background image

 

FCC Part 68 

This equipment complies with Part 68 of the FCC Rules. On the bottom of this equipment is a label that contains 

the FCC Registration Number and Ringer Equivalence Number (REN) for this equipment. You must provide this 

information to the telephone company upon request. 

 

The REN is useful to determine the quantity of devices you may connect to the telephone line and still have those 

entire devices ring when your number is called. In most, but not all areas, the sum of the REN of all devices 

connected to one line should not exceed five (5.0). To be certain of the number of devices you may connect to 

your line, as determined by the REN, you should contact your local telephone company to determine the 

maximum REN for your calling area. 

 

If the modem causes harm to the telephone network, the telephone company may discontinue your service 

temporarily.  

If possible, they will notify you in advance. But if advance notice isn't practical, you will be notified as soon as 

possible.  

You will be advised of your right to file a complaint with the FCC. 

 

The telephone company may make changes in its facilities, equipment, operations, or procedures that could 

affect the proper operation of your equipment. If they do, you will be notified in advance to give you an opportunity 

to maintain uninterrupted telephone service. 

 

If you experience trouble with this modem, please contact your dealer for repair/warranty information. The 

telephone company may ask you to disconnect this equipment from the network until the problem has been 

corrected or you are sure that the equipment is not malfunctioning. 

 

This equipment may not be used on coin service provided by the telephone company. Connection to party lines is 

subject to state tariffs. 

Summary of Contents for 11n Wireless Router

Page 1: ...User s Manual Wireless 11n Router...

Page 2: ...3 Configuring with Web Browser 9 3 3 1 WAN Setting 11 3 3 2 LAN Setting 13 3 3 3 DHCP Setting 14 3 3 4 Static Route Setting 15 3 3 5 NAT Setting 16 3 3 6 Packet Filter Setting 18 3 3 7 URL Filter Sett...

Page 3: ...ime 38 3 6 4 Ping Test 40 3 6 5 Config Setting 41 3 6 6 Provisioning 42 3 7 1 Logout 43 3 7 2 Reboot 44 3 8 1 TCP IP Settings for Windows Operating System 45 Appendix A Glossary 52 Appendix B Cabling...

Page 4: ...s harm to the telephone network the telephone company may discontinue your service temporarily If possible they will notify you in advance But if advance notice isn t practical you will be notified as...

Page 5: ...t shielded interface cables be used with your modem If interference does occur we suggest the following measures be taken to rectify the problem 1 Move the receiving antenna 2 Move the modem away from...

Page 6: ...u will have to set some values within the Router and also configure your networked PCs to accept the IP Addresses the Router chooses to assign them And generally there are three different operating mo...

Page 7: ...I WAN and LAN side connection statistics Advanced QoS Password protected access Wireless LAN System log 1 3 System Requirements 1 Personal computer PC 2 Pentium II 233 MHz processor minimum 3 32 MB RA...

Page 8: ...ox carefully to ensure that the contents include the items you ordered If any of the items are missing or damaged contact your local distributor The contents of your carton may vary depending on your...

Page 9: ...ON Link Flashing TX or RX activity LAN 1 4 OFF No Link These four LAN Local Area Network ports are where you will connect networked devices such as PCs print servers remote hard drives and anything e...

Page 10: ...ecause the Router acts as a DHCP server you will have to set some values within the Router and also configure your networked PCs to accept the IP Addresses the Router chooses to assign them Generally...

Page 11: ...10 At the Password prompt the User name is admin and the password is admin You can change these later if you wish Click Login to login...

Page 12: ...s The following sections will explain more details of WAN Port Internet access and broadband access setup When you click WAN Setting the following setup page will be shown Three methods are available...

Page 13: ...oE Point to Point Protocol over Ethernet PPPoE Some ISPs provide DSL based services and use PPPoE to establish communication link with end users If you are connected to the Internet through a DSL line...

Page 14: ...d cannot be seen on the Internet The default IP address is 192 168 6 1 with a subnet mask of 255 255 255 0 LAN is a network of computers or other devices that are in relatively close range of each oth...

Page 15: ...er Assigned DHCP IP Address Enter the starting IP address for the DHCP server s IP assignment and the ending IP address for the DHCP server s IP assignment DHCP IP Lease Time Assign the length of time...

Page 16: ...nable Enable Disable the static route Type Indicates the type of route as follows Host for local connection and Net for network connection Target Defines the base IP address Network Number that will b...

Page 17: ...o s Layer 2 Forwarding L2F and Microsoft s Point to Point Tunneling Protocol PPTP L2TP is an extension to the Point to Point Protocol PPP which is an important component for VPNs VPNs allow users and...

Page 18: ...ions have difficulties working through NAT Network Address Translation If you need to run applications that require multiple connections specify the port normally associated with an application in the...

Page 19: ...l be denied to access If no port is specified all ports will be denied access Protocol This is the protocol type that will be used with the Port that will be blocked Block You can block the IP address...

Page 20: ...ll be performed Action Add a new LAN packet filter or update a specified LAN packet filter MAC Packet Filter Use MAC Filters to deny computers within the local area network from accessing the Internet...

Page 21: ...or partial matched with a keyword For example if you add URL Filter String with keyword sex the ATA device will limit local hosts to access the web site or web pages such as www sex com or www fronth...

Page 22: ...21 3 3 8 Security Setting Intrusion Detection Enable Disable the intrusion detection...

Page 23: ...on TCP IP and intended to allow terminals to be networked without the need for configuration In the Barricade router for example the correct ports are automatically opened for applications like Net m...

Page 24: ...update your DDNS server every time it receives a different IP address Enable Enable Disable the DDNS service default setting is Disable DDNS Server Type The device support two types of DDNS DynDns org...

Page 25: ...efault is 1 Voice VLAN ID The voice VLAN ID Default is 3 Data VLAN Priority The priority value for data packet Default is 0 Data VLAN ID The data VLAN ID Default is 4 SIP TOS DiffServ This option enab...

Page 26: ...you re looking for products in stores or on the Internet you might notice that you can choose equipment that supports five different wireless networking technologies 802 11b g n Mixed 802 11b g Mixed...

Page 27: ...eds that allowed by the network medium The Fragmentation Threshold defines the number of bytes used for the fragmentation boundary for directed messages Tx Power TX Power measurement Default is 100 b...

Page 28: ...hroughput packets for MIMO OFDM systems So the burst structure should be decodable to legacy systems and should provide better performance to MIMO systems Green field mode operation This mode is simil...

Page 29: ...y4 Enter the key value depending on selected ASCII or Hexadecimal WPA WPA2 Wi Fi Protected Access WPA and WPA2 is a class of systems to secure wireless computer networks WPA is designed to work with a...

Page 30: ...ng a message with the flag set in its message header and the other of the mobile node and the authentication agent responding with the flags set in its message header only if it supports the pre authe...

Page 31: ...nect to WDS devices in its vicinity When the Authentication Mode is set as Open Shared or WEP auto WEP is the only WDS encryption type When the Authentication Mode is set as WPA Personal or WPA2 Perso...

Page 32: ...at only authorized NIC s can connect to the network While MAC address spoofing is a proven means to hacking a network this can be used in conjunction with additional security measures to increase the...

Page 33: ...our WAN setting Static IP DHCP or PPPoE If your WAN connection is set up for Dynamic IP address there will be a Release button and Renew button Use Release to disconnect from your ISP and use Renew to...

Page 34: ...ion can be an IP address or a class based subnetted or supernetted network ID Gateway The IP address to which the packet is forwarded Netmask Includes directly attached subnets indirect subnets that a...

Page 35: ...eeps statistic of the data traffic that it handles You are able to view the amount of Receive and Sent packets that passes through the device on both the WAN port and the LAN ports The traffic counter...

Page 36: ...35 3 5 4 System Log The log file keeps a running log of events and activities occurring on the device The log always displays recent logs When the device is rebooted the logs would not be cleared...

Page 37: ...r a to z digit number 0 to 9 and an underscore sign _ The administrator name is case sensitive Note the blank character is an illegal character Administrator Password Assign the administrator password...

Page 38: ...3 6 2 System Log Setting The log file keeps a running log of events and activities occurring on the device The log always displays recent logs When the device is rebooted the logs would not be cleare...

Page 39: ...ne from the pull down menu Daylight Saving Daylight Saving Time begins for most of the United States at 2 00 a m on the first Sunday of April Time reverts to standard time at 2 00 a m on the last Sund...

Page 40: ...39 NTP Server 2 Assign the domain name of the NTP Server 2...

Page 41: ...computer is on the Internet It sends ping packets and listens for replies from the specific host Enter in a host name or the IP address that you want to ping Packet Internet Groper and click Ping Exam...

Page 42: ...41 3 6 5 Config Setting Save the current setting or restore a backup setting here User can also reset the device to factory default here...

Page 43: ...ware will not change any of your system settings but it is recommended that you save your system settings before doing a firmware upgrade There are two ways to update firmware Upload the firmware to s...

Page 44: ...43 3 7 1 Logout If you need to logout administrator right for web access please click the Logout link The web system management interface will auto logout with 1800 sec default value...

Page 45: ...44 3 7 2 Reboot If for any reason the device is not responding correctly you may want to reboot the system...

Page 46: ...he window as shown then click OK The IP Configuration window will appear displaying your Ethernet Adapter Information Select your adapter from the drop down menu If you do not see your adapter in the...

Page 47: ...ck OK From the Command Prompt enter ipconfig It will return your IP Address subnet mask and default router Type exit to close the command prompt Make sure you take note of your computer s Default Rout...

Page 48: ...lick on the Network Neighborhood icon Win ME My Network Places and select Properties Highlight TCP IP and click the Properties button If you have more than 1 adapter then there will be a TCP IP Bindin...

Page 49: ...ss on your router Example If the router s LAN IP Address is 192 168 0 1 make your IP Address 192 168 0 X where X is between 2 99 Make sure that the number you choose is not in use on the network Click...

Page 50: ...ype in a Host can be any word Under DNS server search order enter the LAN IP Address of your router 192 168 0 1 Click Add Click OK twice When prompted to reboot your computer click Yes After you reboo...

Page 51: ...Address in Windows 2000 Right click on My Network Places and select Properties Right click on the Local Area Connection which represents your network card and select Properties Highlight Internet Pro...

Page 52: ...dress of your router 192 168 0 1 The Secondary DNS is not needed or enter a DNS server from your ISP Click OK twice You may be asked if you want to reboot your computer Click Yes 5 How can I assign a...

Page 53: ...G American Wire Gauge The measurement of thickness of a wire Bridge A device connects two or more physical networks and forwards packets between them Bridges can usually be made to filter packets that...

Page 54: ...tically assigned to a client station computer printer etc in a TCP IP network Dynamic IP addresses are typically assigned by a DHCP server which can be a computer on the network or another piece of ha...

Page 55: ...numbers to user organizations accessing the Internet These addresses are established by the United States Department of Defense s Network Information Center Duplicate addresses can cause major problem...

Page 56: ...ation host POTS Plain Old Telephone Service This is the term used to describe basic telephone service PPP Point to Point Protocol The successor to SLIP PPP provides router to router and host to networ...

Page 57: ...nt Protocol The network management protocol of choice for TCP IP based Internet SOCKET 1 The Berkeley UNIX mechanism for creating a virtual connection between processes 2 IBM term for software interfa...

Page 58: ...is often used to boot diskless workstations and other network devices such as routers over a network typically a LAN Telnet The virtual terminal protocol in the Internet suite of protocols Allows use...

Page 59: ...via the most appropriate route The sending and receiving devices do not have to be aware of the options and the route is chosen only when a message is sent There is no pre arrangement so each virtual...

Page 60: ...ly used type of network cable today Cat 5 cables are tipped with RJ 45 connectors which fit into RJ 45 port Straight through vs Crossover Cables LAN Connection To check LEDs light up when you finish c...

Reviews: