IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
Graphics in this book may differ slightly from the product due to differences in operating systems,
operating system versions, or if you installed updated firmware/software for your device. Every
effort has been made to ensure that the information in this manual is accurate.
Related Documentation
•Quick Start Guide
The Quick Start Guide shows how to connect the Device and get up and running right away.
Page 3
Contents
9Chapter 1: Introduction
9Overview
9Ways to Manage the Device
9Good Habits for Managing the Device
10Applications for the Device
10Internet Access
11Wireless Access
11Using the WLAN/WPS Button
12The RESET Button
12Using the Reset Button
12LEDs (Lights)
15Chapter 2: Introducing the Web Configurator
15Overview
15Accessing the Web Configurator
17The Web Configurator Layout
17Title Bar
18Main Window
19Chapter 3: Quick Start
19Overview
19Quick Start Setup
22Chapter 4: Connection Status and System Info
22Overview
22The Connection Status Screen
24The System Info Screen
28Chapter 5: WAN Setup
28Overview
29What You Can Do in the WAN Screens
29What You Need to Know About WAN
31Before You Begin
32The Internet Connection Screen
36Advanced Internet Connection
38The More Connections Screen
39More Connections Edit
Contents 3
Page 4
43Configuring More Connections Advanced Setup
44The 3G Backup Screen
47WAN Technical Reference
47Encapsulation
48Multiplexing
48VPI and VCI
48IP Address Assignment
50Chapter 6: Wireless
50Overview
50What You Can Do in this Chapter
50Wireless Network Overview
52Before You Begin
52Wireless General Screen
54No Security
55Basic (Static WEP/Shared WEP Encryption)
56More Secure (WPA2-PSK)
57WPA2 Authentication
59More AP Screen
60Edit More AP
61MAC Authentication Screen
63The WPS Screen
65The WDS Screen
67The WMM Screen
68Scheduling Screen
69Add or Edit Schedule
69Advanced Screen
71Technical Reference
71Additional Wireless Terms
72Wireless Security Overview
74Signal Problems
74BSS
75MBSSID
76Wireless Distribution System (WDS)
77Chapter 7: Home Networking
77Overview
77What You Can Do in this Chapter
77What You Need To Know
80The LAN Setup Screen
82The Static DHCP Screen
82Before You Begin
84The IP Alias Screen
Contents 4
Page 5
85The UPnP Screen
86The IPv6 LAN Setup Screen
91The File Sharing Screen
92Before You Begin
94Edit File Sharing User
95The Printer Server Screen
95Before You Begin
96Technical Reference
98Installing UPnP in Windows Example
101Using UPnP in Windows XP Example
107Chapter 8: Static Route
107Overview
107What You Can Do in this Chapter
108Configuring Static Route
109Add/Edit Static Route
110IPv6 Static Route
111IPv6 Static Route Edit
112Chapter 9: Quality of Service (QoS)
112Overview
112What You Can Do in this Chapter
112What You Need to Know
113The QoS General Screen
114The Queue Setup Screen
115Edit a QoS Queue
116The Class Setup Screen
118Add/Edit QoS Class
122The QoS Policer Setup Screen
123Add/Edit a QoS Policer
125The QoS Game List Screen
125QoS Technical Reference
125DiffServ
127Chapter 10: Network Address Translation (NAT)
127Overview
127What You Can Do in this Chapter
127What You Need To Know
128The General Screen
128The Port Forwarding Screen
129The Port Forwarding Screen
131The Port Forwarding Add/Edit Screen
132The DMZ Screen
Contents 5
Page 6
133The ALG Screen
133Technical Reference
133NAT Definitions
134What NAT Does
135How NAT Works
136Chapter 11: Port Binding
136Overview
137The Port Binding Screen
138Port Binding Summary Screen
140The Any Port Any Service Edit Screen
143Chapter 12: Dynamic DNS
143Overview
143What You Need To Know
144The Dynamic DNS Screen
145Chapter 13: Filter
145Overview
145What You Can Do in the Filter Screens
146The IP/MAC Filter Screen
148The IPv6/MAC Filter Screen
151Chapter 14: Firewall
151Overview
151What You Can Do in the Firewall Screens
152What You Need to Know About Firewall
153Firewall General Screen
154Default Action Screen
155Rules Screen
157Rules Add Screen
159Customized Services
160Customized Service Add/Edit
161DoS Screen
161The DoS Advanced Screen
163Configuring Firewall Thresholds
164Firewall Technical Reference
164Firewall Rules Overview
165Guidelines For Enhancing Security With Your Firewall
165Security Considerations
166Triangle Route
169Chapter 15: Parental Control
Contents 6
Page 7
169Overview
169The Parental Control Screen
171Add/Edit a Parental Control Rule
173Chapter 16: Certificates
173Overview
173What You Can Do in this Chapter
173What You Need to Know
174Verifying a Certificate
175Local Certificates
177Trusted CA
178Trusted CA Import
179View Certificate
181Chapter 17: System Monitor
181Overview
181What You Can Do in this Chapter
181What You Need To Know
182The Log Screen
183The WAN Traffic Status Screen
184The LAN Traffic Status Screen
185The NAT Traffic Status Screen
203Overview
203What You Can Do in the Remote Management Screens
204What You Need to Know About Remote Management
204The WWW Screen
205Configuring the WWW Screen
206Telnet Screen
207FTP Screen
208SNMP Screen
209Configuring SNMP
210DNS Screen
211ICMP Screen
212SSH Screen
213SSH Example
216Chapter 26: Diagnostic
216Overview
216What You Can Do in the Diagnostic Screens
216The Ping Screen
217The DSL Line Screen
220Chapter 27: Troubleshooting
220Overview
220Power, Hardware Connections, and LEDs
221Device Access and Login
222Internet Access
223Wireless Internet Access
224USB Device Connection
225UPnP
226Appendix A: Legal Information
230Index
Contents 8
Page 9
Chapter 1 Introduction
CHAPTER 1
1
1.1 Overview
The DSL-100HNU-T1 v3 is an ADSL2+ router which allows super-fast, secure Internet access over
analog (POTS) telephone lines. It supports Asynchronous Transfer Mode (ATM). You can have ADSL,
ADSL2, ADSL2+ connections.
The Device integrates DSL and NAT for ease of installation and high-speed, shared Internet access. It
also provides a complete security solution with a robust firewall and content filtering. The product
name format indicates the following:
• “U” denotes a USB port used to set up a 3G WAN connection via a 3G wireless card or share files
via a USB memory stick or a USB hard drive. The Device can also function as a print server with an
USB printer connected.
Only use firmware for your Device’s specific model. Refer to the label on the bottom of
your Device.
Chapter
1.2 Ways to Manage the Device
Use any of the following methods to manage the Device.
• Web Configurator. Use a (supported) web browser to manage the Device.
• FTP for firmware upgrades and configuration backup/restore.
• TR-069. This auto-configuration server remotely configures your device.
1.3 Good Habits for Managing the Device
Do the following things regularly to make the Device more secure and to manage the Device more
effectively.
• Change the password. Use a password that’s not easy to guess and that consists of different
types of characters, such as numbers and letters.
• Write down the password and put it in a safe place.
Chapter 1 Introduction9
Page 10
• Back up the configuration (and make sure you kn
DSL
LAN
working configuration may be useful if the device becomes unstable or even crashes. If you forget
your password, you will have to reset the Device to its factory default settings. If you backed up an
earlier configuration file, you would not have to totally re-configure the Device. You could simply
restore your last configuration.
1.4 Applications for the Device
Here are some example uses for the Device.
1.4.1 Internet Access
Your Device provides shared Internet access by connecting the DSL port to the DSL or MODEM jack
on a splitter or your telephone jack. Computers can connect to the Device’s LAN ports (or
wirelessly).
ow how to restore it). Restoring an earlier
Figure 1 De
Configure firewall and filtering features on the Device for secure Internet access. Set the firewall to
allow responses from the Internet for traffic initiated from your network and block traffic initiated
from the Internet. This blocks probes from the outside to your network, but lets you safely browse
the Internet and download files.
Use the filtering feature to block acce
Yahoo Messenger. You can also configure IP/MAC filtering rules for incoming or outgoing traffic.
vice’s Router Features
ss to specific web sites or Internet applications such as MSN or
Use QoS to efficiently manage traffic on your ne
and/or to particular computers. For example, you could make sure that the Device gives voice over
Internet calls high priority, and/or limit bandwidth devoted to the boss’s excessive file downloading.
twork by giving priority to certain types of traffic
Chapter 1 Introduction10
Page 11
1.5 Wireless Access
The Device serves as a wireless Access Point (AP) to let wireless clients such as notebook computers,
smart phones, and tablets connect to the Internet without Ethernet cables.
Configure your wireless network through the
Figure 2 Wir
eless Access Example
1.5.1 Using the WLAN/WPS Button
By default, the Device’s wireless network is enabled. To turn it off, simply press the WPS/WLAN
button on top of the Device for over 5 seconds. The WLAN/WPS LED turns off.
Use the WLAN/WPS
WPS-compatible client by adding one device at a time. To activate WPS:
button to quickly set up a secure wireless connection between the Device and a
Web Configurator, or the WPS button.
1W
ith the POWER LED on steady, press the WLAN/WPS button for 1 second and release it.
Chapter 1 Introduction11
Page 12
ithin two minutes, press the WPS button on a WPS-enabled client within range of the Device. The
2W
WPS/WLAN LED should flash while the Device sets up a WPS connection with the client.
e WPS/WLAN LED shines green for a successful connection.
3Th
1.6 The RESET Button
If you forget your password or cannot access the web configurator, use the RESET button at the
back of the device to reload the factory-default configuration file. This means that you will lose all
configurations that you had previously and the user name and password will be reset to the default.
1.6.1 Using the Reset Button
With the POWER LED on steady, press the RESET button for ten seconds or until the POWER LED
begins to blink and then release it. When the POWER LED begins to blink, the defaults have been
restored and the device restarts.
1.7 LEDs (Lights)
The following graphic displays the labels of the LEDs.
Figure 3 LE
Ds
Chapter 1 Introduction12
Page 13
None of the LEDs are on if the Device is not receiving power.
Table 1 LE
LEDCOLORSTATUSDESCRIPTION
POWERGreenOnThe Device is receiving power and ready for use.
ETHERNET
1-4
WLAN/
WPS
D Descriptions
BlinkingThe Device is self-testing.
RedOnThe Device has hardware failure.
BlinkingFirmware upgrade is in progress.
OffThe Device is not receiving power.
GreenOnThe Device has a successful 100 Mbps Ethernet connection with a
de
vice on the Local Area Network (LAN).
BlinkingThe Device is sending or receiving data to/from the LAN at 100 Mbps.
OffThe Device does not have an Ethernet connection with the LAN.
GreenOnThe wireless network is activated.
BlinkingThe Device is communicating with other wireless clients.
OrangeBlinkingThe Device is setting up a WPS connection.
OffThe wireless network is not activated.
DSLGreenOnThe DSL line is up.
BlinkingThe DSL line is initializing.
OffThe DSL line is down.
INTERNETGreenOnThe Device has an IP connection but no traffic.
Your device has a WAN IP address (either static or assigned by a DHCP
server), PPP nego
DSL connection is up.
BlinkingThe Device is sending or receiving IP traffic.
OffThe Device does not have an IP connection.
RedOnThe Device attempted to make an IP connection but failed.
USBGreenOnThe Device recognizes a USB connection through the USB slot.
BlinkingThe Device is sending or receiving data to or from the connected USB
de
vice.
OffThe Device does not detect a USB connection through the USB slot.
tiation was successfully completed (if used) and the
Refer to the Quick Start Guide for information on hardware connections.
Chapter 1 Introduction13
Page 14
Chapter 1 Introduction14
Page 15
CHAPTER 2
Chapter 2
Introducing the Web Configurator
2.1 Overview
The web configurator is an HTML-based management interface that allows easy device setup and
management via Internet browser. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3
and later versions, or Safari 2.0 and later versions. The recommended screen resolution is 1024 by
768 pixels.
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device. W
Windows XP SP (Service Pack) 2.
• JavaScript (enabled by default).
• Java permissions (enabled b
y default).
2
eb pop-up blocking is enabled by default in
Chapter
2.1.1 Accessing the Web Configurator
1Make sure your Device hardware is properly connected (refer to the Quick Start Guide).
2Launch
3T
4A
password to access the device’s Web Configurator. Click Login. If you have changed the password,
enter your password and click Login.
Figure 4 P
your web browser.
ype "192.168.1.1" as the URL.
password screen displays. Type “admin” as the default Username and “1234” as the default
assword Screen
Chapter 2 Introducing the Web Configurator15
Page 16
For security reasons, the Device automatically logs you out if you do not use the web
configurator for five minutes (default). If this happens, log in again.
5The following screen displays if you have not yet changed your password. It is strongly
recommended you change the default password. Enter a new password, retype it to confirm and
click Apply; alternatively click Skip to proceed to the main menu if you do not want to change the
password now.
Figure 5 Cha
6The Connection Status screen appears.
Figure 6 Connection Status
nge Password Screen
Chapter 2 Introducing the Web Configurator16
Page 17
lick System Info to display the System Info screen, where you can view the Device’s interface and
B
C
A
a
b
7C
system information.
2.2 The Web Configurator Layout
Click Connection Status > System Info to show the following screen.
Figure 7 W
eb Configurator Layout
As illustrated above, the main screen is divided into these parts:
• A - ti
• B -
• C - navig
2.2.1 Title Bar
The title bar shows the Wizard and Logout icons in the upper right corner.
Chapter 2 Introducing the Web Configurator17
tle bar
main window
ation panel
Page 18
Click the Wizar
configurator.
d icon to configure basic initial settings. Click the Logout icon to log out of the web
2.2.2 Main Window
The main window displays information and configuration fields. It is discussed in the rest of this
document.
Click LAN De
Status sc
Status sc
Click Virtual De
showing the connection status of the Device’s ports
disconnected ports are gray.
Figure 8
vice on the System Info screen (a in Figure 7 on page 17) to display the Connection
reen. See Chapter 4 on page 24 for more information on the System Info and Connection
reens.
vice on the System Info screen (b in Figure 7 on page 17) to display a visual graphic
Virtual Device
. The connected ports are in color and
Chapter 2 Introducing the Web Configurator18
Page 19
CHAPTER 3
Chapter 3
Quick Start
3
3.1 Overview
Use the Quick Start screens to configure the Device’s time zone, basic Internet access, and wireless
settings.
See the rest of this guide for background information on the features in this chapter.
3.2 Quick Start Setup
1The Quick Start Wizard appears automatically after login. Or you can click the Start icon in the top
right corner of the web configurator to open the quick start screens. Select the time zone of the
Device’s location and click Next.
Chapter
Figure 9 Time Zone
Chapter 3 Quick Start19
Page 20
2Enter you
depending on your current connection type. Click Next.
r Internet connection information in this screen. The screen and fields to enter may vary
Figure 10 W
AN Interface Selection
Chapter 3 Quick Start20
Page 21
urn the wireless LAN on or off. If you keep it on, record the security settings so you can configure
3T
your wireless clients to connect to the Device. Click Save.
Figure 11 Intern
et Connection
4Your Device saves your settings and attempts to connect to the Internet.
Chapter 3 Quick Start21
Page 22
CHAPTER 4
Chapter 4
Connection Status and System
Info
4.1 Overview
After you log into the web configurator, the Connection Status screen appears. This shows the
network connection status of the Device and clients connected to it.
Use the Sys
(LAN, WAN and WLAN), and SIP accounts. You can also register and unregister SIP accounts.
If you click Virtual De
connection status of the Device’s ports. See Section 2.2.2 on page 18 for more information.
tem Info screen to look at the current status of the device, system resources, interfaces
4
vice on the System Info screen, a visual graphic appears, showing the
Chapter
4.2 The Connection Status Screen
Use this screen to view the network connection status of the device and its clients. A warning
message appears if there is a connection problem. You can configure how often you want the
Device to update this screen in Refresh Interval.
Figure 12 Conn
ection Status: Icon View
Chapter 4 Connection Status and System Info22
Page 23
To view the connected LAN devices in a list, click Li
st View in the Viewing mode selection box.
Figure 13 Conn
In Icon View, if you want to view information about a client, click the client’s name and Info.
In Li
st View, you can also view the client’s information.
ection Status: List View
Chapter 4 Connection Status and System Info23
Page 24
4.3 The System Info Screen
Click Connection Status >System Info to open this screen.
Figure 14
System Info Screen
Each field is described in the following table.
Table 2 S
LABELDESCRIPTION
Refresh IntervalSelect how often you want the Device to update this screen from the drop-down list
Device Information
Host NameThis field displays the Device system name. It is
ystem Info Screen
bo
x.
this in the Maintenance > System screen’s Host Name field.
used for identification. You can change
Chapter 4 Connection Status and System Info24
Page 25
Table 2 System Info Screen (continued)
LABELDESCRIPTION
Model Name This is the model name of your device.
MAC AddressThis is the MAC (Media Access Control) or Ethernet address unique to your Device.
Firmware VersionThis field displays the current version of the firmware inside the device. It also shows
the date the firmware version was created. Go to the Maintenance > Firmware Upgrade screen to change it.
DSL VersionThis is the current version of the Device’s DSL modem code.
3G Information
3G StatusThis shows the current status of your 3G connection. NoDevice is shown when no 3G
card is inserted.
3G RateThis shows the rate of the 3G connection if it is available.
3G IP AddressThis shows the IP address for the 3G connection.
3G IP Subnet
Mask
3G GatewayThis shows the IP address of the 3G connection’s default gateway.
3G Primary/
Secondary DNS
LAN Information
IP AddressThis field displays the current IP address of the Device in the LAN.
IP Subnet MaskThis field displays the current subnet mask in the LAN.
DHCPThis field displays what DHCP services the Device is providing to the LAN. Choices are:
IPv6 AddressThis is the current IPv6 address of the Device in the LAN.
Link-local IPv6
Address
IPv6 PrefixThis is the current IPv6 prefix length in the LAN.
Preferred/Valid
Time(sec)
This shows the current subnet mask for the 3G connection.
This shows the first and second DNS server address assigned by the ISP.
Server - The Device is a DHCP server in the LAN. It assigns IP addresses to other
computers in the LAN.
None - The Device is not providing any DHCP services to the LAN.
This is the current LAN IPv6 link-local address of the Device.
This is the Preferred Lifetime and Valid Lifetime in the LAN.
DHCPv6This field displays what DHCPv6 services the Device is providing to the LAN. Choices
are:
Server - The Device is a DHCPv6 server in the LAN. It assigns IP addresses to other
computers in the LAN.
None - The Device is not providing any DHCPv6 services to the LAN.
Chapter 4 Connection Status and System Info25
Page 26
Table 2 System Info Screen (continued)
LABELDESCRIPTION
Radvd StateThis shows the status of RADVD.
IPv6 LAN DNS1/
DNS2
WLAN Information
StatusThis shows whether or not the wireless LAN is enabled (on).
SSIDThis is the descriptive name used to identify the Device in the wireless LAN.
ChannelThis is the channel number used by the Device now.
802.11 ModeThis displays the type of 802.11 mode the Device is using in the wireless LAN.
Security ModeThis displays the type of security the Device is using in the wireless LAN.
WPSConfigured displays when a wireless client has connected to the Device or WPS is
SchedulingThis shows whether wireless scheduling is enabled or disabled.
WiFi MACThis is the MAC (Media Access Control) or Ethernet address unique to your Device’s
Security
FirewallThis shows whether or not the firewall is enabled (on).
This is the first/second DNS server IPv6 address the Device passes to the DHCP clients.
enabled and wireless or wireless security settings have been configured.
Unconfigured displays if WPS wireless security settings have not been configured. Off
displays if WPS is disabled.
WiFi interface.
System Status
DSL UpTimeThis field displays how long the DSL connection has been active.
System UptimeThis field displays how long the Device has been running since it last started up. The
Device starts up when you plug it in, when you restart it (Maintenance > Reboot), or
when you reset it (see
Current Date/
Time
CPU UsageThis field displays what percentage of the Device’s processing ability is currently used.
Memory UsageThis field displays what percentage of the Device’s memory is currently used. Usually,
This field displays the current date and time in the Device. You can change this in
Maintenance > Time Setting.
When this percentage is close to 100%, the Device is running at full load, and the
throughput is not going to improve anymore. If you want some applications to have
more throughput, you should turn off other applications.
this percentage should not increase much. If memory usage does get close to 100%,
the Device is probably becoming unstable, and you should restart the device. See
Chapter 24 on page 202, or turn off the device (unplug the power) for a few seconds.
Section 1.6 on page 12).
Chapter 4 Connection Status and System Info26
Page 27
Table 2 System Info Screen (continued)
LABELDESCRIPTION
DSL Down
Bandwith
Usage
DSL Up
Bandwith
Usage
NAT Session
Usage
Interface Status
InterfaceThis column displays each interface the Device has.
StatusThis field indicates whether or not the Device is using the interface.
This field displays what percentage of the Device’s downstream DSL bandwidth is
currently used. When this percentage is close to 100%, the Device is running at full
load, and the throughput is not going to improve anymore. If you want some
applications to have more throughput, you should turn off other applications.
This field displays what percentage of the Device’s upstream DSL bandwidth is
currently used. When this percentage is close to 100%, the Device is running at full
load, and the throughput is not going to improve anymore. If you want some
applications to have more throughput, you should turn off other applications.
This field displays what percentage of the Device supported NAT sessions are currently
being used.
For the LAN interfaces, this field displays Up when the Device is using the interface and
Down when the Device is not using the interface.
For the WLAN interface, it displays Active when WLAN is enabled or Down when
WLAN is disabled.
For the 3G USB interface, this field displays Up when using the interface and NoDevice
when no device is detected in any USB slot.
For the xDSL WAN interface, this field displays Down when the line is down or Up
when line is up or connected.
RateFor the LAN interface, this displays the port speed and duplex setting.
For the WLAN interface, it displays the maximum transmission rate when WLAN is
enabled or N/A when WLAN is disabled.
For the 3G interface, it displays the maximum transmission rate when 3G is enabled or
N/A when 3G is disabled.
For the xDSL WAN interface, it displays the downstream and upstream transmission
rate.
Chapter 4 Connection Status and System Info27
Page 28
CHAPTER 5
WAN
LAN
Chapter 5
WAN Setup
5.1 Overview
This chapter describes how to configure WAN settings from the WAN screens. Use these screens to
configure your Device for Internet access.
A WAN (Wide Area Network) connection connects to another network or the Internet. It connects
your
private networks (such as a LAN (Local Area Network) and other networks, so that a computer
in one location can communicate with computers in other locations.
Figure 15 LA
N and WAN
5
Chapter
3G (third generation) standards for the sending and receiving of voice, video, and data in a mobile
environment.
You can attach a 3G wireless adapter to the USB port
as your WAN or a backup when the wired WAN connection fails.
Figure 16 3
G WAN Connection
and set the Device to use this 3G connection
Chapter 5 WAN Setup28
Page 29
5.1.1 What You Can Do in the WAN Screens
•Use the Internet Connection screen (Section 5.2 on page 32) to configure the WAN settings on
the Device for Internet access.
•Use the More Connections screen (Section 5.3 on page 38) to set up additional Internet access
connections.
•Use the 3G Backup screen to configure 3G WAN connection (Section 5.4 on page 44).
5.1.2 What You Need to Know About WAN
Encapsulation Method
Encapsulation includes data from an upper layer protocol into a lower layer protocol. To set up a
WAN connection to the Internet, you need to use the same encapsulation method used by your ISP
(Internet Service Provider). If your ISP offers a dial-up Internet connection using PPPoE (PPP over
Ethernet) or PPPoA, they should also provide a username and password (and service name) for user
authentication.
WAN IP Address
The Device uses its WAN IP address to connect to the Internet and communicate with devices in
other networks. It can be static (fixed) or dynamically assigned by the ISP when the Device connects
to the Internet.
If your ISP assigns you a static WAN IP address, they should also assign you the subnet mask and
DNS server IP address(es) (and a gateway IP address if you use the Ethernet or ENET ENCAP
encapsulation method).
Multicast
Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or
Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts
on the network - not everybody and not just one.
IGMP
Devices use the IGMP (Internet Group Management Protocol) network-layer protocol to establish
membership in a multicast group - it does not carry user data. IGMP versions 2 and 3 offer
improvements over the widely-used version 1.
IPv6
IPv6 (Internet Protocol version 6) provides increased IP address space and enhanced features in
comparison to IPv4. The Device supports IPv4/IPv6 dual stack and can connect to IPv4 and IPv6
networks.
Chapter 5 WAN Setup29
Page 30
IPv6 Rapid Deployment
ISP (IPv4)
IPv6 Internet
IPv4
IPv6
BR
IPv6 in IPv4
IPv4 Internet
IPv4
+
LAN
- IPv6
- IPv4
WAN
- IPv4
- IPv6 in IPv4
Use IPv6 Rapid Deployment (6rd) when the local network uses IPv6 and the ISP has an IPv4 network.
hen the Device has an IPv4 WAN address and you set IPv6/IPv4 Dual Stack to IPv4, you can
W
enable 6rd to encapsulate IPv6 packets in IPv4 packets to cross the ISP’s IPv4 network.
The Device generates a global IPv6 prefix from its
ISP’s Border Relay router (BR in the figure) to connect to the native IPv6 Internet. The local network
can also use IPv4 services. The Device uses it’s configured IPv4 WAN IP to route IPv4 traffic to the
IPv4 Internet.
Figure 17
IPv6 Rapid Deployment
IPv4 WAN address and tunnels IPv6 traffic to the
Dual Stack Lite
Use Dual Stack Lite when local network computers use
the Device has an IPv6 WAN address and you set IPv6/IPv4 Dual Stack to IPv6, you can enable Dual
Stack Lite to use IPv4 computers and services.
IPv4 and the ISP has an IPv6 network. When
Chapter 5 WAN Setup30
Page 31
The Device tunnels IPv4 packets inside IPv6 encapsulation packets to the ISP’s Address Family
ISP (IPv6)
IPv6 Internet
IPv6
AFTR
IPv4 in IPv6
IPv4 Internet
IPv6
IPv4
+
LAN
- IPv6
- IPv4
WAN
- IPv6
- IPv4 in IPv6
ransition Router (AFTR in the graphic) to connect to the IPv4 Internet. The local network can also
T
use IPv6 services. The Device uses it’s configured IPv6 WAN IP to route IPv6 traffic to the IPv6
Internet.
Figure 18
3G
3G (Third Generation) is a digital, packet-switc
optimized as multiple users share the same channel and bandwidth is only allocated to users when
they send data. It allows fast transfer of voice and non-voice data and provides broadband Internet
access to mobile devices.
Dual Stack Lite
hed wireless technology. Bandwidth usage is
Finding Out More
See Section 5.5 on page 47 for technical background information on WAN.
5.1.3 Before You Begin
You need to know your Internet access settings such as encapsulation and WAN IP address. Get this
information from your ISP.
Chapter 5 WAN Setup31
Page 32
5.2 The Internet Connection Screen
Use this screen to change your Device’s WAN settings. Click Network Setting > Broadband >
Internet Connection. The screen differs by the mode and encapsulation you select.
Figure 19 Network Setting
> Broadband > Internet Connection
Chapter 5 WAN Setup32
Page 33
The following table describes the labels in this screen.
ADSL ModeSelect the kind of connection your Device uses to connect to the ISP.
Use Auto Sync-Up if you are not sure which type to choose.
Use ADSLT1.413, ADSLG.DMT, ADSLG.lite, ADSL2, ADSL2+, ADSL2_AnnexM, ADSL2+_AnnexM, or READSL2 if you know the specific type of DSL the Device uses
to connect to the ISP.
General
ModeSelect Router (default) from the drop-down list box if your ISP gives you one IP
address only and you want multiple computers to share an Internet account. Select
Bridge when your ISP provides you more than one IP address and you want the
connected computers to get individual IP address from ISP’s DHCP server directly. If
you select Bridge, you cannot use Firewall, DHCP server and NAT on the Device.
EncapsulationSelect the method of encapsulation used by your ISP from the drop-down list box.
This field is available if you select Router in the Mode filed.
User Name(PPPoA and PPPoE encapsulation only) Enter the user name exactly as your ISP
assigned. If assigned a name in the form user@domain where domain identifies a
service name, then enter both components exactly as given.
Password(PPPoA and PPPoE encapsulation only) Enter the password associated with the user
name above.
Service Name(PPPoE only) Type the name of your PPPoE service here.
MultiplexThis displays for an ADSL virtual channel. Select the method of multiplexing used by
your ISP from the drop-down list. Choices are VC-Mux or LLC.
IPv6/IPv4 Dual StackThis is not available if you select PPPoA in the Encapsulation field.
Select IPv4 to have the Device use only IPv4.
Select IPv4/IPv6 to let the Device connect to IPv4 and IPv6 networks and choose the
protocol for applications according to the address type.
Select IPv6 to have the Device use only IPv6.
PPP AuthenticationThis is available if you select PPPoE or PPPoA in the Encapsulation field.
The Device supports PAP (Password Authentication Protocol) and CHAP (Challenge
Handshake Authentication Protocol). CHAP provides more security than PAP;
however, PAP has higher availability on more platforms.
Use the drop-down list box to select an authentication protocol for outgoing calls.
Options are:
Auto- Your Device accepts either CHAP or PAP when requested by this remote node.
Virtual Circuit IDVPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit.
Refer to the appendix for more information.
IP AddressYou can use these options when you set the Mode field to Router and the IPv6/IPv4
Dual Stack field to IPv4 or IPv4/IPv6.
Select Obtain an IP Address Automatically if the ISP assigns you a dynamic IP
address; otherwise select Static IP Address and type your ISP assigned IP address in
the IP Address field below.
Static IP Address Select this option If the ISP assigned a fixed IP address.
IP AddressEnter the static IP address provided by your ISP.
IPv6 Tunnel ModeThis is available if you select ENET ENCAP or PPPoE in the Encapsulation field and
IPv4 in the IPv6/IPv4 Dual Stack field.
Select 6rd to tunnel IPv6 traffic from the local network through the ISP’s IPv4
network.
Select 6to4 to enable IPv6 to IPv4 tunneling. This will encapsulate IPv6 packets in
IPv4 packets so they can travel through IPv4 networks.
Relay ServerIf you select 6to4 in the IPv6 Tunnel Mode field, enter the tunneling relay server's
IPv4 address in this field.
Via DHCP Option
212
ManualSelect this to manually enter the following 6rd information.
6rd Prefix Enter an IPv6 prefix for tunneling IPv6 traffic to the ISP’s Border Relay router and
6rd Prefix LengthEnter the IPv6 prefix length.
IPv4 Mask Length Enter the subnet mask number for the IPv4 network.
Relay ServerEnter the relay server’s IPv4 address.
DNS Server
Primary / Secondary
DNS
IPv6 Address
Obtain an IP Address
Automatically
Select this to have the Device detect it automatically through DHCP option 212.
connecting to the native IPv6 Internet.
Set how the Device gets the IP addresses of the DNS servers it uses.
UserDefined - enter a static IP address.
Obtained From ISP - when the Device gets its IP address automatically, you can
select this to have it also get the DNS server address.
None - the Device does not use the DNS server entry.
Select this option to have the Device use the IPv6 prefix from the connected router’s
Router Advertisement (RA) to generate an IPv6 address.
Static IP AddressWhen you set the Encapsulation field to ENET ENCAP, select the Static IP Address
option if you have a fixed IPv6 address assigned by your ISP.
DHCP IPv6Select DHCP&SLAAC to have the use both DHCPv6 and SLAAC to get an IP address.
Select DHCP to obtain an IPv6 address from a DHCPv6 server. The IP address
assigned by a DHCPv6 server has priority over the IP address automatically
generated by the Device using the IPv6 prefix from an RA.
Select Auto to have the Device try to use DHCPv6 to get an IP address and then
SLAAC if DHCPv6 does not work.
Select SLAAC (Stateless address autoconfiguration) to have the Device use the prefix
to automatically generate a unique IP address that does not need to be maintained
by a DHCP server.
Select None if you do not want the Device to obtain an IPv6 address from a DHCPv6
server.
DHCP PD Select Enable to use DHCP PD (Prefix Delegation) to allow the Device to pass the IPv6
prefix information to its LAN hosts. The hosts can then use the prefix to generate
their IPv6 addresses.
Dual Stack LiteThe Dual Stack Lite fields display when you set the IPv6/IPv4 Dual Stack field to
IPv6. Enable Dual Stack Lite to let local computers use IPv4 through an ISP’s IPv6
network.
ModeSelect Manual if you have the IPv6 address of the Address Family Transition Router
(AFTR), otherwise select Auto to have the Device detect it automatically through
DHCPv6.
Remote IPv6
Address
IPv6 AddressWhen you enable Static IP Address, enter the IPv6 address of the Device in the
Prefix LengthWhen you enable Static IP Address, enter the IPv6 prefix length in the WAN here.
IPv6 Default
Gat ewa y
IPv6 DNS Server1When you enable Static IP Address, enter the primary DNS server IPv6 address
IPv6 DNS Server2When you enable Static IP Address, enter the secondary DNS server IPv6 address
WAN Identifier TypeSelect Manual to manually enter a WAN Identifier as the interface ID to identify the
WAN IdentifierIf you selected Manual, enter the WAN Identifier in this field. The WAN identifier
When you set the Mode field to Manual, specify the AFTR IPv6 address.
WAN.
When you enable Static IP Address, enter the IPv6 address of the default gateway
here.
here.
here.
WAN interface. The Device appends the WAN Identifier to the IPv6 address prefix to
create the routable global IPv6 address. Select EUI64 to use the EUI-64 format to
generate an interface ID from the MAC address of the WAN interface.
should be unique and 64 bits in hexadecimal form. Every 16 bit block should be
separated by a colon as in XXXX:XXXX:XXXX:XXXX where X represents a hexadecimal
character. Blocks of zeros can be represented with double colons as in
XXXX:XXXX::XXXX.
Keep AliveSelect Keep Alive when you want your connection up all the time. The Device will try
to bring up the connection automatically if it disconnects.
Connect on DemandSelect C
specify an idle time-out in the Max Idle Timeout field.
Max Idle TimeSpecify an idle time-out in the Max Idle Timeout field when you select Connect on
Demand. The default setting of 0 means the Internet session will not timeout.
ApplyClick this to save your changes.
CancelClick this to restore your pr
Advanced SetupClick this to display the Advanced
details of your WAN setup.
onnect on Demand when you don't want the connection up all the time and
5.2.1 Advanced Internet Connection
Use this screen to edit your Device's advanced WAN settings. Click the Advanced Setup button in
the Internet Connection screen. The screen appears as shown.
Figure 20 Intern
et Connection: Advanced Setup
eviously saved settings.
Internet Connection section and edit more
Chapter 5 WAN Setup36
Page 37
The following table describes the labels in this screen.
Table 4 Internet Connection: Advanced Setup
LABELDESCRIPTION
RIP & Multicast
Setup
RIP DirectionRIP (Routing Information Protocol) allows a router to exchange routing information
RIP VersionThis field does not apply if you select None in the RIP Direction field.
MulticastMulticast packets are sent to a group of computers on the LAN and are an alternative
MLD ProxySelect the version of MLD proxy (v1 or v2) to have the Device act as for this
ATM QoSThis section is available when the connection’s Virtual Channel field is set to an ADSL
This section does not apply when you configure the Device to bridge mode.
with other routers. Use this field to control how much routing information the Device
sends and receives on the subnet.
Select the RIP direction from None, Both, In Only and Out Only.
Select the RIP version from RIP-1, RIP-2B/RIP-2M.
to unicast packets (packets sent to one computer) and broadcast packets (packets
sent to every computer).
Devices use the IGMP (Internet Group Management Protocol) network-layer protocol
to establish membership in a multicast group. Select IGMP v1/IGMP v2/IGMP v3.
Select None to disable it.
connection. This allows the Device to get subscription information and maintain a
joined member list for each multicast group. It can reduce multicast traffic
significantly. Select None to turn off MLD proxy.
option.
ATM QoS TypeSelect CBR (Continuous Bit Rate) to specify fixed (always-on) bandwidth for voice or
data traffic. Select UBR With PCR (Unspecified Bit Rate with Peak Cell Rate) for
applications that are non-time sensitive, such as e-mail. Select Non Realtime VBR
(Variable Bit Rate-non Real Time) or Realtime VBR (Variable Bit Rate-Real Time) for
bursty traffic and bandwidth sharing with other applications.
Peak Cell RateDivide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate
(PCR). This is the maximum rate at which the sender can send cells. Type the PCR
here.
Sustain Cell RateThe Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be
transmitted. Type the SCR, which must be less than the PCR. Note that system default
is 0 cells/sec.
Maximum Burst
Size
PPPoE PassthroughIf the encapsulation type is PPPoE, select this to enable PPPoE Passthrough. In
MTU
Maximum Burst Size (MBS) refers to the maximum number of cells that can be sent at
the peak rate. Type the MBS, which is less than 65535.
addition to the Device’s built-in PPPoE client, you can select this to allow hosts on the
LAN to use PPPoE client software on their computers to connect to the ISP via the
device. Each host can have a separate account and a public WAN IP address.
Chapter 5 WAN Setup37
Page 38
Table 4 Internet Connection: Advanced Setup (continued)
LABELDESCRIPTION
MTUThe Maximum Transmission Unit (MTU) defines the size of the largest packet allowed
on an interface or connection. Enter the MTU in this field.
For ENET ENCAP, the MTU value is 1500.
For PPPoE, the MTU value is 1492.
For PPPoA and RFC 1483, the MTU is 65535.
ApplyClick this to save your changes.
CancelClick this to restore your
Advanced SetupClick this to close the A
5.3 The More Connections Screen
The Device allows you to configure more than one Internet access connection. To configure
additional Internet access connections click Network Setting > Broadband > More Connections.
The screen differs by the encapsulation you select. When you use the Broadband > Internet Connection screen to set up Internet access, you are configuring the first WAN connection.
Figure 21 N
etwork Setting > Broadband > More Connections
previously saved settings.
dvanced Internet Connection section.
The following table describes the labels in this screen.
Table 5 Network Setting > Broadband > More Connections
LABELDESCRIPTION
#This is an index number indicating the numb
ActiveThis field indicates whether the connection is active or not. This field is read-only.
Node NameThis is the name of the Internet connection.
VPI/VCIThis field displays the Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI)
numbers configur
ed for this WAN connection.
er of the corresponding connection.
Chapter 5 WAN Setup38
Page 39
Table 5 Network Setting > Broadband > More Connections (continued)
LABELDESCRIPTION
EncapsulationThis field indicates the encapsulation method and multiplexing type the Internet
connection uses.
ModifyThe first (ISP) connection is read-only in this screen. Use the Br
Connection screen to edit it.
Click the Ed
configuration to add a new Internet access setup.
Click the Re
5.3.1 More Connections Edit
Use this screen to configure a connection. Click the Edit icon in the More Connections screen to
display the following screen.
Figure 22 M
ore Connections: Edit
oadband > Internet
it icon to edit the Internet connection settings. Click this icon on an empty
move icon to delete the Internet access setup from your connection list.
Chapter 5 WAN Setup39
Page 40
The following table describes the labels in this screen.
Table 6 More Connections: Edit
LABELDESCRIPTION
General
ActiveSelect the check box to activate or clear the check box to deactivate this connection.
Node NameEnter a unique, descriptive name of up to 13 ASCII characters for this connection.
ModeSelect Router from the drop-down list box if your ISP allows multiple computers to share
an Internet account.
If you select Bridge, the Device will forward any packet that it does not route to this
remote node; otherwise, the packets are discarded.
EncapsulationSelect the method of encapsulation used by your ISP from the drop-down list box. This
field is available if you select Router in the Mode field.
User Name(PPPoA and PPPoE encapsulation only) Enter the user name exactly as your ISP assigned.
If assigned a name in the form user@domain where domain identifies a service name,
then enter both components exactly as given.
Password(PPPoA and PPPoE encapsulation only) Enter the password associated with the user name
above.
Service
Name
MultiplexSelect the method of multiplexing used by your ISP from the drop-down list. Choices are
IPv6/IPv4 Dual
Stack
PPP
Authentication
(PPPoE only) Type the name of your PPPoE service here.
VC-Mux or LLC.
By prior agreement, a protocol is assigned a specific virtual circuit, for example, VC1 will
carry IP. If you select VC-mux, specify separate VPI and VCI numbers for each protocol.
For LLC-based multiplexing or PPP encapsulation, one VC carries multiple protocols with
protocol identifying information being contained in each packet header. In this case, only
one set of VPI and VCI numbers need be specified for all protocols.
Select IPv4 to have the Device use only IPv4.
Select IPv4/IPv6 to let the Device connect to IPv4 and IPv6 networks and choose the
protocol for applications according to the address type.
Select IPv6 to have the Device use only IPv6.
The Device supports PAP (Password Authentication Protocol) and CHAP (Challenge
Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is
readily available on more platforms.
Use the drop-down list box to select an authentication protocol for outgoing calls. Options
are:
AUTO - Your Device accepts either CHAP or PAP when requested by this remote node.
CHAP - Your Device accepts CHAP only.
PAP - Your Device accepts PAP only.
VPI, VCIVPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit.
Refer to the appendix for more information.
Chapter 5 WAN Setup40
Page 41
Table 6 More Connections: Edit (continued)
LABELDESCRIPTION
IP AddressYou can use these options when you set the Mode field to Router and the IPv6/IPv4
Dual Stack field to IPv4 or IPv4/IPv6.
Select Obtain an IP Address Automatically if the ISP assigns you a dynamic IP address;
otherwise select Static IP Address and type your ISP assigned IP address in the IP Address field below.
Static IP
Address
IP AddressEnter the static IP address provided by your ISP.
Subnet
Mask
Gateway IP
Address
Primary /
Secondary
DNS
IPv6 Address
Obtain an IP
Address
Automatically
Static IP
Address
Select this option If the ISP assigned a fixed IP address.
Enter a subnet mask in dotted decimal notation.
Specify a gateway IP address (supplied by your ISP).
Set how the Device gets the IP addresses of the DNS servers it uses.
UserDefined - enter a static IP address.
Obtained From ISP - when the Device gets its IP address automatically, you can select
this to have it also get the DNS server address.
None - the Device does not use the DNS server entry.
Select this option if you want to have the Device use the IPv6 prefix from the connected
router’s Router Advertisement (RA) to generate an IPv6 address.
Select this option if you have a fixed IPv6 address assigned by your ISP.
DHCP IPv6Select DHCP if you want to obtain an IPv6 address from a DHCPv6 server.
The IP address assigned by a DHCPv6 server has priority over the IP address automatically
generated by the Device using the IPv6 prefix from an RA.
Select SLAAC (Stateless address autoconfiguration) to have the Device use the prefix to
automatically generate a unique IP address that does not need to be maintained by a
DHCP server.
DHCP PD Select Enable to use DHCP PD (Prefix Delegation) to allow the Device to pass the IPv6
prefix information to its LAN hosts. The hosts can then use the prefix to generate their
IPv6 addresses.
IPv6 AddressWith Static IP Address enabled, enter the IPv6 address of the Device in the WAN.
Prefix LengthWith Static IP Address enabled, enter the IPv6 prefix length in the WAN.
IPv6 Default
Gat ewa y
IPv6 DNS
Server1
With Static IP Address enabled, enter the IPv6 address of the default gateway
With Static IP Address enabled, enter the primary DNS server IPv6 address for the
Device.
Chapter 5 WAN Setup41
Page 42
Table 6 More Connections: Edit (continued)
LABELDESCRIPTION
IPv6 DNS
Server2
Connection
Keep AliveSelect Keep Alive when you want your connection up all the time. The Device will try to
Connect on
Demand
Max Idle
Timeout
NATIf you set the Mode field to Router, you can select SUA Only if you have one public IP
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
Advanced
Setup
With Static IP Address enabled, enter the secondary DNS server IPv6 address for the
Device.
bring up the connection automatically if it disconnects.
Select Connect on Demand when you don't want the connection up all the time and
specify an idle time-out in the Max Idle Timeout field.
Specify an idle time-out in the Max Idle Timeout field when you select Connect on Demand. The default setting of 0 means the Internet session will not timeout.
address and want to use NAT.
Otherwise, select None to disable NAT.
Click this to display the More ConnectionsAdvanced Setup screen and edit more details
of your WAN setup.
Chapter 5 WAN Setup42
Page 43
5.3.2 Configuring More Connections Advanced Setup
Use this screen to edit your Device's advanced WAN settings. Click the Advanced Setup button in
the More Connections Edit screen. The screen appears as shown.
Figure 23 Mor
e Connections: Edit: Advanced Setup
The following table describes the labels in this screen.
Table 7 Mor
LABELDESCRIPTION
RIP & Multicast Setup
RIP DirectionSelect the RIP Dir
RIP VersionYou do not configure this field if you set the RIP Dir
MulticastDevices use the IGMP (Internet Group Management Protocol) network-layer
MLD ProxySelect the version of MLD proxy (v1 or v2) to have the Device act as for this
ATM QoS
e Connections: Edit: Advanced Setup
ection from None, Both, In Only and Out Only.
Select the RIP V
pr
otocol to establish membership in a multicast group. Select IGMP v1/IGMP-v2/
IGMP-v3. Select None to disable it.
connection. This al
joined member list for each multicast group. It can reduce multicast traffic
significantly. Select None to turn off MLD proxy.
ersion from RIP-1, RIP-2B/RIP-2M.
lows the Device to get subscription information and maintain a
ection field to None.
Chapter 5 WAN Setup43
Page 44
Table 7 More Connections: Edit: Advanced Setup (continued)
LABELDESCRIPTION
ATM QoS TypeSelect CBR (Continuous Bit Rate) to specify fixed (always-on) bandwidth for voice or
data traffic. Select UBR With PCR (Unspecified Bit Rate with Peak Cell Rate) for
applications that are non-time sensitive, such as e-mail. Select Non Realtime VBR
(Variable Bit Rate-non Real Time) or Realtime VBR (Variable Bit Rate-Real Time) for
bursty traffic and bandwidth sharing with other applications.
Peak Cell RateDivide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell
Rate (PCR). This sets the maximum rate at which the sender can send cells. Type
the PCR here.
Sustain Cell RateThe Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be
transmitted. Type the SCR, which must be less than the PCR. Note the system
default of 0 cells/sec.
Maximum Burst
Size
PPPoE PassthroughWhen using the PPPoE the encapsulation type, select this to enable PPPoE
MTU
MTUThe Maximum Transmission Unit (MTU) defines the size of the largest packet
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
Maximum Burst Size (MBS) refers to the maximum number of cells that can be sent
at the peak rate. Type the MBS (less than 65535).
passthrough. In addition to the Device’s built-in PPPoE client, this allows hosts on
the LAN to use PPPoE client software on their computers to connect to the ISP
through the Device. Each host can have a separate account and a public WAN IP
address.
allowed on an interface or connection. Enter the MTU in this field.
For ENET ENCAP, the MTU value equals 1500.
For PPPoE, the MTU value equals 1492.
For PPPoA and RFC, the MTU equals 100-1500.
5.4 The 3G Backup Screen
Use this screen to configure your 3G settings. Click Network Setting > Broadband > 3G Backup.
The actual data rate you obtain varies depending the 3G card you use, the signal strength
to the service provider’s base station, and so on.
Chapter 5 WAN Setup44
Page 45
If the signal strength of a 3G network
is too low, the 3G card may switch to an available 2.5G or
2.75G network. Refer to Section 5.5 on page 47 for a comparison between 2G, 2.5G, 2.75G and 3G
wireless technologies.
Figure 24 Network Setting
> Broadband > 3G Backup
The following table describes the labels in this screen.
Table 8 Network Setting
LABELDESCRIPTION
3G BackupSelect E
Card DescriptionThis field displays the manufacturer and model name o
UsernameType the user name (of up to 70 ASCII printable char
PasswordType the password (of up to 70 ASCII printable char
> Broadband > 3G Backup
nable 3G Backup to have the Device use the 3G connection as your WAN or
PINA PIN (Personal Identification Number) code is a key to a 3G card. Without the PIN
code, you cannot use the 3G card.
If your ISP enabled PIN code authentication, enter the 4-digit PIN code (0000 for
example) provided by your ISP. If you enter the PIN code incorrectly, the 3G card
may be blocked by your ISP and you cannot use the account to access the Internet.
If your ISP disabled PIN code authentication, leave this field blank.
Dial StringEnter the phone number (dial string) used to dial up a connection to your service
provider’s base station. Your ISP should provide the phone number.
For example, *99# is the dial string to establish a GPRS or 3G connection in Taiwan.
APN CodeEnter the APN (Access Point Name) provided by your service provider. Connections
with different APNs may provide different services (such as Internet access or MMS
(Multi-Media Messaging Service)) and charge method.
You can enter up to 31 ASCII printable characters. Spaces are allowed.
Obtain an IP
Address
Automatically
Use the following
static IP address
IP AddressEnter your WAN IP address in this field if you selected Use the following static IP
Obtain DNS info
dynamically
Use the following
static DNS IP
address
Primary DNS
server
Secondary
DNS server
ConnectionSelect Nailed-UP if you do not want the connection to time out.
Select this option If your ISP did not assign you a fixed IP address.
Select this option If the ISP assigned a fixed IP address.
address.
Select this to have the Device get the DNS server addresses from the ISP
automatically.
Select this to have the Device use the DNS server addresses you configure manually.
Enter the first DNS server address assigned by the ISP.
Enter the second DNS server address assigned by the ISP.
Select On-Demand if you do not want the connection up all the time and specify an
idle time-out in the Max Idle Timeout field.
Max Idle Timeout This value specifies the time in minutes that elapses before the Device automatically
disconnects from the ISP.
ApplyClick Apply to save your changes back to the Device.
CancelClick Cancel to return to the previous configuration.
Chapter 5 WAN Setup46
Page 47
5.5 WAN Technical Reference
This section provides some technical background information about the topics covered in this
chapter.
5.5.1 Encapsulation
Be sure to use the encapsulation method required by your ISP. The Device supports the following
methods.
5.5.1.1 ENET ENCAP
The Device only implements the MAC Encapsulated Routing Link Protocol (ENET ENCAP) with the IP
network protocol. IP packets get routed between the Ethernet interface and the WAN interface and
then formatted to work in a bridged environment. For instance, it encapsulates routed Ethernet
frames into bridged ATM cells. ENET ENCAP requires that you specify a gateway IP address in the
Gateway IP Address field in the wizard or WAN screen. You can get this information from your ISP.
5.5.1.2 PPP over Ethernet
The Device supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE specifies how a personal
computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE
option provides a dial-up connection using PPPoE.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for example RADIUS).
PPPoE lets you access one of multiple network services, a function known as dynamic service
selection. This enables the service provider to easily create and offer new IP services for individuals.
Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no
specific configuration of the broadband modem at the customer site.
By implementing PPPoE directly on the Device (rather than individual computers), the computers on
the LAN do not need PPPoE software installed, since the Device does that part of the task.
Furthermore, with NAT, all of the LANs’ computers will have access.
5.5.1.3 PPPoA
PPPoA stands for Point to Point Protocol over ATM Adaptation Layer 5 (AAL5). A PPPoA connection
functions like a dial-up Internet connection. The Device encapsulates the PPP session based on RFC
1483 and sends it through an ATM PVC (Permanent Virtual Circuit) to the Internet Service Provider’s
(ISP) DSLAM (Digital Subscriber Line (DSL) Access Multiplexer). Please refer to RFC 2364 for more
information on PPPoA. Refer to RFC 1661 for more information on PPP.
Chapter 5 WAN Setup47
Page 48
5.5.1.4 RFC 1483
RFC 1483 describes two methods for Multiprotocol Encapsulation over ATM Adaptation Layer 5
(AAL5). The first method allows multiplexing of multiple protocols over a single ATM virtual circuit
(LLC-based multiplexing) and the second method assumes a separate ATM virtual circuit (VC-based
multiplexing) carries each protocol. Please refer to RFC 1483 for more detailed information.
5.5.2 Multiplexing
There are two conventions to identify what protocols the virtual circuit (VC) carries. Use the
multiplexing method required by your ISP.
VC-based Multiplexing
In this case, by prior mutual agreement, each protocol uses a specific virtual circuit; for example,
VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic
creation of large numbers of ATM VCs is fast and economical.
LLC-based Multiplexing
In this case one VC carries multiple protocols with protocol identifying information being contained
in each packet header. Despite the extra bandwidth and processing overhead, this method may be
advantageous if it is not practical to have a separate VC for each carried protocol, for example, if
charging heavily depends on the number of simultaneous VCs.
5.5.3 VPI and VCI
Be sure to use the correct Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers
assigned to you. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (0 to 31 is
reserved for local management of ATM traffic). Please see the appendix for more information.
5.5.4 IP Address Assignment
A static IP is a fixed IP that your ISP gives you. A dynamic IP is not fixed; the ISP assigns you a
different one each time. The Single User Account feature can be enabled or disabled if you have
either a dynamic or static IP. However the encapsulation method assigned influences your choices
for IP address and ENET ENCAP gateway.
IP Assignment with PPPoA or PPPoE Encapsulation
If you have a dynamic IP, then the IP Address and Gateway IP Address fields are not applicable (N/
A). If you have a Static IP Address assigned by your ISP, then they should also assign you a Subnet Mask and a Gatew ay IP Address.
IP Assignment with RFC 1483 Encapsulation
In this case the IP address assignment must be static.
Chapter 5 WAN Setup48
Page 49
IP Assignment with ENET ENCAP Encapsulation
In this case you can have either a static or dynamic IP. For a static IP you must fill in all the IP
Address and Gateway IP Address fields as supplied by your ISP. However for a dynamic IP, the
Device acts as a DHCP client on the WAN port and so the IP Address and Gateway IP Address fields
are not applicable (N/A) as the DHCP server assigns them to the Device.
Chapter 5 WAN Setup49
Page 50
Chapter 6 Wireless
CHAPTER 6
6.1 Overview
This chapter describes the Device’s Network Setting > Wireless screens. Use these screens to set
up your Device’s wireless connection.
6.1.1 What You Can Do in this Chapter
•Use the General screen to enable the wireless LAN, enter the SSID and select the wireless security
mode (
•Use the More AP screen to set up multiple wireless networks on your Device (Section 6.3 on page
59).
•Use the MAC Authentication screen to allow or deny wireless clients based on their MAC
addresses from connecting to the Device (
•Use the WPS screen to enable or disable WPS, view or generate a security PIN (Personal
Identification Number) (
•Use the WDS screen (see Section 6.6 on page 65) to set up a Wireless Distribution System, in
which the Device acts as a bridge with other access points.
•Use the WMM screen to enable Wi-Fi MultiMedia (WMM) to ensure quality of service in wireless
networks for multimedia applications (
•Use the Scheduling screen to schedule a time period for the wireless LAN to operate each day
(
•Use the Advanced screen to configure advanced wireless features (Section 6.9 on page 69).
Section 6.2 on page 52).
Section 6.5 on page 63).
Section 6.8 on page 68).
Section 6.4 on page 61).
Section 6.7 on page 67).
6
Chapter
You don’t necessarily need to use all these screens to set up your wireless connection. For example,
you may just want to set up a network name, a wireless radio channel and some security in the
General screen.
6.1.2 Wireless Network Overview
Wireless networks consist of wireless clients, access points and bridges.
• A wireless client is a radio connected to a user’s computer.
• An access point is a radio with a wired connection to a network, which can connect with
numerous wireless clients and let them access the network.
• A bridge is a radio that relays communications between access points and wireless clients,
extending a network’s range.
Chapter 6 Wireless50
Page 51
Traditionally, a wireless network operates in one of two ways.
• An “infrastructure” type of network has one or mo
clients. The wireless clients connect to the access points.
• An “ad-hoc” type of network is one in which there is no acce
one another in order to exchange information.
The following figure provides an example of a wireless network.
Figure 25 Example o
f a Wireless Network
re access points and one or more wireless
ss point. Wireless clients connect to
The wireless network is the part in the blue circle. In this wireless network, devices A and B use the
access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your
Device is the AP.
Every wireless network must follow these basic guidelines.
• Every device in the same wireless network must use the same SSID.
The SSID is the name of the wireless netwo
• If two wireless networks overlap, the
Like radio stations or television channels, each w
frequency, to send and receive information.
• Every device in the same wireless network must use security compatible with the AP.
Chapter 6 Wireless51
y should use a different channel.
rk. It stands for Service Set IDentifier.
ireless network uses a specific channel, or
Page 52
• Security stops unauthorized devices from using the wireless network. It can also protect the
information that is sent in the wireless network.
Radio Channels
In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use. For
the purposes of wireless networking, these bands are divided into numerous channels. This allows
a variety of networks to exist in the same place without interfering with one another. When you
create a network, you must select a channel to use.
Since the available unlicensed spectrum varies from one country to another, the number of
available channels also varies.
6.1.3 Before You Begin
Before you start using these screens, ask yourself the following questions. See Section 6.10 on page
71 if some of the terms used here do not make sense to you.
• What wireless standards do the other wireless devices support (IEEE 802.11g, for example)? What
is the most appropriate standard to use?
• What security options do the other wireless devices support (WPA2-PSK, for example)? What is
the best one to use?
• Do the other wireless devices support WPS (Wi-Fi Protected Setup)? If so, you can set up a wellsecured network very easily.
Even if some of your devices support WPS and some do not, you can use WPS to set up your
network and then add the non-WPS devices manually, although this is somewhat more
complicated to do.
• What advanced options do you want to configure, if any? If you want to configure advanced
options, ensure that you know precisely what you want to do. If you do not want to configure
advanced options, leave them alone.
6.2 Wireless General Screen
Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
If you are configuring the Device from a computer connected to the wireless LAN and you
change the Device’s SSID or security settings, you will lose your wireless connection when
you press Apply to confirm. You must then change the wireless settings of your computer
to match the Device’s new settings.
Chapter 6 Wireless52
Page 53
Click Network
Setting > Wireless to open the General screen. Select the Enable Wireless LAN
checkbox to show the Wireless configurations.
Figure 26 Network Setting
> Wireless > General
The following table describes the labels in this screen.
Table 9 Ne
LABELDESCRIPTION
Wireless Network Setup
WirelessSelect the Enabl
Wireless Network Settings
Wireless Network
Name (SS
Hide SSIDSelect this check box to hide the SSID in the ou
Client IsolationSelect this to keep the wireless clients in
twork > Wireless LAN > General
e Wireless LAN check box to activate the wireless LAN.
Note: You must also set the Device’s physical WLAN ON/OFF button to ON to use
wireless LAN. The WLAN LED should be on.
The SSID (Service Set IDentity) identifies the service set with which a wireless device is
ID)
associated. Wireless devices associating to the access point (AP) must have the same
SSID.
Enter a descriptive name (up to 32 English keyboard characters) for the wireless LAN.
cannot obtain the SSID through scanning using a site survey tool.
other directly through the Device.
this SSID from communicating with each
tgoing beacon frame so a station
Chapter 6 Wireless53
Page 54
Table 9 Network > Wireless LAN > General (continued)
LABELDESCRIPTION
MBSSID/LAN
Isolation
Channel SelectionSet the channel depending on your particular region.
ScanClick this button to have the D
Operating ChannelThis is the channel currently being used by your AP.
Security Level
Security ModeSelect Ba
Select this to keep the wireless clients in this SSID from communicating with clients in
other SSIDs or wired LAN devices through the Device.
Select both Cl
clients to only connect to the Internet through the Device.
Select a channel or use Au
use. If you are having problems with wireless interference, changing the channel may
help. Try to use a channel that is as many channels away from any channels used by
neighboring APs as possible. The channel number which the Device is currently using
then displays in the Operating Channel field.
is not used by another device) whenever the device reboots or the wireless setting is
changed.
clients which want to associate to this network must have same wireless security
settings as the Device. When you select to use a security, additional options appears
in this screen.
Or you can select No Security to allow any client to associate with this network
without any data encryption or authentication.
See the following sections for more details abou
ient Isolation and MBSSID/LAN Isolation to allow this SSID’s wireless
to to have the Device automatically determine a channel to
evice immediately scan for and select a channel (which
sic or More Secure to add security on this wireless network. The wireless
t wireless security modes.
ApplyClick Apply to save your chang
CancelClick Ca
ncel to restore your previously saved settings.
es back to the Device.
6.2.1 No Security
Select No Security to allow wireless stations to communicate with the access points without any
data encryption or authentication.
If you do not enable any wireless security on your Device, your network is accessible to any
wireless networking device that is within range.
Figure 27 Wireless > General: No Security
Chapter 6 Wireless54
Page 55
The following table describes the labels in this screen.
Table 10 Wireless >
LABELDESCRIPTION
Security LevelChoose No Security
General: No Security
from the sliding bar.
6.2.2 Basic (Static WEP/Shared WEP Encryption)
WEP encryption scrambles the data transmitted between the wireless stations and the access points
(AP) to keep network communications private. Both the wireless stations and the access points
must use the same WEP key.
There are two types of WEP authentication namely, Open System (Static WEP) and
(Shared WEP).
Open system is implemented for ease-of-use and when secu
and the AP or peer computer do not share a secret key. Thus the wireless stations can associate
with any AP or peer computer and listen to any transmitted data that is not encrypted.
Shared key mode involves a shared secret key to authenticate the wireless station to the AP or peer
c
omputer. This requires you to enable the wireless LAN security and use same settings on both the
wireless station and the AP or peer computer.
Shared Key
rity is not an issue. The wireless station
In order to configure and enable WEP encryption, click Network Settings >
General screen. Select Basic as the security level. Then select Static WEP or Shared WEP from the
Security Mode list.
Figure 28 W
ireless > General: Basic (Static WEP/Shared WEP)
Wireless to display the
Chapter 6 Wireless55
Page 56
The following table describes the labels in this screen.
Table 11 Wir
LABELDESCRIPTION
Security LevelSelect Ba
Generate
password
automatically
Password 1~4The password (WEP key) is used to encrypt d
WEP EncryptionSelect 64
eless > General: Basic (Static WEP/Shared WEP)
sic to enable WEP data encryption.
Select this option to have the Device automatically generate a password. The password
field will not be configurable when you select this option.
stations must use the same password (WEP key) for data transmission.
If you chose 64
characters ("0-9", "A-F").
If you chose 12
("0-9", "A-F").
This dictates the length of the security key that the network is going to use.
-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal
8-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters
-bits or 128-bits.
6.2.3 More Secure (WPA2-PSK)
The WPA2-PSK security mode provides both improved data encryption and user authentication
over WEP. Using a Pre-Shared Key (PSK), both the Device and the connecting client share a common
password in order to validate the connection. This type of encryption, while robust, is not as strong
as WPA2.
ata. Both the Device and the wireless
Click Network
Settings > Wireless to display the General screen. Select More Secure as the
security level. Then select WPA2-PSK from the Security Mode list.
Figure 29 W
ireless > General: More Secure: WPA2-PSK
Chapter 6 Wireless56
Page 57
The following table describes the labels in this screen.
Table 12 Wir
LABELDESCRIPTION
Security LevelSelect M
Security ModeSelect WPA2-PSK from the drop-down list box.
Pre-Shared Key The encryption mechanisms used for WP
more.../hide moreClick mor
WPA-PSK
Co
mpatible
Group Key Update
Timer
EncryptionIf the security mode is WPA2-PSK and WPA-PSK Compatible is disabled, the
eless > General: WPA2-PSK
ore Secure to enable WPA2-PSK data encryption.
A2 and WPA2-PSK are the same. The only
difference between the two is that WPA2-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters or 64 hexidecimal
digits
.
e... to show more fields in this section. Click hide more to hide them.
Enable this to allow wireless devices using WPA-PSK security mode to connect to your
Device. The Device supports WPA-PSK and WPA2-PSK simultaneously.
The Gr
oup Key Update Timer is the rate at which the RADIUS server sends a new
group key out to all clients.
encryption mode is set to AES to enable Advanced Encryption System (AES) security on
your wireless network. AES provides superior security to TKIP.
If the security mode is WP
encryption mode also allows you to select TKIPAES MIX to allow both TKIP and AES
types of security in your wireless network.
A2-PSK and WPA-PSK Compatible is enabled, the
6.2.4 WPA2 Authentication
The WPA2 security mode is currently the most robust form of encryption for wireless networks. It
requires a RADIUS server to authenticate user credentials and is a full implementation the security
protocol. Use this security option for maximum protection of your network. However, it is the least
backwards compatible with older devices.
Chapter 6 Wireless57
Page 58
Click Network
Settings > Wireless to display the General screen. Select More Secure as the
security level. Then select WPA2 from the Security Mode list.
Figure 30 W
ireless > General: More Secure: WPA2
The following table describes the labels in this screen.
Table 13 W
ireless > General: More Secure: WPA2
LABELDESCRIPTION
Security LevelSelect M
Security ModeChoose WP
Authentication Server
IP AddressEnter the IP address of the external authentication server in do
Port NumberEnter the port number of the external authentication server. The default port number
is 18
You need not change this value unless your network administrator instructs you to do
so
Shared SecretEnter a password (up to 128 alphanumeric char
the external authentication server and the Device.
The key must be the same on the external authentication server and your Device. The
ey is not sent over the network.
k
more.../hide moreClick mor
ore Secure to enable WPA2 data encryption.
A2 from the drop-down list box.
tted decimal notation.
12.
with additional information.
acters) as the key to be shared between
e... to show more fields in this section. Click hide more to hide them.
Chapter 6 Wireless58
Page 59
Table 13 Wireless > General: More Secure: WPA2 (continued)
LABELDESCRIPTION
ReAuthentication
Timer
WPA CompatibleSelect this if you want the Device to support WPA and WPA2 simultaneously.
Group Key Update
Timer
EncryptionIf the security mode is WP
Specify how often wireless stations have to resend user names and passwords in order
to stay connected.
The default value is 0, which means the reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the
The Gr
group key out to all clients.
If the value is set to “0”, the update timer function
mode is set to AES to enable Advanced Encryption System (AES) security on your
wireless network. AES provides superior security to TKIP.
If the security mode is WP
mode also allows you to select TKIPAES MIX to allow both TKIP and AES types of
security in your wireless network.
6.3 More AP Screen
The Device can broadcast up to four wireless network names at the same time. This means that
users can connect to the Device using different SSIDs. You can secure the connection on each SSID
profile so that wireless clients connecting to the Device using different SSIDs cannot communicate
with each other.
eauthentication timer on the RADIUS server has priority.
r
oup Key Update Timer is the rate at which the RADIUS server sends a new
is disabled.
A2 and WPA-PSK Compatible is disabled, the encryption
A2 and WPA-PSK Compatible is enabled, the encryption
This screen allows you to enable and configure multiple Basic Service Sets (BSSs) on the Device.
Click Network
Figure 31 Network Settings >
Settings > Wireless > More AP. The following screen displays.
Wireless > More AP
Chapter 6 Wireless59
Page 60
The following table describes the labels in this screen.
Table 14 Network Settings > Wireless
LABELDESCRIPTION
#This is the index number of the entry.
ActiveThis field indicates whether this SSID is active. A yel
SSIDAn SSID profile is the set of parameters relating to one of the Device’s BSSs. The SSID
SecurityThis field indicates the security mode of the SSID profile.
Modify Click the Edit icon to configur
6.3.1 Edit More AP
Use this screen to edit an SSID profile. Click the Edit icon next to an SSID in the More AP screen. The
following screen displays.
> More AP
low bulb signifies that this SSID is
active. A gray bulb signifies that this SSID is not active.
(
Service Set IDentifier) identifies the Service Set with which a wireless device is
associated.
This field displays the name of the wireless profile on the network. When a wireless
ent scans for an AP to associate with, this is the name that is broadcast and seen in
cli
the wireless client utility.
e the SSID profile.
Figure 32 W
ireless > More AP: Edit
Chapter 6 Wireless60
Page 61
The following table describes the fields in this screen.
Table 15 Wireless >
LABELDESCRIPTION
Wireless Network Setup
WirelessSelect the Enable Wir
Wireless Network Settings
Wireless Network
Name (SS
Hide SSIDSelect this check box to hide the SSID in the outgoing beacon frame so a station
Client IsolationSelect this to keep the wireless clients in this SSID fr
MBSSID/LAN
Isolatio
Security Level
ID)
n
More AP: Edit
eless LAN check box to activate the wireless LAN.
The SSID (Service Set IDentity) identifies the service set with which a wireless device
is associated. Wireless devices associating to the access point (AP) must have the
same SSID.
Enter a descriptive name (up to 32 English keyboard characters) for the wireless LAN.
canno
t obtain the SSID through scanning using a site survey tool.
om communicating with each
other directly through the Device.
Select this to keep the wireless clients in this SSID from communicating with clients
in other SSIDs or wired LAN devices through the Device.
Select both C
clients to only connect to the Internet through the Device.
lient Isolation and MBSSID/LAN Isolation to allow this SSID’s wireless
Security ModeSelect B
wireless network. Wireless clients must use the same wireless security settings as
the Device to connect to the wireless LAN. After you select to use security, additional
options appears in this screen.
Or you can select No Security to allow any client to connect to this network without
any data encryption or authentication.
See Section 6.2.1 on page 54 through Section 6.2.4 on page 57 for more details
about this field.
OKClick this to save your changes.
CancelClick this to exit this screen without saving.
asic (WEP) or More Secure (WPA2-PSK, WPA2) to add security on this
6.4 MAC Authentication Screen
Use this screen to configure the Device to give exclusive access to specific devices (Allow) or
exclude specific devices from accessing the Device (Deny). Every Ethernet device has a unique MAC
(Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs
of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC addresses of
the devices to configure this screen.
Chapter 6 Wireless61
Page 62
Use this screen to view your Device’s MAC filter
settings and add new MAC filter rules. Click
Network Setting > Wireless > MAC Authentication. The screen appears as shown.
Figure 33 W
ireless > MAC Authentication
The following table describes the labels in this screen.
Table 16 Wireless > MAC Authenticat
LABELDESCRIPTION
SSIDSelect the SSID for which you want to configure MAC filter settings.
MAC Restrict
Mode
Define the filter action for the list of MAC addresses in the MA
Select Disable to turn o
Select Deny to bl
access the Device.
ock access to the Device. MAC addresses not listed will be allowed to
ion
C Address table.
ff MAC filtering.
Add new MAC
ad
dress
Select Al
to the Device.
Click this if you want to add a new MAC address entry to the MAC filter list below.
Enter the MAC addresses of the wireless devices that are allowed or denied access to the
De
is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc.
low to permit access to the Device. MAC addresses not listed will be denied access
vice in these address fields. Enter the MAC addresses in a valid MAC address format, that
Figure 34 Wireless > MAC Authentication > Add new MAC address
#This is the index number of the entry.
Chapter 6 Wireless62
Page 63
Table 16 Wireless > MAC Authentication (continued)
LABELDESCRIPTION
MAC AddressThis is the MAC addresses of the wireless devices that are allowed or denied access to the
Device.
ModifyClick the Delete icon to delete the entry.
ApplyClick Apply to save your changes.
CancelClick Cancel to exit this screen without saving.
6.5 The WPS Screen
Use this screen to configure WiFi Protected Setup (WPS) on your Device.
WPS allows you to quickly set up a wireless network with strong security, without having to
configure security settings manually. Set up each WPS connection between two devices. Both
devices must support WPS.
The Device applies the security settings of the SSID1 profile (see Section 6.2 on page 52). If
you want to use the WPS feature, make sure you have set the security mode of SSID1 to
WPA2-PSK or WPA2-PSK/WPA-PSK mixed or no security.
Chapter 6 Wireless63
Page 64
Click Network
Setting > Wireless > WPS. The following screen displays. Select Enable and click
Apply to activate the WPS function. Then you can configure the WPS settings in this screen.
Figure 35 Network Setting
> Wireless > WPS
The following table describes the labels in this screen.
Table 17 Network Setting
LABELDESCRIPTION
Enable WPSSelect Enab
Add a new device with WPS Method - These fields display after you enable WPS and click Ap
Method 1 PBCUse this section to set up a WPS wireless network using Push Bu
(PBC).
WPSClick this button to add another WPS-enabled wireless device (within wireless range of
t
he Device) to your wireless network. This button may either be a physical button on
the outside of device, or a menu button similar to the WPS button on this screen.
Note: You must press the other wireless device’s WPS button within two minutes of
Method 2 PINUse this section to set up a WPS wireless network by entering the PIN (Personal
Identification Number) of the client into the Device.
RegisterEnter the PIN of the device that you are setting up a WPS connection with and click
Register to authenticate and add the wireless device to your wireless network.
You can find the PIN either on the outside of the device, or by checking the device’s
settings.
Note: You must also activate WPS on that device within two minutes to have it present
its PIN to the Device.
WPS Configuration Summary
AP PINThe PIN of the Device is shown here. Enter this PIN in the configuration utility of the
device you want to connect to using WPS.
The PIN is not necessary when you use WPS push-button method.
Click the Generate New PIN button to have the Device create a new PIN.
StatusThis displays Configured when the Device has connected to a wireless network using
WPS or Enable WPS is selected and wireless or wireless security settings have been
changed. The current wireless and wireless security settings also appear in the screen.
This displays Not Configured when there is no wireless or wireless security changes
on the Device or you click Release Configuration to remove the configured wireless
and wireless security settings.
Release
Configuration
802.11 ModeThis is the 802.11 mode used. Only compliant WLAN devices can associate with the
SSIDThis is the name of the wireless network.
SecurityThis is the type of wireless security employed by the network.
Pre-Shared KeyThis is the wireless LAN password.
ApplyClick Apply to save your changes.
CancelClick this to restore your previously saved settings.
This button is available when the WPS status is Configured.
Click this button to remove all configured wireless and wireless security settings for
WPS connections on the Device.
Device.
6.6 The WDS Screen
An AP using the Wireless Distribution System (WDS) can function as a wireless network bridge
allowing you to wirelessly connect wired network segments. The WDS screen allows you to
configure the Device to connect to other APs wirelessly when WDS is enabled.
Chapter 6 Wireless65
Page 66
Use this screen to set up your WDS (Wireless Dis
tribution System) links between the Device and
other wireless APs. You need to know the MAC address of the peer device. Once the security
settings of peer sides match one another, the connection between devices is made.
WDS security is independent of the security settings between the Device and any wireless
clients.
Not all APs support WDS links. Check your other AP’s documentation.
Click Network Setting > Wireless > WDS. The following screen displays.
Figure 36 Network Setting
> Wireless > WDS
The following table describes the labels in this screen.
Table 18 Network Setting
LABELDESCRIPTION
WDS SecuritySelect the type of the key used to encrypt data between APs. All the wireless APs
(including the De
The option is available only when you set the security mode to WP
the Wireless > General screen.
> Wireless > WDS
vice) must use the same pre-shared key for data transmission.
A2 or WPA2-PSK in
TKIPSelect this to use TKIP (Temporal Ke
AESSelect this to use AES (Advanced Encryption Standard) encryption.
#This is the index number of the individual WDS link.
ActiveSelect this to activate the link between the Device and the peer device to which this entry
r
efers. When you do not select the check box this link is down.
Remote Bridge
MA
C Address
PSKEnter a Pre-Shared Key (PSK) from 8 to 63 case-sensitive ASCII characters (including
Type the MAC address of the peer device in a valid MAC address format (six hexadecimal
character pairs, for example 12:34:56:78:9a:bc).
CancelClick this to restore your previously saved settings.
6.7 The WMM Screen
Use this screen to enable or disable Wi-Fi MultiMedia (WMM) wireless networks for multimedia
applications.
Click Network
Figure 37 Network Setting
Setting > Wireless > WMM. The following screen displays.
> Wireless > WMM
The following table describes the labels in this screen.
Table 19 Network
LABELDESCRIPTION
Enable WMM of
SS
ID1~4
ApplyClick App
CancelClick Ca
Setting > Wireless > WMM
This enables the Device to automatically give a service a priority level according to the
ToS value in the IP header of packets it sends. WMM QoS (Wifi MultiMedia Quality of
Service) gives high priority to voice and video, which makes them run more smoothly.
ly to save your changes.
ncel to restore your previously saved settings.
Chapter 6 Wireless67
Page 68
6.8 Scheduling Screen
Click Network Setting > Wireless > Scheduling to open the Wireless Scheduling screen. Use this
screen to manage schedules that turn off wireless service for power saving purposes.
Figure 38 Network Setting
> Wireless > Scheduling
The following table describes the labels in this screen.
Table 20 Network Setting
LABELDESCRIPTION
Wireless LAN
Schedul
Add New RuleClick this to create a new wireless LAN scheduling rule.
ing
Select Enable to activate wireless LAN scheduling on your Device.
> Wireless > Scheduling
#This is the index number of the entry.
Rule NameThis field shows the name configured for the scheduling rule.
DaysThis field displays to which days o
Start TimeThis field displays the time (in 24-hour time format) the rule
End TimeThis field displays the time (in 24-hour time format) the rule turns the wireless LAN
back
on.
SecurityThis field indicates the security mode of the SSID profile.
Modify Click the Edit icon to configur
Click the Delete icon to r
ApplyClick Appl
CancelClick Can
y to save your changes.
cel to restore your previously saved settings.
emove the scheduling rule.
f the week the schedule applies.
turns off the wireless LAN.
e the scheduling rule.
Chapter 6 Wireless68
Page 69
6.8.1 Add or Edit Schedule
Use this screen to add or edit a wireless LAN schedule. In the Network Setting > Wireless >
Scheduling screen, click Add New Rule or the Edit icon next to an existing schedule. The following
screen displays.
Figure 39 Netw
ork Setting > Wireless > Scheduling > Add New Rule
The following table describes the fields in this screen.
Table 21 Network Setting
LABELDESCRIPTION
From
Sc
hedule
Rules
Rule NameSpecify a descriptive name to identify the scheduling rule.
To create a new scheduling rule based off an existing one, select it here.
> Wireless > Scheduling > Add New Rule
DaySelect the days of the week to which to apply the schedule.
Time of Day
Range
ApplyClick Appl
CancelClick Can
Enter the wireless LAN service start and end times in 24-hour time format.
6.9 Advanced Screen
Use this screen to configure advanced wireless settings. Click Network Setting > Wireless >
Advanced, the screen appears as shown.
y to save your changes.
cel to exit this screen without saving.
Chapter 6 Wireless69
Page 70
See Section 6.10.1 on page 71 for detailed definitions of the terms listed in this scr
een.
Figure 40 Network Setting
> Wireless> Advanced
The following table describes the labels in this screen.
Table 22 Network Setting
LABELDESCRIPTION
Fragmentation
Thr
eshold
Output PowerSet the output power of the Device. If there is a high density of APs in an area, decrease
PreambleSelect a preamble type from the drop-down list menu. Choices are Lo
This is the maximum data fragment size that can be sent. Enter a value between 256 and
2346.
the output power to reduce interference with other APs. Select one of the following:
100%, 75%, 50% or 25%.
> Wireless> Advanced
ng or Short.
802.11 ModeSelect 80
Device.
Select 80
Device.
Select 80
associate with the Device. The transmission rate of your Device might be reduced.
Select 80
Device.
Select 80
associate with the Device. The transmission rate of the Device might be reduced when an
802.11g wireless client is associated with it.
Select 80
devices to associate with the Device. The transmission rate of the Device might be
reduced when an 802.11b or 802.11g wireless client is associated with it.
Note: The transmission rate varies depending on
associate with the Device.
2.11b to allow only IEEE 802.11b compliant WLAN devices to associate with the
2.11g to allow only IEEE 802.11g compliant WLAN devices to associate with the
2.11b+g to allow either IEEE 802.11b or IEEE 802.11g compliant WLAN devices to
2.11n to allow only IEEE 802.11n compliant WLAN devices to associate with the
2.11g+n to allow either IEEE 802.11g or IEEE 802.11n compliant WLAN devices to
2.11b+g+n to allow IEEE 802.11b, IEEE 802.11g or IEEE 802.11n compliant WLAN
Channel WidthA standard 20MHz channel offers transfer speeds o
channel uses two standard channels and offers speeds of up to 300 Mbps.
Select 20
neighborhood or the wireless clients do not support channel bonding.
Select Au
This field is available only when you set the 80
the Advanced Setup screen.
ApplyClick this to save your changes.
CancelClick this to restore your pr
MHz if you want to lessen radio interference with other wireless devices in your
to to have the Device configure the wireless channel width automatically.
6.10 Technical Reference
This section discusses wireless LANs in depth.
6.10.1 Additional Wireless Terms
The following table describes some wireless network terms and acronyms used in the Device’s web
configurator.
f up to 150Mbps whereas a 40MHz
2.11 Mode to 802.11n or 802.11b+g+n in
eviously saved settings.
Table 23 Addit
TER MDESCRIPTION
RTS/CTS ThresholdIn a wireless network which covers a large ar
PreambleA preamble affects the timing in your wireless network. There are two preamble
AuthenticationThe process of verifying whether a wireless device is allowed to use the wireless
Fragmentation
Thr
eshold
ional Wireless Terms
ea, wireless devices are sometimes not
aware of each other’s presence. This may cause them to send information to the AP at
the same time and result in information colliding and not getting through.
By setting this value lower than the default value, the wir
get permission to send information to the Device. The lower the value, the more often
the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), then
eless devices never have to get permission to send information to the Device.
wir
modes: l
does, it cannot communicate with the Device.
network.
A small fragmentation threshold is recommended for busy networks, while a larger
threshold provides faster performance if the network is not very busy.
ong and short.If a device uses a different preamble mode than the Device
eless devices must sometimes
Chapter 6 Wireless71
Page 72
6.10.2 Wireless Security Overview
By their nature, radio communications are simple to intercept. For wireless data networks, this
means that anyone within range of a wireless network without security can not only read the data
passing over the airwaves, but also join the network. Once an unauthorized person has access to
the network, he or she can steal information or introduce malware (malicious software) intended to
compromise the network. For these reasons, a variety of security systems have been developed to
ensure that only authorized people can use a wireless data network, or understand the data carried
on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a “key” phrase) can access the
network. Second, they encrypt. This means that the information sent over the air is encoded. Only
people with the code key can understand the information, and only people who have been
authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not keep a
determined attacker out. Other security standards are secure in themselves but can be broken if a
user does not use them properly. For example, the WPA2-PSK security standard is very secure if you
use a long key which is difficult for an attacker’s software to guess - for example, a twenty-letter long
string of apparently random numbers and letters - but it is not very secure if you use a short key
which is very easy to guess - for example, a three-letter word from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just people who have
sensitive information on their network who should use security. Everybody who uses any wireless
network should ensure that effective security is in place.
A good way to come up with effective security keys, passwords and so on is to use obscure
information that you personally will easily remember, and to enter it in a way that appears random
and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and
her favorite movie is Vanishing Point (which you know was made in 1971) you could use
“70dodchal71vanpoi” as your security key.
The following sections introduce different types of wireless security you can set up in the wireless
network.
6.10.2.1 SSID
Normally, the Device acts like a beacon and regularly broadcasts the SSID in the area. You can hide
the SSID instead, in which case the Device does not broadcast the SSID. In addition, you should
change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
Chapter 6 Wireless72
Page 73
6.10.2.2 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every
device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information
if they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless
users to get a valid user name and password. Then, they can use that user name and password to
use the wireless network.
6.10.2.3 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend
on page 73 for information about this.)
Table 24 Types of
No AuthenticationRADIUS Server
WeakestNo SecurityWPA
Static WEP
passwords for each user in a RADIUS
that is sent in the wireless network, even
on the type of authentication. (See Section 6.10.2.2
Encryption for Each Type of Authentication
WPA-PSK
StrongestWPA2-PSKWPA2
For example, if the wireless network has a RADIUS server, you choose WPA2. If users do not log in to
the wireless network, you can choose no encryption, Static WEP or WPA2-PSK.
Usually, you should set up the str
supports. For example, suppose you have a wireless network with the Device and you do not have a
RADIUS server. Therefore, there is no authentication. Suppose the wireless network has two
devices. Device A only supports WEP, and device B supports WEP and WPA2. Therefore, you should
set up Static WEP in the wireless network.
ongest encryption that every device in the wireless network
It is recommended that wireless networks use WPA2-PSK or WPA2 encryption. The other
types of encryption are better than none at all, but it is still possible for unauthorized
wireless devices to figure out the original information pretty quickly.
Chapter 6 Wireless73
Page 74
When you select WPA2 or WPA2-PSK in your Device, you can also select an option (WPA compatible) to support WPA as well. In this case, if some of the devices support WPA and some
support WPA2, you should set up WPA2-PSK or WPA2 (depending on the type of wireless network
login) and select the WPA compatible option in the Device.
Many types of encryption use a key to protect the information in the wireless network. The longer
the key, the stronger the encryption. Every device in the wireless network must have the same key.
6.10.3 Signal Problems
Because wireless networks are radio networks, their signals are subject to limitations of distance,
interference and absorption.
Problems with distance occur when the two radios are too far apart. Problems with interference
occur when other radio waves interrupt the data signal. Interference may come from other radio
transmissions, such as military or air traffic control communications, or from machines that are
coincidental emitters such as electric motors or microwaves. Problems with absorption occur when
physical objects (such as thick walls) are between the two radios, muffling the signal.
6.10.4 BSS
A Basic Service Set (BSS) exists when all communications between wireless stations or between a
wireless station and a wired network client go through one access point (AP).
Chapter 6 Wireless74
Page 75
Intra-BSS traffic is traffic
disabled, wireless station A and B can access the wired network and communicate with each other.
When Intra-BSS traffic blocking is enabled, wireless station A and B can still access the wired
network but cannot communicate with each other.
between wireless stations in the BSS. When Intra-BSS traffic blocking is
Figure 41 Ba
sic Service set
6.10.5 MBSSID
Traditionally, you need to use different APs to configure different Basic Service Sets (BSSs). As well
as the cost of buying extra APs, there is also the possibility of channel interference. The Device’s
MBSSID (Multiple Basic Service Set IDentifier) function allows you to use one access point to provide
several BSSs simultaneously. You can then assign varying QoS priorities and/or security modes to
different SSIDs.
Wireless devices can use different BSSIDs to
6.10.5.1 Notes on Multiple BSSs
• A maximum of eight BSSs are allowed on one AP simultaneously.
• You must use different keys for different BSSs. If two wireless devices have different BSSIDs (they
e in different BSSs), but have the same keys, they may hear each other’s communications (but
ar
not communicate with each other).
• MBSSID should not replace but rather be used in
associate with the same AP.
conjunction with 802.1x security.
Chapter 6 Wireless75
Page 76
6.10.6 Wireless Distribution System (WDS)
WDS
AP 2
AP 1
A
The Device can act as a wireless network bridge and establish WDS (Wireless Distribution System)
links with other APs. You need to know the MAC addresses of the APs you want to link to. Once the
security settings of peer sides match one another, the connection between devices is made.
At the time of writing, WDS security is not compatible
access point’s documentation for details.
The following figure illustrates how WDS link works between APs. Notebook computer A is a
w
ireless client connecting to access point AP 1. AP 1 has no wired Internet connection, but it can
establish a WDS link with access point AP 2, which has a wired Internet connection. When AP 1 has
a WDS link with AP 2, the notebook computer can access the Internet through AP 2.
Figure 42 WDS L
ink Example
with all access points. Refer to your other
Chapter 6 Wireless76
Page 77
CHAPTER 7
WAN
LAN
Chapter 7
Home Networking
7.1 Overview
A Local Area Network (LAN) is a shared communication system to which many computers are
attached. A LAN is usually located in one immediate area such as a building or floor of a building.
The LAN screens can help you configure a LAN DHCP server and
manage IP addresses.
7
Chapter
7.1.1 What You Can Do in this Chapter
•Use the LAN Setup screen to set the LAN IP address, subnet mask, and DHCP settings (Section 7.2
on page 80).
•Use the Static DHCP s
based on their MAC Addresses (Section 7.3 on page 82).
•Use the IP Alias s
physical LAN network.
•Use the UPnP s
•Use the UPnP Rule scr
•Use the IPv6 LAN Se
Device’s LAN interface.
•Use the File Sharing sc
•Use the P
creen to enable UPnP (Section 7.5 on page 85).
rinter Server screen to enable the print server (Section 7.8 on page 95).
creen to assign IP addresses on the LAN to specific individual computers
creen (Section 7.4 on page 84) to configure another logical network in the
een to
tup screen (Section 7.6 on page 86) to configure the IPv6 settings on your
reen to enable file-sharing server (Section 7.7 on page 91).
7.1.2 What You Need To Know
The following terms and concepts may help as you read this chapter.
Chapter 7 Home Networking77
Page 78
7.1.2.1 About LAN
IP Address
Similar to the way houses on a street share a common street name, so too do computers on a LAN
share one common network number. This is known as an Internet Protocol address.
Subnet Mask
The subnet mask specifies the network number portion of an IP address. Your Device will compute
the subnet mask automatically based on the IP address that you entered. You don't need to change
the subnet mask computed by the Device unless you are instructed to do otherwise.
DHCP
DHCP (Dynamic Host Configuration Protocol) allows clients to obtain TCP/IP configuration at startup from a server. This Device has a built-in DHCP server capability that assigns IP addresses and
DNS servers to systems that support DHCP client capability.
DNS
DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa.
The DNS server is extremely important because without it, you must know the IP address of a
computer before you can access it. The DNS server addresses you enter when you set up DHCP are
passed to the client machines along with the assigned IP address and subnet mask.
7.1.2.2 About UPnP
How do I know if I'm using UPnP?
UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP
compatible device installed on your network will appear as a separate icon. Selecting the icon of a
UPnP device will allow you to access the information and properties of that device.
Cautions with UPnP
The automated nature of NAT traversal applications in establishing their own services and opening
firewall ports may present network security issues. Network information and configuration may
also be obtained and modified by users in some network environments.
When a UPnP device joins a network, it announces its presence with a multicast message. For
security reasons, the Device allows multicast messages on the LAN only.
All UPnP-enabled devices may communicate freely with each other without additional
configuration. Disable UPnP if this is not your intention.
UPnP and ZyXEL
ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum UPnP™
Implementers Corp. (UIC). ZyXEL's UPnP implementation supports Internet Gateway Device (IGD)
1.0.
Chapter 7 Home Networking78
Page 79
See Section 7.10 on page 98 for examples of installing and using UPnP.
7.1.2.3 About File Sharing
Workgroup name
This is the name given to a set of computers that are connected on a network and share resources
such as a printer or files. Windows automatically assigns the workgroup name when you set up a
network.
Shares
When settings are set to default, each USB device connected to the Device is given a folder, called a
“share”. If a USB hard drive connected to the Device has more than one partition, then each
partition will be allocated a share. You can also configure a “share” to be a sub-folder or file on the
USB device.
File Systems
A file system is a way of storing and organizing files on your hard drive and storage device. Often
different operating systems such as Windows or Linux have different file systems. The file sharing
feature on your Device supports FAT16, FAT32, NTFS, EXT2, and EXT3.
Common Internet File System
The Device uses Common Internet File System (CIFS) protocol for its file sharing functions. CIFS
compatible computers can access the USB file storage devices connected to the Device. CIFS
protocol is supported on Microsoft Windows, Linux Samba and other operating systems (refer to
your systems specifications for CIFS compatibility).
7.1.2.4 About Printer Server
Print Server
This is a computer or other device which manages one or more printers, and which sends print jobs
to each printer from the computer itself or other devices.
Operating System
An operating system (OS) is the interface which helps you manage a computer. Common examples
are Microsoft Windows, Mac OS or Linux.
TCP/IP
TCP/IP (Transmission Control Protocol/ Internet Protocol) is a set of communications protocols that
most of the Internet runs on.
Chapter 7 Home Networking79
Page 80
Port
A port maps a network service such as http to a
process run by your web browser. When traffic from the Internet is received on your computer, the
port number is used to identify which process running on your computer it is intended for.
Supported OSs
Your operating system must support TCP/IP ports for printing
9100) protocol.
The following OSs support Device’s printer sharing feature.
• Microsoft Windows 95, Windows 98 SE (Second Edition), Windows Me, Windows NT 4.0, Windows
2
000, Windows XP or Macintosh OS X.
7.2 The LAN Setup Screen
Click Network Setting > Home Networking to open the LAN Setup screen. Use this screen to set
the Local Area Network IP address and subnet mask of your Device and configure the DNS server
information that the Device sends to the DHCP client devices on the LAN.
Figure 43 Network Setting
> Home Networking > LAN Setup
process running on your computer, such as a
and be compatible with the RAW (port
Chapter 7 Home Networking80
Page 81
The following table describes the fields in this screen.
Table 25 Network Setting > Home Networking > LAN Setup
LABELDESCRIPTION
LAN IP Setup
IP AddressEnter the LAN IP address you want to assign to your Device in dotted decimal notation,
for example, 192.168.1.1 (factory default).
IP Subnet Mask Type the subnet mask of your network in dotted decimal notation, for example
255.255.255.0 (factory default). Your Device automatically computes the subnet mask
based on the IP address you enter, so do not change this field unless you are
instructed to do so.
RIP VersionRIP (Routing Information Protocol) allows a router to exchange routing information
with other routers. Select the RIP version from RIP-1 and RIP2-B/RIP2-M.
DirectionUse this field to control how much routing information the Device sends and receives
on the subnet. Select the RIP Direction from None, Both, IN Only and OUT Only.
MulticastIGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish
membership in a multicast group. The Device supports IGMP v1/IGMP v2/IGMP v3.
Select None to disable it.
IGMP SnoopingSelect Enabled to activate IGMP Snooping. This allows the Device to passively learn
memberships in multicast groups. Otherwise, select Disabled to deactivate it.
DHCP Server State
DHCPSelect Enable to have your Device assign IP addresses, an IP default gateway and DNS
servers to LAN computers and other devices that are DHCP clients.
If you select Disable, you need to manually configure the IP addresses of the
computers and other devices on your LAN.
When DHCP is used, the following fields need to be set.
IP Addressing Values
IP Pool Starting
Address
Pool SizeThis field specifies the size, or count of the IP address pool.
DNS Values
This field specifies the first of the contiguous addresses in the IP address pool.
Chapter 7 Home Networking81
Page 82
Table 25 Network Setting > Home Networking > LAN Setup (continued)
LABELDESCRIPTION
DNS Server 1-2The Device supports DNS proxy by default. The Device sends out its own LAN IP
address to the DHCP clients as the first DNS server address. DHCP clients use this first
DNS server to send domain-name queries to the Device. The Device sends a response
directly if it has a record of the domain-name to IP address mapping. If it does not, the
Device queries an outside DNS server and relays the response to the DHCP client.
Select From ISP if your ISP dynamically assigns DNS server information (and the
Device's WAN IP address).
Select DN
Device works as a DNS relay.
Select Us
IP address in the field to the right.
S Proxy to have the DHCP clients use the Device’s own LAN IP address. The
er-Defined if you have the IP address of a DNS server. Enter the DNS server's
Select No
ApplyClick Appl
CancelClick Can
ne to not configure extra DNS servers.
y to save your changes.
cel to restore your previously saved settings.
7.3 The Static DHCP Screen
This table allows you to assign IP addresses on the LAN to specific individual computers based on
their MAC Addresses.
Every Ethernet device has a unique MAC (Media Access
assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02.
7.3.1 Before You Begin
Find out the MAC addresses of your network devices if you intend to add them to the Static DHCP
screen.
Use this screen to change your Device’s static DHCP settings. Click NetworkNetworking> Static DHCP to open the following screen.
Control) address. The MAC address is
Setting > Home
Figure 44 Network Setting
> Home Networking > Static DHCP
Chapter 7 Home Networking82
Page 83
The following table describes the labels in this screen.
Table 26 Network
LABELDESCRIPTION
Add new static
lease
#This is the index number of the entry.
StatusThis field displays whether the client is connected to the Device.
Host NameThis field displays the client host name.
MAC AddressThe MAC (Media Access Control) or Ethernet addr
IP AddressThis field displays the IP address r
ReserveSelect the check box in the heading row to autom
ApplyClick Apply to save your changes.
Setting > Home Networking > Static DHCP
Click this to add a new static DHCP entry.
ess on a LAN (Local Area Network) is
unique to your computer (six pairs of hexadecimal notation).
A network interface card such as an Ethernet adapter has a hardwired address that is
assigned
other adapter has a similar address.
individual entry check boxes in each entry to have the Device always assign the
selected entries's IP addresses to the corresponding MAC addresses and host names.
You can select up to 128 entries in this table.
at the factory. This address follows an industry standard that ensures no
elative to the # field listed above.
atically select all check boxes or select
CancelClick Ca
RefreshClick Refr
ncel to restore your previously saved settings.
esh to reload the DHCP table.
If you click Add new static lease in the Static DHCP screen, the following screen displays.
Figure 45
Static DHCP: Add
Chapter 7 Home Networking83
Page 84
The following table describes the labels in this screen.
Table 27 Static DHCP: Add
LABELDESCRIPTION
MAC AddressEnter the MAC address of a computer on your LAN.
IP AddressEnter the IP address that you want to assign to the computer on your LAN with the MAC
addr
ess that you will also specify.
ApplyClick App
CancelClick Ca
ncel to exit this screen without saving.
7.4 The IP Alias Screen
IP alias allows you to partition a physical network into different logical networks over the same
Ethernet interface. The Device supports multiple logical LAN interfaces via its physical Ethernet
interface with the Device itself as the gateway for the LAN network.
When you use IP alias, you can also configure firew
network (subnet).
Use this screen to change your Device’s IP alias settings. Click NeNetworking > IP Alias to open the following screen.
Figure 46 Network Setting
ly to save your changes.
all rules to control access to the LAN's logical
twork Setting > Home
> Home Networking > IP Alias
The following table describes the labels in this screen.
Table 28 Network Setting > Home Networking > IP Alias
LABELDESCRIPTION
IP Alias Select Enabl
IP AddressEnter the IP address of your Device in dotted decimal notation.
Subnet
Ma
sk
Your Device will automatically calculate the subnet mask based on the IP address that you
assign. Unless you are implementing subnetting, use the subnet mask computed by the Device.
e to configure a LAN network for the Device.
Chapter 7 Home Networking84
Page 85
Table 28 Network Setting > Home Networking > IP Alias
LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
7.5 The UPnP Screen
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for
simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a
network, obtain an IP address, convey its capabilities and learn about other devices on the network.
In turn, a device can leave a network smoothly and automatically when it is no longer in use.
See page 98 for more information on UPnP.
Use the following screen to configure the UPnP settings on your Device. Click NeHome Networking> Static DHCP > UPnP to display the screen shown next.
Figure 47 Network Setting
> Home Networking > UPnP
The following table describes the labels in this screen.
Table 29 Network Settings > Home Networking > UPnP
LABELDESCRIPTION
UPnPSelect En
open the web configurator's login screen without entering the Device's IP address
(although you must still enter the password to access the web configurator).
ApplyClick App
CancelClick this to restore your previously saved settings.
able to activate UPnP. Be aware that anyone could use a UPnP application to
ly to save your changes.
twork Setting >
Chapter 7 Home Networking85
Page 86
7.6 The IPv6 LAN Setup Screen
Use this screen to configure the IPv6 settings for your Device’s LAN interface.
Chapter 7 Home Networking86
Page 87
Figure 48 Network Setting
> Home Networking > IPv6 LAN Setup
Chapter 7 Home Networking87
Page 88
The following table describes the labels in this screen.
Table 30 Network Setting > Home Networking > IPv6 LAN Setup
LABELDESCRIPTION
IPv6 LAN Setup
Link Local Address
Type
IPv6 AddressIf you selected Manual in the Link Local Address Type field, enter the LAN IPv6
PrefixEnter the address prefix to specify how many most significant bits in an IPv6 address
MLD SnoopingMulticast Listener Discovery (MLD) allows an IPv6 switch or router to discover the
Lan Global Identifier
Type
Lan IdentifierIf you selected Manual, enter the LAN Identifier in this field. The LAN identifier
Select Manual to manually enter a link local address. Select EUI64 to use the EUI-64
format to generate a link local address from the Ethernet MAC address.
address you want to assign to your Device in hexadecimal notation, for example,
fe80::1 (factory default).
compose the network address.
presence of MLD hosts who wish to receive multicast packets and the IP addresses of
multicast groups the hosts want to join on its network. Select Enabled to activate
MLD Snooping on the Device. This allows the Device to check MLD packets passing
through it and learn the multicast group membership. It helps reduce multicast
traffic.
Select Manual to manually enter a LAN Identifier as the interface ID to identify the
LAN interface. The LAN Identifier is appended to the IPv6 address prefix to create the
routable global IPv6 address. Select EUI64 to use the EUI-64 format to generate an
interface ID from the Ethernet MAC address.
should be unique and 64 bits in hexadecimal form. Every 16 bit block should be
separated by a colon as in XXXX:XXXX:XXXX:XXXX where X is a hexadecimal character.
Blocks of zeros can be represented with double colons as in XXXX:XXXX::XXXX.
IPv6 ULA Address
Type
IPv6 ULA AddressIf Manual is selected in the IPv6 ULA Address Type field, enter the IPv6 address
LAN IPv6 Address Setting
Delegate prefix
from WAN
StaticSelect this option to configure a fixed IPv6 address for the Device’s LAN IPv6 address.
Static IPv6 Address
Prefix
A unique local address (ULA) is a unique IPv6 address for use in private networks but
not routable in the global IPv6 Internet.
Select Auto Generate to have the Device automatically generate a globally unique
address for the LAN IPv6 address. Select Manual to enter a static IPv6 ULA address.
The address format is like fdxx:xxxx:xxxx:xxxx::/64.
prefix that the Device uses for the LAN IPv6 address.
Select this option to automatically obtain an IPv6 network prefix from the service
provider or an uplink router.
If you select static IPv6 address, enter the IPv6 address prefix that the Device uses for
the LAN IPv6 address.
Chapter 7 Home Networking88
Page 89
Table 30 Network Setting > Home Networking > IPv6 LAN Setup (continued)
LABELDESCRIPTION
Prefix lengthIf you select static IPv6 address, enter the IPv6 prefix length that the Device uses to
generate the LAN IPv6 address.
An IPv6 prefix length specifies how many most significant bits (starting from the left)
in the address compose the network address. This field displays the bit number of
the IPv6 subnet mask.
Preferred LifetimeEnter the preferred lifetime for the prefix.
Valid LifetimeEnter the valid lifetime for the prefix.
LAN IPv6 Address
Assign Setup
LAN IPv6 DNS
Assign Setup
DHCPv6
DHCPv6 ServerUse this field to Enable or Disable DHCPv6 server on the Device.
Select how you want to obtain an IPv6 address:
•Stateless: The Device uses IPv6 stateless autoconfiguration. RADVD (Router
Advertisement Daemon) is enabled to have the Device send IPv6 prefix
information in router advertisements periodically and in response to router
solicitations. DHCPv6 server is disabled.
•Stateful: The Device uses IPv6 stateful autoconfiguration. The DHCPv6 server is
enabled to have the Device act as a DHCPv6 server and pass IPv6 addresses to
DHCPv6 clients.
•Stateless and Stateful: The Device uses both IPv6 stateless and stateful
autoconfiguration. The LAN IPv6 clients can obtain IPv6 addresses either through
router advertisements or through DHCPv6.
Select how the Device provide DNS server and domain name information to the
clients:
•Stateless: The Device uses IPv6 stateless autoconfiguration. RADVD (Router
Advertisement Daemon) is enabled to have the Device send IPv6 prefix
information in router advertisements periodically and in response to router
solicitations. DHCPv6 server is disabled.
•Stateful: The Device uses IPv6 stateful autoconfiguration. The DHCPv6 server is
enabled to have the Device act as a DHCPv6 server and pass IPv6 addresses to
DHCPv6 clients.
•Stateless and Stateful: The Device uses both IPv6 stateless and stateful
autoconfiguration. The LAN IPv6 clients can obtain IPv6 addresses either through
router advertisements or through DHCPv6.
DNSv6 ModeSelect the DNS role (Proxy or Relay) that you want the Device to act in the IPv6 LAN
network. Alternatively, select Manual and specify the DNS servers’ IPv6 address in
the fields below.
Primary DNSThis field is available if you choose Manual as the DNSv6 mode. Enter the first DNS
server IPv6 address the Device passes to the DHCP clients.
Secondary DNSThis field is available if you choose Manual as the DNSv6 mode. Enter the second
DNS server IPv6 address the Device passes to the DHCP clients.
Information refresh
time
Enter the number of seconds a DHCPv6 client should wait before refreshing
information retrieved from DHCPv6.
Chapter 7 Home Networking89
Page 90
Table 30 Network Setting > Home Networking > IPv6 LAN Setup (continued)
LABELDESCRIPTION
DNS Query ModeSelect how the Device handles clients’ DNS information requests.
•IPv4 DNS Server First: The Device forwards the requests to the IPv4 DNS server
first and then the IPv6 DNS server. Then it sends clients the first DNS information
it receives.
•IPv6 DNS Server First: The Device forwards the requests to the IPv6 DNS server
first and then the IPv4 DNS server. Then it sends clients the first DNS information
it receives.
•IPv4 DNS Server Only: The Device forwards the requests to the IPv4 DNS server
and sends clients the DNS information it receives.
•IPv6 DNS Server Only: The Device forwards the requests to the IPv6 DNS server
and sends clients the DNS information it receives.
Advanced SetupClick this to open the IPv6 LAN Setup Advanced Setup section.
RADVD Setup
Send RA onSelect this to have the Device send router advertisement messages to the LAN hosts.
Router advertisement is a response to a router solicitation or a periodical multicast
advertisement from a router to advertise its presence and other parameters, such as
IPv6 prefix and DNS information.
Router solicitation is a request from a host to locate a router that can act as the
default router and forward packets.
Note: The LAN hosts neither generate global IPv6 addresses nor communicate with
other networks if you disable this feature.
Delegate M/O flag
from WAN
ManualSelect this to specify the M/O flag setting manually.
Managed config
flag on
Other config flag onSelect this to have the Device indicate to hosts to obtain DNS information through
Advertisement
interval option on
Hop limitEnter the maximum number of network segments that a packet can cross before
Select this to have the Device obtain the M/O (Managed/Other) flag setting from the
service provider or uplink router.
Select this to have the Device indicate to hosts to obtain network settings (such as
prefix and DNS settings) through DHCPv6.
Clear this to have the Device indicate to hosts that DHCPv6 is not available and they
should use the prefix in the router advertisement message.
DHCPv6.
Clear this to have the Device indicate to hosts that DNS information is not available in
this network.
Select this to have the Router Advertisement messages the Device sends specify the
allowed interval between Router Advertisement messages.
reaching the destination. When forwarding an IPv6 packet, IPv6 routers are required
to decrease the Hop Limit by 1 and to discard the IPv6 packet when the Hop Limit is
0. Possible value for this field are 0-255.
Router LifetimeEnter the time in seconds that hosts should consider the Device to be the default
router. Possible values for this field are 0-9000.
Chapter 7 Home Networking90
Page 91
Table 30 Network Setting > Home Networking > IPv6 LAN Setup (continued)
LABELDESCRIPTION
Router PreferenceSelect the router preference (Low, Medium or High) for the Device. The Device sends
this preference in the router advertisements to tell hosts what preference they
should use for the Device. This helps hosts to choose their default router especially
when there are multiple IPv6 router in the network.
Note: Make sure the hosts also support router preference to make this function
work.
Reachable Time
(ms)
Retrans Timer (ms)Enter the time in milliseconds between neighbor solicitation packet retransmissions.
RA IntervalEnter the time in seconds between router advertisement messages. Possible values
Delegate MTU from
WAN
ManualSelect this to specify the MTU manually.
MTUThe Maximum Transmission Unit. Type the maximum size of each IPv6 data packet,
DAD attemptsSpecify the number of DAD (Duplicate Address Detection) attempts before an IPv6
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
Advanced SetupClick this to close the IPv6 LAN Setup Advanced Setup section.
Enter the time in milliseconds that can elapse before a neighbor is detected. Possible
values for this field are 0-3600000.
Possible values for this field are 1000-4294967295.
for this field are 4-1800.
Select this to have the Device obtain the MTU setting from the service provider or
uplink router.
in bytes, that can move through this interface. If a larger packet arrives, the Device
divides it into smaller fragments.
address is assigned to the Device LAN interface. Possible values for this field are 1-7.
7.7 The File Sharing Screen
You can share files on a USB memory stick or hard drive connected to your Device with users on
your network.
Chapter 7 Home Networking91
Page 92
The following figure is an overview of the Device’s file server feature. Computers A and B can acc
A
B
C
files on a USB device (C) which is connected to the Device.
ess
Figure 49 File
Sharing Overview
The Device will not be able to join the workgroup if your local area network has restrictions
set up that do not allow devices to join a workgroup. In this case, contact your network
administrator.
7.7.1 Before You Begin
Make sure the Device is connected to your network and turned on.
1C
onnect the USB device to one of the Device’s USB ports. Make sure the Device is connected to your
network.
he Device detects the USB device and makes its contents available for browsing. If you are
2T
connecting a USB hard drive that comes with an external power supply, make sure it is connected to
an appropriate power source that is on.
If your USB device cannot be detected by the Device, see the troubleshooting for
suggestions.
Chapter 7 Home Networking92
Page 93
Use this screen to set up file sharing using the Device. To access this screen, click Network
> Home Networking > File Sharing.
Setting
Figure 50
Network Setting > Home Networking > File Sharing
Each field is described in the following table.
Table 31 Network Setting
LABELDESCRIPTION
Server Configuration
File Sharing
Se
rvices (SMB)
Share Directory
Access Le
Account Management
#This is the index number of the file sharing user account.
StatusThis shows whether or not the file sharing user account is activated.
User NameThis field displays the user name of the file sharing user account.
vel
Select Enable to activate file sharing through the Device.
Select Public to allow all LAN users to access the shared folders. Select Security to
allow only the users added and activated in the Account Management section below
to access the shared folders.
Use this screen to edit a file sharing user on the Device. Click the Edit icon next to a user account.
Figure 51 File
Sharing: Add/Edit
it icon to configure a file sharing user account’s settings.
to delete this user account from the list.
es.
ncel to restore your previously saved settings.
Each field is described in the following table.
Table 32 File Sharing
LABELDESCRIPTION
ActiveSelect this to activate the file sharing user account.
User NameType the user name for the account.
New PasswordType your new system password (up to 30 char
Retype New
Pa
ssword
ApplyClick Ap
CancelClick Ca
: Add/Edit
acters). Note that as you type a
password, the screen displays a (*) for each character you type. After you change the
password, use the new password to access the Device.
Type the new password again for confirmation.
ply to save your changes.
ncel to exit this screen without saving.
Chapter 7 Home Networking94
Page 95
7.8 The Printer Server Screen
The Device allows you to share a USB printer on your LAN. You can do this by connecting a USB
printer to one of the USB ports on the Device and then configuring a TCP/IP port on the computers
connected to your network.
Figure 52
Sharing a USB Printer
7.8.1 Before You Begin
To configure the print server you need the following:
• Your Device must be connected to your computer and
USB printer must be connected to your Device.
• A USB printer with the driver already installed on your computer.
• The computers on your network must have the pri
create a TCP/IP port for printing via the network. Follow your printer manufacturers instructions
on how to install the printer software on your computer.
any other devices on your network. The
nter software already installed before they can
Your printer’s installation instructions may ask that you connect the printer to your
computer. Connect your printer to the Device instead.
Use this screen to enable or disable sharing of a USB printer via your Device.
To access this screen, click Network Setting
Figure 53 Network Setting
Chapter 7 Home Networking95
> Home Networking > Printer Server
> Home Networking > Printer Server.
Page 96
The following table describes the labels in this menu.
WAN
LAN
Table 33 Network Setting > Home Networking > Print Server
LABELDESCRIPTION
Active Printer Server Select this to have the Device share a USB printer.
ApplyClick Appl
CancelClick Can
y to save your changes.
cel to restore your previously saved settings.
7.9 Technical Reference
This section provides some technical background information about the topics covered in this
chapter.
LANs, WANs and the Device
The actual physical connection determines whether the Device ports are LAN or WAN ports. There
e two separate IP networks, one inside the LAN network and the other outside the WAN network
ar
as shown next.
Figure 54 LA
N and WAN IP Addresses
DHCP Setup
DHCP (Dynamic Host Configuration Protocol, RFC 213
obtain TCP/IP configuration at start-up from a server. You can configure the Device as a DHCP server
or disable it. When configured as a server, the Device provides the TCP/IP configuration for the
clients. If you turn DHCP service off, you must have another DHCP server on your LAN, or else the
computer must be manually configured.
1 and RFC 2132) allows individual clients to
Chapter 7 Home Networking96
Page 97
IP Pool Setup
The Device is pre-configured with a pool of IP addresses for the DHCP clients (DHCP Pool). See the
product specifications in the appendices. Do not assign static IP addresses from the DHCP pool to
your LAN computers.
LAN TCP/IP
The Device has built-in DHCP server capability that assigns IP addresses and DNS servers to systems
that support DHCP client capability.
IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a LAN
share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or your
network administrator assigns you a block of registered IP addresses, follow their instructions in
selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single user
account and the ISP will assign you a dynamic IP address when the connection is established. If this
is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0
and you must enable the Network Address Translation (NAT) feature of the Device. The Internet
Assigned Number Authority (IANA) reserved this block of addresses specifically for private use;
please do not use any other number unless you are told otherwise. Let's say you select 192.168.1.0
as the network number; which covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254
(zero and 255 are reserved). In other words, the first three numbers specify the network number
while the last number identifies an individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember, for
instance, 192.168.1.1, for your Device, but make sure that no other device on your network is using
that IP address.
The subnet mask specifies the network number portion of an IP address. Your Device will compute
the subnet mask automatically based on the IP address that you entered. You don't need to change
the subnet mask computed by the Device unless you are instructed to do otherwise.
Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are isolated from the
Internet, for example, only between your two branch offices, you can assign any IP addresses to the
hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved
the following three blocks of IP addresses specifically for private networks:
• 10.0.0.0 — 10.255.255.255
• 172.16.0.0 — 172.31.255.255
• 192.168.0.0 — 192.168.255.255
Chapter 7 Home Networking97
Page 98
You can obtain your IP address from the IANA, from an ISP
network. If you belong to a small organization and your Internet access is through an ISP, the ISP can
provide you with the Internet addresses for your local networks. On the other hand, if you are part
of a much larger organization, you should consult your network administrator for the appropriate IP
addresses.
or it can be assigned from a private
Regardless of your particular situation, do not create an arbitrary IP address; always
follow the guidelines above. For more information on address assignment, please refer to
RFC 1597, “Address Allocation for Private Internets” and RFC 1466, “Guidelines for
Management of IP Address Space”.
7.10 Installing UPnP in Windows Example
This section shows how to install UPnP in Windows Me and Windows XP.
Installing UPnP in Windows Me
Follow the steps below to install the UPnP in Windows Me.
1C
lick Start and Control Panel. Double-click Add/Remove Programs.
lick the Windows Setup tab and select Communication in the Components selection box. Click
2C
Details.
Figure 55 Add/Remo
ve Programs: Windows Setup: Communication
Chapter 7 Home Networking98
Page 99
3In t
he Communications window, select the Universal Plug and Play check box in the
Components selection box.
Figure 56 Add/Remo
4Click OK to go back to the Add/Remove Programs Properties window and click Next.
ve Programs: Windows Setup: Communication: Components
start the computer when prompted.
5Re
Installing UPnP in Windows XP
Follow the steps below to install the UPnP in Windows XP.
1C
lick Start and Control Panel.
2Dou
3In t
ble-click Network Connections.
he Network Connections window, click Advanced in the main menu and select Optional
Networking Components ….
Figure 57 Network Connections
Chapter 7 Home Networking99
Page 100
e Windows Optional Networking Components Wizard window displays. Select Networking
4Th
Service in the Components selection box and click Details.
Figure 58 W
indows Optional Networking Components Wizard
Chapter 7 Home Networking100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.