referred to as APIPA ) to assign itself an IP-address in the
address-range 169.254.x.x with Subnet- mask
255.255.0.0. The double x is calculated by the MAC
address of LAN port.
4.4.2 WAN Type Settings
WAN Type: select the WAN connection type of your ISP. You can click the
“Change” button to choose different settings:
17
1. Static IP Address
WAN IP Address, Subnet Mask, Gateway, Primary and Secondary DNS:
enter the settings provided by your ISP.
Clone MAC address: If your ISP requires a specific MAC address to
connect to the service, you can enter a specific MAC address or clone the
current computer’s MAC address through this link.
2. Dynamic IP Address
a) Host Name: optional. Required by some ISPs, for example, @Home.
b)
Renew IP Forever: this feature enables the AP to renew your IP
Address automatically when the lease time expires -- even when the
system is idle.
3. PPP over Ethernet
a) PPPoE Username and Password: the Username and password that
your ISP assigned to you. For security, this field appears blank. If you
don't want to change the password, leave it empty.
b) PPPoE Service Name: optional. Input the service name if your ISP
requires it. Otherwise, leave it blank.
c) IP Address: optional. The IP address your ISP assigned to you. Set it to
zero to disable this feature.
4. PPTP
a) PPTP Account and Password: the account and password that your ISP
assigned to you. If you don't want to change the password, leave the
field empty.
b) My IP Address and My Subnet Mask: the private IP Address and subnet
mask that your ISP assigned to you.
c) Server IP Address: the IP Address of the PPTP server.
4.4.3 DHCP Server Settings
DHCP Server:
The settings of a TCP/IP environment include host IP, Subnet Mask, Gateway,
18
and DNS configurations. It is not easy to manually configure all the computers
and devices in your network. Fortunately, DHCP Server provides a rather
simple approach to handle all these settings. This product supports the function
of DHCP server. If you enable the DHCP server and configure your computers
as “automatic IP allocation” mode, then when your computer is powered on, it
will automatically load the proper TCP/IP settings from the AP. The DHCP
server settings include the following items and can be “Disabled” or “Enabled”.
4.4.4 WLAN Settings
Your wireless settings will have influence on the coverage and the performance
of your wireless LAN. The wireless settings allow you to set the following
configuration items:
1. Regulatory Domain: This is the organization that certifies the Router for
use in your country. It determines which radio channels can be used to
transmit and receive signals.
2. IAPP: Optional. The draft Inter Router Protocol implies that registration and
address information is determined by communicating with an external IAPP-
aware RADIUS server.
3. Wireless Network name (SSID): Network ID is used for identifying the
Wireless LAN (WLAN). Client stations can roam freely using this product
and other Routers that have the same Network ID. (The factory setting is
“CONNECT2AIR”)
4. Band: Operate the Router at three different scenarios, high rate, low rate
and a mix of both under 2.4GHz ISM band.
B/G Mixed Mode: A mixed network in which high rate and low rate
devices share the same wireless medium takes the vantage of
complete backward compatibility with 802.11g devices. This is quite
essential for those applications that significant bases of legacy 11g
equipments have been installed and hunt out a smooth migration path
to higher date rates for users.
Note: Due to the fact that dramatic reductions in throughput will be
caused by simply joining legacy 802.11g clients into the 802.11g
network, a new, powerful and flexible technology is placed additionally
to bring protection and performance enhancement. Please kindly refer
to the Turbo mode for detail. Enable Turbo function when select mixed
19
mode for your network environment is strongly recommendated.
G only Mode: Come up with a pure high speed 11g network. All
802.11g clients are initiated and operating at high rate.
B only Mode: The similar situation as G only mode, except it will create
a pure low rate wireless network. All clients are all operates at low rate
that legacy 802.11g network introduced..
5. Radio Channel: The radio channel number. The permissible channels
range from Channel 1 to 11 (default is 13). For restrictions please refer to
the first page of this manual.
6. Turbo mode / NitroTM mode: A technology delivers throughput
enhancement in both mixed and g-only networks. By introducing Intersil’s
packet bursting technology, administrator can easily enrich network
performance and stability in higher speed.
4.4.5 WLAN Security Settings
To protect your intellectual property, secure your wireless connection! This
Router is equipped with a sophisticated security algorithm to protect intruders
from entering your system or listening to what you are transferring on your
network. It is called WPA (Wi-Fi Protected Access). Also provided with a legacy
WEP (Wired Equivalent Privacy) and standardwise authentication enhancement
(802.1x). In the meantime, you may want to experiment with the security we
provided to understand its benefits and implications.
Below is a chart that the operations of Router in different security level were
displayed.
Security WEP 802.1x WPA-PSK WPA-EAP RADIUS
None
Low
Middle1
Middle2
N/A N/A N/A N/A N/A
Yes N/A N/A N/A N/A
Yes Yes N/A N/A Yes
N/A Yes
N/A N/A Yes
(Dynamic WEP)
High1
High2
N/A N/A Yes N/A N/A
N/A N/A N/A Yes Yes
In most cases, security level will be revealed as
20
High2>high1>Middle2>Middle1>Low>None.
1. Wired Equivalent Privacy (WEP) Settings
WEP (128 or 64-bit) is used here.
WEP Key 1, 2, 3 & 4: When you enable the 128 or 64 bit WEP algorithm,
please select one WEP key to be used. If you are using a 128 bit key, you have
to enter a 26 digit hexadecimal key (0, 1, 2…8, 9, A, B…F) into the appropriate
field:
Example 128 bit: FEDCBA01234567890123456789 26 digits
Example 64 bit: FEDCBA0123 10 digits
Pass-phase generator: Since hexadecimal characters are not easily
memorable, this device offers a conversion utility from a simple word into the
hexadecimal code. Enter your Passphrase and press “Generate”. You can now
copy the hexadecimal entries in the WEP Key fields, if your wireless Clients do
not support the “Passphrase generator”.
2. RADIUS / Requires RADIUS
The RADIUS (Remote Authentication Dial-In User Service) plays a key role in
serving as a center in the network to provide the capabilities of authenticating,
authorizing, accounting, auditing and alarming…etc and allows an organization
to maintain user profiles in a central database that all remote servers can share.
Since RADIUS needs a relatively complex explanation, here we will focus on
how it acts as an 802.1x-Authentication Server (EAP-aware RADIUS) and
assist coming up with a security enhancement.
Te RADIUS performs the authentication function necessary to check the
credentials of the Users and intermediate Routers, and indicates whether the
Users are authorized to access the Routers. Therefore, setting a RADIUS
becomes the first step for building up an 802.1x-capable environment. Even
more, it is also a must-do to accommodate the latest introduced Wi-Fi protected
access (WPA-EAP) to wireless network.
Setting up RADIUS information in your Router is quite simple, just to input the
21
associated IP address of RADIUS and port number, which usually set in 1812,
and the secret key which is identified with the given key in RADIUS.
After finish adding RADIUS information, return to the page of Wireless Security
Settings, you will be allowed to do further configuration of 802.1x as the picture
shows up. Hereby you can choose to have either 802.1x with static WEP, with
dynamic WEP and WPA-EAP to even more secure your wireless network.
3. 802.1x Security
22
IEEE 802.1x is a standard for network access control (port based), especially
introduced for a distribution of encryption keys in a wireless network. The
Router supports 802.1x will keep out unauthorized users and perform
verification of credentials with RADIUS to allow authorized users to access the
network and services. To use 802.1x, you will need at least one common
Extensible Authentication Protocol (EAP) method on your authentication server,
APs (authenticator) and stations (Supplicant). Also, 802.1x is used to perform
generation and distribution of encryption keys from AP to the station as part of,
or after the authentication process, the whole story is also aware by Dynamic
WEP, which is based on legacy RC4 WEP encryption and available in this
Router under the setting, which enable 802.1x security by coming with
disabled Wired Equivalent Privacy (WEP) Settings, there are two options for
key length, 40 and 104bits. Longer the key length is, the more secure it will
bring to.
4. Wi-Fi Protected Access (WPA)
A standard with highest level of security currently wireless network can achieve.
Wi-Fi Protected Access is a subset of security specification and has been
introduced as intermediate result that solves most known security weakness
related to plain WEP. Enterprises that already have RADIUS authentication in
place can use WPA with 802.1x (WPA-EAP). Small business and home wireless
LAN can use WPA without 802.1x (WPA-PSK).
WPA-PSK:
Instead of using RADIUS for authentication, systems with WPA-PSK will be
configured with secret passphrases. Enter your passphrases and press
“Generate”. You can now create a pre-shared key in Router and copy the
23
characters you input to stations’ WPA-PSK entry.
WPA-EAP:
Working with RADIUS, systems with WPA-EAP will be employed with an new
encryption method called Temporal Key Integrity Protocol (TKIP)
implementation with 802.1x dynamic
24
4.4.6 WDS Settings
Peer AP's for Wireless Distribution System (WDS): Normally, Routers are linked
to each other via cables. With WDS, you can link Routers via a wireless link
instead. This way you can extend the range of your network without having to
use cables to link the Routers.
When you click Add, you can enter the MAC address of an Router to link to.
You also need to enter the peer MAC address in the other Router.
You can use up to eight Routers in a WDS.
25
FCC Caution
1. The device complies with Part 15 of the FCC rules. Operation is subject to
the following two conditions:
(1)This device may not cause harmful interference.
(2)This device must accept any interference received,
including interference that may cause undesired operation.
2. FCC RF Radiation Exposure Statemen t: The equipment complies with
FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a
minimum distance of 20 centimeters between the radiator and your body.
3. This Transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
4. Changes or modifications to this unit not expressly approved by the party
responsible for compliance could void the user authority to operate the
equipment.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.