all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 651.39 KiB | December 08 2003 | |||
1 | Cover Letter(s) | December 08 2003 | ||||||
1 | Cover Letter(s) | December 08 2003 | ||||||
1 | External Photos | December 08 2003 | ||||||
1 | ID Label/Location Info | December 08 2003 | ||||||
1 | Internal Photos | December 08 2003 | ||||||
1 | Operational Description | December 08 2003 | ||||||
1 | RF Exposure Info | December 08 2003 | ||||||
1 | Test Report | December 08 2003 | ||||||
1 | Test Setup Photos | December 08 2003 |
1 | User Manual | Users Manual | 651.39 KiB | December 08 2003 |
HHiigghh--PPeerrffoorrmmaannccee WWiirreelleessss RRoouutteerr Users Manual 2003/06/10 Broadband Security Router User Guide FCC Interference Statement This device complies with Part 15 of FCC rule. Operation is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. This High-Performance Wireless Router has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment or device. Connect the equipment to an outlet other than the receivers. Consult a dealer or an experienced radio/TV technician for assistance. CE Declaration of Conformity This equipment complies with the specifications relating to electromagnetic compatibility, EN 55022/A1 Class B, and EN 50082-1. This meets the reasonable protection requirements set out in the European Council Directive on the approximation of the laws of the member states relating to Electromagnetic Compatibility Directive (89/336/EEC). Manufacturers Disclaimer State The information in this document is subject to change without notice and does not represent a commitment on the part of vendor. No warranty or representation, either expressed or implied, is made with respect to the quality, accuracy or fitness for any particular prupose of this document. The manufacturer reserves the right to make change to the content of this document and/or the products associated with it at any time without obligation to notify any person or organization. In no event will the manufacturer be liable for direct, indirect, special, incidental or consequential damages arising out of the use or inability to use this product or documentation, even if advised of the possibility of such damages. This document contains materials protected by copyright. All rights are reserved. No part of this manual may be reproduced or transmitted in any form, by any means or for any purpose without expressed written consent of its authors. Product names appearing in this document are mentioned for identification purchases only. All trademarks, product names or brand names appearing in this document are registered property of their respective owners.
- ii -
Broadband Security Router User Guide Table of Contents Preface....................................................................................................................................... 1 Chapter 1: Introduction........................................................................................................... 3 About The High-Performance Wireless Router......................................................... 3 Features ...................................................................................................................... 4 Package Contents ....................................................................................................... 5 Chapter 2: Installation............................................................................................................. 7 Front Panel ................................................................................................................. 7 Rear Panel & Connections ......................................................................................... 8 System Requirements................................................................................................. 8 Setting Up the TCP/IP Protocol ................................................................................. 9 Chapter 3: Internet Access.................................................................................................... 15 Prepare your network information ........................................................................... 15 Web-based User Interface ........................................................................................ 15 Basic Configuration Setup .................................................................................... 16 Wireless.................................................................................................................... 16 WAN Connection Type............................................................................................ 18 Chapter 4: Advanced Applications....................................................................................... 23 DHCP Configuration................................................................................................ 23 Access Control ......................................................................................................... 24 Virtual Server Settings ............................................................................................. 27 Special Applications................................................................................................. 35 DMZ Host ................................................................................................................ 30 Dynamic Routing ..................................................................................................... 32 Static Routing........................................................................................................... 33 DDNS....................................................................................................................... 35 Chapter 5: Management........................................................................................................ 41 Device Administration Settings ............................................................................... 41 Status Monitor.......................................................................................................... 43 Log ........................................................................................................................... 44 Backup & Restore .................................................................................................... 46 Upgrade Firmware.................................................................................................... 46 Diagnostic-Ping........................................................................................................ 47 Chapter 6: Macintosh Setup.................................................................................................. 49 Hardware Connections ............................................................................................. 49 Computer Network Configuration ........................................................................... 49 High-Performance Wireless Router Configuration.................................................. 50 Adding High-Performance Wireless Router to Existing Network........................... 50
- iii -
Broadband Security Router User Guide Chapter 7: Trouble Shooting ................................................................................................ 51 Hardware .................................................................................................................. 51 Client Side (Computers)........................................................................................... 52 Appendix A: Technical Specifications.................................................................................. 55 Appendix B: Glossary ............................................................................................................ 57
- iv -
Broadband Security Router User Guide Preface Congratulations on your purchase of this High-Performance Wireless Router. This router is the perfect design product combining wireless and Ethernet network technology together. Fully compatible with IEEE 802.11b wireless standard, this device not only allows you to take advantage of mobility, but also to have fast Ethernet connection with built-in four 10/100 auto-sensing switch Ethernet ports. Users on wireless and Ethernet LAN can share files, printers, and other networking resource each other at a blazing speed. Best of all, with NAT technology, all users can share single account of Internet access by having this device connect to a DSL/Cable modem. Integrated 802.11b wireless AP, it is quick and easy to deploy wireless LAN without spending extra cost of a wireless access point. The wireless Routers efficient antenna offers a covered range up to 30 meters indoor (150 meters outdoor) and seamless roaming throughout wireless LAN infrastructure. More over, the wireless operation provides 64 bit key and 128 bit WEP data encryption for high-level security. With built-in NAT, this device not only provides natural firewall, protecting your network from access by outside users but also extends your LAN connection. Users on the LAN can share a single account of Internet access by having this device connect to a DSL/Cable modem. This Wireless Router allows up to 253 users on the Ethernet LAN simultaneously but makes IP configuration simple and easy. Configured as a DHCP server, the High-Performance Wireless Router assigns an IP Address to every connected PC on Ethernet LAN automatically. Also, DHCP client helps WAN port obtain IP address dynamically assigned by ISP. With a web-based UI (User Interface), this High-Performance Wireless Router is easy to setup and maintain. With this exclusive user friendly interface, all functions can be configured easily via a web browser such as Netscape Communicator and Internet Explorer. About this Guide This manual contains information about installing and configuring your High-Performance Wireless Router. It is designed to guide users through the correct setup procedures for appropriate hardware installation and basic configuration. Later, it shows how to complete advanced configurations to get the best operating performance from this High-Performance Wireless Router. Chapter 1: Introduction This chapter describes the package contents and provides a list of features and
- 1 -
Broadband Security Router User Guide applications illustrations of the High-Performance Wireless Router. Chapter 2: Hardware Installation & Setup This chapter describes the steps for the hardware installation of the High-Performance Wireless Router. Chapter 3: Internet Access This chapter describes the steps for the basic configuration and start up of the High-Performance Wireless Router. Chapter 4: Advanced Applications This chapter describes how to configure advanced functions in order to get the most from your High-Performance Wireless Router. Chapter 5: Management Applications This chapter describes how to configure Management functions for administration. Chapter 6: Macintosh Setup This chapter provides instructions on how to set up your Macintosh computers in your network. Chapter 7: Trouble Shooting This chapter describes any potential problems you may encounter and the suggested remedies. Conventions The following explains the conventions used throughout this document. Italics Boldface Boldface Italics New words, terms, or special emphasis. E.g. Getting to know your High-Performance Wireless Router. Buttons, checkboxes, or items that you can select from screens, menus, or dialog boxes. E.g. Click OK to restart Items in Bold Italics are samples only and you should enter other names, numbers, or words to substitute.
- 2 -
Broadband Security Router User Guide Chapter 1: Introduction This chapter describes the package contents and provides a list of features and application illustrations of the High-Performance Wireless Router. About The High-Performance Wireless Router High-Performance Wireless Router is a hybrid design product which combines Ethernet technology and wireless access into a single stand-alone unit. The device allows you take advantages of both mobility and fast connection. All PCs whenever on wireless LAN or Ethernet LAN can share files, printers and other network resource. Moreover, all users can share single account of Internet access by having this device connect to a DSL/Cable modem. Ethernet / Fast Ethernet Ethernet is the most widely-used network access method, especially in a Local Area Network (LAN) and is defined by the IEEE as the 802.3 standard. Normally, Ethernet is a shared media LAN. All stations on the segment share the total bandwidth, which could be 10Mbps (Ethernet), 100Mbps (Fast Ethernet), or 1000Mbps (Gigabit Ethernet). With a switched Ethernet, each sender and receiver has the full bandwidth. Fast Ethernet is defined by the as the IEEE 802.3u standard, a high-speed version of Ethernet with 100Mbps transmission rate. Wireless LAN Wireless Local Area Network systems (WLANs) transmit and receive data through the air by using radio frequency (RF). This offers some advantages like mobility, ease of installation, and scalability over traditional wired systems. Mobility: WLANs combine data connectivity with user mobility. This provides users with access to network anywhere in their organization. For example, users can roam from a conference room to their office without being disconnected from the LAN. This is impossible with wired networks. Ease of Installation: Eliminating the need to deploy network cable in walls and ceilings, Installing WLANs is easy for novice and expert users alike. Scalability: WLAN topologies are easy to change in various ways from peer-to-peer networks for a small group of users to full infrastructure networks for hundreds of users roaming over a broad area. Wireless LAN is suitable for difficult-to-wire and frequently changing environments. Its also an ideal
- 3 -
Broadband Security Router User Guide solution for mobile workers to access network resource and for setting a temporary LAN when necessary Wireless LANs can be set as Aad-hoc network and Infrastructure network. Unlike the Aad-hoc network, where users on the LAN send data directly to each other, the Infrastructure network includes an access point and users on the Infrastructure network send data to that dedicated access point. Advanced Wireless 11g Router uses Infrastructure network as Wireless LANs. Each wireless LAN PC within the range of the access point can communicate with other wireless LAN PCs within the range. Features Your High-Performance Wireless Router contains the following features that make it excellent for network connections.
Allows multiple users to access the Internet at the same time by providing maximum Internet utilization to multiple users, sharing a single public IP Address. Integrates four 10/100BASE-T/TX auto-sensing switch ports.
Uses NAT to allow all of your networks PCs to connect to the Internet using only one (purchased) IP address.
Supports PPPoE that enable user to seamlessly connect to ISPs with the familiar dial-up connection interface.
Built-in web-based user interface for easy configuration and management through common web browsers such as Netscape Communicator 6.0 or later and Internet Explorer 5.0 or later.
Built-in NAT firewall to protect your PCs from outside intruders.
Supports DHCP client to receive both a dynamic IP Address and a fixed IP Address from your ISP.
Built-in DHCP server to automatically assign and manage LAN IP addresses.
Allow administrators to block specific internal users from accessing specified applications or services.
Allows external Internet users to access information from the internal target host by setting the Virtual Server.
Provides unrestricted two-way communication between one PC on your LAN and certain Internet services such as conferencing, video and gaming applications.
Enhances routing performance by using Dynamic and Static routing settings.
Allow administrators to change WAN MAC address.
Compatible with all popular Internet applications.
- 4 -
Broadband Security Router User Guide Package Contents After carefully unpacking the shipping carton, check the contents listed below. Router Power Adapter Users Manual
The High-Performance Wireless Router
Power Adapter
Users Manual
- 5 -
Broadband Security Router User Guide
- 6 -
Broadband Security Router User Guide Chapter 2: Installation This chapter provides information about your High-Performance Wireless Routers physical features and gives step-by-step installation instructions for hardware installation and software configuration. Front Panel The following figure shows the front view of the High-Performance Wireless Router. The LEDs on the front panel indicate the status of the unit. You can easily view the operation of your High-Performance Wireless Router from this panel. Note: Please refer to the model on your hand to find proper description. LED Power:
Diag:
WLAN Link/Act:
Status Description Green Red Steady on when the power is on. Lights up during system checking connections and internal operation when the power is first switched on. If the device works properly, the light should switch off automatically. Green Steady on when the wireless AP is enabled. When the wireless AP is disabled (through the web-based utility), the LED should remain off.
Blinking when data is flowing through Wireless AP. WAN Link/Act:
LAN 1~4 Link/Act:
Green Steady on when the Ethernet link exists.
Blinking when data is flowing through this port. Green Steady on when the Ethernet link exists.
Blinking when data is flowing through this port.
- 7 -
Broadband Security Router User Guide Rear Panel & Connections The following figure shows the rear view of the High-Performance Wireless Router and illustrates how the cables connect to the interfaces on the rear panel. 1. Plug one end of the UTP cable into the WAN port, the other into the RJ45 Ethernet jack on your ADSL or Cable modem. 2. Connect a PC, which must has an Ethernet NIC (Network Interface Card) installed, to one of the LAN Ports. 3. Connect the external power supply to the High-Performance Wireless Router. 4. The Reset button is used to reboot and re-initialize the device (press once quickly), or for clearing configuration settings back to factory default values (press for longer than 3 seconds). Note: If you are Macintosh users, please refer to Chapter 6 Macintosh Setup for more detailed information about configuring TCP/IP, hardware installation and so on.. System Requirements To connect to the Internet, an external ADSL or Cable modem and an Internet access account from an ISP is required. In order to operate with the High-Performance Wireless Router, each PC that is to be connected to the High-Performance Wireless Router should have the following things installed:
Ethernet NIC (Network Interface Card: a 10Base-T or 10/100Base-T/TX Ethernet card), or wireless client card for wireless connection
Standard twisted-pair Ethernet cable (UTP network cable) with RJ-45 connectors
System OS: Windows 95/98, Windows NT4.0, or Windows 2000/XP
TCP/IP network protocol
Web browser, such as Microsoft Internet Explorer 5.0 or later, or Netscape Navigator 6.0 or later
- 8 -
Broadband Security Router User Guide Setting Up the TCP/IP Protocol If you are not sure whether the TCP/IP Protocol has been installed, follow these steps to check, and if necessary, install TCP/IP onto your PCs. 1. Click the Start button. Choose Settings, then Control Panel. Double-click the Network icon. Your Network window should appear as follows:
2. Select the Configuration tab. Important:
For Windows 2000 & Windows XP Setting, you will find that they differs with Windows 98/ME/NT slightly. See the following for reference. Click the Local Area Connection icon on the lower right hand side of your desktop screen.
- 9 -
Broadband Security Router User Guide In the Local Area Connection Status window, click the Properties button then your Network window will appear. There is only one tab, General, in the Network window. 3. Check whether the TCP/IP Protocol has already been installed onto your computers Ethernet card. Note that TCP/IP Protocol can be installed for a computers Dial-Up Adapter as well as for the Ethernet card.
- If yes, go to step 7.
- If no, click the Add button. 4. Double-click Protocol in the Select Network Component Type or highlight Protocol then click Add.
- 10 -
Broadband Security Router User Guide 5. Highlight Microsoft under the list of manufacturers. Double-click TCP/IP from the list on the right or highlight TCP/IP then click OK to install TCP/IP. 6. After a few seconds, you will be returned to the Network window. The TCP/IP Protocol should now be on the list of installed network components (see 3 above). 7. Click the Properties button. The TCP/IP Properties window consists of several tabs. Choose the IP Address tab. 8. Select Obtain an IP address automatically. Click OK. Restart your PC to complete the TCP/IP installation.
- 11 -
Broadband Security Router User Guide Fixed IP Addresses Configuration Fixed IP addresses may be assigned to network devices for many reasons, such as the server PCs or printers which are consistently accessed by multiple users. To set up computers with fixed IP Addresses, go to the IP Address tab of the TCP/IP Properties window as shown above. Select Specify an IP address and enter 192.168.1.xxx in the IP Address location (where xxx is a number between 2 and 254 used by the High-Performance Wireless Router to identify each computer), and the default Subnet Mask 255.255.255.0. Note that no two computers on the same LAN can have the same IP address.
- 12 -
Broadband Security Router User Guide Click on the DNS Configuration tab and select Enable DNS. Enter the DNS IP Address obtained from your ISP in the Server Search Order location. Then click the Add button. Click on the Gateway tab and enter the High-Performance Wireless Routers default gateway value 192.168.1.1 in the New gateway field, then click Add Button.
- 13 -
Broadband Security Router User Guide Click OK. Restart your PC to complete the TCP/IP installation.
- 14 -
Broadband Security Router User Guide Chapter 3: Internet Access This chapter describes the procedures necessary to configure the basic functions and begin using your High-Performance Wireless Router. If you follow these procedures correctly, there should be no problem in accessing the Internet via your High-Performance Wireless Router. Prepare your network information In order to allow quick referencing when setting up your High-Performance Wireless Router, it is suggested you complete the table below with the necessary information. It should be supplied by your ISP. Provided by some ISPs IP address given by ISP:
PPP authentication:
Host Name:
Domain Name:
Obtain IP Address automatically
Static IP IP Address: ____.____.____.____ Subnet Mask: ____.____.____.____ Default Gateway: ____.____.____.____ DNS Server Primary: ____.____.____.____ DNS Server Secondary: ____.____.____.____ DNS Server Third: ____.____.____.____
PPPoE
PPTP Login Name:
Password: ________________ Web-based User Interface Your High-Performance Wireless Router is designed to use a Web-based User Interface for configuration. After connecting your router and your computer, please open your web browser and type http://192.168.1.1 in the browsers address box. This address is the factory set IP Address of your High-Performance Wireless Router. Press Enter.
- 15 -
Broadband Security Router User Guide The Username and Password Required prompt box will appear. Leave the Username field empty and type admin (default password) in the Password field. Click OK. The setup screen will then appear. Basic Configuration Setup The OnePage Setup screen is the first screen you will see when you access the Utility. If the router has already been successfully installed and set up, this screens values will already be properly configured. Host Name:
Domain Name:
Time Zone:
Private IP Address:
This entry is required by certain ISPs. This entry is required by certain ISPs. Select the time zone of your location from the drop down list. The Device IP Address and Subnet Mask of the router are used for the internal LAN. The default values are 192.168.1.1 for the IP Address and 255.255.255.0 for the Subnet Mask. Wireless Check Enable or Disable to make the wireless LAN function active or inactive. SSID:
As the acronym for Extend Service Set Identifier, ESSID is the unique name shared among all clients and Wireless Broadband Router in a same wireless network. The ESSID must be identical for all points and must not
- 16 -
Broadband Security Router User Guide Channel:
WEP:
WEP Key Setting:
exceed 32 characters. Select the appropriate channel number from the drop-down. The permissible channels are different from Regulatory Domains. Make sure that all nodes in the same wireless LAN network use the same channel, or the channel usage is automatic when a connection between client and access point are made. As the acronym for Wired Equivalent Privacy, WEP is an encryption mechanism used to protect your wireless data communications. WEP uses a combination of 64-bit/128-bit keys to encrypt data that is transmitted between all points in a wireless network to insure data security. To code/decode the data transmission, all points must use the identical key. To make the WEP encryption active or inactive, select Mandatory or Disable. As the WEP is active, click the button of WEP Key Setting to go to the setting page. Select 64Bit or 128Bit encryption algorithm from the drop-down list. There are two ways to generate WEP key:
Passphrase Enter a alphanumeric text string in this column then click Generate button, and four 64-bit encryption key will be created automatically. Note that only one 128-bit key will be generated in 128-bit encryption mode. Manually You may need to enter the WEP key manually in case to join the existing wireless network. However, if not, the Pass phrase method is recommended. If you are not sure which way to use, check with your network
- 17 -
Broadband Security Router User Guide administrator. Default TX Key Select one of the four keys to be the encryption key you are going to use in the wireless network. To be sure that all the points in a same wireless network have to have the same encryption key. WAN Connection Type There are four options for WAN connection types, Obtain IP automatically, Static IP, PPPoE, and PPTP. The connection type you need to choose is dependent upon the settings assigned by your ISP. Which connection type you need to choose may differ from ISPs as well as the service you applied for. It depends on your ISPs assignment. If you are unsure which connection type you currently use, contact your ISP to obtain the correct information. Obtain IP automatically It is the default option for the router. If your ISP automatically assigns an IP address and other values to the High-Performance Wireless Router, leave them there without making any changes. Static IP The WAN IP Address and Subnet Mask of the router entered here are used by external users of the Internet (including your ISP). If your ISP assigned a fixed IP address, select this item and enter the IP Address and Subnet Mask provided by your ISP. Specify WAN IP Address: Enter the IP address provided by your ISP. Subnet Mask:
Default Gateway IP Enter the subnet mask values provided by your ISP. Your ISP will provide you with the Default Gateway IP
- 18 -
Broadband Security Router User Guide Address:
Domain Name Server
(DNS):
Address. Your ISP will provide you with at least one DNS IP Address. Multiple DNS IP settings are common. The first available DNS entry is used in most cases. PPPoE PPPoE is a dial-up connection type provided by some ISPs. It is a costeffective way for a user to access this connection type. If your ISP provides PPPoE connectivity, you should choose this item from the drop-down list. Note that if you select PPPoE, please remove any existing PPPoE application on any PCs on your LAN. User Name:
Password:
Connect-on-demand:
Keep Alive:
Enter the user name your ISP provides you. Enter the password your ISP provides you. It is a utility used to trigger the PPPoE session when there is a packet being sent through the WAN port while it is on disconnected situation. Check the radio button to make this function active, and then you must enter the number of minutes you wish the network to remain idle before disconnection occurs in the Max Idle Time location. This function keeps your PPPoE connection enable even if it remains idle. However, in some situation, PPPoE session cannot be established immediately after disconnection. This is because the system on the ISPs site may need a little time to restore itself. You may need to check with your ISP to obtain detail of how long you need to wait before re-establish the PPPoE session. Enter this information in the Redial Period field.
- 19 -
Broadband Security Router User Guide RAS(for SingTel) If your ISP uses RAS to establish the connection, you should select this item and follow the steps below. User Name:
Password:
RAS Plan:
Connect-on-demand:
Keep Alive:
Enter the user name your ISP provides you. Enter the password your ISP provides you. Choose the connection method that you want to use. It is a utility used to trigger the RAS session when there is a packet being sent through the WAN port while it is on disconnected situation. Check the radio button to make this function active, and then you must enter the number of minutes you wish the network to remain idle before disconnection occurs in the Max Idle Time location. This function keeps your RAS connection enable even if it remains idle. However, in some situation, RAS session cannot be established immediately after disconnection. This is because the system on the ISPs site may need a little time to restore itself. You may need to check with your ISP to obtain detail of how long you need to wait before re-establish the RAS session. Enter this information in the Redial Period field.
- 20 -
Broadband Security Router User Guide PPTP PPTP is the acronym of Point to Point Tunneling Protocol. Usually, it is used to encapsulate other protocols packets for transmission over IP network. Some ISPs use this protocol as way to establish the initial connection between the CPE (end-user side) and DSLAM (ISP side). If your ISP uses PPTP to establish the connection, you should select this item and follow the steps below. Specify WAN IP Address:
Subnet Mask:
Default Gateway IP Address:
User Name:
Password:
Connect-on-demand:
Keep Alive:
Enter the IP address provided by your ISP. If your ISP provides you an Alcatel Speed TouchTM modem, it is suggested that you enter 10.0.0.150 in this column. Enter the subnet mask values provided by your ISP. Your ISP will provide you with the Default Gateway IP Address. If your ISP provides you an Alcatel Speed TouchTM modem, it is suggested that you enter the 10.0.0.138 in this column. Enter the user name provided by your ISP. Enter the password provided by your ISP. It is a utility used to trigger the PPTP session when there is packet being sent through the WAN port while it is on disconnected situation. Check the radio button to make this function active, and then you must enter the number of minutes you wish the network to remain idle before disconnection occurs in the Max Idle Time location. This function keeps your PPTP connection enable even if it remains idle. However, in some situation, PPTP session cannot be established immediately after disconnection. This is because the system on the ISPs site may need a little time to restore itself. You may need to check with your ISP to obtain detail of how long you need to wait before re-establish the PPTP session. Enter
- 21 -
Broadband Security Router User Guide this information in the Redial Period field. HBS If your ISP uses HBS to establish the connection, you should select this item and follow the steps below. User Name:
Password:
Heart Beat Server:
Connect-on-demand:
Keep Alive:
Enter the user name provided by your ISP. Enter the password provided by your ISP. Enter the IP address provided by your ISP. This setting is available only for some areas. Check your ISP for more detailed information. It is a utility used to trigger the HBS session when there is packet being sent through the WAN port while it is on disconnected situation. Check the radio button to make this function active, and then you must enter the number of minutes you wish the network to remain idle before disconnection occurs in the Max Idle Time location. This function keeps your HBS connection enable even if it remains idle. However, in some situation, HBS session cannot be established immediately after disconnection. This is because the system on the ISPs site may need a little time to restore itself. You may need to check with your ISP to obtain detail of how long you need to wait before re-establish the HBS session. Enter this information in the Redial Period field. When you have properly configured the Setup page, click Apply. You can now test to see if the settings are all correct by attempting to connect to the Internet.
- 22 -
Broadband Security Router User Guide Chapter 4: Advanced Applications In general, after finishing the steps listed in chapter 3, you can connect to Internet with ease. Yet, you might want to have advanced configuration for some reasons. This chapter provides information on how to set up and use the advanced functions of your High-Performance Wireless Router. DHCP Configuration A DHCP (Dynamic Host Configuration Protocol) Server can automatically assign IP Addresses to each computer in your network. Unless you already have one in you LAN, it is highly recommended that you set your router to act as a DHCP server. Dynamic IP Address:
Starting IP Address:
Number of Users Client Lease Time:
Select Enable to use the DHCP server option of the router. If you already have a DHCP server in your network, set the router's DHCP option to Disable. Enter a numerical value, from 2 to 254, for the DHCP server to start at when assigning IP Addresses. Enter the maximum number of PCs that you want the DHCP server to assign IP Addresses to, with the absolute maximum being 253. Enter the number of time that DHCP clients (The PCs on
- 23 -
Broadband Security Router User Guide LAN side) can use the IP Addresses assigned by Routers DHCP server. Before the time is up, DHCP clients have to request to renew the DHCP information. The IP Address of the Domain Name Server, which is currently used. Multiple DNS IP settings are common. The first DNS entry will be use in most cases. Windows Internet Naming Service converts NETBIOS name to IP address. The Windows based PCs are assigned NETBIOS names, which have to be transfer into IP addresses if the network transport is TCP/IP. For example, through WINS the two PCs that belong to different subnet can locate each other by name. Enter the IP address of WINS server and it will be assigned to DHCP clients. Click the DHCP Clients Table button to show current DHCP client information. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. DNS:
WINS:
DHCP Clients Table Apply:
Undo:
Access Control The Access Control feature allows administrators to block certain users from accessing the Internet or specific applications. Before using this function, the network PCs which you want to control the access limitation should be assigned fixed IP Addresses.
- 24 -
Broadband Security Router User Guide IP Access Setting This function allows network administrators to restrict up to five groups of specified network users/computers from accessing the certain applications Protocol:
Select the protocol type as TCP or UDP from the drop down list. If you are not sure which one to choose, select Both. Enter the range of IP addresses which you want them to be a controlled group to have the same access limitation. Enter the range of port numbers which are used by the applications you wish to be blocked. Filter Group/LAN IP Range:
Block Port Range:
Here is an example for the IP Access Setting. Enter the range of 51~80 in the Filter Group column and 20~80 in the Block port Range column, then click Apply button. As the result, the users computers which have IP Addresses in the range of 192.168.1.51 to 192.168.1.80 will not be able to use the applications which use port numbers from 20 to 80, such as FTP, Telnet and web browsing. URL Access Setting To shift to URL Access Setting, click on the bold type word to hyperlink to the setting page. This function allows network administrators to restrict or allow all LAN users to access the web sites that the addresses have been enter to the columns.
- 25 -
Broadband Security Router User Guide URL Access Limit:
Website Access:
Check Enable or Disable to make this function active or inactive. Check Allow to allow users on the network to access specific website listed on the location only. In contrast, to restrict users on the network to access the website listed on the location, check Block in this item. Block Access Website: Enter the website addresses to be accessed/blocked on the Show URL Log:
locations. Up to twenty website addresses can be entered into the locations. URL Log allows network administrators to check the URL access records. Click the button of Show URL Log to go to the URL Filter Log table. This table lists the users/computers by their IP Addresses, the access status, and their URL Access destinations. Private MAC Filter This function allows network administrators to use the MAC addresses of PCs to restrict users/computers from accessing the Internet. Filtered MAC Address: There are fifty sets divided into five groups in this function. You can choose each group by selecting from the pop-down list. Enter the MAC addresses of the computers you wish to block in the columns, and then those users/computers cannot access Internet at all.
- 26 -
Broadband Security Router User Guide Virtual Server Settings The Virtual Server Settings application allows you to set up a maximum of ten public services that can be accessed by external users of the Internet, such as a Web Address, Email, FTP etc.. Each service is provided by a dedicated network computer (server) configured with a fixed IP Address. Although the internal service addresses are not directly accessible to the external user, the High-Performance Wireless Router is able to identify the service requested by the service port number and redirects the request to the appropriate internal IP Address/server. To use this application, it is recommended you use a fixed Public IP Address from your ISP. Note that your High-Performance Wireless Router supports only one server of any particular type. This router also supports UPnP Forwarding. You can use either Virtual Server Settings or UPnP Forwarding by clicking the button to change setting page. Please note that do not set the same function server to different IP Address in different setting pages. Set up individual network computers to act as servers and configure each with a fixed IP Address. Note: In the One Page Setup screen, ensure the Private IP Address is set to the High-Performance Wireless Routers default setting of 192.168.1.1. If a fixed Public IP Address is to be used, select Specify an IP address and enter the IP Address and other necessary information provided by your ISP.
- 27 -
Broadband Security Router User Guide Ports:
Redirect IP Address:
Passive FTP Virtual Server:
Apply:
Undo:
Enter the desired service port numbers in the Ports fields. You can specify the protocol type as TCP or UDP from the drop-down list. If you are not sure which one to select, choose Both. A selection of well-known service port numbers is provided on this screen. Enter the appropriate IP Addresses of the service computers in the Redirect IP Address locations. When there is firewall filtering in your network, the Internet user may not be able to access FTP server you set in the LAN side. Setting FTP server at passive mode will be necessary. Enable/Disable - Click to enable/disable passive FTP function. FTP Port - Enter the port number (> 1024) that the FTP server will use as data connection port number. The client side should select passive mode and use the same port number entered here. Server IP Address - Enter the appropriate IP Addresses of the service computers. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Example:
If the service port number 80~80 (representing an HTTP web address) is entered in Ports and 192.168.1.100 is entered in Redirect IP Address, then all HTTP requests from external Internet users will be directed to the PC/server with the 192.168.1.100 fixed IP Address. Below is a list of the protocol and port ranges that are used by some common applications. Application Port Range Protocol FTP Server Half Life MSN Messenger PC Anywhere host Quake 2 TCP UDP TCP TCP UDP UDP UDP TCP TCP UDP UDP 21 6003, 7002, 27010, 27015, 27025 6891-6900 (File-send) 1863 1863 5190 6901 (Voice) 6901 (Voice) 5631 5632 27910
- 28 -
Broadband Security Router User Guide Quake III Telnet Server Web Server UDP TCP TCP 27660 (first player)
"C:\Program Files\Quake III Arena\quake3.exe" +set net_port 27660 27661 (second player) 23 80 UPnP Forwarding UPnP (Universal Plug and Play) is a standard introduced from Microsoft and UPnP Forum for interoperability. Currently, this function supported by this device allows you to set virtual server from Windows OS that supports UPnP, such as Windows XP. UPnP Function:
Check Enable will allow LAN side PCs that support UPnP to set virtual server. Before you enable the UPnP Forwarding, you have to set up individual network computers to act as servers and configure each with a fixed IP Address. In the One Page Setup screen, ensure the Private IP Address is set to the Routers default setting of
- 29 -
Broadband Security Router User Guide Application Name:
Ext. Port:
Protocol:
Int. Ports:
IP Address:
Enable:
Apply:
Undo:
192.168.1.1. If a fixed Public IP Address is to be used, select Specify an IP address and enter the IP Address and other necessary information provided by your ISP. UPnP has ten pre-setting forwarding rules, which are well-known applications. You can enter any name to present the additional settings beside those pre-setting rules. Most of applications usually use their individual port number for its incoming and outgoing data packets. However, some of the application may use different port number for incoming and outgoing data packets. In this case, you have to enter the port number used by incoming data packets here. Specify the protocol type as TCP or UDP which is used by specific service. Most of applications usually use their individual port number for its incoming and outgoing data packets. However, some of the application may use different port number for incoming and outgoing data packets. In this case, you have to enter the port number used by outgoing data packets here. Enter the appropriate IP Addresses of the service computers in the Redirect IP Address locations. Check to make this forwarding setting active. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Example: If the service port number 80~80 (representing an HTTP web address) is entered in Ports and 192.168.1.100 is entered in Redirect IP Address, then all HTTP requests from external Internet users will be directed to the PC/server with the 192.168.1.100 fixed IP Address. DMZ Host The DMZ Host application allows unrestricted 2-way communication between a single LAN PC and other Internet users or servers. This application is useful for supporting special-purpose services such as video-conferencing and gaming that require proprietary client software and/or 2-way user communication. To use this application, you must first obtain a fixed Public IP Address from your ISP. Note that in order to provide unrestricted access, the Firewall provided by the High-Performance Wireless Router to protect this port is disabled, thus creating a potentially serious security risk. It is recommended that this application is disabled when it is not in use by entering 0
- 30 -
Broadband Security Router User Guide in the DMZ Hostfield. The Multi DMZ allows you to map the public IP addresses to your LAN PCs, should you get more than one public IP address from your ISP. This function is useful to set up your servers, such as an FTP server, web server, and so on, with public IP addresses, but still keep them within your LAN group. With the public IP addresses, Internet users will access your servers more easily and those servers can still communicate with other PCs in you LAN by using Network Neighborhood. Before setting up a LAN PC to act as a DMZ Host, you should configure it using a fixed IP Address. Note: In the One Page Setup screen, ensure the Private IP Address is set to the High-Performance Wireless Routers default setting of 192.168.1.1. In the Public IP Address area, select Specify an IP Address, and then enter the IP Address and other necessary information provided by your ISP. Click the DMZ Host option in the Advanced Menu and enter the fixed IP Address of the Exposed Host PC in the DMZ Host IP Address location. Remember, entering 0 will disable this application. Multi DMZ 1. Enter the valid public IP address in WAN IP column. Next, enter the private IP address of the PC that you wish to map to in LAN IP field. Up to five public IP addresses can be entered.
- 31 -
Broadband Security Router User Guide 2. Click the Apply button after making any changes, or click the Cancel button to exit the screen without saving any changes. Dynamic Routing The Dynamic Routing feature allows your High-Performance Wireless Router to exchange routing information with other routers in the network. Enabling this feature is likely to enhance performance of your High-Performance Wireless Router. TX:
RX:
Show Routing Table:
Apply:
Undo:
From the drop-down list, select one of the routing information types, RIP-1, RIP-1 Compatible, or RIP-2, to enable the TX (transmit) function. RIP-1 is the protocol used by older routers. Newer routers should use RIP-2. RIP-1 Compatible servers to broadcast RIP-1 and multicast RIP-2. From the drop-down list, select one of the routing information types, RIP-1 or RIP-2, to enable the RX
(receive) function. Click this button after clicking Apply to see current routing information. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Below is Routing Table Entry List. This table shows the status for routing information. You can click Refresh to update the table information.
- 32 -
Broadband Security Router User Guide Static Routing The Static Routing feature allows PCs that are connected to the High-Performance Wireless Router, either directly or through a hub/switch (in the immediate LAN), to communicate with other PCs in the respective LAN segment which are connected to the High-Performance Wireless Router through another router (destination LAN). Up to 20 route entries may be input into the High-Performance Wireless Router. The diagram below gives an example of the physical connections required to use Static Routing. In the above diagram, PC2 in LAN#2 is connected to the High-Performance Wireless Router via another router while PC1 in LAN#1 is connected to the High-Performance Wireless Router directly. Without configuring the Static Routing function, the two PCs would not be able to communicate with each other.
- 33 -
Broadband Security Router User Guide Select Route entry:
Delete this entry Destination LAN IP and Subnet Mask:
Default Gateway:
Hop Count:
Interface Show Routing Table:
Apply:
Undo:
Select the route entry number from 1 to 20 that you wish to configure. Delete the selected route entry information. Enter the IP Address and Subnet Mask of the destination LAN that the immediate LAN is to communicate with. Taking the above diagram as an example, enter 192.168.2.0 in the Destination LAN IP field and 255.255.255.0 in the Subnet Mask field. Enter the IP Address of the router that forwards data packets to the destination LAN. For the above example, enter 192.168.1.2 in the Default Gateway field. Enter the number of hops required between the LANs to be connected. The Hop Count represents the cost of the routing transmission. The default value is 1. Choose LAN if the Destination LAN is on your Routers LAN side and choose WAN if the Destination LAN is on the Routers WAN side. Click this button after clicking Apply to see current routing information. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Referring back to the above diagram, with the proper settings, PC1 would be able to access LAN 1, LAN 2 and the Internet while PC2 can only access LAN 2, LAN1.
- 34 -
Broadband Security Router User Guide Special Applications Some applications use multiple TCP/UDP ports to transmit data. Due to the NAT, these applications cannot work with the High-Performance Wireless Router. Port Triggering allows some of these applications to work properly. Note that only one PC can use each Port Triggering setting at any time. Application name:
Enter the name of application you wish to configure in the Name column to identify this setting. Outgoing Port Range: Enter the port number or range numbers this application uses when it sends packets outbound. The Outgoing Control Port Numbers act as the trigger. When the High-Performance Wireless Router detects the outgoing packets with these port numbers, it will allow the inbound packets with the Incoming Port Numbers that you set in the next column to pass through the High-Performance Wireless Router. Incoming Port Range: Enter the port number or range numbers the inbound packets Apply:
Undo:
carry. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. The following is a list of port numbers used on some popular applications:
Application Battle.net DialPad ICU II Incoming Data 6112 51200, 51201,51210 2000-2038, 2050-2051 Outgoing Control 6112 7175 2019
- 35 -
Broadband Security Router User Guide MSN Gaming Zone 47624 12053 PC to Phone Quick Time4 554 8000 wowcall 2069, 2085,3010-3030 2300-2400, 28800-29000 12120,12122, 24150-24220 6970-6999 4000-4020 Wireless This setting page allows you to configure advanced wireless functions. To set those items needs more technology background. Unless you really understand those technical terms, it would be better to leave them as default setting. Beacon Interval:
RTS Threshold:
Fragmentation Threshold:
DTIM Interval:
Its the signal sent periodically by wireless access point to provide synchronization among the stations in wireless LAN. RTS packet is use to account for potential hidden stations. This feature allows you to set the size of RTS packet. If the length of data frame needing transmission exceeds the fragmentation threshold you set in the column, the data frame will be fragmented. If there is significant interference or high utilization in your wireless network, the smaller fragmentation value can increase the reliability transmission. However, it is more efficient to set the large fragment size. DTIM is the acronym of delivery traffic indication message. It determines how often the MAC Layer forward multicast traffic.
- 36 -
Broadband Security Router User Guide Basic Rates:
TX Rates:
Preamble Type:
Authentication Type:
MAC Filter:
Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. Select either 1~2 Mbps or 1~2~5.5~11Mbps auto fallback. Preamble is used in the frames to provide time for the receiving station to synchronize to the incoming data stream. Select either Open System or Share Key as authentication type. If you are not sure, select both. This function allows you to restrict wireless users to access Internet. Click the Active MAC Table button will display all MAC addresses of wireless nodes on your WLAN. The Wireless Active MAC Table shows the MAC addresses of wireless clients, which have the same SSID and WEP key with Wireless Router. When the MAC Filter function is disabled, the background color is gray. You can add the MAC addresses showing in this table to the Wireless MAC Filter List table by checking the box beside these MAC addresses. If the MAC Filter function is enabled:
Green Background When the wireless client MAC addresses showing in this table have been entered into the Wireless MAC Filter List table, the background color of these MAC addresses will be green. Red Background When the wireless client MAC addresses showing in this table have not been entered into the Wireless MAC Filter List table, the background color of these MAC addresses should be red. Yellow Background If the MAC addresses showing in this table have been blocked (check the Filter field beside the MAC address in Edit MAC Filter table), the background color will be yellow. Click Update Filter List button to open the edit table.
- 37 -
Broadband Security Router User Guide Wireless MAC Entry There are 32 sets divided into four groups in this function. You can choose each group by selecting from the pop-down list. Enter the MAC addresses of the wireless clients, which you wish to block in the columns and click the Filter field beside the MAC address, and then those wireless clients will be blocked to access Internet. If the Filter field isnt checked, that MAC address wont be blocked. The MAC address entered here should be 12 continue alphanumeric digits without - in between. DDNS DDNS is an acronym for Dynamic Domain Name Service. Whenerver you set up the web servers, mail servers, or sometimes ftp servers, you need Domain Name to help Internet users reach your servers easily. Internet actually runs on IP Addresses which are numerical order, for example 66.37.215.53. These IP Address identify the location of each device connected to Internet. However, the human brain does not easily remember this numbering system, so a system that allocate domain name such as www.dyndns.org provides an easier method. If you type 66.37.215.53 or www.dyndns.org in the web browsers address bar, the browser will show the same web page. This is because both methods relate to the same web server. The Domain Name Servers used to manage the Internet will translate www.dyndns.org into the IP Address 66.37.215.53 in order to allow your browser to find the web server and display the correct web page in your browser. If your WAN Connection Type, as shown in One Page Setup section, is Obtain IP Address Automatically, PPPoE, or PPTP with dynamic IP address assigned by ISP, it will cause an error when you set up the public computer servers in your LAN
- 38 -
Broadband Security Router User Guide side PCs. Internet users may not be able to reach your servers because your WAN side IP address may change each time you initiate the connection to your ISP. The DDNS function will help to map your IP address to your domain name when your ISP assigns a new dynamic IP Address. Note that this DDNS function acts as the client appliance of DDNS service and is only able to be use in conjunction with the service provided by DynDNS.org. Before you begin using this function, you will need to apply to DynDNS.org to be able to use the service. Please visit www.dyndns.org for further information. DDNS Service:
Username:
Password:
Host Name:
Your IP Address Status:
Apply:
Check the Enable option if you wish to activate this function. After you have applied for the DDNS service from DynDNS.org, you will be issued with a Username. Enter this username in the Username field. DynDNS.org, will also issue you with a password. Enter the detail in the Password field. DynDNS.org, will provide you with a Host Name. Enter this name in the Host Name field. It displays the IP Address currently assigned by your ISP. This displays the current status of the DDNS function. Click this button after making any changes for activating the
- 39 -
Broadband Security Router User Guide settings. After clicking Apply to invoke the DDNS settings, you have to click this button to refresh the settings.. Update:
- 40 -
Broadband Security Router User Guide Chapter 5: Management This chapter allows administrator to manage the router such as upgrading the firmware, backup & restore settings, setting log information and so on. Device Administration Settings This feature allows the administrator to manage the High-Performance Wireless Router by setting certain parameters. For security reasons, it is strongly recommended that you set Passwords and so that only authorized persons are able to magage this High-Performance Wireless Router. If the Password is left blank, all users on your network can access this router simply by entering the units IP Address into their web browsers location window.
- 41 -
Broadband Security Router User Guide Administrator Password:
SNMP Function:
WAN MAC Change:
External Admin.:
MTU:
Block WAN Request:
IPSec Pass Through:
PPTP Pass Through:
Enter the password you want to use into the Password Change field and re-enter it into the Password Confirm field for confirmation. Be sure that the password is less than 64 characters long and without any special characters or spaces.. As with the Password, SNMP community allows authorized persons to access this router through the SNMP Management tool. The Wireless Router provides three fields to enter these communities. The default words Public and Private are well-known communities that allow authorized persons who know the IP Address of this router to access the read-only information about this router or have the authority to change the configuration. Also, the administrator can define any specific community and configure its limits as Read-Only or Read-Write from the right side drop-down box. The WAN MAC address can be changed from the original values if necessary. Some ISPs require users to change the WAN MAC address to a registered one when users change their access equipment. Check Enable to allow you to configure the High-Performance Wireless Router from the WAN side. To access the setting page from the external side, enter http://<WAN IP Address>:8080 into the web browser address bar and press the Enter key. Check Enable if you want to set a maximum limitation for incoming and outgoing packet size. Enter the maximum packet size you wish to set in the Size column. To prevent hacker intruding your network, check the Enable option to enable this function to reject all the unauthorized requests from WAN side. Check the Enable to allow the IPSec packets to pass through the Wireless Router if there is LAN PC using IPSec for data communication with other Internet device. Check the Enable to allow the PPTP packets to pass through the Wireless Router if there is LAN PC using PPTP for data communication with other Internet device. PPPoE Pass Through: Check the Enable to allow the PPPoE packets to pass Remote Upgrade:
through the Wireless Router if there is LAN PC using PPPoE for data communication with other Internet device. Check Enable if you want to allow the authorized remote users to upgrade firmware from WAN side.
- 42 -
Broadband Security Router User Guide Reset Device:
Factory Defaults:
Apply:
Undo:
Select Yes if you want to clear a connection, reboot, and re-initialize the unit without affecting any of your configuration setting. Select Yes if you want to return all the routers current settings to their factory defaults. Note that do not restore the factory defaults unless it is absolutely necessary. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Status Monitor This screen shows the routers current status. All of the information provided is read-only. Product Name:
Firmware Version:
Login:
This field shows the name of this router. This field shows the installed version of the firmware. This column shows the login information of PPPoE or PPTP. You can manually initiate the connection or make a
- 43 -
Broadband Security Router User Guide disconnection by clicking the appropriate buttons. Be aware that, if you make a disconnection here, Connect-on-
demand will not function until the connection button is clicked. Note that Login wont show any information if you selected Obtain IP automatically or Static IP on the OnePage Setup page. This section shows the IP settings status of the router as seen by external users of the Internet. If you selected Get IP Address Automatically, PPPoE, or PPTP in the OnePage Setup, the IP Address, Subnet Mask, Default Gateway, and Domain Name Server (DNS) will show the information retrieved from the DHCP server or ISP which is currently being used. If you selected Static IP in One Page Setup: Public IP Address, the information will be the same as your input. Click this button to eliminate the IP address obtained from DHCP server. Click this button to refresh the IP address from DHCP server. Note that the DHCP Release and DHCP Renew button only show up when you select Get IP Address Automatically in the OnePage Setup. This section displays the current Private IP Address and Subnet Mask of the router, as seen by users of your internal network. If the router is setup to act as a DHCP server, the LAN side IP Address distribution table will appear by clicking this button. Internet:
DHCP Release:
DHCP Renew:
Intranet:
DHCP Clients Table:
Log The Log application provides the administrator with the ability to trace Internet connection. With viewing the Log information, an administrator can send the record to a specific LAN PCs to have the real time monitor.
- 44 -
Broadband Security Router User Guide Access Log:
Send Log To:
View Log:
Send Log via E-mail:
Denial of Service Thresholds:
SMTP Mail Server:
E-mail Alert to:
Return Address:
Log Schedule:
Check the Enable option if you want to activate this function. Enter the IP address of the PC that you wish to use to view the Log information. Click this button to view the log on-line. The Firewall log can be sent via e-mail. The threshold is used to determine the attempt of establishing connection is DoS attack or not. The domain name of IP Address of your ISPs outgoing e-mail server. You may find this information when you apply for e-mail service from your ISP. Enter the e-mail address you wish to send to. Enter the e-mail address you wish to send to if the alert e-mail cannot be sent to the address above. Select from the drop down list that when you wish the alert e-mail will be send:
When Log is Full - The alert e-mail will be sent when log space is full. They are about 30 entries. Hourly - The alert e-mail will be sent by each hour. Daily - The alert e-mail will be sent by each day at midnight. Weekly - The alert e-mail will be sent by each week. When this item is select. Day of Sending Alert: When Weekly is selected as Log Schedule, you can select
- 45 -
Broadband Security Router User Guide which day in a week to send the alert e-mail. Click this button after making any changes for activating the settings. Click this button if you are not satisfied with the settings in this page before clicking Apply. Apply:
Undo:
Backup & Restore This function allows you to save routers configuration as backup, or retrieve the configuration file you saved before to turn the setting back. Click Backup button save the current configuration as a backup file in your hard disk. Enter path of the configuration file you saved on the PC. You can click Browse to view the folders and select the file. Click Restore to retrieve it. Backup:
Restore:
Upgrade Firmware This setting page allows you to upgrade the latest version firmware to keep your router up-to-date. Before you upgrade the firmware, you have to get the latest firmware from your ISP and save it on the PC you use to configure the router. You have to upgrade the file(s)one by one to your router and restart the router to active the settings.
- 46 -
Broadband Security Router User Guide Browse.. Browse.. Upgrade:
To select a file to upgrade, you have to enter path of the latest firmware you saved on the PC. You can choose Browse to view the folders and select the firmware. After you enter or select the path, click Upgrade to proceed firmware upgrade process. Please note that dont power off the router during the firmware upgrading. Diagnostic-Ping This function allows you to test the connection between router and LAN or between router and Internet. Ping This page allows you to set configuration for diagnostic-ping. After filling in the parameters for your requirement, click Start to begin the connection testing. Source IP:
You can chose to issue the ping test from the LAN side by
- 47 -
Broadband Security Router User Guide Destination IP:
Packet Number:
Packet Size:
Time Between Time out:
Start:
Ping Result:
selecting Routers private IP Address or from the WAN side by selecting Routers WAN IP Address. Enter the IP Address of destination device you want to ping. If Routers LAN IP address is selected as Source IP, you only can ping LAN side device and vice versa. Enter the packet numbers you wish to use to ping the destination device. The maximum numbers are four. Enter the numbers of packet size you wish to use to ping the destination device. The maximum packet sizes are 1514. Enter the numbers of time between two packets. Enter the number of time regarding as no response after starting to ping the destination device. Click this button to begin the ping test. The result will show the numbers of sending packet, numbers of packet receiving, and the average return time. Tracert To trace the route between the router and a certain device, you can type in the IP address of that device on the box of Tracert host and click the Tracert button. The status of the connection will be sown on the field of Trace Message. Enter the IP Address of destination device that you wish to trace the route between Router and that device. The result shows the routing information between Router and destination device. Click Tracert to start this test. Tracert Host:
Trace Message:
Tracert:
- 48 -
Broadband Security Router User Guide Chapter 6: Macintosh Setup This chapter provides information on using Macintosh computers in your network. The instructions given here are for system software version 8.0 or above, which comes with the TCP/IP Protocol preloaded and supports DHCP Addressing. Hardware Connections Connect your Macintosh computer to your High-Performance Wireless Router. If you have a newer computer, there will be an Ethernet port on the back. Older computers will need to have an Ethernet card installed. See your computers Users Manual for instructions on Ethernet card installation. Computer Network Configuration It is assumed that your computers system software already has TCP/IP installed. You may manually configure your computer with a fixed IP Address or have an IP Address dynamically assigned to it by the High-Performance Wireless Routers DHCP server. Dynamic IP Addressing using DHCP Server. 1. From the Apple menu, select Control Panel and click on TCP/IP. 2. In the TCP/IP (A New Name For Your Configuration) window, select Ethernet in the Connect via location from the drop-down list. 3. In the Setup area, select Using DHCP Server in the Configure location from the drop-down list. No other data needs to be entered. Then, close the window. 4. Click Save from the File menu, then Quit TCP/IP. 5. Restart the computer. Manual Configuration of Fixed IP Addresses 1. From the Apple menu, select Control Panel and click on TCP/IP. 2. In the TCP/IP (A New Name For Your Configuration) window, select Ethernet in the Connect via location from the drop-down list. 3. In the Setup area, select Manually in the Configure location from the drop-down list. 4. In the IP Address location, enter the IP Address that you want to assign to the computer (refer to the notes on Fixed IP Addresses above). Enter 255.255.255.0 in the Subnet Mask location. Enter 192.168.1.1 (the High-Performance
- 49 -
Broadband Security Router User Guide Wireless Routers default IP Address) in the Router Address location. 5. Enter the ISPs IP Address in the Name Server location if your ISP has provided the information. And close the window. 6. Click Save from the file menu then Quit TCP/IP. 7. Restart the computer. High-Performance Wireless Router Configuration To configure your High-Performance Wireless Router, use your Web Browser and follow the instructions given in Chapter 3: Internet Access, Basic Configuration. To configure advanced settings, see Chapter 4: Advanced Applications. Adding High-Performance Wireless Router to Existing Network If the High-Performance Wireless Router is to be added to an existing Macintosh computer network, the computers will have to be configured to connect to the Internet via the High-Performance Wireless Router. 1. From the Apple menu, select Control Panel and click on TCP/IP. 2. From the File menu, select Configurations and select your existing network configuration. Click Duplicate. 3. Rename your existing configuration. Click OK, and Make Active. 4. In the Setup area, select Manually in the Configure location from the drop-down list. 5. In the IP Address location, enter the IP Address that you want to assign to the computer. (see the note on fixed IP Addresses above). Enter 255.255.255.0 in the Subnet Mask location. Enter 192.168.1.1 (the High-Performance Wireless Routers default IP Address) in the Router Address location. 6. Enter the ISPs IP Address in the Name Server location if your ISP has provided the information. 7. Close the window. 8. Click Confirm. TCP/IP is now configured for manual IP Addressing. For configuration your High-Performance Wireless Router, refer to Chapter 5.
- 50 -
Broadband Security Router User Guide Chapter 7: Trouble Shooting This chapter provides solutions to problems you may encounter during installation and operation of your High-Performance Wireless Router. Hardware Q: The Power LED is off. A: Check that the power cable is properly connected to the High-Performance Wireless Router, the power adapter and the socket. Q: The LAN Link LED is off. A: Please check the following:
Check if the computer, hub or switch is properly connected to the High-Performance Wireless Router.
Check that the computers Ethernet card is properly installed.
Check that the High-Performance Wireless Router and the computer are on the same network segment. If you are not sure, initiate the DHCP function
(4-1) and set your computer to obtain an IP address automatically (3-3).
Check that the computer is using an IP address in the range of 192.168.1.2 ~
192.168.1.254 and is therefore compatible with the High-Performance Wireless Routers default IP address of 192.168.1.1 (3-3). Check also the Subnet Mask is set to 255.255.255.0 Q: The DIAG LED stays lit. The DIAG LED should light up when the device is first powered up to indicate it is checking for proper operation. After a few seconds, the LED should go off. If it stays lit, the device is experiencing a problem. Please contact your dealer. Q: Why cant I configure the High-Performance Wireless Router?
A: First, check whether the High-Performance Wireless Router is properly installed or not, including the LAN and WAN connections, and that all devices are switched on. Next, check the IP configuration of your PC:
For Windows 95/98 users: run winipcfg.exe or winipcfg from Run on the Start menu. If there are no IP addresses shown, click Release All and then click Renew All to get the IP addresses.
For Windows NT 4.0 users: run ipconfig.exe or ipconfig from Run on the Start menu and follow the instruction as above. Ensure that your PC and the High-Performance Wireless Router are on the same
- 51 -
Broadband Security Router User Guide network segment. If you are not sure, initiate the DHCP function and set you PC to obtain an IP address automatically. Ensure that your PC is using an IP Address within the range 192.168.1.2 to 192.168.1.254 and thus compatible with the High-Performance Wireless Router default IP address of 192.168.1.1 Finally, use the Ping command in MS-DOS mode to verify the network connection:
Ping 127.0.0.1 to check the TCP/IP stack of your computer Ping gateway IP (Default: 192.168.1.1) to check the internal link of network. Note if youre not able to view the web configuration screen for the High-Performance Wireless Router, make sure that you remove any proxy setting within your Internet browser, or remove the dial-up settings within your browser. Q: What can I do if I have forgotten the password for High-Performance Wireless Router?
A: You have to reset the Broadband Gateway back to the factory default setting by pushing the Reset button for longer than 3 seconds. Refer to the users manual to reconfigure the settings. Q: I cannot access my ISPs home page, why?
Some ISPs, such as @Home, require that their host name be specifically configured into your computer before you can surf their local web pages. If you are unable to access your ISPs home page, enter your ISPs Domain Name into the OnePage Setup to enable all computers in your LAN access to it. If you only want to allow computers to access these home pages, open the TCP/IP Properties window on these computers, click the DNS Configuration tab and enter your ISPs Domain Name in the Domain Name Search Suffix location. Client Side (Computers) Q: I cant browse in the Internet via the High-Performance Wireless Router A: Check the following:
Check that the LAN Link/ACT LED on the front panel is lit to indicate proper connection between the computer and the High-Performance Wireless Router.
Check if both ends of the network cable are properly connected.
Check that TCP/IP is installed on your computer. For Windows 95/98, use a MS-Dos prompt to run winipcfg (Ipconfig for Windows NT). Check that the computers IP Address is within the range of 192.168.1.2 ~ 192.168.1.254 and the Subnet Mask is 255.255.255.0. If you are using a fixed IP address, also check the Default Gateway IP Address and DNS address in More.
Check that the values as stated above are the same in Status Monitor).
- 52 -
Broadband Security Router User Guide Q: I get a time out error when I enter a URL or IP address. A: Check if other computers work. If they do, ensure the computers IP settings are correct (IP Address, Subnet Mask, Gateway IP Address and DNS). Then, check if the High-Performance Wireless Routers settings are correct. Q: What is the maximum number of IP Addresses the High-Performance Wireless Router can support?
A: The High-Performance Wireless Router can support up to 253 IP Addresses in the range of 192.168.1.2~192.168.1.254. Q: Where should the High-Performance Wireless Router be installed on the network?
A: In a typical environment, the High-Performance Wireless Router should be installed between the ADSL/Cable modem and your LAN. Connect the High-Performance Wireless Router to the Ethernet port of the ADSL/Cable modem, and connect your PCs to the RJ45 jack on the LAN side. Q: Does the High-Performance Wireless Router support IPX or AppleTalk?
A: No. The High-Performance Wireless Router was designed to provide a multiple user LAN with shared Internet access and supports only the TCP/IP Protocol. If your Novell or Apple system is configured with TCP/IP, the High-Performance Wireless Router can support them. Q: Does the High-Performance Wireless Router support 100Mb Ethernet?
A: Yes, the High-Performance Wireless Router supports both 10Mb & 100Mb Ethernet on the LAN side. Q: What is NAT and what is it used for?
A: The Network Address Translation (NAT) Protocol translates multiple IP Addresses on a private LAN into a single public IP Address that is accessible to the Internet. NAT not only provides the basis for multiple IP Address sharing but also adds to the LANs security since the multiple IP Addresses of LAN computers are never transmitted directly to the Internet. Q: How can High-Performance Wireless Router share single user account to multiple users?
A: High-Performance Wireless Router combines the following technologies to enable this function. Q: What operating systems does High-Performance Wireless Router series support?
A: High-Performance Wireless Router uses standard TCP/IP protocol, it can be operated as long as you have the TCP/IP protocol installed in your operating system
(For example: Windows 9x, Windows NT, Windows 2000, etc.) Q: Can I use multiple E-mail accounts if I use High-Performance Wireless
- 53 -
Broadband Security Router User Guide Router?
A: Yes, you can. Some people think having one Internet account mean that they can only have one E-mail account. However, E-mail is set by mailbox accounts and is different to the account you use to connect to your ISP. If you want more E-mail accounts, you should contact your ISP or you can browse the Internet to apply for a free E-mail account. Q: Can Internet users access LAN computers?
A: High-Performance Wireless Router uses NAT to router all in/out packets. All external users can only see the IP of the High-Performance Wireless Router but cannot access LAN computers. The LAN computers are well protected with the High-Performance Wireless Routers natural firewall. Q: When should I use DMZ host?
A: Enable DMZ host when you want to have unrestricted communication between your PC and the Internet, for example, playing Internet games (i.e. Ages of Empire) or having multimedia conferences (i.e. NetMeeting). Q: Does the High-Performance Wireless Router support PPTP of VPN packets pass through?
A: Yes. High-Performance Wireless Router supports single session PPTP pass through. Q: Does the High-Performance Wireless Router series support IPsec?
Yes. High-Performance Wireless Router supports single session IPsec pass through.
- 54 -
Broadband Security Router User Guide Appendix A: Technical Specifications Standards Compliance IEEE 802.3 10BASE-T IEEE 802.3u 100BASE-TX IEEE 802.11b Wireless Interface One 10/100Mbps Ethernet/Fast Ethernet RJ45 port on WAN Four 10/100Mbps auto-sensing Ethernet RJ-45 One Wireless Access Point Management Web-based UI Management LED Display Power DIAG WLAN Enable/Activity WAN and LAN port(s) Link/Activity Environment Operation Temperature: 0 ~ 40 degrees C (32 ~ 104 degrees F) Storage Temperature: -20 ~ 60 degrees C (-4 ~ 140 degrees F) Humidity: Operating 10 ~ 85% non-condensing Storage 5% to 90% Non-Condensing Dimension 87 (L) x 150 (W) x 30 (H) mm (3.4 x 5.9 x 1.18 in) Power External, DC 12V, 1A
- 55 -
Broadband Security Router User Guide Mounting Desktop Wall-mounting
- 56 -
Broadband Security Router User Guide Appendix B: Glossary 10Base-T / 100Base-T The adaptation of the Ethernet standard for Local Area Networks (LANs). 10Base-T uses a twisted pair cable with maximum lengths of 100 meters and transmits data at 10Mbps maximum. 100Base-T is similar, but uses two different twisted pair configurations and transmits at 100Mbps maximun. Ad-hoc Network Also known as the peer-to-peer network, an ad-hoc network allows all PCs participating in a wireless network and being within range, to communicate with each other. Users in the same ad-hoc network can share files, printers, and other network resources. Adapter A device that makes the connection to a network segment such as Ethernet, modem cards and adapters. ADSL Asymmetric Digital Subscriber Line (ADSL), as its name indicates, is an asymmetrical data trasmission technology with higher traffic rate downstream and lower traffic rate upstream. ADSL technology satisfies the bandwidth requirements of applications which demand asymmetric traffic, such as web surfing, file downloads and telecommuting. Bandwidth The amount of data that can be transmitted in a fixed amount of time. Browser A software application used to locate and display Web pages. Examples include Netscape Navigator and Microsoft Internet Explorer. BSS BSS is the acronym of Basic Service Set that consists of a wireless access point and a group of wireless client PCs.
- 57 -
Broadband Security Router User Guide Communication Protocols Communication between devices requires they agree on the format in which the data is to be transmitted, sent and received. The communications protocols are a set of rules that define the data format. Cookie A Cookie is a piece of data stored on your PC while a web server can retrieve late to identify your machine. It is normally a text with ID number, but cab include other information. DHCP DHCP, short for Dynamic Host Configuration Protocol, is a protocol for assigning dynamic IP Addresses to devices on a network. Dynamic Addressing means that a device can have a different IP Address each time it connects to the network. It can save a lot of IP configuration. This protocol is supported by Windows 95/NT, Mac OS, and many other popular OS. Domain Name A name that identifies one or more IP Addresses. For example, the domain name microsoft.com represents about a dozen IP Addresses. Domain names are used in URLs to identify particular Web pages. For example, in the URL http://www.pcwebopedia.com/index.html, the domain name is pcwebopedia.com. DoS DoS is the abbreviation for Denial of Service. This occurs when a computer or network is overwhelmed to the point that it can no longer function normally. For example, a hacker may use fake IP addresses to accumulate numerious connections to flood the server he wants to attack. DDNS DDNS is an acronym for Dynamic Domain Name Service. It helps map the domain name of a host which has a dynamic public IP address to the IP address that in allocated each time the ISP assigns a new IP address. DNS Short for Domain Name Server, DNS translates domain names into IP Addresses and helps us recognize and remember domain names as they are alphabetic in form. The Internet actually runs on numbered IP Addresses. DNS servers translate domain names
- 58 -
Broadband Security Router User Guide into their respective IP Addresses. Addressing systems using Domain name, like www.yahoo.com, is easier to use than an IP address, such as 204.71.177.70. DSSS Also known as Direct Sequence Spread Spectrum, it is a radio transmission method that continuously changes frequencies. Ethernet One of the most common Local Area Network (LAN) protocols. Ethernet uses a bus topology which supports a data transfer rate of 10 Mbps. ESS ESS is an acronym for Extend Service Set that consists of several BSSs. Firewall A security system used to enforce an access control policy between an organisations networks and the Internet. IEEE Short for Institute of Electrical and Electronics Engineers, an organization best known for developing standards for the computer and electronics industry. Internet A global network connecting millions of computers for the exchange of data, news and opinions. Intranet A network based on the TCP/IP Protocol (an internet) belonging to an organization, and accessible only by that organization's members, employees, or others with authorization. Infrastructure Network Unlike Aad-hoc network, where users on a wireless LAN send data to each other directly, users on an Infrastructure network send data to the other point through a dedicated access point. Additionally, the access point enables users on a wireless LAN
- 59 -
Broadband Security Router User Guide to access an existing wired network to take advantage of sharing the wired networks resources, such as files, printers, and Internet access. IP Address An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP Protocol route messages based on the IP Address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be from zero to 255. IPSec Internet Protocol Security is a security standard for network transmission. It provides authentication and packet encryption over the Internet. ISP Short for Internet Service Provider, a company that provides access to the Internet, usually for a monthly fee. The ISP provides a software package, username, password and access phone number allowing users to log on to the Internet, browse the World Wide Web and send and receive e-mail. Local Area Network (LAN) A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide area network (WAN) MAC Address Short for Media Access Control Address and in a hardware address that uniquely identifies each node of a network. NAT Short for Network Address Translation, a routing protocol that allows global IP Addresses to be translated into multiple private IP Addresses for use on internal LAN networks. The explosion in the use of the Internet has created a critical problem for the Internet Assigned Numbers Authority (IANA) which is in charge of assigning IP Addresses to Internet users, ISPs etc.. NAT is a technology that has been introduced to help maximize the utilization of assigned IAN and global IP Addresses. Briefly, NAT is a technology which can create a private network domain behind a public IP. It is usually used as a firewall. It can also be used when there are not enough IP Address.
- 60 -
Broadband Security Router User Guide Network Protocol Network protocols encapsulate and forward data packets from one interface to another. PAP/CHAP ISP Short for Password Authentication Protocol and Challenge Handshake Authentication Protocol. Most ISPs use either one for user identification. If your ISP doesnt support these two protocols, contact your ISP for an authentication script. PPP Short for Point-to-Point Protocol, a communications protocol for transmitting information over standard telephone lines between devices from different manufacturers. PPPoE Short for PPP over Ethernet, relying on two widely accepted standards, Ethernet and the Point-to-Point Protocol. Its a communications protocol for transmitting information between devices from different manufacturers over an Ethernet. PPTP Short for Point to Point Tunneling Protocol, PPTP encapsulates the packet for transmission over the Internet. It is similar to creating a private tunnel over a large public network and has almost equal security to a private network without actually leasing a private line. Protocol An agreed format for transmitting, sending and receiving data between two devices. Roaming The ability for a wireless device moving from one access poins range to another without losing the connection. Router An Internet device that requests for information to other routers until the informations location is found and the data can be transmitted back to the origin of the request.
- 61 -
Broadband Security Router User Guide SPI SPI is an acronym for Stateful Packet Inspection. The SPI engine examines not just the headers of the packet, but also the packet contents, it can then determine more about the packet than just its source and destination information. Moreover, stateful inspection firewalls also close off ports until a connection to the specific port is requested. TCP/IP Short for Transmission Control Protocol and Internet Protocol, the suite of communications protocols that enable hosts on the Internet to connect and exchange streams of data. VPN VPN is an acronym for Virtual Private Network. Via access control and encryption, VPN brings the same security to data transmission through the Internet as if it being transmitted through a private network. It not only takes advantage of economies of scale but also ensures high level security while the packet is sent over the large public network. Wide Area Network (WAN) A system of LANs being connected by telephone lines and radio waves. Although someWANs may be privately owned, they are usually considered a means of public access. WEP An acronym for Wired Equivalent Privacy. It is an encryption mechanism used to protect your wireless data communications. WEP uses a combination of 64-bit/128-bit keys to encrypt data that is transmitted between all points in a wireless network to insure data security. It is described in the IEEE 802.11 standard.
- 62 -
FCC Caution 1. The device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions:
(1)This device may not cause harmful interference.
(2)This device must accept any interference received, including interference that may cause undesired operation. 2. FCC RF Radiation Exposure Statement: The equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. 3. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 4. Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2003-08-12 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2003-08-12
|
||||
1 | Applicant's complete, legal business name |
CyberTAN Technology Inc.
|
||||
1 | FCC Registration Number (FRN) |
0008910655
|
||||
1 | Physical Address |
No. 99, Park Avenue III
|
||||
1 |
Hsinchu, N/A 308
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
k******@emcc.de
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
N89
|
||||
1 | Equipment Product Code |
WR214C
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
C******** K****
|
||||
1 | Title |
Director
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
c******@cybertan.com.tw
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Wireless Broadband Router | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Compliance Certification Services Inc.
|
||||
1 | Name |
P****** L********
|
||||
1 | Telephone Number |
886-3********
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
p******@itri.org.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CE | 2412.00000000 | 2462.00000000 | 0.3190000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC