0.
¾ Default Gateway - (Optional) Enter the gateway IP address in dotted-decimal notation
provided by your ISP.
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet
networks is 1500 Bytes. It is not recommended that you change the default MTU Size unless required by your ISP.
¾ Primary/Secondary DNS - (Optional) Enter one or two DNS addresses in dotted-decimal
notation provided by your ISP.
3. If your ISP provides a PPPoE connection, select PPPoE/Russia PPPoE option. You
should enter the following parameters (Figure 4-14):
-35-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-14 WAN - PPPoE
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Secondary Connection - It’s available only for PPPoE Connection. If your ISP provides an
extra Connection type such as Dynamic/Static IP to connect to a local area network, then you can check the radio button of Dynamic/Static IP to activate this secondary connection.
z Disabled - The Secondary Connection is disabled by default, so there is PPPoE
connection only. This is recommended.
z Dynamic IP - You can check this radio button to use Dynamic IP as the secondary
connection to connect to the local area network provided by ISP.
z Static IP - You can check this radio button to use Static IP as the secondary
connection to connect to the local area network provided by ISP.
¾ Connect on Demand - In this mode, the Internet connection can be terminated
automatically after a specified inactivity period (Max Idle Time) and be re-established when you attempt to access the Internet again. If you want your Internet connection keeps active all the time, please enter “0” in the Max Idle Time field.
Otherwise, enter the number
of minutes you want to have elapsed before your Internet access disconnects.
¾ Connect Automatically - The connection can be re-established automatically when it was
down.
-36-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Time-based Connecting - The connection will only be established in the period from the
start time to the end time (both are in HH:MM format).
Note:
)
Only when you have configured the system time on System Tools -> Time page, will the Time-based Connecting function can take effect.
¾ Connect Manually - You can click the Connect/ Disconnect button to connect/disconnect
immediately. This mode also supports the Max Idle Time function as Connect on Demand mode. The Internet connection can be disconnected automatically after a specified inactivity period and re-established when you attempt to access the Internet again.
Caution: Sometimes the connection cannot be terminated although you specify a time to Max Idle Time, since some applications are visiting the Internet continually in the background.
If you want to do some advanced configurations, please click the Advanced button, and the page shown in Figure 4-15 will then appear:
Figure 4-15 PPPoE Advanced Settings
¾ MTU Size - The default MTU size is “1480” bytes, which is usually fine. It is not
recommended that you change the default MTU Size unless required by your ISP.
¾ Service Name/AC Name - The service name and AC (Access Concentrator) name, which
should not be configured unless you are sure it is necessary for your ISP. leaving these fields blank will work.
¾ ISP Specified IP Address - If your ISP does not automatically assign IP addresses to the
Router during login, please click “Use IP address specified by ISP” check box and enter the IP address provided by your ISP in dotted-decimal notation.
-37-
In most cases,
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Detect Online Interval - The Router will detect Access Concentrator online at every
interval. The default value is “0”. You can input the value between “0”and “120”. The value “0” means no detect.
¾ DNS IP address - If your ISP does not automatically assign DNS addresses to the Router
during login, please click “Use the following DNS servers” check box and enter the IP address in dotted-decimal notation of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it as well.
Click the Save button to save your settings.
4. If your ISP provides BigPond Cable (or Heart Beat Signal) connection, please select
BigPond Cable. And you should enter the following parameters (Figure 4-16):
Figure 4-16 WAN – BigPond Cable
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Auth Server - Enter the authenticating server IP address or host name. ¾ Auth Domain - Type in the domain suffix server name based on your location.
-38-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
e.g.
NSW / ACT - nsw.bigpond.net.au VIC / TAS / WA / SA / NT - vic.bigpond.net.au QLD - qld.bigpond.net.au
¾ MTU Size - The normal MTU (Maximum Transmission Unit) value for most Ethernet
networks is 1500 Bytes. It is not recommended that you change the default MTU Size unless required by your ISP.
¾ Connect on Demand - In this mode, the Internet connection can be terminated
automatically after a specified inactivity period (Max Idle Time) and be re-established when you attempt to access the Internet again. If you want your Internet connection keeps active all the time, please enter “0” in the Max Idle Time field.
Otherwise, enter the number
of minutes you want to have elapsed before your Internet access disconnects.
¾ Connect Automatically - The connection can be re-established automatically when it was
down.
¾ Connect Manually - You can click the Connect/Disconnect button to connect/disconnect
immediately. This mode also supports the Max Idle Time function as Connect on Demand mode. The Internet connection can be disconnected automatically after a specified inactivity period and re-established when you attempt to access the Internet again.
Click the Connect button to connect immediately. Click the Disconnect button to disconnect immediately.
Caution: Sometimes the connection cannot be terminated although you specify a time to Max Idle Time because some applications are visiting the Internet continually in the background.
Click the Save button to save your settings.
5. If your ISP provides L2TP connection, please select L2TP/Russia L2TP option. And you
should enter the following parameters (Figure 4-17):
-39-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-17 L2TP Settings
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
¾ Dynamic IP/ Static IP - Choose either as you are given by your ISP. Click the Connect
button to connect immediately. Click the Disconnect button to disconnect immediately.
¾ Connect on Demand - You can configure the Router to disconnect from your Internet
connection after a specified period of inactivity (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect on Demand, click the radio button. If you want your Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise, enter the number of minutes you want to have elapsed before your Internet connection terminates.
¾ Connect Automatically - Connect automatically after the Router is disconnected. To use
this option, click the radio button.
-40-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Connect Manually - You can configure the Router to make it connect or disconnect
manually. After a specified period of inactivity (Max Idle Time), the Router will disconnect from your Internet connection, and you will not be able to re-establish your connection automatically as soon as you attempt to access the Internet again. To use this option, click the radio button. If you want your Internet connection to remain active at all times, enter "0" in the Max Idle Time field. Otherwise, enter the number in minutes that you wish to have the Internet connecting last unless a new link is requested.
Caution: Sometimes the connection cannot be disconnected although you specify a time to Max Idle Time, since some applications are visiting the Internet continually in the
background.
6. If your ISP provides PPTP connection, please select PPTP/Russia PPTP option. And you
should enter the following parameters (Figure 4-18):
Figure 4-18 PPTP Settings
¾ User Name/Password - Enter the User Name and Password provided by your ISP. These
fields are case-sensitive.
-41-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Dynamic IP/ Static IP - Choose either as you are given by your ISP and enter the ISP’s IP
address or the domain name. If you choose static IP and enter the domain name, you should also enter the DNS
assigned by your ISP. And click the Save button.
Click the Connect button to connect immediately. Click the Disconnect button to disconnect immediately.
¾ Connect on Demand - You can configure the Router to disconnect from your Internet
connection after a specified period of inactivity (Max Idle Time). If your Internet connection has been terminated due to inactivity, Connect on Demand enables the Router to automatically re-establish your connection as soon as you attempt to access the Internet again. If you wish to activate Connect on Demand, click the radio button. If you want your Internet connection to remain active at all times, enter 0 in the Max Idle Time field. Otherwise, enter the number of minutes you want to have elapsed before your Internet connection terminates.
¾ Connect Automatically - Connect automatically after the Router is disconnected. To use
this option, click the radio button.
¾ Connect Manually - You can configure the Router to make it connect or disconnect
manually. After a specified period of inactivity (Max Idle Time), the Router will disconnect from your Internet connection, and you will not be able to re-establish your connection automatically as soon as you attempt to access the Internet again. To use this option, click the radio button. If you want your Internet connection to remain active at all times, enter "0" in the Max Idle Time field. Otherwise, enter the number in minutes that you wish to have the Internet connecting last unless a new link is requested.
Caution: Sometimes the connection cannot be disconnected although you specify a time to Max Idle Time, since some applications are visiting the Internet continually in the background.
Note:
)
If you don't know how to choose the appropriate connection type, click the Detect button to allow the Router to automatically search your Internet connection for servers and protocols. The connection type will be reported when an active Internet service is successfully detected by the Router. This report is for your reference only. To make sure the connection type your ISP provides, please refer to the ISP. The various types of Internet connections that the Router can detect are as follows:
z PPPoE - Connections which use PPPoE that requires a user name and password. z Dynamic IP - Connections which use dynamic IP address assignment. z Static IP - Connections which use static IP address assignment.
-42-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
The Router can not detect PPTP/L2TP/BigPond connections with your ISP. If your ISP uses one of these protocols, then you must configure your connection manually.

4.5.4 MAC Clone

Choose menu “NetworkMAC Clone”, you can configure the MAC address of the WAN on the screen below.
Figure 4-19 MAC Address Clone
Some ISPs re needed here.
¾ WAN MAC Address - This field displays the current MAC address of the WAN port. If
your ISP requires you to register the MAC address, please enter the correct into this field in XX-XX-XX-XX-XX-XX format(X is any hexadecimal digit).
¾ Your PC's MAC Address - This field displays the MAC address of the PC that is
managing the Router. If the MAC address is required, you can click the Clone Address To button and this MAC address will fill in the WAN MAC Address field.
Click R value.
Click the
)
Only the PC on yo
estore Factory MAC to restore the MAC address of WAN port to the factory default
Note:
quire that you register the MAC Address of your adapter. Changes are rarely
MAC address
MAC
Save button to save your settings.
ur LAN can use the MAC Address Clone function.

4.5.5 LAN

Choose me as below.
nu “NetworkLAN”, you can configure the IP parameters of the LAN on the screen
-43-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-20 LAN
¾ MAC A
can't be changed.
¾ IP Address - Enter the IP address of your Router or reset it in dotted-decimal notation
(factory default: 192.168.0.1).
¾ Subnet Mask
255.255.255.0
Note:
)
1) If you change the IP Address of LAN, you must use the new IP Address to login the Router.
2) If the new LAN IP Address you set is not in the same subnet, the IP Address pool of the
DHCP server will change accordingly at the same timewhile the Virtual Server and DMZ Host will not take effect until they are re-configured.
ddress - The physical address of the Router, as seen from the LAN. The value
- An address code that determines the size of the network. Normally use
as the subnet mask.

4.6 Wireless

Figure 4-21 Wireless menu
There are five submenus under the Wireless menu (shown in Wireless Security, Wireless MAC Filtering, Wireless Advanced and Wireless Statistics. Click any of them, and you will be able to configure the corresponding function.
Figure 4-21): Wireless Settings,

4.6.1 Wireless Settings

Choose menu “WirelessWireless Settings”, you can configure the basic settings for the wireless network on this page.
-44-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-22 Wireless Settings
¾ Wireless Network Name - The same name of Wireless Network Name must be assigned
to all wireless devices in your network. Considering your wireless network security, the default Wireless Network Name is set to be TP-LINK_POCKET_3040_XXXXXX (XXXXXX indicates the last six unique numbers of each Router’s MAC address). This value is case-sensitive. For example, TEST is NOT the same as test.
¾ Region - Select your region from the pull-down list. This field specifies the region where
the wireless function of the Router can be used. It may be illegal to use the wireless function of the Router in a region other than one of those specified in this field. If your country or region is not listed, please contact your local government agency for assistance.
Note:
)
Limited by local law regulations, version for North America does not have region selection option.
¾ Channel - This field determines which operating frequency will be used. The default
channel is set to Auto, so the Router will choose the best channel automatically. It is not necessary to change the wireless channel unless you notice interference problems with another nearby access point.
¾ Mode - Select the desired mode. The default setting is 11bgn mixed.
11b only - Select if all of your wireless clients are 802.11b. 11g only - Select if all of your wireless clients are 802.11g. 11n only - Select if all of your wireless clients are 802.11n. 11bg mixed - Select if you are using both 802.11b and 802.11g wireless clients.
-45-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
11bgn mixed - Select if you are using a mix of 802.11b, 11g, and 11n wireless clients.
Select the desired wireless mode. When 802.11g mode is selected, only 802.11g wireless stations can connect to the Router. When 802.11n mode is selected, only 802.11n wireless stations can connect to the AP. It is strongly recommended that you set the Mode to 802.11b&g&n, and all of 802.11b, 802.11g, and 802.11n wireless stations can connect to the Router.
¾ Channel width - Select any channel width from the pull-down list. The default setting is
automatic, which can adjust the channel width for your clients automatically.
Note:
)
If 11b only, 11g only, or 11bg mixed is selected in the Mode field, the Channel Width selecting field will turn grey and the value will become 20M, which is unable to be changed.
¾ Enable Wireless Router Radio - The wireless radio of this Router can be enabled or
disabled to allow wireless stations access.
¾ Enable SSID Broadcast - When wireless clients survey the local area for wireless networks
to associate with, they will detect the SSID broadcast by the Router. If you select the Enable SSID Broadcast checkbox, the Wireless Router will broadcast its name (SSID) on the air.
¾ Enable WDS Bridging - Check this box to enable WDS Bridging. With this function, the
Router can bridge two or more WLANs. If this checkbox is selected, you will have to set the following parameters as shown below. Make sure the following settings are correct
SSID(to be bridged) - The SSID of the AP your Router is going to connect to as a client.
You can also use the search function to select the SSID to join.
BSSID(to be bridged) - The BSSID of the AP your Router is going to connect to as a
client. You can also use the search function to select the BSSID to join.
Survey - Click this button, you can search the AP which runs in the current channel.
Key type - This option should be chosen according to the AP's security configuration. It
is recommended that the security type is the same as your AP's security type.
WEP Index - This option should be chosen if the key type is WEP(ASCII) or
WEP(HEX).It indicates the index of the WEP key.
-46-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Auth Type - This option should be chosen if the key type is WEP(ASCII) or WEP(HEX).It
indicates the authorization type of the Root AP.
Password - If the AP your Router is going to connect needs password, you need to fill
the password in this blank.

4.6.2 Wireless Security

Choose menu “WirelessWireless Security”, you can configure the security settings of your wireless network.
There are five wireless security modes supported by the Router: WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), WPA2 (Wi-Fi Protected Access 2), WPA2-PSK (Pre-Shared Key), WPA-PSK (Pre-Shared Key).
Figure 4-23
¾ Disable Security - If you do not want to use wireless security, select this check box, but it’s
strongly recommended to choose one of the following modes to enable security.
¾ WPA/WPA2 – Personal (Recommended) - It’s the WPA/WPA2 authentication type
based on pre-shared passphrase.
-47-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Version - you can choose the version of the WPA-PSK security on the drop-down list.
The default setting is Automatic, which can select or WPA2-PSK (Pre-shared key of WPA) automatically based on the wireless station's capability and request.
Encryption - When WPA-PSK or WPA is set as the Authentication Type, you can select
either Automatic, or TKIP or AES as Encryption.
Note:
)
If you check the WPA/WPA2 – Personal (Recommended) radio button and choose TKIP encryption, you will find a notice in red as shown in Figure 4-24.
WPA-PSK (Pre-shared key of WPA)
Figure 4-24
PSK Password - You can enter ASCII characters between 8 and 63 characters or 8 to
64 Hexadecimal characters.
Group Key Update Period - Specify the group key update interval in seconds. The
value should be 30 or above. Enter 0 to disable the update.
¾ WPA /WPA2 - Enterprise - It’s based on Radius Server.
Version - you can choose the version of the WPA security on the pull-down list. The
default setting is Automatic, which can select (WPA version 2) automatically based on the wireless station's capability and request.
Encryption - You can select either Automatic, or TKIP or AES.
Note:
)
If you check the WPA/WPA2 - Enterprise radio button and choose TKIP encryption, you will find a notice in red as shown in Figure 4-25.
WPA (Wi-Fi Protected Access) or WPA2
-48-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-25
Radius Server IP - Enter the IP address of the Radius Server.
Radius Port - Enter the port that radius service used.
Radius Password - Enter the password for the Radius Server.
Group Key Update Period - Specify the group key update interval in seconds. The
value should be 30 or above. Enter 0 to disable the update.
¾ WEP - It is based on the IEEE 802.11 standard. If you select this check box, you will find a
notice in red as show in Figure 4-26.
Figure 4-26
Type - you can choose the type for the WEP security on the pull-down list. The default
setting is Automatic, which can select
Open System or Shared Key authentication type
automatically based on the wireless station's capability and request.
WEP Key Format - Hexadecimal and ASCII formats are provided. Hexadecimal
format stands for any combination of hexadecimal digits (0-9, a-f, A-F) in the specified length. ASCII format stands for any combination of keyboard characters in the specified length.
-49-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
WEP Key- Select which of the four keys will be used and enter the matching WEP key
that you create. Make sure these values are identical on all wireless stations in your network.
Key Type - You can select the WEP key length (64-bit, or 128-bit, or 152-bit.) for
encryption. "Disabled" means this WEP key entry is invalid.
64-bit -
not promoted) or 5 ASCII characters. 128-bit - You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key
is not promoted) or 13 ASCII characters. 152-bit - You can enter 32 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key
is not promoted) or 16 ASCII characters.
)
If you do not set the key, the wireless security function is still disabled even if you have selected Shared Key as Authentication Type.
Be sure to click the Save button to save your settings on this page.
You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F, zero key is
Note:

4.6.3 Wireless MAC Filtering

Choose menu “Wireless Wireless MAC Filtering”, you can control the wireless access by configuring the Wireless MAC Address Filtering function, shown in Figure 4-27.
Figure 4-27 Wireless MAC address Filtering
To filter wireless users by MAC Address, click Enable. The default setting is Disabled.
¾ MAC Address - The wireless station's MAC address that you want to filter. ¾ Status - The status of this entry either Enabled or Disabled.
-50-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Description - A simple description of the wireless station.
To Add a Wireless MAC Address filtering entry, click the Add New… button. The "Add or Modify Wireless MAC Address Filtering entry" page will appear, shown in Figure 4-28:
Figure 4-28 Add or Modify Wireless MAC Address Filtering entry
To add a MAC Address Filtering entry, follow these instructions:
1. Enter the appropriate MAC Address into the MAC Address field. The format of the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). For example: 00-0A-EB-00-07-8A.
2. Enter a simple description of the wireless station in the Description field. For example: Wireless station A.
3. Status - Select Enabled or Disabled for this entry on the Status pull-down list.
4. Click the Save button to save this entry.
To modify or delete an existing entry:
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the Delete.
2. Modify the information.
3. Click the Save button.
Click the Enable All button to make all entries enabled Click the Disable All button to make all entries disabled. Click the Delete All button to delete all entries Click the Next button to go to the next page Click the Previous button to return to the previous page. For example: If you desire that the wireless station A with MAC address 00-0A-EB-00-07-8A
and the wireless station B with MAC address 00-0A-EB-00-23-11 are able to access the Router,
-51-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
but all the other wireless stations cannot access the Router, you can configure the Wireless MAC Filtering list by following these steps:
1. Click the Enable button to enable this function.
2. Select the radio button: Allow the stations specified by any enabled entries in the list to
access for Filtering Rules.
3. Delete all or disable all entries if there are any entries already.
4. Click the Add New... button and enter the MAC address 00-0A-EB-00-07-8A
/00-0A-EB-00-23-11 in the MAC Address field, then enter wireless station A/B in the Description field, while select Enabled in the Status pull-down list. Finally, click the Save and the Back button.
The filtering rules that configured should be similar to the following list:

4.6.4 Wireless Advanced

Choose menu “WirelessWireless Advanced”, you can configure the advanced settings of your wireless network.
Figure 4-29 Wireless Advanced
-52-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Beacon Interval - Enter a value between 40-1000 milliseconds for Beacon Interval here.
The beacons are the packets sent by the router to synchronize a wireless network. Beacon Interval value determines the time interval of the beacons. The default value is 100.
¾ RTS Threshold - Here you can specify the RTS (Request to Send) Threshold. If the
packet is larger than the specified RTS Threshold size, the router will send RTS frames to a particular receiving station and negotiate the sending of a data frame. The default value is 2346.
¾ Fragmentation Threshold - This value is the maximum size determining whether packets
will be fragmented. Setting the Fragmentation Threshold too low may result in poor network performance since excessive packets. 2346 is the default setting and is recommended.
¾ DTIM Interval - This value determines the interval of the Delivery Traffic Indication
Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. You can specify the value between 1-255 Beacon Intervals. The default value is 1, which indicates the DTIM Interval is the same as Beacon Interval.
¾ Enable WMM - WMM function can guarantee the packets with high- priority messages
being transmitted preferentially. It is strongly recommended enabled.
¾ Enable Short GI - This function is recommended for it will increase the data capacity by
reducing the guard interval time
¾ Enabled AP Isolation - This function can isolate wireless stations on your network from
.
each other. Wireless devices will be able to communicate with the Router but not with each other. To use this function, check this box. AP Isolation is disabled by default.
Note:
)
If you are not familiar with the setting items on this page, it's strongly recommended to keep the provided default values; otherwise it may result in lower wireless network performance.

4.6.5 Wireless Statistics

Choose menu “WirelessWireless Statistics”, you can see the MAC Address, Current Status, Received Packets and Sent Packets for each connected wireless station.
-53-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-30 The Router attached wireless stations
¾ MAC Address - The connected wireless station's MAC address. ¾ Current Status - The connected wireless station's running status, one of STA-AUTH /
STA-ASSOC / STA-JOINED / WPA / WPA-PSK / WPA2 / WPA2-PSK / AP-UP /
AP-DOWN / Disconnected.
¾ Received Packets - Packets received by the station. ¾ Sent Packets - Packets sent by the station.
You cannot change any of the values on this page. To update this page and to show the current connected wireless stations, click on the Refresh button.
If the numbers of connected wireless stations go beyond one page, click the Next button to go to the next page and click the Previous button to return the previous page.
Note:
)
This page will be refreshed automatically every 5 seconds.

4.7 DHCP

Figure 4-31 The DHCP menu
There are three submenus under the DHCP menu (shown in DHCP Clients List and Address Reservation. Click any of them, and you will be able to configure the corresponding function.
Figure 4-31): DHCP Settings,

4.7.1 DHCP Settings

Choose menu “DHCPDHCP Settings”, you can configure the DHCP Server on the page (shown in Figure 4-32).The Router is set up by default as a DHCP (Dynamic Host Configuration
-54-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Protocol) server, which provides the TCP/IP configuration for all the PC(s) that are connected to the Router on the LAN.
Figure 4-32 DHCP Settings
¾ DHCP Server - Enable or Disable the DHCP server. If you disable the Server, you must
have another DHCP server within your network or else you must configure the computer manually.
¾ Start IP Address - Specify an IP address for the DHCP Server to start with when
assigning IP addresses. 192.168.0.100 is the default start address.
¾ End IP Address - Specify an IP address for the DHCP Server to end with when assigning
IP addresses. 192.168.0.199 is the default end address.
¾ Address Lease Time - The Address Lease Time is the amount of time a network user
will be allowed connection to the Router with their current dynamic IP Address. Enter the amount of time in minutes and the user will be "leased" this dynamic IP Address. After the time is up, the user will be automatically assigned a new dynamic IP address. The range of the time is 1 ~ 2880 minutes. The default value is 120 minutes.
¾ Default Gateway - (Optional) Suggest to input the IP address of the LAN port of the
Router, default value is 192.168.0.1.
¾ Default Domain - (Optional) Input the domain name of your network. ¾ Primary DNS - (Optional) Input the DNS IP address provided by your ISP. Or consult your
ISP.
¾ Secondary DNS - (Optional) Input the IP address of another DNS server if your ISP
provides two DNS servers.
-55-
)
Note:
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
To use the DHCP server function of the Router, you must configure all computers on the LAN as "Obtain an IP address automatically" mode.

4.7.2 DHCP Clients List

Choose menu “DHCPDHCP Clients List”, you can view the information about the clients attached to the Router in the next screen (shown in Figure 4-33
).
Figure 4-33 DHCP Clients List
¾ ID - The index of the DHCP Client. ¾ Client Name - The name of the DHCP client. ¾ MAC Address - The MAC address of the DHCP client. ¾ Assigned IP - The IP address that the Router has allocated to the DHCP client. ¾ Lease Time - The time of the DHCP client leased. After the dynamic IP address has
expired, a new dynamic IP address will be automatically assigned to the user.
You cannot change any of the values on this page. To update this page and to show the current attached devices, click the Refresh button.

4.7.3 Address Reservation

Choose menu “DHCPAddress Reservation”, you can view and add a reserved addresses for clients via the next screen (shown in Figure 4-34).When you specify a reserved IP address for a PC on the LAN, that PC will always receive the same IP address each time when it accesses the DHCP server. Reserved IP addresses should be assigned to the servers that require permanent IP settings.
Figure 4-34 Address Reservation
-56-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ MAC Address - The MAC address of the PC for which you want to reserve IP address. ¾ Reserved IP Address - The IP address of the Router reserved. ¾ Status - The status of this entry either Enabled or Disabled.
To Reserve IP addresses:
1. Click the Add New … button. (Pop-up Figure 4-35)
2. Enter the MAC address (in XX-XX-XX-XX-XX-XX format.) and IP address in dotted-decimal notation of the computer you wish to add.
3. Click the Save button when finished.
Figure 4-35 Add or Modify an Address Reservation Entry
To modify or delete an existing entry:
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the Delete.
2. Modify the information.
3. Click the Save button.
Click the Enable/ Disabled All button to make all entries enabled/disabled Click the Delete All button to delete all entries Click the Next button to go to the next page and click the Previous button to return the
previous page.

4.8 Forwarding

Figure 4-36 The Forwarding menu
-57-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
There are four submenus under the Forwarding menu (shown in Figure 4-36): Virtual Servers, Port Triggering, DMZ and UPnP. Click any of them, and you will be able to configure the
corresponding function.

4.8.1 Virtual Servers

Choose menu “ForwardingVirtual Servers”, you can view and add virtual servers in the next screen (shown in Figure 4-37). Virtual servers can be used for setting up public services on your LAN, such as DNS, Email and FTP. A virtual server is defined as a service port, and all requests from the Internet to this service port will be redirected to the computer specified by the server IP. Any PC that was used for a virtual server must have a static or reserved IP Address because its IP Address may be changed when using the DHCP function.
Figure 4-37 Virtual Servers
¾ Service Port - The numbers of External Ports. You can type a service port or a range of
service ports (in XXX – YYY format, XXX is the start port number, YYY is the end port number).
¾ Internal Port - The Internal Service Port number of the PC running the service application.
You can leave it blank if the Internal Port is the same as the Service Port, or enter a specific port number when Service Port is a single one.
¾ IP Address - The IP Address of the PC providing the service application. ¾ Protocol - The protocol used for this application, either TCP, UDP, or All (all protocols
supported by the Router).
¾ Status - The status of this entry either Enabled or Disabled.
To setup a virtual server entry:
1. Click the Add New… button. (pop-up Figure 4-38)
2. Select the service you want to use from the Common Service Port list. If the Common Service Port list does not have the service that you want to use, type the number of the service port or service port range in the Service Port box.
3. Type the IP Address of the computer in the IP Address box.
4. Select the protocol used for this application, either TCP or UDP, or All.
-58-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
5. Select the Enable check box to enable the virtual server.
6. Click the Save button.
Figure 4-38 Add or Modify a Virtual Server Entry
Note:
)
If your computer or server has more than one type of available service, please select another service, and enter the same IP Address for that computer or server.
To modify or delete an existing entry:
1. Click the Modify in the entry you want to modify. If you want to delete the entry, click the Delete.
2. Modify the information.
3. Click the Save button.
Click the Enable/Disabled All button to make all entries enabled/ disabled. Click the Delete All button to delete all entries. Click the Next button to go to the next page and click the Previous button to return the previous page.
Note:
)
If you set the service port of the virtual server as 80, you must set the Web management port on System Tools –> Remote Management page to be any other value except 80 such as 8080. Otherwise there will be a conflict to disable the virtual server.

4.8.2 Port Triggering

Choose menu “ForwardingPort Triggering”, you can view and add port triggering in the next screen (shown in Figure 4-39). Some applications require multiple connections, like Internet games, video conferencing, Internet calling and so on. These applications cannot work with a pure NAT Router. Port Triggering is used for some of these applications that can work with an NAT Router.
-59-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-39 Port Triggering
Once the Router is configured, the operation is as follows:
1. A local host makes an outgoing connection using a destination port number defined in the Trigger Port field.
2. The Router records this connection, opens the incoming port or ports associated with this entry in the Port Triggering table, and associates them with the local host.
3. When necessary the external host will be able to connect to the local host using one of the ports defined in the Incoming Ports field.
¾ Trigger Port - The port for outgoing traffic. An outgoing connection using this port will
"Trigger" this rule.
¾ Trigger Protocol - The protocol used for Trigger Ports, either TCP, UDP, or All (all
protocols supported by the Router).
¾ Incoming Port - The port or port range used by the remote system when it responds to the
outgoing request. A response using one of these ports will be forwarded to the PC that triggered this rule. You can input at most 5 groups of ports (or port section). Every group of ports must be set apart with ",". For example, 2000-2038, 2050-2051, 2085, 3010-3030.
¾ Incoming Protocol - The protocol used for Incoming Ports Range, either TCP or UDP, or
ALL (all protocols supported by the Router).
¾ Status - The status of this entry either Enabled or Disabled.
To add a new rule, follow the steps below.
1. Click the Add New… button, the next screen will pop-up as shown in Figure 4-40.
2. Select a common application from the Common Applications drop-down list, then the
Trigger Port field and the Incoming Ports field will be automatically filled. If the Common Applications do not have the application you need, enter the Trigger Port and the Incoming Ports manually.
3. Select the protocol used for Trigger Port from the Trigger Protocol drop-down list, either TCP, UDP, or All.
4. Select the protocol used for Incoming Ports from the Incoming Protocol drop-down list, either TCP or UDP, or All.
5. Select Enable in Status field.
-60-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
6. Click the Save button to save the new rule.
Figure 4-40 Add or Modify a Triggering Entry
To modify or delete an
1. Click the Modify in the entry you wa Delete.
2. Modify th
3. Click the Save button.
Click the Enable All button Click the Disabled All button to make all entries disable Click the Delete All button to delete all entries.
Note:
)
1) When t
2) Each rule allowed to be used only by one host on LAN synchronously. The t
connection of other hosts on LAN will be refused.
3) Incoming Port Range cannot overlap each other.
e information.
he trigger connection is released, the according opening ports will be closed.
existing entry:
nt to modify. If you want to delete the entry, click the
to make all entries enabled
d.

4.8.3 DMZ

rigger
Choose menu “Fo (shown in Figure 4-41).The DMZ host feature allows one local host to be exposed to the Internet for a special-purpose service such as Internet gaming or videoconferencing. DMZ host forwards all the ports at the same time. Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new static IP Address assigned to it because its IP Address may be changed when using the DHCP function.
rwardingDMZ”, you can view and configure DMZ host in the screen
-61-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-41 DMZ
To assign a computer or server to be a DMZ server:
1. Click the Enable radio button.
2. Enter the local host IP Address in the DMZ Host IP Address field
3. Click the Save button.
Note:
)
After you set the DMZ host, the firewall related to the host will not work.

4.8.4 UPnP

Choose menu “ForwardingUPnP”, you can view the information about UPnP(Universal Plug and Play) in the screen (shown in Figure 4-42).The UPnP feature allows the devices, such as Internet computers, to access the local host resources or devices as needed. UPnP devices can be automatically discovered by the UPnP service application on the LAN.
Figure 4-42 UPnP Setting
¾ Current UPnP Status - UPnP can be enabled or disabled by clicking the Enable or
Disable button. As allowing this may present a risk to security, this feature is enabled by default.
¾ Current UPnP Settings List - This table displays the current UPnP information.
-62-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z App Description -The description provided by the application in the UPnP request z External Port - External port, which the router opened for the application. z Protocol - Shows which type of protocol is opened. z Internal Port - Internal port, which the router opened for local host. z IP Address - The UPnP device that is currently accessing the router. z Status - The port’s status displayed here. “Enabled” means that port is still active.
Otherwise, the port is inactive.
Click Refresh to update the Current UPnP Settings List.

4.9 Security

Figure 4-43 The Security menu
There are four submenus under the Security menu as shown in Figure 4-43: Basic Security, Advanced Security, Local Management and Remote Management. Click any of them, and you will be able to configure the corresponding function.

4.9.1 Basic Security

Choose menu “Security Basic Security”, you can configure the basic security in the screen as shown in Figure 4-44.
-63-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-44 Basic Security
¾ Firewall - A firewall protects your network from the outside world. Here you can enable or
disable the Router’s firewall.
z SPI Firewall - SPI (Stateful Packet Inspection, also known as dynamic packet filtering)
helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. SPI Firewall is enabled by factory default. If you want all the computers on the LAN exposed to the outside world, you can disable it.
¾ VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using IPSec,
PPTP, or L2TP protocols to pass through the Router’s firewall.
z PPTP Passthrough - Point-to-Point Tunneling Protocol (PPTP) allows the
Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, keep the default, Enable.
z L2TP Passthrough - Layer 2 Tunneling Protocol (L2TP) is the method used to enable
Point-to-Point sessions via the Internet on the Layer 2 level. To allow L2TP tunnels to pass through the Router, keep the default, Enable.
z IPSec Passthrough - Internet Protocol Security (IPSec) is a suite of protocols for
ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. To allow IPSec tunnels to pass through the Router, keep the default, Enable.
¾ ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows
customized Network Address Translation (NAT) traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, TFTP, H323, RTSP etc.
-64-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
z FTP ALG - Select Enable, to allow FTP servers to operate properly. z TFTP ALG - Select Enable, to allow TFTP servers to operate properly. z H323 ALG - Select Enable, to allow H323 services to operate properly. z RTSP ALG - Select Enable, to allow RTSP services to operate properly.
Click the Save button to save your settings.

4.9.2 Advanced Security

Choose menu “Security Advanced Security”, you can protect the Router from being attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood in the screen as shown in Figure 4-45.
Figure 4-45 Advanced Security
¾ Packets Statistics Interval (5~60) - The default value is 10. Select a value between 5
and 60 seconds from the drop-down list. The Packets Statistics Interval value indicates the time section of the packets statistics. The result of the statistics is used for analysis by SYN Flood, UDP Flood and ICMP-Flood.
¾ DoS Protection - Denial of Service protection. Check the Enable or Disable button to
enable or disable the DoS protection function. Only when it is enabled, will the flood filters be enabled.
¾ Enable ICMP-FLOOD Attack Filtering - Enable or Disable the ICMP-FLOOD Attack
Filtering.
-65-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ ICMP-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value
between 5 ~ 3600. When the current ICMP-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately.
¾ Enable UDP-FLOOD Filtering - Enable or Disable the UDP-FLOOD Filtering. ¾ UDP-FLOOD Packets Threshold (5~3600) - The default value is 500. Enter a value
between 5 ~ 3600. When the current UPD-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately.
¾ Enable TCP-SYN-FLOOD Attack Filtering - Enable or Disable the TCP-SYN-FLOOD
Attack Filtering.
¾ TCP-SYN-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value
between 5 ~ 3600. When the current TCP-SYN-FLOOD Packets numbers is beyond the set value, the Router will startup the blocking function immediately.
¾ Ignore Ping Packet From WAN Port - Enable or Disable Ignore Ping Packet From WAN
Port. The default setting is disabled. If enabled, the ping packet from the Internet cannot access the Router.
¾ Forbid Ping Packet From LAN Port - Enable or Disable Forbid Ping Packet From LAN
Port. The default setting is disabled. If enabled, the ping packet from LAN cannot access the Router. This function can be used to defend against some viruses.
Click the Save button to save the settings. Click the Blocked DoS Host List button to display the DoS host table by blocking.

4.9.3 Local Management

Choose menu “Security Local Management”, you can configure the management rule in the screen as shown in Figure 4-46. The management feature allows you to deny computers in LAN from accessing the Router.
-66-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-46 Local Management
By default, the radio button “All the PCs on the LAN are allowed to access the Router's Web-Based Utility” is checked. If you want to allow PCs with specific MAC Addresses to access the Setup page of the Router's Web-Based Utility locally from inside the network, check the radio button “Only the PCs listed can browse the built-in web pages to perform Administrator tasks”, and then enter each MAC Address in a separate field. The format for the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). Only the PCs with MAC address listed can use the password to browse the built-in web pages to perform Administrator tasks while all the others will be blocked.
After click the Add button, your PC's MAC Address will be placed in the list above. Click the Save button to save your settings.
Note:
)
If your PC is blocked but you want to access the Router again, use a pin to press and hold the Reset Button (hole) on the back panel for about 5 seconds to reset the Router’s factory defaults on the Router’s Web-Based Utility.

4.9.4 Remote Management

Choose menu “Security Remote Management”, you can configure the Remote Management function in the screen as shown in Figure 4-47. This feature allows you to manage your Router from a remote location via the Internet.
-67-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-47 Remote Management
¾ Web Management Port - Web browser access normally uses the standard HTTP service
port 80. This Router's default remote management web port number is 80. For greater security, you can change the remote management web port to a custom port by entering that number in the box provided. Choose a number between 1 and 65534 but do not use the number of any common service port.
¾ Remote Management IP Address - This is the current address you will use when
accessing your Router from the Internet. This function is disabled when the IP address is set to the default value of 0.0.0.0. To enable this function change 0.0.0.0 to a valid IP address. If set to 255.255.255.255, then all the hosts can access the Router from internet.
Note:
)
1) To access the Router, you should type your Router's WAN IP address into your browser's
address (in IE) or Location (in Navigator) box, followed by a colon and the custom port number. For example, if your Router's WAN address is 202.96.12.8, and the port number used is 8080, please enter http://202.96.12.8:8080 in your browser. Later, you may be asked for the Router's password. After successfully entering the username and password, you will be able to access the Router's web-based utility.
2) Be sure to change the Router's default password to a very secure password.

4.10 Parental Control

Choose menu “Parental Control”, and you can configure the parental control in the screen as shown in Figure 4-48. The Parental Control function can be used to control the internet activities of the child, limit the child to access certain websites and restrict the time of surfing.
-68-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-48 Parental Control Settings
¾ Parental Control - Check Enable if you want this function to take effect, otherwise check
Disable.
¾ MAC Address of Parental PC - In this field, enter the MAC address of the controlling PC,
or you can make use of the Copy To Above button below.
¾ MAC Address of Your PC - This field displays the MAC address of the PC that is
managing this Router. If the MAC Address of your adapter is registered, you can click the Copy To Above button to fill this address to the MAC Address of Parental PC field above.
¾ Website Description - Description of the allowed website for the PC controlled. ¾ Schedule - The time period allowed for the PC controlled to access the Internet. For
detailed information, please go to “Access Control Schedule”.
¾ Modify - Here you can edit or delete an existing entry.
To add a new entry, please follow the steps below.
1. Click the Add New… button and the next screen will pop-up as shown in Figure 4-49.
2. Enter the MAC address of the PC (e.g. 00-11-22-33-44-AA) you’d like to control in the MAC Address of Child PC field. Or you can choose the MAC address from the All Address in Current LAN drop-down list.
3. Give a description (e.g. Allow Google) for the website allowed to be accessed in the Website Description field.
4. Enter the allowed domain name of the website, either the full name or the keywords (e.g. google) in the Allowed Domain Name field. Any domain name with keywords in it (www.google.com
, www.google.com.hk) will be allowed.
5. Select from the Effective Time drop-down list the schedule (e.g. Schedule_1) you want th e entry to take effect. If there are not suitable schedules for you, click the Schedule in red below to go to the Advance Schedule Settings page and create the schedule you need.
-69-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
6. In the Status field, you can select Enabled or Disabled to enable or disable your entry.
7. Click the Save button.
Click the Enable All button to enable all the rules in the list. Click the Disable All button to disable all the rules in the list. Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous
page.
Figure 4-49 Add or Modify Parental Control Entry
For example: If you desire that the child PC with MAC address 00-11-22-33-44-AA can access
www.google.com
on Saturday only while the parent PC with MAC address 00-11-22-33-44-BB
is without any restriction, you should follow the settings below.
1. Click “Parental Control” menu on the left to enter the Parental Control Settings page.
Check Enable and enter the MAC address 00-11-22-33-44-BB in the MAC Address of Parental PC field.
2. Click “Access Control Schedule” on the left to enter the Schedule Settings page. Click
Add New... button to create a new schedule with Schedule Description is Schedule_1, Day is Sat and Time is all day-24 hours.
-70-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
3. Click “Parental Control” menu on the left to go back to the Add or Modify Parental Control
Entry page:
z Click Add New... button. z Enter 00-11-22-33-44-AA in the MAC Address of Child PC field. z Enter “Allow Google” in the Website Description field. z Enter “www.google.com” in the Allowed Domain Name field. z Select “Schedule_1” you create just now from the Effective Time drop-down list. z In Status field, select Enable.
4. Click Save to complete the settings.
Then you will go back to the Parental Control Settings page and see the following list, as shown in Figure 4-50.
Figure 4-50 Parental Control Settings

4.11 Access Control

Figure 4-51 Access Control
There are four submenus under the Access Control menu as shown in Figure 4-51: Rule, Host, Target and Schedule. Click any of them, and you will be able to configure the corresponding function.

4.11.1 Rule

Choose menu “Access Control Rule”, and then you can view and set Access Control rules in the screen as shown in Figure 4-52.
-71-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-52 Access Control Rule Management
¾ Enable Internet Access Control - Select the check box to enable the Internet Access
Control function, so the Default Filter Policy can take effect.
¾ Rule Name - Here displays the name of the rule and this name is unique. ¾ Host - Here displays the host selected in the corresponding rule. ¾ Target - Here displays the target selected in the corresponding rule. ¾ Schedule - Here displays the schedule selected in the corresponding rule. ¾ Enable - Here displays the status of the rule, enabled or not. Check this option to ena ble a
specific entry.
¾ Modify - Here you can edit or delete an existing rule. ¾ Setup Wizard - Click the Setup Wizard button to create a new rule entry. ¾ Add New... - Click the Add New... button to add a new rule entry. ¾ Enable All - Click the Enable All button to enable all the rules in the list. ¾ Disable All - Click the Disable All button to disable all the rules in the list. ¾ Delete All - Click the Delete All button to delete all the entries in the table. ¾ Move - You can change the entr y’s or der as d esired. Enter in th e first box the ID number of
the entry you want to move and in the second box another ID number, and then click the Move button to change the entries’ order.
¾ Next - Click the Next button to go to the next page. ¾ Previous - Click the Previous button to return to the previous page.
-72-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
There are two methods to add a new rule.
Method One:
1. Click Setup Wizard button and the next screen will appear as shown in Figure 4-53.
Figure 4-53 Quick Setup – Create a Host Entry
¾ Host Description - In this field, create a unique description for the host (e.g. Host_1). ¾ Mode - Here are two options, IP Address and MAC Address. You can select either of
them from the drop-down list.
If the IP Address is selected, you can see the following item: ¾ LAN IP Address - Enter the IP address or address range of the host in dotted-decimal
format (e.g. 192.168.0.23).
If the MAC Address is selected, you can see the following item: ¾ MAC Address - Enter the MAC address of the host in XX-XX-XX-XX-XX-XX format
(e.g. 00-11-22-33-44-AA).
2. Click Next when finishing creating the host entry, and the next screen will appear as shown in Figure 4-54.
-73-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-54 Quick Setup – Create an Access Target Entry
¾ Target Description - In this field, create a description for the target. Note that this
description should be unique (e.g. Target_1).
¾ Mode - Here are two options, IP Address and Domain Name. You can choose either
of them from the drop-down list.
If the IP Address is selected, you will see the following items: ¾ IP Address - Enter the IP address (or address range) of the target (targets) in
dotted-decimal format (e.g. 192.168.0.23).
¾ Target Port - Specify the port or port range for the target. For some common service
ports, you can make use of the Common Service Port item below.
¾ Protocol - Here are four options, All, TCP, UDP, and ICMP. Select one of them from
the drop-down list for the target.
¾ Common Service Port - Here lists some common service ports. Select one from the
drop-down list, and the corresponding port number will be filled in the Target Port field automatically. For example, if you select "FTP", "21" will be filled in the Target Port automatically.
If the Domain Name is selected, you will see the following items: ¾ Domain Name - Here you can enter 4 domain names, either the full name or the
keywords (for example, google). Any domain name with keywords in it (www.google.com, www.google.cn) will be blocked or allowed.
3. Click Next when finishing creating the access target entry, and the next screen will appear as shown in Figure 4-55.
-74-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-55 Quick Setup – Create an Advanced Schedule Entry
¾ Schedule Description - In this field, create a description for the schedule. Note that
this description should be unique (e.g. Schedule_1).
¾ Day - Choose Select Days and select the certain day (days), or choose Everyday. ¾ Time - Select "24 hours", or specify the Start Time and Stop Time yourself. ¾ Start Time - Enter the start time in HHMM format (HHMM are 4 numbers). For
example 0800 is 8:00.
¾ Stop Time - Enter the stop time in HHMM format (HHMM are 4 numbers). For
example 2000 is 20:00.
4. Click Next when finishing creating the advanced schedule entry, and the next screen will appear as shown in Figure 4-56.
Figure 4-56 Quick Setup – Create an Internet Access Control Entry
-75-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Rule - In this field, create a name for the rule. Note that this name should be unique
(e.g. Rule_1).
¾ Host - In this field, select a host from the drop-down list for the rule. The default value
is the Host Description you set just now.
¾ Target - In this filed, select a target from the drop -down list for the rule. The default
value is the Target Description you set just now.
¾ Schedule - In this field, select a schedule from the drop-down list for the rule. The
default value is the Schedule Description you set just now.
¾ Status - In this field, there are two options, Enable or Disable. Select Enable so that
the rule will take effect. Select Disable so that the rule won't take effect.
5. Click Finish to complete adding a new rule.
Method Two:
1. Click the Add New… button and the next screen will pop up as shown in Figure 5-52.
2. Give a name (e.g. Rule_1) for the rule in the Rule Name field.
3. Select a host from the Host drop-down list or choose “Click Here To Add New Host List”.
4. Select a target from the Target drop-s own list or choose “Click Here To Add New Target List”.
5. Select a schedule from the Schedule drop-down list or choose “Click Here To Add New Schedule”.
6. In the Status field, select Enabled or Disabled to enable or disable your entry.
7. Click the Save button.
Figure 4-57 Add Internet Access Control Entry
For example: If you desire to allow the host with MAC address 00-11-22- 33-44-AA to access www.google.com only from 18:00 to 20:00 on Saturday and Sunday, and forbid othe r hosts in the LAN to access the Internet, you should follow the settings below:
-76-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
1. Click the submenu Rule of Access Control in the left to return to the Rule List page. Select Enable Internet Access Control and choose "Allow the packets specified by any enabled access control policy to pass through the Router".
2. We recommend that you click Setup Wizard button to finish all the following settings.
3. Click the submenu Host of Access Control in the left to enter the Host List page. Add a new entry with the Host Description is Host_1 and MAC Address is 00-11-22-33-44-AA.
4. Click the submenu Target of Access Control in the left to enter the Target List page. Add a new entry with the Target Description is Target_1 and Domain Name is www.google.com.
5. Click the submenu Schedule of Access Control in the left to enter the Schedule List page. Add a new entry with the Schedule Description is Schedule_1, Day is Sat and Sun, Start Time is 1800 and Stop Time is 2000.
6. Click the submenu Rule of Access Control in the left, Click Add New... button to add a new rule as follows:
In Rule Name field, create a name for the rule. Note that this name should be unique, for example Rule_1.
In Host field, select Host_1.
In Target field, select Target_1.
In Schedule field, select Schedule_1.
In Status field, select Enable.
Click Save to complete the settings.
Then you will go back to the Access Control Rule Management page and see the following list.

4.11.2 Host

Choose menu “Access Control Host”, you can view and set a Host list in the screen as shown in Figure 4-58. The host list is necessary for the Access Control Rule.
Figure 4-58 Host Settings
¾ Host Description - Here displays the description of the host and this description is unique. ¾ Information - Here displays the information about the host. It can be IP or MAC.
-77-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Modify - To modify or delete an existing entry.
To add a new entry, please follow the steps below.
1. Click the Add New… button.
2. In the Mode field, select IP Address or MAC Address.
z If you select IP Address, the screen shown is Figure 4-59.
1) In Host Description field, create a unique description for the host (e.g. Host_1).
2) In LAN IP Address field, enter the IP address.
z If you select MAC Address, the screen shown is Figure 4-60.
1) In Host Description field, create a unique description for the host (e.g. Host_1).
2) In MAC Address field, enter the MAC address.
3. Click the Save button to complete the settings. Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous
page.
Figure 4-59 Add or Modify a Host Entry
Figure 4-60 Add or Modify a Host Entry
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA, you should first follow the settings below:
1. Click Add New... button in Figure 4-58 to enter the Add or Modify a Host Entry page.
2. In Mode field, select MAC Address from the drop-down list.
-78-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
3. In Host Description field, create a unique description for the host (e.g. Host_1).
4. In MAC Address field, enter 00-11-22-33-44-AA.
5. Click Save to complete the settings. Then you will go back to the Host Settings page and see the following list.

4.11.3 Target

Choose menu “Access Control Tar ge t ”, you can view and set a Target list in the screen as shown in Figure 4-61. The target list is necessary for the Access Control Rule.
Figure 4-61 Target Settings
Target Description - Here displays the description about the target and this description is
¾
unique.
¾ Information - The target can be IP address, port, or domain name. ¾ Modify - To modify or delete an existing entry.
To add a new entry, please follow the steps below.
1. Click the Add New… button.
2. In Mode field, select IP Address or Domain Name.
z If you select IP Address, the screen shown is Figure 4-62.
1) In Target Description field, create a unique description for the target (e.g.
Target_1).
2) In IP Address field, enter the IP address of the target.
3) Select a common service from Common Service Port drop-down list, so that the
Target Port will be automatically filled. If the Common Service Port drop-down list doesn’t have the service you want, specify the Target Port manually.
4) In Protocol field, select TCP, UDP, ICMP or ALL.
z If you select Domain Name, the screen shown is Figure 4-63.
1) In Target Description field, create a unique description for the target (e.g.
Target_1).
2) In Domain Name field, enter the domain name, either the full name or the
keywords (for example google) in the blank. Any domain name with keywords in it
-79-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
(www.google.com, www.google.hk) will be blocked or allowed. You can enter 4 domain names.
3. Click the Save button. Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous
page.
Figure 4-62 Add or Modify an Access Target Entry
Figure 4-63 Add or Modify an Access Target Entry
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA in the LAN to access www.google.com
only, you should first follow the
settings below:
1. Click Add New… button in Figure 4-61 to enter the Add or Modify an Access Target Entry page.
2. In Mode field, select Domain Name from the drop-down list.
3. In Target Description field, create a unique description for the target (e.g. Target_1).
-80-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
4. In Domain Name field, enter www.google.com.
5. Click Save to complete the settings.
Then you will go back to the Target Settings page and see the following list.

4.11.4 Schedule

Choose menu “Access Control Schedule”, you can view and set a Schedule list in the next screen as shown in Figure 4-64. The Schedule list is necessary for the Access Control Rule.
Figure 4-64 Schedule Settings
¾ Schedule Description - Here displays the description of the schedule and this description
is unique.
¾ Day - Here displays the day(s) in a week. ¾ Time - Here displays the time period in a day. ¾ Modify - Here you can edit or delete an existing schedule.
To add a new schedule, follow the steps below.
1. Click Add New... button shown in Figure 4-64 and the next screen will pop-up as shown in Figure 4-65.
2. In Schedule Description field, create a unique description for the schedule (e.g. Schedule_1).
3. In Day field, select the day or days you need.
4. In Time field, you can select all day-24 hours or you may enter the Start Time and Stop Time in the corresponding field.
5. Click Save to complete the settings.
Click the Delete All button to delete all the entries in the table. Click the Next button to go to the next page, or click the Previous button return to the previous
page.
-81-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-65 Advanced Schedule Settings
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA to access www.google.com
only from 18:00 to 20:00 on Saturday and
Sunday, you should first follow the settings below:
1. Click Add New... button shown in Figure 4-64 to enter the Advanced Schedule Settings page.
2. In Schedule Description field, create a unique description for the schedule (e.g. Schedule_1).
3. In Day field, check the Select Days radio button and then select Sat and Sun.
4. In Time field, enter 1800 in Start Time field and 2000 in Stop Time field.
5. Click Save to complete the settings.
Then you will go back to the Schedule Settings page and see the following list.

4.12 Advanced Routing

Figure 4-66 Advanced Routing
There are two submenus under the Advanced Routing menu as shown in Figure 4-66: Static Routing List and System Routing Table. Click any of them, and you will be able to configure the corresponding function.
-82-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router

4.12.1 Static Routing List

Choose menu “Advanced Routing Static Routing List”, you can configure the static route in the next screen (shown in Figure 4-67). A static route is a pre-determined path that network information must travel to reach a specific host or network.
Figure 4-67 Static Routing
To add static routing entries:
1. Click Add New… shown in Figure 4-67, you will see the following screen.
Figure 4-68 Add or Modify a Static Route Entry
2. Enter the following data:
¾ Destination Network - The Destination Network is the address of the network or host
that you want to assign to a static route.
¾ Subnet Mask - The Subnet Mask determines which portion of an IP Address is the
network portion, and which portion is the host portion.
¾ Gateway - This is the IP Address of the gateway device that allows for contact between
the Router and the network or host.
3. Select Enabled or Disabled for this entry on the Status pull-down list.
4. Click the Save button to make the entry take effect.
-83-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Other configurations for the entries:
Click the Delete button to delete the entry. Click the Enable All button to enable all the entries. Click the Disable All button to disable all the entries. Click the Delete All button to delete all the entries. Click the Previous button to view the information in the previous screen, click the Next button
to view the information in the next screen.

4.12.2 System Routing Table

Choose menu “Advanced Routing System Routing Table”, you can configure the system routing table in the next screen (shown in Figure 4-69). System routing table views all of the valid route entries in use.
Figure 4-69 System Routing Table
¾ Destination Network - The Destination Network is the address of the network or host to
which the static route is assigned.
¾ Subnet Mask - The Subnet Mask determines which portion of an IP address is the network
portion, and which portion is the host portion.
¾ Gateway - This is the IP address of the gateway device that allows for contact between the
Router and the network or host.
¾ Interface - This interface tells you whether the Destination IP Address is on the LAN &
WLAN (internal wired and wireless networks), the WAN (Internet).

4.13 Bandwidth Control

Figure 4-70 Bandwidth Control
-84-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
There are two submenus under the Bandwidth Control menu as shown in Figure 4-70: Control Settings and Rules List. Click any of them, and you will be able to configure the corresponding
function. The detailed explanations for each submenu are provided below.

4.13.1 Control Settings

Choose menu “Bandwidth Control Control Settings”, you can configure the Egress Bandwidth and Ingress Bandwidth in the next screen. Their values you configure should be less than 100000Kbps. For optimal control of the bandwidth, please select the right Line Type and ask your ISP for the total bandwidth of the egress and ingress.
Figure 4-71 Bandwidth Control Settings
¾ Enable Bandwidth Control - Check this box so that the Bandwidth Control settings can
take effect.
¾ Line Type - Select the right type for you network connection. If you don’t know how to
choose, please ask your ISP for the information.
¾ Egress Bandwidth - The upload speed through the WAN port. ¾ Ingress Bandwidth - The download speed through the WAN port.

4.13.2 Rules List

Choose menu “Bandwidth Control Rules List”, you can view and configure the Bandwidth Control rules in the Figure 4-72.
Figure 4-72 Bandwidth Control Rules List
¾ Description - This is the information about the rules such as address range.
¾ Egress bandwidth - This field displays the max and mix upload bandwidth through the
WAN port. The default is 0.
-85-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
¾ Ingress bandwidth - This field displays the max and mix download bandwidth through the
WAN port. The default is 0.
¾ Enable - This displays the status of the rule. ¾ Modify - Click Modify to edit the rule. Click Delete to delete the rule.
To add a Bandwidth Control rule, follow the steps below.
Step 1: Click Add New… shown in Figure 4-72, you will see a new screen shown in Figure
4-73.
Step 2: Enter the information like the screen shown below.
Figure 4-73 Bandwidth Control Rule Settings
Step 3: Click the Save button.

4.14 IP & MAC Binding

Figure 4-74 the IP & MAC Binding menu
There are two submenus under the IP &MAC Binding menu (shown in Figure 4-74): Binding Settings and ARP List. Click any of them, and you will be able to scan or configure the corresponding function. The detailed explanations for each submenu are provided below.

4.14.1 Binding Settings

This page displays the Binding Settings table; you can operate it in accord with your desire shown in
Figure 4-75).
-86-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Figure 4-75 Binding Settings
¾ MAC Address - The MAC address of the controlled computer in the LAN. ¾ IP Address - The assigned IP address of the controlled computer in the LAN. ¾ Bind - Check this option to enable ARP binding for a specific device. ¾ Modify - To modify or delete an existing entry.
When you want to add or modify an IP & MAC Binding entry, you can click the Add New button or Modify button, and then you will go to the next page. This page is used for adding or modifying an IP & MAC Binding entry (shown in Figure 4-76).
Figure 4-76 IP & MAC Binding Setting (Add & Modify)
To add IP & MAC Binding entries, follow the steps below.
1. Click the Add New... button as shown in Figure 4-75.
2. Enter the MAC Address and IP Address.
3. Select the Bind checkbox.
4. Click the Save button to save it.
To modify or delete an existing entry, follow the steps below.
1. Find the desired entry in the table.
2. Click Modify or Delete as desired on the Modify column.
To find an existing entry, follow the steps below.
1. Click the Find button as shown in Figure 4-75.
2. Enter the MAC Address or IP Address.
-87-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
3. Click the Find button in the page as shown in Figure 4-77.
Figure 4-77 Find IP & MAC Binding Entry
Click the Enable All button to make all entries enabled. Click the Delete All button to delete all entries.

4.14.2 ARP List

To manage the computer, you could observe the computers in the LAN by checking the relationship of MAC address and IP address on the ARP list, and you could configure the items on the ARP list also. This page displays the ARP List; it shows all the existing IP & MAC Binding entries (shown in Figure 4-78).
Figure 4-78 ARP List
¾ MAC Address - The MAC address of the controlled computer in the LAN. ¾ IP Address - The assigned IP address of the controlled computer in the LAN. ¾ Status - Indicates whether or not the MAC and IP addresses are bound. ¾ Configure - Load or delete an item.
z Load - Load the item to the IP & MAC Binding list. z Delete - Delete the item.
Click the Bind All button to bind all the current items, available after enable.
-88-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
Click the Load All button to load all items to the IP & MAC Binding list. Click the Refresh button to refresh all items.
Note:
)
An item could not be loaded to the IP & MAC Binding list if the IP address of the item has been loaded before. Error warning will prompt as well. Likewise, "Load All" only loads the items without interference to the IP & MAC Binding list.

4.15 Dynamic DNS

Choose menu “Dynamic DNS”, and you can configure the Dynamic DNS function. The Router offers the DDNS (Dynamic Domain Name System) feature, which allows the
hosting of a website, FTP server, or e-mail server with a fixed domain name (named by yourself) and a dynamic IP address, and then your friends can connect to your server by entering your domain name no matter what your IP address is. Before using this feature, you need to sign up for DDNS service providers such as www.comexe.cn Dynamic DNS client service provider will give you a password or key.
, www.dyndns.org, or www.no-ip.com. The

4.15.1 Comexe.cn DDNS

If the dynamic DNS Service Provider you select is www.comexe.cn, the page will appear as shown in Figure 4-79.
Figure 4-79 Comexe.cn DDNS Settings
To set up for DDNS, follow these instructions:
1. Type the Domain Name received from your dynamic DNS service provider.
-89-
TL-MR3040 Portable 3G/3.75G Battery Powered Wireless N Router
2. Type the User Name for your DDNS account.
3. Type the Password for your DDNS account.
4. Click the Login button to log in to the DDNS service.
Connection Status -The status of the DDNS service connection is displayed here. Click Logout to log out of the DDNS service.

4.15.2 Dyndns.org DDNS

If the dynamic DNS Service Provider you select is www.dyndns.org, the page will appear as shown in Figure 4-80.
Figure 4-80 Dyndns.org DDNS Settings
To set up for DDNS, follow these instructions:
1. Type the User Name for your DDNS account.
2. Type the Password for your DDNS account.
3. Type the Domain Name you received from dynamic DNS service provider here.
4. Click the Login button to log in to the DDNS service.
Connection Status -The status of the DDNS service connection is displayed here. Click Logout to logout of the DDNS service.

4.15.3 No-ip.com DDNS

If the dynamic DNS Service Provider you select is www.no-ip.com, the page will appear as shown in Figure 4-81.
-90-
Loading...