background image

Version 1.0

Page 22

Alpha

 Secure Wireless Router 8800

GIGABIT

 

This screen will only appear if you selected 
BETTER security

This screen will only appear if you selected 
GOOD security

This screen will only appear if you selected 

 security

NONE

Summary of Contents for Gigabit 8800

Page 1: ...Us er M an ua l...

Page 2: ...2 WAN 23 7 3 LAN 28 31 7 4 DHCP 29 7 5 Wireless 8 ADVANCED 36 8 1 Virtual Server 36 8 2 Special Applications 37 8 3 Gaming 39 8 4 StreamEngine Networking Optimization 40 8 5 Routing 41 8 6 Access Con...

Page 3: ...nfo 59 10 2 Wireless 61 10 3 Routing 61 10 4 Print Serve Status 62 10 5 Logs 62 10 6 Statistics 63 10 7 LAN Port Status 64 10 8 Active Sessions 64 10 9 Switch Forwarding 65 11 GLOSSARY 66 12 TECHNICAL...

Page 4: ...edies 79 13 11 Notice of Change of Terms and Conditions 79 13 12 Replacement Components and Specifications 79 14 IMPORTANT NOTICES 80 14 1 FCC Statement 80 14 2 FCC Caution 80 14 3 FCC Radiation Expos...

Page 5: ...uty uptime The only time it requires you to take it offline is briefly during setup and occasionally to upgrade the firmware program inside the router As an added security measure you can instantly is...

Page 6: ...de 5 CD ROM with Manual 6 Vertical Stands Note Please contact your reseller if any of the above items are missing Important Using a power supply other than that included with your router will result i...

Page 7: ...mum requirements 1 25 Ghz processor 256MB Memory CD ROM Drive Ethernet Adapter 10 100 1000 with TCP IP Protocol Installed Windows XP 2000 Vista ME or Mac OS X v10 3 v10 2 v10 1or Linux Internet Explor...

Page 8: ...anagement Static and Dynamic DHCP WAN Mode Supports Virtual Server Access Built in DHCP Server Dynamic DNS and Port Forwarding StreamEngine Technology for Packet prioritization of Real Time Applicatio...

Page 9: ...k Time Protocol WAN Mode Static DHCP PPPoE PPTP L2TP and Bigpond Other Protocols Support RIP IGMP and DNS Relay Application Level Gateway Configuration for MSN FTP NetMeeting IPSec VPN MMS SIP Wake On...

Page 10: ...when connecting to Ethernet enabled computers for both WAN and LAN 3 The Auto MDI MDIX WAN port is the connection for the Ethernet cable to the Cable or DSL modem 4 Pressing the Reset Button will rest...

Page 11: ...ion to the power supply 1 WAN LED A solid light indicates connection on the WAN port When data is being transmitted this LED will flash 1 WLAN LED When there is activity on the wireless network this L...

Page 12: ...browser Type http 192 168 0 1 in the address window and press Enter The Login screen will appear Select a User Name By default there is no password Simply leave this window blank Click Log In to proc...

Page 13: ...7 SETUP 7 1 Quick Start The Wizard screen contains two wizards Internet Connection Setup Wireless Setup Version 1 0 Page 13 Alpha Secure Wireless Router 8800 GIGABIT...

Page 14: ...ase make sure you have correctly followed all of the steps outlined in the Quick Installation Guide included in the package SETTING UP THE ROUTER Click the Launch Internet Connection Setup Wizard Now...

Page 15: ...ur ISP is not listed in the menu or you do not know who your ISP is simply select Not Listed or Don t Know from the menu If you require details please contact your Internet Service Provider If you sel...

Page 16: ...system connected to your broadband modem simply select Clone your PC s MAC Address and the MAC Address will automatically appear Enter a Host Name If your ISP requires one To continue click Next Step...

Page 17: ...sername Your Password To verify your Password Re enter it below To continue click Next At the Set Username and Password Connection L2TP screen enter L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Ad...

Page 18: ...er IP address Subnet Mask Gateway Address Primary and Secondary DNS Addresses To continue click Next Setup Complete Click Connect This will save your settings and reboot the router Version 1 0 Page 18...

Page 19: ...using this Setup Wizard may require you to change some settings on your wireless client adapters so they can still connect to the Alpha Route Wireless Setup Click Launch Wireless Security Setup Wizard...

Page 20: ...rk Do not choose the default name for security reasons To continue click Next Step 2 Secure Your Wireless Network Choose a security option to protect your network from unauthorized users To continue c...

Page 21: ...o continue click Next Setup Complete The setup Page will give you a detailed summary of the settings based on what you have selected in the previous steps Click Save to continue This screen will only...

Page 22: ...Alpha Secure Wireless Router 8800 GIGABIT This screen will only appear if you selected BETTER security This screen will only appear if you selected GOOD security This screen will only appear if you se...

Page 23: ...of 6 modes of connection for the router If you are unsure of your connection settings contact your Internet Service Provider ISP Static WAN Mode Enter the IP Address from your router configuration se...

Page 24: ...er it below Enter a Service Name If your ISP requires it Reconnect Mode Always on The Internet connection is always maintained On Demand The Internet connection is made when the user chooses to log on...

Page 25: ...vided by your ISP Enter the PPTP Server IP Address you are connecting to also provided by your ISP Enter the Username and Password you use to gain access to the Internet To verify your Password re ent...

Page 26: ...Address provided by your ISP The L2TP Server IP Address provided by your ISP Enter the Username and Password you use to gain access to the Internet To verify your Password re enter it below Select the...

Page 27: ...rnet connection values are 1500 bytes and 1492 bytes for a PPPoE connection The Router will use the default value assigned in the MTU window WAN Port Speed is set to Auto by default You can select the...

Page 28: ...settings are based on the address assigned here Subnet Mask Use the of your router on the local area network RIP Announcement is used with multiple routers to broadcast routing information Gateway Met...

Page 29: ...es available for the Router to assign to your internal network Note If you have any devices using static IP addresses be sure the addresses do not fall within the range defined in the DHCP IP Address...

Page 30: ...atic DHCP you will need to Copy the PC s MAC Address again because every Ethernet adapter has a unique MAC address The same goes for any network device If you replace a network device such as a print...

Page 31: ...e Visible or Invisible When this option is set to Visible your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to yo...

Page 32: ...not backwards compatible with non Turbo legacy devices Static turbo enabled mode is always on and is only enabled when all devices on the wireless network are Super G with Static Turbo enabled Super G...

Page 33: ...Key when WEP is enabled You may also enter any text string into a WEP key box in which case it will be converted into a hexadecimal key using the ASCII values of the characters A maximum of 5 text ch...

Page 34: ...haracters in ASCII format at both ends of the wireless connection The pass phrase cannot be shorter than 8 characters Group Key Update Interval secures the data communication TKIP Temporal Key Integri...

Page 35: ...ey used for broadcast and multicast data is changed Authentication Timeout Enter the time before a client is required to re authenticate Enter RADIUS Server IP Address i e address of the authenticatio...

Page 36: ...r Rule ex Web Server or select it from the drop down menu IP Address Enter the IP Address of the machine on your LAN 192 168 0 50 or you can select it from the dropdown menu Protocol Select the Protoc...

Page 37: ...ugh NAT This ALG may interfere with the operation of such VPN clients If you are having trouble connecting with your corporate network try turning this ALG off RTSP When enabled this allows applicatio...

Page 38: ...ic Select the Input Port Protocol used by the Internet traffic coming back into the router through the opened port range Select a Schedule for when this rule is in effect If you do not see the schedul...

Page 39: ...e system hosting the game server Enter the TCP Ports to Open Enter the UDP Ports to Open Select a Schedule for when this rule is in effect If you do not see the schedule you need in the list of schedu...

Page 40: ...be enabled It helps to reduce the impact that large low priority network packets can have more urgent ones on Automatic Uplink Speed This option will allow your router to automatically determine the...

Page 41: ...this route is used Metric If there is only one router between your network and the Destination network then the Metric value will be 1 This represents the amount of hops it will take to reach the Dest...

Page 42: ...ss Control is disabled every device on the LAN is permitted to access the Internet If Access Control is enabled every device on the LAN that needs to access the Internet must have an Access Control ru...

Page 43: ...les Go to the Tools Schedules screen and create a new schedule Click Next to continue Step 3 Select Machine Select Address Type from IP MAC or Other Machines to apply this rule to the corresponding ad...

Page 44: ...you can specify that the rule enables access only to specific IP addresses and ports Click on the Enable Check Box Enter the Name of the Filter Enter the Starting Destination IPAddress Enter the Endi...

Page 45: ...me Many websites construct pages with images and content from other sites If you do not enable all of the web sites used to construct a page access will be forbidden For example to access my yahoo com...

Page 46: ...s filters will be applied to wireless network clients When Filter Wired Clients is selected the MAC address filters will be applied to wired network clients Add MAC Address MAC address entries are act...

Page 47: ...Use of this option is only recommended as a last resort If you have made any changes or deletions click on Save Settings at the top of the page If your configuration settings are complete click Reboot...

Page 48: ...applies to Source Port Range Determines the range of ports in which the inbound filter rule applies to Public Port Range Determines the range of WAN side ports associated with the servers on the LAN...

Page 49: ...ecked enables 802 11d operation the feature should only be enabled if you are in a country that requires it 802 11d is a wireless specification developed to allow implementation of wireless networks i...

Page 50: ...the minutes in the second box The end time is used for most other rules but is not used for email events Once you are finished with the Rule Scheduling you must click the Add button to create the sche...

Page 51: ...you want to limit a user from having Administrator rights To Set your User Password Enter a Password of your choice To Verify your Password re enter it below Administration Enter or change the Gatewa...

Page 52: ...emote user to access files UPnP Select the Enable UPnP Note You need to have the UPnP selected for the Router to be able to communicate with the network Save and Restore Settings To load previously sa...

Page 53: ...a Time Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate Select an NTP Server from the list for synchronization...

Page 54: ...D LPR Printing This will enable the Router to find and communicate with the connected printer Please install the printer in your computer as Local printer on the TCP IP port The Port IP address is sam...

Page 55: ...email Enable Authentication Check box to authenticate SMTP server Account Name Enter the account name for sending email Enter the Password associated with this email To Verify your Password re enter...

Page 56: ...ncluding any rules that you ve created System Commands To restart the router click on Reboot the Device To restore all configuration settings back to the factory defaults click on Restore all Settings...

Page 57: ...mail Notification of Newer Firmware Version Firmware Information To check for the latest firmware click Check Online Now for Latest Firmware Version Firmware Upgrade Click the Browse button to locate...

Page 58: ...n name and registered with a dynamic DNS service provider enable Dynamic DNS Select Server Address from the pull down list Enter Host Name Enter the Username or Key provided by your service provider E...

Page 59: ...e version WAN Connection Type shows the Internet connection type that is being used MAC Address is seen over the Internet IP Address being used on the WAN port Subnet Mask used on the WAN port Default...

Page 60: ...ireless LAN Wireless Radio Indicates whether wireless networking is on or off MAC Address displayed for your wireless network Network Name SSID shows name of your wireless network Channel shows the ch...

Page 61: ...ress of each system connecting wirelessly and the IP address of Each system connecting wirelessly 10 3 Routing Table A Gateway value of 0 0 0 0 means there is no next hop The IP address is directly co...

Page 62: ...memory is full old event will be deleted and newer ones will be logged The router also has external Syslog Server support so you can send the log files to a computer on your network that is running a...

Page 63: ...s dropped on the local area network Collisions shows the number of collisions on the local area network Errors shows the number of errors occurring on the local area network WAN Statistics Received sh...

Page 64: ...of transmit packets dropped Errors shows the number of errors relating to packets to from the Wireless Network 10 7 LAN Port Status Traffic Statistics simply displays Receive and Transmit packets pass...

Page 65: ...10 9 Switch Forwarding This page displays the full details of Ethernet switching in your router Version 1 0 Page 65 Alpha Secure Wireless Router 8800 GIGABIT...

Page 66: ...og signals The loss is greater when the signal is being transmitted over long distances Authentication To provide credentials like a Password in order to verify that the person or device is really who...

Page 67: ...both the sender and the receiver when information is exchanged Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network Database Organizes inf...

Page 68: ...net Encryption Converting data into hypertext so that it cannot be easily read Enterprise Large organizations that use computers Ethernet The most widely used technology for Local Area Networks Fiber...

Page 69: ...neering Task Force IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information Server is a WEB...

Page 70: ...Older devices or technology Local Area Network A group of computers in a building that usually access files from a server MAC address A unique hardware address for devices on a Local Area Network MDI...

Page 71: ...ctions Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Phy...

Page 72: ...ween applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SMTP Simpl...

Page 73: ...r up a computer though it s Network Interface Card WAN Wide Area Network Web browser A utility that allows you to view content and interact will all of the information on the World Wide Web WEP Wired...

Page 74: ...gy with Automatic Fallback 802 11g 8 12 24 36 48 72 96 108 Mbps 802 11b 1 2 5 5 and 11 Mbps Wireless Modulation Technology 802 11b DQPSK DBPSK DSSS CCK Modulation 802 11g BPSK QPSK 16QAM OFDM Modulati...

Page 75: ...irewall Port Configurations Access Control Policies Parental Control Internal and External System Logging Static and Dynamic Routing Oversized NAT Table Print Sharing Capability Email Alerts Wireless...

Page 76: ...terms and conditions GIGABIT GIGABIT GIGABIT 1 If Warranty items are shipped for repair or replacement AlphaShield is not responsible for lost or damaged packages please INSURE and obtain a TRACKING n...

Page 77: ...aShield for a RMA Return Merchandise Authorization number and return the defective unit freight prepaid along with a brief description of the problem to the address specified by the Representative Alp...

Page 78: ...product or company names mentioned herein may be the trade name trademark or service mark of their respective owners The use of any AlphaShield Inc s trade names trademarks or service marks without A...

Page 79: ...ny aspect of the terms and conditions including but not limited to the availability of any features on the company s website or the usage of any services currently and or previously provided by the co...

Page 80: ...otection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructio...

Page 81: ...field in excess of Health Canada limits for the general population consult Safety Code 6 obtainable from Heath Canada s website www hc sc gc ca rpb 14 5 IC Radiation Exposure Statement This equipment...

Reviews: