The following page allows you to enable the wireless capability, hide the access point by not
broadcasting the network name, and set the wireless network name (SSID).
OptionDescription
Allow wireless
connections
Broadcast
network name
A checkbox that enables or disables the wireless LAN
interface. The default is to enable wireless
communications.
If you do not want the access point to be automatically
detected by a wireless client, clear this checkbox. If you
do this, the client cannot discover the access point. You
can still set up the connection by specifying the network
name (below), then entering this name in the wireless
client utility.
Enter a name for your wireless network here. SSID stands
for Service Set Identifier. This name must be between 1
Network name
(SSID)
MAC address
and 32 characters long. The default name is USR9108.
All wireless clients must either detect the gateway or be
configured with the correct SSID to access the Internet.
Displays the gateway's wireless MAC address. (You may
need this address if you're using WDS or multiple
gateways.) Click Apply to save changes.
Client List
This page displays all of the wireless clients associated with or connected to your wireless
gateway. A wireless client is a machine with a wireless adapter.
If you check or uncheck any of the Disable checkboxes, click Apply to save your changes. If
you discover an unauthorized wireless user connecting to your gateway, you can use the
Disable checkbox to remove it. This also adds the unauthorized system to the MAC filter
disallow list. Click Refresh to update the list to the most current status.
AP Mode
In this page, you can set up your gateway as either an access point (which connects wireless
machines to the Internet) or a bridge (which only exchanges data with another wireless
bridge). With an access point, wireless clients use infrastructure mode to communicate with
the gateway. In bridge mode, the gateway uses the Wireless Distribution System (WDS)
protocol to wirelessly communicate with the other wireless bridges.
Note: After making any changes, click Apply to save.
Warning: The settings shown above are default settings. Changes made to these items can
cause wireless communication problems.
FieldDescription
AP isolation
Band
Channel
Rate
Multicast rate
Basic rate
Fragmentation
threshold
Enable this item if you do not want your wireless
machines to be able to communicate with each other.
This is the range of frequencies the gateway will use
to communicate with your wireless devices.
Drop-down menu that allows selection of specific
channel.
This drop-down list lets you specify the wireless
communication rate, which can be Auto (uses the
highest rate when possible, or else a lower rate) or a
fixed rate between 1 and 54 Mbps.
This drop-down list lets you specify the wireless
communication rate for multicast packets, which are
sent to more than one destination at a time. The
value can be Auto (uses the highest rate when
possible, or else a lower rate) or a fixed rate between
1 and 54 Mbps.
You have the option of supporting all rates listed in
Rate above or using the 1-, 2-Mbps rates, which
support only older 802.11b implementations.
A threshold, specified in bytes, that determines
whether packets will be fragmented and at what size.
On an 802.11 connection, packets that are larger the
fragmentation threshold are split into smaller units
suitable for the circuit size. Packets smaller than the
specified fragmentation threshold value are not
fragmented.
RTS threshold
Enter a value between 256 and 2346. If you
experience a high packet error rate, try to increase
this value slightly. Setting the fragmentation
threshold too low may result in poor performance.
This is number of bytes in the packet size beyond
which the gateway invokes its RTS/CTS (request to
send, clear to send) mechanism. Packets larger than
this threshold trigger the RTS/CTS mechanism, while
the gateway transmits smaller packets without using
RTS/CTS. The default setting of 2347, which is the
maximum, disables the RTS threshold mechanism.
A delivery traffic indication message (DTIM), also
known as a beacon, is a countdown informing
wireless clients of the next window for listening to
broadcast and multicast messages. When the
gateway has broadcast or multicast messages for its
clients, it sends its next DTIM message with this DTIM
interval value. The clients hear the beacons and
awaken as needed to receive the broadcast and
multicast messages.
The amount of time (in milliseconds) between beacon
transmissions, each of which identifies the presence
of an access point. By default, wireless clients
passively scan all radio channels, listening for
beacons coming from access points. Before a client
enters power-save mode, it needs the beacon interval
to determine when to wake up for the next beacon
(and learn whether the access point has any
messages for it). You can enter any value between 1
and 65535, but the recommended range is 1 - 1000.
MAXg is a feature in which two U.S. Robotics MAXg
devices can communicate with each other at twice the
normal rate.
+ is a technology that achieves higher throughput
54
with frame-bursting. With 54g+ enabled, aggregate
throughput (the sum of the individual throughput of
Acceleration
MAC address This is the gateway's WLAN MAC address.
54g mode
54g protection
WMM (Wi-Fi
multimedia)
WMM noacknowledgement
Preamble
each network client) improves by up to 25% in
802.11g-only networks, and up to 75% in mixed
networks containing both 802.11g and 802.11b
equipment.
In this item, you can select either None, 54g+
(Xpress?, or MAXg (125 Mbps). If you are in
Bridge mode, MAXg (125 Mbps) is not supported.
Set this 54g+ mode to 54g Auto for the widest
compatibility, or to 54g Performance for the fastest
performance with 54g-certified equipment.
The 802.11g standards provide a protection method
so 802.11g and 802.11b devices can co-exist in the
same network without “speaking” at the same time.
Do not disable 54g protection if there is a possibility
that a 802.11b device will use your wireless network.
In Auto mode, the wireless devices use RTS/CTS to
improve 802.11g performance in mixed
802.11g/802.11b networks. Turn protection off to
maximize 802.11g throu
This item enables or disables Quality of Service
(QoS) processing of multimedia packets. In QoS,
some types of packets are
others.
No-acknowledgement refers to the acknowledge
policy used at the MAC level. Enabling noacknowledge can result in more efficient throughput
but high error rates.
A preamble is a signal that synchronizes the timing
between two or more wireless devices, allowing all
wireless systems to recognise the start of
transmission.
There are several security methods to choose from, depending on your needs and the
capabilities of your wireless machines.
WEP open and WEP shared—WEP is an encryption scheme that is used to protect
your wireless data communications. WEP uses a combination of 64-bit keys or 128-bit
keys to provide access control to your network and encryption security for every data
transmission. To decode a data transmission, each wireless client on the network must
use an identical 64-bit or 128-bit key. WEP is an older wireless encryption method that
is not as hard to break as the more-recent WPA.
802.1x — In 802.1x (also known as RADIUS), a separate machine called an
authentication server receives a user ID and password. It grants or denies access
based on whether the ID and password match any entries in its account list. You can
optionally enable WEP encryption with this option. Because it requires a separate
machine acting as the authentication server, 802.1x is most often used in business
enviroments.
WPA with 802.1x (RADIUS)— WPA is a more recent encryption method that
addresses many of the weaknesses in WEP. Any client capable of WPA encryption
should use it instead of WEP. This option uses WPA and an authentication server.
WPA (PSK)— This is WPA encryption combined with a pre-shared key (PSK), which is
a text string known only to the gateway and authorized wireless clients. The gateway
rejects the login if the client's PSK does not match.
WPA2 with 802.1x (RADIUS)— WPA2 is a more advanced encryption method than
WPA. Because it is a more recent standard, some of your wireless devices might not be
able to use it. This option specifies WPA2 encryption and an authentication server.
WPA2 (PSK)— This option uses WPA2 with a pre-shared key.
WPA2 and WPA with 802.1x (RADIUS) — This option supports an authentication
server and WPA2/WPA encryption for devices capable of one or the other standard. The
gateway automatically detects whether a particular device can use WPA2 or WPA.
WPA2 AND WPA (PSK)— This has WPA2 or WPA encryption based on client abilities,
as well as a pre-shared key.
After making changes, click Apply to save.
MAC Filter
All network interface cards are built with a unique 48-bit MAC address. When MAC address
filtering is enabled, you can restrict the wireless devices that are allowed to connect to your
gateway by their respective MAC addresses. You could also grant access to any wireless
device whose MAC address is on its "allow" list.
These are the values for the MAC restrict mode:
Allow all— Allow any wireless device to access your local network, which amounts to
turning off MAC filtering.
Allow these— Let only the devices with the MAC addresses in the MAC filter list have
access to your wireless network.
Deny these— Exclude only the devices with the MAC addresses in the MAC filter list
from accessing your wireless network. Allow access to any other MAC addresses.
Below the MAC restrict mode is a table showing all MAC addresses that the restrict mode
applies to. You can add up to 60 addresses to the list. For an example of adding MAC
addresses to the list and otherwise configuring MAC filtering, please see the Tutorials
section of this User Guide.
If you wish to delete an entry from the list, select the appropriate MAC restrict mode,
select the Remove checkbox for the entry you want to delete, and click the Remove button.
Device Login
You can use this page to change the password for the admin, support and user accounts.
(Their default passwords are admin, support, and user respectively.) Simply select an
account in the User name drop-down list, then enter the current and new passwords for the
account. Enter the new password a second time to confirm it. Then click Apply to save the
new password.
You can use the Internet Access Control page to create a parental control rule that keeps
certain network devices off the Internet for specific time periods. The rules can block access
for a defined time period on certain days of the week.
Note: If you want to use this feature, you must configure the gateway to synchronize its
time with at least one Internet time-of-day server. See Time
information.
This is the Internet Access Control page when there are no filters defined:
synchronization for more
Click Add to define an Internet access filter, and enter its settings in the following page. In
addition to the rule name, each rule you define has the MAC address of the machine to block,
the time period to block it for, and a list of days that the time-period block is enforced.
Caution: If you want to set up access control for a machine other than the one you're
currently using, select Other network device and enter that device's MAC address.
After configuring the Internet access filter, click Save to save it. Here's what it might look
like if you wanted to keep children off the Internet during after-school study hours:
IP Filtering - Outbound Filters
The gateway's firewall can block internal users or applications from accessing the Internet.
There are two ways to accomplish this:
Using the TCP/UDP port numbers to block internal users or applications (a technique
Using a combination of the source or destination port, protocol or source/destination IP
address to block a specific machine from accessing the Internet. This is also known as
address filtering. The outbound filter page allows you to block outgoing packet types
using either TCP, UDP, or a combination of both from specific ports.
For a tutorial on how to use the outbound filter page to keep a computer from accessing the
Internet, please click here
This is the outbound filtering page before adding a filter:
.
To remove an existing filter definition from the outbound filter table (the first screen shown
above), check the Remove checkbox for the filter and click the Remove button.
The following page appears after you click Add.
When you are done entering values for your filter, click Apply to save the filter.
These are the fields on the second page above (the page labeled Add IP Filter and Outgoing), where you define a filter that specifies a set of conditions for which to block
access for one or more local machines.
Item Description
Filter name Enter a name for the filter here.
Protocol Select TCP, UDP, a combination of TPC & UDP, or ICMP.
Enter the IP address that you do not want to let access the
Internet or the destination address.
Enter the subnet mask for the source IP address.
Enter the source port number, or range of ports, for which
you want to block access.
Enter the IP address you do not want the source IP address
to have access to.
Enter the subnet mask for the destination IP address.
Enter the destination port number, or range of port
numbers, you want to block access.
IP Filtering - Inbound Filters
This page allows incoming packets to reach their intended destinations by specifying rules for
unblocking certain incoming packets. You could use it any time you want to allow restricted
access to a machine, or you could configure unlimited access to a particular system (for
example if one of your local machines is a Web server).
After setting up your filter, click Apply to save it.
Virtual Servers
A virtual server allows you to direct incoming traffic from the Internet (identified by protocol
and external port) to an internal server with a private IP address on the LAN. If you need to
convert an external port you need to enter an internal port.
Click here
delete a virtual server, check the Remove checkbox for the appropriate line in the table and
click Remove.
to go to a tutorial showing you how to set up a virtual server. If you want to
Note: If you set up a DMZ host, all packets for addresses other than those specified in this
page go to a designated DMZ machine.
Port Triggering
Port triggering is similar to a virtual server, except that it creates a dynamic or temporary
hole in the firewall. Port triggering is more secure than a virtual server, but it does not
support simultaneous use of the same ports by multiple systems. It allows remote systems
access through the gateway's firewall.
Click Add to set up port triggering for an Internet application. In the next page (shown
below), select the application name, which fills in the settings in the table below. If the
application you want is not in the list, select Custom application and fill in the table
parameters below. (See the application's documentation to find out what the settings should
be.) Click Apply to save the port trigger.
Note: A port trigger is available to a single active session. It cannot simultaneously support
same-port triggers to multiple clients.
DMZ Host
The de-militarized zone (DMZ) option is for forwarding IP packets from the Internet that are
not meant for any of the applications configured in the virtual server
are forwarded to a designated DMZ host computer. While a virtual server can only forward
(redirect) a limited number of services (ports), DMZ hosting allows all the services (ports)
running on the DMZ host to be accessible externally.
This is the DMZ Host page.
table. These packets
To configure the DMZ, simply enter the IP address of the computer that will function as the
DMZ host. Click Apply to save the DMZ address. To deactivate the DMZ feature, clear DMZ host IP address and click Apply.
The gateway can synchronize its internal clock with time servers on the Internet. In this
page, you can configure how it does this.
To synchronize with the Internet time server(s), specify one or two servers by either
selecting them from a list or entering their IP addresses. Then select your time zone in the
Time zone offset and click Save.
A USB printer can be connected to the gateway and used as a network printer if you are
using an operating system that supports printing to an Internet Printing Protocol (IPP)-based
printer. Windows XP and 2000 have built-in support for this function, but other Windows
users will need to download either a Microsoft patch for their version of Windows or a thirdparty application. Refer to the documentation for your version of Windows for more
information. Other operating systems will need to either already support IPP-based printing
or download a third party application for their operating system.
Start by enabling the print server and entering the printer name, make and model. Then click
Save.
Now perform the following steps to install and set up the printer:
1. Connect the printer to the gateway. Plug the square end of a USB cable into the USB
port on your printer. Plug the thin rectangular end of the USB cable into the USB port
on the gateway. Connect the power supply to your printer and turn your printer on.
2. Set up your printer. Launch a Web browser. Go to the Web user interface by opening
the http://192.168.1.1 address (if you have changed this address, use the new
address).
3. Perform the following steps to set up your printer. You will need to do this on every
computer that is connected to your network that you want to be able to access the