UTT N518W, AC1220GW, AC750W, AC750GW, AC755W User Manual

User Manual
Enterprise Wireless Router
Copyright Notice
© 2000-2016, Shanghai UTT Technologies Co., Ltd.
All rights reserved. The information of this publication is protected by copyright. No part of this publication may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright holders. The scope of delivery and other details are subject to change without prior notice.
Trademark UTT® is a registered trademark of Shanghai UTT Technologies Co., Ltd. Other trademarks and registered trademarks of products mentioned in this publication may be the
properties of their respective owners and are only used for identification purposes.
Version 1.0_201605
Table of Contents
About this Manual ........................................................................................................................... 1
0.1 Manual Description ........................................................................................................ 1
0.2 Web UI Style .................................................................................................................. 1
0.3 Documents Conventions ................................................................................................ 2
0.3.1 Format ................................................................................................................... 2
0.3.2 Icons ...................................................................................................................... 2
0.4 Factory Default Settings ................................................................................................. 3
0.5 Contact us ...................................................................................................................... 3
Chapter 1. Hardware Installation .................................................................................................. 4
1.1 Panel Description ........................................................................................................... 4
1.2 Installation Guideline ...................................................................................................... 5
1.3 Installation Requirements ............................................................................................... 6
1.4 Installation Procedure .................................................................................................... 6
1.5 Connecting the Device ................................................................................................... 6
Chapter 2. Logging to the Device ................................................................................................. 8
2.1 Configuring your computer ............................................................................................. 8
2.2 Logging to the Device .................................................................................................... 9
Chapter 3. Start Menu ................................................................................................................ 12
3.1 Setup Wizard ............................................................................................................... 12
3.1.1 Running the Setup Wizard ................................................................................... 12
3.1.2 Setup Wizard - WAN1 Settings ............................................................................ 13
3.1.3 Setup Wizard - 2.4G Wireless .............................................................................. 13
3.1.4 Setup Wizard - 5G Wireless ................................................................................. 15
3.2 Interface Status ............................................................................................................ 16
3.3 Interface Traffic ............................................................................................................ 16
3.4 Restart Device ............................................................................................................. 18
Chapter 4. Network Menu .......................................................................................................... 19
4.1 WAN ............................................................................................................................ 19
4.1.1 PPPoE Connection .............................................................................................. 19
4.1.2 Static IP Connection ............................................................................................. 21
4.1.3 DHCP Connection ............................................................................................... 22
4.1.4 Internet Connection List ....................................................................................... 22
4.1.5 Edit the Connection ............................................................................................. 23
4.1.6 Delete the Connection ......................................................................................... 24
4.1.7 Dial or Hang up a PPPoE connection .................................................................. 24
4.1.8 Renew or Release a DHCP Connection ............................................................... 25
4.2 Load Balancing ............................................................................................................ 25
4.2.1 Internet Connection Detection Mechanism ........................................................... 25
4.2.2 Global Settings .................................................................................................... 26
4.2.3 Load Balancing List ............................................................................................. 28
4.2.4 Detection and Bandwidth ..................................................................................... 29
4.2.5 Identity Binding .................................................................................................... 30
4.3 LAN .............................................................................................................................. 30
4.4 DHCP Server ............................................................................................................... 32
4.4.1 DHCP Server Settings ......................................................................................... 32
4.4.2 Static DHCP ......................................................................................................... 34
4.4.3 DHCP Auto Binding.............................................................................................. 35
4.4.4 DHCP Client List .................................................................................................. 36
4.4.5 Example of DHCP ................................................................................................ 37
4.5 DDNS........................................................................................................................... 38
4.5.1 DDNS Service provided by no-ip.com .................................................................. 39
4.5.2 DDNS Service provided by dyndns.org ................................................................ 39
4.5.3 DDNS Verification ................................................................................................ 40
4.6 UPnP ........................................................................................................................... 41
4.7 Number of WAN ........................................................................................................... 42
Chapter 5. Wireless Menu .......................................................................................................... 43
5.1 Basic ............................................................................................................................ 43
5.1.1 AP Mode .............................................................................................................. 44
5.1.2 Repeater Mode .................................................................................................... 45
5.1.3 Bridge Mode ........................................................................................................ 47
5.1.4 Lazy Mode ........................................................................................................... 47
5.2 Security ........................................................................................................................ 48
5.2.1 WEP .................................................................................................................... 48
5.2.2 WPA/WPA2 .......................................................................................................... 50
5.2.3 WPA-PSK/WPA2-PSK ......................................................................................... 51
5.3 MAC Filtering ............................................................................................................... 52
5.4 Advanced ..................................................................................................................... 53
5.5 Client List ..................................................................................................................... 54
5.6 Example of AP Mode Configuration .............................................................................. 56
5.7 Example of WDS Configuration .................................................................................... 57
Chapter 6. Wireless 5G Menu .................................................................................................... 61
6.1 Basic ............................................................................................................................ 61
6.2 Security ........................................................................................................................ 62
6.3 MAC Filtering ............................................................................................................... 62
6.4 Advanced ..................................................................................................................... 63
6.5 Client List ..................................................................................................................... 63
Chapter 7. Advanced Menu ........................................................................................................ 64
7.1 NAT&DMZ .................................................................................................................... 64
7.1.1 Port Forwarding ................................................................................................... 64
7.1.2 NAT Rule ............................................................................................................. 68
7.1.3 DMZ ..................................................................................................................... 74
7.1.4 Priorities for Port Forwarding and DMZ Host ........................................................ 75
7.2 Static Route.................................................................................................................. 75
7.2.1 Static Route List ................................................................................................... 75
7.2.2 Static Route settings ............................................................................................ 76
7.3 Policy Routing .............................................................................................................. 77
7.3.1 Policy Routing List ............................................................................................... 78
7.3.2 Policy Routing settings ......................................................................................... 79
7.4 Anti-NetSniper .............................................................................................................. 80
7.5 Plug and Play ............................................................................................................... 80
7.6 Port Mirroring ............................................................................................................... 81
7.7 Syslog .......................................................................................................................... 82
Chapter 8. Network Sharing Menu ............................................................................................. 84
8.1 Sharing Management ................................................................................................... 84
8.2 FTP Server ................................................................................................................... 85
8.3 Shared Account ............................................................................................................ 86
Chapter 9. User Management Menu .......................................................................................... 88
9.1 User Status .................................................................................................................. 88
9.2 IP/MAC binding ............................................................................................................ 90
9.2.1 The Operation Principle of IP/MAC Binding ......................................................... 91
9.2.2 Binding List .......................................................................................................... 94
9.2.3 Binding Settings ................................................................................................... 95
9.2.4 Internet Whitelist and Blacklist ............................................................................. 96
9.3 PPPoE Server .............................................................................................................. 98
9.3.1 Introduction to PPPoE.......................................................................................... 98
9.3.2 PPPoE Stages ..................................................................................................... 98
9.3.3 PPPoE Server Settings ...................................................................................... 100
9.3.4 Example for PPPoE ........................................................................................... 107
9.4 Web Authentication .................................................................................................... 109
9.4.1 Global Settings .................................................................................................. 110
9.4.2 Account Settings ................................................................................................. 111
9.4.3 Client Status ...................................................................................................... 112
9.4.4 The steps for using Web Authent icat ion ............................................................. 112
9.5 User Group ................................................................................................................ 114
Chapter 10. App Control Menu ............................................................................................... 116
10.1 Schedule ................................................................................................................ 116
10.2 Application Control .................................................................................................. 117
10.3 QQ Whitelist ........................................................................................................... 123
10.4 MSN Whitelist ......................................................................................................... 124
10.5 TradeManager ........................................................................................................ 125
10.6 Notification .............................................................................................................. 126
10.6.1 Daily Routine Notification ................................................................................. 127
10.6.2 Account Expiration Notification ........................................................................ 128
10.7 Application Audit ..................................................................................................... 129
10.8 Policy Database ...................................................................................................... 130
Chapter 11. QoS Menu ........................................................................................................... 132
11.1 Fixed Rate Limiting ................................................................................................. 132
11.2 Flexible Bandwidth .................................................................................................. 133
11.3 P2P Rate Limit ........................................................................................................ 134
11.4 Session Limit ing ..................................................................................................... 135
Chapter 12. Firewall Menu ...................................................................................................... 137
12.1 Attack Prevention .................................................................................................... 137
12.2 Access Control ....................................................................................................... 139
12.3 Domain Filtering...................................................................................................... 151
12.3.1 Domain Filtering Sett ings ................................................................................. 152
12.3.2 Domain Block Notific ation ................................................................................ 153
12.4 MAC Address Filtering ............................................................................................ 154
Chapter 13. VPN Menu ........................................................................................................... 157
13.1 Introduction to VPN T ech nologies ........................................................................... 157
13.2 PPTP ...................................................................................................................... 158
13.2.1 Introduction to PPTP Implementation ............................................................... 158
13.2.2 PPTP Server settings ....................................................................................... 159
13.2.3 Client Settings.................................................................................................. 162
13.2.4 PPTP List ......................................................................................................... 163
13.2.5 Example of PPTP ............................................................................................ 164
13.3 IPSec ...................................................................................................................... 169
13.3.1 Abbreviations and Terminology ........................................................................ 169
13.3.2 Creating Security Associations (SAs) ............................................................... 171
13.3.3 Maintain Security Associations (SAs) ............................................................... 173
13.3.4 IPSec NAT T rav ersal ........................................................................................ 174
13.3.5 IPSec List ........................................................................................................ 175
13.3.6 IPSec settings .................................................................................................. 175
13.3.7 Example of IPSec ............................................................................................ 181
Chapter 14. System Menu ...................................................................................................... 188
14.1 Administrator .......................................................................................................... 188
14.2 Language ............................................................................................................... 188
14.3 Time ....................................................................................................................... 189
14.4 Configuration .......................................................................................................... 190
14.5 Firmware Upgrade .................................................................................................. 191
14.6 Remote Management ............................................................................................. 192
14.7 Scheduled Task ...................................................................................................... 193
Chapter 15. Status Menu ........................................................................................................ 195
15.1 Interface Status ....................................................................................................... 195
15.2 System Information ................................................................................................. 195
15.3 System Log ............................................................................................................. 196
Appendix A FAQ .......................................................................................................................... 198
Appendix B Common IP Protocols .............................................................................................. 201
Appendix C Common Service Ports ............................................................................................ 202
UTT Technologies About this Manual

About this Manual

Note:
For better user experience, it is strongly recommended to use Internet Explorer 8.0 or above, Google Chrome and Firefox.
0.1 Manual Description
This manual is suitable for Enterprise Wireless Router including N518W, AC750 W, AC750GW, AC755W, AC1220GW and so on.
The manual describes the characteristics and features of the enterprise wireless router, which are based on ReOS_SE V1.7.5 firmware platform. It mainly describes how to configure and mana ge the Device via Web UI. Please make sure that your Device’s firmware version accords with ReOS_SE V1.7.5. As the product or firmware version upgrades, or other reasons, this guide will be updated periodically.
In addition, as the product specifications of each model are different, please contact the UTT customer to ask for help if any questions.
Note:
The Device (First letter in uppercase.) mentioned in this manual stands for the enterprise wireless router.
0.2 Web UI Style
The Device’s Web User Interface (Web UI) follows the web standards, as follows:
Radio Button: Allows you to choose from only one of a predefined set of options.
Check Box: Allows you to select one or more options.
Button: Allows you to click to perform an action.
Text Box: Allows you to enter text information.
List Box: Allows you to select one or more items from a static multiple line text box.
Drop-down List: Allows you to choose one item from a list. When a drop-down
http://www.uttglobal.com Page 1
UTT Technologies About this Manual
list is inactive, it displays a single item. When activated, it drops down a list of items, from which you may select one.
0.3 Documents Conventions
0.3.1 Format
Notes: You need to pay attention to the notes content.
Parameters: Describe the meaning of parameter or button. If there have “*” before parameters,
it couldn’t be empty. Bullets: List the parallel content. Boldface font: Examples of information displayed on the screen.
0.3.2 Icons
Router
Wired Client
Switch
Wireless client
Modem
PDA
Server
http://www.uttglobal.com Page 2
UTT Technologies About this Manual
Parameter
Default Value
Description
You can use this IP address to
0.4 Factory Default Settings
The factory default settings of interfaces are shown in the following table.
User Name admin
Password admin
LAN IP Address 192.168.1.1/255.255.255.0
Table 0- 1 Factory Default Settings of Interface
Both the User Name and Password are case sensitive.
access the Device through a Web browser.
0.5 Contact us
If you have any question about the installation or using the Device, please contact us as the following ways:
Phone: +86 21-67766519, 67766527 Global Sales Office Number: +1(626)722-5032 Email: support@uttglobal.com
http://www.uttglobal.com Page 3
UTT Technologies Hardware Installation
LED
Description
The 2.4G LED indicator is on when 2.4GHZ Wireless is enabled, and it blinks when transmitting/receiving 2.4G wireless data.
Note

Chapter 1. Hardware Installation

This chapter describes the physical characteristics of the Device and explains how to install them.
1.1 Panel Description
1) Front Panel The LED indicators, the interface and the button are located on the front panel of the Device, here
we use AC750GW as an example, as for other models, please see the product.
Figure 1-1 Front Panel_AC750GW
PWR The Power LED indicator is on when the Device is powered on.
SYS
USB The LED indicator is on when the USB interface is connected properly.
2.4G
5G
Turbo The Turbo LED indicator blinks when the function is enabled.
1,2,3,4,5
The LED indicator blinks twice per second when the system is working properly, and it will blink slower under heavy load.
The 5G LED indicator is on when 5GHZ Wireless is enabled, and it blinks when transmitting/receiving 5G wireless data.
The LAN LED indicator is on when Ethernet cable connection is normal, and it blinks when the LAN port is sending or receiving data.
http://www.uttglobal.com Page 4
: The number of port status LEDs depends on the Device model.
Table 1-1 LED Description
UTT Technologies Hardware Installation
Interface
Description
Note:
Button
Description
Note:
System > Configuration
LAN Port
WAN Port
TF Connect TF card for data sharing.
USB Plug in a USB storage f or specific features.
Console
Some products support configurable LAN/WAN, so the corresponding ports can be configured as LAN port or WAN port (such as WAN4/LAN2, WAN3/LAN3, and WAN2/LAN4).
These interfaces provide a LAN connection to network devices, such as PCs or switches.
The WAN interface is connected to your Internet devices, such as PCs or switches. The number of WAN ports depends on the device model.
An RS-232 DB9 Male port is used for connections to the Device to manage the router.
Table 1-2 Interface Description
Reset current settings to the factory default settings. When the Device is
Reset
Turbo Amplify wireless transmitting power.
The reset operation will clear all the settings and preferences that you have configured.
You can also recover the Device 's factory configuration on the
powered on, use a pin or paperclip to press and hold the Reset button for more than 5 seconds, and then release the button. After that, the Device will restart with the factory default settings.
Table 1-3 Button Description
1.2 Installation Guideline
When determining where to place the Device, please observe these guidelines:
Make sure that your workbench or standard rack is level and stable.
page.
http://www.uttglobal.com Page 5
Do not place heavy objects on the Device!
UTT Technologies Hardware Installation
Make sure that there is proper heat dissipation and adequate ventilation around the
Device.
Position the Device out of direct sunlight and away from sources of heat and ignition. Please install the Device in a place far away from the High Power Radio or Radar Station. Keep the Device far away from water! Please use the supplied power cord.
1.3 Installation Requirements
The following items are required for installation:
1) Broadband Internet connection
2) Tools and equipment (1) Broadband modem (optional) (2) PC with an Ethernet card and TCP/IP installed (3) Network devices like hub, switch, wireless access point (4) Network cables (5) Screwdriver (6) Power outlet
1.4 Installation Procedure
Follow these steps to install the Device on a flat surface such as a bench:
1) Make sure the Device is powered off.
2) Place the Device upside down on a sturdy, flat bench with a power outlet nearby. Verify that the bench is well grounded.
3) Remove the adhesive backing from the supplied rubber feet. Attach the four rubber feet to the round recessed areas on the bottom of the Device.
4) Turn the Device over to make it right side up on the bench.
1.5 Connectin g the Device
Before you install the Device, please make sure your PC can connect to the Internet through your broadband service successfully. If there is any problem, please contact your ISP for help.
http://www.uttglobal.com Page 6
UTT Technologies Hardware Installation
After that, please install the Device according to the following steps (Here we use UTT AC750GW as an example). Don’t forget to pull out the power plug and keep your hands dry.
1) Power off your PC(s), Cable/DSL modem, and the Device.
2) Connect the Cable/DSL modem to the Device’s WAN port .
3) Connect one end of an Ethernet cable to one of the LAN ports on the Device, and the other end to a network port on a PC, hub, switch or wireless access point. Repeat this step to connect more PCs or other network devices to the Device.
4) Connect the power cord to the power port of the De v i ce. Then plug the other end of the power cord to a grounded AC power outlet.
5) Power on your network devices, PCs, Switches, Hubs, and so on.
Figure 1-2 Connecting the Device
http://www.uttglobal.com Page 7
UTT Technologies Logging to the Device
Pinging 192.168.1.1 with 32 bytes of data:

Chapter 2. Logging to the Device

This chapter describes how to configure TCP/IP settings on your computer, and how to login to the Device. In addition, it briefly describes the layout of the Device’s Web interface.
2.1 Configuring your computer
To configure the Device via Web UI, you need to properly configure TCP/IP settings on the computer that you use to manage the Device. To do this, please follow these steps:
Step 1 Connect the computer to a LAN port o f the Device, or connect the computer
to the Device through wireless.
Step 2 Install TCP/IP protocol on your computer. If it is already installed, please
skip this step.
Step 3 Configure TCP/IP settings as Obtain an IP address automatically and
Obtain DNS server address automatically. More information about how to configure
Step 4 Use the Ping command to verify network connectivity between the computer
and the Device. Open the command prompt on the computer, type
192.168.1.1, and then press Enter.
A successful ping will look like this:
TCP/IP, please refer to the chap ter: Appendix A FAQ.
ping
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Ping statistics for 192.168.1.1:
http://www.uttglobal.com Page 8
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
UTT Technologies Logging to the Device
Pinging 192.168.1.1 with 32 bytes of data:
An unsuccessful ping will look like this:
Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for 192.168.1.1: Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
If the Ping command is successful, the Device is working properly. If the Ping command fails, please do the following:
1) Check physical connection: Verify that the LAN LED on the Device and the LED on your computer’s network card are lit.
2) Check TCP/IP settin gs: Ver ify that your computer is on the same subnet as the Device’s LAN interface. E.g., if the Device’s LAN IP address is 192.168.1.1 (default), the computer’s IP address must be an unused IP address in the
192.168.1.0/24 subnet.
connection between the computer and the
2.2 Logging to the Device
No matter what operating system is installed on your computer, such as, M S Windows, Macintosh, UNIX, or Linux, and so on, you can configure the Device through the Web browser (e.g., Internet Explorer, Firefox).
Step 1: For local access to the Device’s web-based utility, launch your web browser, and enter the Device’s default IP address: the Enter key .
Step 2: A login screen prompts you for your Username and Password. Enter admin (case sensitive) in the Username field, and enter admin in the Password field. Then
Log In.
click
http://www.uttglobal.com Page 9
192.168.1.1, in the URL field. Then press
Figure 2-1 Address Bar
UTT Technologies Logging to the Device
Figure 2-2 Login Screen
Step 3: After login the Device, the first screen that appears is the Homepage.
Figure 2-3 Homepage
Homepage Description:
1) On the top right corner, there is UTT logo, model and version information, and quick link icons.
http://www.uttglobal.com Page 10
UTT Technologies Logging to the Device
(1) UTT Logo: Click to go to the home page on the UTT website. (2) Model, Hardware Version and Software Version: Displays the model number ,
software version and firmware version of the Device.
(3) Quick L ink Icons: Provide quick links to the corresponding pages on the UTT
website.
Product: Click to go to the products page on the UTT website to find
more products.
Forum: Click to go to the forum homepage on the UTT website to
participate in product discussions.
Feedback: Click to send us your feedback by email.
2) On left side there is a two-level main menu bar. You can click a first level menu item to reveal its submenu items, click again to hide them.
3) The main operating page is located in the center of the page, in which you can configure various functions, view the related configuration information and status information, etc.
4) The bottom of the page there is copyright information.
http://www.uttglobal.com Page 11
UTT Technologies Start Menu

Chapter 3. Start Menu

The Start menu is located in the upper left of the WEB interface, which provides you four commonly used functions: Restart Device. In this chapter, you can configure the basic parameters to access the Internet, view each physical interface’s detail information and restart the Device.
3.1 Setup Wizard
This section describes the Start > Setup Wizard page. The Setup Wizard will guide you to configure the basic parameters to quickly connect the Device to the Internet. Even unfamiliar with the product, you still can follow the instructions to complete the setup easily.
Setup Wizard, Interface Status, Interface Traffic, and
3.1.1 Running the Setup Wizard
The first page appears is Setup Wizard immediately after your first login.
Figure 3-1 Running the Setup Wizard
Do Not Automatically Launch Setup Wizard Again: If selected, the system doesn't
automatically launch the instead directly open the system will still launch the
Setup Wizard the next time you log into the Device,
System Information page(see Figur e 3-2). Else, the
Setup Wizard automatically.
Exit Wizard: Click to exit the Setup Wizard and go to the Sy ste m In fo rma tion page
(see Figure 3-2). The changes made in the
Next: Click to enter into the next page of the Setup Wizard.
http://www.uttglobal.com Page 12
Setup Wizard will be discarded.
UTT Technologies Start Menu
Figure 3-2 System Information
3.1.2 Setup Wizard - WAN1 Settings
There are three connection types you can configure for WAN Internet connection: PPPoE, Static IP and DHCP. For the detail information, you can refer to the chapter:
4.1 WAN.
Figure 3-3 Setup Wizard_WAN1 Settings
3.1.3 Setup Wizard - 2.4G Wireless
In this page, you can configure 2.4GHz basic wireless settings of the Device.
http://www.uttglobal.com Page 13
UTT Technologies Start Menu
Figure 3-4 Setup Wizard_2.4G Wireless Settings
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It must be between 1 and 32 characters long, and it is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11g
Only, 11n Only and 11b/g/n Mixed.
11g Only: Pure 802.11g mode, in which the maximum rate is up to 54Mbps.
The wireless clients in compliance with the IEEE 802.11g standard can be connected to the Device.
11n Only: Pure 802.11n mode, in which the maximum rate is up to 300Mbps.
The wireless clients in compliance with the IEEE 802.11n standard can be connected to the Device.
11b/g/n Mixed: The wireless clients in compliance with IEEE 802.11b,
802.11g or 802.11n standard will be connected according to their wireless modes, with the maximum rates of 11M bps, 54M bps and 300M bps respectively.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select the optimal frequency band. The wireless devices in the same frequency band w ill interfere with each other. If there are multiple wireless devices around the Device, please select a frequency band different from that of other wireless devices when setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission, with the options: 20M/40M and 20M. Note that this parameter works only with the wireless clients accessed using the 802.11n standard; for those using the 802.11b or 802.11g standard, only the channel bandwidth of 20M can be used:
20M/40M: If selected, the wireless clients accessed using the 802.11n
standard will use the channel bandwidths of 20M or 40M according to the results of the negotiation with the accessed peer device.
http://www.uttglobal.com Page 14
UTT Technologies Start Menu
20M: If selected, the wireless clients accessed by using the 802 .11g standar d
will use the channel bandwidth of 20M.
3.1.4 Setup Wizard - 5G Wireless
In this page, you can configure 5GHz wireless settings of the Device.
Figure 3-5 Setup Wizard_5G Wireless Settings
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It must be between 1 and 32 characters long, and it is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11a
Only, 11a/n Mixed, 11vht AC/AN/A and 11vht AC/AN.
11a Only: If selected, the wireless clients in compliance with the IEEE
802.11a standard can be connected to the Device.
11a/n Mixed: If selected, the wireless clients in compliance with the IEEE
802.11a and 802.11n standard can be connected to the Device.
11vht AC/AN/A : Very High Throughput IEEE 802.11ac and 802.11a Standard .
If selected, the wireless clients in compliance with the IEEE 802.11ac and
802.11a standard can be connected to the Device.
11vht AC/AN: Very High Throughput IEEE 802.11ac Standard. If selected,
the wireless clients in compliance with the IEEE 802.11ac standard can be connected to the Device.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select the optimal frequency band. The wireless devices in the same frequency band w ill interfere with each other. If there are multiple wireless devices around the Device,
http://www.uttglobal.com Page 15
UTT Technologies Start Menu
please select a frequency band different from that of other wireless devices when setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission. It provides automatic options, which means that the Device can automatically select the optimal channel bandwidth.
3.2 Interface Status
On the Start > Interface Status page, you can view the current status of all physical interface, including the type of interface, connection type, status, IP address, duration and so on.
Figure 3-6 Interface Status
3.3 Interface Traffic
The interface rate chart dynamically displays the real-time RX/TX rate, average RX/TX rate, maximum RX/TX rate and total RX/TX traffic of each physical interface. If you want to view the rate chart of an interface, click the corresponding interface name hyperlink.
In the interface rate chart, the abscissa (x-axis) shows the time axis, and the ordinate (y-axis) shows the real-time RX/TX rate axis. Furthermore, you can adjust some parameters of the chart if needed, such as the time interval during which the real-time rates are calculated and displayed, and the displayed colors.
Note: The rate chart can only show the rate and traffic information in the last ten
minutes. Each time you launch this page, the rate chart refreshes.
http://www.uttglobal.com Page 16
UTT Technologies Start Menu
Figure 3-7 Interface Status
RX: Displays the real-time RX rate of the physical interface, which refreshes
every two seconds. For the LAN interface, RX means uploading; for the WAN interface, it means downloading.
TX: Displays the real-time TX rate of the physical interface, which refreshes every
two seconds. For the LAN interface, TX means downloading; for the WAN interface, it means uploading.
Avg: Displays the average RX or TX rate of the physical interface since last
opened the current page.
Peak: Displays the maximum RX or TX rate of the physical interface since last
opened the current page.
Total: Displays the total RX or TX traffic of the physical interface since last
opened the current page.
LAN/WANx: Click the interface name hyperlink to view the rate chart of the
selected interface. Therein, x (value: 1, 2, 3, 4) indicates the corresponding WAN interface, and the number of WAN interfaces depends on the specific product model. For example, click the interface.
WAN1 hyperlink to view the rate chart of the WAN1
Note:
If the SVG Viewer isn’t installed on your PC, the rate chart cannot be displayed properly. To view the rate chart, click the cannot display properly.) hyperlink to download and install the SVG Viewer.
http://www.uttglobal.com Page 17
(Please install SVG viewer if the page
UTT Technologies Start Menu
3.4 Restart Device
On the Start > Restart Device page, you can restart the Device. Clicking the Restart button, the system will pop up a dialog. Then you can click the Device, or click the
Cancel button to cancel the operation.
Figure 3-8 Restart Device
Note: Because restarting the Device will disconnect all the sessions, please do it
with caution.
OK button to restart the
http://www.uttglobal.com Page 18
UTT Technologies Network Menu

Chapter 4. Network Menu

4.1 WAN
This section describes Network > WAN page, you can setup t he way to access the Internet. There are three connection types: automatically). Depending on which connection type you select, you will see various settings. We will describe the settings for each connection type respectively.
PPPoE, Static IP and DHCP (Obtain an IP
Figure 4-1 Select Connection Type
4.1.1 PPPoE Conn ec tion
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames. Most DSL-based Internet Service Providers (ISPs) use PPPoE to establish Internet connections for end-users. If you use a DSL line, check with your ISP to see if they use PPPoE, and then select
http://www.uttglobal.com Page 19
PPPoE.
UTT Technologies Network Menu
Figure 4-2 PPPoE Connection Setup
ISP Policy: Select the ISP Policy (i.e., route policy database) for each Internet
connection. Thus all traffic destined to an ISP’s servers will be forwarded through that ISP’s connection.
User Name and Password: Enter the PPPoE login username and password
provided by your ISP.
PPP Authentication: Specify the PPP authentication mode, available options:
NONE, PAP, CHAP and Either.
None: If selected, no protocol will be used.
PAP: If selected, PAP (Password Authentication Protocol) protocol will be
used for PPP authentication.
CHAP: If selected, CHAP (Challenge Handshake Authentication Protocol)
protocol will be used for PPP authentication.
Either: If selected, the Device will automatically negotiate with the peer
device to use PAP or CHAP protocol.
Dial Type: Select the type of dial connection, av ailable options are Always On, On
Demand and Manual.
Always On: If selected, the Device will establish a PPPoE session when
starting up and automatically re-establish the PPPoE session once disconnected.
http://www.uttglobal.com Page 20
UTT Technologies Network Menu
On Demand: If selected, the Device will est ablish a PPPoE session only
when there are packets requesting to access the Internet (i.e., when a program on your computer attempts to access the Internet).
Manual: If selected, you can dial or hang up a PPPoE session manually.
Dial Mode: If the PPPoE connection isn’t established successfully even using
correct username and password, you may try to use other modes.
Idle Timeout: Specify the during time the Device keeps the Internet connection
active after no traffic. Which means not terminate Internet connection when the value is zero.
MTU: When dialing, the Device will automatically negotiate MTU (maximum
transmission unit) with the peer device. Please leave the default value of 1480 bytes, unless you have a special application.
Advanced Options: Click to configure advanced parameters. In most case, you
need not configure them.
4.1.2 Static IP Connection
Some infrastructure situations have to use a static address, such as finding the Domain Name System (DNS) host where it is, the Device will translate domain names to IP addresses. Static addresses are convenient, but not absolutely necessary, to locate servers inside an enterprise.
If you are required to use a permanent IP address, select
Static IP.
Figure 4-3 Static IP Connection Setup
http://www.uttglobal.com Page 21
UTT Technologies Network Menu
ISP Policy: Select the ISP Policy (i.e., route policy database) for each Internet
connection. Thus all traffic destined to an ISP’s servers will be forwarded through that ISP’s connection.
IP Address: Enter the IP address for the Device’s WAN interface, which is
provided by your ISP.
Subnet Mask: Enter the subnet mask for the Device’s WAN interface, which is
provided by your ISP.
Gateway IP: Enter the IP address for the default gateway, which is provided by
your ISP.
Primary DNS Server: Enter the IP address of your ISP’s primary DNS server.
Secondary DNS Server: Enter the IP address of your ISP’s secondary DNS
server if it is available.
4.1.3 DHCP Connec tion
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on IP networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP, c omputers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually.
If your ISP automatically assigns an IP address, select subscribers use this connection type.
DHCP. Most cable modem
Figure 4-4 DHCP Connection Setup
4.1.4 Internet Connection List
When you have configured the Internet connection, you can view its status in the
http://www.uttglobal.com Page 22
UTT Technologies Network Menu
Internet Connection List. Click Refresh button to view the current status of the connection.
Figure 4-5 Internet Connection List
Interface: Displays the name of the physical interface to which the connection is
bound.
Connection Type: Displays the type of the Internet connection.
Status: Displays the current status of the Internet connection. If the connection is
successful, it displays Connected, else it displays Disconnected. When the status is connected in PPPoE mode, it will also display the elapsed time (day: hour: minute: second) since connected. And when the status is connected in DHCP mode, it will also display the time left before the lease expires (day: hour: minute: second) for current IP address, which is assigned by your ISP’s DHCP server.
IP Address, Subnet Mask and Gateway IP: When the connection type is PPPoE
or DHCP, it displays the IP Address, Subnet Mask and Gateway IP provided by ISP. When the connection type is Mask and Gateway IP you set.
Rx Rate(bps): Displays the current download rate of the connection between the
refresh interval.
Tx Rate(bps): Displays the current upload rate of the connection between the
refresh interval.
Static IP, it displays the IP Address, Subnet
4.1.5 Edit the Connection
If you want to edit the connection, do the following:
Step 1 In the Internet Connection List, click the WAN interface hyperlink, th e
related information will be displayed in the setup fields.
http://www.uttglobal.com Page 23
UTT Technologies Network Menu
Step 2 Modify the connection settings.
Step 3 Click the Save button to save the settings.
4.1.6 Delete the Connection
If you want to delete the connection, do the following:
Step 1 In the Internet Connection List, click the related WAN hyperlink, the related
information will be displayed in the setup fields.
Step 2 Click the Delete button below the Internet Connection List.
Step 3 In the pop-up window, click the OK button to delete the connection.
Note: The default WAN1 connection can’t be deleted but edited.
4.1.7 Dial or Hang up a PPPoE connection
If the connection type is PPPoE, when you click the WAN1 hyperlink, the Connect, Disconnect and Refresh buttons will be shown on the Internet Connection List.
Note:
1) If you have chosen Manual as Dial Type for PPPoE connection, you need to click
Connect button to dial-up the Internet connection and click the Disconnect
the button to hang it up.
2) Click the Refresh button to view the current status of the connection.
Figure 4-6 Internet Connection List_PPPoE Connection
http://www.uttglobal.com Page 24
UTT Technologies Network Menu
4.1.8 Renew or Release a DHCP Connection
If the connection type is DHCP, when you click the WAN1 hyperlink, the Renew, Release and Refresh buttons will be shown on the Internet Connection List.
Click the the Click the
Renew button to re-acquire an IP address from the ISP’s DHCP server. Click
Release but ton to release the IP address obtained from the ISP’s DHCP server.
Refresh button to view the current status of the connection.
Figure 4-7 Internet Connection List - DHCP Connection
4.2 Load Balancing
This section describes the Network > Load Balancing page. When using multiple Internet connections, you can configure load balancing related parameters, such as load balancing mode, detection interval, retry times, and ID binding, and so on.
4.2.1 Internet Connection Detection Mechanism
When using multiple Internet connections, the Device should have the ability to real-time monitor each Internet connection to ensure the network will not be interrupted even a connection is faulty. To this end, we design flexible automatic detection mechanism on the Device and provide multiple detection methods to meet the actual requirements.
For the sake of convenience, we firstly introduce several parameters.
Detection T ar get IP: The IP addres s o f a target device. The Device will monitor an Internet connection by sending the detection packets to the specified target IP address.
Detection Interval: The time interval at which the Device periodically sends detection packets, one packet at a time. Especially, if you don’t want to monitor an
http://www.uttglobal.com Page 25
UTT Technologies Network Menu
Internet connection, please set it as 0.
Retry Times: The number of retries per detection period.
For a normal Internet connection and a faulty Internet connection, the detection mechanisms are different.
For a faulty normal Internet connection, the detection mechanism is as follows: The Device periodically sends a detection packet at th e speci fied time inte rv al t o the target IP address. Once no response packet received during a detection period, the Device will consider that the connection is faulty and shield it immediately. For example, by default, if the Device has sent three detection packets but not received any response packet during a detection period, it will consider that the connection is faulty.
For a normal Internet connection, the detection mechanism is as follows: Similarly, the Device also periodically sends a detection packet at the specified time interval to the target IP address. Once more than half of the response packets received during a detection period, the Device will consider that the connection is back to normal and enable it immediately. For example, by default, if the Device has sent three detection packets and received two packets during a detection period, it will consider that the connection is back to normal.
Note: If you don’t want to monitor an Internet connection, please set the value of
Detection Interval as 0.
4.2.2 Global Settings
The Device provides two connection groups: primary connection group and backup connection group. An Internet connection belonging to the primary connection group is a primary connection while an Internet connection belonging to the backup connection group is a backup connection. By default, all the Internet connections are primary connections. It allows you to divide one or more connections into the backup connection group.
The Device provides two load balancing modes: Balancing.
If you choose to use primary connections. The operation principle is as follows:
1) If all the Internet connections are normal, the LAN users will use these connections to access the Internet.
Full Load Balancing, all the Internet connections are used as
Full Load Balancing and Partial Load
2) If an Internet connection is faulty, the Device will shield it immediately, and the traffic through the faulty connection will be distributed to other normal conne ctions automatically.
http://www.uttglobal.com Page 26
UTT Technologies Network Menu
3) Once the faulty connection is back to normal, the Dev ice will enable it immediately, and the traffic will be redistributed automatically.
If you choose to use Partial Load Balancing, some Internet connections are used as primary connections, and others are used as backup connections. The operation principle is as follows:
1) As long as one or more primary connections are normal, the LAN users will use the primary connection(s) to access the Internet. In this case, if there is more than one primary connection, the Device will control and balance the traffic among these connections.
2) If all the primary connections are faulty, it will automatically switch to the backup connection(s) to let the LAN users use them to access the Internet. In this case, if there is more than one backup connection, the Device will control and balance the traffic among these connections.
3) Once one or more faulty primary connections are back to normal, it will automatically switch back to the primary connection(s).
Note: During connections switching, some user appl ications (such as some online
games) may be interrupted unexpectedly due to the nature of TCP connection. UTT Technologies Co., Ltd. will not bear all the losses and legal
caused by it.
proceedings
4.2.2.1 Full Load Balancing
Select the Full Load Balancing check box and click the Save button to save the settings.
Figure 4-8 Full Load Balancing
4.2.2.2 Partial Load Balancing
Select the Partial Load Balancing check box and then set primary connection and backup connection, lastly, click the
http://www.uttglobal.com Page 27
Save button to save the settings.
UTT Technologies Network Menu
Figure 4-9 Partial Load Balancing
Mode: Specify the mode of load balancing. Here please select Partial Load
Balancing.
Primary: Specify the primary connection group. An Internet connection in the
Primary list box is a primary connection.
Backup: Specify the backup connection group. An Internet connection in the
Backup list box is a backup connection.
==>: Select one or more Internet connections in the Primary list box, and then
click
==> to move the selected connection(s) to the Backup list box.
<==: Select one or more Internet connections in the Backup list box, and then
click
<== to move the selected connection(s) to the Primary list box.
4.2.3 Load Balancing List
When you have configured load balancing parameters for one or more Internet connections, you can view the related configuration and status information in the Balancing List.
If you want to modify the detection related parameters, click its related information will be displayed in the configure or modify it, and click the
Save button.
Detection and Bandwidth page. Then
Edit hyperlink, the
Load
http://www.uttglobal.com Page 28
UTT Technologies Network Menu
Figure 4-10 Load Balancing List
4.2.4 Detection and Bandwidth
In the Network > Load Balancing > Detection and Bandwidth page, you can configure the connection detection related parameters for each Internet connection respectively.
Figure 4-11 Detection and Bandwidth Settings
Interface: Select the physical interface you want to set load balancing.
Detection Interval: Specify the time interval at which the Device periodically sends
detection packets, one packet at a time. The value should be between 1 and 60 seconds, or 0. 0 means that connection detection is disabled on the selected Internet connection.
Retry Tim e s: Specify the number of retries per detection period.
http://www.uttglobal.com Page 29
UTT Technologies Network Menu
Detection Target: The IP address of a detection target device. The Device will
monitor an Internet connection by sending the detection packets to the detection target IP address. If you select Device will send the detection packets to the selected Internet connection’s default gateway; If you select to enter an appropriate public IP address in the associated text box, then the Device will send the detection packet to this IP address.
Bandwidth: Specify t he bandwidth of this interface provided by ISP.
Gateway IP Address from the drop-down list, the
Other IP Address from the drop-down list, you need
4.2.5 Identity Binding
When using multiple Internet connections, the same application will be assigned to the different connections, thus some applications (such as online banking, QQ, etc.) cannot be used normally due to the identity change. We provide ID binding feature to solve this problem: After you enable Identity Binding, the Device will assign the same application to the same Internet connection. For example, when a LAN user logs in to an online banking system, if the first session is assigned to the WAN2 Internet connection, henceforth all the subsequent NAT sessions of the online banking application will be assigned to the WAN2 connection until the user logs out.
Figure 4-12 Identity Binding
Enable ID Binding: If selected, you will enable ID binding feature for some
applications such as online banking, QQ, etc.
4.3 LAN
This section describes Network > LAN page. Y ou can set up to four IP addresses for the LAN interface. With the IP address o f LAN interface, you can log into the Device. If the IP address has been changed, you need to re-login to the Device using the new address.
http://www.uttglobal.com Page 30
UTT Technologies Network Menu
Figure 4-13 LAN Settings
IP Address: Specify the IP address of the LAN interface. The default value is
192.168.1.1.
Subnet Mask: Specify the subnet mask that defines the range of the LAN. The
default value is 255.255.255.0.
MAC Address: The MAC address of the LAN interface. We recommend that you
do not change the default value unless absolutely necessary.
Interface Mode: Specify the speed and duplex mode of the LAN interface. The
Device supports five or six modes (Note that only the gigabit LAN interface supports Half-Duplex), 100M-FD (100M Full-Duplex), and 1000M-FD (1000M Full-Duplex). In most cases, please leave the default value. If a compatibility problem occurred, or the network device connected to the LAN interface doesn’t support auto-negotiation function, you may modify it as required.
1000M-HD), which include Auto (Auto-negotiation), 10M-HD (10M
10M-FD (10M Full-Duplex), 100M-HD (100M Half-Duplex),
Note:
1) You can assign two IP addresses to the Device’s LAN interface to connect two subnets. The hosts on the two subnets can communicate with each other.
2) If you have changed the LAN IP address and saved the change, you should use the new IP address to re-login to the Device. And the default gateway of each LAN host should be changed to this new IP address, thus the LAN hosts can access the Device and Internet.
http://www.uttglobal.com Page 31
UTT Technologies Network Menu
4.4 DHCP Server
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP allows a host to be configured automatically, eliminating the need for intervention by a network administrator. The Dev ice can act as a DHCP serv er to assign network addresses an d deliver other TCP/IP configuration parameters (such as gateway IP address, DNS server IP address, etc.) to the LAN hosts.
4.4.1 DHCP Server Settings
The DHCP server assigns an IP address to a requesting client from a DHCP address pool, which also can be configured to provide other TCP/IP configuration parameters to the client, such as the DNS Server, gateway IP address, etc.
Figure 4-14 DHCP Server Settings
http://www.uttglobal.com Page 32
UTT Technologies Network Menu
Enable DHCP Server: Select to enable DHCP server.
Start and End IP Address: Specify the range of IP addresses assigned to DHCP
clients. The range of IP addresses must be on the same subnet as the LAN interface of the Device, and cannot include the IP address of the LAN interface.
Subnet Mask: The subnet mask address assigned by the DHCP server to the
intranet computers automatically. This subnet mask must match the subnet mask of the LAN interface.
Gateway IP: Specify the gatew ay IP address assigned by the DHCP server to th e
intranet computers automatically. This gateway IP address must mat ch the gateway IP address of the LAN interface.
Lease Time: The leasing time for the network computers to obtain the IP address
assigned by the Device (Unit: Seconds).
Primary DNS Server: The primary DNS server IP address assigned by the DHCP
server to the Intranet computers automatically.
Secondary DNS Server: The secondary DNS server IP address assigned by the
DHCP server to the Intranet computers automatically.
Option 43: By modifying the variable length fields of option 43 attribute in the
DHCP protocol packets which is used to carry the IP address of AC, AP analyze the AC address carried by option 43 to discover AC. The available options are Disable, HEX Length, ASCII Length, and Customized.
AC Address: The IP address of AC.
Enable DNS Proxy: Select to enable DNS Proxy. When acting as a DNS proxy,
the Device listens for incoming DNS requests on the LAN interface, relays the DNS requests to the current public network DNS servers, and replies as a DNS resolver to the requesting LAN hosts.
ISP DNS Server 1 or ISP DNS Server 2: Specify the IP address of ISP’s DNS
server that is available to a DHCP client.
Note:
1) If the DHCP Server is enabled, the LAN computer could obtain an IP address and other TCP/IP parameters from the Device’s built-in DHCP server aft er setting the way of computer’s getting IP address as "obtain an IP address automatically".
2) If the DNS proxy is enabled on the Device, in order to use DNS proxy service normally, the LAN hosts’ primary DNS server needs to be set same to the Device’s LAN IP address. Note: If the DHCP server is also enabled on the Device, the Device will assign its LAN IP address as the primary DNS server address to the LAN hosts automatically.
3) To ensure that the DNS proxy works well, you should at least specify the primary
http://www.uttglobal.com Page 33
UTT Technologies Network Menu
DNS server provided by your ISP on the Device. It is obvious that you can specify the secondary DNS server provided by your ISP.
4) The Device can act as a DNS proxy server to all LAN users; this greatly simplifies the LAN hosts setup. For example, there is a LAN DNS proxy server on which a DNS proxy software is installed (e.g., Wingate), and the LAN users take this server’s IP address as the primary DNS server address. Now, the Device will be used as a new gateway for the LAN hosts. In this case, in order to use DN S prox y service normally, the administrator only need change the Device’s LAN IP address to the old proxy DNS server’s IP address, and enable DNS proxy on the Device, without modifying the LAN hosts’ related settings.
4.4.2 Static DHCP
This section describes the static DHCP list and the way to configure a static DHCP.
Using the DHCP Server to automatically configure TCP/IP properties for the LAN computers is very convenient, but it can cause a computer to be assigned with different IP address at different times. Some Intranet computers may need a fixed IP address; in this case, the static DHCP function is required, to bind the computer's MAC address with an IP address. As shown in Figure 4-15, when a computer with 00E06108A443 as MAC address requests the IP address from the DHCP server, the DHCP server will find a corresponding fixed IP address (192.168.1.101) based on its MAC address and assign it to the computer.
4.4.2.1 Static DHCP List
You can add, view, modify and delete static DHCP entries on the Network > DHCP Server > Static DHCP page.
Figure 4-15 Static DHCP List
http://www.uttglobal.com Page 34
UTT Technologies Network Menu
4.4.2.2 Static DHCP Settings
Click the Add button on the page as shown in Figure 4-15 to enter into the Static DHCP Settings page as shown below, and then configure it.
Figure 4-16 Static DHCP settings
User Name: Specify a unique name for the static DHCP entry.
IP Address: Specify the reserved IP address, which must be the valid IP address
within the range of IP addresses assigned by the DHCP server.
MAC Address: Specify the MAC address of the computer to use this reserved IP
address in a fixed way.
Note:
1) After the setting is successful, the Device will assign the preset IP address for the specified computer in a fixed way.
2) The assigned IP addresses must be within the range provided by the DHCP server.
4.4.3 DHCP Auto Binding
If the hosts change frequently on the local area network, it is very troublesome to configure static DHCP entries manually. And it will cause some user s who c an’t acce ss the Device and Internet. To deal with these issues, the Device provides DHCP auto-binding feature.
Once the DHCP auto binding is enabled, the Device will immediately scan the LAN to detect active hosts connected to the Device, learn dynamic ARP information and bind the related valid IP and MAC address as a static DHCP entry.
http://www.uttglobal.com Page 35
UTT Technologies Network Menu
Figure 4-17 DHCP Auto Binding
Enable DHCP Auto Binding: If selected, once a LAN host obtains an IP address
from the Device that acts as a DHCP server, the Device will immediately bind the host’s IP and MAC address as a static DHCP entry.
Enable DHCP Auto Deleting: If selected, the Device will automatically delete the
static DHCP entry when the corresponding host releases the IP address initiatively or its lease time expires.
4.4.4 DHCP Client List
When acting as a DHCP client, the Device can dynamically obtain an IP address and other TCP/IP configuration parameters from a DHCP server. The information of those DHCP clients who have obtained an IP address and other TCP/IP configuration parameters will be display in the DHCP server assigns the IP address of 192.168.1.100 in the address pool to the network computers whose MAC address is 74:D4:35:47:26:74, and the rest of the time for the computer to lease this IP address is 3,574 seconds.
DHCP Client List. Such as in the following figure, the
Figure 4-18 DHCP Client List
http://www.uttglobal.com Page 36
UTT Technologies Network Menu
4.4.5 Example of DHCP
1) Requirements
In this case, the DHCP function must be enabled on the Device, with the start IP Address as 192.168.1.10, and a total of 50 addresses can be assigned; here, the host with the MAC address of 00:21:85:9B:45:46 assigns the fixed IP address of
192.168.1.15, and the host with the MAC address of 00:1F:3C:0F:07:F4 assigns the
fixed IP address of 192.168.1.10.
2) Configuration Steps
Step 1 Go to Network > DHCP Server > DHCP Server Settings page. Step 2 Select Enable DHCP Server, enter 192.168.1.10 and 192.168.1.59 in the
Start IP Address and End IP Address text box, configur e other parameters as required, and click the
Save button at the end of configuration.
Figure 4-19 DHCP Server Settings_Example
Step 3 Go to Network > DHCP Server > Static DHCP page and click the Add
button.
Step 4 Configure the two static DHCP instances in the request, as shown the
following two figures.
Figure 4-20 Static DHCP Settings_Example A
http://www.uttglobal.com Page 37
UTT Technologies Network Menu
Figure 4-21 Static DHCP Settings_Example B
At this point, the configuration is complete, and you can view the information about 2 static DHCP entries in the
Static DHCP List as shown in the following figure.
Figure 4-22 Static DHCP List_Example
4.5 DDNS
Dynamic Domain Name Service (DDNS) is a service used to map a domain name which never changes to a dynamic IP address which may change quite often. For example, if you have applied PPPoE connection with dynamically assigned IP address from the ISP, you can use DDNS to allow the external computers to access the Device by a static domain name.
In order to use DDNS service, you need to register an account with a DDNS provider. Each DDNS provider offers its own specific network services. The DDNS service provider reserves the right to change, suspend or terminate your use of some or all network services at any time for any reason. The DDNS service providers supported by UTT Technologies currently provide free DDNS services, but they may charge for the DDNS services in the future. In this case, UTT Technologies will notify you as soon as possible; if you refuse to pay for the services, you will no longer be able to use them. During the free phase, UTT Technologies does not guarantee that the DDNS services can meet your requirements and will be uninterrupted, and UTT does not guarantee the timeliness, security and accuracy of the services.
http://www.uttglobal.com Page 38
UTT Technologies Network Menu
So far, UTT Technologies Co., Ltd. only supports two DDNS service providers by no-ip.com and dyndns.org. It will successively support other DDNS service providers in the future.
4.5.1 DDNS Service provided by no-ip.com
1) Register a Domain Name with no-ip.com
Please login to no-ip.com.
2) DDNS Settings – no-ip.com
Service Provider: Select the DDNS service provider who offers services to the
Device. Here please select
http://www.noip.com/
Figure 4-23 DDNS_no-ip.com
no-ip.com.
to register a doma in name with the suffi x of
Host Name: Specify the host name of the Device. User Name: Enter the username of the account. It should be the same with the
username that you entered when registering the DDNS account.
Password: Enter the key that you got when registering the DDNS account.
4.5.2 DDNS Service provided by dyndns.org
1) Register a Domain Name with no-ip.com
Please login to dyndns.org.
2) DDNS Settings –dyndns.org
http://www.uttglobal.com Page 39
http://www.dyndns.org
to register a domain name with the suffix of
UTT Technologies Network Menu
Figure 4-24 DDNS_dyndns.org
Service Provider: Select the DDNS service provider who offers services to the
Device. Here please select
dyndns.org. Host Name: Specify the host name of the Device. User Name: Enter the username of the account. It should be the same with the
username that you entered when registering the DDNS account.
Password: Enter the key that you got when registering the DDNS account.
4.5.3 DDNS Verification
To verify whether DDNS is updated successfully, you can use the ping command at the command prompt on the PC (for example
If the displayed page is similar to the screenshot below, t he dom ain name is resolved to an IP address successfully (58.246.187.126 in this example), that is, DDNS is updated successfully.
ping avery12345.3322.org).
Note:
http://www.uttglobal.com Page 40
UTT Technologies Network Menu
1) If your ISP assigns a private IP address (192.168.x.x, 10.x.x.x, or 172.16.x.x) instead of a public IP address to the Device, DDNS will not work.
2) DDNS feature can help you implement VPN tunnels using dynamic IP addresses on the Device.
4.6 UPnP
The Universal Plug and Play (UPnP) is an architecture that implements zero configuration networking, that is, it provides automatic IP configuration and dynamic discovery of the UPnP compatible devices from various vendors. A UPnP compatible device can dynamically join a network, obtain an IP address, announce its name, convey its capabilities upon request, and learn about the presence and capabilities of other devices on the network.
The Device can implement NAT traversal by enabling UPnP. When you enable UPnP, the Device allows any LAN UPnP-enabled device to perform a variety of actions, including retrieving the public IP address, enumerate existing port mappings, and add or remove port mappings. By adding a port mapping, a UPnP-enabled device opens the related service ports on the Device to allow the Internet hosts access. Windows Messenger is an example of an application that supports NAT traversal and UPnP.
The Device provides rules established using UPnP. You can view each port forwarding information in the list, which includes internal IP address, internal port, protocol, remote IP address, external port, and description.
the UPnP Port Forwarding List, which lists all the port forwarding
rule’s detailed
Figure 4-25 UPnP
http://www.uttglobal.com Page 41
UTT Technologies Network Menu
4.7 Number of WAN
On the Network > Number of WAN page, you can set the number of WAN interface. Select the number of WAN interface and click the
Figure 4-26 Number of WAN Settings
Note:
1) After the number of WAN interface is changed, you need to restart the Device for the setting take effect.
Save button to save the settings.
2) After the Device restart, all customer settings will be reset to the factory default settings.
http://www.uttglobal.com Page 42
UTT Technologies Wireless Menu

Chapter 5. Wireless Menu

This chapter describes how to configure and use the 2.4GHz wireless features of the Device. You can access to the 2.4GHz wireless application by clicking
5.1 Basic
In the Wireless > Basic page, you can configure the AP operation mode, SSID, wireless mode, wireless mode, channel, channel bandwidth, enabling or disabling the SSID broadcast and other functions of the Device.
WDS (Wireless Distribution System) is a protocol for two access points (AP) in wireless connection. Throughout the WDS wireless network, multiple APs are connected by the way of bridging or repeater, make the entire LAN be dominated by wireless mode.
Wireless menu.
The WDS configuration provided by the Device consists of three modes: Bridge Mode, Repeater Mode and Lazy Mode, which only plays a bridging function in the practical application. Note: In the configuration, the LAN IP of the device must be in the same network segment while the parameters for security mode and channel bandwidth for connecting with each other must be consistent.
The par ameters of the Basic page will be introduced in the order of four kinds of working mode, AP mode, Repeater mode, Bridge mode, Lazy mode.
http://www.uttglobal.com Page 43
UTT Technologies Wireless Menu
5.1.1 AP Mode
Figure 5-1 AP Mode
Enable Wireless: Select to open 2.4GHz Wireless network.
Operation Mode: Select AP Mode (namely the pure AP mode), in which the peer
device can be a single client.
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11g
Only, 11n Only, 11b/g/n Mixed and 11g/n Mixed.
1 1g Only: pure 802.11g mode, in which the maximum rate is up to 54Mbps.
The wireless clients in compliance with the IEEE 802.11g standard can be connected to the Device.
11n Only: pure 802.11n mode, in which the maximum rate is up to 300Mbps.
The wireless clients in compliance with the IEEE 802.11n standard can be connected to the Device.
11b/g/n Mixed: The wireless clients in compliance with IEEE 802.11b, 802.11g
or 802.11n standard will be connected according to their wireless modes, with the maximum rates of 11M bps, 54M bps and 300M bps respectively.
http://www.uttglobal.com Page 44
UTT Technologies Wireless Menu
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select the optimal frequency band. The wireless devices in the same frequency band w ill interfere with each other. If there are multiple wireless devices around the Device, please select a frequency band different from that of other wireless devices when setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission, with the options: Auto, 20M and 40M. Note that this parameter works only with the wireless clients accessed using the 802.11n standard; for those using the 802.11b or 802.11g standard, only the channel bandwidth of 20M can be used:
Auto: If selected, the wireless clients accessed using the 802.11n standard
will use the channel bandwidths of 20M or 40M according to the results of the negotiation with the accessed peer device.
20M: If selected, the w ireless clients accessed by using the 802 .11g standard
will use the channel bandwidth of 20M.
40M: If selected, the wireless clients accessed by using the 802.11n standard
will use the channel bandwidth of 40M.
Enable SSID Broadcast: If enabled, the Device will broadcast its own SSID to all
the wireless clients to be able to connect to the Device, and access to the wireless network with this SSID identifier. This function is enabled at risk, illegal sites are very easy to get the SSID information, so it is generally recommended to disable this function.
Notes:
1) The wireless function has been enabled by default and its work mode is AP Mode.
2) After the wireless parameters are modified, the device will disconnect all wireless connections.
5.1.2 Repeater Mode
The Device in Repeater Mode can exchange data with single clients and the network devices in Bridge Mode, Repeater Mode, Lazy Mode.
http://www.uttglobal.com Page 45
UTT Technologies Wireless Menu
Figure 5-2 Repeater Mode
For the parameter’s meaning of Enable Wireless, Operation Mode, SSID, Wireless Mode, Channel, Channel Width, Enable SSID Broadcast, please refer to t he section:
5.1.1 AP Mode.
AP MAC Address: Specify the MAC address of the peer device. Security Mode: The encryption mode used in the establishment of a connection
through the WDS function, including four options:
None, WEP, TKIP and AES.
None: If selected, no encryption algorithms will be used to protect
communication data in the data exchange process.
WEP: If selected, the WEP encryption algorithm will be used to protect data
during the data exchange process. For details, please refer to the section:
5.2.1 WEP.
TKIP: If selected, the TKIP encryption algorithm will be used to protect data
during the data exchange process. For details, please refer to the section:
5.2.3 WPA-PSK/WPA2-PSK.
AES: If selected, the AES encryption algorithm is used to protect data during
http://www.uttglobal.com Page 46
UTT Technologies Wireless Menu
the data exchange process. For details, please refer to the section: WPA-PSK/WPA2-PSK.
5.2.3
5.1.3 Bridge Mode
The Device in Bridge Mode is connected to two or more wired networks, and the device will no longer send wireless signals to other clients. The Device in Bridge mode could exchange data with the devices in Bridge Mode, Repeater Mode, Lazy Mode. The meaning of related configuration parameters is the same as the Repeater Mode.
Figure 5-3 Bridge Mode
5.1.4 Laz y Mode
The Device in Lazy Mode can exchange data with single clients and network devices in the Repeater Mode and Bridge Mode. The meaning of related configuration parameters is the same as AP Mode and Repeater Mode.
http://www.uttglobal.com Page 47
UTT Technologies Wireless Menu
Figure 5-4 Lazy Mode
5.2 Security
To ensure the security of your wireless network, it is strongly recommended to configure your wireless password. Go to wireless security mode separately.
There are four kinds of security mode you can use on your wireless network, which are
None, WEP, WPA/WPA2, WPA-PSK/WPA2-PSK. If you want client access to the network without security authentication, please choose the default value On the next section, we will introduce anot her three types of security mode.
5.2.1 WEP
Wired Equivalent Privacy (WEP) is the basic encryption mode which is not as secure as WPA.
Wireless > Security page to configure
None.
http://www.uttglobal.com Page 48
UTT Technologies Wireless Menu
Figure 5-5 Security mode_WEP
Authentication Type: Select the authentication type under WEP security mode.
The Device must authenticate a wireless client before the client can join the wireless network. There are three options:
Auto, Open System and Shared Key.
Auto: Select to allow the Device automatically choose Open System or
Shared key mode according to the requests of wireless clients.
Open System: At this point, the wireless client host can pass the
authentication and be associated with the wireless devices on the premise of providing no authentication key; but a correct key must be provided if data transmission is to be made.
Shared key: At this point, the wireless client host must provide the correct key
to pass the authentication; otherwise, it cannot be associated with the wireless devices, and cannot perform data transmission.
Key Format: Select the format for entering the WEP keys. The options are Hex
and
ASCII.
Hex: Select it to enter the WEP keys in hexadecimal format. Hexadecimal
digits are a set of characters that includes numbers 0 through 9 and letters A through F (or a through f). Hex WEP keys are case insensitive.
ASCII: Select it to enter the WEP keys in ASCII format. ASCII WEP keys are
case sensitive.
Default Tx Key: Select one of the WEP keys as the default transmitting key to
transmit data. All keys can be used to receive data.
WEP Key: Enter a key in one of the WEP Key boxes. You can enter up to four
WEP keys. You should enter a key according to the
Key Format and Key Type
selected.
For 64-bit encryption, enter 10 hex characters or 5 ASCII characters.
http://www.uttglobal.com Page 49
UTT Technologies Wireless Menu
For 128-bit encryption, enter 26 hex characters or 13 ASCII characters.
Key Type: Select the size of each key, and it also allows you to disable or enable
each key. The options are selected, which means the key is of no effect.
Disabled, 64-bit and 128-bit. By default, Disabled is
5.2.2 WPA/WPA2
Wi-Fi Protected Access (WPA ) and Wi-Fi Protected Access II (WPA2) are two security
protocols and security certification programs to secure wireless computer networks. In
WPA/WPA2 mode, the Device uses an external RADIUS server to authenticate wireless clients.
Figure 5-6 Security mode_ WPA/WPA2
WPA Mode: Select the WPA mode you want to use. The options are Auto, WPA
and WPA2:
Auto: If selected, the Device can automatically choose WPA or WP A2 security
mode according to the requests of wireless clients.
WPA: If selected, the Device will use the security mode of WPA.
WPA2: If selected, the Device will use the security mode of WPA2.
Encryption Method: Select the encryption method you want to use. The options
are
Auto, TKIP and AES.
Auto: If selected, the Device automatically chooses encryption method for
each wireless client.
TKIP: If selected, the Device will use TKIP for data encryption.
AES: If selected, the Device will use AES for data encryption.
http://www.uttglobal.com Page 50
UTT Technologies Wireless Menu
Radius Server IP: Specify the IP address of the RADIUS server, which is used to
authenticate wireless clients.
Radius port: The service port number used by the Radi us server for authenticating
wireless hosts. The valid range is 1 to 65535, and the default value is 1812.
Shared Secret: Specify the password used for authentication between the Device
and RADIUS server.
Key Renewal Interval: Specify the value of frequency (in seconds) the WPA group
key changes. Value range is 60 ~ 86400 seconds. The default value is 3600 seconds, which means no update when the value is 0.
5.2.3 WPA-PSK/WPA2-PSK
This mode intends for the wireless network that doesn’t have a RADIUS server. In this mode, the Device uses the pre-shared key that is manually entered to generate encryption keys.
Figure 5-7 Security mode_ WPA-PSK/WPA2-PSK
WPA Mode: Specify the WPA mode the Device will use:
Auto: If selected, the Device can automatically choose WPA-PSK or
WPA2-PSK security mode according to the requests of wireless clients.
WPA-PSK: If selected, the Device will use the security mode of WPA-PSK.
WPA2-PSK: If selected, the Device will use the security mode of WPA2-PSK.
Encryption Method: Specify the security algorithm used to encrypt wireless data,
with the options like
Auto: If selected, the Device will automatically choose encryption algorithms
according to needs.
TKIP: If selected, the Device will use TKIP as the encryption algorithm.
AES: If selected, the Device will use TKIP as the encryption algorithm.
Auto, TKIP and AES.
http://www.uttglobal.com Page 51
UTT Technologies Wireless Menu
Pre-shared Key: The preset initialization key, with the value of 8 ~ 63 characters. Key Renewal Interval: Key Renewal Interval: Specify the value of frequency (in
seconds) the WPA group key changes. Value range is 60 ~ 86400 seconds. The default value is 3600 seconds, which means no update when the value is 0.
5.3 MAC Filtering
This section describes the Wireless > MAC Filtering page. The MAC address filtering is used to filter the wireless clients based on their MAC addresses. With this feature, you can either allow or block specific wireless clients to connect to the Device.
Figure 5-8 MAC Filter
Enable MAC Address Filtering: Select to enable MAC address filtering. Filtering Mode: Select the mode of MAC address filtering.
Only allow MAC addresses list ed belo w: If selected, the wireless clients with
MAC address listed in but block all other wireless clients.
Only block MAC addresses listed below: If selected, the wireless clients with
MAC address listed in but allow all other wireless clients.
MAC Address Filtering List: Display all the MAC Filter entry you have set.
http://www.uttglobal.com Page 52
MAC Filter List will be allowed to connect the Device,
MAC Filter List will be blocked to connect the Device,
UTT Technologies Wireless Menu
Add: Click to enter into MAC Address Filtering Settings page to configure the
MAC addresses to be filtered.
Figure 5-9 Configuration of MAC address filtering
5.4 Advanced
On the Wireless > Advanced page, you can setup advanced parameters of the wireless mode, such as RTS Threshold, Fragmentation Threshold, and so on. In most case, you can keep it as the default value but you have special needs.
Figure 5-10 Advanced Wireless Settings
RTS Threshold: Specify the value of RTS Threshold. Value range is 1~2347 bytes,
and the default is 2347 bytes. Typically, sending RTS/CTS frames does not occur
unless the packet size exceeds this threshold. If the packet size that the node wants to transmit is larger than the threshold, the RTS/CTS handshake gets triggered. The process of transmitting data is as following :
1) Device A (for example) initiates the process by sending a R equest to Sent
(RTS) to Device B (for example).
2) Device B replies with a Clear To Send (CTS).
3) After receiving CTS, Device A sends data.
RTS/CTS is the optional mechanism used by the 802.11 wireless networking
http://www.uttglobal.com Page 53
UTT Technologies Wireless Menu
protocol to reduce frame collisions introduced by the hidden node problem. The value of RTS Threshold should be set reasonably. The smaller the value is, the higher the frequency of the Device sends RTS frames are. Obviously, it will influence the throughput, but it will be faster recovering from interrupt and data collision.
Fragmentation Threshold: Specify the maximum length of wireless data packet
allowed to transmit on MAC layer. When the length of Data frames exceeds this value, they will automatically be segmented into multiple data frames, and then transmitted again. If the fragmentation transmission is interrupted, only the parts that are not sent successfully need to be sent, and the throughput of fragmentation packets is generally low. Value range is 256~2346 bytes, and the default is 2346 bytes.
Beacon Interval: The Device synchronizes with the wireless network by
periodically broadcasting a beacon frame. This parameter is used to specify the transmission interval of beacon frames. Value range is 20~999 milliseconds, and the default is 100 milliseconds.
DTIM Interval: A Delivery Traffic Indication Map (DTIM) period value is a number
that determines how often a beacon frame includes a Delivery Traffic Indication Message, and this number is included in each beacon frame. A DTIM is included in beacon frames, according to the DTIM period, to indicate to the client devices whether the access point has buffered broadcast and/or multicast data waiting for them. Following a beacon frame that includes a DTIM, the access point will release the buffered broadcast and/or multicast data if any exists. Its use range is 1 ~ 255 and its default value is 1.
Enable Short Preamble: If selected, it will use Short Preamble. Short
Preamble can improve the utilization of wireless channel to realize high priority transmission bandwidth. If not, it will use long preamble. Which can ensure compatibilities with some old 802.11b devices that require the long preamble, but it will slightly reduce throughput at high data rate.
Enable WMM: WMM (Wi-Fi Multimedia) is a subset of the 802.11e standard.
WMM allows wireless traffic to have a priority range based on the data type. Time-sensitive information, such as video or audio, will have a higher priority than the normal traffic. To use the WMM function properly, wireless clients must also support WMM.
5.5 Client List
On the Wireless > Client List page, you can view the status information of the wireless hosts currently connected to the device. Through the can also easily set
MAC Filtering function.
Wireless Client Status List, you
http://www.uttglobal.com Page 54
UTT Technologies Wireless Menu
Figure 5-11 Wireless Client List
ID: Serial number.
MAC Address: The MAC address of wireless clients.
Filter: Select to added the current MAC address into the Wireless Client Status
List (which can be viewed in the Wireless > MAC Filtering page).
Channel Width: Displays the theoretical data transfer rate of the data channel.
Filter All: Click the button to add all MAC address whose filtering is not enabled in
the current list to MAC Address Filtering List.
Refresh: Click the button to view the latest wireless host status.
http://www.uttglobal.com Page 55
UTT Technologies Wireless Menu
5.6 Example of AP Mode Configuration
Figure 5-12 Network Topology_AP Mode Example
1) Requirements:
Some users want to put desktop computers, laptops, Tablet PCs, smartphones on the Internet via wireless devices and prevent strangers from accessing to the Devices. Here, the gateway address is 192.168.1.1.
2) Analysis:
Desktop computers are connected via a network cable to the LAN port of the Device; laptop, Tablet PC, etc. are wirelessly connected to the Device and need to be authenticated.
3) Configuration Steps
Step 1 Configure the TCP/IP properties for the local computer.
Step 2 Upon logging in the Device, then configure the LAN port of the Device,
here, the gateway address is set as 192.168.1.1.
Step 3 Enter into the Wireless > Basic page, change the operation mode of the
Device to AP Mode and configure the Device's wireless basic parameters, as shown in the figure below.
http://www.uttglobal.com Page 56
UTT Technologies Wireless Menu
Figure 5-13 AP Mode configuration
Step 4 Enter into the Wireless > Security page, to configure the authentication
methods and key for wireless communication.
Through the above configuration, wireless users can connect to the Device so long as they pass the authentication, and access to the Internet through it.
5.7 Example of WDS Co nfiguration
Figure 5-14 Repeater Mode networking environment
1) Requirements
http://www.uttglobal.com Page 57
UTT Technologies Wireless Menu
Item
Parameters
Item
Parameters
As shown in the Figure 5-14, the users in Building 1 could access the Internet through the Gateway (IP address: 192.168.1.1). If the Device B is wirelessly connected to Device A, the users in Building 2 could access the Internet too. We could use the WDS function of the Device to realize it.
The related parameters of Device A are as
follows:
IP Address of LAN port 192.168.1.253/24 Gateway address 192.168.1.1
SSID Customer MAC 0022AABA767C
Wireless mode 11b/g/n Mixed Channel 6
Security mode TKIP Pre-shared key 123456789
2) Analysis
We can connect Device B to Device A wirelessly by using one of the following ways.
Solution I: Devices A and B are set to Repeater Mode.
Solution II: Devices A and B are set to Bridge Mode.
Solution III: Devices A and B are set to Repeater Mode, Bridge Mode respectively.
Solution IV: Devices A and B are set to Repeater Mode, Lazy Mode respectively.
Solution V: Devices A and B are set to Bridge Mode, Lazy Mode respectively.
3) Conf iguration steps:
Solution I: Both are Repeater Mode
Step 1 Login to the Device B.
Step 2 Go to Network > LAN page to configure the IP address of Device B (Device A
and Device B should be on the same network segment), with the gateway address directed to the export gateway.
Step 3 Go to Wireless > Basic page, configure the Operation mode of Device B as
Repeater Mode, with the MAC address of Device A as the MAC address of Device B, and the configuration content is shown in the figure below:
http://www.uttglobal.com Page 58
UTT Technologies Wireless Menu
Figure 5-15 Repeater Mode instance
Step 4 Login to the Device A.
Step 5 Go to Wireless > Basic page and configure the operation mode of Device A as
Repeater Mode, and the SSID, wireless mode, channel, channel bandwidth, security mode, pre-shared key are configured in the same way as Device B, and the AP MAC address is: 0022AABB5428 (the MAC address of Device B).
Through the above configurations, the office personnel in Building 2 can connect to Device A through Device B in Building 1, and access to the Internet through the gateway.
Notes:
1 The gateway of the computer in Building 2 is directed to the LAN port of
http://www.uttglobal.com Page 59
UTT Technologies Wireless Menu
Device A.
2 The IP address of LAN port of Device B is in the same network segment as
the LAN port address of Device A.
Step 6 Connectivity verification
To test connectivity, you can log into a computer that is connected to Device B, and use the ping command to ping the LAN IP address of the Device A. If the ping is successful, a wireless connection between the two devices has been established.
After Device B is connected to Device A wirelessly, the client devices connected to Device B are able to access the Internet.
Solutions II, III, IV, V can follow Solution I.
Notes:
1 The Device in Bridge Mode cannot be connected to the single wireless clients,
such as laptops, smartphones, etc.
2 The Devices in Lazy Mode can be connected to the single wireless clients.
3 In configuration, the SSID, Wireless Mode, Channel, Channel Width, Security
Mode and Pre-shared Key of Devices A, B must be kept consistent, and the MAC address of AP is that of the peer device (It is not required to configure the MAC address of the peer device when the AP mode is Lazy Mode).
4 Device A and B m ust be in the same network segment.
http://www.uttglobal.com Page 60
UTT Technologies Wireless 5G Menu

Chapter 6. Wireless 5G Menu

This chapter describes how to configure and use the 5GHz wireless features of the Device. Only dual-band wireless router device support 5GHz wireless. We can access to 5GHz wireless applicat ion by clic king
6.1 Basic
On Wireless 5G > Basic page, we can set 5GHz w ireless p ara meters , inc ludi ng SSID, wireless mode, wireless channel, channel width and so on.
Wireless 5G menu.
Figure 6-1 5GHz wireless settings
Enable Wireless: Select to enable 5GHz Wireless network.
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network.
Wireless Mode: Specify the wireless modes of the Device. The options are 11a
Only, 11a/n Mixed, 11vht AC/AN/A and 11vht AC/AN.
http://www.uttglobal.com Page 61
UTT Technologies Wireless 5G Menu
11a Only: If selected, the wireless clients in compliance with the IEEE
802.11a standard can be connected to the Device.
11a/n Mixed: If selected, the wireless clients in compliance with the IEEE
802.11a and 802.11n standard can be connected to the Device.
11vht AC/AN/A : Very High Throughput IEEE 802.11ac and 802.11a Standard.
If selected, the wireless clients in compliance with the IEEE 802.11ac and
802.11a standard can be connected to the Device.
11vht AC/AN: Very High Throughput IEEE 802.11ac Standard. If selected,
the wireless clients in compliance with the IEEE 802.11ac standard can be connected to the Device.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select the optimal frequency band. The wireless devices in the same frequency band w il l interfere with each other. If there are multiple wireless devices around the Device, please select a frequency band different from that of other wireless devices when setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission. It provides automatic options, which means that the Device can automatically select the optimal channel bandwidth.
Enable SSID Broadcast: If enabled, the Device will broadcast its own SSID to all
the wireless clients to be able to connect to the Device, and access to the wireless network with this SSID identifier. This function is enabled at risk (illegal sites are very easy to get the SSID information), so it is generally recommended to disable this function.
Enable WDS: Select to enable WDS. It allows a wireless network to be expanded
using multiple access points without the traditional requirement for a wired backbone to link them.
Note: All base stations in a wireless distribution sy stem mus t be configured to use
the same wireless channel, wireless mode, security mode and the same encryption keys.
6.2 Security
Please refer to the section: 5.2 Security.
6.3 MAC Filtering
Please refer to the section: 5.3 MAC Filtering.
http://www.uttglobal.com Page 62
UTT Technologies Wireless 5G Menu
6.4 Advanced
Please refer to the section: 5.4 Advanced.
6.5 Client List
Please refer to the section: 5.5 Client List.
http://www.uttglobal.com Page 63
UTT Technologies Advanced Menu

Chapter 7. Advanced Menu

7.1 NAT&DMZ
This chapter describes how to configure and use NAT features, including port forwarding, DMZ hosts, and NAT rule.
7.1.1 Port Forwarding
Port forwarding can be used to set up public services on your network. When users from the Internet make certain requests on your network, the Device can forward those requests to computers equipped to handle the requests. For example, if you set the port number 21 (FTP) to be forwarded to IP address 192.168.1.2, then all the related requests from outside users will be forwarded to 192.168.1.2.
7.1.1.1 Port Forwarding List
On the Advanced > NAT & DMZ > Port Forwarding page, you can setup some port forwarding rules.
Figure 7-1 Port Forwarding List
http://www.uttglobal.com Page 64
UTT Technologies Advanced Menu
Add a Port Forwarding Rule: Click the Add button, then setup it, lastly click
the
Save button.
Edit a Port Forwarding Rule: Click the Name or Edit hyperlink of this rule
entry, the related information will display in the setup fields. Then modify it, and click the
Delete Port Forwarding Rule(s): Select the leftmost check boxes of entries,
and then click the
Save button.
Delete button.
7.1.1.2 Port Forwarding settings
Figure 7-2 Port Forwarding Setup
Name: Specify a name of this entry. It should be between 1 and 11 characters
long.
Enable: Select to enable this Port Forwarding entry.
Protocol: Select the transport protocol used by the service, available options are
TCP, UDP and TCP/UDP.
Start External Port: Specify the lowest port number provided by the Device. The
external ports are opened for outside users to access.
IP Address: Specify the I P addres s of the local server that you want outside users
to access.
Start Internal Port: Specify the lowest port number of the service provided by the
LAN host. The
Port Count: Specify the number of ports used by the service. I f the service uses
only one port number, enter 1. For example, if the start internal port is 21, th e start
Start External Port and Start Internal Port can be dif ferent.
http://www.uttglobal.com Page 65
UTT Technologies Advanced Menu
external port is 2001 and the port count is 10, then the internal port range is from 21 to 30, and the external port range is from 2001 to 2010.
Bind to: Select the NAT rule to which this port forwarding rule is bound. The port
forwarding rule will use the WAN interface’s IP address as the external IP address.
Note: The system will automatically create some port forwarding rules. You
cannot modify or delete them.
7.1.1.3 Examples of Port Forwarding
7.1.1.3.1 Example One
An organization wants a LAN server (IP Addr ess: 192.168.16.88) to open Syslog service (Protocol: UDP; Port: 514) to the outside users. And the Device will use 2514 as the external port and the WAN1 IP address (200.200.200.88 in this example) as the external IP address. Then all the requests for Syslog from outside users to
200.200.200.88:2514 will be forwarded to 192.168.16.88:514. The following figure shows the detailed settings.
Figure 7-3 Port Forwarding settings - Example One
7.1.1.3.2 Example Two
An organization wants a LAN server (IP Addr ess: 192.168.16.100) to open ftp service (Protocol: TCP; Port: 20, 21) to the outside users. And the Device will use 2020 and 2021 as the external ports and the WAN2 IP address (200.200.201.18 in this example) as the external IP address. As the ftp service uses two ports, so we need to set the
http://www.uttglobal.com Page 66
UTT Technologies Advanced Menu
Port Count to 2. Then all the requests for ftp from outside users to
200.200.201.18:2020 or 200.200.201.18:2021 will be forwarded to 192.168.16.100:20 or 192.168.16.100:21.
The following figure shows the detailed settings.
Figure 7-4 Port Forwarding Settings - Example Two
7.1.1.3.3 Example Three
An organization obtains eight public IP addresses (from 218.1.21.0/29 to
218.1.21.7/29) from the ISP. Therein, 218.1.21.1/29 is used as the Internet connection’s gateway IP address, 218.1.21.2/29 is used as the Device’s WAN1 interface’s IP address.
The organization wants a LAN server (IP Address: 192.168.16.88) to open SMTP service (Protocol: TCP; Port: 25) to the outside u sers. And the Device w ill use 2025 as the external port and 218.1.21.3 as the external IP address.
Firstly, we need to create an NAT rule, and set its External IP Address to 218.1.21.3, see section forwarding rule.
The following figure shows the detailed settings.
7.1.2 NAT Rule for detailed information. Then we need to create the port
http://www.uttglobal.com Page 67
UTT Technologies Advanced Menu
Figure 7-5 Port Forwarding Settings - Example Three
7.1.2 NAT Rule
7.1.2.1 Introduction to NAT
The NAT (Network Address Translation) is an Internet standard that is used to map one IP address space (i.e., Intranet) to another IP address space (i.e., Internet). The NAT is designed to alleviate the shortage of IP addresses, that is, it allows all the LAN hosts to share a single or a small group of IP addresses: On the Internet, there is only a single device using a single or a small group of public IP addresses; but the LAN hosts can use any range of private IP addresses, and these IP addresses are not visible from the Internet. As the internal network can be effectively isolated from the outside world, the NAT can also provide the benefit of network security assurance.
The Device provides flexible NAT features, and the following sections will describe them in detail.
To ensure that NAT operates properly, the Device uses and maintains two address spaces:
Internal IP address: It indicates the IP address that is assigned to a LAN host by
the administrator. It is usually a private IP address.
NAT Address Space Definitions
External IP address: It indicates the IP address that is assigned to the Device’s
Internet connection by the ISP. It is a legal public IP address that can represent one or more internal IP addresses to the outside world.
http://www.uttglobal.com Page 68
UTT Technologies Advanced Menu
7.1.2.3 NA T Types
The Device provides two types of NAT: One2One and EasyIP.
One2One (One to One): It indicates static network address translation. It is always referred to as Basic NAT, which provides a one to one mapping between an internal and an external IP address. In this type of NAT, IP address need be changed, but port needn’t.
One to One NAT can be used to allow the outside users to access a LAN server: In the local network, the LAN server still uses the private IP address, which is provi ded to the LAN hosts to access; and on the Internet, the Device will assign an external IP address to the local server, then the outside users can use this external IP address to access the server through the Device.
EasyIP: It indicates network address and port translation (NAPT). Since it is the most common type of NAT, it is often s i mply ref erred to as N AT. NAPT provides many-to-one mappings between multiple internal IP addresses and a single external IP address, that is, these multiple internal IP addresses will be translated to the same external IP address. In this type of NAT, to avoid ambiguity in the handling of returned packets, it must dynamically assign a TCP/UDP port to an outgoing session and change the packets’ source port to the assigned port before forwarding them. Besides, the Device must maintain a translation table so that return packets can be correctly translated back.
When you obtain multiple public IP addresses from your ISP, you can create more than one NAT rule for each type of NAT. In an actual network environment, different types of NAT rules are often used together.
7.1.2.4 NAT Rule List
Figure 7-6 NAT Rule list
http://www.uttglobal.com Page 69
UTT Technologies Advanced Menu
Add an NAT Rule: Click the Add button to go to the setup page, and then
configure it, lastly click the
Edit an NAT Rule: Click its Edit button, the related information w ill be displa yed on
the setup page. Then modify it, and click the
Delete NAT Rule(s): Select the leftmost check boxes of them, and then click the
Delete button.
Save button.
Save button.
7.1.2.5 NAT Rule settings
7.1.2.5.1 One2One settings
Figure 7-7 One2One settings
Rule Name: Specify the name of this NAT rule entry.
NAT Type: Specify the type of the NAT rule. Here please select One2One.
Start External IP: Specify the start external IP address to which the start internal
IP address is mapped.
Start Internal IP and End Internal IP: Specify the internal address range of the
NAT rule. The LAN hosts that belong to this address range will use the NAT rule.
Bind to: Specify an Internet connection to which the NAT rule is bound. The LAN
hosts that match the NAT rule will access the Internet through this Internet connection.
Note:
1) When creating a One2One NAT rule, you should set the Sta rt External IP Address, and the number of the external IP addresses is the same as the number of internal IP addresses, which is determined by the End Internal IP Address. For example, if the St art Internal IP Address is
192.168.16.6, Address is 200.200.200.116, then 192.168.16.6, 192.168.16.7, and 192.168.16.8 will be mapped to 200.200.200.116, 200.200.200.117, and 200.200.200.118
End Internal IP Address is 192.168.16.8, and Start External IP
Start Internal IP Address and
http://www.uttglobal.com Page 70
UTT Technologies Advanced Menu
respectively.
7.1.2.5.2 EasyIP settings
Figure 7-8 EasyIP settings
Rule Name: Specify the name of this NAT rule entry.
NAT Type: Specify the type of the NAT rule. Here please select EasyIP.
External IP: Specify the external IP address to which the LAN hosts’ IP addressed
are mapped. A system reserved NAT rule’s external IP address is means that the rule will use the related WAN interface’s IP address as its external IP address; and it is non-editable. A user-defined NAT rule’s external IP address can be neither 0.0.0.0 nor the WAN interface’s IP address, that is, you can only use the other public IP addresses provided by your ISP as its external IP addresses.
Start Internal IP and End Internal IP: Specify the internal address range of the
NAT rule. The LAN hosts that belong to this address range will preferential use the NAT rule.
Bind to: Specify an Internet connection to which the NAT rule is bound. The LAN
hosts that match the NAT rule will access the Internet through this Internet connection.
0.0.0.0, which
7.1.2.6 Examples for NAT Rule
7.1.2.6.1 Example for Configuring One2One NAT Rule
1) Requirements
In this example, a business has a single s tatic IP Internet connection and obtains eigh t public IP addresses (from 202.1.1.128/29 to 202.1.1.1.135/29) from the ISP. Therein,
202.1.1.129/29 is used as the Internet connection’s gateway IP address,
202.1.1.130/2 is used as the Device’s WAN1 interface’s IP address. Note that
202.1.1.128/29 and 202.1.1.1.135/29 cannot be used as they are the subnet number
and broadcast address respectively.
http://www.uttglobal.com Page 71
UTT Technologies Advanced Menu
Figure 7-9 Network Topology for One2One NAT Rule Configuration Example
The business employees will share a single public IP address of 202.1.1.130/29 to access the Internet. The LAN’s subnet number is 192.168.16.0, and subnet mask is
255.255.255.0. And the business wants to use the remaining four public IP addresses
(from 202.1.1.131/29 to 202.1.1.134/29) to create a
One2One rule for the four local servers, then the outside users can use these public addresses to access the local servers through the Device. The four local servers IP addresses are from
192.168.16.200/24 to 192.168.16.203/24, which are mapped to 202.1.1.131/29,
202.1.1.132/29, 202.1.1.133/29, 202.1.1.134/29 respectively.
2) Analysis
Firstly we need to configure a static IP Internet connection on the WAN1 interface in the
Basic > WAN page or through the Setup Wizard. After you have configured the Internet connection, the Device will automatically create a related system reserved NAT rule, and also enable NAT.
Secondly, we need to create a One2One NAT rule for the four local servers. After you have configured this rule, the Device will automatically create the related static route.
3) Configuration Procedure
The configuration steps are as following:
Step 1 Go to the Advanced > NAT & DMZ > NAT Rule page, and click the Add
button to go to the setup page.
Step 2 Enter the name of this NAT rule entry in the Rule name text box and select
One2One from the NAT T ype drop-down list, see the following figure.
http://www.uttglobal.com Page 72
UTT Technologies Advanced Menu
Figure 7-10 One2One NAT Rule Settings - Example
Step 3 Enter 202.1.1.131 in the Start External IP text box, enter 192.168.16.200 in
the
S tart Internal IP text box and enter 192.168.16.203 in the End Internal IP
text box.
Step 4 Select WAN1 from the Bind to drop-down list. Step 5 Click the Save button to save the settings. Till now you have finished
configuring the NAT rule, and then you can view its related configuration in the
NAT Rule List.
7.1.2.6.2 Example for Configuring EasyIP NAT Rule
(1) Requirements
In this example, an Internet cafe has a single Internet connection and obtains eight public IP addresses (from 218.1.21.0/29 to 218.1.21.7/29) from the ISP. Therein,
218.1.21.1/29 is used as the Internet connection’s gateway IP address, 218.1.21.2/29 is used as the Device’s WAN1 interface’s IP address. Note that 218.1.21.0/29 and
218.1.21.7/29 cannot be used as they are the subnet number and broadcast address respectively.
The administrator wants the hosts in the online game area (its address range is from
192.168.16.10/24 to 192.168.16.100/24) to use 218.1.21.3/29 to access the Internet. To achieve this purpose, he should create an External IP Address is 218.1.21.3, S tart Internal IP is 192.168.16.10, End Internal IP is
192.168.16.100, and
Bind to is WAN1.
EasyIP NAT rule for them. The rule’s
(2) Configuration Procedure
The configuration steps are as following:
Step 1 Go to the Advanced > NAT & DMZ > NAT Rule page, and click the Add
button to go to the setup page.
Step 2 Enter the name of this NAT rule entry in the Rule name text box and select
EasyIP from the NA T Type drop-down list, see the following figure.
http://www.uttglobal.com Page 73
UTT Technologies Advanced Menu
Figure 7-11 EasyIP NAT Rule Settings - Example
Step 3 Enter 218.1.21.3 in the External IP text box, enter 192.168.16.10 in the Start
Internal IP text box and enter 192.168.16.100 in the End Internal IP text box.
Step 4 Select WAN1 from the Bind to drop-down list. Step 5 Click the Save button to save the settings. Till now you have finished
configuring the NAT rule, and then you can view its configuration in the Rule List.
NAT
7.1.3 DMZ
The DMZ (Demilitarized Zone) feature allows one local computer to be exposed to the Internet for the use of a special service such as an online game or video con ferencing. When receiving the requests initiated by outside users, the Device will directly forward these requests to the specified DMZ host.
Figure 7-12 DMZ
Enable DMZ: Select to enable DMZ Host.
http://www.uttglobal.com Page 74
UTT Technologies Advanced Menu
DMZ Host IP Address: Specify the private IP address of the DMZ host.
Note:
The computer designated as the DMZ host will lose firewall protection provided by the Device. As the DMZ host is exposed to many exploits from the Internet, it may be used to attack your network.
7.1.4 Priorities for Port Forwarding and DMZ Host
The port forwarding has higher priority than the DMZ host. When receiving a request packet initiated by an outside user, the Device will firstly search the List to find out if there is a port forwarding rule matching the destination IP address and port of the packet. If a match is found, the Device will forward the packet to the mapped localhost. Else, the Dev ice w ill try to find out if there is an available DMZ host.
Port Forwarding
7.2 Static Route
A static route is manually configured by the network administrator, which is stored in a routing table. By using routing table, the Device can select an optimal transmission path for each received packet, and forward the packet to the destination site effectively. The proper usage of static routes can not only improve the network performance, but also achieve other benefits, such as traffic control, provide a secure network environment.
The disadvantage of using static routes is that they cannot dynamically adapt to the current operational state of the network. When there is a change in the network or a failure occurs, some static routes will be unreachable. In this case, the network administrator should update the static routes manually.
7.2.1 Static Route List
All static routes you have configured will be displayed in the Static Route List (see the following figure).
http://www.uttglobal.com Page 75
UTT Technologies Advanced Menu
Figure 7-13 Static Route List
Add Static Route: Click the Add button, then setup it, lastly click the Save
button.
Edit Static Route: Click its Edit hyperlink, the related information will be
displayed on the setup page. Then modify it, and click the
Delete Static Route(s): Select the leftmost check boxes of them, and then
click the
Delete button.
Save button.
7.2.2 Static Route settings
Figure 7-14 Static Route setting
Route Name: Specify the name of this static route entry.
http://www.uttglobal.com Page 76
UTT Technologies Advanced Menu
Enable: Select to enable this static route entry.
Destination IP: Specify the IP address of the destination network or host.
Subnet Mask: Specify the subnet mask of the destination network or host.
Gateway IP Address: Specify the IP address of the next hop router to which to
forward the packets.
Priority: Specify the priority of the static route. If there are multiple routes to the
same destination with different priorities, the Device will choose the route with the highest priority to forward the packets. The smaller the number, the higher the priority.
Interface: Specify the outbound interface through which the packets are
forwarded to the next hop gateway or router. The available options are the name of eac h physical interface.
Note:
1) When creating a static route, you should specify the next hop IP address by the
Gateway IP Address or Interface.
2) In most cases, please don’t modify the sy stem res erved static route (e.g., Default,
Detect) to avoid surfing the Internet abnormally.
7.3 Policy Routing
This section describes the Advanced > Policy Routing page. Policy Routing provides a tool for forwarding and routing data packets based on the
user-defined policies. Different from the traditional destination-based routing mechanism, Policy Routing enables you to use policies based on source and destination address, protocol, port, schedule, and other criteria to route packets flexibly.
http://www.uttglobal.com Page 77
UTT Technologies Advanced Menu
7.3.1 Policy Routing List
Figure 7-15 Policy Routing List
Enable policy routing: Select to enable Policy Routing.
Add a Policy Routing Entry: Click the Add button, then setup it, lastly click the
Save button.
Allow a PBR Entry: Select the Allow check box to enable the corresponding
Policy Routing entry. If you want to disable the Policy Routing entry temporarily instead of deleting it, please clear the check mark.
Edit a Policy Routing Entry: Click its Edit hyperlink, the related information will be
displayed on the setup page. Then modify it, and click the
Delete Policy Routing Entry(s): Select the leftmost check boxes of them, and then
click the
Move a Policy Routing Entry: The operation of moving a Policy Rout in g entry to
the front of another entry is as follows: Select the name of a Policy Routing entry from the lastly click the
Delete button.
Rule drop-down list, and another entry’s ID from the Mode drop-down list,
Move TO button.
Save button.
http://www.uttglobal.com Page 78
UTT Technologies Advanced Menu
7.3.2 Policy Routing settings
Figure 7-16 Policy Routing settings
Enable: Select to enable the Policy Routing entry. Only you have selected this
check box, the Policy Routing entries will take effect.
Policy routing name: Specify the name of this Policy Routing entry.
Interface: Specify an outbound interface through which the packets matching the
Policy Routing entry are forwarded.
Src IP: Specify the source IP addresses of the packets to which the Policy
Routing entry applies.
Destination address: Specify the destination IP addresses of the packets to which
the Policy Routing entry applies.
Protocol: Select a protocol type from the drop-down list.
Common Service: Select a commonly used service from the drop-down list.
http://www.uttglobal.com Page 79
UTT Technologies Advanced Menu
Dest Port: Specify the start and end port numbers in the associated text boxes.
The port number is between 1 and 65535.
Schedule Settings: Specify a schedule to restrict when the Policy Routing entry
takes effect. The default value is Routing entry will be in effect always.
Every Day and All Day, which means the Policy
Note:
Policy Routing takes precedence over the Device’s normal destination-based routing. That is, if a packet matches all the criteria (source address, destination address, protocol type, port, etc.) specified in a Policy Routing entry, it will be forwarded through the outbound interface specified in the Policy Routing entry. If no match is found in the Policy Routing list, the packet will be forwarded through normal routing channel (in other words, destination-based routing is performed).
7.4 Anti-NetSniper
This section describes Advanced > Anti-NetSniper page.
Anti-NetSniper is used to crack shared Internet access detection which can be performed by your ISP. Don't enable this feature unless you encounter the "shared Internet access detection" issue.
Figure 7-17 Anti-NetSniper
7.5 Plug and Play
Plug and Play is a new feature of UTT series security firewalls. If you enable plug and play feature on the Device, the LAN users can access the Internet through the Device without changing any network parameters, no matter what IP address, subnet mask, default gateway and DNS server they might have. Obviously, this feature can greatly facilitate the users. As this feature is suitable for hotel network, we also call it hotel special version.
http://www.uttglobal.com Page 80
UTT Technologies Advanced Menu
Figure 7-18 Plug and Play
Note:
1) The LAN hosts basic TCP/IP parameters (including IP address, subnet mask,
gateway IP address, and DNS server IP address) should be set properly; otherwise, plug and play feature cannot act on those hosts.
2) Once plug and play is enabled, the Device will automatically enable proxy ARP ,
enable DNS proxy, and disable IP spoofing defense.
3) Once plug and play are enabled, the Device will allow those non-IP/MAC binding
users to access the Device and Internet.
4) The users with the same IP address cannot access the Internet at the same time.
For example, if a LAN user with IP address 1.1.1.1 has connected to the Device to access the Internet, another user with IP address 1.1.1.1 cannot access the Internet through the Device.
5) A L AN user’s IP address cannot be the same with the Device’s LAN/WAN
interface IP address, gateway IP address, and primary/secondary DNS server IP address; otherwise, the user cannot access the Device and Internet.
7.6 Port Mirroring
The port mirroring allows an administrator to mirror and monitor network traffic. It copies the traffic from the specified ports to another port where the traffic can be monitored with an external network analyzer. Then the administrator can perform traffic monitoring, p erformance analysis and fault diagnosis.
http://www.uttglobal.com Page 81
UTT Technologies Advanced Menu
Figure 7-19 Port Mirroring
Enable Port Mirroring: Select to enable port mirroring.
Mirroring Port: Specify the capture port that will mirror the traffic of the mirrored
port(s).
7.7 Syslog
This section describes the Advanced > Syslog page. Syslog is a standard protocol used to capture a lot of running information about
network activity. The Device supports this protocol and can send its activity logs to an external Syslog server. It helps the network administrator monitor, analyze and troubleshoot the Device and network.
Figure 7-20 Syslog settings
Enable Syslog: Select to enable Syslog feature.
Syslog Server IP address: Specify the IP address or domain name of the Syslog
server to which the Device sends Syslog messages.
Syslog Server Port: Specify the port used by the Syslog server to communicate
with the Device. In most cases, please leave the default value of well-known port number.
http://www.uttglobal.com Page 82
514, which is a
UTT Technologies Advanced Menu
Syslog Message Facility: Specify the facility level used for logging. The facilities
are used to distinguish different classes of Syslog messages.
Note: So far, only the Xport HiPER Manager software of UTT Technologies Co.,
Ltd. can identify the heartbeat message.
http://www.uttglobal.com Page 83
UTT Technologies Network Sharing Menu

Chapter 8. Network Sharing Menu

This section describes the function on the Network Sharing menu. Network Sharing is a model of data storage where the digital data is stored in USB disk/SD car d. The USB disk/SD card is owned and managed by Administrator who is responsible for keeping the data available and accessible. Users access to USB disk/SD card for digital data.
8.1 Sharing Management
After plugging a USB/SD card into the Device, the administrator could share the Data on the USB/SD card to LAN users through the FTP function. Before you enable network sharing, please first setup the account for users on the Shared Account page.
Network Sharing >
Click
Network Sharing > Sharing Management, you will see the following figure.
Figure 8-1 Network Sharing
Enable Storage Device: Select to enable network sharing. Enable Password Protection: If selected, LAN users must use the account which
is set on the
device. Disable: Click to disable the storage device. Eject Device: Click to eject the storage device.
Network Sharing > Shared Account page to access the storage
Scan: Click to scan the available storage device.
Notes:
1) Before you eject the USB/SD card from the Device, please click the Eject Device button first, in case of unexpected error or irreparable hardware damage.
http://www.uttglobal.com Page 84
UTT Technologies Network Sharing Menu
2) It is recommended to use NTFS file system.
8.2 FTP Server
On the Network Sharing > FTP Server page, you can setup FTP server to share data to local area users. All the sources you have shared are displayed on the Shared Directory List.
Figure 8-2 FTP Server
Enable FTP Server: Select to enable FTP Server.
Remote Access: Select to enable remote access from WAN port.
Ftp Port: Specify the FTP server port for LAN users to access. The default value
is 21. We recommend that you do not change the default value unless absolutely necessary.
Click the Add a new folder button or to add a new folder for data sharing or edit the setting of the current folders.
http://www.uttglobal.com Page 85
UTT Technologies Network Sharing Menu
Figure 8-3 FTP Server Settings
Name: Specify the name of the folder which will be displayed on the Shared
Directory List.
Folder: Select to share all folders. Select Folder: Select one of the paths to share.
Notes:
1) All the changes you have made will take effect after a restart.
2) There are two ways to access FTP Serve r:
For local users: Double-click 'My Computer', enter ftp://xxx.xxx.xxx.xxx:21 (xxx.xxx.xxx.xxx stands for the IP address of the LAN port) in the address bar to open the shared resources folder. Such as: when the IP address of the LAN port is
192.168.1.1, you could enter ftp://192.168.1.1:21.
For remote users: First, you should ensure that the Remote Access check box on Figure 8- 2 have been selected. Double-click 'My Computer', enter ftp: \\xxx. xxx. xxx. xxx :21 (xxx.xxx.xxx.xxx stands for the IP address of the WAN port) i n the address bar to open the shared resources folder. Such as: when the IP address of the WAN por t is
172.32.90.1, you could enter
ftp:// 172.32.90.1:21.
8.3 Shared Account
You need to add an account for users to access the FTP server before enabling network sharing.
http://www.uttglobal.com Page 86
Loading...