All rights reserved.
The information of this publication is protected by copyright. No part of this publication may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language
without written permission from the copyright holders. The scope of delivery and other details are
subject to change without prior notice.
Trademark
UTT® is a registered trademark of Shanghai UTT Technologies Co., Ltd.
Other trademarks and registered trademarks of products mentioned in this publication may be the
properties of their respective owners and are only used for identification purposes.
Version 1.0_201605
Table of Contents
About this Manual ........................................................................................................................... 1
Chapter 15. Status Menu ........................................................................................................ 195
15.1 Interface Status ....................................................................................................... 195
15.2 System Information ................................................................................................. 195
15.3 System Log ............................................................................................................. 196
Appendix A FAQ .......................................................................................................................... 198
Appendix B Common IP Protocols .............................................................................................. 201
Appendix C Common Service Ports ............................................................................................ 202
UTT Technologies About this Manual
About this Manual
Note:
For better user experience, it is strongly recommended to use Internet Explorer 8.0 or above,
Google Chrome and Firefox.
0.1 Manual Description
This manual is suitable for Enterprise Wireless Router including N518W, AC750 W, AC750GW,
AC755W, AC1220GW and so on.
The manual describes the characteristics and features of the enterprise wireless router, which are
based on ReOS_SE V1.7.5 firmware platform. It mainly describes how to configure and mana ge the
Device via Web UI. Please make sure that your Device’s firmware version accords with ReOS_SE
V1.7.5. As the product or firmware version upgrades, or other reasons, this guide will be updated
periodically.
In addition, as the product specifications of each model are different, please contact the UTT
customer to ask for help if any questions.
Note:
The Device (First letter in uppercase.) mentioned in this manual stands for the enterprise wireless
router.
0.2 Web UI Style
The Device’s Web User Interface (Web UI) follows the web standards, as follows:
Radio Button: Allows you to choose from only one of a predefined set of options.
Check Box: Allows you to select one or more options.
Button: Allows you to click to perform an action.
Text Box: Allows you to enter text information.
:List Box: Allows you to select one or more items from a static multiple line text box.
:Drop-down List: Allows you to choose one item from a list. When a drop-down
http://www.uttglobal.com Page 1
UTT Technologies About this Manual
list is inactive, it displays a single item. When activated, it drops down a list of items, from which you
may select one.
0.3 Documents Conventions
0.3.1 Format
Notes: You need to pay attention to the notes content.
Parameters: Describe the meaning of parameter or button. If there have “*” before parameters,
it couldn’t be empty.
Bullets: List the parallel content.
Boldface font: Examples of information displayed on the screen.
0.3.2 Icons
Router
Wired Client
Switch
Wireless client
Modem
PDA
Server
http://www.uttglobal.com Page 2
UTT Technologies About this Manual
Parameter
Default Value
Description
You can use this IP address to
0.4 Factory Default Settings
The factory default settings of interfaces are shown in the following table.
User Name admin
Password admin
LAN IP Address 192.168.1.1/255.255.255.0
Table 0- 1 Factory Default Settings of Interface
Both the User Name and
Password are case sensitive.
access the Device through a
Web browser.
0.5 Contact us
If you have any question about the installation or using the Device, please contact us as the
following ways:
The 2.4G LED indicator is on when 2.4GHZ Wireless is enabled, and it blinks
when transmitting/receiving 2.4G wireless data.
Note
Chapter 1. Hardware Installation
This chapter describes the physical characteristics of the Device and explains how to install them.
1.1 Panel Description
1) Front Panel
The LED indicators, the interface and the button are located on the front panel of the Device, here
we use AC750GW as an example, as for other models, please see the product.
Figure 1-1 Front Panel_AC750GW
PWR The Power LED indicator is on when the Device is powered on.
SYS
USB The LED indicator is on when the USB interface is connected properly.
2.4G
5G
Turbo The Turbo LED indicator blinks when the function is enabled.
1,2,3,4,5
The LED indicator blinks twice per second when the system is working properly,
and it will blink slower under heavy load.
The 5G LED indicator is on when 5GHZ Wireless is enabled, and it blinks when
transmitting/receiving 5G wireless data.
The LAN LED indicator is on when Ethernet cable connection is normal, and it
blinks when the LAN port is sending or receiving data.
http://www.uttglobal.com Page 4
: The number of port status LEDs depends on the Device model.
Table 1-1 LED Description
UTT Technologies Hardware Installation
Interface
Description
Note:
Button
Description
Note:
System > Configuration
LAN Port
WAN Port
TF Connect TF card for data sharing.
USB Plug in a USB storage f or specific features.
Console
Some products support configurable LAN/WAN, so the corresponding ports can be
configured as LAN port or WAN port (such as WAN4/LAN2, WAN3/LAN3, and
WAN2/LAN4).
These interfaces provide a LAN connection to network devices, such as PCs
or switches.
The WAN interface is connected to your Internet devices, such as PCs or
switches. The number of WAN ports depends on the device model.
An RS-232 DB9 Male port is used for connections to the Device to manage
the router.
Table 1-2 Interface Description
Reset current settings to the factory default settings. When the Device is
Reset
Turbo Amplify wireless transmitting power.
The reset operation will clear all the settings and preferences that you have configured.
You can also recover the Device 's factory configuration on the
powered on, use a pin or paperclip to press and hold the Reset button for
more than 5 seconds, and then release the button. After that, the Device will
restart with the factory default settings.
Table 1-3 Button Description
1.2 Installation Guideline
When determining where to place the Device, please observe these guidelines:
Make sure that your workbench or standard rack is level and stable.
page.
http://www.uttglobal.com Page 5
Do not place heavy objects on the Device!
UTT Technologies Hardware Installation
Make sure that there is proper heat dissipation and adequate ventilation around the
Device.
Position the Device out of direct sunlight and away from sources of heat and ignition.
Please install the Device in a place far away from the High Power Radio or Radar Station.
Keep the Device far away from water!
Please use the supplied power cord.
1.3 Installation Requirements
The following items are required for installation:
1) Broadband Internet connection
2) Tools and equipment
(1) Broadband modem (optional)
(2) PC with an Ethernet card and TCP/IP installed
(3) Network devices like hub, switch, wireless access point
(4) Network cables
(5) Screwdriver
(6) Power outlet
1.4 Installation Procedure
Follow these steps to install the Device on a flat surface such as a bench:
1) Make sure the Device is powered off.
2) Place the Device upside down on a sturdy, flat bench with a power outlet nearby. Verify that the
bench is well grounded.
3) Remove the adhesive backing from the supplied rubber feet. Attach the four rubber feet to the
round recessed areas on the bottom of the Device.
4) Turn the Device over to make it right side up on the bench.
1.5 Connectin g the Device
Before you install the Device, please make sure your PC can connect to the Internet through your
broadband service successfully. If there is any problem, please contact your ISP for help.
http://www.uttglobal.com Page 6
UTT Technologies Hardware Installation
After that, please install the Device according to the following steps (Here we use UTT AC750GW
as an example). Don’t forget to pull out the power plug and keep your hands dry.
1) Power off your PC(s), Cable/DSL modem, and the Device.
2) Connect the Cable/DSL modem to the Device’s WAN port .
3) Connect one end of an Ethernet cable to one of the LAN ports on the Device, and the other end
to a network port on a PC, hub, switch or wireless access point. Repeat this step to connect
more PCs or other network devices to the Device.
4) Connect the power cord to the power port of the De v i ce. Then plug the other end of the power
cord to a grounded AC power outlet.
5) Power on your network devices, PCs, Switches, Hubs, and so on.
Figure 1-2 Connecting the Device
http://www.uttglobal.com Page 7
UTT Technologies Logging to the Device
Pinging 192.168.1.1 with 32 bytes of data:
Chapter 2. Logging to the Device
This chapter describes how to configure TCP/IP settings on your computer, and how
to login to the Device. In addition,it briefly describes the layout of the Device’s Web
interface.
2.1 Configuring your computer
To configure the Device via Web UI, you need to properly configure TCP/IP settings
on the computer that you use to manage the Device. To do this, please follow these
steps:
Step 1 Connect the computer to a LAN port o f the Device, or connect the computer
to the Device through wireless.
Step 2 Install TCP/IP protocol on your computer. If it is already installed, please
skip this step.
Step 3 Configure TCP/IP settings as Obtain an IP address automatically and
Obtain DNS server address automatically. More information about how to
configure
Step 4 Use the Ping command to verify network connectivity between the computer
and the Device. Open the command prompt on the computer, type
192.168.1.1, and then press Enter.
A successful ping will look like this:
TCP/IP, please refer to the chap ter: Appendix A FAQ.
ping
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Ping statistics for 192.168.1.1:
http://www.uttglobal.com Page 8
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
UTT Technologies Logging to the Device
Pinging 192.168.1.1 with 32 bytes of data:
An unsuccessful ping will look like this:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 192.168.1.1:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
If the Ping command is successful, the
Device is working properly. If the Ping command fails, please do the following:
1) Check physical connection: Verify that the LAN LED on the Device and the LED
on your computer’s network card are lit.
2) Check TCP/IP settin gs: Ver ify that your computer is on the same subnet as the
Device’s LAN interface. E.g., if the Device’s LAN IP address is 192.168.1.1
(default), the computer’s IP address must be an unused IP address in the
192.168.1.0/24 subnet.
connection between the computer and the
2.2 Logging to the Device
No matter what operating system is installed on your computer, such as, M S Windows,
Macintosh, UNIX, or Linux, and so on, you can configure the Device through the Web
browser (e.g., Internet Explorer, Firefox).
Step 1: For local access to the Device’s web-based utility, launch your web browser,
and enter the Device’s default IP address:
the Enter key .
Step 2: A login screen prompts you for your Username and Password. Enter admin
(case sensitive) in the Username field, and enter admin in the Password field. Then
Log In.
click
http://www.uttglobal.com Page 9
192.168.1.1, in the URL field. Then press
Figure 2-1 Address Bar
UTT Technologies Logging to the Device
Figure 2-2 Login Screen
Step 3: After login the Device, the first screen that appears is the Homepage.
Figure 2-3 Homepage
Homepage Description:
1) On the top right corner, there is UTT logo, model and version information, and
quick link icons.
http://www.uttglobal.com Page 10
UTT Technologies Logging to the Device
(1) UTT Logo: Click to go to the home page on the UTT website.
(2) Model, Hardware Version and Software Version: Displays the model number ,
software version and firmware version of the Device.
(3) Quick L ink Icons: Provide quick links to the corresponding pages on the UTT
website.
Product: Click to go to the products page on the UTT website to find
more products.
Forum: Click to go to the forum homepage on the UTT website to
participate in product discussions.
Feedback: Click to send us your feedback by email.
2) On left side there is a two-level main menu bar. You can click a first level menu
item to reveal its submenu items, click again to hide them.
3) The main operating page is located in the center of the page, in which you can
configure various functions, view the related configuration information and status
information, etc.
4) The bottom of the page there is copyright information.
http://www.uttglobal.com Page 11
UTT Technologies Start Menu
Chapter 3. Start Menu
The Start menu is located in the upper left of the WEB interface, which provides you
four commonly used functions:
Restart Device. In this chapter, you can configure the basic parameters to access the
Internet, view each physical interface’s detail information and restart the Device.
3.1 Setup Wizard
This section describes the Start > Setup Wizard page.The Setup Wizard will guide
you to configure the basic parameters to quickly connect the Device to the Internet.
Even unfamiliar with the product, you still can follow the instructions to complete the
setup easily.
Setup Wizard, Interface Status, Interface Traffic, and
3.1.1 Running the Setup Wizard
The first page appears is Setup Wizard immediately after your first login.
Figure 3-1 Running the Setup Wizard
Do Not Automatically Launch Setup Wizard Again: If selected, the system doesn't
automatically launch the
instead directly open the
system will still launch the
Setup Wizard the next time you log into the Device,
System Information page(see Figur e 3-2). Else, the
Setup Wizard automatically.
Exit Wizard: Click to exit the Setup Wizard and go to the Sy ste m In fo rma tion page
(see Figure 3-2). The changes made in the
Next: Click to enter into the next page of the Setup Wizard.
http://www.uttglobal.com Page 12
Setup Wizard will be discarded.
UTT Technologies Start Menu
Figure 3-2 System Information
3.1.2 Setup Wizard - WAN1 Settings
There are three connection types you can configure for WAN Internet connection:
PPPoE, Static IP and DHCP. For the detail information, you can refer to the chapter:
4.1 WAN.
Figure 3-3 Setup Wizard_WAN1 Settings
3.1.3 Setup Wizard - 2.4G Wireless
In this page, you can configure 2.4GHz basic wireless settings of the Device.
http://www.uttglobal.com Page 13
UTT Technologies Start Menu
Figure 3-4 Setup Wizard_2.4G Wireless Settings
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It must be between 1
and 32 characters long, and it is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11g
Only, 11n Only and 11b/g/n Mixed.
11g Only: Pure 802.11g mode, in which the maximum rate is up to 54Mbps.
The wireless clients in compliance with the IEEE 802.11g standard can be
connected to the Device.
11n Only: Pure 802.11n mode, in which the maximum rate is up to 300Mbps.
The wireless clients in compliance with the IEEE 802.11n standard can be
connected to the Device.
11b/g/n Mixed: The wireless clients in compliance with IEEE 802.11b,
802.11g or 802.11n standard will be connected according to their wireless
modes, with the maximum rates of 11M bps, 54M bps and 300M bps
respectively.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select
the optimal frequency band. The wireless devices in the same frequency band w ill
interfere with each other. If there are multiple wireless devices around the Device,
please select a frequency band different from that of other wireless devices when
setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission, with the options: 20M/40M and 20M. Note that this parameter
works only with the wireless clients accessed using the 802.11n standard; for
those using the 802.11b or 802.11g standard, only the channel bandwidth of 20M
can be used:
20M/40M: If selected, the wireless clients accessed using the 802.11n
standard will use the channel bandwidths of 20M or 40M according to the
results of the negotiation with the accessed peer device.
http://www.uttglobal.com Page 14
UTT Technologies Start Menu
20M: If selected, the wireless clients accessed by using the 802 .11g standar d
will use the channel bandwidth of 20M.
3.1.4 Setup Wizard - 5G Wireless
In this page, you can configure 5GHz wireless settings of the Device.
Figure 3-5 Setup Wizard_5G Wireless Settings
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It must be between 1
and 32 characters long, and it is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11a
Only, 11a/n Mixed, 11vht AC/AN/A and 11vht AC/AN.
11a Only: If selected, the wireless clients in compliance with the IEEE
802.11a standard can be connected to the Device.
11a/n Mixed: If selected, the wireless clients in compliance with the IEEE
802.11a and 802.11n standard can be connected to the Device.
11vht AC/AN/A : Very High Throughput IEEE 802.11ac and 802.11a Standard .
If selected, the wireless clients in compliance with the IEEE 802.11ac and
802.11a standard can be connected to the Device.
11vht AC/AN: Very High Throughput IEEE 802.11ac Standard. If selected,
the wireless clients in compliance with the IEEE 802.11ac standard can be
connected to the Device.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select
the optimal frequency band. The wireless devices in the same frequency band w ill
interfere with each other. If there are multiple wireless devices around the Device,
http://www.uttglobal.com Page 15
UTT Technologies Start Menu
please select a frequency band different from that of other wireless devices when
setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission. It provides automatic options, which means that the Device can
automatically select the optimal channel bandwidth.
3.2 Interface Status
On the Start > Interface Status page, you can view the current status of all physical
interface, including the type of interface, connection type, status, IP address, duration
and so on.
Figure 3-6 Interface Status
3.3 Interface Traffic
The interface rate chart dynamically displays the real-time RX/TX rate, average
RX/TX rate, maximum RX/TX rate and total RX/TX traffic of each physical interface. If
you want to view the rate chart of an interface, click the corresponding interface name
hyperlink.
In the interface rate chart, the abscissa (x-axis) shows the time axis, and the ordinate
(y-axis) shows the real-time RX/TX rate axis. Furthermore, you can adjust some
parameters of the chart if needed, such as the time interval during which the real-time
rates are calculated and displayed, and the displayed colors.
Note: The rate chart can only show the rate and traffic information in the last ten
minutes. Each time you launch this page, the rate chart refreshes.
http://www.uttglobal.com Page 16
UTT Technologies Start Menu
Figure 3-7 Interface Status
RX: Displays the real-time RX rate of the physical interface, which refreshes
every two seconds. For the LAN interface, RX means uploading; for the WAN
interface, it means downloading.
TX: Displays the real-time TX rate of the physical interface, which refreshes every
two seconds. For the LAN interface, TX means downloading; for the WAN
interface, it means uploading.
Avg: Displays the average RX or TX rate of the physical interface since last
opened the current page.
Peak: Displays the maximum RX or TX rate of the physical interface since last
opened the current page.
Total: Displays the total RX or TX traffic of the physical interface since last
opened the current page.
LAN/WANx: Click the interface name hyperlink to view the rate chart of the
selected interface. Therein, x (value: 1, 2, 3, 4) indicates the corresponding WAN
interface, and the number of WAN interfaces depends on the specific product
model. For example, click the
interface.
WAN1 hyperlink to view the rate chart of the WAN1
Note:
If the SVG Viewer isn’t installed on your PC, the rate chart cannot be displayed
properly. To view the rate chart, click the
cannot display properly.) hyperlink to download and install the SVG Viewer.
http://www.uttglobal.com Page 17
(Please install SVG viewer if the page
UTT Technologies Start Menu
3.4 Restart Device
On the Start > Restart Device page, you can restart the Device. Clicking the Restart
button, the system will pop up a dialog. Then you can click the
Device, or click the
Cancel button to cancel the operation.
Figure 3-8 Restart Device
Note: Because restarting the Device will disconnect all the sessions, please do it
with caution.
OK button to restart the
http://www.uttglobal.com Page 18
UTT Technologies Network Menu
Chapter 4. Network Menu
4.1 WAN
This section describes Network > WAN page, you can setup t he way to access the
Internet. There are three connection types:
automatically). Depending on which connection type you select, you will see various
settings. We will describe the settings for each connection type respectively.
PPPoE, Static IP and DHCP (Obtain an IP
Figure 4-1 Select Connection Type
4.1.1 PPPoE Conn ec tion
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for
encapsulating PPP frames inside Ethernet frames. Most DSL-based Internet
Service Providers (ISPs) use PPPoE to establish Internet connections for
end-users. If you use a DSL line, check with your ISP to see if they use PPPoE,
and then select
http://www.uttglobal.com Page 19
PPPoE.
UTT Technologies Network Menu
Figure 4-2 PPPoE Connection Setup
ISP Policy: Select the ISP Policy (i.e., route policy database) for each Internet
connection. Thus all traffic destined to an ISP’s servers will be forwarded through
that ISP’s connection.
User Name and Password: Enter the PPPoE login username and password
provided by your ISP.
PPP Authentication: Specify the PPP authentication mode, available options:
NONE, PAP, CHAP and Either.
None: If selected, no protocol will be used.
PAP: If selected, PAP (Password Authentication Protocol) protocol will be
used for PPP authentication.
CHAP: If selected, CHAP (Challenge Handshake Authentication Protocol)
protocol will be used for PPP authentication.
Either: If selected, the Device will automatically negotiate with the peer
device to use PAP or CHAP protocol.
Dial Type: Select the type of dial connection, av ailable options are Always On, On
Demand and Manual.
Always On: If selected, the Device will establish a PPPoE session when
starting up and automatically re-establish the PPPoE session once
disconnected.
http://www.uttglobal.com Page 20
UTT Technologies Network Menu
On Demand: If selected, the Device will est ablish a PPPoE session only
when there are packets requesting to access the Internet (i.e., when a
program on your computer attempts to access the Internet).
Manual: If selected, you can dial or hang up a PPPoE session manually.
Dial Mode: If the PPPoE connection isn’t established successfully even using
correct username and password, you may try to use other modes.
Idle Timeout: Specify the during time the Device keeps the Internet connection
active after no traffic. Which means not terminate Internet connection when the
value is zero.
MTU: When dialing, the Device will automatically negotiate MTU (maximum
transmission unit) with the peer device. Please leave the default value of 1480
bytes, unless you have a special application.
Advanced Options: Click to configure advanced parameters. In most case, you
need not configure them.
4.1.2 Static IP Connection
Some infrastructure situations have to use a static address, such as finding the
Domain Name System (DNS) host where it is, the Device will translate domain names
to IP addresses. Static addresses are convenient, but not absolutely necessary, to
locate servers inside an enterprise.
If you are required to use a permanent IP address, select
Static IP.
Figure 4-3 Static IP Connection Setup
http://www.uttglobal.com Page 21
UTT Technologies Network Menu
ISP Policy: Select the ISP Policy (i.e., route policy database) for each Internet
connection. Thus all traffic destined to an ISP’s servers will be forwarded through
that ISP’s connection.
IP Address: Enter the IP address for the Device’s WAN interface, which is
provided by your ISP.
Subnet Mask: Enter the subnet mask for the Device’s WAN interface, which is
provided by your ISP.
Gateway IP: Enter the IP address for the default gateway, which is provided by
your ISP.
Primary DNS Server: Enter the IP address of your ISP’s primary DNS server.
Secondary DNS Server: Enter the IP address of your ISP’s secondary DNS
server if it is available.
4.1.3 DHCP Connec tion
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol
used on IP networks for dynamically distributing network configuration parameters,
such as IP addresses for interfaces and services. With DHCP, c omputers request IP
addresses and networking parameters automatically from a DHCP server, reducing
the need for a network administrator or a user to configure these settings manually.
If your ISP automatically assigns an IP address, select
subscribers use this connection type.
DHCP. Most cable modem
Figure 4-4 DHCP Connection Setup
4.1.4 Internet Connection List
When you have configured the Internet connection, you can view its status in the
http://www.uttglobal.com Page 22
UTT Technologies Network Menu
Internet Connection List. Click Refresh button to view the current status of the
connection.
Figure 4-5 Internet Connection List
Interface: Displays the name of the physical interface to which the connection is
bound.
Connection Type: Displays the type of the Internet connection.
Status: Displays the current status of the Internet connection. If the connection is
successful, it displays Connected, else it displays Disconnected. When the status
is connected in PPPoE mode, it will also display the elapsed time (day: hour:
minute: second) since connected. And when the status is connected in DHCP
mode, it will also display the time left before the lease expires (day: hour: minute:
second) for current IP address, which is assigned by your ISP’s DHCP server.
IP Address, Subnet Mask and Gateway IP: When the connection type is PPPoE
or DHCP,it displays the IP Address, Subnet Mask and Gateway IP provided by
ISP. When the connection type is
Mask and Gateway IP you set.
Rx Rate(bps): Displays the current download rate of the connection between the
refresh interval.
Tx Rate(bps): Displays the current upload rate of the connection between the
refresh interval.
Static IP,it displays the IP Address, Subnet
4.1.5 Edit the Connection
If you want to edit the connection, do the following:
Step 1 In the Internet Connection List, click the WAN interface hyperlink, th e
related information will be displayed in the setup fields.
http://www.uttglobal.com Page 23
UTT Technologies Network Menu
Step 2 Modify the connection settings.
Step 3 Click the Save button to save the settings.
4.1.6 Delete the Connection
If you want to delete the connection, do the following:
Step 1 In the Internet Connection List, click the related WAN hyperlink, the related
information will be displayed in the setup fields.
Step 2 Click the Delete button below the Internet Connection List.
Step 3 In the pop-up window, click the OK button to delete the connection.
Note: The default WAN1 connection can’t be deleted but edited.
4.1.7 Dial or Hang up a PPPoE connection
If the connection type is PPPoE, when you click the WAN1 hyperlink, the Connect,
Disconnect and Refresh buttons will be shown on the Internet Connection List.
Note:
1) If you have chosen Manual as Dial Type for PPPoE connection, you need to click
Connect button to dial-up the Internet connection and click the Disconnect
the
button to hang it up.
2) Click the Refresh button to view the current status of the connection.
Figure 4-6 Internet Connection List_PPPoE Connection
http://www.uttglobal.com Page 24
UTT Technologies Network Menu
4.1.8 Renew or Release a DHCP Connection
If the connection type is DHCP, when you click the WAN1 hyperlink, the Renew,
Release and Refresh buttons will be shown on the Internet Connection List.
Click the
the
Click the
Renew button to re-acquire an IP address from the ISP’s DHCP server. Click
Release but ton to release the IP address obtained from the ISP’s DHCP server.
Refresh button to view the current status of the connection.
Figure 4-7 Internet Connection List - DHCP Connection
4.2 Load Balancing
This section describes the Network > Load Balancing page. When using multiple
Internet connections, you can configure load balancing related parameters, such as
load balancing mode, detection interval, retry times, and ID binding, and so on.
4.2.1 Internet Connection Detection Mechanism
When using multiple Internet connections, the Device should have the ability to
real-time monitor each Internet connection to ensure the network will not be
interrupted even a connection is faulty. To this end, we design flexible automatic
detection mechanism on the Device and provide multiple detection methods to meet
the actual requirements.
For the sake of convenience, we firstly introduce several parameters.
●Detection T ar get IP: The IP addres s o f a target device. The Device will monitor an
Internet connection by sending the detection packets to the specified target IP
address.
●Detection Interval: The time interval at which the Device periodically sends
detection packets, one packet at a time. Especially, if you don’t want to monitor an
http://www.uttglobal.com Page 25
UTT Technologies Network Menu
Internet connection, please set it as 0.
●Retry Times: The number of retries per detection period.
For a normal Internet connection and a faulty Internet connection, the detection
mechanisms are different.
For a faulty normal Internet connection, the detection mechanism is as follows: The
Device periodically sends a detection packet at th e speci fied time inte rv al t o the target
IP address. Once no response packet received during a detection period, the Device
will consider that the connection is faulty and shield it immediately. For example, by
default, if the Device has sent three detection packets but not received any response
packet during a detection period, it will consider that the connection is faulty.
For a normal Internet connection, the detection mechanism is as follows: Similarly, the
Device also periodically sends a detection packet at the specified time interval to the
target IP address. Once more than half of the response packets received during a
detection period, the Device will consider that the connection is back to normal and
enable it immediately. For example, by default, if the Device has sent three detection
packets and received two packets during a detection period, it will consider that the
connection is back to normal.
Note: If you don’t want to monitor an Internet connection, please set the value of
Detection Interval as 0.
4.2.2 Global Settings
The Device provides two connection groups: primary connection group and backup
connection group. An Internet connection belonging to the primary connection group
is a primary connection while an Internet connection belonging to the backup
connection group is a backup connection. By default, all the Internet connections are
primary connections. It allows you to divide one or more connections into the backup
connection group.
The Device provides two load balancing modes:
Balancing.
If you choose to use
primary connections. The operation principle is as follows:
1) If all the Internet connections are normal, the LAN users will use these
connections to access the Internet.
Full Load Balancing, all the Internet connections are used as
Full Load Balancing and Partial Load
2) If an Internet connection is faulty, the Device will shield it immediately, and the
traffic through the faulty connection will be distributed to other normal conne ctions
automatically.
http://www.uttglobal.com Page 26
UTT Technologies Network Menu
3) Once the faulty connection is back to normal, the Dev ice will enable it immediately,
and the traffic will be redistributed automatically.
If you choose to use Partial Load Balancing, some Internet connections are used as
primary connections, and others are used as backup connections. The operation
principle is as follows:
1) As long as one or more primary connections are normal, the LAN users will use
the primary connection(s) to access the Internet. In this case, if there is more than
one primary connection, the Device will control and balance the traffic among
these connections.
2) If all the primary connections are faulty, it will automatically switch to the backup
connection(s) to let the LAN users use them to access the Internet. In this case, if
there is more than one backup connection, the Device will control and balance
the traffic among these connections.
3) Once one or more faulty primary connections are back to normal, it will
automatically switch back to the primary connection(s).
Note: During connections switching, some user appl ications (such as some online
games) may be interrupted unexpectedly due to the nature of TCP connection.
UTT Technologies Co., Ltd. will not bear all the losses and legal
caused by it.
proceedings
4.2.2.1 Full Load Balancing
Select the Full Load Balancing check box and click the Save button to save the
settings.
Figure 4-8 Full Load Balancing
4.2.2.2 Partial Load Balancing
Select the Partial Load Balancing check box and then set primary connection and
backup connection, lastly, click the
http://www.uttglobal.com Page 27
Save button to save the settings.
UTT Technologies Network Menu
Figure 4-9 Partial Load Balancing
Mode: Specify the mode of load balancing. Here please select Partial Load
Balancing.
Primary: Specify the primary connection group. An Internet connection in the
Primary list box is a primary connection.
Backup: Specify the backup connection group. An Internet connection in the
Backup list box is a backup connection.
==>: Select one or more Internet connections in the Primary list box, and then
click
==> to move the selected connection(s) to the Backup list box.
<==: Select one or more Internet connections in the Backup list box, and then
click
<== to move the selected connection(s) to the Primary list box.
4.2.3 Load Balancing List
When you have configured load balancing parameters for one or more Internet
connections, you can view the related configuration and status information in the
Balancing List.
If you want to modify the detection related parameters, click its
related information will be displayed in the
configure or modify it, and click the
Save button.
Detection and Bandwidth page. Then
Edit hyperlink, the
Load
http://www.uttglobal.com Page 28
UTT Technologies Network Menu
Figure 4-10 Load Balancing List
4.2.4 Detection and Bandwidth
In the Network > Load Balancing > Detection and Bandwidth page, you can configure
the connection detection related parameters for each Internet connection respectively.
Figure 4-11 Detection and Bandwidth Settings
Interface: Select the physical interface you want to set load balancing.
Detection Interval: Specify the time interval at which the Device periodically sends
detection packets, one packet at a time. The value should be between 1 and 60
seconds, or 0. 0 means that connection detection is disabled on the selected
Internet connection.
Retry Tim e s: Specify the number of retries per detection period.
http://www.uttglobal.com Page 29
UTT Technologies Network Menu
Detection Target: The IP address of a detection target device. The Device will
monitor an Internet connection by sending the detection packets to the detection
target IP address. If you select
Device will send the detection packets to the selected Internet connection’s
default gateway; If you select
to enter an appropriate public IP address in the associated text box, then the
Device will send the detection packet to this IP address.
Bandwidth: Specify t he bandwidth of this interface provided by ISP.
Gateway IP Address from the drop-down list, the
Other IP Address from the drop-down list, you need
4.2.5 Identity Binding
When using multiple Internet connections, the same application will be assigned to
the different connections, thus some applications (such as online banking, QQ, etc.)
cannot be used normally due to the identity change. We provide ID binding feature to
solve this problem: After you enable Identity Binding, the Device will assign the same
application to the same Internet connection. For example, when a LAN user logs in to
an online banking system, if the first session is assigned to the WAN2 Internet
connection, henceforth all the subsequent NAT sessions of the online banking
application will be assigned to the WAN2 connection until the user logs out.
Figure 4-12 Identity Binding
Enable ID Binding: If selected, you will enable ID binding feature for some
applications such as online banking, QQ, etc.
4.3 LAN
This section describes Network > LAN page. Y ou can set up to four IP addresses for
the LAN interface. With the IP address o f LAN interface, you can log into the Device. If
the IP address has been changed, you need to re-login to the Device using the new
address.
http://www.uttglobal.com Page 30
UTT Technologies Network Menu
Figure 4-13 LAN Settings
IP Address: Specify the IP address of the LAN interface. The default value is
192.168.1.1.
Subnet Mask: Specify the subnet mask that defines the range of the LAN. The
default value is 255.255.255.0.
MAC Address: The MAC address of the LAN interface. We recommend that you
do not change the default value unless absolutely necessary.
Interface Mode: Specify the speed and duplex mode of the LAN interface. The
Device supports five or six modes (Note that only the gigabit LAN interface
supports
Half-Duplex),
100M-FD (100M Full-Duplex), and 1000M-FD (1000M Full-Duplex). In most
cases, please leave the default value. If a compatibility problem occurred, or the
network device connected to the LAN interface doesn’t support auto-negotiation
function, you may modify it as required.
1000M-HD), which include Auto (Auto-negotiation), 10M-HD (10M
1) You can assign two IP addresses to the Device’s LAN interface to connect two
subnets. The hosts on the two subnets can communicate with each other.
2) If you have changed the LAN IP address and saved the change, you should use
the new IP address to re-login to the Device. And the default gateway of each
LAN host should be changed to this new IP address, thus the LAN hosts can
access the Device and Internet.
http://www.uttglobal.com Page 31
UTT Technologies Network Menu
4.4 DHCP Server
The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing
configuration information to hosts on a TCP/IP network. DHCP allows a host to be
configured automatically, eliminating the need for intervention by a network
administrator. The Dev ice can act as a DHCP serv er to assign network addresses an d
deliver other TCP/IP configuration parameters (such as gateway IP address, DNS
server IP address, etc.) to the LAN hosts.
4.4.1 DHCP Server Settings
The DHCP server assigns an IP address to a requesting client from a DHCP address
pool, which also can be configured to provide other TCP/IP configuration parameters
to the client, such as the DNS Server, gateway IP address, etc.
Figure 4-14 DHCP Server Settings
http://www.uttglobal.com Page 32
UTT Technologies Network Menu
Enable DHCP Server: Select to enable DHCP server.
Start and End IP Address: Specify the range of IP addresses assigned to DHCP
clients. The range of IP addresses must be on the same subnet as the LAN
interface of the Device, and cannot include the IP address of the LAN interface.
Subnet Mask: The subnet mask address assigned by the DHCP server to the
intranet computers automatically. This subnet mask must match the subnet mask
of the LAN interface.
Gateway IP: Specify the gatew ay IP address assigned by the DHCP server to th e
intranet computers automatically. This gateway IP address must mat ch the
gateway IP address of the LAN interface.
Lease Time: The leasing time for the network computers to obtain the IP address
assigned by the Device (Unit: Seconds).
Primary DNS Server: The primary DNS server IP address assigned by the DHCP
server to the Intranet computers automatically.
Secondary DNS Server: The secondary DNS server IP address assigned by the
DHCP server to the Intranet computers automatically.
Option 43: By modifying the variable length fields of option 43 attribute in the
DHCP protocol packets which is used to carry the IP address of AC, AP analyze
the AC address carried by option 43 to discover AC. The available options are
Disable, HEX Length, ASCII Length, and Customized.
AC Address: The IP address of AC.
Enable DNS Proxy: Select to enable DNS Proxy. When acting as a DNS proxy,
the Device listens for incoming DNS requests on the LAN interface, relays the
DNS requests to the current public network DNS servers, and replies as a DNS
resolver to the requesting LAN hosts.
ISP DNS Server 1 or ISP DNS Server 2: Specify the IP address of ISP’s DNS
server that is available to a DHCP client.
Note:
1) If the DHCP Server is enabled, the LAN computer could obtain an IP address and
other TCP/IP parameters from the Device’s built-in DHCP server aft er setting the
way of computer’s getting IP address as "obtain an IP address automatically".
2) If the DNS proxy is enabled on the Device, in order to use DNS proxy service
normally, the LAN hosts’ primary DNS server needs to be set same to the
Device’s LAN IP address. Note: If the DHCP server is also enabled on the Device,
the Device will assign its LAN IP address as the primary DNS server address to
the LAN hosts automatically.
3) To ensure that the DNS proxy works well, you should at least specify the primary
http://www.uttglobal.com Page 33
UTT Technologies Network Menu
DNS server provided by your ISP on the Device. It is obvious that you can specify
the secondary DNS server provided by your ISP.
4) The Device can act as a DNS proxy server to all LAN users; this greatly simplifies
the LAN hosts setup. For example, there is a LAN DNS proxy server on which a
DNS proxy software is installed (e.g., Wingate), and the LAN users take this
server’s IP address as the primary DNS server address. Now, the Device will be
used as a new gateway for the LAN hosts. In this case, in order to use DN S prox y
service normally, the administrator only need change the Device’s LAN IP
address to the old proxy DNS server’s IP address, and enable DNS proxy on the
Device, without modifying the LAN hosts’ related settings.
4.4.2 Static DHCP
This section describes the static DHCP list and the way to configure a static DHCP.
Using the DHCP Server to automatically configure TCP/IP properties for the LAN
computers is very convenient, but it can cause a computer to be assigned with
different IP address at different times. Some Intranet computers may need a fixed IP
address; in this case, the static DHCP function is required, to bind the computer's MAC
address with an IP address. As shown in Figure 4-15, when a computer with
00E06108A443 as MAC address requests the IP address from the DHCP server, the
DHCP server will find a corresponding fixed IP address (192.168.1.101) based on its
MAC address and assign it to the computer.
4.4.2.1 Static DHCP List
You can add, view, modify and delete static DHCP entries on the Network > DHCP
Server > Static DHCP page.
Figure 4-15 Static DHCP List
http://www.uttglobal.com Page 34
UTT Technologies Network Menu
4.4.2.2 Static DHCP Settings
Click the Add button on the page as shown in Figure 4-15 to enter into the Static
DHCP Settings page as shown below, and then configure it.
Figure 4-16 Static DHCP settings
User Name: Specify a unique name for the static DHCP entry.
IP Address: Specify the reserved IP address, which must be the valid IP address
within the range of IP addresses assigned by the DHCP server.
MAC Address: Specify the MAC address of the computer to use this reserved IP
address in a fixed way.
Note:
1) After the setting is successful, the Device will assign the preset IP address for the
specified computer in a fixed way.
2) The assigned IP addresses must be within the range provided by the DHCP
server.
4.4.3 DHCP Auto Binding
If the hosts change frequently on the local area network, it is very troublesome to
configure static DHCP entries manually. And it will cause some user s who c an’t acce ss
the Device and Internet. To deal with these issues, the Device provides DHCP
auto-binding feature.
Once the DHCP auto binding is enabled, the Device will immediately scan the LAN to
detect active hosts connected to the Device, learn dynamic ARP information and bind
the related valid IP and MAC address as a static DHCP entry.
http://www.uttglobal.com Page 35
UTT Technologies Network Menu
Figure 4-17 DHCP Auto Binding
Enable DHCP Auto Binding: If selected, once a LAN host obtains an IP address
from the Device that acts as a DHCP server, the Device will immediately bind the
host’s IP and MAC address as a static DHCP entry.
Enable DHCP Auto Deleting: If selected, the Device will automatically delete the
static DHCP entry when the corresponding host releases the IP address
initiatively or its lease time expires.
4.4.4 DHCP Client List
When acting as a DHCP client, the Device can dynamically obtain an IP address and
other TCP/IP configuration parameters from a DHCP server. The information of those
DHCP clients who have obtained an IP address and other TCP/IP configuration
parameters will be display in the
DHCP server assigns the IP address of 192.168.1.100 in the address pool to the
network computers whose MAC address is 74:D4:35:47:26:74, and the rest of the
time for the computer to lease this IP address is 3,574 seconds.
DHCP Client List. Such as in the following figure, the
Figure 4-18 DHCP Client List
http://www.uttglobal.com Page 36
UTT Technologies Network Menu
4.4.5 Example of DHCP
1) Requirements
In this case, the DHCP function must be enabled on the Device, with the start IP
Address as 192.168.1.10, and a total of 50 addresses can be assigned; here, the host
with the MAC address of 00:21:85:9B:45:46 assigns the fixed IP address of
192.168.1.15, and the host with the MAC address of 00:1F:3C:0F:07:F4 assigns the
fixed IP address of 192.168.1.10.
2) Configuration Steps
Step 1 Goto Network > DHCP Server > DHCP Server Settings page.
Step 2 Select Enable DHCP Server, enter 192.168.1.10 and 192.168.1.59 in the
Start IP Address and End IP Address text box, configur e other parameters as
required, and click the
Save button at the end of configuration.
Figure 4-19 DHCP Server Settings_Example
Step 3 Go to Network > DHCP Server > Static DHCP page and click the Add
button.
Step 4 Configure the two static DHCP instances in the request, as shown the
following two figures.
Figure 4-20 Static DHCP Settings_Example A
http://www.uttglobal.com Page 37
UTT Technologies Network Menu
Figure 4-21 Static DHCP Settings_Example B
At this point, the configuration is complete, and you can view the information about 2
static DHCP entries in the
Static DHCP List as shown in the following figure.
Figure 4-22 Static DHCP List_Example
4.5 DDNS
Dynamic Domain Name Service (DDNS) is a service used to map a domain name
which never changes to a dynamic IP address which may change quite often. For
example, if you have applied PPPoE connection with dynamically assigned IP
address from the ISP, you can use DDNS to allow the external computers to access
the Device by a static domain name.
In order to use DDNS service, you need to register an account with a DDNS provider.
Each DDNS provider offers its own specific network services. The DDNS service
provider reserves the right to change, suspend or terminate your use of some or all
network services at any time for any reason. The DDNS service providers supported
by UTT Technologies currently provide free DDNS services, but they may charge for
the DDNS services in the future. In this case, UTT Technologies will notify you as
soon as possible; if you refuse to pay for the services, you will no longer be able to
use them. During the free phase, UTT Technologies does not guarantee that the
DDNS services can meet your requirements and will be uninterrupted, and UTT does
not guarantee the timeliness, security and accuracy of the services.
http://www.uttglobal.com Page 38
UTT Technologies Network Menu
So far, UTT Technologies Co., Ltd. only supports two DDNS service providers by
no-ip.com and dyndns.org. It will successively support other DDNS service providers
in the future.
4.5.1 DDNS Service provided by no-ip.com
1) Register a Domain Name with no-ip.com
Please login to
no-ip.com.
2) DDNS Settings – no-ip.com
Service Provider: Select the DDNS service provider who offers services to the
Device. Here please select
http://www.noip.com/
Figure 4-23 DDNS_no-ip.com
no-ip.com.
to register a doma in name with the suffi x of
Host Name: Specify the host name of the Device.
User Name: Enter the username of the account. It should be the same with the
username that you entered when registering the DDNS account.
Password: Enter the key that you got when registering the DDNS account.
4.5.2 DDNS Service provided by dyndns.org
1) Register a Domain Name with no-ip.com
Please login to
dyndns.org.
2) DDNS Settings –dyndns.org
http://www.uttglobal.com Page 39
http://www.dyndns.org
to register a domain name with the suffix of
UTT Technologies Network Menu
Figure 4-24 DDNS_dyndns.org
Service Provider: Select the DDNS service provider who offers services to the
Device. Here please select
dyndns.org.
Host Name: Specify the host name of the Device.
User Name: Enter the username of the account. It should be the same with the
username that you entered when registering the DDNS account.
Password: Enter the key that you got when registering the DDNS account.
4.5.3 DDNS Verification
To verify whether DDNS is updated successfully, you can use the ping command at
the command prompt on the PC (for example
If the displayed page is similar to the screenshot below, t he dom ain name is resolved
to an IP address successfully (58.246.187.126 in this example), that is, DDNS is
updated successfully.
ping avery12345.3322.org).
Note:
http://www.uttglobal.com Page 40
UTT Technologies Network Menu
1) If your ISP assigns a private IP address (192.168.x.x, 10.x.x.x, or 172.16.x.x)
instead of a public IP address to the Device, DDNS will not work.
2) DDNS feature can help you implement VPN tunnels using dynamic IP addresses
on the Device.
4.6 UPnP
The Universal Plug and Play (UPnP) is an architecture that implements zero
configuration networking, that is, it provides automatic IP configuration and dynamic
discovery of the UPnP compatible devices from various vendors. A UPnP compatible
device can dynamically join a network, obtain an IP address, announce its name,
convey its capabilities upon request, and learn about the presence and capabilities of
other devices on the network.
The Device can implement NAT traversal by enabling UPnP. When you enable UPnP,
the Device allows any LAN UPnP-enabled device to perform a variety of actions,
including retrieving the public IP address, enumerate existing port mappings, and add
or remove port mappings. By adding a port mapping, a UPnP-enabled device opens
the related service ports on the Device to allow the Internet hosts access. Windows
Messenger is an example of an application that supports NAT traversal and UPnP.
The Device provides
rules established using UPnP. You can view each port forwarding
information in the list, which includes internal IP address, internal port, protocol,
remote IP address, external port, and description.
the UPnP Port Forwarding List, which lists all the port forwarding
rule’s detailed
Figure 4-25 UPnP
http://www.uttglobal.com Page 41
UTT Technologies Network Menu
4.7 Number of WAN
On the Network > Number of WAN page, you can set the number of WAN interface.
Select the number of WAN interface and click the
Figure 4-26 Number of WAN Settings
Note:
1) After the number of WAN interface is changed, you need to restart the Device for
the setting take effect.
Save button to save the settings.
2) After the Device restart, all customer settings will be reset to the factory default
settings.
http://www.uttglobal.com Page 42
UTT Technologies Wireless Menu
Chapter 5. Wireless Menu
This chapter describes how to configure and use the 2.4GHz wireless features of the
Device. You can access to the 2.4GHz wireless application by clicking
5.1 Basic
In the Wireless > Basic page, you can configure the AP operation mode, SSID,
wireless mode, wireless mode, channel, channel bandwidth, enabling or disabling the
SSID broadcast and other functions of the Device.
WDS (Wireless Distribution System) is a protocol for two access points (AP) in
wireless connection. Throughout the WDS wireless network, multiple APs are
connected by the way of bridging or repeater, make the entire LAN be dominated by
wireless mode.
Wireless menu.
The WDS configuration provided by the Device consists of three modes: Bridge Mode,
Repeater Mode and Lazy Mode, which only plays a bridging function in the practical
application. Note: In the configuration, the LAN IP of the device must be in the same
network segment while the parameters for security mode and channel bandwidth for
connecting with each other must be consistent.
The par ameters of the Basic page will be introduced in the order of four kinds of
working mode, AP mode, Repeater mode, Bridge mode, Lazy mode.
http://www.uttglobal.com Page 43
UTT Technologies Wireless Menu
5.1.1 AP Mode
Figure 5-1 AP Mode
Enable Wireless: Select to open 2.4GHz Wireless network.
Operation Mode: Select AP Mode (namely the pure AP mode), in which the peer
device can be a single client.
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network. It is case sensitive.
Wireless Mode: Specify the wireless modes of the Device. The options are 11g
Only, 11n Only, 11b/g/n Mixed and 11g/n Mixed.
1 1g Only: pure 802.11g mode, in which the maximum rate is up to 54Mbps.
The wireless clients in compliance with the IEEE 802.11g standard can be
connected to the Device.
11n Only: pure 802.11n mode, in which the maximum rate is up to 300Mbps.
The wireless clients in compliance with the IEEE 802.11n standard can be
connected to the Device.
11b/g/n Mixed: The wireless clients in compliance with IEEE 802.11b, 802.11g
or 802.11n standard will be connected according to their wireless modes, with
the maximum rates of 11M bps, 54M bps and 300M bps respectively.
http://www.uttglobal.com Page 44
UTT Technologies Wireless Menu
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select
the optimal frequency band. The wireless devices in the same frequency band w ill
interfere with each other. If there are multiple wireless devices around the Device,
please select a frequency band different from that of other wireless devices when
setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission, with the options: Auto, 20M and 40M. Note that this parameter
works only with the wireless clients accessed using the 802.11n standard; for
those using the 802.11b or 802.11g standard, only the channel bandwidth of 20M
can be used:
Auto: If selected, the wireless clients accessed using the 802.11n standard
will use the channel bandwidths of 20M or 40M according to the results of the
negotiation with the accessed peer device.
20M: If selected, the w ireless clients accessed by using the 802 .11g standard
will use the channel bandwidth of 20M.
40M: If selected, the wireless clients accessed by using the 802.11n standard
will use the channel bandwidth of 40M.
Enable SSID Broadcast: If enabled, the Device will broadcast its own SSID to all
the wireless clients to be able to connect to the Device, and access to the
wireless network with this SSID identifier. This function is enabled at risk, illegal
sites are very easy to get the SSID information, so it is generally recommended to
disable this function.
Notes:
1) The wireless function has been enabled by default and its work mode is AP
Mode.
2) After the wireless parameters are modified, the device will disconnect all wireless
connections.
5.1.2 Repeater Mode
The Device in Repeater Mode can exchange data with single clients and the network
devices in Bridge Mode, Repeater Mode, Lazy Mode.
http://www.uttglobal.com Page 45
UTT Technologies Wireless Menu
Figure 5-2 Repeater Mode
For the parameter’s meaning of Enable Wireless, Operation Mode, SSID, Wireless
Mode, Channel, Channel Width, Enable SSID Broadcast, please refer to t he section:
5.1.1 AP Mode.
AP MAC Address: Specify the MAC address of the peer device.
Security Mode: The encryption mode used in the establishment of a connection
through the WDS function, including four options:
None, WEP, TKIP and AES.
None: If selected, no encryption algorithms will be used to protect
communication data in the data exchange process.
WEP: If selected, the WEP encryption algorithm will be used to protect data
during the data exchange process. For details, please refer to the section:
5.2.1 WEP.
TKIP: If selected, the TKIP encryption algorithm will be used to protect data
during the data exchange process. For details, please refer to the section:
5.2.3 WPA-PSK/WPA2-PSK.
AES: If selected, the AES encryption algorithm is used to protect data during
http://www.uttglobal.com Page 46
UTT Technologies Wireless Menu
the data exchange process. For details, please refer to the section:
WPA-PSK/WPA2-PSK.
5.2.3
5.1.3 Bridge Mode
The Device in Bridge Mode is connected to two or more wired networks, and the
device will no longer send wireless signals to other clients. The Device in Bridge mode
could exchange data with the devices in Bridge Mode, Repeater Mode, Lazy Mode.
The meaning of related configuration parameters is the same as the Repeater Mode.
Figure 5-3 Bridge Mode
5.1.4 Laz y Mode
The Device in Lazy Mode can exchange data with single clients and network devices
in the Repeater Mode and Bridge Mode. The meaning of related configuration
parameters is the same as AP Mode and Repeater Mode.
http://www.uttglobal.com Page 47
UTT Technologies Wireless Menu
Figure 5-4 Lazy Mode
5.2 Security
To ensure the security of your wireless network, it is strongly recommended to
configure your wireless password. Go to
wireless security mode separately.
There are four kinds of security mode you can use on your wireless network, which
are
None, WEP, WPA/WPA2, WPA-PSK/WPA2-PSK. If you want client access to
the network without security authentication, please choose the default value
On the next section, we will introduce anot her three types of security mode.
5.2.1 WEP
Wired Equivalent Privacy (WEP) is the basic encryption mode which is not as secure
as WPA.
Wireless > Security page to configure
None.
http://www.uttglobal.com Page 48
UTT Technologies Wireless Menu
Figure 5-5 Security mode_WEP
Authentication Type: Select the authentication type under WEP security mode.
The Device must authenticate a wireless client before the client can join the
wireless network. There are three options:
Auto, Open System and Shared Key.
Auto: Select to allow the Device automatically choose Open System or
Shared key mode according to the requests of wireless clients.
Open System: At this point, the wireless client host can pass the
authentication and be associated with the wireless devices on the premise of
providing no authentication key; but a correct key must be provided if data
transmission is to be made.
Shared key: At this point, the wireless client host must provide the correct key
to pass the authentication; otherwise, it cannot be associated with the
wireless devices, and cannot perform data transmission.
Key Format: Select the format for entering the WEP keys. The options are Hex
and
ASCII.
Hex: Select it to enter the WEP keys in hexadecimal format. Hexadecimal
digits are a set of characters that includes numbers 0 through 9 and letters A
through F (or a through f). Hex WEP keys are case insensitive.
ASCII: Select it to enter the WEP keys in ASCII format. ASCII WEP keys are
case sensitive.
Default Tx Key: Select one of the WEP keys as the default transmitting key to
transmit data. All keys can be used to receive data.
WEP Key: Enter a key in one of the WEP Key boxes. You can enter up to four
WEP keys. You should enter a key according to the
Key Format and Key Type
selected.
For 64-bit encryption, enter 10 hex characters or 5 ASCII characters.
http://www.uttglobal.com Page 49
UTT Technologies Wireless Menu
For 128-bit encryption, enter 26 hex characters or 13 ASCII characters.
Key Type: Select the size of each key, and it also allows you to disable or enable
each key. The options are
selected, which means the key is of no effect.
Disabled, 64-bit and 128-bit. By default, Disabled is
5.2.2 WPA/WPA2
Wi-Fi Protected Access (WPA ) and Wi-Fi Protected Access II (WPA2) are two security
protocols and security certification programs to secure wireless computer networks. In
WPA/WPA2 mode, the Device uses an external RADIUS server to authenticate
wireless clients.
Figure 5-6 Security mode_ WPA/WPA2
WPA Mode: Select the WPA mode you want to use. The options are Auto, WPA
and WPA2:
Auto: If selected, the Device can automatically choose WPA or WP A2 security
mode according to the requests of wireless clients.
WPA: If selected, the Device will use the security mode of WPA.
WPA2: If selected, the Device will use the security mode of WPA2.
Encryption Method: Select the encryption method you want to use. The options
are
Auto, TKIP and AES.
Auto: If selected, the Device automatically chooses encryption method for
each wireless client.
TKIP: If selected, the Device will use TKIP for data encryption.
AES: If selected, the Device will use AES for data encryption.
http://www.uttglobal.com Page 50
UTT Technologies Wireless Menu
Radius Server IP: Specify the IP address of the RADIUS server, which is used to
authenticate wireless clients.
Radius port: The service port number used by the Radi us server for authenticating
wireless hosts. The valid range is 1 to 65535, and the default value is 1812.
Shared Secret: Specify the password used for authentication between the Device
and RADIUS server.
Key Renewal Interval: Specify the value of frequency (in seconds) the WPA group
key changes. Value range is 60 ~ 86400 seconds. The default value is 3600
seconds, which means no update when the value is 0.
5.2.3 WPA-PSK/WPA2-PSK
This mode intends for the wireless network that doesn’t have a RADIUS server. In this
mode, the Device uses the pre-shared key that is manually entered to generate
encryption keys.
Figure 5-7 Security mode_ WPA-PSK/WPA2-PSK
WPA Mode: Specify the WPA mode the Device will use:
Auto: If selected, the Device can automatically choose WPA-PSK or
WPA2-PSK security mode according to the requests of wireless clients.
WPA-PSK: If selected, the Device will use the security mode of WPA-PSK.
WPA2-PSK: If selected, the Device will use the security mode of WPA2-PSK.
Encryption Method: Specify the security algorithm used to encrypt wireless data,
with the options like
Auto: If selected, the Device will automatically choose encryption algorithms
according to needs.
TKIP: If selected, the Device will use TKIP as the encryption algorithm.
AES: If selected, the Device will use TKIP as the encryption algorithm.
Auto, TKIP and AES.
http://www.uttglobal.com Page 51
UTT Technologies Wireless Menu
Pre-shared Key: The preset initialization key, with the value of 8 ~ 63 characters.
Key Renewal Interval: Key Renewal Interval: Specify the value of frequency (in
seconds) the WPA group key changes. Value range is 60 ~ 86400 seconds. The
default value is 3600 seconds, which means no update when the value is 0.
5.3 MAC Filtering
This section describes the Wireless > MAC Filtering page. The MAC address filtering
is used to filter the wireless clients based on their MAC addresses. With this feature,
you can either allow or block specific wireless clients to connect to the Device.
Figure 5-8 MAC Filter
Enable MAC Address Filtering: Select to enable MAC address filtering.
Filtering Mode: Select the mode of MAC address filtering.
Only allow MAC addresses list ed belo w: If selected, the wireless clients with
MAC address listed in
but block all other wireless clients.
Only block MAC addresses listed below: If selected, the wireless clients with
MAC address listed in
but allow all other wireless clients.
MAC Address Filtering List: Display all the MAC Filter entry you have set.
http://www.uttglobal.com Page 52
MAC Filter List will be allowed to connect the Device,
MAC Filter List will be blocked to connect the Device,
UTT Technologies Wireless Menu
Add: Click to enter into MAC Address Filtering Settings page to configure the
MAC addresses to be filtered.
Figure 5-9 Configuration of MAC address filtering
5.4 Advanced
On the Wireless > Advanced page, you can setup advanced parameters of the
wireless mode, such as RTS Threshold, Fragmentation Threshold, and so on. In most
case, you can keep it as the default value but you have special needs.
Figure 5-10 Advanced Wireless Settings
RTS Threshold: Specify the value of RTS Threshold. Value range is 1~2347 bytes,
and the default is 2347 bytes.Typically, sending RTS/CTS frames does not occur
unless the packet size exceeds this threshold. If the packet size that the node
wants to transmit is larger than the threshold, the RTS/CTS handshake gets
triggered. The process of transmitting data is as following :
1) Device A (for example) initiates the process by sending a R equest to Sent
(RTS) to Device B (for example).
2) Device B replies with a Clear To Send (CTS).
3) After receiving CTS, Device A sends data.
RTS/CTS is the optional mechanism used by the802.11wireless networking
http://www.uttglobal.com Page 53
UTT Technologies Wireless Menu
protocol to reduce frame collisions introduced by thehidden node problem. The
value of RTS Threshold should be set reasonably. The smaller the value is, the
higher the frequency of the Device sends RTS frames are. Obviously, it will
influence the throughput, but it will be faster recovering from interrupt and data
collision.
Fragmentation Threshold: Specify the maximum length of wireless data packet
allowed to transmit on MAC layer. When the length of Data frames exceeds this
value, they will automatically be segmented into multiple data frames, and then
transmitted again. If the fragmentation transmission is interrupted, only the parts
that are not sent successfully need to be sent, and the throughput of
fragmentation packets is generally low. Value range is 256~2346 bytes, and the
default is 2346 bytes.
Beacon Interval: The Device synchronizes with the wireless network by
periodically broadcasting a beacon frame. This parameter is used to specify the
transmission interval of beacon frames. Value range is 20~999 milliseconds, and
the default is 100 milliseconds.
DTIM Interval:A Delivery Traffic Indication Map (DTIM) period value is a number
that determines how often a beacon frame includes a Delivery Traffic Indication
Message, and this number is included in each beacon frame. A DTIM is included
in beacon frames, according to the DTIM period, to indicate to the client devices
whether the access point has buffered broadcast and/or multicast data waiting for
them. Following a beacon frame that includes a DTIM, the access point will
release the buffered broadcast and/or multicast data if any exists. Its use range is
1 ~ 255 and its default value is 1.
Enable Short Preamble: If selected, it will use Short Preamble. Short
Preamble can improve the utilization of wireless channel to realize high priority
transmission bandwidth. If not, it will use long preamble. Which can ensure
compatibilities with some old 802.11b devices that require the long preamble, but
it will slightly reduce throughput at high data rate.
Enable WMM: WMM (Wi-Fi Multimedia) is a subset of the 802.11e standard.
WMM allows wireless traffic to have a priority range based on the data type.
Time-sensitive information, such as video or audio, will have a higher priority than
the normal traffic. To use the WMM function properly, wireless clients must also
support WMM.
5.5 Client List
On the Wireless > Client List page, you can view the status information of the wireless
hosts currently connected to the device. Through the
can also easily set
MAC Filtering function.
Wireless Client Status List, you
http://www.uttglobal.com Page 54
UTT Technologies Wireless Menu
Figure 5-11 Wireless Client List
ID: Serial number.
MAC Address: The MAC address of wireless clients.
Filter: Select to added the current MAC address into the Wireless Client Status
List (which can be viewed in the Wireless > MAC Filtering page).
Channel Width: Displays the theoretical data transfer rate of the data channel.
Filter All: Click the button to add all MAC address whose filtering is not enabled in
the current list to MAC Address Filtering List.
Refresh: Click the button to view the latest wireless host status.
http://www.uttglobal.com Page 55
UTT Technologies Wireless Menu
5.6 Example of AP Mode Configuration
Figure 5-12 Network Topology_AP Mode Example
1) Requirements:
Some users want to put desktop computers, laptops, Tablet PCs, smartphones on
the Internet via wireless devices and prevent strangers from accessing to the
Devices. Here, the gateway address is 192.168.1.1.
2) Analysis:
Desktop computers are connected via a network cable to the LAN port of the
Device; laptop, Tablet PC, etc. are wirelessly connected to the Device and need to
be authenticated.
3) Configuration Steps
Step 1 Configure the TCP/IP properties for the local computer.
Step 2 Upon logging in the Device, then configure the LAN port of the Device,
here, the gateway address is set as 192.168.1.1.
Step 3 Enter into the Wireless > Basic page, change the operation mode of the
Device to AP Mode and configure the Device's wireless basic parameters,
as shown in the figure below.
http://www.uttglobal.com Page 56
UTT Technologies Wireless Menu
Figure 5-13 AP Mode configuration
Step 4 Enter into the Wireless > Security page, to configure the authentication
methods and key for wireless communication.
Through the above configuration, wireless users can connect to the Device so long as
they pass the authentication, and access to the Internet through it.
5.7 Example of WDS Co nfiguration
Figure 5-14 Repeater Mode networking environment
1) Requirements
http://www.uttglobal.com Page 57
UTT Technologies Wireless Menu
Item
Parameters
Item
Parameters
As shown in the Figure 5-14, the users in Building 1 could access the Internet through
the Gateway (IP address: 192.168.1.1). If the Device B is wirelessly connected to
Device A, the users in Building 2 could access the Internet too. We could use the
WDS function of the Device to realize it.
The related parameters of Device A are as
follows:
IP Address of LAN port 192.168.1.253/24 Gateway address 192.168.1.1
SSID Customer MAC 0022AABA767C
Wireless mode 11b/g/n Mixed Channel 6
Security mode TKIP Pre-shared key 123456789
2) Analysis
We can connect Device B to Device A wirelessly by using one of the following ways.
Solution I: Devices A and B are set to Repeater Mode.
Solution II: Devices A and B are set to Bridge Mode.
Solution III: Devices A and B are set to Repeater Mode, Bridge Mode respectively.
Solution IV: Devices A and B are set to Repeater Mode, Lazy Mode respectively.
Solution V: Devices A and B are set to Bridge Mode, Lazy Mode respectively.
3) Conf iguration steps:
Solution I: Both are Repeater Mode
Step 1 Login to the Device B.
Step 2 Go to Network > LAN page to configure the IP address of Device B (Device A
and Device B should be on the same network segment), with the gateway
address directed to the export gateway.
Step 3 Go to Wireless > Basic page, configure the Operation mode of Device B as
Repeater Mode, with the MAC address of Device A as the MAC address of
Device B, and the configuration content is shown in the figure below:
http://www.uttglobal.com Page 58
UTT Technologies Wireless Menu
Figure 5-15 Repeater Mode instance
Step 4 Login to the Device A.
Step 5 Go to Wireless > Basic page and configure the operation mode of Device A as
Repeater Mode, and the SSID, wireless mode, channel, channel bandwidth,
security mode, pre-shared key are configured in the same way as Device B,
and the AP MAC address is: 0022AABB5428 (the MAC address of Device B).
Through the above configurations, the office personnel in Building 2 can connect to
Device A through Device B in Building 1, and access to the Internet through the
gateway.
Notes:
1)The gateway of the computer in Building 2 is directed to the LAN port of
http://www.uttglobal.com Page 59
UTT Technologies Wireless Menu
Device A.
2)The IP address of LAN port of Device B is in the same network segment as
the LAN port address of Device A.
Step 6 Connectivity verification
To test connectivity, you can log into a computer that is connected to Device B, and
use the ping command to ping the LAN IP address of the Device A. If the ping is
successful, a wireless connection between the two devices has been established.
After Device B is connected to Device A wirelessly, the client devices connected to
Device B are able to access the Internet.
Solutions II, III, IV, V can follow Solution I.
Notes:
1) The Device in Bridge Mode cannot be connected to the single wireless clients,
such as laptops, smartphones, etc.
2) The Devices in Lazy Mode can be connected to the single wireless clients.
3) In configuration, the SSID, Wireless Mode, Channel, Channel Width, Security
Mode and Pre-shared Key of Devices A, B must be kept consistent, and the MAC
address of AP is that of the peer device (It is not required to configure the MAC
address of the peer device when the AP mode is Lazy Mode).
4) Device A and B m ust be in the same network segment.
http://www.uttglobal.com Page 60
UTT Technologies Wireless 5G Menu
Chapter 6. Wireless 5G Menu
This chapter describes how to configure and use the 5GHz wireless features of the
Device. Only dual-band wireless router device support 5GHz wireless. We can access
to 5GHz wireless applicat ion by clic king
6.1 Basic
On Wireless 5G > Basic page, we can set 5GHz w ireless p ara meters , inc ludi ng SSID,
wireless mode, wireless channel, channel width and so on.
Wireless 5G menu.
Figure 6-1 5GHz wireless settings
Enable Wireless: Select to enable 5GHz Wireless network.
SSID: The SSID (Service Set Identification) is also known as the wireless network
name, which is used to uniquely identify a wireless network.
Wireless Mode: Specify the wireless modes of the Device. The options are 11a
Only, 11a/n Mixed, 11vht AC/AN/A and 11vht AC/AN.
http://www.uttglobal.com Page 61
UTT Technologies Wireless 5G Menu
11a Only: If selected, the wireless clients in compliance with the IEEE
802.11a standard can be connected to the Device.
11a/n Mixed: If selected, the wireless clients in compliance with the IEEE
802.11a and 802.11n standard can be connected to the Device.
11vht AC/AN/A : Very High Throughput IEEE 802.11ac and 802.11a Standard.
If selected, the wireless clients in compliance with the IEEE 802.11ac and
802.11a standard can be connected to the Device.
11vht AC/AN: Very High Throughput IEEE 802.11ac Standard. If selected,
the wireless clients in compliance with the IEEE 802.11ac standard can be
connected to the Device.
Channel: Select the frequency bands in which the wireless network works; it
provides automatic options, which means that the Device can auto matically select
the optimal frequency band. The wireless devices in the same frequency band w il l
interfere with each other. If there are multiple wireless devices around the Device,
please select a frequency band different from that of other wireless devices when
setting the channel.
Channel Width: The channel bandwidth occupied by the wireless data
transmission. It provides automatic options, which means that the Device can
automatically select the optimal channel bandwidth.
Enable SSID Broadcast: If enabled, the Device will broadcast its own SSID to all
the wireless clients to be able to connect to the Device, and access to the
wireless network with this SSID identifier. This function is enabled at risk (illegal
sites are very easy to get the SSID information), so it is generally recommended
to disable this function.
Enable WDS: Select to enable WDS. It allows a wireless network to be expanded
using multiple access points without the traditional requirement for a wired
backbone to link them.
Note: All base stations in a wireless distribution sy stem mus t be configured to use
the same wireless channel, wireless mode, security mode and the same
encryption keys.
6.2 Security
Please refer to the section: 5.2 Security.
6.3 MAC Filtering
Please refer to the section: 5.3 MAC Filtering.
http://www.uttglobal.com Page 62
UTT Technologies Wireless 5G Menu
6.4 Advanced
Please refer to the section: 5.4 Advanced.
6.5 Client List
Please refer to the section: 5.5 Client List.
http://www.uttglobal.com Page 63
UTT Technologies Advanced Menu
Chapter 7. Advanced Menu
7.1 NAT&DMZ
This chapter describes how to configure and use NAT features, including port
forwarding, DMZ hosts, and NAT rule.
7.1.1 Port Forwarding
Port forwarding can be used to set up public services on your network. When users
from the Internet make certain requests on your network, the Device can forward
those requests to computers equipped to handle the requests. For example, if you set
the port number 21 (FTP) to be forwarded to IP address 192.168.1.2, then all the
related requests from outside users will be forwarded to 192.168.1.2.
7.1.1.1 Port Forwarding List
On the Advanced > NAT & DMZ > Port Forwarding page, you can setup some port
forwarding rules.
Figure 7-1 Port Forwarding List
http://www.uttglobal.com Page 64
UTT Technologies Advanced Menu
Add a Port Forwarding Rule: Click the Add button, then setup it, lastly click
the
Save button.
Edit a Port Forwarding Rule: Click the Name or Edit hyperlink of this rule
entry, the related information will display in the setup fields. Then modify it,
and click the
Delete Port Forwarding Rule(s): Select the leftmost check boxes of entries,
and then click the
Save button.
Delete button.
7.1.1.2 Port Forwarding settings
Figure 7-2 Port Forwarding Setup
Name: Specify a name of this entry. It should be between 1 and 11 characters
long.
Enable: Select to enable this Port Forwarding entry.
Protocol: Select the transport protocol used by the service, available options are
TCP, UDP and TCP/UDP.
Start External Port: Specify the lowest port number provided by the Device. The
external ports are opened for outside users to access.
IP Address: Specify the I P addres s of the local server that you want outside users
to access.
Start Internal Port: Specify the lowest port number of the service provided by the
LAN host. The
Port Count: Specify the number of ports used by the service. I f the service uses
only one port number, enter 1. For example, if the start internal port is 21, th e start
Start External Port and Start Internal Port can be dif ferent.
http://www.uttglobal.com Page 65
UTT Technologies Advanced Menu
external port is 2001 and the port count is 10, then the internal port range is from
21 to 30, and the external port range is from 2001 to 2010.
Bind to: Select the NAT rule to which this port forwarding rule is bound. The port
forwarding rule will use the WAN interface’s IP address as the external IP
address.
Note: The system will automatically create some port forwarding rules. You
cannot modify or delete them.
7.1.1.3 Examples of Port Forwarding
7.1.1.3.1 Example One
An organization wants a LAN server (IP Addr ess: 192.168.16.88) to open Syslog
service (Protocol: UDP; Port: 514) to the outside users. And the Device will use 2514
as the external port and the WAN1 IP address (200.200.200.88 in this example) as
the external IP address. Then all the requests for Syslog from outside users to
200.200.200.88:2514 will be forwarded to 192.168.16.88:514.
The following figure shows the detailed settings.
Figure 7-3 Port Forwarding settings - Example One
7.1.1.3.2 Example Two
An organization wants a LAN server (IP Addr ess: 192.168.16.100) to open ftp service
(Protocol: TCP; Port: 20, 21) to the outside users. And the Device will use 2020 and
2021 as the external ports and the WAN2 IP address (200.200.201.18 in this example)
as the external IP address. As the ftp service uses two ports, so we need to set the
http://www.uttglobal.com Page 66
UTT Technologies Advanced Menu
Port Count to 2. Then all the requests for ftp from outside users to
200.200.201.18:2020 or 200.200.201.18:2021 will be forwarded to 192.168.16.100:20
or 192.168.16.100:21.
The following figure shows the detailed settings.
Figure 7-4 Port Forwarding Settings - Example Two
7.1.1.3.3 Example Three
An organization obtains eight public IP addresses (from 218.1.21.0/29 to
218.1.21.7/29) from the ISP. Therein, 218.1.21.1/29 is used as the Internet
connection’s gateway IP address, 218.1.21.2/29 is used as the Device’s WAN1
interface’s IP address.
The organization wants a LAN server (IP Address: 192.168.16.88) to open SMTP
service (Protocol: TCP; Port: 25) to the outside u sers. And the Device w ill use 2025 as
the external port and 218.1.21.3 as the external IP address.
Firstly, we need to create an NAT rule, and set its External IP Address to 218.1.21.3,
see section
forwarding rule.
The following figure shows the detailed settings.
7.1.2 NAT Rule for detailed information. Then we need to create the port
http://www.uttglobal.com Page 67
UTT Technologies Advanced Menu
Figure 7-5 Port Forwarding Settings - Example Three
7.1.2 NAT Rule
7.1.2.1 Introduction to NAT
The NAT (Network Address Translation) is an Internet standard that is used to map
one IP address space (i.e., Intranet) to another IP address space (i.e., Internet). The
NAT is designed to alleviate the shortage of IP addresses, that is, it allows all the LAN
hosts to share a single or a small group of IP addresses: On the Internet, there is only
a single device using a single or a small group of public IP addresses; but the LAN
hosts can use any range of private IP addresses, and these IP addresses are not
visible from the Internet. As the internal network can be effectively isolated from the
outside world, the NAT can also provide the benefit of network security assurance.
The Device provides flexible NAT features, and the following sections will describe
them in detail.
To ensure that NAT operates properly, the Device uses and maintains two address
spaces:
●Internal IP address: It indicates the IP address that is assigned to a LAN host by
the administrator. It is usually a private IP address.
NAT Address Space Definitions
●External IP address: It indicates the IP address that is assigned to the Device’s
Internet connection by the ISP. It is a legal public IP address that can represent
one or more internal IP addresses to the outside world.
http://www.uttglobal.com Page 68
UTT Technologies Advanced Menu
7.1.2.3 NA T Types
The Device provides two types of NAT: One2One and EasyIP.
One2One (One to One): It indicates static network address translation. It is always
referred to as Basic NAT, which provides a one to one mapping between an internal
and an external IP address. In this type of NAT, IP address need be changed, but port
needn’t.
One to One NAT can be used to allow the outside users to access a LAN server: In
the local network, the LAN server still uses the private IP address, which is provi ded to
the LAN hosts to access; and on the Internet, the Device will assign an external IP
address to the local server, then the outside users can use this external IP address to
access the server through the Device.
EasyIP: It indicates network address and port translation (NAPT). Since it is the most
common type of NAT, it is often s i mply ref erred to as N AT. NAPT provides
many-to-one mappings between multiple internal IP addresses and a single external
IP address, that is, these multiple internal IP addresses will be translated to the same
external IP address. In this type of NAT, to avoid ambiguity in the handling of returned
packets, it must dynamically assign a TCP/UDP port to an outgoing session and
change the packets’ source port to the assigned port before forwarding them. Besides,
the Device must maintain a translation table so that return packets can be correctly
translated back.
When you obtain multiple public IP addresses from your ISP, you can create more
than one NAT rule for each type of NAT. In an actual network environment, different
types of NAT rules are often used together.
7.1.2.4 NAT Rule List
Figure 7-6 NAT Rule list
http://www.uttglobal.com Page 69
UTT Technologies Advanced Menu
Add an NAT Rule: Click the Add button to go to the setup page, and then
configure it, lastly click the
Edit an NAT Rule: Click its Edit button, the related information w ill be displa yed on
the setup page. Then modify it, and click the
Delete NAT Rule(s): Select the leftmost check boxes of them, and then click the
Delete button.
Save button.
Save button.
7.1.2.5 NAT Rule settings
7.1.2.5.1 One2One settings
Figure 7-7 One2One settings
Rule Name: Specify the name of this NAT rule entry.
NAT Type: Specify the type of the NAT rule. Here please select One2One.
Start External IP: Specify the start external IP address to which the start internal
IP address is mapped.
Start Internal IP and End Internal IP: Specify the internal address range of the
NAT rule. The LAN hosts that belong to this address range will use the NAT rule.
Bind to: Specify an Internet connection to which the NAT rule is bound. The LAN
hosts that match the NAT rule will access the Internet through this Internet
connection.
Note:
1) When creating a One2One NAT rule, you should set the Sta rt External IP Address,
and the number of the external IP addresses is the same as the number of
internal IP addresses, which is determined by the
End Internal IP Address. For example, if the St art Internal IP Address is
192.168.16.6,
Address is 200.200.200.116, then 192.168.16.6, 192.168.16.7, and 192.168.16.8
will be mapped to 200.200.200.116, 200.200.200.117, and 200.200.200.118
End Internal IP Address is 192.168.16.8, and Start External IP
Start Internal IP Address and
http://www.uttglobal.com Page 70
UTT Technologies Advanced Menu
respectively.
7.1.2.5.2 EasyIP settings
Figure 7-8 EasyIP settings
Rule Name: Specify the name of this NAT rule entry.
NAT Type: Specify the type of the NAT rule. Here please select EasyIP.
External IP: Specify the external IP address to which the LAN hosts’ IP addressed
are mapped. A system reserved NAT rule’s external IP address is
means that the rule will use the related WAN interface’s IP address as its external
IP address; and it is non-editable. A user-defined NAT rule’s external IP address
can be neither 0.0.0.0 nor the WAN interface’s IP address, that is, you can only
use the other public IP addresses provided by your ISP as its external IP
addresses.
Start Internal IP and End Internal IP: Specify the internal address range of the
NAT rule. The LAN hosts that belong to this address range will preferential use
the NAT rule.
Bind to: Specify an Internet connection to which the NAT rule is bound. The LAN
hosts that match the NAT rule will access the Internet through this Internet
connection.
0.0.0.0, which
7.1.2.6 Examples for NAT Rule
7.1.2.6.1 Example for Configuring One2One NAT Rule
1) Requirements
In this example, a business has a single s tatic IP Internet connection and obtains eigh t
public IP addresses (from 202.1.1.128/29 to 202.1.1.1.135/29) from the ISP. Therein,
202.1.1.129/29 is used as the Internet connection’s gateway IP address,
202.1.1.130/2 is used as the Device’s WAN1 interface’s IP address. Note that
202.1.1.128/29 and 202.1.1.1.135/29 cannot be used as they are the subnet number
and broadcast address respectively.
http://www.uttglobal.com Page 71
UTT Technologies Advanced Menu
Figure 7-9 Network Topology for One2One NAT Rule Configuration Example
The business employees will share a single public IP address of 202.1.1.130/29 to
access the Internet. The LAN’s subnet number is 192.168.16.0, and subnet mask is
255.255.255.0. And the business wants to use the remaining four public IP addresses
(from 202.1.1.131/29 to 202.1.1.134/29) to create a
One2One rule for the four local
servers, then the outside users can use these public addresses to access the local
servers through the Device. The four local servers IP addresses are from
192.168.16.200/24 to 192.168.16.203/24, which are mapped to 202.1.1.131/29,
Firstly we need to configure a static IP Internet connection on the WAN1 interface in
the
Basic > WAN page or through the Setup Wizard. After you have configured the
Internet connection, the Device will automatically create a related system reserved
NAT rule, and also enable NAT.
Secondly, we need to create a One2One NAT rule for the four local servers. After you
have configured this rule, the Device will automatically create the related static route.
3) Configuration Procedure
The configuration steps are as following:
Step 1 Go to the Advanced > NAT & DMZ > NAT Rule page, and click the Add
button to go to the setup page.
Step 2 Enter the name of this NAT rule entry in the Rule name text box and select
One2One from the NAT T ype drop-down list, see the following figure.
http://www.uttglobal.com Page 72
UTT Technologies Advanced Menu
Figure 7-10 One2One NAT Rule Settings - Example
Step 3 Enter 202.1.1.131 in the Start External IP text box, enter 192.168.16.200 in
the
S tart Internal IP text box and enter 192.168.16.203 in the End Internal IP
text box.
Step 4 Select WAN1 from the Bind to drop-down list.
Step 5 Click the Save button to save the settings.Till now you have finished
configuring the NAT rule,and then you can view its related configuration in
the
NAT Rule List.
7.1.2.6.2 Example for Configuring EasyIP NAT Rule
(1) Requirements
In this example, an Internet cafe has a single Internet connection and obtains eight
public IP addresses (from 218.1.21.0/29 to 218.1.21.7/29) from the ISP. Therein,
218.1.21.1/29 is used as the Internet connection’s gateway IP address, 218.1.21.2/29
is used as the Device’s WAN1 interface’s IP address. Note that 218.1.21.0/29 and
218.1.21.7/29 cannot be used as they are the subnet number and broadcast address
respectively.
The administrator wants the hosts in the online game area (its address range is from
192.168.16.10/24 to 192.168.16.100/24) to use 218.1.21.3/29 to access the Internet.
To achieve this purpose, he should create an
External IP Address is 218.1.21.3, S tart Internal IP is 192.168.16.10, End Internal IP is
192.168.16.100, and
Bind to is WAN1.
EasyIP NAT rule for them. The rule’s
(2) Configuration Procedure
The configuration steps are as following:
Step 1 Go to the Advanced > NAT & DMZ > NAT Rule page, and click the Add
button to go to the setup page.
Step 2 Enter the name of this NAT rule entry in the Rule name text box and select
EasyIP from the NA T Type drop-down list, see the following figure.
http://www.uttglobal.com Page 73
UTT Technologies Advanced Menu
Figure 7-11 EasyIP NAT Rule Settings - Example
Step 3 Enter 218.1.21.3 in the External IP text box, enter 192.168.16.10 in the Start
Internal IP text box and enter 192.168.16.100 in the End Internal IP text box.
Step 4 Select WAN1 from the Bind to drop-down list.
Step 5 Click the Save button to save the settings.Till now you have finished
configuring the NAT rule,and then you can view its configuration in the
Rule List.
NAT
7.1.3 DMZ
The DMZ (Demilitarized Zone) feature allows one local computer to be exposed to the
Internet for the use of a special service such as an online game or video con ferencing.
When receiving the requests initiated by outside users, the Device will directly forward
these requests to the specified DMZ host.
Figure 7-12 DMZ
Enable DMZ: Select to enable DMZ Host.
http://www.uttglobal.com Page 74
UTT Technologies Advanced Menu
DMZ Host IP Address: Specify the private IP address of the DMZ host.
Note:
The computer designated as the DMZ host will lose firewall protection provided by the
Device. As the DMZ host is exposed to many exploits from the Internet, it may be
used to attack your network.
7.1.4 Priorities for Port Forwarding and DMZ Host
The port forwarding has higher priority than the DMZ host. When receiving a request
packet initiated by an outside user, the Device will firstly search the
List to find out if there is a port forwarding rule matching the destination IP address
and port of the packet. If a match is found, the Device will forward the packet to the
mapped localhost. Else, the Dev ice w ill try to find out if there is an available DMZ host.
Port Forwarding
7.2 Static Route
A static route is manually configured by the network administrator, which is stored in a
routing table. By using routing table, the Device can select an optimal transmission
path for each received packet, and forward the packet to the destination site
effectively. The proper usage of static routes can not only improve the network
performance, but also achieve other benefits, such as traffic control, provide a secure
network environment.
The disadvantage of using static routes is that they cannot dynamically adapt to the
current operational state of the network. When there is a change in the network or a
failure occurs, some static routes will be unreachable. In this case, the network
administrator should update the static routes manually.
7.2.1 Static Route List
All static routes you have configured will be displayed in the Static Route List (see the
following figure).
http://www.uttglobal.com Page 75
UTT Technologies Advanced Menu
Figure 7-13 Static Route List
Add Static Route: Click the Add button, then setup it, lastly click the Save
button.
Edit Static Route: Click its Edit hyperlink, the related information will be
displayed on the setup page. Then modify it, and click the
Delete Static Route(s): Select the leftmost check boxes of them, and then
click the
Delete button.
Save button.
7.2.2 Static Route settings
Figure 7-14 Static Route setting
Route Name: Specify the name of this static route entry.
http://www.uttglobal.com Page 76
UTT Technologies Advanced Menu
Enable: Select to enable this static route entry.
Destination IP: Specify the IP address of the destination network or host.
Subnet Mask: Specify the subnet mask of the destination network or host.
Gateway IP Address: Specify the IP address of the next hop router to which to
forward the packets.
Priority: Specify the priority of the static route. If there are multiple routes to the
same destination with different priorities, the Device will choose the route with the
highest priority to forward the packets. The smaller the number, the higher the
priority.
Interface: Specify the outbound interface through which the packets are
forwarded to the next hop gateway or router. The available options are the name
of eac h physical interface.
Note:
1) When creating a static route, you should specify the next hop IP address by the
Gateway IP Address or Interface.
2) In most cases, please don’t modify the sy stem res erved static route (e.g., Default,
Detect) to avoid surfing the Internet abnormally.
7.3 Policy Routing
This section describes the Advanced > Policy Routing page.
Policy Routing provides a tool for forwarding and routing data packets based on the
user-defined policies. Different from the traditional destination-based routing
mechanism, Policy Routing enables you to use policies based on source and
destination address, protocol, port, schedule, and other criteria to route packets
flexibly.
http://www.uttglobal.com Page 77
UTT Technologies Advanced Menu
7.3.1 Policy Routing List
Figure 7-15 Policy Routing List
Enable policy routing: Select to enable Policy Routing.
Add a Policy Routing Entry: Click the Add button, then setup it, lastly click the
Save button.
Allow a PBR Entry: Select the Allow check box to enable the corresponding
Policy Routing entry. If you want to disable the Policy Routing entry temporarily
instead of deleting it, please clear the check mark.
Edit a Policy Routing Entry: Click its Edit hyperlink, the related information will be
displayed on the setup page. Then modify it, and click the
Delete Policy Routing Entry(s): Select the leftmost check boxes of them, and then
click the
Move a Policy Routing Entry: The operation of moving a Policy Rout in g entry to
the front of another entry is as follows: Select the name of a Policy Routing entry
from the
lastly click the
Delete button.
Rule drop-down list, and another entry’s ID from the Mode drop-down list,
Move TO button.
Save button.
http://www.uttglobal.com Page 78
UTT Technologies Advanced Menu
7.3.2 Policy Routing settings
Figure 7-16 Policy Routing settings
Enable: Select to enable the Policy Routing entry. Only you have selected this
check box, the Policy Routing entries will take effect.
Policy routing name: Specify the name of this Policy Routing entry.
Interface: Specify an outbound interface through which the packets matching the
Policy Routing entry are forwarded.
Src IP: Specify the source IP addresses of the packets to which the Policy
Routing entry applies.
Destination address: Specify the destination IP addresses of the packets to which
the Policy Routing entry applies.
Protocol: Select a protocol type from the drop-down list.
Common Service: Select a commonly used service from the drop-down list.
http://www.uttglobal.com Page 79
UTT Technologies Advanced Menu
Dest Port: Specify the start and end port numbers in the associated text boxes.
The port number is between 1 and 65535.
Schedule Settings: Specify a schedule to restrict when the Policy Routing entry
takes effect. The default value is
Routing entry will be in effect always.
Every Day and All Day, which means the Policy
Note:
Policy Routing takes precedence over the Device’s normal destination-based routing.
That is, if a packet matches all the criteria (source address, destination address,
protocol type, port, etc.) specified in a Policy Routing entry, it will be forwarded
through the outbound interface specified in the Policy Routing entry. If no match is
found in the Policy Routing list, the packet will be forwarded through normal routing
channel (in other words, destination-based routing is performed).
7.4 Anti-NetSniper
This section describes Advanced > Anti-NetSniper page.
Anti-NetSniper is used to crack shared Internet access detection which can be
performed by your ISP. Don't enable this feature unless you encounter the "shared
Internet access detection" issue.
Figure 7-17 Anti-NetSniper
7.5 Plug and Play
Plug and Play is a new feature of UTT series security firewalls. If you enable plug and
play feature on the Device, the LAN users can access the Internet through the Device
without changing any network parameters, no matter what IP address, subnet mask,
default gateway and DNS server they might have. Obviously, this feature can greatly
facilitate the users. As this feature is suitable for hotel network, we also call it hotel
special version.
http://www.uttglobal.com Page 80
UTT Technologies Advanced Menu
Figure 7-18 Plug and Play
Note:
1) The LAN hosts basic TCP/IP parameters (including IP address, subnet mask,
gateway IP address, and DNS server IP address) should be set properly;
otherwise, plug and play feature cannot act on those hosts.
2) Once plug and play is enabled, the Device will automatically enable proxy ARP ,
enable DNS proxy, and disable IP spoofing defense.
3) Once plug and play are enabled, the Device will allow those non-IP/MAC binding
users to access the Device and Internet.
4) The users with the same IP address cannot access the Internet at the same time.
For example, if a LAN user with IP address 1.1.1.1 has connected to the Device
to access the Internet, another user with IP address 1.1.1.1 cannot access the
Internet through the Device.
5) A L AN user’s IP address cannot be the same with the Device’s LAN/WAN
interface IP address, gateway IP address, and primary/secondary DNS server IP
address; otherwise, the user cannot access the Device and Internet.
7.6 Port Mirroring
The port mirroring allows an administrator to mirror and monitor network traffic. It
copies the traffic from the specified ports to another port where the traffic can be
monitored with an external network analyzer. Then the administrator can perform traffic
monitoring, p erformance analysis and fault diagnosis.
http://www.uttglobal.com Page 81
UTT Technologies Advanced Menu
Figure 7-19 Port Mirroring
Enable Port Mirroring: Select to enable port mirroring.
Mirroring Port: Specify the capture port that will mirror the traffic of the mirrored
port(s).
7.7 Syslog
This section describes the Advanced > Syslog page.
Syslog is a standard protocol used to capture a lot of running information about
network activity. The Device supports this protocol and can send its activity logs to an
external Syslog server. It helps the network administrator monitor, analyze and
troubleshoot the Device and network.
Figure 7-20 Syslog settings
Enable Syslog: Select to enable Syslog feature.
Syslog Server IP address: Specify the IP address or domain name of the Syslog
server to which the Device sends Syslog messages.
Syslog Server Port: Specify the port used by the Syslog server to communicate
with the Device. In most cases, please leave the default value of
well-known port number.
http://www.uttglobal.com Page 82
514, which is a
UTT Technologies Advanced Menu
Syslog Message Facility: Specify the facility level used for logging. The facilities
are used to distinguish different classes of Syslog messages.
Note: So far, only the Xport HiPER Manager software of UTT Technologies Co.,
Ltd. can identify the heartbeat message.
http://www.uttglobal.com Page 83
UTT Technologies Network Sharing Menu
Chapter 8. Network Sharing Menu
This section describes the function on the Network Sharing menu. Network Sharing is
a model of data storage where the digital data is stored in USB disk/SD car d. The
USB disk/SD card is owned and managed by Administrator who is responsible for
keeping the data available and accessible. Users access to USB disk/SD card for
digital data.
8.1 Sharing Management
After plugging a USB/SD card into the Device, the administrator could share the Data
on the USB/SD card to LAN users through the FTP function. Before you enable
network sharing, please first setup the account for users on the
Shared Account page.
Network Sharing >
Click
Network Sharing > Sharing Management, you will see the following figure.
Figure 8-1 Network Sharing
Enable Storage Device: Select to enable network sharing.
Enable Password Protection: If selected, LAN users must use the account which
is set on the
device.
Disable: Click to disable the storage device.
Eject Device: Click to eject the storage device.
Network Sharing > Shared Account page to access the storage
Scan: Click to scan the available storage device.
Notes:
1) Before you eject the USB/SD card from the Device, please click the Eject Device
button first, in case of unexpected error or irreparable hardware damage.
http://www.uttglobal.com Page 84
UTT Technologies Network Sharing Menu
2) It is recommended to use NTFS file system.
8.2 FTP Server
On the Network Sharing > FTP Server page, you can setup FTP server to share data
to local area users. All the sources you have shared are displayed on the Shared
Directory List.
Figure 8-2 FTP Server
Enable FTP Server: Select to enable FTP Server.
Remote Access: Select to enable remote access from WAN port.
Ftp Port: Specify the FTP server port for LAN users to access. The default value
is 21. We recommend that you do not change the default value unless absolutely
necessary.
Click the Add a new folder button or to add a new folder for data sharing or edit
the setting of the current folders.
http://www.uttglobal.com Page 85
UTT Technologies Network Sharing Menu
Figure 8-3 FTP Server Settings
Name: Specify the name of the folder which will be displayed on the Shared
Directory List.
Folder: Select to share all folders.
Select Folder: Select one of the paths to share.
Notes:
1) All the changes you have made will take effect after a restart.
2) There are two ways to access FTP Serve r:
For local users: Double-click 'My Computer', enter ftp://xxx.xxx.xxx.xxx:21
(xxx.xxx.xxx.xxx stands for the IP address of the LAN port) in the address bar to open
the shared resources folder. Such as: when the IP address of the LAN port is
192.168.1.1, you could enter ftp://192.168.1.1:21.
For remote users: First, you should ensure that the Remote Access check box on
Figure 8- 2 have been selected. Double-click 'My Computer', enter ftp: \\xxx. xxx. xxx.
xxx :21 (xxx.xxx.xxx.xxx stands for the IP address of the WAN port) i n the address bar
to open the shared resources folder. Such as: when the IP address of the WAN por t is
172.32.90.1, you could enter
ftp:// 172.32.90.1:21.
8.3 Shared Account
You need to add an account for users to access the FTP server before enabling
network sharing.
http://www.uttglobal.com Page 86
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.