all | frequencies |
|
|
|
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|---|---|---|
manuals | photos | labels |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual | Users Manual | 1.44 MiB | August 03 2011 | |||
1 2 |
|
UserMan | Users Manual | 2.18 MiB | May 24 2012 | |||
1 2 |
|
Internal Photos | Internal Photos | 822.85 KiB | August 03 2011 | |||
1 2 |
|
External Photos | External Photos | 416.75 KiB | August 03 2011 | |||
1 2 |
|
Label Loc | ID Label/Location Info | 26.14 KiB | May 24 2012 | |||
1 2 |
|
Label Smpl | ID Label/Location Info | 476.24 KiB | May 24 2012 | |||
1 2 |
|
Label and Location 1 | ID Label/Location Info | 784.20 KiB | August 03 2011 | |||
1 2 |
|
Label and Location 2 | ID Label/Location Info | 778.42 KiB | August 03 2011 | |||
1 2 |
|
Confidential | Cover Letter(s) | 37.95 KiB | May 24 2012 | |||
1 2 |
|
Coverletter-Description of Change | Cover Letter(s) | 17.13 KiB | May 24 2012 | |||
1 2 |
|
Power of Attorney Letter | Cover Letter(s) | 25.86 KiB | May 24 2012 | |||
1 2 | Schem | Schematics | May 24 2012 | confidential | ||||
1 2 |
|
TSup | Test Setup Photos | 398.34 KiB | May 24 2012 | |||
1 2 |
|
Test Rpt | Test Report | 284.86 KiB | May 24 2012 | |||
1 2 |
|
Attestation Statement Ad Hoc Declaration | Attestation Statements | 29.89 KiB | August 03 2011 | |||
1 2 | Block Diagram | Block Diagram | March 08 2011 | confidential | ||||
1 2 |
|
Confidentiality Request | Cover Letter(s) | 37.59 KiB | August 03 2011 | |||
1 2 |
|
Cover Letter Agent Authorization | Cover Letter(s) | 25.57 KiB | August 03 2011 | |||
1 2 |
|
Operational Description | Operational Description | 13.69 KiB | August 03 2011 | |||
1 2 |
|
RF Exposure Info | RF Exposure Info | 36.29 KiB | August 03 2011 | |||
1 2 | Schematics | Schematics | March 08 2011 | confidential | ||||
1 2 |
|
Test Report | Test Report | 665.23 KiB | August 03 2011 | |||
1 2 |
|
Test Setup Photos | Test Setup Photos | 278.18 KiB | August 03 2011 |
1 2 | User Manual | Users Manual | 1.44 MiB | August 03 2011 |
NETGEAR N300 Wireless Router JWNR2000v2 User Manual NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA 202-10785-01 March 2011 v1.0 2011 by NETGEAR, Inc. All rights reserved. Product Registration, Support, and Documentation Register your product at http://www.netgear.com/register. Registration is required before you can use our telephone support service. Product updates and Web support are always available at http://www.netgear.com/support. Setup documentation is available on the CD, on the support website, and on the documentation website. When the wireless router is connected to the Internet, click the Knowledge Base or the Documentation link under Web Support on the main menu to view support information. Trademarks NETGEAR and the NETGEAR logo are registered trademarks, and RangeMax and Smart Wizard are trademarks of NETGEAR. Inc. in the United States and/or other countries. Microsoft, Windows, and Windows NT are registered trademarks and Windows Vista is a trademark of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. Certificate of the Manufacturer/Importer It is hereby certified that the N300 Wireless Router Model JWNR2000v2 has been suppressed in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions. Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Besttigung des Herstellers/Importeurs Es wird hiermit besttigt, da das N300 Wireless Router Model JWNR2000v2 gem der im BMPT-AmtsblVfg 243/
1991 und Vfg 46/1992 aufgefhrten Bestimmungen entstrt ist. Das vorschriftsmige Betreiben einiger Gerte (z.B. Testsender) kann jedoch gewissen Beschrnkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung. Das Bundesamt fr Zulassungen in der Telekommunikation wurde davon unterrichtet, da dieses Gert auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfllung der Vorschriften hin zu berprfen. Regulatory Compliance Information This section includes user requirements for operating this product in accordance with National laws for usage of radio spectrum and operation of radio devices. Failure of the end-user to comply with the applicable requirements may result in unlawful operation and adverse action against the end-user by the applicable National regulatory authority. ii v1.0, March 2011 NOTE: This product's firmware limits operation to only the channels allowed in a particular Region or Country. Therefore, all options described in this user's guide may not be available in your version of the product. Europe EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC:
EN 60950-1: 2001 Safety of information technology equipment EN 300 328 V1.7.1 (2006-10) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using wide band modulation techniques;
Harmonized EN covering essential requirements under article 3.2 of the R&TTE Directive EN 301 489-17 V1.2.1 (2002-08) and EN 301 489-1 V1.4.1 (2002-08) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions:
In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services. This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 - 2483.5 MHz. For detailed information the end-user should contact the national spectrum authority in France. esky
[Czech]
Dansk
[Danish]
Deutsch
[German]
Eesti
[Estonian]
English Espaol
[Spanish]
[NETGEAR Inc.] tmto prohlauje, e tento [JWNR2000] je ve shode se zkladnmi poadavky a dalmi prslunmi ustanovenmi smernice 1999/5/ES. Undertegnede [NETGEAR Inc.] erklrer herved, at flgende udstyr [JWNR2000]
overholder de vsentlige krav og vrige relevante krav i direktiv 1999/5/EF. Hiermit erklrt [NETGEAR Inc.], dass sich das Gert [JWNR2000] in bereinstimmung mit den grundlegenden Anforderungen und den brigen einschlgigen Bestimmungen der Richtlinie 1999/5/EG befindet. Kesolevaga kinnitab [NETGEAR Inc.] seadme [JWNR2000] vastavust direktiivi 1999/
5/E phinuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele stetele. Hereby, [NETGEAR Inc.], declares that this [JWNR2000] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Por medio de la presente [NETGEAR Inc.] declara que el [JWNR2000] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. v1.0, March 2011 iii E
[Greek]
Franais
[French]
Italiano
[Italian]
Latviski
[Latvian]
[NETGEAR Inc.] [JWNR2000]
1999/5/. Par la prsente [NETGEAR Inc.] dclare que l'appareil [JWNR2000] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Con la presente [NETGEAR Inc.] dichiara che questo [JWNR2000] conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar o [NETGEAR Inc.] deklar, ka [JWNR2000] atbilst Direktvas 1999/5/EK btiskajm prasbm un citiem ar to saisttajiem noteikumiem. Lietuvi
[Lithuanian]
iuo [NETGEAR Inc.] deklaruoja, kad is [JWNR2000] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Nederlands
[Dutch]
Hierbij verklaart [NETGEAR Inc.]. dat het toestel [JWNR2000] in overeenstemming is met de essentile eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
Hawnhekk, [NETGEAR Inc.], jiddikjara li dan [JWNR2000] jikkonforma mal-htigijiet essenzjali u ma provvedimenti ohrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. Alulrott, [NETGEAR Inc.] nyilatkozom, hogy a [JWNR2000] megfelel a vonatkoz alapvet kvetelmnyeknek s az 1999/5/EC irnyelv egyb elrsainak. Niniejszym [NETGEAR Inc.] owiadcza, e [JWNR2000] jest zgodny z zasadniczymi wymogami oraz pozostaymi stosownymi postanowieniami Dyrektywy 1999/5/EC. Portugus
[Portuguese]
[NETGEAR Inc.] declara que este [JWNR2000] est conforme com os requisitos essenciais e outras disposies da Directiva 1999/5/CE. Slovensko
[Slovenian]
[NETGEAR Inc.] izjavlja, da je ta [JWNR2000] v skladu z bistvenimi zahtevami in ostalimi relevantnimi doloili direktive 1999/5/ES. Slovensky
[Slovak]
Suomi
[Finnish]
Svenska
[Swedish]
[NETGEAR Inc.] tmto vyhlasuje, _e [JWNR2000] spa zkladn po_iadavky a vetky prslun ustanovenia Smernice 1999/5/ES.
[NETGEAR Inc.] vakuuttaa tten ett [JWNR2000] tyyppinen laite on direktiivin 1999/5/
EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen. Hrmed intygar [NETGEAR Inc.] att denna [JWNR2000] str I verensstmmelse med de vsentliga egenskapskrav och vriga relevanta bestmmelser som framgr av direktiv 1999/5/EG. iv v1.0, March 2011 FCC Requirements for Operation in the United States Federal Communications Commission (FCC) Compliance Notice:
Radio Frequency Notice: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. (Example - use only shielded interface cables when connecting to computer or peripheral devices). Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The antennas used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. FCC Information to User This product does not contain any user serviceable components and is to be used with approved antennas only. Any product changes or modifications will invalidate all applicable regulatory certifications and approvals. FCC Guidelines for Human Exposure This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance of 20 cm between the radiator and your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. FCC Declaration Of Conformity We NETGEAR, Inc., 350 East Plumeria, San Jose, CA 95134, declare under our sole responsibility that N300 Wireless Router Model JWNR2000v2 complies with Part 15 of FCC Rules. Operation is subject to the following two conditions:
v1.0, March 2011 v This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation. FCC Radio Frequency Interference Warnings & Instructions This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following methods:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an electrical outlet on a circuit different from that which the radio receiver is connected. Consult the dealer or an experienced radio/TV technician for help. N300 Wireless Router Model JWNR2000v2 Tested to Comply with FCC Standards FOR HOME OR OFFICE USE Modifications made to the product, unless expressly approved by NETGEAR, Inc., could void the user's right to operate the equipment. Industry Canada (IC) This Class B digital apparatus complies with Canadian ICE-003. Cet appareil numrique de la classe B est conforme la norme NMB-003 du Canada. To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing. Operation is subject to the following two conditions,
(1)
(2) this device may not cause interference and this device must accept any interference, including interference that may cause undesired operation of the device. Maximum Wireless Signal Rate Derived from IEEE Standard 802.11 Specifications Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. vi v1.0, March 2011 Product and Publication Details Model Number:
Publication Date:
Product Family:
Product Name:
Home or Business Product:
Language:
Publication Part Number:
JWNR2000v2 March 2011 Wireless Router N300 Wireless Router Model JWNR2000v2 Home English 202-10785-01 v1.0, March 2011 vii viii v1.0, March 2011 Contents About This Manual Conventions, Formats, and Scope ................................................................................... xi How to Print This Manual .................................................................................................xii Revision History ...............................................................................................................xiii Chapter 1 Configuring Basic Connectivity Using the Setup Manual .................................................................................................1-1 Logging In To Your Wireless Router ...............................................................................1-2 Configuring Your Internet Connection Using the Smart Setup Wizard ...........................1-5 Viewing and Configuring Basic ISP Settings ..................................................................1-5 Setting Up and Testing Basic Wireless Connectivity ....................................................1-10 Chapter 2 Safeguarding Your Network Choosing Appropriate Wireless Security ........................................................................2-1 Recording Basic Wireless Settings Setup Information ...................................................2-5 Changing Wireless Security Settings .............................................................................2-6 Viewing Basic Wireless Settings ..............................................................................2-6 Configuring WEP Wireless Security .........................................................................2-9 Configuring WPA-PSK and WPA2-PSK Wireless Security ....................................2-10 Viewing Advanced Wireless Settings ...........................................................................2-12 Using Push 'N' Connect (Wi-Fi Protected Setup) .........................................................2-13 Push Button Configuration .....................................................................................2-14 Security PIN Entry ..................................................................................................2-15 Configuring the WPS Settings ................................................................................2-17 Connecting Additional Wireless Client Devices after WPS Setup ..........................2-18 Restricting Wireless Access by MAC Address .............................................................2-19 Changing the Administrator Password .........................................................................2-21 Backing Up Your Configuration .....................................................................................2-22 Understanding Your Firewall .........................................................................................2-23 v1.0, March 2011 vii NETGEAR N300 Wireless Router JWNR2000v2 User Manual Chapter 3 Restricting Access From Your Network Content Filtering Overview .............................................................................................3-1 Blocking Access to Internet Sites ...................................................................................3-1 Blocking Access to Internet Services .............................................................................3-3 Blocking Services by IP Address Range ..................................................................3-5 Scheduling Blocking .......................................................................................................3-5 Viewing Logs of Web Access or Attempted Web Access ...............................................3-6 Configuring E-mail Alert and Web Access Log Notifications ..........................................3-7 Setting the Time Zone ....................................................................................................3-9 Chapter 4 Customizing Your Network Settings Using the LAN IP Setup Options ....................................................................................4-1 Configuring a Device Name .....................................................................................4-2 Configuring LAN TCP/IP Setup Parameters ............................................................4-3 Using the Router as a DHCP Server ........................................................................4-4 Using Address Reservation ......................................................................................4-5 Using a Dynamic DNS Service .......................................................................................4-6 Configuring the WAN Setup Options ..............................................................................4-8 Disabling the SPI Firewall ........................................................................................4-8 Setting Up a Default DMZ Server .............................................................................4-8 Responding to a Ping on the Internet (WAN) Port ...................................................4-9 Setting the MTU Size ...............................................................................................4-9 Configuring NAT Filtering .......................................................................................4-10 Configuring Static Routes .............................................................................................4-10 Wireless Repeating (Also Called WDS) .......................................................................4-12 Wireless Repeating Function .................................................................................4-13 Setting Up the Base Station ...................................................................................4-14 Setting Up a Repeater Unit ....................................................................................4-15 viii Contents v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Chapter 5 Fine-Tuning Your Network Allowing Inbound Connections to Your Network .............................................................5-1 How Your Computer Accesses a Remote Computer through Your Router ..............5-2 How Port Triggering Changes the Communication Process ....................................5-3 How Port Forwarding Changes the Communication Process ..................................5-5 How Port Forwarding Differs from Port Triggering ...................................................5-6 Configuring Port Forwarding to Local Servers ................................................................5-6 Adding a Custom Service .........................................................................................5-7 Editing or Deleting a Port Forwarding Entry .............................................................5-9 Configuring Port Triggering ...........................................................................................5-10 Using Universal Plug and Play .....................................................................................5-14 Optimizing Wireless Performance ................................................................................5-15 Changing the MTU Size ...............................................................................................5-16 Quality of Service .........................................................................................................5-18 Using WMM QoS for Wireless Multimedia Applications .........................................5-18 Configuring QoS for Internet Access ......................................................................5-18 Overview of Home and Small Office Networking Technologies ....................................5-24 Assessing Your Speed Requirements ....................................................................5-25 Chapter 6 Using Network Monitoring Tools Viewing Wireless Router Status Information ...................................................................6-2 Viewing a List of Attached Devices .................................................................................6-7 Managing the Configuration File .....................................................................................6-7 Backing Up and Restoring the Configuration ...........................................................6-8 Erasing the Configuration .........................................................................................6-9 Updating the Router Firmware .......................................................................................6-9 Checking for New Firmware in the Router Upgrade Screen ..................................6-10 Updating Manually to New Router Firmware ......................................................... 6-11 Enabling Remote Management Access .......................................................................6-13 Chapter 7 Troubleshooting Quick Tips .......................................................................................................................7-1 Troubleshooting Basic Functions ....................................................................................7-2 Login Problems ...............................................................................................................7-4 Contents ix v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Checking the Internet Service Connection .....................................................................7-5 Obtaining an Internet IP Address .............................................................................7-5 Troubleshooting PPPoE ...........................................................................................7-6 Troubleshooting Internet Browsing ..........................................................................7-7 Troubleshooting Your Network Using the Ping Utility .....................................................7-8 Testing the LAN Path to Your Router .......................................................................7-8 Testing the Path from Your Computer to a Remote Device .....................................7-9 Problems with Date and Time .........................................................................................7-9 Problems with Wireless Adapter Connections ..............................................................7-10 Restoring the Default Configuration and Password ...................................................... 7-11 Appendix A Technical Specifications Default Configuration Settings ....................................................................................... A-1 General Specifications ................................................................................................... A-3 Appendix B Related Documents Index x Contents v1.0, March 2011 About This Manual The user manual provides information for configuring the features of the NETGEAR N300 Wireless Router Model JWNR2000v2 beyond initial configuration settings. Initial configuration instructions can be found in the NETGEAR Wireless Router Setup Manual. You should have basic to intermediate computer and Internet skills. Conventions, Formats, and Scope The conventions, formats, and scope of this manual are described in the following paragraphs:
Typographical conventions. This manual uses the following typographical conventions:
Italic Bold Fixed Italic Emphasis, books, CDs User input, GUI screen text Command prompt, CLI text, code URL links Formats. This manual uses the following formats to highlight special messages:
Note: This format is used to highlight information of importance or special interest. Tip: This format is used to highlight a procedure that will save time or resources. Warning: Ignoring this type of note might result in a malfunction or damage to the equipment, a breach of security, or a loss of data. v1.0, March 2011 xi NETGEAR N300 Wireless Router JWNR2000v2 User Manual Danger: This is a safety warning. Failure to take heed of this notice might result in personal injury or death. Scope. This manual is written for the JWNR2000v2 router according to these specifications:
Product Version Manual Publication Date N300 Wireless Router Model JWNR2000v2 March 2011 For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR website in Appendix B, Related Documents. Note: Product updates are available on the NETGEAR, Inc. website at http://www.netgear.com/support. How to Print This Manual To print this manual, your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe Web site at http://www.adobe.com. Tip: If your printer supports printing two pages on a single sheet of paper, you can save paper and printer ink by selecting this feature. xii v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Revision History NETGEAR, Inc. is constantly searching for ways to improve its products and documentation. The following table indicates any changes that might have been made since the JWNR2000v2 router was introduced. Table 2-1. Publication Revision History Part Number 202-10785-01 Version Number 1.0 Date Description March 2011 First publication. v1.0, March 2011 xiii NETGEAR N300 Wireless Router JWNR2000v2 User Manual xiv v1.0, March 2011 Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration of your wireless router using the Resource CD as described in the NETGEAR Wireless Router Setup Manual, these settings are specified automatically for you. This chapter provides further details about these connectivity settings, as well as instructions on how to log in to the router for further configuration. Note: NETGEAR recommends using the Smart Wizard on the Resource CD for initial configuration, as described in the NETGEAR Wireless Router Setup Manual. This chapter includes the following sections:
Using the Setup Manual on page 1-1 Logging In To Your Wireless Router on page 1-2 Configuring Your Internet Connection Using the Smart Setup Wizard on page 1-5 Configuring Your Internet Connection Using the Smart Setup Wizard on page 1-5 Viewing and Configuring Basic ISP Settings on page 1-5 Setting Up and Testing Basic Wireless Connectivity on page 1-10 Using the Setup Manual For first-time installation of your wireless router, refer to the NETGEAR Wireless Router Setup Manual. The Setup Manual explains how to launch the NETGEAR Smart Wizard on the Resource CD to step you through the procedure to connect your router, modem, and computers. The Smart Wizard will assist you in configuring your wireless settings and enabling wireless security for your network. After initial configuration using the Setup Manual, you can use the information in this User Manual to configure additional features of your wireless router. For installation instructions in a language other than English, refer to the language options on the Resource CD. v1.0, March 2011 1-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Logging In To Your Wireless Router When the wireless router is connected to your network, you can access and configure the router using your browser. To access the router:
1. Connect to the wireless router by typing http://www.routerlogin.net in the address field of your browser, and then press Enter. A login window displays. Figure 1-1 Tip: You can connect to the wireless router by typing either of these URLs in the http://www.routerlogin.net http://www.routerlogin.com address field of your browser, and then pressing Enter:
If these URLs do not work, you must type the IP address of the router, for example, http://www.192.168.1.1. 2. Enter admin for the router user name and your password (or the default, password). For information about how to change the password, see Changing the Administrator Password on page 2-21. Note: The router user name and password are not the same as any other user name or password you might use to log in to your Internet connection. 1-2 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual The Checking for Firmware Updates screen appears unless you previously cleared the Check for Updated Firmware Upon Log-in check box. Figure 1-2 If the router discovers a newer version of firmware, the message on the left displays when you log in. If no new firmware is available, the message on the right displays. Figure 1-3 To automatically update to the new firmware, click Yes to allow the router to download and install the new firmware file from NETGEAR. Warning: When uploading firmware to the JWNR2000v2 router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The update process typically takes about 1 minute. Configuring Basic Connectivity 1-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. In the main menu on the left, select Basic Settings under Setup. The Basic Settings screen displays showing the wireless routers home page and suggested default settings. Figure 1-4 Note: If the Check for New Version Upon Log-in check box is selected, the home page is the Router Upgrade screen. Otherwise, it is the Basic Settings screen. If the wireless router is connected to the Internet, you can select Knowledge Base under Web Support in the main menu to view support information for the wireless router. If you do not click Logout, the wireless router will wait for 5 minutes after no activity before it automatically logs you out. 1-4 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring Your Internet Connection Using the Smart Setup Wizard You can manually configure your Internet connection using the Basic Settings screen, or you can allow the Smart Setup Wizard to determine your Internet Service Provider (ISP) configuration. The Smart Setup Wizard searches your Internet connection for servers and protocols to determine your ISP configuration. To use the Smart Setup Wizard to assist with configuration or to verify the Internet connection settings:
1. Select Setup Wizard from the top of the main menu. 2. Click Next to proceed. Enter your ISP settings, as needed. 3. At the end of the Setup Wizard, click Test to verify your Internet connection. If you have trouble connecting to the Internet, see Chapter 7, Troubleshooting. Viewing and Configuring Basic ISP Settings Settings related to your Internet service are specified in the Basic Settings screen. Select Basic Settings under Setup in the main menu. The content you see in the Basic Settings screen depends on whether your ISP requires that you log in with a user name and password for Internet access. No login required by ISP. If no login is required by your ISP, the following settings appear in the Basic Settings screen. Configuring Basic Connectivity 1-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual ISP does not require login Figure 1-5 Account Name (might also be called Host Name). The account name is provided to the ISP during a DHCP request from your router. In most cases, this setting is not required, but some ISPs require it for access to ISP services such as mail or news servers. Domain Name. The domain name is provided by your router to computers on your LAN when the computers request DHCP settings from your router. In most cases, this settings is not required. 1-6 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Internet IP Address. Determines how your router obtains an IP address for Internet access. If your ISP assigns an IP address dynamically (by DHCP), select Get Dynamically From ISP. If your ISP has assigned you a permanent, fixed (static) IP address for your computer, select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter the subnet mask and the gateway IP address. The gateway is the ISPs router to which your router will connect. Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISPs primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect. Router MAC Address. This section determines the Ethernet MAC address that the router will use on the Internet port. Typically, you would leave Use Default Address selected. However, some ISPs (especially cable modem providers) register the Ethernet MAC address of the network interface card in your computer when your account is first opened. They then accept only traffic from the MAC address of that computer. This feature allows your router to masquerade as that computer by cloning or spoofing its MAC address. To change the MAC address, select one of the following methods:
Select Use Computer MAC Address. The router will then capture and use the MAC address of the computer that you are now using. You must be using the one computer that is allowed by the ISP. Select Use This MAC Address, and enter it here. Configuring Basic Connectivity 1-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual If a login is required by your ISP, the following settings appear in the Basic Settings screen:
ISP does require login Figure 1-6 Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Yes, the Basic Settings screen displays. Note: After you finish setting up your router, you will no longer need to launch the ISPs login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in. Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. The list includes:
PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services 1-8 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Telstra Bigpond, an Australian residential cable modem service Note: The Telstra Bigpond setting is only for older cable modem service accounts still requiring a Bigpond login utility. Telstra has discontinued this type of account. Those with Telstra DSL accounts and newer cable modem accounts should select No for Does Your Internet Connection Require a Login. Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide. Figure 1-7 Note: Not all ISPs are listed here. The ones on this list have special requirements. Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server. Service Name. If your connection is capable of connecting to multiple Internet services, this setting specifies which service to use. Connection Mode. This drop-down list selects when the router will connect to and disconnect from the Internet. Figure 1-8 Configuring Basic Connectivity 1-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual The list includes:
Always On. The router logs in to the Internet immediately after booting and never disconnects. Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out. Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen. Idle Timeout. Your Internet connection is logged out if there is no data transfer during the specified time interval. Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISPs primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect. Setting Up and Testing Basic Wireless Connectivity Note: If you use a wireless computer to change wireless settings, you might be disconnected when you click Apply. Reconfigure your wireless adapter to match the new settings, or access the router from a wired computer to make any further changes. Follow these instructions to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs. 1-10 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 1. Select Wireless Settings under Setup in the main menu of the JWNR2000v2 router. Figure 1-9 2. For the wireless network name (SSID), use the default name, or choose a suitable descriptive name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is NETGEAR. Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear. Also, the SSID of any wireless access adapters must match the SSID you specify in the JWNR2000v2 router. If they do not match, you will not get a wireless connection to the JWNR2000v2 router. 3. Select the region in which the wireless interface will operate. Note: In North America, the region cannot be changed, and is set by default to US. 4. Set the channel. The default channel is Auto. Configuring Basic Connectivity 1-11 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Select a channel that is not being used by any other wireless networks within several hundred feet of your router. For more information about the wireless channel frequencies, click the link to the online document Wireless Networking Basics in Appendix B. 5. Make sure that the mode is set to Up to 145Mbps. 6. For Security Options, select None. 7. Click Apply to save your changes. Note: If you are configuring the router from a wireless computer and you change the routers SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the routers new settings. 8. Select Wireless Settings under Advanced in the main menu of the JWNR2000v2 router. Figure 1-10 9. Make sure that the Enable Wireless Router Radio, Enable SSID Broadcast, and Enable WMM check boxes are selected. 1-12 Configuring Basic Connectivity v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 10. Click Setup Access List. 11. Make sure that the Turn Access Control On check box is not selected. 12. Configure and test your wireless computer for wireless connectivity. Program the wireless adapter of your computer to have the same SSID and channel that you specified in the router, and disable encryption. Check that your computer has a wireless link and can obtain an IP address by DHCP from the router. Once your computer has basic wireless connectivity to the router, you can configure the advanced wireless security functions of the computer and router (for more information about security and these settings, see Chapter 2, Safeguarding Your Network ). Configuring Basic Connectivity 1-13 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 1-14 Configuring Basic Connectivity v1.0, March 2011 Chapter 2 Safeguarding Your Network The N300 Wireless Router Model JWNR2000v2 provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections:
Choosing Appropriate Wireless Security Recording Basic Wireless Settings Setup Information on page 2-5 Changing Wireless Security Settings on page 2-6 Viewing Advanced Wireless Settings on page 2-12 Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13 Restricting Wireless Access by MAC Address on page 2-19 Changing the Administrator Password on page 2-21 Backing Up Your Configuration on page 2-22 Understanding Your Firewall on page 2-23 Choosing Appropriate Wireless Security Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11g/n wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. v1.0, March 2011 2-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see Changing the Administrator Password on page 2-21. JWNR2000 Wireless data security options Range: up to 300 foot radius 1) Open system: easy but no security 2) MAC access list: no data security 3) WEP: security but some performance impact 4) WPA-PSK: strong security 5) WPA2-PSK: very strong security Note: Use these with other features that enhance security (Table 2-2 on page 2-4). Figure 2-1 To configure the wireless network, you can:
Manually specify your SSID and your wireless security settings. The JWNR2000v2 router provides two screens for configuring the wireless settings:
Wireless Settings. You access these under Setup in the main menu (see Viewing Basic Wireless Settings on page 2-6). Advanced Wireless Settings. You access these under Advanced in the main menu (see Viewing Advanced Wireless Settings on page 2-12). 2-2 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/
WPA2 security on both the router and the client device. If the clients in your network are WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/WPA2 security on both the router and the client device (see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13). Basic security options are listed in order of increasing effectiveness in Table 2-1. Other features that affect security are listed in Table 2-2 on page 2-4. For more details on wireless security methods, click the link to the online document Wireless Networking Basics in Appendix B. Table 2-1. Wireless Security Options Security Type None. WEP. Wired Equivalent Privacy. WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type. WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type. WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode. Description No wireless security. Recommended only for troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. Wired Equivalent Privacy (WEP) data encryption provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. For more information, see Configuring WEP Wireless Security on page 2-9. Wi-Fi Protected Access with Pre-Shared Key (WPA-
PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see Configuring WPA-PSK and WPA2-PSK Wireless Security on page 2-10. Safeguarding Your Network 2-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Table 2-2. Other Features That Enhance Security Security Type Disable the wireless router radio. Turn off the broadcast of the wireless network name SSID. Restrict access based on MAC address. Modify your firewalls rules. Use the WPS push button Connect feature (Wi-Fi Protected Setup). Description If you disable the wireless router radio, wireless devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see Viewing Advanced Wireless Settings on page 2-12. If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP, but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see Viewing Advanced Wireless Settings on page 2-12. You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the JWNR2000v2 router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see Restricting Wireless Access by MAC Address on page 2-19. By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewalls rules. For more information, see Understanding Your Firewall on page 2-23. Wi-Fi Protected Setup provides easy setup by means of a push button. Older wireless adapters and devices might not support this. Check whether devices are WPS enabled. For more information, see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 2-4 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Recording Basic Wireless Settings Setup Information Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided. Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is case-
sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In some configuration utilities (such as in Windows XP), the term wireless network name is used instead of SSID. If WEP Authentication is used, circle one: Open System, Shared Key, or Auto. Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key. WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key size must be the same for the wireless adapters and the wireless router. Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption keys. Whichever method you use, record the key values in the spaces provided. Passphrase Method. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method. Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10 hexadecimal digits (any combination of 09, af, or AF). For 128-bit WEP, enter 26 hexadecimal digits. Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ Key 4: ___________________________________ If WPA-PSK or WPA2-PSK authentication is used:
Safeguarding Your Network 2-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Passphrase. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase. Use the procedures described in the following sections to specify the JWNR2000v2 router. Store this information in a safe place. Changing Wireless Security Settings This section describes the wireless settings that you can view and configure in the Wireless Settings screen, which you access under Setup in the main menu. Viewing Basic Wireless Settings
:To specify the wireless security settings of your router:
1. Log in to the router as described in Logging In To Your Wireless Router on page 1-2. 2-6 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Select Wireless Settings under Setup in the main menu. The Wireless Settings screen displays. Figure 2-2 The available settings in this screen are:
Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The JWNR2000v2 default SSID is NETGEAR. You can disable this broadcast as described in Viewing Advanced Wireless Settings on page 2-12. Region. This field identifies the region where the JWNR2000v2 router can be used. It might not be legal to operate the wireless features of the wireless router in a region other than one of those identified in this field. Note: In North America, the region cannot be changed, and is set by default to US. Safeguarding Your Network 2-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Channel. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless network. The wireless router uses channel bonding technology to extend the bandwidth for data transmission. For more information about the wireless channel frequencies, see the online document that you can access from Wireless Networking Basics in Appendix B. Mode. This field determines which data communications protocol is used. You can choose from:
Up To 54 Mbps. Legacy mode, for compatibility with the slower 802.11b and 802.11g wireless devices. Up To 145 Mbps. Neighbor Friendly mode, for reduced interference with neighboring wireless networks. Provides two transmission streams with different data on the same channel at the same time, but also allows 802.11b and 802.11g wireless devices. This is the default mode. Up To 300 Mbps. Performance mode, using channel expansion to achieve the 300 Mbps data rate. The JWNR2000v2 router will use the channel you selected as the primary channel and expand to the secondary channel (primary channel +4 or 4) to achieve a 40 MHz frame-by-frame bandwidth. The JWNR2000v2 router will detect channel usage and will disable frame-by-frame expansion if the expansion would result in interference with the data transmission of other access points or clients. Note: The maximum wireless signal rate is derived from the IEEE Standard 802.11 specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. Security Options. The selection of wireless security options can significantly affect your network performance. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-
PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Instructions for configuring the security options can be found in Choosing Appropriate Wireless Security on page 2-1. A full explanation of wireless security standards is available in the online document that you can access from Wireless Networking Basics in Appendix B. 3. Click Apply to save your settings. 2-8 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring WEP Wireless Security WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. WEP offers the following options:
Automatic. With the Automatic option, the router will try both Open System and Shared Key authentication. Normally this setting is suitable. If it fails, select Open System or Shared Key. You can also refer to your wireless adapters documentation to see what method to use. Open System. With Open System authentication and 64 or 128 bit WEP data encryption, the JWNR2000v2 router does perform data encryption but does not perform any authentication. Anyone can join the network. This setting provides very little practical wireless security. Shared Key. With Shared Key authentication, a wireless device must know the WEP key to join the network. Select the encryption strength (64 or 128 bit data encryption). Manually enter the key values, or enter a word or group of printable characters in the Passphrase field. Manually entered keys are not case-sensitive, but passphrase characters are case-sensitive. To configure WEP data encryption:
Note: If you use a wireless computer to configure WEP settings, you will be disconnected when you click Apply. You must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired computer to make any further changes. Not all wireless adapter configuration utilities support passphrase key generation. 1. Select Wireless Settings under Setup in the main menu. 2. In the Security Options section, select WEP. The WEP options display. Safeguarding Your Network 2-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual
. Figure 2-3 3. Select the authentication type and encryption strength. 4. You can manually or automatically program the four data encryption keys. These values must be identical on all computers and access points in your network. Automatic. In the Passphrase field, enter a word or group of printable characters, and click Generate. The passphrase is case-sensitive. For example, NETGEAR is not the same as nETgear. The four key fields are automatically populated with key values. Manual. Enter 10 hexadecimal digits (any combination of 09, af, or AF). These entries are not case-sensitive. For example, AA is the same as aa. Select which of the four keys to activate. 5. Click Apply to save your settings. Configuring WPA-PSK and WPA2-PSK Wireless Security Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. Check whether newer drivers are available from the manufacturer. Also, you might be able to use the Push 'N' Connect feature to configure this type of security if it is supported by your wireless clients. See Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 2-10 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual WPAPre-Shared Key does perform authentication. WPA-PSK uses TKIP (Temporal Key Integrity Protocol) data encryption, and WPA2-PSK uses AES (Advanced Encryption Standard) data encryption. Both methods dynamically change the encryption keys making them nearly impossible to circumvent. Mixed mode allows clients using either WPA-PSK (TKIP) or WPA2-PSK (AES). This provides the most reliable security, and is easiest to implement, but it might not be compatible with older adapters. Note: Not all wireless adapters support WPA. Furthermore, client software is also required. Windows XP with Service Pack 2 does include WPA support. Nevertheless, the wireless adapter hardware and driver must also support WPA. For instructions on configuring wireless computers or PDAs (personal digital assistants) for WPA-PSK security, consult the documentation for the product you are using. To configure WPA-PSK, WPA2-PSK, or WPA-PSK+WPA2-PSK:
1. Select Wireless Settings under Setup in the main menu. The Wireless Settings screen displays. 2. Select one of the WPA-PSK or WPA2-PSK options for the security type. The third option
(WPA-PSK [TKIP] + WP2-PSK [AES]) is the most flexible, since it allows clients using either WPA-PSK or WPA2-PSK. In the Passphrase field, enter a word or group of 863 printable characters. The passphrase is case-sensitive. 3. Figure 2-4 Safeguarding Your Network v1.0, March 2011 2-11 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. Click Apply to save your settings. Viewing Advanced Wireless Settings This section describes the wireless settings that you can view and specify in the Advanced Wireless Settings screen, which you access under Advanced in the main menu. To configure the advanced wireless security settings of your router:
1. Log in to the router as described in Logging In To Your Wireless Router on page 1-2. 2. Select Wireless Settings under Advanced in the main menu. The advanced Wireless Settings screen displays Figure 2-5 The available settings in this screen are:
Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices cannot connect to the JWNR2000v2 router. If you will not be using your wireless network for a period of time, you can clear this check box and disable all wireless connectivity. Enable SSID Broadcast. Clear this check box to disable broadcast of the SSID, so that only devices that know the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network discovery feature of some products such as Windows XP. 2-12 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Enable WMM. Clear this check box to disable WMM. WMM (Wireless Multimedia), a subset of the 802.11e standard, allows wireless traffic to have a range of priorities, depending on the kind of data. Time-dependent information, like video or audio, will have a higher priority than normal traffic. For WMM to function correctly, Wireless clients must also support WMM. Fragmentation Threshold, CTS/RTS Threshold, and Preamble Mode. The Fragmentation Threshold, CTS/RTS Threshold, and Preamble Mode options are reserved for wireless testing and advanced configuration only. Do not change these settings. WPS Settings. For information about these settings, see the section, Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. Wireless Card Access List. For information about this list, see Restricting Wireless Access by MAC Address on page 2-19. Using WPS Push Button Connect (Wi-Fi Protected Setup) If your wireless clients support Wi-Fi Protected Setup (WPS), you can use this feature to configure the routers network name (SSID) and security settings and, at the same time, connect a wireless client securely and easily to the router. Look for the WPS push button on the rear panel of your client device. WPS automatically configures the network name (SSID) and wireless security settings for the router (if the router is in its default state) and broadcasts these settings to the wireless client. Note: NETGEARs WPS push button Connect feature is based on the Wi-Fi Protected Setup (WPS) standard (for more information, see http://www.wi-fi.org). All other Wi-Fi-certified and WPS-capable products should be compatible with NETGEAR products that implement Push 'N' Connect or WPS push button Connect. When you add wireless clients, whether or not they are WPS enabled, the added devices must share the same network name (SSID) and security passphrase. For more information, see Connecting Additional Wireless Client Devices after WPS Setup on page 2-18. Note: If you choose to use WPS, the only security methods supported are WPA-PSK and WPA2-PSK. WEP security is not supported by WPS. Safeguarding Your Network 2-13 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual The JWNR2000v2 router provides two methods for connecting to a wireless client that supports WPS, described in the following sections:
Push Button Configuration Security PIN Entry on page 2-15 Push Button Configuration There are two methods to enable a wireless client to join a network using a push button on the router: using the physical push button or using the software button in the Add WPS Client screen. Using the Physical Push Button 1. Press the WPS push button on the JWNR2000v2 router for over 5 seconds. The WPS LED begins to blink in a regular pattern. While the light is blinking, you have 2 minutes to enable WPS on the client that you are trying to connect to the router. 2. On the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The JWNR2000v2 routers WPS LED ceases blinking and remains on when one of these conditions occurs:
The router and the client establish a wireless connection. The 2-minute window period expires for establishing a WPS connection. If the connection is not established, no WPS security settings will be specified in the JWNR2000v2 router. Using the Software Button in the Add WPS Client Screen 1. Log in to the router as described in Logging In To Your Wireless Router on page 1-2. 2. Select Add WPS Client in the main menu, and click Next. 3. Select the Push Button setup method. Figure 2-6 2-14 v1.0, March 2011 Safeguarding Your Network NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. Click the button in the Add WPS Client screen. The Connecting to New Wireless Client screen displays. Figure 2-7 5. The WPS LED on the JWNR2000v2 router begins to blink in a regular pattern. While the button light is blinking, you have 2 minutes to enable WPS on the device you are trying to connect to the router. In the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The JWNR2000v2 routers WPS LED ceases blinking and remains on when one of these conditions occurs:
The router and the client establish a wireless connection. The 2-minute window period expires for establishing a WPS connection. If the connection is not established, no WPS security settings will be specified in the JWNR2000v2 router. Security PIN Entry There are two ways to enable a wireless client to join a network using a PIN: using the routers security PIN or using the wireless clients security PIN. Using the Routers Security PIN 1. Obtain your routers security PIN from the rear panel of the router or from the Advanced Wireless Settings screen. 2. On the wireless client, follow its specific networking instructions to enter the routers security PIN and to establish a wireless connection with the router. Using the Wireless Clients Security PIN 1. Log in to the router as described in Logging In To Your Wireless Router on page 1-2. Safeguarding Your Network 2-15 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Select Add WPS Client in the main menu, and click Next. 3. Select the PIN Number setup method. Figure 2-8 4. On the wireless client, obtain its security PIN, or follow its specific networking instructions to generate a client security PIN. In the Add WPS Client screen of the JWNR2000v2 router, enter the client security PIN in the Enter Clients PIN field. 5. 6. Click Next. The following screen displays, and the Smart Wizard initiates the wireless connection:
Figure 2-9 2-16 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring the WPS Settings 1. Log in to the router as described in Logging In To Your Wireless Router on page 1-2. 2. Select Wireless Settings under Advanced in the main menu. Figure 2-10 These options are available under WPS Settings:
Routers PIN. The PIN is displayed so that you can use it to configure the router through WPS (Wi-Fi Protected Setup). It is also displayed on the routers label. Disable Routers PIN. If the routers PIN is disabled, you cannot configure the routers wireless settings with WPS. However, if your settings are already configured, you can still add WPS-enabled wireless clients. The router might disable the PIN if it detects suspicious attempts to break into your wireless settings; this can happen if the check box is selected. You can enable the PIN by clearing the check box and clicking Apply. Keep Existing Wireless Settings. This check box is automatically selected after WPS is enabled to prevent unwanted settings changes, and is also selected if you have already specified wireless security settings or your SSID without using WPS. When this check box is not selected, adding a new wireless client using the push button or the Add WPS Client screen (see Push Button Configuration on page 2-14) changes the routers SSID and security passphrase. You might need to clear it if you are using certain registrars, such as for a Windows Vista PC, to configure the router through WPS. Safeguarding Your Network 2-17 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Connecting Additional Wireless Client Devices after WPS Setup You can add WPS-enabled and non-WPS-enabled client devices. Adding Additional WPS-Enabled Clients To add an additional wireless client device that is WPS enabled:
Note: Your wireless settings do not change when you add an additional WPS-enabled client unless you have cleared the Keep Existing Wireless Settings check box (in the Wireless Settings screen). If you do clear the check box, a new SSID and a passphrase are generated, and all existing connected wireless clients are disassociated and disconnected from the router. 1. Follow the procedures in Push Button Configuration on page 2-14 or Security PIN Entry on page 2-15. 2. For information about how to view a list of all devices connected to your router (including wireless and Ethernet-connected), see Viewing a List of Attached Devices on page 6-7. Adding Additional Non-WPS-Enabled Clients If you are connecting a combination of WPS-enabled clients and clients that are not WPS enabled, you cannot use the WPS setup procedures to add clients that are not WPS enabled. To connect both non-WPS-enabled and WPS-enabled clients to the JWNR2000v2 router:
1. Configure the settings of the JWNR2000v2 router (shown in the Wireless Settings screen) for WPA-PSK or WPA2-PSK security, and record that information. See Configuring WPA-PSK and WPA2-PSK Wireless Security on page 2-10. When you change security settings, all existing connected wireless clients that do not share those settings are disassociated and disconnected from the router. 2. For the non-WPS-enabled devices that you wish to connect, open the networking utility, and follow the utilitys instructions to enter security settings. 3. For the WPS-enabled devices that you wish to connect, follow the procedures in Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. The JWNR2000v2 router automatically preserves the settings you configured in step 1 so all clients share the same security settings (for more information, see Configuring the WPS Settings on page 2-17). 2-18 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. For information about how to view a list of all devices connected to your router (including wireless and Ethernet connected), see Viewing a List of Attached Devices on page 6-7. Restricting Wireless Access by MAC Address When a Wireless Card Access List is configured and enabled, the router checks the MAC address of any wireless device attempting a connection and allows only connections to computers identified on the trusted computers list. The Wireless Card Access List displays a list of wireless computers that you allow to connect to the router based on their MAC addresses. These wireless computers must also have the correct SSID and wireless security settings to access the wireless router. The MAC address is a network devices unique 12-character physical address, containing the hexadecimal characters 09, af, or AF only, and separated by colons (for example, 00:09:AB:CD:EF:01). It can usually be found on the bottom of the wireless card or network interface device. If you do not have access to the physical label, you can display the MAC address using the network configuration utilities of the computer. In WindowsXP, for example, typing the ipconfig/all command in an MSDOS command prompt window displays the MAC address as Physical Address. You might also find the MAC addresses in the routers Attached Devices screen. To restrict access based on MAC addresses:
1. Select Wireless Settings under Advanced in the main menu. 2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless Card Access List. Figure 2-11 Safeguarding Your Network 2-19 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. Click Add to add a wireless device to the wireless access control list. The Wireless Card Access Setup screen opens and displays a list of currently active wireless cards and their Ethernet MAC addresses. 4. Figure 2-12 If the computer you want appears in the Available Wireless Cards list, you can select the radio button of that computer to capture its MAC address; otherwise, you can manually enter a name and the MAC address of the authorized computer. You can usually find the MAC address on the bottom of the wireless device. Tip: You can copy and paste the MAC addresses from the routers Attached Devices screen into the MAC Address field of this screen. To do this, configure each wireless computer to obtain a wireless link to the router. The computer should then appear in the Attached Devices screen. 5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. 6. Repeat step 3 through step 5 for each additional device you want to add to the list. 2-20 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 7. Select the Turn Access Control On check box. Note: When configuring the router from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you lose your wireless connection when you click Apply. You must then access the wireless router from a wired computer or from a wireless computer that is on the access control list to make any further changes. 8. Click Apply to save your Wireless Card Access List settings. Now, only devices on this list can wirelessly connect to the JWNR2000v2 router. Warning: MAC address filtering adds an obstacle against unwanted access to your network by the general public. However, because your trusted MAC addresses appear in your wireless transmissions, an intruder can read them and impersonate them. Do not rely on MAC address filtering alone to secure your network. Changing the Administrator Password The default password for the routers Web Configuration Manager is password. NETGEAR recommends that you change this password to a more secure password. Tip: Before changing the router password, back up your configuration settings with the default password of password. If you save the settings with a new password, and then you later forget the new password, you will have to reset the router back to the factory defaults, and log in using the default password of password. This means you will have to re-enter all the router configuration settings. For information about how to back up your settings, see Backing Up and Restoring the Configuration on page 6-8. Safeguarding Your Network 2-21 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To change the administrator password:
1. On the main menu, under Maintenance, select Set Password to display the Set Password screen. Figure 2-13 2. To change the password, first enter the old password, then enter the new password twice. 3. Click Apply. Backing Up Your Configuration The configuration settings of the JWNR2000v2 router are stored within the router in a configuration file. You can back up (save) this file and retrieve it later. NETGEAR recommends that you save your configuration file after you complete the configuration. If the router fails or becomes corrupted, or an administrator password is lost, you can easily re-create your configuration by restoring the configuration file. For instructions on saving and restoring your configuration file, see Managing the Configuration File on page 6-7. Tip: Before saving your configuration file, change the administrator password to the default, password. Then change it again after you have saved the configuration file. If you save the file with a new password, and then you later forget the new password, you will have to reset the router back to the factory defaults and log in using the default password of password. This means you will have to re-enter all the router configuration settings. 2-22 Safeguarding Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Understanding Your Firewall Your N300 Wireless Router Model JWNR2000v2 contains a true firewall to protect your network from attacks and intrusions. A firewall is a device that protects one network from another while allowing communication between the two. Using a process called Stateful Packet Inspection, the firewall analyzes all inbound and outbound traffic to determine whether or not it will be allowed to pass through. By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewalls rules to achieve the following behavior:
Blocking sites. Block access from your network to certain Web locations based on Web addresses and Web address keywords. This feature is described in Blocking Access to Internet Sites on page 3-1. Blocking services. Block the use of certain Internet services by specific computers on your network. This feature is described in Blocking Access to Internet Services on page 3-3. Scheduled blocking. Block sites and services according to a daily schedule. This feature is described in Scheduling Blocking on page 3-5. Allow inbound access to your server. To allow inbound access to resources on your local network (for example, a Web server or remote desktop program), you can open the needed services by configuring port forwarding as described in Allowing Inbound Connections to Your Network on page 5-1. Allow certain games and applications to function correctly. Some games and applications need to allow additional inbound traffic in order to function. Port triggering can dynamically allow additional service connections, as described in Configuring Port Triggering on page 5-10. Another feature to solve application conflicts with the firewall is Universal Plug and Play (UPnP), described in Using Universal Plug and Play on page 5-14. Safeguarding Your Network 2-23 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2-24 Safeguarding Your Network v1.0, March 2011 Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the N300 Wireless Router Model JWNR2000v2 to protect your network. This chapter includes the following sections:
Content Filtering Overview Blocking Access to Internet Sites Blocking Access to Internet Services on page 3-3 Scheduling Blocking on page 3-5 Viewing Logs of Web Access or Attempted Web Access on page 3-6 Configuring E-mail Alert and Web Access Log Notifications on page 3-7 Setting the Time Zone on page 3-9 Content Filtering Overview The N300 Wireless Router Model JWNR2000v2 provides you with Web content filtering options, plus browser activity reporting and instant alerts through e-mail. Parents and network administrators can establish restricted access policies based on time of day, Web addresses, and Web address keywords. You can also block Internet access by applications and services, such as chat rooms or games. Blocking Access to Internet Sites The JWNR2000v2 router allows you to restrict access based on Web addresses and Web address keywords. Up to 255 entries are supported in the Keyword list. Keyword application examples:
If the keyword XXX is specified, the URL www.zzzyyqq.com/xxx.html is blocked. If the keyword .com is specified, only websites with other domain suffixes (such as .edu, .org, or .gov) can be viewed. v1.0, March 2011 3-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To block access to Internet sites:
1. Select Block Sites under Content Filtering in the main menu. The Block Sites screen displays. Figure 3-1 2. Enable keyword blocking by selecting either Per Schedule or Always. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see Scheduling Blocking on page 3-5. Block all access to Internet browsing during a scheduled period by entering a dot (.) as the keyword, and then set a schedule in the Schedule screen. 3. Add a keyword or domain by entering it in the keyword field and clicking Add Keyword. The keyword or domain name then appears the Block sites containing these keywords or domain names list. Delete a keyword or domain name by selecting it from the list and clicking Delete Keyword. 4. You can specify one trusted user, which is a computer that is exempt from blocking and logging. Specify a trusted user by entering that computers IP address in the Trusted IP Address fields. 3-2 Restricting Access From Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Since the trusted user is identified by IP address, you should configure that computer with a fixed IP address. 5. Click Apply to save all your settings in the Block Sites screen. Blocking Access to Internet Services The JWNR2000v2 router allows you to block the use of certain Internet services by computers on your network. This is called service blocking or port filtering. Services are functions performed by server computers at the request of client computers. For example, Web servers serve Web pages, time servers serve time and date information, and game hosts serve data about other players moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (Web server) request. To block access to Internet services:
1. Select Block Services under Content Filtering in the main menu. The Block Services screen displays. Figure 3-2 2. Enable service blocking by selecting either Per Schedule or Always, and then click Apply. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see Scheduling Blocking on page 3-5. Restricting Access From Your Network 3-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. Specify a service for blocking by clicking Add. The Block Services Setup screen displays. Figure 3-3 4. From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. To define a service, first you must determine which port number or range of numbers is used by the application. The service port numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, Assigned Numbers. Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application. You can often determine port number information by contacting the publisher of the application, by asking user groups or newsgroups, or by searching. Enter the starting port and ending port numbers. If the application uses a single port number, enter that number in both fields. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select Both. 5. Select the radio button for the IP address configuration you want to block, and then enter the IP addresses in the appropriate fields. 6. Click Add to enable your Block Services Setup selections. 3-4 Restricting Access From Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Blocking Services by IP Address Range In the Filter Services For area, you can block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network. Scheduling Blocking The JWNR2000v2 router allows you to specify when blocking is enforced. To schedule blocking:
1. Select Schedule under Content Filtering in the main menu. The Schedule screen displays. Figure 3-4 2. Configure the schedule for blocking keywords and services. a. Days to Block. Select days on which you want to apply blocking by selecting the appropriate check boxes. Select Every Day to select the check boxes for all days. Click Apply. b. Time of Day to Block. Select a start and end time in 24-hour format. Select All Day for 24-hour blocking. Click Apply. Restricting Access From Your Network 3-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Be sure to select your time zone in the E-mail screen as described in Setting the Time Zone on page 3-9. 3. Click Apply to save your settings. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no log entries are made for the trusted user. Select Logs under Content Filtering in the main menu. The Logs screen displays. Figure 3-5 Table 3-1 describes the log entries. Table 3-1. Log Entry Descriptions Field Date and time Source IP Description The date and time the log entry was recorded. The IP address of the initiating device for this log entry. 3-6 Restricting Access From Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Table 3-1. Log Entry Descriptions Field Target address Action Description The name or IP address of the website or newsgroup visited or to which access was attempted. Whether the access was blocked or allowed. To refresh the log screen, click the Refresh button. To clear the log entries, click the Clear Log button. To e-mail the log immediately, click the Send Log button. Configuring E-mail Alert and Web Access Log Notifications To receive logs and alerts by e-mail, you must provide your e-mail account information. To configure e-mail alert and web access log notifications:
1. Select E-mail under Content Filtering in the main menu. The E-mail screen displays. Restricting Access From Your Network 3-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Figure 3-6 2. To receive e-mail logs and alerts from the router, select the Turn E-mail Notification On check box. a. Enter the name of your ISPs outgoing (SMTP) mail server (such as mail.myISP.com) in the Your Outgoing Mail Server field. You might be able to find this information in the configuration screen of your e-mail program. If you leave this field blank, log and alert messages will not be sent by e-mail. b. Enter the e-mail address to which logs and alerts are sent in the Send To This E-mail Address field. This e-mail address will also be used as the From address. If you leave this field blank, log and alert messages will not be sent by e-mail. 3. If your e-mail server requires authentication, select the My Mail Server requires authentication check box. a. Enter your user name for the e-mail server in the User Name field. 3-8 Restricting Access From Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual b. Enter your password for the e-mail server in the Password field. 4. You can specify that logs are automatically sent by e-mail with these options:
Send alert immediately. Select this check box for immediate notification of attempted access to a blocked site or service. Send Logs According to this Schedule. Specifies how often to send the logs: Hourly, Daily, Weekly, or When Full. Day. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. Time. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If you select the Weekly, Daily, or Hourly option and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the routers memory. If the router cannot e-mail the log file, the log buffer might fill up. In this case, the router overwrites the log and discards its contents. 5. Click Apply to save your settings. So that the log entries are correctly time-stamped and sent at the correct time, be sure to set the time as described in the next section. Setting the Time Zone The JWNR2000v2 router uses the Network Time Protocol (NTP) to obtain the current time and date from one of several network time servers on the Internet. Localize the time zone so that your log entries and other router functions include the correct time stamp. To verify and set the time zone (see Figure 3-6 on page 3-8):
Time Zone. To select your local time zone, use the drop-down list. This setting is used for the blocking schedule and for time-stamping log entries. Automatically Adjust for Daylight Savings Time. If your region supports daylight savings time, select this check box. The router will automatically adjust the time at the start and end of the daylight savings time period. Restricting Access From Your Network 3-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3-10 Restricting Access From Your Network v1.0, March 2011 Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the N300 Wireless Router Model JWNR2000v2, including LAN, WAN, and routing settings. It contains the following sections:
Using the LAN IP Setup Options Using a Dynamic DNS Service on page 4-6 Configuring the WAN Setup Options on page 4-8 Configuring Static Routes on page 4-10 Wireless Repeating (Also Called WDS) on page 4-12 Using the LAN IP Setup Options The LAN Setup screen allows configuration of LAN IP services such as Dynamic Host Configuration Protocol (DHCP) and Routing Information Protocol (RIP). v1.0, March 2011 4-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To configure LAN IP settings, select LAN Setup under Advanced in the main menu. The LAN Setup screen displays. Figure 4-1 Configuring a Device Name The device name is a user-friendly name for the router. This name is shown in the Network on Windows Vista and the Network Explorer on all Windows systems. The Device Name field cannot be blank. The default name is JWNR2000v2. 4-2 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring LAN TCP/IP Setup Parameters These are advanced settings that you might configure if you are a network administrator and your network contains multiple routers. The router is shipped preconfigured to use private IP addresses on the LAN side and to act as a DHCP server (see Using the Router as a DHCP Server on page 4-4). Note: If you change the LAN IP address of the router while connected through the browser, you will be disconnected. You must then open a new connection to the new IP address and log in again. LAN IP address. 192.168.1.1 Subnet mask. 255.255.255.0 The routers default LAN IP configuration is:
These addresses are part of the designated private address range for use in private networks and should be suitable for most applications. If your network has a requirement to use a different IP addressing scheme, you can make those changes in this screen. The LAN IP settings are:
IP Address. The LAN IP address of the router. IP Subnet Mask. The LAN subnet mask of the router. Combined with the IP address, the IP subnet mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router. RIP Direction. RIP allows a router to exchange routing information with other routers. The RIP Direction selection controls how the router sends and receives RIP packets. Both is the default. When set to Both or In Only, the router incorporates the RIP information that it receives. When set to Both or Out Only, the router broadcasts its routing table periodically. RIP Version. This controls the format and the broadcasting method of the RIP packets sent by the router. (It recognizes both formats when receiving.) The default setting is Disabled. RIP-1 is universally supported. RIP-1 is usually adequate unless you have an unusual network setup. RIP-2B carries more information than RIP-1 and uses subnet broadcasting. RIP-2M carries more information than RIP-1 and uses multicasting. Customizing Your Network Settings 4-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Using the Router as a DHCP Server By default, the router functions as a DHCP server, allowing it to assign IP, DNS server, and default gateway addresses to all computers connected to the routers LAN. The assigned default gateway address is the LAN address of the router. The router assigns IP addresses to the attached computers from a pool of addresses specified in this screen. Each pool address is tested before it is assigned to avoid duplicate addresses on the LAN. Note: For most applications, the default DHCP and TCP/IP settings of the router are satisfactory. Click the link to the online document TCP/IP Networking Basics in Appendix B for an explanation of DHCP and information about how to assign IP addresses for your network. Subnet mask To specify a pool of IP addresses to be assigned, set the starting IP address and ending IP address. These addresses should be part of the same IP address subnet as the routers LAN IP address. Using the default addressing scheme, you should define a range between 192.168.1.2 and 192.168.1.254, although you might wish to save part of the range for devices with fixed addresses. The router delivers the following parameters to any LAN device that requests DHCP:
An IP address from the range you have defined Gateway IP address (the routers LAN IP address) Primary DNS server (if you entered a primary DNS address in the Basic Settings screen;
otherwise, the routers LAN IP address) Secondary DNS server (if you entered a secondary DNS address in the Basic Settings screen) To use another device on your network as the DHCP server, or to manually specify the network settings of all of your computers, clear the Use Router as DHCP Server check box. Otherwise, leave it selected. If this service is not selected and no other DHCP server is available on your network, you need to set your computers IP addresses manually or they will not be able to access the router. 4-4 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Using Address Reservation When you specify a reserved IP address for a computer on the LAN, that computer always receives the same IP address each time it accesses the routers DHCP server. Reserved IP addresses should be assigned to computers or servers that require permanent IP settings. Figure 4-2 To reserve an IP address:
1. Click Add. 2. In the IP Address field, enter the IP address to assign to the computer or server. (Choose an IP address from the routers LAN subnet, such as 192.168.1.x.) 3. Enter the MAC address of the computer or server. Tip: If the computer is already present on your network, you can copy its MAC address from the Attached Devices screen and paste it here. 4. Click Apply to enter the reserved address into the table. Note: The reserved address is not assigned until the next time the computer contacts the routers DHCP server. Reboot the computer or access its IP configuration and force a DHCP release and renew. To edit or delete a reserved address entry:
1. Click the button next to the reserved address you want to edit or delete. 2. Click Edit or Delete. Customizing Your Network Settings 4-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Using a Dynamic DNS Service If your Internet Service Provider (ISP) gave you a permanently assigned IP address, you can register a domain name and have that name linked with your IP address by public Domain Name Servers (DNS). However, if your Internet account uses a dynamically assigned IP address, you do not know in advance what your IP address will be, and the address can change frequently. In this case, you can use a commercial Dynamic DNS service, which allows you to register your domain to their IP address, and forwards traffic directed at your domain to your frequently changing IP address. Note: If your ISP assigns a private WAN IP address (such as 192.168.x.x or 10.x.x.x), the Dynamic DNS service will not work because private addresses are not routed on the Internet. Your router contains a client that can connect to the Dynamic DNS service provided by DynDNS.org. You must first visit their website at www.dyndns.org and obtain an account and host name, which you specify in the router. Then, whenever your ISP-assigned IP address changes, your router automatically contacts the Dynamic DNS service provider, logs in to your account, and registers your new IP address. If your host name is hostname, for example, you can reach your router at hostname.dyndns.org. Select Dynamic DNS under Advanced in the main menu. The Dynamic DNS screen displays. Figure 4-3 4-6 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To configure for a Dynamic DNS service:
1. Register for an account with one of the Dynamic DNS service providers whose names appear in the Service Provider list. For example, for DynDNS.org, select www.dynDNS.org. 2. Select the Use a Dynamic DNS Service check box. 3. Select the name of your Dynamic DNS service provider. 4. Enter the host name (or domain name) that your Dynamic DNS service provider gave you. 5. Enter the user name for your Dynamic DNS account. This is the name that you use to log in to your account, not your host name. 6. Enter the password (or key) for your Dynamic DNS account. 7. If your Dynamic DNS provider allows the use of wildcards in resolving your URL, you can select the Use Wildcards check box to activate this feature. For example, the wildcard feature causes *.yourhost.dyndns.org to be aliased to the same IP address as yourhost.dyndns.org. 8. Click Apply to save your configuration. Customizing Your Network Settings 4-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring the WAN Setup Options The WAN Setup options let you configure a DMZ (demilitarized zone) server, change the Maximum Transmit Unit (MTU) size, and enable the wireless router to respond to a ping on the WAN (Internet) port. Select WAN Setup under Advanced in the main menu. The WAN Setup screen displays. Figure 4-4 Disabling the SPI Firewall The Stateful Packet Inspection (SPI) firewall protects your network and computers against attacks and intrusions. A stateful packet firewall carefully inspects incoming traffic packets, looking for known exploits such as malformed, oversized, or out-of-sequence packets. The firewall should be disabled only in special circumstances, such as when you are troubleshooting application issues. Setting Up a Default DMZ Server The default DMZ server feature is helpful when you are using some online games and videoconferencing applications that are incompatible with Network Address Translation (NAT). The router is programmed to recognize some of these applications and to work correctly with 4-8 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual them, but there are other applications that might not function well. In some cases, one local computer can run the application correctly if that computers IP address is entered as the default DMZ server. Warning: DMZ servers pose a security risk. A computer designated as the default DMZ server loses much of the protection of the firewall, and is exposed to exploits from the Internet. If compromised, the DMZ server computer can be used to attack other computers on your network. Incoming traffic from the Internet is usually discarded by the router unless the traffic is a response to one of your local computers or a service that you have configured in the Port Forwarding/Port Triggering screen. Instead of discarding this traffic, you can have it forwarded to one computer on your network. This computer is called the default DMZ server. The WAN Setup screen lets you configure a default DMZ server. To assign a computer or server to be a default DMZ server:
1. Select the Default DMZ Server check box. 2. 3. Click Apply. In the Default DMZ Server fields, enter the IP address for that computer or server. Responding to a Ping on the Internet (WAN) Port If you want the router to respond to a ping from the Internet, select the Respond to Ping on Internet Port check box. This should be used only as a diagnostic tool, since it allows your router to be discovered by Internet scanners. Do not select this check box unless you have a specific reason to do so, such as when troubleshooting your connection. Setting the MTU Size The normal MTU value for most Ethernet networks is 1500 bytes, 1492 bytes for PPPoE connections, or 1450 for PPTP connections. For some ISPs, you might need to reduce the MTU size, but this is rarely required and should not be done unless you are sure it is necessary for your ISP connection. For more information, see Changing the MTU Size on page 5-16. To change the MTU size:
1. 2. Click Apply to save the new configuration. In the MTU Size field, enter a new size between 64 and 1500. Customizing Your Network Settings 4-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring NAT Filtering Network Address Translation (NAT) determines how the router processes inbound traffic. Secured NAT provides a secured firewall to protect the computers on the LAN from attacks from the Internet, but might prevent some Internet games, point-to-point applications, or multimedia applications from functioning. Open NAT provides a much less secured firewall, but allows almost all Internet applications to function. For more information about NAT, see How Your Computer Accesses a Remote Computer through Your Router on page 5-2. To change the NAT option:
1. 2. Click Apply to save the new configuration. In the NAT Filtering area, select either the Secured or the Open radio button. Configuring Static Routes Static routes provide additional routing information to your router. Under usual circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as multiple routers or multiple IP subnets located on your network. As an example of when a static route is needed, consider the following case:
Your primary Internet access is through a cable modem to an ISP. You have an ISDN router on your home network for connecting to the company where you are employed. This routers address on your LAN is 192.168.1.100. Your companys network address is 134.177.0.0. When you first configured your router, two implicit static routes were created. A default route was created with your ISP as the gateway, and a second static route was created to your local network for all 192.168.1.x addresses. With this configuration, if you attempt to access a device on the 134.177.0.0 network, your router forwards your request to the ISP. The ISP forwards your request to the company where you are employed, and the request is likely to be denied by the companys firewall. In this case you must define a static route, telling your router that 134.177.0.0 should be accessed through the ISDN router at 192.168.1.100. In this example:
The Destination IP Address and IP Subnet Mask fields specify that this static route applies to all 134.177.x.x addresses. 4-10 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual The Gateway IP Address field specifies that all traffic for these addresses should be forwarded to the ISDN router at 192.168.1.100. Private is selected only as a precautionary security measure in case RIP is activated. A Metric value of 1 will work since the ISDN router is on the LAN. To add or edit a static route:
1. Select Static Routes under Advanced in the main menu. The Static Routes screen displays. Figure 4-5 2. Click Add to expand the Static Routes screen. Figure 4-6 3. In the Route Name field, enter a name for this static route. (This is for identification purposes only.) 4. Select the Private check box if you want to limit access to the LAN only. If Private is selected, the static route is not reported in RIP. 5. Select the Active check box to make this route effective. Customizing Your Network Settings 4-11 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 6. 7. 8. 9. In the Destination IP Address field, enter the IP address of the final destination. In the IP Subnet Mask field, enter the IP subnet mask for this destination. If the destination is a single host, enter 255.255.255.255. In the Gateway IP Address field, enter the gateway IP address, which must be a router on the same LAN segment as the JWNR2000v2 router. In the Metric field, enter a number between 1 and 15 as the metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1. 10. Click Apply to have the static route entered into the table. Wireless Repeating (Also Called WDS) The JWNR2000v2 router can be used with a wireless access point (AP) to build large bridged wireless networks. Wireless repeating is a type of Wireless Distribution System (WDS). Warning: If you use the wireless repeating function, your options for wireless security are limited to None or WEP. For more information about wireless security, see Chapter 2, Safeguarding Your Network. The following figure shows a wireless repeating scenario:
Repeater AP Base Station AP Figure 4-7 4-12 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To set up a wireless network using WDS, the following conditions must be met for both APs:
Both APs must use the same SSID, wireless channel, and encryption mode (see Choosing Appropriate Wireless Security on page 2-1 or Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13). Both APs must be on the same LAN IP subnet. That is, all the AP LAN IP addresses are in the same network. All LAN devices (wired and wireless computers) must be configured to operate in the same LAN network address range as the APs. If you make changes in the Wireless Settings screen, click Apply so that they take effect. Wireless Repeating Function You can view or change wireless repeater settings for the wireless router. From the main menu of the browser interface, under Advanced, click Wireless Repeating Function to display the Wireless Repeating Function screen. Figure 4-8 The wireless router supports two modes of the wireless repeating function, and allows you to control wireless client association:
Wireless Repeater. The wireless router sends all traffic from its local wireless or wired computers to a remote AP. To configure this mode, you must know the MAC address of the remote parent AP. Customizing Your Network Settings 4-13 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Wireless Base Station. The wireless router acts as the parent AP, bridging traffic to and from the child repeater AP, as well as handling wireless and wired local computers. To configure this mode, you must know the MAC addresses of the child repeater AP. Disable Wireless Client Association. Usually this check box is cleared so that the router is an access point for wireless computers. If this check box is selected, the router communicates wirelessly only with other APs whose MAC addresses are listed in this screen. The router still communicates with wire-connected LAN devices. Setting Up the Base Station The wireless repeating function works only in hub and spoke mode. The units cannot be daisy chained. You must know the wireless settings for both units. You must know the MAC address of the remote unit. First, set up the base station, and then set up the repeater. To set up the base station:
1. Set up both units with exactly the same wireless settings (SSID, mode, channel, and security). Note that the wireless security option must be set to None or WEP. 2. Log into the wireless router base unit, under the Advanced heading, select Wireless Repeating Function to display the Wireless Repeating Function screen. Figure 4-9 3. Select the Enable Wireless Repeating Function check box and the Wireless Base Station radio button. 4-14 Customizing Your Network Settings v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. Enter the MAC address for the repeater units. 5. Click Apply to save your changes. Setting Up a Repeater Unit Use a wired Ethernet connection to set up the repeater unit to avoid conflicts with the wireless connection to the base station. Note: If you are using the JWNR2000v2 base station with a non-NETGEAR wireless router as the repeater, you might need to change additional configuration settings. In particular, you should disable the DHCP server function on the wireless repeater AP. To configure a JWNR2000v2 router as a repeater unit:
1. If you are using the same model of wireless router for both the base station and repeaters, you must change the LAN IP address for each repeater to a different IP address in the same subnet
(see Using the LAN IP Setup Options on page 4-1). Note: Failing to change the LAN IP address will cause an IP address conflict in the network because the factory default LAN IP is the same for both units. 2. Log in to the router that will be the repeater. Check the Wireless Settings screen, and verify that the wireless settings match the base station exactly. If the settings are different, be sure to configure the wireless settings to match the base station settings (see Setting Up and Testing Basic Wireless Connectivity on page 1-10). In the Wireless Repeating Function screen, select the Enable Wireless Repeating Function check box and the Wireless Repeater radio button. 3. 4. Fill in the IP Address field. This IP address must be in the same subnet as the base station, but different from the LAN IP of the base station. 5. Fill in the Base Station MAC Address field. 6. Click Apply to save your changes. 7. Verify connectivity across the LANs. A computer on any wireless or wired LAN segment of the wireless router should be able to connect to the Internet or share files and printers with any other wireless or wired computer or server connected to the other AP. Customizing Your Network Settings 4-15 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4-16 Customizing Your Network Settings v1.0, March 2011 Chapter 5 Fine-Tuning Your Network This chapter describes how to modify the configuration of the N300 Wireless Router Model JWNR2000v2 to allow specific applications to access the Internet or to be accessed from the Internet, and how to make adjustments to enhance your networks performance. This chapter includes the following sections:
Allowing Inbound Connections to Your Network Configuring Port Forwarding to Local Servers on page 5-6 Configuring Port Triggering on page 5-10 Using Universal Plug and Play on page 5-14 Optimizing Wireless Performance on page 5-15 Changing the MTU Size on page 5-16 Quality of Service on page 5-18 Overview of Home and Small Office Networking Technologies on page 5-24 Allowing Inbound Connections to Your Network By default, the JWNR2000v2 router blocks any inbound traffic from the Internet to your computers except for replies to your outbound traffic. However, you might need to create exceptions to this rule for the following purposes:
To allow remote computers on the Internet to access a server on your local network. To allow certain applications and games to work correctly when their replies are not recognized by your router. Your router provides two features for creating these exceptions: port forwarding and port triggering. This section explains how a normal outbound connection works, followed by two examples explaining how port forwarding and port triggering operate and how they differ. v1.0, March 2011 5-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual How Your Computer Accesses a Remote Computer through Your Router When a computer on your network needs to access a computer on the Internet, your computer sends your router a message containing source and destination address and process information. Before forwarding your message to the remote computer, your router must modify the source information and must create and track the communication session so that replies can be routed back to your computer. Here is an example of normal outbound traffic and the resulting inbound responses:
1. You open Internet Explorer, beginning a browser session on your computer. Invisible to you, your operating system assigns a service number (port number) to every communication process running on your computer. In this example, lets say Windows assigns port number 5678 to this browser session. 2. You ask your browser to get a Web page from the Web server at www.example.com. Your computer composes a Web page request message with the following address and port information:
The source address is your computers IP address. The source port number is 5678, the browser session. The destination address is the IP address of www.example.com, which your computer finds by asking a DNS server. The destination port number is 80, the standard port number for a Web server process. Your computer then sends this request message to your router. 3. Your router creates an entry in its internal session table describing this communication session between your computer and the Web server at www.example.com. Before sending the Web page request message to www.example.com, your router stores the original information and then modifies the source information in the request message, performing Network Address Translation (NAT):
The source address is replaced with your routers public IP address. This is necessary because your computer uses a private IP address that is not globally unique and cannot be used on the Internet. The source port number is changed to a number chosen by the router, such as 33333. This is necessary because two computers could independently be using the same session number. Your router then sends this request message through the Internet to the Web server at www.example.com. 5-2 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. The Web server at www.example.com composes a return message with the requested Web page data. The return message contains the following address and port information:
The Web server then sends this reply message to your router. The source address is the IP address of www.example.com. The source port number is 80, the standard port number for a Web server process. The destination address is the public IP address of your router. The destination port number is 33333. 5. Upon receiving the incoming message, your router checks its session table to determine whether there is an active session for port number 33333. Finding an active session, the router then modifies the message, restoring the original address information replaced by NAT. The message now contains the following address and port information:
The source address is the IP address of www.example.com. The source port number is 80, the standard port number for a Web server process. The destination address is your computers IP address. The destination port number is 5678, the browser session that made the initial request. Your router then sends this reply message to your computer, which displays the Web page from www.example.com. 6. When you finish your browser session, your router eventually senses a period of inactivity in the communications. Your router then removes the session information from its session table, and incoming traffic is no longer accepted on port number 33333. How Port Triggering Changes the Communication Process In the preceding example, requests are sent to a remote computer by your router from a particular service port number, and replies from the remote computer to your router are directed to that port number. If the remote server sends a reply back to a different port number, your router will not recognize it and will discard it. However, some application servers (such as FTP and IRC servers) send replies back to multiple port numbers. Using the port triggering function of your router, you can tell the router to open additional incoming ports when a particular outgoing port originates a session. An example is Internet Relay Chat (IRC). Your computer connects to an IRC server at destination port 6667. The IRC server not only responds to your originating source port, but also sends an identify message to your computer on port 113. Using port triggering, you can tell the router, Fine-Tuning Your Network 5-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual When you initiate a session with destination port 6667, you must also allow incoming traffic on port 113 to reach the originating computer. Using steps similar to the preceding example, the following sequence shows the effects of the port triggering rule you have defined:
1. You open an IRC client program, beginning a chat session on your computer. 2. Your IRC client composes a request message to an IRC server using a destination port number of 6667, the standard port number for an IRC server process. Your computer then sends this request message to your router. 3. Your router creates an entry in its internal session table describing this communication session between your computer and the IRC server. Your router stores the original information, performs Network Address Translation (NAT) on the source address and port, and sends this request message through the Internet to the IRC server. 4. Noting your port triggering rule, and having observed the destination port number of 6667, your router creates an additional session entry to send any incoming port 113 traffic to your computer. 5. The IRC server sends a return message to your router using the NAT-assigned source port (as in the previous example, lets say port 33333) as the destination port. The IRC server also sends an identify message to your router with destination port 113. 6. Upon receiving the incoming message to destination port 33333, your router checks its session table to determine whether there is an active session for port number 33333. Finding an active session, the router restores the original address information replaced by NAT and sends this reply message to your computer. 7. Upon receiving the incoming message to destination port 113, your router checks its session table and learns that there is an active session for port 113, associated with your computer. The router replaces the messages destination IP address with your computers IP address and forwards the message to your computer. 8. When you finish your chat session, your router eventually senses a period of inactivity in the communications. The router then removes the session information from its session table, and incoming traffic is no longer accepted on port numbers 33333 or 113. To configure port triggering, you need to know which inbound ports the application needs. Also, you need to know the number of the outbound port that will trigger the opening of the inbound ports. You can usually determine this information by contacting the publisher of the application, or user groups or newsgroups. Note: Only one computer at a time can use the triggered application. 5-4 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual How Port Forwarding Changes the Communication Process In both of the preceding examples, your computer initiates an application session with a server computer on the Internet. However, you might need to allow a client computer on the Internet to initiate a connection to a server computer on your network. Normally, your router ignores any inbound traffic that is not a response to your own outbound traffic. You can configure exceptions to this default rule by using the port forwarding feature. A typical application of port forwarding can be shown by reversing the client-server relationship from our previous Web server example. In this case, a remote computers browser needs to access a Web server running on a computer in your local network. Using port forwarding, you can tell the router, When you receive incoming traffic on port 80 (the standard port number for a Web server process), forward it to the local computer at 192.168.1.123. The following sequence shows the effects of the port forwarding rule you have defined:
1. The user of a remote computer opens Internet Explorer and requests a Web page from www.example.com, which resolves to the public IP address of your router. The remote computer composes a Web page request message with the following destination information:
The destination address is the IP address of www.example.com, which is the address of your router. The destination port number is 80, the standard port number for a Web server process. The remote computer then sends this request message through the Internet to your router. 2. Your router receives the request message and looks in its rules table for any rules covering the disposition of incoming port 80 traffic. Your port forwarding rule specifies that incoming port 80 traffic should be forwarded to local IP address 192.168.1.123. Therefore, your router modifies the destination information in the request message:
The destination address is replaced with 192.168.1.123. Your router then sends this request message to your local network. 3. Your Web server at 192.168.1.123 receives the request and composes a return message with the requested Web page data. Your Web server then sends this reply message to your router. 4. Your router performs Network Address Translation (NAT) on the source IP address, and sends this request message through the Internet to the remote computer, which displays the Web page from www.example.com. To configure port forwarding, you need to know which inbound ports the application needs. You usually can determine this information by contacting the publisher of the application or user groups or newsgroups. Fine-Tuning Your Network 5-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual How Port Forwarding Differs from Port Triggering The following points summarize the differences between port forwarding and port triggering:
Port triggering can be used by any computer on your network, although only one computer can use it at a time. Port forwarding is configured for a single computer on your network. Port triggering does not need to know the computers IP address in advance. The IP address is captured automatically. Port forwarding requires that you specify the computers IP address during configuration, and the IP address must never change. Port triggering requires specific outbound traffic to open the inbound ports, and the triggered ports are closed after a period of no activity. Port forwarding is always active and does not need to be triggered. Configuring Port Forwarding to Local Servers Using the port forwarding feature, you can allow certain types of incoming traffic to reach servers on your local network. For example, you might make a local Web server, FTP server, or game server visible and available to the Internet. Use the Port Forwarding screen to configure the router to forward specific incoming protocols to computers on your local network. In addition to servers for specific applications, you can also specify a default DMZ server to which all other incoming protocols are forwarded. The DMZ server is configured in the WAN Setup screen, as discussed in Setting Up a Default DMZ Server on page 4-8. Before starting, you need to determine which type of service, application, or game you will provide, and the local IP address of the computer that will provide the service. Be sure the computers IP address never changes. Tip: To ensure that your server computer always has the same IP address, use the reserved IP address feature of your JWNR2000v2 router. See Using Address Reservation on page 4-5 for instructions on how to use reserved IP addresses. 5-6 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To configure port forwarding to a local server:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The Port Forwarding/Port Triggering screen displays. Figure 5-1 2. From the Service Name list, select the service or game that you will host on your network. If the service does not appear in the list, see the following section, Adding a Custom Service. In the corresponding Server IP Address fields, enter the last digit of the IP address of your local computer that will provide this service. 3. 4. To the right of Server IP Address, click Add. The service appears in the list in the screen. Adding a Custom Service To define a service, game, or application that does not appear in the Service Name list, you must first determine which port number or range of numbers is used by the application. You can usually determine this information by contacting the publisher of the application or user groups or newsgroups. When you have the port number information, follow these steps:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. Fine-Tuning Your Network 5-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Click Add Service (see Figure 5-1 on page 5-7).The PortsCustom Services screen displays. Figure 5-2 3. 4. 5. In the Service Name field, enter a descriptive name. In the Service Type field, select the protocol. If you are unsure, select TCP/UDP. In the Starting Port field, enter the beginning port number. If the application uses only a single port, enter the same port number in the Ending Port field. If the application uses a range of ports, enter the ending port number of the range in the Ending Port field. 6. In the Server IP Address field, enter the IP address of your local computer that will provide this service. 7. Click Apply. The service appears in the list in the Port Forwarding/Port Triggering screen. 5-8 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Editing or Deleting a Port Forwarding Entry To edit or delete a port forwarding entry:
1. In the table, select the button next to the service name. Figure 5-3 2. Click Edit Service or Delete Service to make changes. 3. Click Apply. Application Example: Making a Local Web Server Public If you host a Web server on your local network, you can use port forwarding to allow Web requests from anyone on the Internet to reach your Web server. To make a local Web server public:
1. Assign your Web server either a fixed IP address or a dynamic IP address using DHCP address reservation, as explained in Using Address Reservation on page 4-5. In this example, your router will always give your Web server an IP address of 192.168.1.33. In the Port Forwarding screen, configure the router to forward the HTTP service to the local address of your Web server at 192.168.1.33. HTTP (port 80) is the standard protocol for Web servers.
(Optional) Register a host name with a Dynamic DNS service, and configure your router to use the name as described in Using a Dynamic DNS Service on page 4-6. To access your Web server from the Internet, a remote user must know the IP address that has been assigned by your ISP. However, if you use a Dynamic DNS service, the remote user can reach your server by a user-friendly Internet name, such as mynetgear.dyndns.org. 2. 3. Fine-Tuning Your Network 5-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Configuring Port Triggering Port triggering is a dynamic extension of port forwarding that is useful in these cases:
More than one local computer needs port forwarding for the same application (but not simultaneously). An application needs to open incoming ports that are different from the outgoing port. When port triggering is enabled, the router monitors outbound traffic looking for a specified outbound trigger port. When the router detects outbound traffic on that port, it remembers the IP address of the local computer that sent the data. The router then temporarily opens the specified incoming port or ports, and forwards incoming traffic on the triggered ports to the triggering computer. While port forwarding creates a static mapping of a port number or range to a single local computer, port triggering can dynamically open ports to any computer that needs them and can close the ports when they are no longer needed. Note: If you use applications such as multiplayer gaming, peer-to-peer connections, real-
time communications such as instant messaging, or remote assistance (a feature in Windows XP), you should also enable Universal Plug and Play (UPnP) according to the instructions in Using Universal Plug and Play on page 5-14. To configure port triggering, you need to know which inbound ports the application needs. Also, you need to know the number of the outbound port that will trigger the opening of the inbound ports. You can usually determine this information by contacting the publisher of the application or user groups or newsgroups. To set up port triggering:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The Forwarding/Port Triggering screen displays (see Figure 5-1 on page 5-7). 5-10 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Select the Port Triggering radio button. The port triggering information displays. Figure 5-4 3. Clear the Disable Port Triggering check box. Note: If the Disable Port Triggering check box is selected after you configure port triggering, port triggering is disabled. However, any port triggering configuration information you added to the router is retained even though it is not used. 4. In the Port Triggering Timeout field, enter a value up to 9999 minutes. This value controls the inactivity timer for the designated inbound ports. The inbound ports close when the inactivity time expires. This is required because the router cannot be sure when the application has terminated. Fine-Tuning Your Network 5-11 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 5. Click Add. the Port TriggeringServices screen displays. Figure 5-5 6. 7. In the Service Name field, enter a descriptive service name. In the Service User field, select Any (the default) to allow this service to be used by any computer on the Internet. Otherwise, select Single address, and enter the IP address of one computer to restrict the service to a particular computer. 8. Select the service type, either TCP or UDP. 9. In the Triggering Port field, enter the number of the outbound traffic port that will cause the inbound ports to be opened. 10. Enter the inbound connection port information in the Connection Type, Starting Port, and Ending Port fields. 5-12 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 11. Click Apply. The service appears in the Port Triggering Portmap table. Figure 5-6 Fine-Tuning Your Network 5-13 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Using Universal Plug and Play Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers, to access the network and connect to other devices as needed. UPnP devices can automatically discover the services from other registered UPnP devices on the network. Note: If you use applications such as multiplayer gaming, peer-to-peer connections, real-
time communications such as instant messaging, or remote assistance (a feature in Windows XP), you should enable UPnP. To turn on Universal Plug and Play:
1. Select UPnP under Advanced the main menu. The UPnP screen displays. Figure 5-7 2. The available settings and information displayed in this screen are:
Turn UPnP On. UPnP can be enabled or disabled for automatic device configuration. The default setting for UPnP is disabled. If this check box is not selected, the router does not allow any device to automatically control the resources, such as port forwarding
(mapping) of the router. 5-14 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Advertisement Period. The advertisement period is how often the router broadcasts its UPnP information. This value can range from 1 to 1440 minutes. The default period is 30 minutes. Shorter durations ensure that control points have current device status at the expense of additional network traffic. Longer durations might compromise the freshness of the device status but can significantly reduce network traffic. Advertisement Time To Live. The time to live for the advertisement is measured in hops
(steps) for each UPnP packet sent. The time to live hop count is the number of steps a broadcast packet is allowed to propagate for each UPnP advertisement before it disappears. The number of hops can range from 1 to 255. The default value for the advertisement time to live is 4 hops, which should be fine for most home networks. If you notice that some devices are not being updated or reached correctly, then it might be necessary to increase this value. UPnP Portmap Table. The UPnP Portmap Table displays the IP address of each UPnP device that is currently accessing the router and which ports (Internal and External) that device has opened. The UPnP Portmap Table also displays what type of port is open and whether that port is still active for each IP address. 3. Click Apply to save your settings. Optimizing Wireless Performance The speed and operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless router. You should choose a location for your router that will maximize the network speed. Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the router. For complete range and performance specifications, click the link to the online document Wireless Networking Basics in Appendix B. The following list describes how to optimize wireless router performance. Identify critical wireless links. If your network has several wireless devices, decide which wireless devices need the highest data rate, and locate the router near them. Many wireless products have automatic data-rate fallback, which allows increased distances without loss of connectivity. This also means that devices that are farther away might be slower. Therefore, the most critical links in your network are those where the traffic is high and the distances are great. Optimize those first. Fine-Tuning Your Network 5-15 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Choose placement carefully. For best results, place your router:
Near the center of the area in which your computers will operate. In an elevated location such as a high shelf where the wirelessly connected computers have line-of-sight access (even if through walls). Avoid obstacles to wireless signals. Keep wireless devices at least 2 feet from large metal fixtures such as file cabinets, refrigerators, pipes, metal ceilings, reinforced concrete, and metal partitions. Keep away from large amounts of water such as fish tanks and water coolers. Reduce interference. Avoid windows unless communicating between buildings. Place wireless devices away from various electromagnetic noise sources, especially those in the 24002500 MHz frequency band. Common noise-creating sources are:
Computers and fax machines (no closer than 1 foot) Copying machines, elevators, and cell phones (no closer than 6 feet) Microwave ovens (no closer than 10 feet) Choose your settings. Use a scanning utility to determine what other wireless networks are operating nearby, and choose an unused channel. Turn off SSID broadcast, and change the default SSID. Other nearby devices might automatically try to connect to your network several times a second, which can cause significant performance reduction. Use WMM to improve the performance of voice and video traffic over the wireless link. Changing the MTU Size The Maximum Transmission Unit (MTU) is the largest data packet a network device transmits. When one network device communicates across the Internet with another, the data packets travel through many devices along the way. If any device in the data path has a lower MTU setting than the other devices, the data packets must be split or fragmented to accommodate the one with the smallest MTU. 5-16 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual The best MTU setting for NETGEAR equipment is often just the default value, and changing the value might fix one problem but cause another. Leave MTU unchanged unless one of these situations occurs:
You have problems connecting to your ISP, or other Internet service, and either the technical support of the ISP or of NETGEAR recommends changing the MTU size. These might require an MTU change:
A secure Web site that will not open, or displays only part of a Web page Yahoo e-mail MSN America Onlines DSL service You use VPN and have severe performance problems. You used a program to optimize MTU for performance reasons, and now you have connectivity or performance problems. Note: An incorrect MTU setting can cause Internet communication problems such as the inability to access certain Web sites, frames within Web sites, secure login pages, or FTP or POP servers. If you suspect an MTU problem, a common solution is to change the MTU size to 1400. If you are willing to experiment, you can gradually reduce the MTU size from the maximum value of 1500 until the problem goes away. Table 5-1 describes common MTU sizes and applications. Table 5-1. Common MTU Sizes MTU 1500 1492 1472 1468 1460 1436 1400 576 Application The largest Ethernet packet size and the default value. This is the typical setting for non-
PPPoE, non-VPN connections, and is the default value for NETGEAR routers, adapters, and switches. Used in PPPoE environments. Maximum size to use for pinging. (Larger packets are fragmented.) Used in some DHCP environments. Usable by AOL if you do not have large e-mail attachments, for example. Used in PPTP environments or with VPN. Maximum size for AOL DSL. Typical value to connect to dial-up ISPs. Fine-Tuning Your Network 5-17 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To change the MTU size:
1. 2. 3. Click Apply to save the new configuration. In the main menu, under Advanced, select WAN Setup. In the MTU Size field, enter a new size between 64 and 1500. Quality of Service Quality of Service (QoS) is an advanced feature that can be used to prioritize some types of traffic ahead of others. The JWNR2000v2 router can provide QoS prioritization over the wireless link. Using WMM QoS for Wireless Multimedia Applications The JWNR2000v2 router supports Wi-Fi Multimedia Quality of Service (WMM QoS) to prioritize wireless voice and video traffic over the wireless link. WMM QoS provides prioritization of wireless data packets from different applications based on four access categories: voice, video, best effort, and background. For an application to receive the benefits of WMM QoS, both it and the client running that application must be WMM enabled. Legacy applications that do not support WMM, and applications that do not require QoS, are assigned to the best effort category, which receives a lower priority than voice and video. Configuring QoS for Internet Access To specify prioritization of traffic, you must create a policy for the type of traffic and add the policy to the QoS Policy table in the QoS Setup screen. To create a QoS policy:
5-18 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual From the main menu of the browser interface, under Advanced, select QoS Setup. The QoS Setup screen displays:
Figure 5-8 WMM QoS is enabled by default. You can disable it by clearing the Enable WMM check box and clicking Apply. QoS for Applications and Online Gaming To create a QoS policy for traffic for specific applications or online games:
1. From the main menu of the browser interface, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8. Fine-Tuning Your Network 5-19 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Click Setup QoS rule. The QoS - Priority Rules screen displays. Figure 5-9 For convenience, the QoS Policy table lists many common applications and online games that can benefit from QoS handling. 5-20 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. Click Add Priority Rule. The QoS - Priority Rules screen displays. Figure 5-10 4. In the Priority Category list, select either Applications or Online Gaming. In either case, a list of predefined applications or games displays in the Applications drop-down list. 5. From the Applications list, you can select an existing item, or you can scroll to the bottom of the list and select Add a New Application or Add a New Game. a. If you chose to add a new entry, the screen expands as shown:
Figure 5-11 In the QoS Policy for field, enter a descriptive name for the new application or game. b. c. Select the packet type, either TCP, UDP, or both (TCP/UDP), and specify the port number or range of port numbers used by the application or game. Fine-Tuning Your Network 5-21 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 6. From the Priority drop-down list, select the priority that this traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 7. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 8. 9. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. QoS for a Router LAN Port To create a QoS policy for a device connected to one of the routers LAN ports:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Click Add Priority Rule. 3. From the Priority Category list, select Ethernet LAN Port. The QoS - Priority Rules screen changes:
Figure 5-12 4. From the LAN port list, select the LAN port that will have a QoS policy. 5. From the Priority drop-down list, select the priority that this ports traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 6. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 7. 8. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. 5-22 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual QoS for a MAC Address To create a QoS policy for traffic from a specific MAC address:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Click Add Priority Rule. 3. From the Priority Category list, select MAC Address. The QoS - Priority Rules screen changes:
Figure 5-13 4. If the device to be prioritized appears in the MAC Device List, select it. The information from the MAC Device List is used to populate the policy name, MAC Address, and Device Name fields. If the device does not appear in the MAC Device List, click Refresh. If it still does not appear, you must complete these fields manually. 5. From the Priority drop-down list, select the priority that this devices traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 6. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 7. 8. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. Fine-Tuning Your Network 5-23 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Editing or Deleting an Existing QoS Policy To edit or delete an existing QoS policy:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Select the radio button next to the QoS policy to be edited or deleted, and do one of the following:
Click Delete to remove the QoS policy. Click Edit to edit the QoS policy. Follow the instructions in the preceding sections to change the policy settings. 3. Click Apply in the QoS Setup screen to save your changes. Overview of Home and Small Office Networking Technologies Common connection types and their speed and security considerations are:
Broadband Internet. Your Internet connection speed is determined by your modem type, such as ADSL or cable modem, as well as the connection speed of the sites to which you connect, and general Internet traffic. ADSL and cable modem connections are asymmetrical, meaning they have a lower data rate to the Internet (upstream) than from the Internet
(downstream). Keep in mind that when you connect to another site that also has an asymmetrical connection, the data rate between your sites is limited by each sides upstream data rate. A typical residential ADSL or cable modem connection provides a downstream throughput of about 1 to 3 megabits per second (Mbps). Newer technologies such as ADSL2+
and Fiber to the Home (FTTH) will increase the connection speed to tens of Mbps. Wireless. Your N300 Wireless Router Model JWNR2000v2 provides a wireless data throughput of up to 300 Mbps using technology called multiple input, multiple output
(MIMO), in which multiple antennas transmit multiple streams of data. The use of multiple antennas also provides excellent range and coverage. With the introduction of the newer WPA and WPA2 encryption and authentication protocols, wireless security is extremely strong. 5-24 Fine-Tuning Your Network v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual To get the best performance, use RangeMax NEXT adapters such as the WN511B for your computers. Although the RangeMax NEXT router is compatible with older 802.11b and 802.11g adapters, the use of these older wireless technologies in your network can result in lower throughput overall (typically less than 10 Mbps for 802.11b and less than 40 Mbps for 802.11g). In addition, many older wireless products do not support the latest security protocols, WPA and WPA2. Powerline. For connecting rooms or floors that are blocked by obstructions or are distant vertically, consider networking over your buildings AC wiring. NETGEARs Powerline HD family of products delivers up to 200 Mbps to any outlet, while the older-generation XE family of products delivers 14 Mbps or 85 Mbps. Data transmissions are encrypted for security, and you can configure an individual network password to prevent neighbors from connecting. The Powerline HD family of products can coexist on the same network with older-generation XE family products or HomePlug 1.0 products, but they are not interoperable with these older products. Wired Ethernet. As gigabit-speed Ethernet ports (10/100/1000 Mbps) become common on newer computers, wired Ethernet remains a good choice for speed, economy, and security. Gigabit Ethernet can extend up to 100 meters with twisted-pair wiring of Cat 5e or better. A wired connection is not susceptible to interference, and eavesdropping would require a physical connection to your network. Note: Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, can lower actual data throughput rate. Assessing Your Speed Requirements Because your Internet connection is likely to operate at a much lower speed than your local network, faster local networking technologies might not improve your Internet experience. However, many emerging home applications require high data rates. For example:
Streaming HD video requires 10 to 30 Mbps per stream. Because latency and packet loss can disrupt your video, plan to provide at least twice the capacity you need. Streaming MP3 audio requires less than 1 Mbps per stream and does not strain most modern networks. Like video, however, streaming audio is also sensitive to latency and packet loss, so a congested network or a noisy link can cause problems. Fine-Tuning Your Network 5-25 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Backing up computers over the network has become popular due to the availability of inexpensive mass storage. Table 5-2 shows the time to transfer 1 gigabyte (1 GB) of data using various networking technologies. Table 5-2. Theoretical Transfer Time for 1 Gigabyte Network Connection Gigabit wired Ethernet RangeMax NEXT Wireless-N Powerline HD 100 Mbps wired Ethernet 802.11n wireless 802.11g wireless 802.11b wireless 10 Mbps wired Ethernet Cable modem (3 Mbps) Analog modem (56 kbps) Theoretical Raw Transfer Time 8 seconds 26 seconds 40 seconds 80 seconds 45 seconds 150 seconds 700 seconds 800 seconds 2700 seconds 144,000 seconds (40 hours) 5-26 Fine-Tuning Your Network v1.0, March 2011 Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your N300 Wireless Router Model JWNR2000v2. This chapter includes the following sections:
Viewing Wireless Router Status Information Viewing a List of Attached Devices on page 6-7 Managing the Configuration File in Chapter 6 Updating the Router Firmware on page 6-9 Enabling Remote Management Access on page 6-13 on page 6-14 v1.0, March 2011 6-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Viewing Wireless Router Status Information To view router status and usage information:
1. Select Router Status under Maintenance in the main menu. The Router Status screen displays. Figure 6-1 6-2 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Table 6-1 describes the router status fields. Table 6-1. Wireless Router Status Fields Field Hardware Version Firmware Version GUI Language Version Description The hardware version of the router. The version of the current software installed in the router. This will change if you update your router. The version of the selected GUI language for the router manager screens. Internet Port. The following settings apply to the Internet (WAN) port of the router. MAC Address IP Address DHCP IP Subnet Mask Domain Name Server The Media Access Control address. This is the unique physical address being used by the Internet (WAN) port of the router. The IP address being used by the Internet (WAN) port of the router. If no address is shown, or is 0.0.0.0, the router cannot connect to the Internet. If set to None, the router is configured to use a fixed IP address on the WAN. If set to DHCP Client, the router is configured to obtain an IP address dynamically from the ISP. The IP subnet mask being used by the Internet (WAN) port of the router. For an explanation of subnet masks and subnet addressing, click the link to the online document TCP/IP Networking Basics in Appendix B. The Domain Name Server addresses being used by the router. A Domain Name Server translates human-language URLs such as www.netgear.com into IP addresses. LAN Port. The following settings apply to the Ethernet (LAN) port of the router. MAC Address IP Address DHCP IP Subnet Mask The Media Access Control address. This is the unique physical address being used by the LAN port of the router. The IP address being used by the Ethernet (LAN) port of the router. The default is 192.168.1.1. Identifies whether the routers built-in DHCP server is active for the LAN-attached devices. The IP subnet mask being used by the Ethernet (LAN) port of the router. The default is 255.255.255.0. Using Network Monitoring Tools 6-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Table 6-1. Wireless Router Status Fields (continued) Field Wireless Port. The following settings apply to the wireless port of the router. Description Name (SSID) Region Channel Mode Wireless AP Broadcast Name Wi-Fi Protected Setup The wireless network name (SSID) being used by the wireless port of the router. The default is NETGEAR. The geographic region where the router is being used. It might be illegal to use the wireless features of the router in some parts of the world. Identifies the channel of the wireless port being used. Click the link to the online document Wireless Networking Basics in Appendix B for the frequencies used on each channel. Indicates the wireless communication mode:
Up to 54 Mbps. Up to 145 Mbps. Up to 300 Mbps (in this mode, there are two channels: a primary channel [P] and a secondary channel [S]). Indicates whether the radio feature of the router is enabled. If not enabled, the Wireless LED on the front panel is off. Indicates whether the router is broadcasting its SSID. Indicates whether the routers PIN is enabled and whether the router is configured for Push N Connect (Wi-Fi Protected Setup). For more information, see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 6-4 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Click Connection Status to display the connection status. Figure 6-2 Table 6-2 describes the connection status settings. Table 6-2. Connection Status Settings Item IP Address Subnet Mask Default Gateway DHCP Server DNS Server Lease Obtained Lease Expires Description The IP address that is assigned to the router. The subnet mask that is assigned to the router. The IP address for the default gateway that the router communicates with. The IP address for the Dynamic Host Configuration Protocol server that provides the TCP/IP configuration for all the computers that are connected to the router. The IP address of the Domain Name Service server that provides translation of network names to IP addresses. The date and time that the lease was obtained. The date and time that the lease will expire. a. Click the Release button to release the connection status items (that is, all items return to 0). b. Click the Renew button to renew to the connection status items (that is, all items are refreshed). c. Click the Close Window button to close the Connection Status screen. Using Network Monitoring Tools 6-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. Click Show Statistics to display router usage statistics. Figure 6-3 Table 6-3 describes the router statistics. Table 6-3. Router Statistics Item System Up Time Port Status TxPkts RxPkts Collisions Tx B/s Rx B/s Up Time Poll Interval Description The time elapsed since the router was last restarted. The statistics for the WAN (Internet) and LAN (Ethernet) ports. For each port, the screen displays the following:
The link status of the port. The number of packets transmitted on this port since reset or manual clear. The number of packets received on this port since reset or manual clear. The number of collisions on this port since reset or manual clear. The current transmission (outbound) bandwidth used on the WAN and LAN ports. The current reception (inbound) bandwidth used on the WAN and LAN ports. The time elapsed since this port acquired the link. The intervals at which the statistics are updated in this screen. To change the polling frequency, enter a time in seconds in the Poll Interval field, and click Set Interval. To stop the polling entirely, click Stop. 6-6 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Viewing a List of Attached Devices The Attached Devices screen contains a table of all IP devices that the router has discovered on the local network. Select Attached Devices under Maintenance in the main menu to view the table. Figure 6-4 For each device, the table shows the IP address, NetBIOS host name or device name (if available), and the Ethernet MAC address. To force the router to look for attached devices, click Refresh. Note: If the router is rebooted, the table data is lost until the router rediscovers the devices. Managing the Configuration File The configuration settings of the JWNR2000v2 router are stored within the router in a configuration file. You can back up (save) this file to your computer, restore it, or reset it to the factory default settings. Using Network Monitoring Tools 6-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Select Backup Settings under Maintenance in the main menu. The Backup Settings screen displays. Figure 6-5 The following sections describe the three available options. Backing Up and Restoring the Configuration The Restore and Backup options in the Settings Backup screen let you save and retrieve a file containing your routers configuration settings. To save your settings, click Backup. Your browser extracts the configuration file from the router and prompts you for a location on your computer to store the file. You can give the file a meaningful name at this time, such as comcast.cfg. Tip: Before saving your configuration file, change the administrator password to the default, password. Then change it again after you have saved the configuration file. If you forget the password, you will need to reset the configuration to factory defaults. To restore your settings from a saved configuration file, enter the full path to the file on your computer, or click Browse to browse to the file. When you have located it, click Restore to send the file to the router. The router then reboots automatically. Warning: Do not interrupt the reboot process. 6-8 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Erasing the Configuration Under some circumstances (for example, if you move the router to a different network or if you have forgotten the password) you might want to erase the configuration and restore the factory default settings. After an erase, the routers username is admin, the password is password, the LAN IP address is 192.168.1.1 (or www.routerlogin.net), and the routers DHCP server is enabled. To erase the configuration, click the Erase button in the Settings Backup screen. To restore the factory default configuration settings when you do not know the login password or IP address, you must use the restore factory settings button on the rear panel of the router (see Restoring the Default Configuration and Password on page 7-11). Updating the Router Firmware The firmware of the JWNR2000v2 router is stored in flash memory, and can be updated as NETGEAR releases new firmware. You can update your firmware by logging into the router and using one of these procedures:
Enable the Check for Updated Firmware Upon Log-in check box. Each time you log in to the router, it will automatically detect a new version of the firmware and then install it. This check box is enabled in the routers default state. See Logging In To Your Wireless Router on page 1-2. Use the Check button in the Router Upgrade screen. Instead of having the router check for new firmware every time you log in, you can use Router Upgrade, under Maintenance in the main menu. See Checking for New Firmware in the Router Upgrade Screen. Check for and update your firmware manually. You can compare versions, obtain new firmware from NETGEARs website, and then upload it. See Updating Manually to New Router Firmware on page 6-11. Note: Before updating the router software, NETGEAR recommends that you save your configuration settings (see Backing Up and Restoring the Configuration on page 6-8). A firmware update might cause the router settings to revert to the factory defaults. If this happens, after completing the update, you can restore your settings from the backup. Using Network Monitoring Tools 6-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Checking for New Firmware in the Router Upgrade Screen To check for new firmware and allow the router to automatically install it:
1. Select Router Upgrade under Maintenance in the main menu. The Router Upgrade screen displays. Figure 6-6 2. Check for new software versions by clicking the Check button. If a new version is found, information about it appears. Figure 6-7 6-10 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual If no new firmware version is available, a message displays and the router returns to the Firmware Update screen. Figure 6-8 3. To update your firmware, click Yes and follow the prompts. Warning: When updating firmware to the JWNR2000v2 router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The update process typically takes about 1 minute. Updating Manually to New Router Firmware To manually select, download, and install new software to your router:
1. Log in to your router, select Router Status under Maintenance on the main menu, and make note of the firmware version of your router. Figure 6-9 2. Go to the JWNR2000v2 support page on the NETGEAR website at http://www.netgear.com/support. Using Network Monitoring Tools 6-11 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. Compare the version number of the most recent firmware offered to the firmware version of your router. If the version on the NETGEAR website is more recent, download the file from the JWNR2000v2 support page to your computer. 4. Log in to your router and select Router Upgrade under Maintenance on the main menu. 5. Click Browse, and locate the firmware image that you downloaded to your computer (the file ends in .img or .chk). 6. Click Upload to send the firmware to the router. Warning: When updating firmware to the JWNR2000v2 router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The upgrade process typically takes about 1 minute. 6-12 Using Network Monitoring Tools v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Enabling Remote Management Access Using the Remote Management feature, you can allow a user on the Internet to configure, upgrade, and check the status of your JWNR2000v2 router. Select Remote Management under Advanced in the main menu. The Remote Management screen displays. Figure 6-10 Note: Be sure to change the routers default configuration password to a very secure password. The ideal password should contain no dictionary words from any language, and should be a mixture of letters (both uppercase and lowercase), numbers, and symbols. Your password can be up to 30 characters. To configure your router for remote management:
1. Select the Turn Remote Management On check box. Using Network Monitoring Tools 6-13 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Under Allow Remote Access By, specify what external IP addresses will be allowed to access the routers remote management. Note: For enhanced security, restrict access to as few external IP addresses as practical. To allow access from any IP address on the Internet, select Everyone. To allow access from a range of IP addresses on the Internet, select IP Address Range. Enter a beginning and ending IP address to define the allowed range. To allow access from a single IP address on the Internet, select Only This Computer. Enter the IP address that will be allowed access. 3. Specify the port number for accessing the management interface. Normal Web browser access uses the standard HTTP service port 80. For greater security, enter a custom port number for the remote management Web interface. Choose a number between 1024 and 65535, but do not use the number of any common service port. The default is 8080, which is a common alternate for HTTP. 4. Click Apply to have your changes take effect. Note: When accessing your router from the Internet, enter your routers WAN IP address into your browsers address or location field, followed by a colon (:) and the custom port number. For example, if your external address is 134.177.0.123 and you use port number 8080, then enter http://134.177.0.123:8080 in your browser. 6-14 Using Network Monitoring Tools v1.0, March 2011 Chapter 7 Troubleshooting This chapter provides information about troubleshooting your N300 Wireless Router Model JWNR2000v2. After each problem description, instructions are provided to help you diagnose and solve the problem. As a first step, please review the Quick Tips. Tip: NETGEAR provides helpful articles, documentation, and the latest software updates at http://www.netgear.com/support. This chapter includes the following sections:
Quick Tips Troubleshooting Basic Functions on page 7-2 Login Problems on page 7-4 Checking the Internet Service Connection on page 7-5 Troubleshooting Your Network Using the Ping Utility on page 7-7 Problems with Date and Time on page 7-9 Problems with Wireless Adapter Connections on page 7-10 Restoring the Default Configuration and Password on page 7-11 Quick Tips This section describes tips for troubleshooting some common problems:
Be sure to restart your network in this sequence. 1. Turn off and unplug the modem. 2. Turn off the wireless router and computers. 3. Plug in the modem and turn it on. Wait 2 minutes. v1.0, March 2011 7-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 4. Turn on the wireless router and wait 1 minute. 5. Turn on the computers. Make sure that the Ethernet cables are securely plugged in. The Internet status light on the wireless router is on if the Ethernet cable connecting the wireless router and the modem is plugged in securely and the modem and wireless router are turned on. For each powered-on computer connected to the wireless router by an Ethernet cable, the corresponding numbered router LAN port light is on. Make sure that the wireless settings in the computer and router match exactly. For a wirelessly connected computer, the wireless network name (SSID) and WEP or WPA security settings of the router and wireless computer must match exactly. If you have enabled the wireless router to restrict wireless access by MAC address, you must add the wireless computers MAC address to the routers wireless card access list. Make sure that the network settings of the computer are correct. LAN connected computers must be configured to obtain an IP address automatically using DHCP. For more information, see the links in Appendix B, Related Documents. Some cable modem services require you to use the MAC address of the computer registered on the account. If so, in the Router MAC Address section of the Basic Settings menu, select Use this Computers MAC Address. Click Apply to save your settings. Restart the network in the correct sequence. Check the Test light to verify correct router operation. If the Test light does not turn off within 2 minutes after you turn the router on, reset the router according to the instructions in Restoring the Default Configuration and Password on page 7-11. Troubleshooting Basic Functions After you turn on power to the router, the following sequence of events should occur:
1. When power is first applied, verify that the power/check icon 2. Verify that the power/check light turns green and blinks slowly, indicating that the system is is on. initializing. 7-2 Troubleshooting v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 3. After approximately 20 seconds, verify that:
a. The power/check light changes to solid green. b. The LAN port lights are lit for any local ports that are connected. If a ports light is lit, a link has been established to the connected device. If a LAN port is connected to a 100 Mbps device, verify that the ports light is green. If the port is 10 Mbps, the light will be amber. 4. c. The Internet port is connected and its light is lit. If you have enabled WPS security, verify that the push-button stops blinking and changes to green (otherwise the push-button light should be off). If the correct behavior does not occur, see the appropriate following section. The Power light is not on. If the Power and other lights are off when your router is turned on:
Make sure that the power cord is properly connected to your router and that the power adapter is properly connected to a functioning power outlet. Check that you are using the power adapter supplied by NETGEAR for this product. If the error persists, you have a hardware problem and should contact Technical Support. The Power light blinks green slowly and continuously (Case 1). The router firmware is corrupted or system initialization has failed. To restore your firmware:
1. Make sure your PC is connected to your router and the router is powered on. 2. Download the firmware from the NETGEAR support page. 3. Follow the instructions to restore your firmware. 4. After firmware recovery is complete, follow the prompts to restore your configuration settings. The Power light blinks green slowly and continuously (Case 2). If the Power light continues to blink for over 1 minute after powering on power to the router:
1. Turn the power off and back on to see if the router recovers. Troubleshooting 7-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 2. Clear the routers configuration to factory defaults. This will set the routers IP address to www.routerlogin.net. This procedure is explained in Restoring the Default Configuration and Password on page 7-11. If the error persists, you might have a hardware problem and should contact Technical Support. The Internet or LAN port lights are not on. If either the LAN or Internet lights do not light when the Ethernet connection is made, check the following:
1. Make sure that the Ethernet cable connections are secure at the router and at the computer. 2. Make sure that power is turned on to the connected computer. 3. Be sure you are using Ethernet cables like the cable that was supplied with the wireless router. See the NETGEAR Wireless Router Setup Manual for instructions. Login Problems If you are unable to log in to the wireless router, check the following:
If you are using an Ethernet-connected computer, check the Ethernet connection between the computer and the router as described in the NETGEAR Wireless Router Setup Manual. Make sure you are using the correct login information. The factory default login name is admin and the password is password. Make sure that the Caps Lock is off when entering this information. Make sure your computers IP address is on the same subnet as the router. If your are using the recommended addressing scheme, your computers address should be in the range of 192.168.1.2 to 192.168.1.254. Refer to your computers documentation or see Preparing Your Network in Appendix B for help with configuring your computer. Note: If your computer cannot reach a DHCP server, some operating systems will assign an IP address in the range 169.254.x.x. If your IP address is in this range, verify that you have a good connection from the computer to the router, then restart (reboot) your computer. If your routers IP address has been changed and you dont know the current IP address, reset the routers configuration to the factory defaults. This procedure will reset the routers IP address to 192.168.1.1 (see Default Configuration Settings in Appendix A). 7-4 Troubleshooting v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Make sure your browser has Java, JavaScript, or ActiveX enabled. If you are using Internet Explorer, click Refresh to be sure the Java applet is loaded. Try closing the browser and reopening it again. If you are attempting to set up your NETGEAR router as an additional router behind an existing router in your network, consider replacing the existing router instead. NETGEAR does not support such a configuration. If you are attempting to set up your NETGEAR router as a replacement for an ADSL gateway in your network, the router cannot perform many gateway services, for example, converting ADSL or Cable data into Ethernet networking information. NETGEAR does not support such a configuration. Checking the Internet Service Connection If you can access your router, but your router is unable to access the Internet, review the topics in this section:
Obtaining an Internet IP Address Troubleshooting PPPoE Troubleshooting Internet Browsing Obtaining an Internet IP Address If your wireless router is unable to access the Internet, and your Internet light is amber, check the wireless router to see if it is able to get an Internet IP address from your service provider. Unless you have a static IP address, your wireless router automatically requests an IP address from your service provider. To check your wireless routers Internet IP address:
1. Log in to the wireless router. 2. Select Router Status, under Maintenance in the main menu, to check that an IP address is shown for the Internet Port. If 0.0.0.0 is shown, your wireless router has not obtained an IP address from your service provider. If your router is unable to obtain an IP address from the your service provider, the problem might be one of the following:
Troubleshooting 7-5 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual You might need to force your cable or DSL modem to recognize your new router by restarting your network, in the sequence described in the NETGEAR Wireless Router Setup Manual. Your service provider might require a login. Ask your service provider whether they require a PPP over Ethernet (PPPoE) login (see Troubleshooting PPPoE on page 7-6). You might have incorrectly set the service name, user name or password. Review your routers Basic Settings screen. Your service provider might check for your computer's host name. Assign the computer Host Name of your ISP account to the wireless router on the Basic Settings screen. Your service provider might only allow one Ethernet MAC address to connect to the Internet, and check for your computers MAC address. If this is the case:
Inform your service provider that you have bought a new network device, and ask them to use the wireless routers MAC address, or Configure your router to spoof your computers MAC address. On the Basic Settings screen in the Router MAC Address section, select Use this Computers MAC Address and click Apply. Then restart your network in the correct sequence (see the NETGEAR Wireless Router Setup Manual for instructions). Troubleshooting PPPoE If you are using PPPoE, try troubleshooting your Internet connection. To troubleshoot a PPPoE connection:
1. Log in to the wireless router. 2. Select Router Status under Maintenance on the main menu. 3. Click Connection Status. If all of the steps indicate OK, then your PPPoE connection is up and working. If any of the steps indicate Failed, you can attempt to reconnect by clicking Connect. The wireless router will continue to attempt to connect indefinitely. If you cannot connect after several minutes, you might be using an incorrect service name, user name, or password. There also might be a provisioning problem with your ISP. Note: Unless you connect manually, the wireless router will not authenticate using PPPoE until data is transmitted to the network. 7-6 Troubleshooting v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Troubleshooting Internet Browsing If your wireless router can obtain an IP address but your computer is unable to load any web pages from the Internet, check the following:
Your computer might not recognize any DNS server addresses. A DNS server is a host on the Internet that translates Internet names (such as www addresses) to numeric IP addresses. Typically, your ISP will provide the addresses of one or two DNS servers for your use. If you entered a DNS address during the wireless routers configuration, restart your computer. Alternatively, you can configure your computer manually with a DNS address, as explained in the documentation for your computer. Your computer might not have the wireless router configured as its default gateway. Reboot the computer and verify that the wireless router address (www.routerlogin.net) is listed by your computer as the default gateway address. You might be running login software that is no longer needed. If your ISP provided a program to log you in to the Internet (such as WinPoET), you no longer need to run that software after installing your router. You might need to go to Internet Explorer and select Tools > Internet Options, click the Connections tab, and select Never dial a connection. If the wireless router does not save changes you have made in the browser interface, check the following:
When entering configuration settings, be sure to click Apply before moving to another screen or tab, or your changes could be lost. Click Refresh or Reload in the Web browser. The changes might have occurred, but the Web browser might be caching the old configuration. Troubleshooting Your Network Using the Ping Utility Most network devices and routers contain a ping utility that sends an echo request packet to the designated device. The device then responds with an echo reply. Troubleshooting a network is made very easy by using the ping utility in your computer or workstation. This section includes:
Testing the LAN Path to Your Router Testing the Path from Your Computer to a Remote Device Troubleshooting 7-7 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Testing the LAN Path to Your Router You can ping the router from your computer to verify that the LAN path to your router is set up correctly. To ping the router from a running Windows PC:
1. From the Windows toolbar, click Start, and then select Run. 2. In the field provided, type ping followed by the IP address of the router, as in this example:
ping www.routerlogin.net 3. Click OK. You should see a message like this one:
Pinging <IP address > with 32 bytes of data If the path is working, you see this message:
Reply from < IP address >: bytes=32 time=NN ms TTL=xxx If the path is not working, you see this message:
Request timed out If the path is not functioning correctly, you could have one of the following problems:
Wrong physical connections For a wired connection, make sure that the numbered LAN port light is on for the port to which you are connected. If the light is off, follow the instructions in Troubleshooting Basic Functions on page 7-2. Check that the appropriate LEDs are on for your network devices. If your router and computer are connected to a separate Ethernet switch, make sure that the link lights are on for the switch ports that are connected to your computer and router. Wrong network configuration Verify that the Ethernet card driver software and TCP/IP software are both installed and configured on your computer. Verify that the IP address for your router and your computer are correct and that the addresses are on the same subnet. 7-8 Troubleshooting v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Testing the Path from Your Computer to a Remote Device After verifying that the LAN path works correctly, test the path from your computer to a remote device. 1. From the Windows toolbar, click the Start button, and then select Run. 2. In the Windows Run window, type:
ping -n 10 <IP address>
where <IP address> is the IP address of a remote device such as your ISPs DNS server. If the path is functioning correctly, replies like those shown in the previous section are displayed. If you do not receive replies:
Check that your computer has the IP address of your router listed as the default gateway. If the IP configuration of your computer is assigned by DHCP, this information is not be visible in your computers Network Control Panel. Verify that the IP address of the router is listed as the default gateway as described in the online document you can access from Preparing Your Network in Appendix B. Check to see that the network address of your computer (the portion of the IP address specified by the subnet mask) is different from the network address of the remote device. Check that your cable or DSL modem is connected and functioning. If your ISP assigned a host name to your computer, enter that host name as the account name in the Basic Settings screen. Your ISP could be rejecting the Ethernet MAC addresses of all but one of your computers. Many broadband ISPs restrict access by allowing traffic only from the MAC address of your broadband modem, but some ISPs additionally restrict access to the MAC address of a single computer connected to that modem. If this is the case, you must configure your router to clone or spoof the MAC address from the authorized computer. For more information, see Using the Setup Manual on page 1-1. Problems with Date and Time Select E-mail under Content Filtering in the main menu to display a screen that shows the current date and time of day. The JWNR2000v2 router uses the Network Time Protocol (NTP) to obtain the current time from one of several network time servers on the Internet. Each entry in the log is stamped with the date and time of day. Problems with the date and time function can include the following:
Troubleshooting 7-9 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Date shown is January 1, 2000. Cause: The router has not yet successfully reached a network time server. Check that your Internet access settings are correct. If you have just completed configuring the router, wait at least 5 minutes, and check the date and time again. Time is off by one hour. Cause: The router does not adjust for daylight savings time. In the E-mail screen, select the Automatically Adjust for Daylight Savings Time check box. Problems with Wireless Adapter Connections If your wireless adapter is unable to connect, check its connection settings. To check the adapters connection settings:
1. open the adapter setup utility to check connections:
NETGEAR Smart Wizard utility. If you installed a NETGEAR wireless adapter in your computer, a Smart Wizard utility program is installed that can provide helpful information about your wireless network. You can find this program in your Windows Program menu or as an icon in your system tray. Other wireless card manufacturers might include a similar program. Windows basic setup utility. If you have no specific wireless card setup program installed, you can use the basic setup utility in Windows:
Open the Windows Control Panel, and double-click Network Connections. In the LAN section, double-click Wireless Network Connection. 2. Use the adapters setup program to scan for available wireless networks, looking for the network name (SSID) of NETGEAR, or your custom SSID if you have changed it. If your wireless network appears and has good signal strength, configure and test with the simplest wireless connection possible. 3. If your wireless network does not appear, check these conditions:
Is your routers wireless radio enabled? See Viewing Advanced Wireless Settings on page 2-12. Is your routers SSID broadcast enabled? See Viewing Advanced Wireless Settings on page 2-12. Is your router set to a wireless standard that is not supported by your wireless adapter? Check the Mode setting as described in Viewing and Configuring Basic ISP Settings on page 1-5. 7-10 Troubleshooting v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual If your wireless network appears, but the signal strength is weak, check these conditions:
Is your router too far from your adapter, or too close? Place the computer that has the adapter near the router, but at least 6 feet away, and see whether the signal strength improves. Is your wireless signal obstructed by objects between the router and your adapter? See Optimizing Wireless Performance on page 5-15. Restoring the Default Configuration and Password This section explains how to restore the factory default configuration settings that reset the routers user name to admin, the password to password, and the IP address to 192.168.1.1. Warning: These procedures erase all current configuration settings. You can erase the current configuration and restore factory defaults in two ways:
Use the Erase function of the router. To use the Erase function, see Erasing the Configuration on page 6-9. Use the restore factory settings button on the rear panel of the router. Use this method for cases when the administration password or IP address is not known. To use the restore settings button:
1. Locate the restore factory settings button on the rear panel of the router. 2. Use a sharp object such as a pen or a paper clip to press and hold the restore factory settings button for about 5 seconds, until the Power light begins to blink. 3. Release the restore factory settings button, and wait for the router to restart, and for the Power light to stop blinking and become solid green. The factory default settings will be restored so that you can access the router from your Web browser using the factory defaults. If the wireless router fails to restart, or the Power light continues to blink or turns solid amber, the unit might be defective. If the error persists, you might have a hardware problem and should contact Technical Support at http://www.netgear.com/support. Troubleshooting 7-11 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual 7-12 Troubleshooting v1.0, March 2011 Appendix A Technical Specifications Default Configuration Settings This appendix provides factory default settings and technical specifications for the N300 Wireless Router Model JWNR2000v2. Table A-1. JWNR2000v2 Router Default Configuration Settings Feature Router Login Router Login URL Login Name (case-sensitive) printed on product label Login Password (case-sensitive) printed on product label Internet Connection WAN MAC Address MTU Size Local Network Default Setting http://www.routerlogin.net or http://www.routerlogin.com admin password Default hardware address (on label) 1500 Router LAN IP address printed on product label
(also known as Gateway IP address) Router Subnet DHCP Server DHCP range Time Zone Time Zone Adjusted for Daylight Saving Time Allow a Registrar to configure this router 192.168.1.1 255.255.255.0 Enabled 192.168.1.2 to 192.168.1.254 GMT Disabled Enabled Technical Specifications A-1 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual Table A-1. JWNR2000v2 Router Default Configuration Settings (continued) Wireless Wireless Communication SSID Name Security Wireless Access List (MAC Filtering) Broadcast SSID Transmission Speed Country/Region RF Channel Operating Mode Data Rate Output Power Firewall Enabled NETGEAR Disabled All wireless stations allowed Enabled Auto*
United States (North America only; otherwise varies by country and region) 6 until region selected 145 Mbps Best Full Inbound (communications coming in from the Internet) Disabled (bars all unsolicited requests except Outbound (communications going out to the Internet) for traffic on port 80, the http port) Enabled (all)
*. Maximum Wireless signal rate derived from IEEE Standard 802.11 specifications. Actual throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead lower actual data throughput rate. A-2 Technical Specifications v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual General Specifications Table A-2. JWNR2000v2 Router General Specifications Feature General Network Protocol and Standards Compatibility Data and Routing Protocols TCP/IP, RIP-1, RIP-2, DHCP, PPPoE, PPTP, Bigpond, Dynamic DNS, and UPnP Power Adapter North America UK, Australia Europe Japan All regions (output) Physical Dimensions Weight Environmental 120V, 60 Hz, input 240V, 50 Hz, input 230V, 50 Hz, input 100V, 50/60 Hz, input 12V DC @ 1.0A, output 6.8" x 4.6" x 1.4"
172.7 x 115.7 x 32.6 mm 0.48 lbs. 0.216 kg Operating temperature Operating humidity 0 to 40 C (32 to 104 F) 90% maximum relative humidity, noncondensing Electromagnetic Emissions Designed to conform to the following standards Interface Specifications LAN WAN FCC Part 15 Class B EN 55022/24 (CISPR 22/24) Class B EN 60950 (CE LVD) Class B KCC 10BASE-T or 100BASE-Tx, RJ-45 10BASE-T or 100BASE-Tx, RJ-45 Technical Specifications A-3 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual A-4 Technical Specifications v1.0, March 2011 Appendix B Related Documents This appendix provides links to reference documents you can use to gain a more complete understanding of the technologies used in your NETGEAR product. Table B-1. Reference Documents Document TCP/IP Networking Basics Wireless Networking Basics Preparing Your Network Virtual Private Networking Basics Glossary Link http://documentation.netgear.com/reference/enu/tcpip/index.htm http://documentation.netgear.com/reference/enu/wireless/index.htm http://documentation.netgear.com/reference/enu/wsdhcp/index.htm http://documentation.netgear.com/reference/enu/vpn/index.htm http://documentation.netgear.com/reference/enu/glossary/index.htm In addition, you can find initial setup instructions for your wireless router in the NETGEAR Wireless Router Setup Manual. Related Documents B-1 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual B-2 Related Documents v1.0, March 2011 Index Big Pond 1-10 blocking access 3-1 inbound traffic 5-1 bold text xi broadband Internet 5-24 broadcast status 6-4 C cables, checking 7-2 channel, frequency 2-8 channel, wireless port 6-4 clients, adding 2-13, 2-18, 6-4 communication mode 2-8, 6-4 compatibility, protocol and standards A-3 configuration file backing up 6-8 erasing 6-9 managing 6-7 configuring advanced security 2-12 basic security 2-6 DMZ server 4-9 Dynamic DNS 4-7 LAN IP settings 4-2 NAT 4-10 port forwarding 5-6 port triggering 5-10 repeater unit 4-15 WPA security 2-10 WPS 2-17 See also adding connection mode 1-10 connection status settings 6-5 connection types 5-24 A access blocking 3-1 remote 6-13 restricting by MAC address 2-19 to a remote computer 5-2 to the router 1-2 viewing logs 3-6 access control turning off 1-13 turning on 2-21 access points 4-12 account name 1-8 adding custom service 5-7 priority rules 5-18 reserved IP addresses 4-5 static routes 4-11 wireless clients 2-13, 2-18, 6-4 See also configuring administrator password, changing 2-21 advanced wireless settings 2-12 advertisement period 5-15 AES (Advanced Encryption Standard) encryption 2-11 attached devices 6-7 authentication, required by mail server 3-8 automatic logout 1-5 B backing up configuration file 6-8 backing up, transfer time 5-26 base station, setting up 4-14 basic settings 2-6 basic wireless connectivity 1-11 v1.0, March 2011 Index-1 NETGEAR N300 Wireless Router JWNR2000v2 User Manual content filtering 3-1 CTS/RTS Threshold 2-13 custom service (port forwarding) 5-7 customer support ii D data packets, fragmented 5-16 date and time, troubleshooting 7-10 daylight savings time 3-9, 7-11 default DMZ server 4-8 default factory settings listed A-1 restoring 7-12 default gateway 6-5 default LAN IP configuration 4-3 deleting configuration 6-9 device name 4-2 DHCP server 4-4, 6-5 DHCP setting 6-3 disabling firewall 4-8 router PIN 2-17 wireless client association 4-14 DMZ server 4-8 DNS servers 5-2 Documentation Web page 1-4 documents, reference B-1 domain name 1-8 Domain Name Server (DNS) addresses current 6-3 entering 1-8, 1-11 Dynamic DNS 4-6 dynamic IP addresses 1-8 DynDNS.org 4-6 E electromagnetic emissions A-3 e-mailing logs 3-7 encryption 2-1 Index-2 encryption keys 2-10 environmental specifications A-3 erasing configuration 6-9 Ethernet MAC address 6-7 F factory default settings listed A-1 restoring 7-12 filtering content 3-1 firewalls default settings A-2 disabling 4-8 overview 2-23 firmware restoring 7-3 updating 1-3, 6-3, 6-9 fixed font text xi fixed IP addresses 1-8 Fragmentation Threshold 2-13 fragmented data packets 5-16 frequency, channel 2-8 G generating encryption keys 2-10 Gigabit Ethernet 5-25 GUI language version 6-3 H hardware version 6-3 host name 1-8, 6-7 HTML version, printing xii I idle time-out 1-11 inbound traffic, allowing or blocking 5-1 interface specifications A-3 interference, reducing 5-16 v1.0, March 2011 Internet connection default settings A-1 Internet port, status 6-3 Internet Relay Chat (IRC) 5-3 Internet services, blocking access 3-3 interval, poll 6-6 IP addresses blocking access by 3-5 current 6-3 dynamic or static 1-8 LAN 4-3 registering domain name 4-6 reserved 4-5 IP subnet mask 4-3, 6-3 ISP settings, basic 1-7 italic text xi K keys, encryption 2-10 keywords, blocking by 3-1 knowledge base 1-4 L LAN IP setup 4-1 LAN path, troubleshooting 7-9 LAN port settings 6-3 language, screen display 1-5 lease, DHCP 6-5 Legacy mode 2-8 local network, default settings A-1 local servers, port forwarding to 5-6 logging in 1-2 login required 1-9 login settings A-1 logout, automatic 1-5 logs sending 3-7 time-stamping entries 3-9 viewing 3-6 NETGEAR N300 Wireless Router JWNR2000v2 User Manual M MAC addresses attached devices 6-7 current 6-3 entering 1-8 restricting access by 2-19 spoofing 7-7 mail server, outgoing 3-8 managing router remotely 6-13 metric value 4-12 mixed mode encryption 2-3, 2-11 mode, communication 2-8, 6-4 MTU size 4-9, 5-16 N NAT (Network Address Translation) 4-8, 4-10, 5-2 Neighbor Friendly mode 2-8 NetBIOS host name 6-7 Network Time Protocol (NTP) 3-9, 7-10 O obstructions, connecting through 5-25 Open System authentication 2-9 optimizing performance 5-15 outgoing mail server 3-8 P passphrases 2-9, 2-10, 2-11 password changing 2-21 restoring 7-12 path, testing 7-10 Performance mode 2-8 performance, optimizing 5-15 physical push button (WPS) 2-14 physical specifications A-3 PIN 2-15, 2-17 ping 4-9, 7-8 v1.0, March 2011 Index-3 NETGEAR N300 Wireless Router JWNR2000v2 User Manual placement, router 5-16 poll interval 6-6 port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-6 port triggering configuring 5-10 example 5-3 portmap table 5-15 power adapter specifications A-3 Power light, troubleshooting and 7-2 Powerline HD products 5-25 PPPoE (PPP over Ethernet) 1-10 PPTP (Point to Point Tunneling Protocol) 1-9 Preamble mode 2-13 primary DNS server 1-8, 1-11 printing manual xii prioritizing traffic 5-18 protocols, compatibility A-3 Push N Connect 2-13, 6-4, 7-4 push button configuration (WPS) 2-14 Q QoS (Quality of Service) 5-18 R radio, wireless 1-13, 2-12, 6-4 range, router 5-15 reducing interference 5-16 reference documents B-1 region of operation 2-7 registering product ii releasing connection status 6-5 remote devices, testing path 7-10 remote management 6-13 Index-4 renewing connection status 6-5 repeater units 4-15 requirements, speed 5-25 reserved IP adresses 4-5 Resource CD 1-1 restarting network 7-1 restoring configuration 6-8 default factory settings 7-12 restoring firmware 7-3 restricting access by MAC address 2-19 revision history xiii RIP (Router Information Protocol) direction 4-3 route name 4-11, 4-12 router PIN 2-15, 2-17 router status, viewing 6-2 S scheduling blocking 3-5 screen display language 1-5 selecting 1-5 secondary DNS server 1-8, 1-11 security options, compared 2-2 setting up 2-1 security PIN 2-15, 2-17 service name 1-10 service numbers 3-4 services, blocking 3-3 setting time 3-9 settings, default. See default factory settings setup information, gathering 2-5 Setup Manual 1-1 Shared Key authentication 2-5, 2-9 Smart Setup Wizard 1-6 SMTP server 3-8 software push button configuration (WPS) 2-14 specifications technical A-1 v1.0, March 2011 NETGEAR N300 Wireless Router JWNR2000v2 User Manual speed requirements 5-25 SPI (Stateful Packet Inspection) firewall 4-8 spoofing MAC addresses 1-8, 7-7 SSID 1-12, 2-7, 6-4 SSID broadcast 1-13, 2-12 standards, compatibility A-3 static IP addresses 1-8 static routes 4-10 statistics, usage 6-6 status, viewing 6-2 streaming video and audio 5-25 subnet mask 4-3, 6-3 system up time 6-6 T TCP/IP network, troubleshooting 7-8 technical specifications A-1 Telstra Bigpond 1-10 testing wireless connections 1-11 time of day, troubleshooting 7-10 time to live, advertisement 5-15 time, setting 3-9 time-out idle 1-11 port triggering 5-11 TKIP (Temporal Key Integrity Protocol) encryption 2-11 trademarks ii traffic metering 6-15 traffic, prioritizing 5-18 transfer time (backing up) 5-26 troubleshooting 7-1 trusted user 3-2 typographical conventions xi U Universal Plug and Play (UPnP) 5-14 up time, system 6-6 updating firmware 1-3, 6-3, 6-9 URLs typography for xi usage statistics 6-6 V version firmware 6-3, 6-9 RIP (Router Information Protocol) 4-3 viewing advanced wireless settings 2-12 attached devices 6-7 basic security settings 2-6 logs 3-6 status 6-2 W WAN setup 4-8 WDS 4-12, 4-13 WEP encryption 2-3, 2-9 Wi-Fi Protected Setup (WPS) 2-13, 6-4, 7-4 wildcards, DNS and 4-7 Wireless Card Access List 2-19 wireless client PIN 2-15 wireless clients, adding 2-13, 2-18, 6-4 wireless connection type 5-24 Wireless Distribution System (WDS) 4-12 wireless network name 1-12, 2-7, 6-4 wireless port settings 6-4 wireless radio 1-13, 2-12, 6-4 wireless repeating 4-12, 4-13 base station 4-14 repeater unit 4-15 wireless repeating function 4-12, 4-13 wireless security, setting up 2-1 wireless settings advanced 2-12 basic 2-6 default, listed A-2 gathering information 2-5 v1.0, March 2011 Index-5 NETGEAR N300 Wireless Router JWNR2000v2 User Manual testing 1-11 WMM (Wi-Fi Multimedia) 5-18 WPA2-PSK encryption 2-3, 2-10 WPA-PSK + WPA2-PSK encryption 2-3, 2-10 WPA-PSK encryption 2-3, 2-10 Index-6 v1.0, March 2011
1 2 | UserMan | Users Manual | 2.18 MiB | May 24 2012 |
Easy, Reliable & Secure User Manual N300 WiFi Router
(N300R) User Manual 202-11001-01 May 2012 Trademarks Brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice. In the interest of improving internal design, operational function, and/or reliability, On Networks reserves the right to make changes to the products described in this document without notice. On Networks does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. This symbol is placed in accordance with the European Union Directive 2002/96 on the Waste Electrical and Electronic Equipment (the WEEE Directive). If disposed of within the European Union, this product should be treated and recycled in accordance with the laws of your jurisdiction implementing the WEEE Directive. ii May 2012 Contents Chapter 1 Configuring Basic Connectivity Powering On Your Wireless Router.................................................................................1-1 Logging In To Your Wireless Router ..............................................................................1-1 Configuring Your Internet Connection Using the Smart Setup Wizard ...........................1-5 Viewing and Configuring Basic ISP Settings ..................................................................1-5 Setting Up and Testing Basic Wireless Connectivity ....................................................1-10 Chapter 2 Safeguarding Your Network Choosing Appropriate Wireless Security ........................................................................2-1 Recording Basic Wireless Settings Setup Information ...................................................2-5 Changing Wireless Security Settings .............................................................................2-6 Viewing Basic Wireless Settings ..............................................................................2-6 Configuring WEP Wireless Security .........................................................................2-9 Configuring WPA-PSK and WPA2-PSK Wireless Security ....................................2-10 Viewing Advanced Wireless Settings ...........................................................................2-12 Using Push 'N' Connect (Wi-Fi Protected Setup) .........................................................2-13 Push Button Configuration .....................................................................................2-14 Security PIN Entry ..................................................................................................2-15 Configuring the WPS Settings ................................................................................2-17 Connecting Additional Wireless Client Devices after WPS Setup ..........................2-18 Restricting Wireless Access by MAC Address .............................................................2-19 Changing the Administrator Password .........................................................................2-21 Backing Up Your Configuration ....................................................................................2-22 Live Parental Controls ...................................................................................................2-23 Understanding Your Firewall ........................................................................................2-23 v1.0, May 2012 vii N300 WiFi Router (N300R) User Manual Chapter 3 Restricting Access From Your Network Content Filtering Overview .............................................................................................3-1 Blocking Access to Internet Sites ...................................................................................3-1 Blocking Access to Internet Services .............................................................................3-3 Blocking Services by IP Address Range ..................................................................3-5 Scheduling Blocking .......................................................................................................3-5 Viewing Logs of Web Access or Attempted Web Access ...............................................3-6 Configuring E-mail Alert and Web Access Log Notifications ..........................................3-7 Chapter 4 Customizing Your Network Settings Using the LAN IP Setup Options ....................................................................................4-1 Configuring a Device Name .....................................................................................4-2 Configuring LAN TCP/IP Setup Parameters ............................................................4-3 Using the Router as a DHCP Server ........................................................................4-4 Using Address Reservation ......................................................................................4-5 Using a Dynamic DNS Service .......................................................................................4-6 Configuring the WAN Setup Options ..............................................................................4-8 Disabling Prt Scan and DoS Protection ....................................................................4-8 Setting Up a Default DMZ Server .............................................................................4-8 Responding to a Ping on the Internet (WAN) Port ...................................................4-9 Ebling IBMP Proxying ...............................................................................................4-9 Setting the MTU Size .............................................................................................4-10 Configuring NAT Filtering .......................................................................................4-10 Configuring Static Routes .............................................................................................4-10 Wireless Repeating (Also Called WDS) .......................................................................4-12 Wireless Repeating Function .................................................................................4-13 Setting Up the Base Station ...................................................................................4-14 Setting Up a Repeater Unit ....................................................................................4-15 viii Contents v1.0, May 2012 N300 WiFi Router (N300R) User Manual Chapter 5 Fine-Tuning Your Network Allowing Inbound Connections to Your Network ............................................................5-1 How Your Computer Accesses a Remote Computer through Your Router .............5-2 How Port Triggering Changes the Communication Process ....................................5-3 How Port Forwarding Changes the Communication Process ..................................5-5 How Port Forwarding Differs from Port Triggering ...................................................5-6 Configuring Port Forwarding to Local Servers ................................................................5-6 Adding a Custom Service .........................................................................................5-7 Editing or Deleting a Port Forwarding Entry .............................................................5-9 Configuring Port Triggering ..........................................................................................5-10 Using Universal Plug and Play .....................................................................................5-14 Optimizing Wireless Performance ................................................................................5-15 Changing the MTU Size ...............................................................................................5-16 Quality of Service .........................................................................................................5-18 Using WMM QoS for Wireless Multimedia Applications .........................................5-18 Configuring QoS for Internet Access ......................................................................5-18 Overview of Home and Small Office Networking Technologies ...................................5-24 Assessing Your Speed Requirements ...................................................................5-25 Chapter 6 Using Network Monitoring Tools Viewing Wireless Router Status Information ..................................................................6-2 Viewing a List of Attached Devices ................................................................................6-7 Managing the Configuration File .....................................................................................6-7 Backing Up and Restoring the Configuration ...........................................................6-8 Erasing the Configuration .........................................................................................6-9 Updating the Router Firmware .......................................................................................6-9 Checking for New Firmware in the Router Upgrade Screen ..................................6-10 Updating Manually to New Router Firmware .........................................................6-11 Enabling Remote Management Access .......................................................................6-13 Traffic Meter ..................................................................................................................6-15 Contents ix v1.0, May 2012 N300 WiFi Router (N300R) User Manual Chapter 7 Troubleshooting Quick Tips .......................................................................................................................7-1 Troubleshooting Basic Functions ...................................................................................7-2 Login Problems ...............................................................................................................7-4 Checking the Internet Service Connection .....................................................................7-5 Obtaining an Internet IP Address .............................................................................7-5 Troubleshooting PPPoE ...........................................................................................7-6 Troubleshooting Internet Browsing ..........................................................................7-7 Troubleshooting Your Network Using the Ping Utility .....................................................7-7 Testing the LAN Path to Your Router .......................................................................7-8 Testing the Path from Your Computer to a Remote Device .....................................7-9 Problems with Date and Time ........................................................................................7-9 Problems with Wireless Adapter Connections ..............................................................7-10 Restoring the Default Configuration and Password ......................................................7-11 Appendix A Technical Specifications Default Configuration Settings ....................................................................................... A-1 General Specifications ................................................................................................... A-3 Appendix B Related Documents Index x Contents v1.0, May 2012 Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. This chapter provides further details about connectivity settings, as well as instructions on how to log in to the router for further configuration.This chapter includes the following sections:
Logging In To Your WiFi Router Configuring Your Internet Connection Using the Smart Setup Wizard on page 1-5 Viewing and Configuring Basic ISP Settings on page 1-5 Setting Up and Testing Basic Wireless Connectivity on page 1-11 Logging In To Your WiFi Router When the WiFi router is connected to your network, you can access and configure the router using your browser. To access the router:
1. Connect to the WiFi router by typing http://www.routerlogin.com in the address field of your browser, and then press Enter. A login window displays. Figure 1-1 May 2012 1-1 N300 WiFi Router (N300R) User Manual Tip: You can connect to the WiFi router by typing either of these URLs in the http://www.routerlogin.net http://www.routerlogin.com address field of your browser, and then pressing Enter:
If these URLs do not work, you must type the IP address of the router, for example, http://www.192.168.1.1. 2. Enter admin for the router user name and your password (or the default, password). For information about how to change the password, see Changing the Administrator Password on page 2-21. Note: The router user name and password are not the same as any other user name or password you might use to log in to your Internet connection. The Checking for Firmware Updates screen appears unless you previously cleared the Check for Updated Firmware Upon Log-in check box. Figure 1-2 1-2 Configuring Basic Connectivity v1.0, May 2012 If the router discovers a newer version of firmware, the message on the left displays when you log in. If no new firmware is available, the message on the right displays. N300 WiFi Router (N300R) User Manual Figure 1-3 To automatically update to the new firmware, click Yes to allow the router to download and install the new firmware file from On Networks. Warning: When uploading firmware to the N300R router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The update process typically takes about 1 minute. In the main menu on the left, select Basic Settings under Setup. The Basic Settings screen displays showing the WiFi routers home page and suggested default settings. 3. Configuring Basic Connectivity 1-3 May 2012 N300 WiFi Router (N300R) User Manual Figure 1-4 Note: If the Check for New Version Upon Log-in check box is selected, the home page is the Router Upgrade screen. Otherwise, it is the Basic Settings screen. If the WiFi router is connected to the Internet, you can select Knowledge Base under Web Support in the main menu to view support information for the WiFi router. If you do not click Logout, the WiFi router will wait for 5 minutes after no activity before it automatically logs you out. 1-4 Configuring Basic Connectivity v1.0, May 2012 N300 WiFi Router (N300R) User Manual Configuring Your Internet Connection Using the Smart Setup Wizard You can manually configure your Internet connection using the Basic Settings screen, or you can allow the Smart Setup Wizard to determine your Internet Service Provider (ISP) configuration. The Smart Setup Wizard searches your Internet connection for servers and protocols to determine your ISP configuration. To use the Smart Setup Wizard to assist with configuration or to verify the Internet connection settings:
1. Select Setup Wizard from the top of the main menu. 2. Click Next to proceed. Enter your ISP settings, as needed. 3. At the end of the Setup Wizard, click Test to verify your Internet connection. If you have trouble connecting to the Internet, see Chapter 7, Troubleshooting. Viewing and Configuring Basic ISP Settings Settings related to your Internet service are specified in the Basic Settings screen. Select Basic Settings under Setup in the main menu. The content you see in the Basic Settings screen depends on whether your ISP requires that you log in with a user name and password for Internet access. No login required by ISP. If no login is required by your ISP, the following settings appear in the Basic Settings screen. Configuring Basic Connectivity 1-5 May 2012 N300 WiFi Router (N300R) User Manual ISP does not require login Figure 1-5 Account Name (might also be called Host Name). The account name is provided to the ISP during a DHCP request from your router. In most cases, this setting is not required, but some ISPs require it for access to ISP services such as mail or news servers. Domain Name. The domain name is provided by your router to computers on your LAN when the computers request DHCP settings from your router. In most cases, this settings is not required. 1-6 Configuring Basic Connectivity v1.0, May 2012 N300 WiFi Router (N300R) User Manual Internet IP Address. Determines how your router obtains an IP address for Internet access. If your ISP assigns an IP address dynamically (by DHCP), select Get Dynamically From ISP. If your ISP has assigned you a permanent, fixed (static) IP address for your computer, select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter the subnet mask and the gateway IP address. The gateway is the ISPs router to which your router will connect. Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISPs primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect. Router MAC Address. This section determines the Ethernet MAC address that the router will use on the Internet port. Typically, you would leave Use Default Address selected. However, some ISPs (especially cable modem providers) register the Ethernet MAC address of the network interface card in your computer when your account is first opened. They then accept only traffic from the MAC address of that computer. This feature allows your router to masquerade as that computer by cloning or spoofing its MAC address. To change the MAC address, select one of the following methods:
Select Use Computer MAC Address. The router will then capture and use the MAC address of the computer that you are now using. You must be using the one computer that is allowed by the ISP. Select Use This MAC Address, and enter it here. Configuring Basic Connectivity 1-7 May 2012 N300 WiFi Router (N300R) User Manual If a login is required by your ISP, the following settings appear in the Basic Settings screen:
ISP does require login Figure 1-6 1-8 Configuring Basic Connectivity v1.0, May 2012 N300 WiFi Router (N300R) User Manual Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Yes, the Basic Settings screen displays. Note: After you finish setting up your router, you will no longer need to launch the ISPs login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in. Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. The list includes:
PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services. PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide. L2TP (Layer 2 Tunneling Protocol), used to support virtual private networks (VPNs). Figure 1-7 Note: Not all ISPs are listed here. The ones on this list have special requirements. Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server. Service Name. If your connection is capable of connecting to multiple Internet services, this setting specifies which service to use. Configuring Basic Connectivity 1-9 May 2012 N300 WiFi Router (N300R) User Manual Connection Mode. This drop-down list selects when the router will connect to and disconnect from the Internet. Figure 1-8 The list includes:
Always On. The router logs in to the Internet immediately after booting and never disconnects. Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out. Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen. Idle Timeout. Your Internet connection is logged out if there is no data transfer during the specified time interval. Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISPs primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect. Router MAC Address. Select the default router MAC address, the computer MAC address, or a MAC address that you specify. 1-10 Configuring Basic Connectivity v1.0, May 2012 Setting Up and Testing Basic Wireless Connectivity N300 WiFi Router (N300R) User Manual Note: If you use a wireless computer to change wireless settings, you might be disconnected when you click Apply. Reconfigure your wireless adapter to match the new settings, or access the router from a wired computer to make any further changes. Follow these instructions to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs. 1. Select Wireless Settings under Setup in the main menu of the N300R router. Figure 1-9 2. For the wireless network name (SSID), use the default name, or choose a suitable descriptive name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is On Networks. Note: The SSID is case-sensitive. Also, the SSID of any wireless access adapters must match the SSID you specify in the N300R router. If they do not match, you will not get a wireless connection to the N300R router. Configuring Basic Connectivity 1-11 May 2012 N300 WiFi Router (N300R) User Manual 3. Select the region in which the wireless interface will operate. Note: In North America, the region cannot be changed, and is set by default to US. 4. Set the channel. The default channel is Auto. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Select a channel that is not being used by any other wireless networks within several hundred feet of your router. 5. Make sure that the mode is set to Up to 145Mbps. 6. For Security Options, select None. 7. Click Apply to save your changes. Note: If you are configuring the router from a wireless computer and you change the routers SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the routers new settings. 1-12 Configuring Basic Connectivity v1.0, May 2012 8. Select Advanced Wireless Settings under Advanced in the main menu of the N300R router. N300 WiFi Router (N300R) User Manual Figure 1-10 9. Make sure that the Enable Wireless Router Radio check box is selected. 10. Click Setup Access List. 11. Make sure that the Turn Access Control On check box is not selected. Configuring Basic Connectivity 1-13 May 2012 N300 WiFi Router (N300R) User Manual 12. Configure and test your wireless computer for wireless connectivity. Program the wireless adapter of your computer to have the same SSID and channel that you specified in the router, and disable encryption. Check that your computer has a wireless link and can obtain an IP address by DHCP from the router. Once your computer has basic wireless connectivity to the router, you can configure the advanced wireless security functions of the computer and router (for more information about security and these settings, see Chapter 2, Safeguarding Your Network ). 1-14 Configuring Basic Connectivity v1.0, May 2012 Chapter 2 Safeguarding Your Network The N300 WiFi Router (N300R) provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections:
Choosing Appropriate Wireless Security Recording Basic Wireless Settings Setup Information on page 2-5 Changing Wireless Security Settings on page 2-6 Viewing Advanced Wireless Settings on page 2-12 Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13 Restricting Wireless Access by MAC Address on page 2-19 Changing the Administrator Password on page 2-21 Backing Up Your Configuration on page 2-22 Live Parental Controls on page 2-23 Understanding Your Firewall on page 2-23 Choosing Appropriate Wireless Security Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11g/n wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. v1.0, May 2012 2-1 N300 WiFi Router (N300R) User Manual Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, On Networks recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Note: On Networks recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see Changing the Administrator Password on page 2-21. Wireless data security options Range: up to 300 foot radius 1) Open system: easy but no security JWNR2000 v2 2) MAC access list: no data security 3) WEP: security but some performance impact 4) WPA-PSK: strong security 5) WPA2-PSK: very strong security Note: Use these with other features that enhance security (Table 2-2 on page 2-4). Figure 2-1 To configure the wireless network, you can:
Manually specify your SSID and your wireless security settings. The N300R router provides two screens for configuring the wireless settings:
2-2 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Wireless Settings. You access these under Setup in the main menu (see Viewing Basic Wireless Settings on page 2-6). Advanced Wireless Settings. You access these under Advanced in the main menu (see Viewing Advanced Wireless Settings on page 2-12). Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/
WPA2 security on both the router and the client device. If the clients in your network are WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/WPA2 security on both the router and the client device (see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13). Basic security options are listed in order of increasing effectiveness in Table 2-1. Other features that affect security are listed in Table 2-2 on page 2-4. Table 2-1. Wireless Security Options Security Type None. WEP. Wired Equivalent Privacy. WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type. WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type. WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode. Description No wireless security. Recommended only for troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. Wired Equivalent Privacy (WEP) data encryption provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. For more information, see Configuring WEP Wireless Security on page 2-9. Wi-Fi Protected Access with Pre-Shared Key (WPA-
PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see Configuring WPA-PSK and WPA2-PSK Wireless Security on page 2-10. Safeguarding Your Network 2-3 May 2012 N300 WiFi Router (N300R) User Manual Table 2-2. Other Features That Enhance Security Security Type Disable the wireless router radio. Turn off the broadcast of the wireless network name SSID. Restrict access based on MAC address. Modify your firewalls rules. Use the WPS push button Connect feature (Wi-Fi Protected Setup). Description If you disable the wireless router radio, wireless devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see Viewing Advanced Wireless Settings on page 2-12. If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP, but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see Viewing Advanced Wireless Settings on page 2-12. You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the N300R router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see Restricting Wireless Access by MAC Address on page 2-19. By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewalls rules. For more information, see Understanding Your Firewall on page 2-23. Wi-Fi Protected Setup provides easy setup by means of a push button. Older wireless adapters and devices might not support this. Check whether devices are WPS enabled. For more information, see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 2-4 Safeguarding Your Network v1.0, May 2012 Recording Basic Wireless Settings Setup Information N300 WiFi Router (N300R) User Manual Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided. Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is case-
sensitive. The SSID in the wireless adapter card must match the SSID of the WiFi router. In some configuration utilities (such as in Windows XP), the term wireless network name is used instead of SSID. If WEP Authentication is used, circle one: Open System, Shared Key, or Auto. Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key. WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key size must be the same for the wireless adapters and the WiFi router. Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption keys. Whichever method you use, record the key values in the spaces provided. Passphrase Method. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method. Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10 hexadecimal digits (any combination of 09, af, or AF). For 128-bit WEP, enter 26 hexadecimal digits. Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ Key 4: ___________________________________ If WPA-PSK or WPA2-PSK authentication is used:
Safeguarding Your Network 2-5 May 2012 N300 WiFi Router (N300R) User Manual Passphrase. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase. Use the procedures described in the following sections to specify the N300R router. Store this information in a safe place. Changing Wireless Security Settings This section describes the wireless settings that you can view and configure in the Wireless Settings screen, which you access under Setup in the main menu. Viewing Basic Wireless Settings To specify the wireless security settings of your router:
1. Log in to the router as described in Logging In To Your WiFi Router on page 1-1. 2-6 Safeguarding Your Network v1.0, May 2012 2. Select Wireless Settings under Setup in the main menu. The Wireless Settings screen displays. N300 WiFi Router (N300R) User Manual Figure 2-2 The available settings in this screen are:
Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The N300R default SSID is On Networks. You can disable this broadcast as described in Viewing Advanced Wireless Settings on page 2-12. Safeguarding Your Network 2-7 May 2012 N300 WiFi Router (N300R) User Manual Region. This field identifies the region where the N300R router can be used. It might not be legal to operate the wireless features of the WiFi router in a region other than one of those identified in this field. Note: In North America, the region cannot be changed, and is set by default to US. Channel. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless network. The WiFi router uses channel bonding technology to extend the bandwidth for data transmission. Mode. This field determines which data communications protocol is used. You can choose from:
Up To 54 Mbps. Legacy mode, for compatibility with the slower 802.11b and 802.11g wireless devices. Note: WEP and WPA security options are supported at 54 Mbps only. Up To 145 Mbps. Neighbor Friendly mode, for reduced interference with neighboring wireless networks. Provides two transmission streams with different data on the same channel at the same time, but also allows 802.11b and 802.11g wireless devices. This is the default mode. Up To 300 Mbps. Performance mode, using channel expansion to achieve the 300 Mbps data rate. The N300R router will use the channel you selected as the primary channel and expand to the secondary channel (primary channel +4 or 4) to achieve a 40 MHz frame-
by-frame bandwidth. The N300R router will detect channel usage and will disable frame-
by-frame expansion if the expansion would result in interference with the data transmission of other access points or clients. Note: The maximum wireless signal rate is derived from the IEEE Standard 802.11 specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. 2-8 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Security Options. The selection of wireless security options can significantly affect your network performance. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-
PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Instructions for configuring the security options can be found in Choosing Appropriate Wireless Security on page 2-1. 3. Click Apply to save your settings. Configuring WEP Wireless Security WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. WEP offers the following options:
Automatic. With the Automatic option, the router will try both Open System and Shared Key authentication. Normally this setting is suitable. If it fails, select Open System or Shared Key. You can also refer to your wireless adapters documentation to see what method to use. Open System. With Open System authentication and 64 or 128 bit WEP data encryption, the N300R router does perform data encryption but does not perform any authentication. Anyone can join the network. This setting provides very little practical wireless security. Shared Key. With Shared Key authentication, a wireless device must know the WEP key to join the network. Select the encryption strength (64 or 128 bit data encryption). Manually enter the key values, or enter a word or group of printable characters in the Passphrase field. Manually entered keys are not case-sensitive, but passphrase characters are case-sensitive. To configure WEP data encryption:
Note: If you use a wireless computer to configure WEP settings, you will be disconnected when you click Apply. You must then either configure your wireless adapter to match the WiFi router WEP settings or access the WiFi router from a wired computer to make any further changes. Not all wireless adapter configuration utilities support passphrase key generation. 1. Select Wireless Settings under Setup in the main menu. 2. In the Security Options section, select WEP. The WEP options display. Safeguarding Your Network 2-9 May 2012 N300 WiFi Router (N300R) User Manual
. Figure 2-3 3. Select the authentication type and encryption strength. 4. You can manually or automatically program the four data encryption keys. These values must be identical on all computers and access points in your network. Automatic. In the Passphrase field, enter a word or group of printable characters, and click Generate. The passphrase is case-sensitive. The four key fields are automatically populated with key values. Manual. Enter 10 hexadecimal digits (any combination of 09, af, or AF). These entries are not case-sensitive. For example, AA is the same as aa. Select which of the four keys to activate. 5. Click Apply to save your settings. Configuring WPA-PSK and WPA2-PSK Wireless Security Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. Check whether newer drivers are available from the manufacturer. Also, you might be able to use the Push 'N' Connect feature to configure this type of security if it is supported by your wireless clients. See Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 2-10 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual WPAPre-Shared Key does perform authentication. WPA-PSK uses TKIP (Temporal Key Integrity Protocol) data encryption, and WPA2-PSK uses AES (Advanced Encryption Standard) data encryption. Both methods dynamically change the encryption keys making them nearly impossible to circumvent. Mixed mode allows clients using either WPA-PSK (TKIP) or WPA2-PSK (AES). This provides the most reliable security, and is easiest to implement, but it might not be compatible with older adapters. Note: Not all wireless adapters support WPA. Furthermore, client software is also required. Windows XP with Service Pack 2 does include WPA support. Nevertheless, the wireless adapter hardware and driver must also support WPA. For instructions on configuring wireless computers or PDAs (personal digital assistants) for WPA-PSK security, consult the documentation for the product you are using. To configure WPA-PSK, WPA2-PSK, or WPA-PSK+WPA2-PSK:
1. Select Wireless Settings under Setup in the main menu. The Wireless Settings screen displays. 2. Select one of the WPA-PSK or WPA2-PSK options for the security type. The third option
(WPA-PSK [TKIP] + WP2-PSK [AES]) is the most flexible, since it allows clients using either WPA-PSK or WPA2-PSK. In the Passphrase field, enter a word or group of 863 printable characters. The passphrase is case-sensitive. 3. Figure 2-4 4. Click Apply to save your settings. Safeguarding Your Network 2-11 May 2012 N300 WiFi Router (N300R) User Manual Viewing Advanced Wireless Settings This section describes the wireless settings that you can view and specify in the Advanced Wireless Settings screen, which you access under Advanced in the main menu. To configure the advanced wireless security settings of your router:
1. Log in to the router as described in Logging In To Your WiFi Router on page 1-1. 2. Select Advanced Wireless Settings under Advanced in the main menu. The advanced Wireless Settings screen displays Figure 2-5 The available settings in this screen are:
2-12 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices cannot connect to the N300R router. If you will not be using your wireless network for a period of time, you can clear this check box and disable all wireless connectivity. Fragmentation Length, CTS/RTS Threshold, Preamble Mode and Transmit Power Control. The Fragmentation Threshold, CTS/RTS Threshold, Preamble Mode, and Transmit Power Control options are reserved for wireless testing and advanced configuration only. Do not change these settings. WPS Settings. For information about these settings, see the section, Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. Wireless Card Access List. For information about this list, see Restricting Wireless Access by MAC Address on page 2-19. Using WPS Push Button Connect (Wi-Fi Protected Setup) If your wireless clients support Wi-Fi Protected Setup (WPS), you can use this feature to configure the routers network name (SSID) and security settings and, at the same time, connect a wireless client securely and easily to the router. Look for the WPS push button on the rear panel of your client device. WPS automatically configures the network name (SSID) and wireless security settings for the router (if the router is in its default state) and broadcasts these settings to the wireless client. Note: On Networkss WPS push button Connect feature is based on the Wi-Fi Protected Setup (WPS) standard (for more information, see http://www.wi-fi.org). All other Wi-Fi-certified and WPS-capable products should be compatible with On Networks products that implement Push 'N' Connect or WPS push button Connect. When you add wireless clients, whether or not they are WPS enabled, the added devices must share the same network name (SSID) and security passphrase. For more information, see Connecting Additional Wireless Client Devices after WPS Setup on page 2-18. Note: If you choose to use WPS, the only security methods supported are WPA-PSK and WPA2-PSK. WEP security is not supported by WPS. The N300R router provides two methods for connecting to a wireless client that supports WPS, described in the following sections:
Safeguarding Your Network 2-13 May 2012 N300 WiFi Router (N300R) User Manual Push Button Configuration Security PIN Entry on page 2-15 Push Button Configuration There are two methods to enable a wireless client to join a network using a push button on the router: using the physical push button or using the software button in the Add WPS Client screen. Using the Physical Push Button 1. Press the WPS push button on the N300R router for over 5 seconds. The WPS LED begins to blink in a regular pattern. While the light is blinking, you have 2 minutes to enable WPS on the client that you are trying to connect to the router. 2. On the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The N300R routers WPS LED ceases blinking and remains on when one of these conditions occurs:
The router and the client establish a wireless connection. The 2-minute window period expires for establishing a WPS connection. If the connection is not established, no WPS security settings will be specified in the N300R router. Using the Software Button in the Add WPS Client Screen 1. Log in to the router as described in Logging In To Your WiFi Router on page 1-1. 2. Select Add WPS Client in the main menu, and click Next. 3. Select the Push Button setup method. Figure 2-6 2-14 v1.0, May 2012 Safeguarding Your Network 4. Click the button in the Add WPS Client screen. The Connecting to New Wireless Client screen displays. N300 WiFi Router (N300R) User Manual Figure 2-7 5. The WPS LED on the N300R router begins to blink in a regular pattern. While the button light is blinking, you have 2 minutes to enable WPS on the device you are trying to connect to the router. In the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The N300R routers WPS LED ceases blinking and remains on when one of these conditions occurs:
The router and the client establish a wireless connection. The 2-minute window period expires for establishing a WPS connection. If the connection is not established, no WPS security settings will be specified in the N300R router. Security PIN Entry There are two ways to enable a wireless client to join a network using a PIN: using the routers security PIN or using the wireless clients security PIN. Using the Routers Security PIN 1. Obtain your routers security PIN from the rear panel of the router or from the Advanced Wireless Settings screen. 2. On the wireless client, follow its specific networking instructions to enter the routers security PIN and to establish a wireless connection with the router. Using the Wireless Clients Security PIN 1. Log in to the router as described in Logging In To Your WiFi Router on page 1-1. Safeguarding Your Network 2-15 May 2012 N300 WiFi Router (N300R) User Manual 2. Select Add WPS Client in the main menu, and click Next. 3. Select the PIN Number setup method. Figure 2-8 4. On the wireless client, obtain its security PIN, or follow its specific networking instructions to generate a client security PIN. In the Add WPS Client screen of the N300R router, enter the client security PIN in the Enter Clients PIN field. 5. 6. Click Next. The following screen displays, and the Smart Wizard initiates the wireless connection:
Figure 2-9 2-16 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Configuring the WPS Settings 1. Log in to the router as described in Logging In To Your WiFi Router on page 1-1. 2. Select Wireless Settings under Advanced in the main menu. Figure 2-10 These options are available under WPS Settings:
Routers PIN. The PIN is displayed so that you can use it to configure the router through WPS (Wi-Fi Protected Setup). It is also displayed on the routers label. Disable Routers PIN. If the routers PIN is disabled, you cannot configure the routers wireless settings with WPS. However, if your settings are already configured, you can still add WPS-enabled wireless clients. The router might disable the PIN if it detects suspicious attempts to break into your wireless settings; this can happen if the check box is selected. You can enable the PIN by clearing the check box and clicking Apply. Keep Existing Wireless Settings. This check box is automatically selected after WPS is enabled to prevent unwanted settings changes, and is also selected if you have already specified wireless security settings or your SSID without using WPS. When this check box is not selected, adding a new wireless client using the push button or the Add WPS Client screen (see Push Button Configuration on page 2-14) changes the routers SSID and security passphrase. You might need to clear it if you are using certain registrars, such as for a Windows Vista PC, to configure the router through WPS. Safeguarding Your Network 2-17 May 2012 N300 WiFi Router (N300R) User Manual Connecting Additional Wireless Client Devices after WPS Setup You can add WPS-enabled and non-WPS-enabled client devices. Adding Additional WPS-Enabled Clients To add an additional wireless client device that is WPS enabled:
Note: Your wireless settings do not change when you add an additional WPS-enabled client unless you have cleared the Keep Existing Wireless Settings check box (in the Wireless Settings screen). If you do clear the check box, a new SSID and a passphrase are generated, and all existing connected wireless clients are disassociated and disconnected from the router. 1. Follow the procedures in Push Button Configuration on page 2-14 or Security PIN Entry on page 2-15. 2. For information about how to view a list of all devices connected to your router (including wireless and Ethernet-connected), see Viewing a List of Attached Devices on page 6-7. Adding Additional Non-WPS-Enabled Clients If you are connecting a combination of WPS-enabled clients and clients that are not WPS enabled, you cannot use the WPS setup procedures to add clients that are not WPS enabled. To connect both non-WPS-enabled and WPS-enabled clients to the N300R router:
1. Configure the settings of the N300R router (shown in the Wireless Settings screen) for WPA-
PSK or WPA2-PSK security, and record that information. See Configuring WPA-PSK and WPA2-PSK Wireless Security on page 2-10. When you change security settings, all existing connected wireless clients that do not share those settings are disassociated and disconnected from the router. 2. For the non-WPS-enabled devices that you wish to connect, open the networking utility, and follow the utilitys instructions to enter security settings. 3. For the WPS-enabled devices that you wish to connect, follow the procedures in Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. The N300R router automatically preserves the settings you configured in step 1 so all clients share the same security settings (for more information, see Configuring the WPS Settings on page 2-17). 2-18 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual 4. For information about how to view a list of all devices connected to your router (including wireless and Ethernet connected), see Viewing a List of Attached Devices on page 6-7. Restricting Wireless Access by MAC Address When a Wireless Card Access List is configured and enabled, the router checks the MAC address of any wireless device attempting a connection and allows only connections to computers identified on the trusted computers list. The Wireless Card Access List displays a list of wireless computers that you allow to connect to the router based on their MAC addresses. These wireless computers must also have the correct SSID and wireless security settings to access the wireless router. The MAC address is a network devices unique 12-character physical address, containing the hexadecimal characters 09, af, or AF only, and separated by colons (for example, 00:09:AB:CD:EF:01). It can usually be found on the bottom of the wireless card or network interface device. If you do not have access to the physical label, you can display the MAC address using the network configuration utilities of the computer. In WindowsXP, for example, typing the ipconfig/all command in an MSDOS command prompt window displays the MAC address as Physical Address. You might also find the MAC addresses in the routers Attached Devices screen. To restrict access based on MAC addresses:
1. Select Wireless Settings under Advanced in the main menu. 2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless Card Access List. Figure 2-11 Safeguarding Your Network 2-19 May 2012 N300 WiFi Router (N300R) User Manual 3. Click Add to add a wireless device to the wireless access control list. The Wireless Card Access Setup screen opens and displays a list of currently active wireless cards and their Ethernet MAC addresses. 4. Figure 2-12 If the computer you want appears in the Available Wireless Cards list, you can select the radio button of that computer to capture its MAC address; otherwise, you can manually enter a name and the MAC address of the authorized computer. You can usually find the MAC address on the bottom of the wireless device. Tip: You can copy and paste the MAC addresses from the routers Attached Devices screen into the MAC Address field of this screen. To do this, configure each wireless computer to obtain a wireless link to the router. The computer should then appear in the Attached Devices screen. 5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. 6. Repeat step 3 through step 5 for each additional device you want to add to the list. 2-20 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual 7. Select the Turn Access Control On check box. Note: When configuring the router from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you lose your wireless connection when you click Apply. You must then access the WiFi router from a wired computer or from a wireless computer that is on the access control list to make any further changes. 8. Click Apply to save your Wireless Card Access List settings. Now, only devices on this list can wirelessly connect to the N300R router. Warning: MAC address filtering adds an obstacle against unwanted access to your network by the general public. However, because your trusted MAC addresses appear in your wireless transmissions, an intruder can read them and impersonate them. Do not rely on MAC address filtering alone to secure your network. Changing the Administrator Password The default password for the routers Web Configuration Manager is password. On Networks recommends that you change this password to a more secure password. Tip: Before changing the router password, back up your configuration settings with the default password of password. If you save the settings with a new password, and then you later forget the new password, you will have to reset the router back to the factory defaults, and log in using the default password of password. This means you will have to re-enter all the router configuration settings. For information about how to back up your settings, see Backing Up and Restoring the Configuration on page 6-8. Safeguarding Your Network 2-21 May 2012 N300 WiFi Router (N300R) User Manual To change the administrator password:
1. On the main menu, under Maintenance, select Set Password to display the Set Password screen. Figure 2-13 2. To change the password, first enter the old password, then enter the new password twice. 3. Click Apply. Backing Up Your Configuration The configuration settings of the N300R router are stored within the router in a configuration file. You can back up (save) this file and retrieve it later. On Networks recommends that you save your configuration file after you complete the configuration. If the router fails or becomes corrupted, or an administrator password is lost, you can easily re-create your configuration by restoring the configuration file. For instructions on saving and restoring your configuration file, see Managing the Configuration File on page 6-7. Tip: Before saving your configuration file, change the administrator password to the default, password. Then change it again after you have saved the configuration file. If you save the file with a new password, and then you later forget the new password, you will have to reset the router back to the factory defaults and log in using the default password of password. This means you will have to re-enter all the router configuration settings. 2-22 Safeguarding Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Live Parental Controls On Networks Live Parental Controls, powered by OpenDNS, is a router-based Web filtering solution available on On Networks Wireless-N router and gateway products. Designed to protect you from identity theft and scams, Live Parental Controls blocks up to 50 categories of Internet content. Live Parental Controls protects all Internet-connected devices through the router. It protects not only computers, but also set-top boxes, iPhones, iPods, and gaming consoles that are attached to your network. Default and per-user settings allow you to customize configurations for different computing arrangements and personalize the settings for each person. Per-time settings allow Internet access during scheduled time slots. Live Parental Controls requires a one-time installation of the management utility. Once set up, Live Parental Controls runs in the background and does not interfere with normal Internet usage. Download Live Parental Controls from this website: http://www.On Networks.com/lpc. Understanding Your Firewall Your N300 WiFi Router (N300R) contains a true firewall to protect your network from attacks and intrusions. A firewall is a device that protects one network from another while allowing communication between the two. Using a process called Stateful Packet Inspection, the firewall analyzes all inbound and outbound traffic to determine whether or not it will be allowed to pass through. By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewalls rules to achieve the following behavior:
Blocking sites. Block access from your network to certain Web locations based on Web addresses and Web address keywords. This feature is described in Blocking Access to Internet Sites on page 3-1. Blocking services. Block the use of certain Internet services by specific computers on your network. This feature is described in Blocking Access to Internet Services on page 3-3. Scheduled blocking. Block sites and services according to a daily schedule. This feature is described in Scheduling Blocking on page 3-5. Safeguarding Your Network 2-23 May 2012 N300 WiFi Router (N300R) User Manual Allow inbound access to your server. To allow inbound access to resources on your local network (for example, a Web server or remote desktop program), you can open the needed services by configuring port forwarding as described in Allowing Inbound Connections to Your Network on page 5-1. Allow certain games and applications to function correctly. Some games and applications need to allow additional inbound traffic in order to function. Port triggering can dynamically allow additional service connections, as described in Configuring Port Triggering on page 5-10. Another feature to solve application conflicts with the firewall is Universal Plug and Play (UPnP), described in Using Universal Plug and Play on page 5-14. 2-24 Safeguarding Your Network v1.0, May 2012 Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the N300 WiFi Router (N300R) to protect your network. This chapter includes the following sections:
Content Filtering Overview Blocking Access to Internet Sites Blocking Access to Internet Services on page 3-3 Scheduling Blocking on page 3-5 Viewing Logs of Web Access or Attempted Web Access on page 3-6 Configuring E-mail Alert and Web Access Log Notifications on page 3-8 Content Filtering Overview The N300 WiFi Router (N300R) provides you with Web content filtering options, plus browser activity reporting and instant alerts through e-mail. Parents and network administrators can establish restricted access policies based on time of day, Web addresses, and Web address keywords. You can also block Internet access by applications and services, such as chat rooms or games. Blocking Access to Internet Sites The N300R router allows you to restrict access based on Web addresses and Web address keywords. Up to 255 entries are supported in the Keyword list. Keyword application examples:
If the keyword XXX is specified, the URL www.zzzyyqq.com/xxx.html is blocked. If the keyword .com is specified, only websites with other domain suffixes (such as .edu, .org, or .gov) can be viewed. To block access to Internet sites:
v1.0, May 2012 3-1 N300 WiFi Router (N300R) User Manual 1. Select Block Sites under Content Filtering in the main menu. The Block Sites screen displays. Figure 3-1 2. Enable keyword blocking by selecting either Per Schedule or Always. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see Scheduling Blocking on page 3-5. Block all access to Internet browsing during a scheduled period by entering a dot (.) as the keyword, and then set a schedule in the Schedule screen. 3. Add a keyword or domain by entering it in the keyword field and clicking Add Keyword. The keyword or domain name then appears the Block sites containing these keywords or domain names list. Delete a keyword or domain name by selecting it from the list and clicking Delete Keyword. 4. You can specify one trusted user, which is a computer that is exempt from blocking and logging. Specify a trusted user by entering that computers IP address in the Trusted IP Address fields. Since the trusted user is identified by IP address, you should configure that computer with a fixed IP address. 3-2 Restricting Access From Your Network May 2012 N300 WiFi Router (N300R) User Manual 5. Click Apply to save all your settings in the Block Sites screen. Blocking Access to Internet Services The N300R router allows you to block the use of certain Internet services by computers on your network. This is called service blocking or port filtering. Services are functions performed by server computers at the request of client computers. For example, Web servers serve Web pages, time servers serve time and date information, and game hosts serve data about other players moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (Web server) request. To block access to Internet services:
1. Select Block Services under Content Filtering in the main menu. The Block Services screen displays. Figure 3-2 2. Enable service blocking by selecting either Per Schedule or Always, and then click Apply. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see Scheduling Blocking on page 3-5. Restricting Access From Your Network 3-3 v1.0, May 2012 N300 WiFi Router (N300R) User Manual 3. Specify a service for blocking by clicking Add. The Block Services Setup screen displays. Figure 3-3 4. From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. To define a service, first you must determine which port number or range of numbers is used by the application. The service port numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, Assigned Numbers. Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application. You can often determine port number information by contacting the publisher of the application, by asking user groups or newsgroups, or by searching. Enter the starting port and ending port numbers. If the application uses a single port number, enter that number in both fields. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select Both. 5. Select the radio button for the IP address configuration you want to block, and then enter the IP addresses in the appropriate fields. 6. Click Add to enable your Block Services Setup selections. 3-4 Restricting Access From Your Network May 2012 N300 WiFi Router (N300R) User Manual Blocking Services by IP Address Range In the Filter Services For area, you can block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network. Scheduling Blocking The N300R router allows you to specify when blocking is enforced. To schedule blocking:
1. Select Schedule under Content Filtering in the main menu. The Schedule screen displays. Figure 3-4 Restricting Access From Your Network 3-5 v1.0, May 2012 N300 WiFi Router (N300R) User Manual 2. Configure the schedule for blocking keywords and services. a. Days to Block. Select days on which you want to apply blocking by selecting the appropriate check boxes. Select Every Day to select the check boxes for all days. Click Apply. b. Time of Day to Block. Select a start and end time in 24-hour format. Select All Day for 24-hour blocking. Click Apply. Be sure to select your time zone in the E-mail screen as described in on page 3-9. 3. So that log entries are correctly time-stamped and sent at the correct time, be sure to set the time as described in the next section. 4. Click Apply to save your settings. Setting the Time Zone The N300R router uses the Network Time Protocol (NTP) to obtain the current time and date from one of several network time servers on the Internet. Localize the time zone so that your log entries and other router functions include the correct time stamp. To verify and set the time zone (see Figure 3-4 on page 3-5):
Time Zone. To select your local time zone, use the drop-down list. This setting is used for the blocking schedule and for time-stamping log entries. Automatically Adjust for Daylight Savings Time. If your region supports daylight savings time, select this check box. The router will automatically adjust the time at the start and end of the daylight savings time period. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no log entries are made for the trusted user. 3-6 Restricting Access From Your Network May 2012 Select Logs under Content Filtering in the main menu. The Logs screen displays. N300 WiFi Router (N300R) User Manual Figure 3-5 Table 3-1 describes the log entries. Table 3-1. Log Entry Descriptions Field Date and time Source IP Target address Action Description The date and time the log entry was recorded. The IP address of the initiating device for this log entry. The name or IP address of the website or newsgroup visited or to which access was attempted. Whether the access was blocked or allowed. Restricting Access From Your Network 3-7 v1.0, May 2012 N300 WiFi Router (N300R) User Manual To include any of the checked items at the bottom of the screen in the log display, click Apply. You can check as many or as few of these items as you wish. To refresh the log screen, click the Refresh button. To clear the log entries, click the Clear Log button. To e-mail the log immediately, click the Send Log button. Configuring E-mail Alert and Web Access Log Notifications To receive logs and alerts by e-mail, you must provide your e-mail account information. To configure e-mail alert and web access log notifications:
1. Select E-mail under Content Filtering in the main menu. The E-mail screen displays. Figure 3-6 3-8 Restricting Access From Your Network May 2012 N300 WiFi Router (N300R) User Manual 2. To receive e-mail logs and alerts from the router, select the Turn E-mail Notification On check box. a. Enter the name of your ISPs outgoing (SMTP) mail server (such as mail.myISP.com) in the Your Outgoing Mail Server field. You might be able to find this information in the configuration screen of your e-mail program. If you leave this field blank, log and alert messages will not be sent by e-mail. b. Enter the e-mail address to which logs and alerts are sent in the Send To This E-mail Address field. This e-mail address will also be used as the From address. If you leave this field blank, log and alert messages will not be sent by e-mail. 3. If your e-mail server requires authentication, select the My Mail Server requires authentication check box. a. Enter your user name for the e-mail server in the User Name field. b. Enter your password for the e-mail server in the Password field. 4. You can specify that logs are automatically sent by e-mail with these options:
Send alert immediately. Select this check box for immediate notification of attempted access to a blocked site or service. Send Logs According to this Schedule. Specifies how often to send the logs: Hourly, Daily, Weekly, or When Full. Day. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. Time. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If you select the Weekly, Daily, or Hourly option and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the routers memory. If the router cannot e-mail the log file, the log buffer might fill up. In this case, the router overwrites the log and discards its contents. 5. Click Apply to save your settings. Restricting Access From Your Network 3-9 v1.0, May 2012 N300 WiFi Router (N300R) User Manual 3-10 Restricting Access From Your Network May 2012 Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the N300 WiFi Router (N300R), including LAN, WAN, and routing settings. It contains the following sections:
Using the LAN IP Setup Options Using a Dynamic DNS Service on page 4-6 Configuring the WAN Setup Options on page 4-8 Configuring Static Routes on page 4-10 Wireless Repeating (Also Called WDS) on page 4-13 Using the LAN IP Setup Options The LAN Setup screen allows configuration of LAN IP services such as Dynamic Host Configuration Protocol (DHCP) and Routing Information Protocol (RIP). v1.0, May 2012 4-1 N300 WiFi Router (N300R) User Manual To configure LAN IP settings, select LAN Setup under Advanced in the main menu. The LAN Setup screen displays. Figure 4-1 Configuring a Device Name The device name is a user-friendly name for the router. This name is shown in the Network on Windows Vista and the Network Explorer on all Windows systems. The Device Name field cannot be blank. The default name is N300R. 4-2 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual Configuring LAN TCP/IP Setup Parameters These are advanced settings that you might configure if you are a network administrator and your network contains multiple routers. The router is shipped preconfigured to use private IP addresses on the LAN side and to act as a DHCP server (see Using the Router as a DHCP Server on page 4-4). Note: If you change the LAN IP address of the router while connected through the browser, you will be disconnected. You must then open a new connection to the new IP address and log in again. LAN IP address. 192.168.1.1 Subnet mask. 255.255.255.0 The routers default LAN IP configuration is:
These addresses are part of the designated private address range for use in private networks and should be suitable for most applications. If your network has a requirement to use a different IP addressing scheme, you can make those changes in this screen. The LAN IP settings are:
IP Address. The LAN IP address of the router. IP Subnet Mask. The LAN subnet mask of the router. Combined with the IP address, the IP subnet mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router. RIP Direction. RIP allows a router to exchange routing information with other routers. The RIP Direction selection controls how the router sends and receives RIP packets. Both is the default. When set to Both or In Only, the router incorporates the RIP information that it receives. When set to Both or Out Only, the router broadcasts its routing table periodically. RIP Version. This controls the format and the broadcasting method of the RIP packets sent by the router. (It recognizes both formats when receiving.) The default setting is Disabled. RIP-1 is universally supported. RIP-1 is usually adequate unless you have an unusual network setup. RIP-2B carries more information than RIP-1 and uses subnet broadcasting. RIP-2M carries more information than RIP-1 and uses multicasting. Customizing Your Network Settings 4-3 May 2012 N300 WiFi Router (N300R) User Manual Using the Router as a DHCP Server By default, the router functions as a DHCP server, allowing it to assign IP, DNS server, and default gateway addresses to all computers connected to the routers LAN. The assigned default gateway address is the LAN address of the router. The router assigns IP addresses to the attached computers from a pool of addresses specified in this screen. Each pool address is tested before it is assigned to avoid duplicate addresses on the LAN. Note: For most applications, the default DHCP and TCP/IP settings of the router are satisfactory. Click the link to the online document TCP/IP Networking Basics in Appendix B for an explanation of DHCP and information about how to assign IP addresses for your network. Subnet mask To specify a pool of IP addresses to be assigned, set the starting IP address and ending IP address. These addresses should be part of the same IP address subnet as the routers LAN IP address. Using the default addressing scheme, you should define a range between 192.168.1.2 and 192.168.1.254, although you might wish to save part of the range for devices with fixed addresses. The router delivers the following parameters to any LAN device that requests DHCP:
An IP address from the range you have defined Gateway IP address (the routers LAN IP address) Primary DNS server (if you entered a primary DNS address in the Basic Settings screen;
otherwise, the routers LAN IP address) Secondary DNS server (if you entered a secondary DNS address in the Basic Settings screen) To use another device on your network as the DHCP server, or to manually specify the network settings of all of your computers, clear the Use Router as DHCP Server check box. Otherwise, leave it selected. If this service is not selected and no other DHCP server is available on your network, you need to set your computers IP addresses manually or they will not be able to access the router. 4-4 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual Using Address Reservation When you specify a reserved IP address for a computer on the LAN, that computer always receives the same IP address each time it accesses the routers DHCP server. Reserved IP addresses should be assigned to computers or servers that require permanent IP settings. Figure 4-2 To reserve an IP address:
1. Click Add. 2. In the IP Address field, enter the IP address to assign to the computer or server. (Choose an IP address from the routers LAN subnet, such as 192.168.1.x.) 3. Enter the MAC address of the computer or server. Tip: If the computer is already present on your network, you can copy its MAC address from the Attached Devices screen and paste it here. 4. Click Apply to enter the reserved address into the table. Note: The reserved address is not assigned until the next time the computer contacts the routers DHCP server. Reboot the computer or access its IP configuration and force a DHCP release and renew. To edit or delete a reserved address entry:
1. Click the button next to the reserved address you want to edit or delete. 2. Click Edit or Delete. Customizing Your Network Settings 4-5 May 2012 N300 WiFi Router (N300R) User Manual Using a Dynamic DNS Service If your Internet Service Provider (ISP) gave you a permanently assigned IP address, you can register a domain name and have that name linked with your IP address by public Domain Name Servers (DNS). However, if your Internet account uses a dynamically assigned IP address, you do not know in advance what your IP address will be, and the address can change frequently. In this case, you can use a commercial Dynamic DNS service, which allows you to register your domain to their IP address, and forwards traffic directed at your domain to your frequently changing IP address. Note: If your ISP assigns a private WAN IP address (such as 192.168.x.x or 10.x.x.x), the Dynamic DNS service will not work because private addresses are not routed on the Internet. Your router contains a client that can connect to the Dynamic DNS service provided by DynDNS.org. You must first visit their website at www.dyndns.org and obtain an account and host name, which you specify in the router. Then, whenever your ISP-assigned IP address changes, your router automatically contacts the Dynamic DNS service provider, logs in to your account, and registers your new IP address. If your host name is hostname, for example, you can reach your router at hostname.dyndns.org. Select Dynamic DNS under Advanced in the main menu. The Dynamic DNS screen displays. Figure 4-3 4-6 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual To configure for a Dynamic DNS service:
1. Register for an account with one of the Dynamic DNS service providers whose names appear in the Service Provider list. For example, for DynDNS.org, select www.dynDNS.org. 2. Select the Use a Dynamic DNS Service check box. 3. Select the name of your Dynamic DNS service provider. 4. Enter the host name (or domain name) that your Dynamic DNS service provider gave you. 5. Enter the user name for your Dynamic DNS account. This is the name that you use to log in to your account, not your host name. 6. Enter the password (or key) for your Dynamic DNS account. 7. If your Dynamic DNS provider allows the use of wildcards in resolving your URL, you can select the Use Wildcards check box to activate this feature. For example, the wildcard feature causes *.yourhost.dyndns.org to be aliased to the same IP address as yourhost.dyndns.org. 8. Click Apply to save your configuration. Customizing Your Network Settings 4-7 May 2012 N300 WiFi Router (N300R) User Manual Configuring the WAN Setup Options The WAN Setup options let you disable port scan and DoS protection, configure a DMZ
(demilitarized zone) server, enable the WiFi router to respond to a ping on the WAN (Internet) port, enable IGMP proxying, and change the Maximum Transmit Unit (MTU) size. Select WAN Setup under Advanced in the main menu. The WAN Setup screen displays. Figure 4-4 Disabling Port Scan and DoS Protection The Stateful Packet Inspection (SPI) firewall protects your network and computers against attacks and intrusions. A stateful packet firewall carefully inspects incoming traffic packets, looking for known exploits such as malformed, oversized, or out-of-sequence packets. The firewall should be disabled only in special circumstances, such as when you are troubleshooting application issues. Setting Up a Default DMZ Server The default DMZ server feature is helpful when you are using some online games and videoconferencing applications that are incompatible with Network Address Translation (NAT). The router is programmed to recognize some of these applications and to work correctly with 4-8 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual them, but there are other applications that might not function well. In some cases, one local computer can run the application correctly if that computers IP address is entered as the default DMZ server. Warning: DMZ servers pose a security risk. A computer designated as the default DMZ server loses much of the protection of the firewall, and is exposed to exploits from the Internet. If compromised, the DMZ server computer can be used to attack other computers on your network. Incoming traffic from the Internet is usually discarded by the router unless the traffic is a response to one of your local computers or a service that you have configured in the Port Forwarding/Port Triggering screen. Instead of discarding this traffic, you can have it forwarded to one computer on your network. This computer is called the default DMZ server. The WAN Setup screen lets you configure a default DMZ server. To assign a computer or server to be a default DMZ server:
1. Select the Default DMZ Server check box. 2. 3. Click Apply. In the Default DMZ Server fields, enter the IP address for that computer or server. Responding to a Ping on the Internet (WAN) Port If you want the router to respond to a ping from the Internet, select the Respond to Ping on Internet Port check box. This should be used only as a diagnostic tool, since it allows your router to be discovered by Internet scanners. Do not select this check box unless you have a specific reason to do so, such as when troubleshooting your connection. Enabling IGMP Proxying IGPM (Internet Group Management Protocol) proxying is disabled by default. When IGPM Proxying is enabled, the WAN IGMP server treats your router as an IGMP client; for LAN devices, such as set-up boxes or PCs, the router acts as an IGMP server. The IGMP Proxying function lets a LAN device receive the multicast traffic it is interested in from the Internet. Customizing Your Network Settings 4-9 May 2012 N300 WiFi Router (N300R) User Manual Setting the MTU Size The normal MTU value for most Ethernet networks is 1500 bytes, 1492 bytes for PPPoE connections, or 1450 for PPTP connections. For some ISPs, you might need to reduce the MTU size, but this is rarely required and should not be done unless you are sure it is necessary for your ISP connection. For more information, see Changing the MTU Size on page 5-16. To change the MTU size:
1. 2. Click Apply to save the new configuration. In the MTU Size field, enter a new size between 64 and 1500. Configuring NAT Filtering Network Address Translation (NAT) determines how the router processes inbound traffic. Secured NAT provides a secured firewall to protect the computers on the LAN from attacks from the Internet, but might prevent some Internet games, point-to-point applications, or multimedia applications from functioning. Open NAT provides a much less secured firewall, but allows almost all Internet applications to function. For more information about NAT, see How Your Computer Accesses a Remote Computer through Your Router on page 5-2. To change the NAT option:
1. 2. Click Apply to save the new configuration. In the NAT Filtering area, select either the Secured or the Open radio button. Configuring Static Routes Static routes provide additional routing information to your router. Under usual circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as multiple routers or multiple IP subnets located on your network. As an example of when a static route is needed, consider the following case:
Your primary Internet access is through a cable modem to an ISP. You have an ISDN router on your home network for connecting to the company where you are employed. This routers address on your LAN is 192.168.1.100. Your companys network address is 134.177.0.0. 4-10 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual When you first configured your router, two implicit static routes were created. A default route was created with your ISP as the gateway, and a second static route was created to your local network for all 192.168.1.x addresses. With this configuration, if you attempt to access a device on the 134.177.0.0 network, your router forwards your request to the ISP. The ISP forwards your request to the company where you are employed, and the request is likely to be denied by the companys firewall. In this case you must define a static route, telling your router that 134.177.0.0 should be accessed through the ISDN router at 192.168.1.100. In this example:
The Destination IP Address and IP Subnet Mask fields specify that this static route applies to all 134.177.x.x addresses. The Gateway IP Address field specifies that all traffic for these addresses should be forwarded to the ISDN router at 192.168.1.100. Private is selected only as a precautionary security measure in case RIP is activated. A Metric value of 1 will work since the ISDN router is on the LAN. To add or edit a static route:
1. Select Static Routes under Advanced in the main menu. The Static Routes screen displays. Figure 4-5 Customizing Your Network Settings 4-11 May 2012 N300 WiFi Router (N300R) User Manual 2. Click Add to expand the Static Routes screen. Figure 4-6 3. In the Route Name field, enter a name for this static route. (This is for identification purposes only.) 4. Select the Private check box if you want to limit access to the LAN only. If Private is selected, the static route is not reported in RIP. 5. Select the Active check box to make this route effective. 6. 7. In the Destination IP Address field, enter the IP address of the final destination. In the IP Subnet Mask field, enter the IP subnet mask for this destination. If the destination is a single host, enter 255.255.255.255. In the Gateway IP Address field, enter the gateway IP address, which must be a router on the same LAN segment as the N300R router. In the Metric field, enter a number between 1 and 15 as the metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1. 8. 9. 10. Click Apply to have the static route entered into the table. 4-12 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual Wireless Repeating (Also Called WDS) The N300R router can be used with a wireless access point (AP) to build large bridged wireless networks. Wireless repeating is a type of Wireless Distribution System (WDS). Warning: If you use the wireless repeating function, your options for wireless security are limited to None or WEP. For more information about wireless security, see Chapter 2, Safeguarding Your Network. The following figure shows a wireless repeating scenario:
Repeater AP Base Station AP Figure 4-7 To set up a wireless network using WDS, he following conditions must be met for both APs:
Both APs must use the same SSID, wireless channel, and encryption mode (see Choosing Appropriate Wireless Security on page 2-1 or Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13). Both APs must be on the same LAN IP subnet. That is, all the AP LAN IP addresses are in the same network. All LAN devices (wired and wireless computers) must be configured to operate in the same LAN network address range as the APs. If you make changes in the Wireless Settings screen, click Apply so that they take effect. Customizing Your Network Settings 4-13 May 2012 N300 WiFi Router (N300R) User Manual Wireless Repeating Function You can view or change wireless repeater settings for the WiFi router. From the main menu of the browser interface, under Advanced, click Wireless Repeating Function to display the Wireless Repeating Function screen. Figure 4-8 The WiFi router supports two modes of the wireless repeating function, and allows you to control wireless client association:
Wireless Repeater. The WiFi router sends all traffic from its local wireless or wired computers to a remote AP. To configure this mode, you must know the MAC address of the remote parent AP. Wireless Base Station. The WiFi router acts as the parent AP, bridging traffic to and from the child repeater AP, as well as handling wireless and wired local computers. To configure this mode, you must know the MAC addresses of the child repeater AP. Disable Wireless Client Association. Usually this check box is cleared so that the router is an access point for wireless computers. If this check box is selected, the router communicates wirelessly only with other APs whose MAC addresses are listed in this screen. The router still communicates with wire-connected LAN devices. 4-14 Customizing Your Network Settings May 2012 N300 WiFi Router (N300R) User Manual Setting Up the Base Station The wireless repeating function works only in hub and spoke mode. The units cannot be daisy chained. You must know the wireless settings for both units. You must know the MAC address of the remote unit. First, set up the base station, and then set up the repeater. To set up the base station:
1. Set up both units with exactly the same wireless settings (SSID, mode, channel, and security). Note that the wireless security option must be set to None or WEP. 2. Log into the WiFi router base unit, under the Advanced heading, select Wireless Repeating Function to display the Wireless Repeating Function screen. Figure 4-9 3. Select the Enable Wireless Repeating Function check box and the Wireless Base Station radio button. 4. Enter the MAC address for the repeater units. 5. Click Apply to save your changes. Customizing Your Network Settings 4-15 May 2012 N300 WiFi Router (N300R) User Manual Setting Up a Repeater Unit Use a wired Ethernet connection to set up the repeater unit to avoid conflicts with the wireless connection to the base station. Note: If you are using the N300R base station with a non-On Networks WiFi router as the repeater, you might need to change additional configuration settings. In particular, you should disable the DHCP server function on the wireless repeater AP. To configure a N300R router as a repeater unit:
1. If you are using the same model of WiFi router for both the base station and repeaters, you must change the LAN IP address for each repeater to a different IP address in the same subnet
(see Using the LAN IP Setup Options on page 4-1). Note: Failing to change the LAN IP address will cause an IP address conflict in the network because the factory default LAN IP is the same for both units. 2. Log in to the router that will be the repeater. Check the Wireless Settings screen, and verify that the wireless settings match the base station exactly. If the settings are different, be sure to configure the wireless settings to match the base station settings (see Setting Up and Testing Basic Wireless Connectivity on page 1-11). In the Wireless Repeating Function screen, select the Enable Wireless Repeating Function check box and the Wireless Repeater radio button. 3. 4. Fill in the IP Address field. This IP address must be in the same subnet as the base station, but different from the LAN IP of the base station. 5. Fill in the Base Station MAC Address field. 6. Click Apply to save your changes. 7. Verify connectivity across the LANs. A computer on any wireless or wired LAN segment of the WiFi router should be able to connect to the Internet or share files and printers with any other wireless or wired computer or server connected to the other AP. 4-16 Customizing Your Network Settings May 2012 Chapter 5 Fine-Tuning Your Network This chapter describes how to modify the configuration of the N300 WiFi Router (N300R) to allow specific applications to access the Internet or to be accessed from the Internet, and how to make adjustments to enhance your networks performance. This chapter includes the following sections:
Allowing Inbound Connections to Your Network Configuring Port Forwarding to Local Servers on page 5-6 Configuring Port Triggering on page 5-10 Using Universal Plug and Play on page 5-14 Optimizing Wireless Performance on page 5-15 Changing the MTU Size on page 5-16 Quality of Service on page 5-18 Overview of Home and Small Office Networking Technologies on page 5-24 Allowing Inbound Connections to Your Network By default, the N300R router blocks any inbound traffic from the Internet to your computers except for replies to your outbound traffic. However, you might need to create exceptions to this rule for the following purposes:
To allow remote computers on the Internet to access a server on your local network. To allow certain applications and games to work correctly when their replies are not recognized by your router. Your router provides two features for creating these exceptions: port forwarding and port triggering. This section explains how a normal outbound connection works, followed by two examples explaining how port forwarding and port triggering operate and how they differ. May 2012 5-1 N300 WiFi Router (N300R) User Manual How Your Computer Accesses a Remote Computer through Your Router When a computer on your network needs to access a computer on the Internet, your computer sends your router a message containing source and destination address and process information. Before forwarding your message to the remote computer, your router must modify the source information and must create and track the communication session so that replies can be routed back to your computer. Here is an example of normal outbound traffic and the resulting inbound responses:
1. You open Internet Explorer, beginning a browser session on your computer. Invisible to you, your operating system assigns a service number (port number) to every communication process running on your computer. In this example, lets say Windows assigns port number 5678 to this browser session. 2. You ask your browser to get a Web page from the Web server at www.example.com. Your computer composes a Web page request message with the following address and port information:
The source address is your computers IP address. The source port number is 5678, the browser session. The destination address is the IP address of www.example.com, which your computer finds by asking a DNS server. The destination port number is 80, the standard port number for a Web server process. Your computer then sends this request message to your router. 3. Your router creates an entry in its internal session table describing this communication session between your computer and the Web server at www.example.com. Before sending the Web page request message to www.example.com, your router stores the original information and then modifies the source information in the request message, performing Network Address Translation (NAT):
The source address is replaced with your routers public IP address. This is necessary because your computer uses a private IP address that is not globally unique and cannot be used on the Internet. The source port number is changed to a number chosen by the router, such as 33333. This is necessary because two computers could independently be using the same session number. Your router then sends this request message through the Internet to the Web server at www.example.com. 5-2 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual 4. The Web server at www.example.com composes a return message with the requested Web page data. The return message contains the following address and port information:
The Web server then sends this reply message to your router. The source address is the IP address of www.example.com. The source port number is 80, the standard port number for a Web server process. The destination address is the public IP address of your router. The destination port number is 33333. 5. Upon receiving the incoming message, your router checks its session table to determine whether there is an active session for port number 33333. Finding an active session, the router then modifies the message, restoring the original address information replaced by NAT. The message now contains the following address and port information:
The source address is the IP address of www.example.com. The source port number is 80, the standard port number for a Web server process. The destination address is your computers IP address. The destination port number is 5678, the browser session that made the initial request. Your router then sends this reply message to your computer, which displays the Web page from www.example.com. 6. When you finish your browser session, your router eventually senses a period of inactivity in the communications. Your router then removes the session information from its session table, and incoming traffic is no longer accepted on port number 33333. How Port Triggering Changes the Communication Process In the preceding example, requests are sent to a remote computer by your router from a particular service port number, and replies from the remote computer to your router are directed to that port number. If the remote server sends a reply back to a different port number, your router will not recognize it and will discard it. However, some application servers (such as FTP and IRC servers) send replies back to multiple port numbers. Using the port triggering function of your router, you can tell the router to open additional incoming ports when a particular outgoing port originates a session. An example is Internet Relay Chat (IRC). Your computer connects to an IRC server at destination port 6667. The IRC server not only responds to your originating source port, but also sends an identify message to your computer on port 113. Using port triggering, you can tell the router, Fine-Tuning Your Network 5-3 May 2012 N300 WiFi Router (N300R) User Manual When you initiate a session with destination port 6667, you must also allow incoming traffic on port 113 to reach the originating computer. Using steps similar to the preceding example, the following sequence shows the effects of the port triggering rule you have defined:
1. You open an IRC client program, beginning a chat session on your computer. 2. Your IRC client composes a request message to an IRC server using a destination port number of 6667, the standard port number for an IRC server process. Your computer then sends this request message to your router. 3. Your router creates an entry in its internal session table describing this communication session between your computer and the IRC server. Your router stores the original information, performs Network Address Translation (NAT) on the source address and port, and sends this request message through the Internet to the IRC server. 4. Noting your port triggering rule, and having observed the destination port number of 6667, your router creates an additional session entry to send any incoming port 113 traffic to your computer. 5. The IRC server sends a return message to your router using the NAT-assigned source port (as in the previous example, lets say port 33333) as the destination port. The IRC server also sends an identify message to your router with destination port 113. 6. Upon receiving the incoming message to destination port 33333, your router checks its session table to determine whether there is an active session for port number 33333. Finding an active session, the router restores the original address information replaced by NAT and sends this reply message to your computer. 7. Upon receiving the incoming message to destination port 113, your router checks its session table and learns that there is an active session for port 113, associated with your computer. The router replaces the messages destination IP address with your computers IP address and forwards the message to your computer. 8. When you finish your chat session, your router eventually senses a period of inactivity in the communications. The router then removes the session information from its session table, and incoming traffic is no longer accepted on port numbers 33333 or 113. To configure port triggering, you need to know which inbound ports the application needs. Also, you need to know the number of the outbound port that will trigger the opening of the inbound ports. You can usually determine this information by contacting the publisher of the application, or user groups or newsgroups. Note: Only one computer at a time can use the triggered application. 5-4 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual How Port Forwarding Changes the Communication Process In both of the preceding examples, your computer initiates an application session with a server computer on the Internet. However, you might need to allow a client computer on the Internet to initiate a connection to a server computer on your network. Normally, your router ignores any inbound traffic that is not a response to your own outbound traffic. You can configure exceptions to this default rule by using the port forwarding feature. A typical application of port forwarding can be shown by reversing the client-server relationship from our previous Web server example. In this case, a remote computers browser needs to access a Web server running on a computer in your local network. Using port forwarding, you can tell the router, When you receive incoming traffic on port 80 (the standard port number for a Web server process), forward it to the local computer at 192.168.1.123. The following sequence shows the effects of the port forwarding rule you have defined:
1. The user of a remote computer opens Internet Explorer and requests a Web page from www.example.com, which resolves to the public IP address of your router. The remote computer composes a Web page request message with the following destination information:
The destination address is the IP address of www.example.com, which is the address of your router. The destination port number is 80, the standard port number for a Web server process. The remote computer then sends this request message through the Internet to your router. 2. Your router receives the request message and looks in its rules table for any rules covering the disposition of incoming port 80 traffic. Your port forwarding rule specifies that incoming port 80 traffic should be forwarded to local IP address 192.168.1.123. Therefore, your router modifies the destination information in the request message:
The destination address is replaced with 192.168.1.123. Your router then sends this request message to your local network. 3. Your Web server at 192.168.1.123 receives the request and composes a return message with the requested Web page data. Your Web server then sends this reply message to your router. 4. Your router performs Network Address Translation (NAT) on the source IP address, and sends this request message through the Internet to the remote computer, which displays the Web page from www.example.com. To configure port forwarding, you need to know which inbound ports the application needs. You usually can determine this information by contacting the publisher of the application or user groups or newsgroups. Fine-Tuning Your Network 5-5 May 2012 N300 WiFi Router (N300R) User Manual How Port Forwarding Differs from Port Triggering The following points summarize the differences between port forwarding and port triggering:
Port triggering can be used by any computer on your network, although only one computer can use it at a time. Port forwarding is configured for a single computer on your network. Port triggering does not need to know the computers IP address in advance. The IP address is captured automatically. Port forwarding requires that you specify the computers IP address during configuration, and the IP address must never change. Port triggering requires specific outbound traffic to open the inbound ports, and the triggered ports are closed after a period of no activity. Port forwarding is always active and does not need to be triggered. Configuring Port Forwarding to Local Servers Using the port forwarding feature, you can allow certain types of incoming traffic to reach servers on your local network. For example, you might make a local Web server, FTP server, or game server visible and available to the Internet. Use the Port Forwarding screen to configure the router to forward specific incoming protocols to computers on your local network. In addition to servers for specific applications, you can also specify a default DMZ server to which all other incoming protocols are forwarded. The DMZ server is configured in the WAN Setup screen, as discussed in Setting Up a Default DMZ Server on page 4-8. Before starting, you need to determine which type of service, application, or game you will provide, and the local IP address of the computer that will provide the service. Be sure the computers IP address never changes. Tip: To ensure that your server computer always has the same IP address, use the reserved IP address feature of your N300R router. See Using Address Reservation on page 4-5 for instructions on how to use reserved IP addresses. 5-6 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual To configure port forwarding to a local server:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The Port Forwarding/Port Triggering screen displays. Figure 5-1 2. From the Service Name list, select the service or game that you will host on your network. If the service does not appear in the list, see the following section, Adding a Custom Service. In the corresponding Server IP Address fields, enter the last digit of the IP address of your local computer that will provide this service. 3. 4. To the right of Server IP Address, click Add. The service appears in the list in the screen. Adding a Custom Service To define a service, game, or application that does not appear in the Service Name list, you must first determine which port number or range of numbers is used by the application. You can usually determine this information by contacting the publisher of the application or user groups or newsgroups. When you have the port number information, follow these steps:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. Fine-Tuning Your Network 5-7 May 2012 N300 WiFi Router (N300R) User Manual 2. Click Add Custom Service (see Figure 5-1 on page 5-7).The PortsCustom Services screen displays. Figure 5-2 3. 4. 5. In the Service Name field, enter a descriptive name. In the Service Type field, select the protocol. If you are unsure, select TCP/UDP. In the Starting Port field, enter the beginning port number. If the application uses only a single port, enter the same port number in the Ending Port field. If the application uses a range of ports, enter the ending port number of the range in the Ending Port field. 6. In the Server IP Address field, enter the IP address of your local computer that will provide this service. 7. Click Apply. The service appears in the list in the Port Forwarding/Port Triggering screen. 5-8 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Editing or Deleting a Port Forwarding Entry To edit or delete a port forwarding entry:
1. In the table, select the button next to the service name. Figure 5-3 2. Click Edit Service or Delete Service to make changes. 3. Click Apply. Application Example: Making a Local Web Server Public If you host a Web server on your local network, you can use port forwarding to allow Web requests from anyone on the Internet to reach your Web server. To make a local Web server public:
1. Assign your Web server either a fixed IP address or a dynamic IP address using DHCP address reservation, as explained in Using Address Reservation on page 4-5. In this example, your router will always give your Web server an IP address of 192.168.1.33. In the Port Forwarding screen, configure the router to forward the HTTP service to the local address of your Web server at 192.168.1.33. HTTP (port 80) is the standard protocol for Web servers.
(Optional) Register a host name with a Dynamic DNS service, and configure your router to use the name as described in Using a Dynamic DNS Service on page 4-6. To access your Web server from the Internet, a remote user must know the IP address that has been assigned by your ISP. However, if you use a Dynamic DNS service, the remote user can reach your server by a user-friendly Internet name, such as myOn Networks.dyndns.org. 2. 3. Fine-Tuning Your Network 5-9 May 2012 N300 WiFi Router (N300R) User Manual Configuring Port Triggering Port triggering is a dynamic extension of port forwarding that is useful in these cases:
More than one local computer needs port forwarding for the same application (but not simultaneously). An application needs to open incoming ports that are different from the outgoing port. When port triggering is enabled, the router monitors outbound traffic looking for a specified outbound trigger port. When the router detects outbound traffic on that port, it remembers the IP address of the local computer that sent the data. The router then temporarily opens the specified incoming port or ports, and forwards incoming traffic on the triggered ports to the triggering computer. While port forwarding creates a static mapping of a port number or range to a single local computer, port triggering can dynamically open ports to any computer that needs them and can close the ports when they are no longer needed. Note: If you use applications such as multiplayer gaming, peer-to-peer connections, real-
time communications such as instant messaging, or remote assistance (a feature in Windows XP), you should also enable Universal Plug and Play (UPnP) according to the instructions in Using Universal Plug and Play on page 5-14. To configure port triggering, you need to know which inbound ports the application needs. Also, you need to know the number of the outbound port that will trigger the opening of the inbound ports. You can usually determine this information by contacting the publisher of the application or user groups or newsgroups. To set up port triggering:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The Forwarding/Port Triggering screen displays (see Figure 5-1 on page 5-7). 5-10 Fine-Tuning Your Network v1.0, May 2012 2. Select the Port Triggering radio button. The port triggering information displays. N300 WiFi Router (N300R) User Manual Figure 5-4 3. Clear the Disable Port Triggering check box. Note: If the Disable Port Triggering check box is selected after you configure port triggering, port triggering is disabled. However, any port triggering configuration information you added to the router is retained even though it is not used. 4. In the Port Triggering Timeout field, enter a value up to 9999 minutes. This value controls the inactivity timer for the designated inbound ports. The inbound ports close when the inactivity time expires. This is required because the router cannot be sure when the application has terminated. Fine-Tuning Your Network 5-11 May 2012 N300 WiFi Router (N300R) User Manual 5. Click Add Service. The Port TriggeringServices screen displays. Figure 5-5 6. 7. In the Service Name field, enter a descriptive service name. In the Service User field, select Any (the default) to allow this service to be used by any computer on the Internet. Otherwise, select Single address, and enter the IP address of one computer to restrict the service to a particular computer. 8. Select the service type, either TCP or UDP. 9. In the Triggering Port field, enter the number of the outbound traffic port that will cause the inbound ports to be opened. 10. Enter the inbound connection port information in the Connection Type, Starting Port, and Ending Port fields. 5-12 Fine-Tuning Your Network v1.0, May 2012 11. Click Apply. The service appears in the Port Triggering Portmap table. N300 WiFi Router (N300R) User Manual Figure 5-6 Fine-Tuning Your Network 5-13 May 2012 N300 WiFi Router (N300R) User Manual Using Universal Plug and Play Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers, to access the network and connect to other devices as needed. UPnP devices can automatically discover the services from other registered UPnP devices on the network. Note: If you use applications such as multiplayer gaming, peer-to-peer connections, real-
time communications such as instant messaging, or remote assistance (a feature in Windows XP), you should enable UPnP. To turn on Universal Plug and Play:
1. Select UPnP under Advanced the main menu. The UPnP screen displays. Figure 5-7 2. The available settings and information displayed in this screen are:
Turn UPnP On. UPnP can be enabled or disabled for automatic device configuration. The default setting for UPnP is disabled. If this check box is not selected, the router does not allow any device to automatically control the resources, such as port forwarding
(mapping) of the router. 5-14 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual Advertisement Period. The advertisement period is how often the router broadcasts its UPnP information. This value can range from 1 to 1440 minutes. The default period is 30 minutes. Shorter durations ensure that control points have current device status at the expense of additional network traffic. Longer durations might compromise the freshness of the device status but can significantly reduce network traffic. Advertisement Time To Live. The time to live for the advertisement is measured in hops
(steps) for each UPnP packet sent. The time to live hop count is the number of steps a broadcast packet is allowed to propagate for each UPnP advertisement before it disappears. The number of hops can range from 1 to 255. The default value for the advertisement time to live is 4 hops, which should be fine for most home networks. If you notice that some devices are not being updated or reached correctly, then it might be necessary to increase this value. UPnP Portmap Table. The UPnP Portmap Table displays the IP address of each UPnP device that is currently accessing the router and which ports (Internal and External) that device has opened. The UPnP Portmap Table also displays what type of port is open and whether that port is still active for each IP address. 3. Click Apply to save your settings. Optimizing Wireless Performance The speed and operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless router. You should choose a location for your router that will maximize the network speed. Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the router. The following list describes how to optimize wireless router performance. Identify critical wireless links. If your network has several wireless devices, decide which wireless devices need the highest data rate, and locate the router near them. Many wireless products have automatic data-rate fallback, which allows increased distances without loss of connectivity. This also means that devices that are farther away might be slower. Therefore, the most critical links in your network are those where the traffic is high and the distances are great. Optimize those first. Fine-Tuning Your Network 5-15 May 2012 N300 WiFi Router (N300R) User Manual Choose placement carefully. For best results, place your router:
Near the center of the area in which your computers will operate. In an elevated location such as a high shelf where the wirelessly connected computers have line-of-sight access (even if through walls). Avoid obstacles to wireless signals. Keep wireless devices at least 2 feet from large metal fixtures such as file cabinets, refrigerators, pipes, metal ceilings, reinforced concrete, and metal partitions. Keep away from large amounts of water such as fish tanks and water coolers. Reduce interference. Avoid windows unless communicating between buildings. Place wireless devices away from various electromagnetic noise sources, especially those in the 24002500 MHz frequency band. Common noise-creating sources are:
Computers and fax machines (no closer than 1 foot) Copying machines, elevators, and cell phones (no closer than 6 feet) Microwave ovens (no closer than 10 feet) Choose your settings. Use a scanning utility to determine what other wireless networks are operating nearby, and choose an unused channel. Turn off SSID broadcast, and change the default SSID. Other nearby devices might automatically try to connect to your network several times a second, which can cause significant performance reduction. Use WMM to improve the performance of voice and video traffic over the wireless link. Changing the MTU Size The Maximum Transmission Unit (MTU) is the largest data packet a network device transmits. When one network device communicates across the Internet with another, the data packets travel through many devices along the way. If any device in the data path has a lower MTU setting than the other devices, the data packets must be split or fragmented to accommodate the one with the smallest MTU. 5-16 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual The best MTU setting for On Networks equipment is often just the default value, and changing the value might fix one problem but cause another. Leave MTU unchanged unless one of these situations occurs:
You have problems connecting to your ISP, or other Internet service, and either the technical support of the ISP or of On Networks recommends changing the MTU size. These might require an MTU change:
A secure Web site that will not open, or displays only part of a Web page Yahoo e-mail MSN America Onlines DSL service You use VPN and have severe performance problems. You used a program to optimize MTU for performance reasons, and now you have connectivity or performance problems. Note: An incorrect MTU setting can cause Internet communication problems such as the inability to access certain Web sites, frames within Web sites, secure login pages, or FTP or POP servers. If you suspect an MTU problem, a common solution is to change the MTU size to 1400. If you are willing to experiment, you can gradually reduce the MTU size from the maximum value of 1500 until the problem goes away. Table 5-1 describes common MTU sizes and applications. Table 5-1. Common MTU Sizes MTU 1500 1492 1472 1468 1460 1436 1400 576 Application The largest Ethernet packet size and the default value. This is the typical setting for non-
PPPoE, non-VPN connections, and is the default value for On Networks routers, adapters, and switches. Used in PPPoE environments. Maximum size to use for pinging. (Larger packets are fragmented.) Used in some DHCP environments. Usable by AOL if you do not have large e-mail attachments, for example. Used in PPTP environments or with VPN. Maximum size for AOL DSL. Typical value to connect to dial-up ISPs. Fine-Tuning Your Network 5-17 May 2012 N300 WiFi Router (N300R) User Manual To change the MTU size:
1. 2. 3. Click Apply to save the new configuration. In the main menu, under Advanced, select WAN Setup. In the MTU Size field, enter a new size between 64 and 1500. Quality of Service Quality of Service (QoS) is an advanced feature that can be used to prioritize some types of traffic ahead of others. The N300R router can provide QoS prioritization over the wireless link. Using WMM QoS for Wireless Multimedia Applications The N300R router supports Wi-Fi Multimedia Quality of Service (WMM QoS) to prioritize wireless voice and video traffic over the wireless link. WMM QoS provides prioritization of wireless data packets from different applications based on four access categories: voice, video, best effort, and background. For an application to receive the benefits of WMM QoS, both it and the client running that application must be WMM enabled. Legacy applications that do not support WMM, and applications that do not require QoS, are assigned to the best effort category, which receives a lower priority than voice and video. Configuring QoS for Internet Access To specify prioritization of traffic, you must create a policy for the type of traffic and add the policy to the QoS Policy table in the QoS Setup screen. To create a QoS policy:
5-18 Fine-Tuning Your Network v1.0, May 2012 From the main menu of the browser interface, under Advanced, select QoS Setup. The QoS Setup screen displays:
N300 WiFi Router (N300R) User Manual Figure 5-8 WMM QoS is enabled by default. You can disable it by clearing the Enable WMM check box and clicking Apply. QoS for Applications and Online Gaming To create a QoS policy for traffic for specific applications or online games:
1. From the main menu of the browser interface, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8. Fine-Tuning Your Network 5-19 May 2012 N300 WiFi Router (N300R) User Manual 2. Click Setup QoS rule. The QoS - Priority Rules screen displays. Figure 5-9 For convenience, the QoS Policy table lists many common applications and online games that can benefit from QoS handling. 5-20 Fine-Tuning Your Network v1.0, May 2012 3. Click Add Priority Rule. The QoS - Priority Rules screen displays. N300 WiFi Router (N300R) User Manual Figure 5-10 4. In the Priority Category list, select either Applications or Online Gaming. In either case, a list of predefined applications or games displays in the Applications drop-down list. 5. From the Applications list, you can select an existing item, or you can scroll to the bottom of the list and select Add a New Application or Add a New Game. a. If you chose to add a new entry, the screen expands as shown:
Figure 5-11 In the QoS Policy for field, enter a descriptive name for the new application or game. b. c. Select the packet type, either TCP, UDP, or both (TCP/UDP), and specify the port number or range of port numbers used by the application or game. Fine-Tuning Your Network 5-21 May 2012 N300 WiFi Router (N300R) User Manual 6. From the Priority drop-down list, select the priority that this traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 7. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 8. 9. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. QoS for a Router LAN Port To create a QoS policy for a device connected to one of the routers LAN ports:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Click Add Priority Rule. 3. From the Priority Category list, select Ethernet LAN Port. The QoS - Priority Rules screen changes:
Figure 5-12 4. From the LAN port list, select the LAN port that will have a QoS policy. 5. From the Priority drop-down list, select the priority that this ports traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 6. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 7. 8. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. 5-22 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual QoS for a MAC Address To create a QoS policy for traffic from a specific MAC address:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Click Add Priority Rule. 3. From the Priority Category list, select MAC Address. The QoS - Priority Rules screen changes:
Figure 5-13 4. If the device to be prioritized appears in the MAC Device List, select it. The information from the MAC Device List is used to populate the policy name, MAC Address, and Device Name fields. If the device does not appear in the MAC Device List, click Refresh. If it still does not appear, you must complete these fields manually. 5. From the Priority drop-down list, select the priority that this devices traffic should receive relative to other applications and traffic when accessing the Internet. The options are Low, Normal, High, and Highest. 6. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen. 7. 8. Click Apply. In the QoS Setup screen, select the Turn Internet Access QoS On check box. Fine-Tuning Your Network 5-23 May 2012 N300 WiFi Router (N300R) User Manual Editing or Deleting an Existing QoS Policy To edit or delete an existing QoS policy:
1. From the main menu, under Advanced, select QoS Setup. The QoS Setup screen displays, as shown in Figure 5-8 on page 5-19. 2. Select the radio button next to the QoS policy to be edited or deleted, and do one of the following:
Click Delete to remove the QoS policy. Click Edit to edit the QoS policy. Follow the instructions in the preceding sections to change the policy settings. 3. Click Apply in the QoS Setup screen to save your changes. Overview of Home and Small Office Networking Technologies Common connection types and their speed and security considerations are:
Broadband Internet. Your Internet connection speed is determined by your modem type, such as ADSL or cable modem, as well as the connection speed of the sites to which you connect, and general Internet traffic. ADSL and cable modem connections are asymmetrical, meaning they have a lower data rate to the Internet (upstream) than from the Internet
(downstream). Keep in mind that when you connect to another site that also has an asymmetrical connection, the data rate between your sites is limited by each sides upstream data rate. A typical residential ADSL or cable modem connection provides a downstream throughput of about 1 to 3 megabits per second (Mbps). Newer technologies such as ADSL2+
and Fiber to the Home (FTTH) will increase the connection speed to tens of Mbps. Wireless. Your N300 WiFi Router (N300R) provides a wireless data throughput of up to 300 Mbps using technology called multiple input, multiple output (MIMO), in which multiple antennas transmit multiple streams of data. The use of multiple antennas also provides excellent range and coverage. With the introduction of the newer WPA and WPA2 encryption and authentication protocols, wireless security is extremely strong. 5-24 Fine-Tuning Your Network v1.0, May 2012 N300 WiFi Router (N300R) User Manual To get the best performance, use RangeMax NEXT adapters such as the WN511B for your computers. Although the RangeMax NEXT router is compatible with older 802.11b and 802.11g adapters, the use of these older wireless technologies in your network can result in lower throughput overall (typically less than 10 Mbps for 802.11b and less than 40 Mbps for 802.11g). In addition, many older wireless products do not support the latest security protocols, WPA and WPA2. Powerline. For connecting rooms or floors that are blocked by obstructions or are distant vertically, consider networking over your buildings AC wiring. On Networkss Powerline HD family of products delivers up to 200 Mbps to any outlet, while the older-generation XE family of products delivers 14 Mbps or 85 Mbps. Data transmissions are encrypted for security, and you can configure an individual network password to prevent neighbors from connecting. The Powerline HD family of products can coexist on the same network with older-generation XE family products or HomePlug 1.0 products, but they are not interoperable with these older products. Wired Ethernet. As gigabit-speed Ethernet ports (10/100/1000 Mbps) become common on newer computers, wired Ethernet remains a good choice for speed, economy, and security. Gigabit Ethernet can extend up to 100 meters with twisted-pair wiring of Cat 5e or better. A wired connection is not susceptible to interference, and eavesdropping would require a physical connection to your network. Note: Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, can lower actual data throughput rate. Assessing Your Speed Requirements Because your Internet connection is likely to operate at a much lower speed than your local network, faster local networking technologies might not improve your Internet experience. However, many emerging home applications require high data rates. For example:
Streaming HD video requires 10 to 30 Mbps per stream. Because latency and packet loss can disrupt your video, plan to provide at least twice the capacity you need. Streaming MP3 audio requires less than 1 Mbps per stream and does not strain most modern networks. Like video, however, streaming audio is also sensitive to latency and packet loss, so a congested network or a noisy link can cause problems. Fine-Tuning Your Network 5-25 May 2012 N300 WiFi Router (N300R) User Manual Backing up computers over the network has become popular due to the availability of inexpensive mass storage. Table 5-2 shows the time to transfer 1 gigabyte (1 GB) of data using various networking technologies. Table 5-2. Theoretical Transfer Time for 1 Gigabyte Network Connection Gigabit wired Ethernet RangeMax NEXT Wireless-N Powerline HD 100 Mbps wired Ethernet 802.11n wireless 802.11g wireless 802.11b wireless 10 Mbps wired Ethernet Cable modem (3 Mbps) Analog modem (56 kbps) Theoretical Raw Transfer Time 8 seconds 26 seconds 40 seconds 80 seconds 45 seconds 150 seconds 700 seconds 800 seconds 2700 seconds 144,000 seconds (40 hours) 5-26 Fine-Tuning Your Network v1.0, May 2012 Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your N300 WiFi Router (N300R). This chapter includes the following sections:
Viewing WiFi Router Status Information Viewing a List of Attached Devices on page 6-7 Managing the Configuration File on page 6-7 Updating the Router Firmware on page 6-9 Enabling Remote Management Access on page 6-13 Traffic Meter on page 6-15 May 2012 6-1 N300 WiFi Router (N300R) User Manual Viewing WiFi Router Status Information To view router status and usage information:
1. Select Router Status under Maintenance in the main menu. The Router Status screen displays. Figure 6-1 6-2 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual Table 6-1 describes the router status fields. Table 6-1. WiFi Router Status Fields Field Hardware Version Firmware Version GUI Language Version Description The hardware version of the router. The version of the current software installed in the router. This will change if you update your router. The version of the selected GUI language for the router manager screens. Internet Port. The following settings apply to the Internet (WAN) port of the router. MAC Address IP Address DHCP IP Subnet Mask Domain Name Server The Media Access Control address. This is the unique physical address being used by the Internet (WAN) port of the router. The IP address being used by the Internet (WAN) port of the router. If no address is shown, or is 0.0.0.0, the router cannot connect to the Internet. If set to None, the router is configured to use a fixed IP address on the WAN. If set to DHCP Client, the router is configured to obtain an IP address dynamically from the ISP. The IP subnet mask being used by the Internet (WAN) port of the router. The Domain Name Server addresses being used by the router. A Domain Name Server translates human-language URLs such as www.On Networks.com into IP addresses. LAN Port. The following settings apply to the Ethernet (LAN) port of the router. MAC Address IP Address DHCP IP Subnet Mask The Media Access Control address. This is the unique physical address being used by the LAN port of the router. The IP address being used by the Ethernet (LAN) port of the router. The default is 192.168.1.1. Identifies whether the routers built-in DHCP server is active for the LAN-attached devices. The IP subnet mask being used by the Ethernet (LAN) port of the router. The default is 255.255.255.0. Using Network Monitoring Tools 6-3 May 2012 N300 WiFi Router (N300R) User Manual Table 6-1. WiFi Router Status Fields (continued) Field Wireless Port. The following settings apply to the wireless port of the router. Description Name (SSID) Region Channel Mode Wireless AP Broadcast Name Wi-Fi Protected Setup The wireless network name (SSID) being used by the wireless port of the router. The default is On Networks. The geographic region where the router is being used. It might be illegal to use the wireless features of the router in some parts of the world. Identifies the channel of the wireless port being used. Indicates the wireless communication mode:
Up to 54 Mbps. Up to 145 Mbps. Up to 300 Mbps (in this mode, there are two channels: a primary channel [P] and a secondary channel [S]). Indicates whether the radio feature of the router is enabled. If not enabled, the Wireless LED on the front panel is off. Indicates whether the router is broadcasting its SSID. Indicates whether the routers PIN is enabled and whether the router is configured for Push N Connect (Wi-Fi Protected Setup). For more information, see Using WPS Push Button Connect (Wi-Fi Protected Setup) on page 2-13. 2. Click Connection Status to display the connection status. Figure 6-2 6-4 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual Table 6-2 describes the connection status settings. Table 6-2. Connection Status Settings Item IP Address Subnet Mask Default Gateway DHCP Server DNS Server Lease Obtained Lease Expires Description The IP address that is assigned to the router. The subnet mask that is assigned to the router. The IP address for the default gateway that the router communicates with. The IP address for the Dynamic Host Configuration Protocol server that provides the TCP/IP configuration for all the computers that are connected to the router. The IP address of the Domain Name Service server that provides translation of network names to IP addresses. The date and time that the lease was obtained. The date and time that the lease will expire. a. Click the Release button to release the connection status items (that is, all items return to 0). b. Click the Renew button to renew to the connection status items (that is, all items are refreshed). c. Click the Close Window button to close the Connection Status screen. 3. Click Show Statistics to display router usage statistics. Figure 6-3 Using Network Monitoring Tools 6-5 May 2012 N300 WiFi Router (N300R) User Manual Table 6-3 describes the router statistics. Table 6-3. Router Statistics Item System Up Time Port Status TxPkts RxPkts Collisions Tx B/s Rx B/s Up Time Poll Interval Description The time elapsed since the router was last restarted. The statistics for the WAN (Internet) and LAN (Ethernet) ports. For each port, the screen displays the following:
The link status of the port. The number of packets transmitted on this port since reset or manual clear. The number of packets received on this port since reset or manual clear. The number of collisions on this port since reset or manual clear. The current transmission (outbound) bandwidth used on the WAN and LAN ports. The current reception (inbound) bandwidth used on the WAN and LAN ports. The time elapsed since this port acquired the link. The intervals at which the statistics are updated in this screen. To change the polling frequency, enter a time in seconds in the Poll Interval field, and click Set Interval. To stop the polling entirely, click Stop. 6-6 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual Viewing a List of Attached Devices The Attached Devices screen contains a table of all IP devices that the router has discovered on the local network. Select Attached Devices under Maintenance in the main menu to view the table. Figure 6-4 For each device, the table shows the IP address, NetBIOS host name or device name (if available), and the Ethernet MAC address. To force the router to look for attached devices, click Refresh. Note: If the router is rebooted, the table data is lost until the router rediscovers the devices. Managing the Configuration File The configuration settings of the N300R router are stored within the router in a configuration file. You can back up (save) this file to your computer, restore it, or reset it to the factory default settings. Using Network Monitoring Tools 6-7 May 2012 N300 WiFi Router (N300R) User Manual Select Backup Settings under Maintenance in the main menu. The Backup Settings screen displays. Figure 6-5 The following sections describe the three available options. Backing Up and Restoring the Configuration The Restore and Backup options in the Settings Backup screen let you save and retrieve a file containing your routers configuration settings. To save your settings, click Backup. Your browser extracts the configuration file from the router and prompts you for a location on your computer to store the file. You can give the file a meaningful name at this time, such as comcast.cfg. Tip: Before saving your configuration file, change the administrator password to the default, password. Then change it again after you have saved the configuration file. If you forget the password, you will need to reset the configuration to factory defaults. 6-8 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual To restore your settings from a saved configuration file, enter the full path to the file on your computer, or click Browse to browse to the file. When you have located it, click Restore to send the file to the router. The router then reboots automatically. Warning: Do not interrupt the reboot process. Erasing the Configuration Under some circumstances (for example, if you move the router to a different network or if you have forgotten the password) you might want to erase the configuration and restore the factory default settings. After an erase, the routers username is admin, the password is password, the LAN IP address is 192.168.1.1 (or www.routerlogin.net), and the routers DHCP server is enabled. To erase the configuration, click the Erase button in the Settings Backup screen. To restore the factory default configuration settings when you do not know the login password or IP address, you must use the restore factory settings button on the rear panel of the router (see Restoring the Default Configuration and Password on page 7-11). Updating the Router Firmware The firmware of the N300R router is stored in flash memory, and can be updated as On Networks releases new firmware. You can update your firmware by logging into the router and using one of these procedures:
Enable the Check for Updated Firmware Upon Log-in check box. Each time you log in to the router, it will automatically detect a new version of the firmware and then install it. This check box is enabled in the routers default state. See Logging In To Your WiFi Router on page 1-1. Use the Check button in the Router Upgrade screen. Instead of having the router check for new firmware every time you log in, you can use Router Upgrade, under Maintenance in the main menu. See Checking for New Firmware in the Router Upgrade Screen. Using Network Monitoring Tools 6-9 May 2012 N300 WiFi Router (N300R) User Manual Check for and update your firmware manually. You can compare versions, obtain new firmware from On Networkss website, and then upload it. See Updating Manually to New Router Firmware on page 6-11. Note: Before updating the router software, On Networks recommends that you save your configuration settings (see Backing Up and Restoring the Configuration on page 6-8). A firmware update might cause the router settings to revert to the factory defaults. If this happens, after completing the update, you can restore your settings from the backup. Checking for New Firmware in the Router Upgrade Screen To check for new firmware and allow the router to automatically install it:
1. Select Router Upgrade under Maintenance in the main menu. The Router Upgrade screen displays. Figure 6-6 2. Check for new software versions by clicking the Check button. 6-10 Using Network Monitoring Tools v1.0, May 2012 If a new version is found, information about it appears. N300 WiFi Router (N300R) User Manual Figure 6-7 If no new firmware version is available, a message displays and the router returns to the Firmware Update screen. Figure 6-8 3. To update your firmware, click Yes and follow the prompts. Warning: When updating firmware to the N300R router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The update process typically takes about 1 minute. Updating Manually to New Router Firmware To manually select, download, and install new software to your router:
Using Network Monitoring Tools 6-11 May 2012 N300 WiFi Router (N300R) User Manual 1. Log in to your router, select Router Status under Maintenance on the main menu, and make note of the firmware version of your router. Figure 6-9 2. Go to the N300R support page on the On Networks website at http://www.On Networks.com/support. 3. Compare the version number of the most recent firmware offered to the firmware version of your router. If the version on the On Networks website is more recent, download the file from the N300R support page to your computer. 4. Log in to your router and select Router Upgrade under Maintenance on the main menu. 5. Click Browse, and locate the firmware image that you downloaded to your computer (the file ends in .img or .chk). 6. Click Upload to send the firmware to the router. Warning: When updating firmware to the N300R router, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware. When the upload is complete, your router automatically restarts. The upgrade process typically takes about 1 minute. 6-12 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual Enabling Remote Management Access Using the Remote Management feature, you can allow a user on the Internet to configure, upgrade, and check the status of your N300R router. Select Remote Management under Advanced in the main menu. The Remote Management screen displays. Figure 6-10 Note: Be sure to change the routers default configuration password to a very secure password. The ideal password should contain no dictionary words from any language, and should be a mixture of letters (both uppercase and lowercase), numbers, and symbols. Your password can be up to 30 characters. To configure your router for remote management:
1. Select the Turn Remote Management On check box. Using Network Monitoring Tools 6-13 May 2012 N300 WiFi Router (N300R) User Manual 2. Under Allow Remote Access By, specify what external IP addresses will be allowed to access the routers remote management. Note: For enhanced security, restrict access to as few external IP addresses as practical. To allow access from any IP address on the Internet, select Everyone. To allow access from a range of IP addresses on the Internet, select IP Address Range. Enter a beginning and ending IP address to define the allowed range. To allow access from a single IP address on the Internet, select Only This Computer. Enter the IP address that will be allowed access. 3. Specify the port number for accessing the management interface. Normal Web browser access uses the standard HTTP service port 80. For greater security, enter a custom port number for the remote management Web interface. Choose a number between 1024 and 65535, but do not use the number of any common service port. The default is 8080, which is a common alternate for HTTP. 4. Click Apply to have your changes take effect. Note: When accessing your router from the Internet, enter your routers WAN IP address into your browsers address or location field, followed by a colon (:) and the custom port number. For example, if your external address is 134.177.0.123 and you use port number 8080, then enter http://134.177.0.123:8080 in your browser. 6-14 Using Network Monitoring Tools v1.0, May 2012 N300 WiFi Router (N300R) User Manual Traffic Meter Traffic Metering allows you to monitor the volume of Internet traffic passing through your routers Internet port. With the Traffic Meter utility, you can set limits for traffic volume, set a monthly limit, and get a live update of traffic usage. To monitor traffic on your router, do the following:
1. On the Advanced menu, click Traffic Meter. Figure 6-11 2. To enable the Traffic Meter, click the Enable Traffic Meter check box. Using Network Monitoring Tools 6-15 May 2012 N300 WiFi Router (N300R) User Manual 6-16 Using Network Monitoring Tools v1.0, May 2012 Chapter 7 Troubleshooting This chapter provides information about troubleshooting your N300 WiFi Router (N300R). After each problem description, instructions are provided to help you diagnose and solve the problem. As a first step, please review the Quick Tips. Tip: On Networks provides helpful articles, documentation, and the latest software updates at http://www.On Networks.com/support. This chapter includes the following sections:
Quick Tips Troubleshooting Basic Functions on page 7-2 Login Problems on page 7-4 Checking the Internet Service Connection on page 7-5 Troubleshooting Your Network Using the Ping Utility on page 7-7 Problems with Date and Time on page 7-9 Problems with Wireless Adapter Connections on page 7-10 Restoring the Default Configuration and Password on page 7-11 Quick Tips This section describes tips for troubleshooting some common problems:
Be sure to restart your network in this sequence. 1. Turn off and unplug the modem. 2. Turn off the WiFi router and computers. 3. Plug in the modem and turn it on. Wait 2 minutes. v1.0, May 2012 7-1 N300 WiFi Router (N300R) User Manual 4. Turn on the WiFi router and wait 1 minute. 5. Turn on the computers. Make sure that the Ethernet cables are securely plugged in. The Internet status light on the WiFi router is on if the Ethernet cable connecting the WiFi router and the modem is plugged in securely and the modem and WiFi router are turned on. For each powered-on computer connected to the WiFi router by an Ethernet cable, the corresponding numbered router LAN port light is on. Make sure that the wireless settings in the computer and router match exactly. For a wirelessly connected computer, the wireless network name (SSID) and WEP or WPA security settings of the router and wireless computer must match exactly. If you have enabled the WiFi router to restrict wireless access by MAC address, you must add the wireless computers MAC address to the routers wireless card access list. Make sure that the network settings of the computer are correct. LAN connected computers must be configured to obtain an IP address automatically using DHCP. Some cable modem services require you to use the MAC address of the computer registered on the account. If so, in the Router MAC Address section of the Basic Settings menu, select Use this Computers MAC Address. Click Apply to save your settings. Restart the network in the correct sequence. Check the Test light to verify correct router operation. If the Test light does not turn off within 2 minutes after you turn the router on, reset the router according to the instructions in Restoring the Default Configuration and Password on page 7-11. Troubleshooting Basic Functions After you turn on power to the router, the following sequence of events should occur:
1. When power is first applied, verify that the power/check icon 2. Verify that the power/check light turns green and blinks slowly, indicating that the system is is on. initializing. 7-2 Troubleshooting May 2012 N300 WiFi Router (N300R) User Manual 3. After approximately 20 seconds, verify that:
a. The power/check light changes to solid green. b. The LAN port lights are lit for any local ports that are connected. If a ports light is lit, a link has been established to the connected device. If a LAN port is connected to a 100 Mbps device, verify that the ports light is green. If the port is 10 Mbps, the light will be amber. c. The Internet port is connected and its light is lit. If you have enabled WPS security, verify that the push-button stops blinking and changes to green (otherwise the push-button light should be off). 4. If the correct behavior does not occur, see the appropriate following section. The Power light is not on. If the Power and other lights are off when your router is turned on:
Make sure that the power cord is properly connected to your router and that the power adapter is properly connected to a functioning power outlet. Check that you are using the power adapter supplied by On Networks for this product. If the error persists, you have a hardware problem and should contact Technical Support. The Power light blinks green slowly and continuously (Case 1). The router firmware is corrupted or system initialization has failed. To restore your firmware:
1. Make sure your PC is connected to your router and the router is powered on. 2. Download the firmware from the On Networks support page. 3. Follow the instructions to restore your firmware. 4. After firmware recovery is complete, follow the prompts to restore your configuration settings. The Power light blinks green slowly and continuously (Case 2). If the Power light continues to blink for over 1 minute after powering on power to the router:
1. Turn the power off and back on to see if the router recovers. Troubleshooting 7-3 May 2012 N300 WiFi Router (N300R) User Manual 2. Clear the routers configuration to factory defaults. This will set the routers IP address to www.routerlogin.net. This procedure is explained in Restoring the Default Configuration and Password on page 7-11. If the error persists, you might have a hardware problem and should contact Technical Support. The Internet or LAN port lights are not on. If either the LAN or Internet lights do not light when the Ethernet connection is made, check the following:
1. Make sure that the Ethernet cable connections are secure at the router and at the computer. 2. Make sure that power is turned on to the connected computer. 3. Be sure you are using Ethernet cables like the cable that was supplied with the WiFi router. See the On Networks Wireless Router Setup Manual for instructions. Login Problems If you are unable to log in to the WiFi router, check the following:
If you are using an Ethernet-connected computer, check the Ethernet connection between the computer and the router as described in the On Networks Wireless Router Setup Manual. Make sure you are using the correct login information. The factory default login name is admin and the password is password. Make sure that the Caps Lock is off when entering this information. Make sure your computers IP address is on the same subnet as the router. If your are using the recommended addressing scheme, your computers address should be in the range of 192.168.1.2 to 192.168.1.254. Note: If your computer cannot reach a DHCP server, some operating systems will assign an IP address in the range 169.254.x.x. If your IP address is in this range, verify that you have a good connection from the computer to the router, then restart (reboot) your computer. If your routers IP address has been changed and you dont know the current IP address, reset the routers configuration to the factory defaults. This procedure will reset the routers IP address to 192.168.1.1 (see Default Configuration Settings in Appendix A). 7-4 Troubleshooting May 2012 N300 WiFi Router (N300R) User Manual Make sure your browser has Java, JavaScript, or ActiveX enabled. If you are using Internet Explorer, click Refresh to be sure the Java applet is loaded. Try closing the browser and reopening it again. If you are attempting to set up your On Networks router as an additional router behind an existing router in your network, consider replacing the existing router instead. On Networks does not support such a configuration. If you are attempting to set up your On Networks router as a replacement for an ADSL gateway in your network, the router cannot perform many gateway services, for example, converting ADSL or Cable data into Ethernet networking information. On Networks does not support such a configuration. Checking the Internet Service Connection If you can access your router, but your router is unable to access the Internet, review the topics in this section:
Obtaining an Internet IP Address Troubleshooting PPPoE Troubleshooting Internet Browsing Obtaining an Internet IP Address If your WiFi router is unable to access the Internet, and your Internet light is amber, check the WiFi router to see if it is able to get an Internet IP address from your service provider. Unless you have a static IP address, your WiFi router automatically requests an IP address from your service provider. To check your WiFi routers Internet IP address:
1. Log in to the WiFi router. 2. Select Router Status, under Maintenance in the main menu, to check that an IP address is shown for the Internet Port. If 0.0.0.0 is shown, your WiFi router has not obtained an IP address from your service provider. If your router is unable to obtain an IP address from the your service provider, the problem might be one of the following:
Troubleshooting 7-5 May 2012 N300 WiFi Router (N300R) User Manual You might need to force your cable or DSL modem to recognize your new router by restarting your network, in the sequence described in the On Networks Wireless Router Setup Manual. Your service provider might require a login. Ask your service provider whether they require a PPP over Ethernet (PPPoE) login (see Troubleshooting PPPoE on page 7-6). You might have incorrectly set the service name, user name or password. Review your routers Basic Settings screen. Your service provider might check for your computer's host name. Assign the computer Host Name of your ISP account to the WiFi router on the Basic Settings screen. Your service provider might only allow one Ethernet MAC address to connect to the Internet, and check for your computers MAC address. If this is the case:
Inform your service provider that you have bought a new network device, and ask them to use the WiFi routers MAC address, or Configure your router to spoof your computers MAC address. On the Basic Settings screen in the Router MAC Address section, select Use this Computers MAC Address and click Apply. Then restart your network in the correct sequence (see the On Networks Wireless Router Setup Manual for instructions). Troubleshooting PPPoE If you are using PPPoE, try troubleshooting your Internet connection. To troubleshoot a PPPoE connection:
1. Log in to the WiFi router. 2. Select Router Status under Maintenance on the main menu. 3. Click Connection Status. If all of the steps indicate OK, then your PPPoE connection is up and working. If any of the steps indicate Failed, you can attempt to reconnect by clicking Connect. The WiFi router will continue to attempt to connect indefinitely. If you cannot connect after several minutes, you might be using an incorrect service name, user name, or password. There also might be a provisioning problem with your ISP. Note: Unless you connect manually, the WiFi router will not authenticate using PPPoE until data is transmitted to the network. 7-6 Troubleshooting May 2012 N300 WiFi Router (N300R) User Manual Troubleshooting Internet Browsing If your WiFi router can obtain an IP address but your computer is unable to load any web pages from the Internet, check the following:
Your computer might not recognize any DNS server addresses. A DNS server is a host on the Internet that translates Internet names (such as www addresses) to numeric IP addresses. Typically, your ISP will provide the addresses of one or two DNS servers for your use. If you entered a DNS address during the WiFi routers configuration, restart your computer. Alternatively, you can configure your computer manually with a DNS address, as explained in the documentation for your computer. Your computer might not have the WiFi router configured as its default gateway. Reboot the computer and verify that the WiFi router address (www.routerlogin.net) is listed by your computer as the default gateway address. You might be running login software that is no longer needed. If your ISP provided a program to log you in to the Internet (such as WinPoET), you no longer need to run that software after installing your router. You might need to go to Internet Explorer and select Tools > Internet Options, click the Connections tab, and select Never dial a connection. If the WiFi router does not save changes you have made in the browser interface, check the following:
When entering configuration settings, be sure to click Apply before moving to another screen or tab, or your changes could be lost. Click Refresh or Reload in the Web browser. The changes might have occurred, but the Web browser might be caching the old configuration. Troubleshooting Your Network Using the Ping Utility Most network devices and routers contain a ping utility that sends an echo request packet to the designated device. The device then responds with an echo reply. Troubleshooting a network is made very easy by using the ping utility in your computer or workstation. This section includes:
Testing the LAN Path to Your Router Testing the Path from Your Computer to a Remote Device Troubleshooting 7-7 May 2012 N300 WiFi Router (N300R) User Manual Testing the LAN Path to Your Router You can ping the router from your computer to verify that the LAN path to your router is set up correctly. To ping the router from a running Windows PC:
1. From the Windows toolbar, click Start, and then select Run. 2. ping www.routerlogin.net 3. Click OK. In the field provided, type ping followed by the IP address of the router, as in this example:
You should see a message like this one:
Pinging <IP address > with 32 bytes of data If the path is working, you see this message:
Reply from < IP address >: bytes=32 time=NN ms TTL=xxx If the path is not working, you see this message:
Request timed out If the path is not functioning correctly, you could have one of the following problems:
Wrong physical connections For a wired connection, make sure that the numbered LAN port light is on for the port to which you are connected. If the light is off, follow the instructions in Troubleshooting Basic Functions on page 7-2. Check that the appropriate LEDs are on for your network devices. If your router and computer are connected to a separate Ethernet switch, make sure that the link lights are on for the switch ports that are connected to your computer and router. Wrong network configuration Verify that the Ethernet card driver software and TCP/IP software are both installed and configured on your computer. Verify that the IP address for your router and your computer are correct and that the addresses are on the same subnet. 7-8 Troubleshooting May 2012 N300 WiFi Router (N300R) User Manual Testing the Path from Your Computer to a Remote Device After verifying that the LAN path works correctly, test the path from your computer to a remote device. 1. From the Windows toolbar, click the Start button, and then select Run. 2. In the Windows Run window, type:
ping -n 10 <IP address>
where <IP address> is the IP address of a remote device such as your ISPs DNS server. If the path is functioning correctly, replies like those shown in the previous section are displayed. If you do not receive replies:
Check that your computer has the IP address of your router listed as the default gateway. If the IP configuration of your computer is assigned by DHCP, this information is not be visible in your computers Network Control Panel. Verify that the IP address of the router is listed as the default gateway. Check to see that the network address of your computer (the portion of the IP address specified by the subnet mask) is different from the network address of the remote device. Check that your cable or DSL modem is connected and functioning. If your ISP assigned a host name to your computer, enter that host name as the account name in the Basic Settings screen. Your ISP could be rejecting the Ethernet MAC addresses of all but one of your computers. Many broadband ISPs restrict access by allowing traffic only from the MAC address of your broadband modem, but some ISPs additionally restrict access to the MAC address of a single computer connected to that modem. If this is the case, you must configure your router to clone or spoof the MAC address from the authorized computer. Problems with Date and Time Select E-mail under Content Filtering in the main menu to display a screen that shows the current date and time of day. The N300R router uses the Network Time Protocol (NTP) to obtain the current time from one of several network time servers on the Internet. Each entry in the log is stamped with the date and time of day. Problems with the date and time function can include the following:
Troubleshooting 7-9 May 2012 N300 WiFi Router (N300R) User Manual Date shown is January 1, 2000. Cause: The router has not yet successfully reached a network time server. Check that your Internet access settings are correct. If you have just completed configuring the router, wait at least 5 minutes, and check the date and time again. Time is off by one hour. Cause: The router does not adjust for daylight savings time. In the E-mail screen, select the Automatically Adjust for Daylight Savings Time check box. Problems with Wireless Adapter Connections If your wireless adapter is unable to connect, check its connection settings. To check the adapters connection settings:
1. open the adapter setup utility to check connections:
On Networks Smart Wizard utility. If you installed a On Networks wireless adapter in your computer, a Smart Wizard utility program is installed that can provide helpful information about your wireless network. You can find this program in your Windows Program menu or as an icon in your system tray. Other wireless card manufacturers might include a similar program. Windows basic setup utility. If you have no specific wireless card setup program installed, you can use the basic setup utility in Windows:
Open the Windows Control Panel, and double-click Network Connections. In the LAN section, double-click Wireless Network Connection. 2. Use the adapters setup program to scan for available wireless networks, looking for the network name (SSID) of On Networks, or your custom SSID if you have changed it. If your wireless network appears and has good signal strength, configure and test with the simplest wireless connection possible. 3. If your wireless network does not appear, check these conditions:
Is your routers wireless radio enabled? See Viewing Advanced Wireless Settings on page 2-12. Is your routers SSID broadcast enabled? See Viewing Advanced Wireless Settings on page 2-12. Is your router set to a wireless standard that is not supported by your wireless adapter? Check the Mode setting as described in Viewing and Configuring Basic ISP Settings on page 1-5. 7-10 Troubleshooting May 2012 N300 WiFi Router (N300R) User Manual If your wireless network appears, but the signal strength is weak, check these conditions:
Is your router too far from your adapter, or too close? Place the computer that has the adapter near the router, but at least 6 feet away, and see whether the signal strength improves. Is your wireless signal obstructed by objects between the router and your adapter? See Optimizing Wireless Performance on page 5-15. Restoring the Default Configuration and Password This section explains how to restore the factory default configuration settings that reset the routers user name to admin, the password to password, and the IP address to 192.168.1.1. Warning: These procedures erase all current configuration settings. You can erase the current configuration and restore factory defaults in two ways:
Use the Erase function of the router. To use the Erase function, see Erasing the Configuration on page 6-9. Use the restore factory settings button on the rear panel of the router. Use this method for cases when the administration password or IP address is not known. To use the restore settings button:
1. Locate the restore factory settings button on the rear panel of the router. 2. Use a sharp object such as a pen or a paper clip to press and hold the restore factory settings button for about 5 seconds, until the Power light begins to blink. 3. Release the restore factory settings button, and wait for the router to restart, and for the Power light to stop blinking and become solid green. The factory default settings will be restored so that you can access the router from your Web browser using the factory defaults. If the WiFi router fails to restart, or the Power light continues to blink or turns solid amber, the unit might be defective. If the error persists, you might have a hardware problem and should contact Technical Support at http://www.On Networks.com/support. Troubleshooting 7-11 May 2012 N300 WiFi Router (N300R) User Manual 7-12 Troubleshooting May 2012 Appendix A Technical Specifications Default Configuration Settings This appendix provides factory default settings and technical specifications for the N300 WiFi Router (N300R). Table A-1. N300R Router Default Configuration Settings Feature Router Login Router Login URL Login Name (case-sensitive) printed on product label Login Password (case-sensitive) printed on product label Internet Connection WAN MAC Address MTU Size Local Network Default Setting http://www.routerlogin.net or http://www.routerlogin.com admin password Default hardware address (on label) 1500 Router LAN IP address printed on product label
(also known as Gateway IP address) Router Subnet DHCP Server DHCP range Time Zone Time Zone Adjusted for Daylight Saving Time Allow a Registrar to configure this router 192.168.1.1 255.255.255.0 Enabled 192.168.1.2 to 192.168.1.254 GMT Disabled Enabled Technical Specifications A-1 v1.0, May 2012 N300 WiFi Router (N300R) User Manual Table A-1. N300R Router Default Configuration Settings (continued) Wireless Wireless Communication SSID Name Security Wireless Access List (MAC Filtering) Broadcast SSID Transmission Speed Country/Region RF Channel Operating Mode Data Rate Output Power Firewall Enabled On Networks Disabled All wireless stations allowed Enabled Auto*
United States (North America only; otherwise varies by country and region) 6 until region selected 145 Mbps Best Full Inbound (communications coming in from the Internet) Disabled (bars all unsolicited requests except Outbound (communications going out to the Internet) for traffic on port 80, the http port) Enabled (all)
*. Maximum Wireless signal rate derived from IEEE Standard 802.11 specifications. Actual throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead lower actual data throughput rate. A-2 Technical Specifications v1.0, May 2012 N300 WiFi Router (N300R) User Manual General Specifications Table A-2. N300R Router General Specifications Feature General Network Protocol and Standards Compatibility Data and Routing Protocols TCP/IP, RIP-1, RIP-2, DHCP, PPPoE, PPTP, Bigpond, Dynamic DNS, and UPnP Power Adapter North America UK, Australia Europe Japan All regions (output) Physical Dimensions Weight Environmental 120V, 60 Hz, input 240V, 50 Hz, input 230V, 50 Hz, input 100V, 50/60 Hz, input 12V DC @ 1.0A, output 6.8" x 4.6" x 1.4"
172.7 x 115.7 x 32.6 mm 0.48 lbs. 0.216 kg Operating temperature Operating humidity 0 to 40 C (32 to 104 F) 90% maximum relative humidity, noncondensing Electromagnetic Emissions Designed to conform to the following standards Interface Specifications LAN WAN FCC Part 15 Class B EN 55022/24 (CISPR 22/24) Class B EN 60950 (CE LVD) Class B KCC 10BASE-T or 100BASE-Tx, RJ-45 10BASE-T or 100BASE-Tx, RJ-45 Technical Specifications A-3 v1.0, May 2012 N300 WiFi Router (N300R) User Manual A-4 Technical Specifications v1.0, May 2012 Appendix B Notification of Compliance Regulatory Compliance Information This section includes user requirements for operating this product in accordance with National laws for usage of radio spectrum and operation of radio devices. Failure of the end-user to comply with the applicable requirements may result in unlawful operation and adverse action against the end-user by the applicable National regulatory authority. This product's firmware limits operation to only the channels allowed in a particular Region or Country. Therefore, all options described in this user's guide may not be available in your version of the product. FCC Requirements for Operation in the United States FCC Information to User This product does not contain any user serviceable components and is to be used with approved antennas only. Any product changes or modifications will invalidate all applicable regulatory certifications and approvals This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Guidelines for Human Exposure This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance of 20 cm between the radiator and your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. May 2012 B-1 N300 WiFi Router (N300R) User Manual FCC Declaration Of Conformity On Networks declares under our sole responsibility that the N300 WiFi Router (N300R) complies with Part 15 of FCC Rules. Operation is subject to the following two conditions:
This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation. FCC Radio Frequency Interference Warnings & Instructions This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following methods:
Reorient or relocate the receiving antenna. Connect the equipment into an electrical outlet on a circuit different from that which the radio Increase the separation between the equipment and the receiver. receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Modifications made to the product, unless expressly approved by On Networks, could void the user's right to operate the equipment. Canadian Department of Communications Radio Interference Regulations This digital apparatus, N300 WiFi Router (N300R), does not exceed the Class B limits for radio-noise emissions from digital apparatus as set out in the Radio Interference Regulations of the Canadian Department of Communications. This Class [B] digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe [B] est conforme la norme NMB-003 du Canada B-2 Notification of Compliance May 2012 N300 WiFi Router (N300R) User Manual European Union The N300 WiFi Router (N300R) complies with essential requirements of EU EMC Directive 2004/108/EC and Low Voltage Directive 2006/95/EC as supported by applying the following test methods and standards:
EN55022: 2006 / A1: 2007 EN55024: 1998 / A1: 2001 / A2 : 2003 EN60950-1: 2005 2nd Edition EN 61000-3-2:2006 EN 61000-3-3:1995 w/A1: 2001+A2: 2005 Notification of Compliance B-3 May 2012 N300 WiFi Router (N300R) User Manual B-4 Notification of Compliance May 2012 Index blocking access 3-1 inbound traffic 5-1 bold text xi broadband Internet 5-24 broadcast status 6-4 C cables, checking 7-2 channel, frequency 2-8 channel, wireless port 6-4 clients, adding 2-13, 2-18, 6-4 communication mode 2-8, 6-4 compatibility, protocol and standards A-3 configuration file backing up 6-8 erasing 6-9 managing 6-7 configuring advanced security 2-12 basic security 2-6 DMZ server 4-9 Dynamic DNS 4-7 LAN IP settings 4-2 NAT 4-10 port forwarding 5-6 port triggering 5-10 repeater unit 4-15 WPA security 2-10 WPS 2-17 See also adding connection mode 1-10 connection status settings 6-5 connection types 5-24 content filtering 3-1 A access blocking 3-1 remote 6-13 restricting by MAC address 2-19 to a remote computer 5-2 to the router 1-2 viewing logs 3-6 access control turning off 1-13 turning on 2-21 access points 4-12 account name 1-8 adding custom service 5-7 priority rules 5-18 reserved IP addresses 4-5 static routes 4-11 wireless clients 2-13, 2-18, 6-4 See also configuring administrator password, changing 2-21 advanced wireless settings 2-12 advertisement period 5-15 AES (Advanced Encryption Standard) encryption 2-11 attached devices 6-7 authentication, required by mail server 3-8 automatic logout 1-5 B backing up configuration file 6-8 backing up, transfer time 5-26 base station, setting up 4-14 basic settings 2-6 basic wireless connectivity 1-11 v1.0, May 2012 Index-1 N300 WiFi Router (N300R) User Manual CTS/RTS Threshold 2-13 custom service (port forwarding) 5-7 customer support ii D data packets, fragmented 5-16 date and time, troubleshooting 7-10 daylight savings time 3-9, 7-11 default DMZ server 4-8 default factory settings listed A-1 restoring 7-12 default gateway 6-5 default LAN IP configuration 4-3 deleting configuration 6-9 device name 4-2 DHCP server 4-4, 6-5 DHCP setting 6-3 disabling firewall 4-8 router PIN 2-17 wireless client association 4-14 DMZ server 4-8 DNS servers 5-2 Documentation Web page 1-4 documents, reference B-1 domain name 1-8 Domain Name Server (DNS) addresses current 6-3 entering 1-8, 1-11 Dynamic DNS 4-6 dynamic IP addresses 1-8 DynDNS.org 4-6 E electromagnetic emissions A-3 e-mailing logs 3-7 encryption 2-1 Index-2 encryption keys 2-10 environmental specifications A-3 erasing configuration 6-9 Ethernet MAC address 6-7 F factory default settings listed A-1 restoring 7-12 filtering content 3-1 firewalls default settings A-2 disabling 4-8 overview 2-23 firmware restoring 7-3 updating 1-3, 6-3, 6-9 fixed font text xi fixed IP addresses 1-8 Fragmentation Threshold 2-13 fragmented data packets 5-16 frequency, channel 2-8 G generating encryption keys 2-10 Gigabit Ethernet 5-25 GUI language version 6-3 H hardware version 6-3 host name 1-8, 6-7 HTML version, printing xii I idle time-out 1-11 IGMP Proxying 4-9 inbound traffic, allowing or blocking 5-1 interface specifications A-3 v1.0, May 2012 interference, reducing 5-16 Internet connection default settings A-1 Internet port, status 6-3 Internet Relay Chat (IRC) 5-3 Internet services, blocking access 3-3 interval, poll 6-6 IP addresses blocking access by 3-5 current 6-3 dynamic or static 1-8 LAN 4-3 registering domain name 4-6 reserved 4-5 IP subnet mask 4-3, 6-3 ISP settings, basic 1-7 italic text xi K keys, encryption 2-10 keywords, blocking by 3-1 knowledge base 1-4 L L2TP (Layer 2 Tunneling Protocol) 1-9 LAN IP setup 4-1 LAN path, troubleshooting 7-9 LAN port settings 6-3 language, screen display 1-5 lease, DHCP 6-5 Legacy mode 2-8 local network, default settings A-1 local servers, port forwarding to 5-6 logging in 1-2 login required 1-9 login settings A-1 logout, automatic 1-5 N300 WiFi Router (N300R) User Manual logs sending 3-7 time-stamping entries 3-9 viewing 3-6 M MAC addresses attached devices 6-7 current 6-3 entering 1-8 restricting access by 2-19 spoofing 7-7 mail server, outgoing 3-8 managing router remotely 6-13 metric value 4-12 mixed mode encryption 2-3, 2-11 mode, communication 2-8, 6-4 MTU size 4-9, 5-16 N NAT (Network Address Translation) 4-8, 4-10, 5-2 Neighbor Friendly mode 2-8 NetBIOS host name 6-7 Network Time Protocol (NTP) 3-9, 7-10 O obstructions, connecting through 5-25 Open System authentication 2-9 optimizing performance 5-15 outgoing mail server 3-8 P passphrases 2-9, 2-10, 2-11 password changing 2-21 restoring 7-12 path, testing 7-10 Performance mode 2-8 performance, optimizing 5-15 v1.0, May 2012 Index-3 N300 WiFi Router (N300R) User Manual physical push button (WPS) 2-14 physical specifications A-3 PIN 2-15, 2-17 ping 4-9, 7-8 placement, router 5-16 poll interval 6-6 port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-6 port triggering configuring 5-10 example 5-3 portmap table 5-15 power adapter specifications A-3 Power light, troubleshooting and 7-2 Powerline HD products 5-25 PPPoE (PPP over Ethernet) 1-10 PPTP (Point to Point Tunneling Protocol) 1-9 Preamble mode 2-13 primary DNS server 1-8, 1-11 printing manual xii prioritizing traffic 5-18 protocols, compatibility A-3 Push N Connect 2-13, 6-4, 7-4 push button configuration (WPS) 2-14 Q QoS (Quality of Service) 5-18 R radio, wireless 1-13, 2-12, 6-4 range, router 5-15 reducing interference 5-16 reference documents B-1 region of operation 2-7 Index-4 registering product ii releasing connection status 6-5 remote devices, testing path 7-10 remote management 6-13 renewing connection status 6-5 repeater units 4-15 requirements, speed 5-25 reserved IP adresses 4-5 Resource CD 1-1 restarting network 7-1 restoring configuration 6-8 default factory settings 7-12 restoring firmware 7-3 restricting access by MAC address 2-19 revision history xiii RIP (Router Information Protocol) direction 4-3 route name 4-11, 4-12 router PIN 2-15, 2-17 router status, viewing 6-2 S scheduling blocking 3-5 screen display language 1-5 selecting 1-5 secondary DNS server 1-8, 1-11 security options, compared 2-2 setting up 2-1 security PIN 2-15, 2-17 service name 1-10 service numbers 3-4 services, blocking 3-3 setting time 3-9 settings, default. See default factory settings setup information, gathering 2-5 Setup Manual 1-1 Shared Key authentication 2-5, 2-9 v1.0, May 2012 N300 WiFi Router (N300R) User Manual Smart Setup Wizard 1-6 SMTP server 3-8 software push button configuration (WPS) 2-14 specifications technical A-1 speed requirements 5-25 SPI (Stateful Packet Inspection) firewall 4-8 spoofing MAC addresses 1-8, 7-7 SSID 1-12, 2-7, 6-4 SSID broadcast 1-13, 2-12 standards, compatibility A-3 static IP addresses 1-8 static routes 4-10 statistics, usage 6-6 status, viewing 6-2 streaming video and audio 5-25 subnet mask 4-3, 6-3 system up time 6-6 T TCP/IP network, troubleshooting 7-8 technical specifications A-1 testing wireless connections 1-11 time of day, troubleshooting 7-10 time to live, advertisement 5-15 time, setting 3-9 time-out idle 1-11 port triggering 5-11 TKIP (Temporal Key Integrity Protocol) encryption 2-11 trademarks ii traffic metering 6-15 traffic, prioritizing 5-18 transfer time (backing up) 5-26 troubleshooting 7-1 trusted user 3-2 typographical conventions xi U Universal Plug and Play (UPnP) 5-14 up time, system 6-6 updating firmware 1-3, 6-3, 6-9 URLs typography for xi usage statistics 6-6 V version firmware 6-3, 6-9 RIP (Router Information Protocol) 4-3 viewing advanced wireless settings 2-12 attached devices 6-7 basic security settings 2-6 logs 3-6 status 6-2 W WAN setup 4-8 WDS 4-12, 4-13 WEP encryption 2-3, 2-9 Wi-Fi Protected Setup (WPS) 2-13, 6-4, 7-4 wildcards, DNS and 4-7 Wireless Card Access List 2-19 wireless client PIN 2-15 wireless clients, adding 2-13, 2-18, 6-4 wireless connection type 5-24 Wireless Distribution System (WDS) 4-12 wireless network name 1-12, 2-7, 6-4 wireless port settings 6-4 wireless radio 1-13, 2-12, 6-4 wireless repeating 4-12, 4-13 base station 4-14 repeater unit 4-15 wireless repeating function 4-12, 4-13 wireless security, setting up 2-1 v1.0, May 2012 Index-5 N300 WiFi Router (N300R) User Manual wireless settings advanced 2-12 basic 2-6 default, listed A-2 gathering information 2-5 testing 1-11 WMM (Wi-Fi Multimedia) 5-18 WPA2-PSK encryption 2-3, 2-10 WPA-PSK + WPA2-PSK encryption 2-3, 2-10 WPA-PSK encryption 2-3, 2-10 Index-6 v1.0, May 2012
1 2 | Internal Photos | Internal Photos | 822.85 KiB | August 03 2011 |
PCB with ON/OFF switch Page 8 Page 9 Page 10 Page 11 PCB without ON/OFF switch Page 12 Page 13 Page 14 Page 15
1 2 | External Photos | External Photos | 416.75 KiB | August 03 2011 |
CONSTRUCTION PHOTOS OF EUT FCC adapter Adapter model: MU08A9075100-A1 Page 1 Page 2 Adapter model: AD810F22 Page 3 PCB with ON/OFF switch Page 4 Page 5 PCB without ON/OFF switch Page 6 Page 7
1 2 | Label Smpl | ID Label/Location Info | 476.24 KiB | May 24 2012 |
REV DESCRIPTION OF REVISION 01 INITIAL DOCUMENT CREATION ENG APPD DATE R HU 06MAR12 5 Pantone Cool Grey 11C NOTE:
1. REFER TO NETGEAR SPEC. DOC-00093 FOR COLOR TOLERANCES. 2. INK COLOR IS SHOWN TO THE RIGHT. 3. DIE LINES ARE MAGENTA COLOR AND DO NOT PRINT. 4. MAC & SERIAL NUMBERS TO BE PRINTED BY THE ODM. 5. INSURE COUNTRY OF ORIGIN IS CORRECT. A. IF COUNTRY OF ORIGIN IS PRE-PRINTED, UNHIDE THE APPROPRIATE COUNTRY OF ORIGIN LAYER AND INCLUDE COUNTRY OF ORIGIN ON LABEL. B. IF COUNTRY OF ORIGIN IS POST-PRINTED USING A THERMAL PRINTER (OR EQUIVALENT), OMIT TEXT FROM ARTWORK (USE LAYERS). AUTHOR:
SHEET:
R HU 1 of 1 TITLE:
AW, N300R,PLBL,V1H1 THIS DOCUMENT AND THE DATA DISCLOSED HEREIN OR WHEREWITH IS NOT TO BE REPRODUCED, USED OR DISCLOSED IN WHOLE OR IN PART TO ANYONE WITHOUT THE PERMISSION OF NETGEAR, INC. P/N:
AW-11805-01 REV:
01
1 2 | Label and Location 1 | ID Label/Location Info | 784.20 KiB | August 03 2011 |
REV DESCRIPTION OF REVISION ENG APPD DATE 01 INITIAL DOCUMENT CREATION R HU 07FEB11 6 NETGEAR 490-10021-01 Enclosure Color for Ref. AUTHOR:
SHEET:
R HU 1 of 1 TITLE:
AW, JWNR2000, V2H1, PLBL THIS DOCUMENT AND THE DATA DISCLOSED HEREIN OR WHEREWITH IS NOT TO BE REPRODUCED, USED OR DISCLOSED IN WHOLE OR IN PART TO ANYONE WITHOUT THE PERMISSION OF NETGEAR, INC. P/N:
SSD-10425-02 REV:
01
1 2 | Label and Location 2 | ID Label/Location Info | 778.42 KiB | August 03 2011 |
REV DESCRIPTION OF REVISION ENG APPD DATE 01 INITIAL DOCUMENT CREATION R HU 07FEB11 6 NETGEAR 490-10021-01 Enclosure Color for Ref. AUTHOR:
SHEET:
R HU 1 of 1 TITLE:
AW, JWNR2000, V2H1, PLBL THIS DOCUMENT AND THE DATA DISCLOSED HEREIN OR WHEREWITH IS NOT TO BE REPRODUCED, USED OR DISCLOSED IN WHOLE OR IN PART TO ANYONE WITHOUT THE PERMISSION OF NETGEAR, INC. P/N:
SSD-10431-02 REV:
01
1 2 | Confidential | Cover Letter(s) | 37.95 KiB | May 24 2012 |
Netgear Inc. 350 East Plumeria Drive San Jose, CA 95134 FCC ID: PY310400149 Date: 2012-05-16 Federal Communications Commission Authorization and Evaluation Division Confidentiality Request Pursuant to Sections 0.457 and 0.459 of the Commissions Rules, the Applicant hereby requests confidential treatment of information accompanying this Application as outlined below:
Schematics Block diagram The above materials contain trade secrets and proprietary information not customarily released to the public. The public disclosure of these matters might be harmful to the Applicant and provide unjustified benefits to its competitors. The Applicant understands that pursuant to Rule 0.457, disclosure of this Application and all accompanying documentation will not be made before the date of the Grant for this application. Sincerely,
-------------------------------------------------
Mark Gandler/ project manager Netgear Inc. TEL.: 408-907-8000 FAX: 408-907-8097 E-mail: mark.gandler@netgear.com
1 2 | Coverletter-Description of Change | Cover Letter(s) | 17.13 KiB | May 24 2012 |
FCC ID: PY310400149 Description of Permissive Change This report is prepared for FCC class II permissive change. The differences compared with original report are changing the following items and adding two adapters. RF and function are identical. Therefore, we re-tested conducted emission and radiated emission below 1GHz tests and presented in the test report.
The bypass capacitor of the main chip RTL8196C was changed from bottom side to top side.
Two inductors of power portion were changed from SMD to DIP type.
The source of transformer was changed.
The source of two DIP type electrolyte capacitors was changed.
Brand name, product name, model name and outer case. Reference no.: RF991214C28A
1 2 | Power of Attorney Letter | Cover Letter(s) | 25.86 KiB | May 24 2012 |
Netgear Inc. 350 East Plumeria Drive San Jose, CA 95134 A U T H O R I Z A T I O N L E T T E R FCC ID: PY310400149 Date:2012/5/3 To whom it may concern:
We, the undersigned UNetgear Inc.U hereby authorize Bureau Veritas Consumer Products Services
(H.K.) Ltd., Taoyuan Branch (BV CPS Taoyuan) of Taiwan to act on our behalf in all matters relating to all processes required in FCC Part15C and any communication needed with the national authority. Any and all acts carried out by BV CPS Taoyuan on our behalf shall have the same effects as acts of our own. If you have any questions regarding the authorization, please dont hesitate to contact us. Thank you!
Sincerely yours,
-------------------------------------------------
Mark Gandler / Regulatory Compliance Manager UNetgear Inc.U TEL.: 408-907-8000 FAX: 408-907-8097 E-mail: mark.Gandler@netgear.com
1 2 | TSup | Test Setup Photos | 398.34 KiB | May 24 2012 |
PHOTOGRAPHS OF THE TEST CONFIGURATION CONDUCTED EMISSION TEST Test Mode A 1 Test Mode B 2 RADIATED EMISSION TEST Test Mode A 3 Test Mode B 4
1 2 | Test Rpt | Test Report | 284.86 KiB | May 24 2012 |
FCC TEST REPORT REPORT NO.: RF991214C28A MODEL NO.: N300R FCC ID: PY310400149 RECEIVED: Mar. 29, 2012 TESTED: Apr. 11 ~ Apr. 25, 2012 ISSUED: Apr. 26, 2012 APPLICANT: NETGEAR, INC. ADDRESS: 350 East Plumeria Drive San Jose, CA 95134 ISSUED BY: Bureau Veritas Consumer Products Services (H.K.) Ltd., Taoyuan Branch LAB ADDRESS: No. 47, 14th Ling, Chia Pau Vil., Lin Kou Dist., New Taipei City, Taiwan ( R.O.C. ) TEST LOCATION: No. 19, Hwa Ya 2nd Rd, Wen Hwa Tsuen, Kwei Shan Hsiang, Taoyuan Hsien 333, Taiwan, R.O.C. This test report consists of 28 pages in total. It may be duplicated completely for legal use with the approval of the applicant. It should not be reproduced except in full, without the written approval of our laboratory. The client should not use it to claim product, certification, approval or endorsement by TAF or any government agency. The test results in the report only apply to the tested sample. 1 Report Format Version 4.2.0 Report No.: RF991214C28A Reference No.: 120417C09 TABLE OF CONTENTS RELEASE CONTROL RECORD .............................................................................................................. 3 1. CERTIFICATION ........................................................................................................................... 4 2. SUMMARY OF TEST RESULTS .................................................................................................. 5 2.1 MEASUREMENT UNCERTAINTY ................................................................................................ 5 3. GENERAL INFORMATION ........................................................................................................... 6 3.1 GENERAL DESCRIPTION OF EUT ............................................................................................. 6 3.2 DESCRIPTION OF TEST MODES ............................................................................................... 8 3.2.1 TEST MODE APPLICABILITY AND TESTED CHANNEL DETAIL ............................................... 9 3.3 DESCRIPTION OF SUPPORT UNITS ....................................................................................... 10 3.3.1 CONFIGURATION OF SYSTEM UNDER TEST ........................................................................ 11 3.4 GENERAL DESCRIPTION OF APPLIED STANDARDS ............................................................ 12 TEST TYPES AND RESULTS .................................................................................................... 13 4. 4.1 RADIATED EMISSION AND BANDEDGE MEASUREMENT .................................................... 13 4.1.1 LIMITS OF RADIATED EMISSION AND BANDEDGE MEASUREMENT .................................. 13 4.1.2 TEST INSTRUMENTS ................................................................................................................ 14 4.1.3 TEST PROCEDURES ................................................................................................................ 15 4.1.4 DEVIATION FROM TEST STANDARD ...................................................................................... 15 4.1.5 TEST SETUP .............................................................................................................................. 16 4.1.6 EUT OPERATING CONDITIONS ............................................................................................... 16 4.1.7 TEST RESULTS ......................................................................................................................... 17 4.2 CONDUCTED EMISSION MEASUREMENT ............................................................................. 19 4.2.1 LIMITS OF CONDUCTED EMISSION MEASUREMENT .......................................................... 19 4.2.2 TEST INSTRUMENTS ................................................................................................................ 19 4.2.3 TEST PROCEDURES ................................................................................................................ 20 4.2.4 DEVIATION FROM TEST STANDARD ...................................................................................... 20 4.2.5 TEST SETUP .............................................................................................................................. 21 4.2.6 EUT OPERATING CONDITIONS ............................................................................................... 21 4.2.7 TEST RESULTS ......................................................................................................................... 22 PHOTOGRAPHS OF THE TEST CONFIGURATION................................................................. 26 5. 6. INFORMATION ON THE TESTING LABORATORIES ............................................................... 27 APPENDIX A - MODIFICATIONS RECORDERS FOR ENGINEERING CHANGES TO THE 7. EUT BY THE LAB ....................................................................................................................... 28 Report No.: RF991214C28A Reference No.: 120417C09 2 Report Format Version 4.2.0 RELEASE CONTROL RECORD ISSUE NO. RF991214C28A Original release REASON FOR CHANGE DATE ISSUED Apr. 26, 2012 Report No.: RF991214C28A Reference No.: 120417C09 3 Report Format Version 4.2.0 1. CERTIFICATION PRODUCT: N300 WiFi Router MODEL: N300R BRAND: On Networks APPLICANT: NETGEAR, INC. TESTED: Apr. 11 ~ Apr. 25, 2012 TEST SAMPLE: ENGINEERING SAMPLE STANDARDS: FCC Part 15, Subpart C (Section 15.247) ANSI C63.10-2009 This report is issued as a supplementary report of RF991214C28. This report shall be used combined together with its original report. PREPARED BY APPROVED BY
:
:
, DATE :
Apr. 26, 2012 Polly Chien / Specialist
, DATE :
Apr. 26, 2012 Gary Chang / Technical Manager NOTE: The conducted emission & radiated emission below 1GHz tests were performed for the addendum. Refer to original report for the other test data. Report No.: RF991214C28A Reference No.: 120417C09 4 Report Format Version 4.2.0 2. SUMMARY OF TEST RESULTS The EUT has been tested according to the following specifications:
APPLIED STANDARD: FCC PART 15, SUBPART C (SECTION 15.247) STANDARD SECTION TEST TYPE AND LIMIT RESULT REMARK 15.207 AC Power Conducted Emission PASS Band Edge Measurement Radiated Emissions 15.247(d) 15.209 15.247(d) 15.247(a)(2) 6dB bandwidth 15.247(b) 15.247(e) 15.203 Conducted power Power Spectral Density Antenna Requirement PASS NA NA NA NA NA Meet the requirement of limit. Minimum passing margin is
-9.39dB at 0.27109MHz. Meet the requirement of limit. Minimum passing margin is
-3.0dB at 830.95MHz. Refer to Note Refer to Note Refer to Note Refer to Note Refer to Note NOTE: The conducted emission & radiated emission below 1GHz tests were performed for the addendum. Refer to original report for the other test data. 2.1 MEASUREMENT UNCERTAINTY Where relevant, the following measurement uncertainty levels have been estimated for tests performed on the EUT as specified in CISPR 16-4-2:
MEASUREMENT Conducted emissions Radiated emissions FREQUENCY 9kHz~30MHz 30MHz ~ 200MHz 200MHz ~1000MHz 1GHz ~ 18GHz 18GHz ~ 40GHz UNCERTAINTY 2.44 dB 3.19 dB 3.21 dB 2.26 dB 1.94 dB This uncertainty represents an expanded uncertainty expressed at approximately the 95% confidence level using a coverage factor of k = 2. Report No.: RF991214C28A Reference No.: 120417C09 5 Report Format Version 4.2.0 3. GENERAL INFORMATION 3.1 GENERAL DESCRIPTION OF EUT EUT MODEL NO. FCC ID POWER SUPPLY MODULATION TYPE N300 WiFi Router N300R PY310400149 12Vdc (adapter) CCK, DQPSK, DBPSK for DSSS 64QAM, 16QAM, QPSK, BPSK for OFDM MODULATION TECHNOLOGY DSSS, OFDM TRANSFER RATE OPERATING FREQUENCY NUMBER OF CHANNEL 802.11b:11.0/ 5.5/ 2.0/ 1.0Mbps 802.11g: 54.0/ 48.0/ 36.0/ 24.0/ 18.0/ 12.0/ 9.0/ 6.0Mbps 802.11n: up to 300.0Mbps 2412 ~ 2462MHz 11 for 802.11b, 802.11g, 802.11n (20MHz) 7 for 802.11n (40MHz) 292.9mW Printed antenna with 2.77dBi gain NA NA RJ45 Adapter OUTPUT POWER ANTENNA TYPE ANTENNA CONNECTOR DATA CABLE I/O PORTS ACCESSORY DEVICES NOTE:
1. This report is prepared for FCC class II permissive change. This report is issued as a supplementary report of BV ADT report no.: RF991214C28. The differences compared with original report are changing the following items and adding two adapters. RF and function are identical. Therefore, we re-tested conducted emission and radiated emission below 1GHz tests and presented in the test report.
The bypass capacitor of the main chip RTL8196C was changed from bottom side to top side.
Two inductors of power portion were changed from SMD to DIP type.
The source of transformer was changed.
The source of two DIP type electrolyte capacitors was changed.
Brand name, product name, model name and outer case. Report No.: RF991214C28A Reference No.: 120417C09 6 Report Format Version 4.2.0 2. The EUT incorporates a MIMO function. Physically, the EUT provides two completed transmitters and two receivers. MODULATION MODE 802.11b 802.11g 802.11n (20MHz) 802.11n (40MHz) ADAPTER 1 BRAND: LEI TX FUNCTION 1TX 1TX 2TX 2TX 3. The EUT were powered by the following adapters:
MODEL: MT12-Y120100-A1 P/N: 332-10472-01 INPUT: 100-120Vac, 60Hz, 0.3A OUTPUT: 12Vdc, 1A POWER LINE: 1.8m non-shielded cable without core ADAPTER 2 BRAND: PI MODEL: T012LF1209 16100-8LF P/N: 332-10469-01 INPUT: 100-120Vac, 50/60Hz, 0.5A OUTPUT: 12Vdc, 1A POWER LINE: 1.8m non-shielded cable without core 4. The above EUT information is declared by the manufacturer and for more detailed features description, please refer to the manufacturer's specifications or User's Manual. Report No.: RF991214C28A Reference No.: 120417C09 7 Report Format Version 4.2.0 3.2 DESCRIPTION OF TEST MODES 11 channels are provided for 802.11b, 802.11g and 802.11n (20MHz):
CHANNEL FREQUENCY CHANNEL FREQUENCY 1 2 3 4 5 6 2412MHz 2417MHz 2422MHz 2427MHz 2432MHz 2437MHz 7 8 9 10 11 2442MHz 2447MHz 2452MHz 2457MHz 2462MHz 7 channels are provided for 802.11n (40MHz):
CHANNEL FREQUENCY CHANNEL FREQUENCY 1 2 3 4 2422MHz 2427MHz 2432MHz 2437MHz 5 6 7 2442MHz 2447MHz 2452MHz Report No.: RF991214C28A Reference No.: 120417C09 8 Report Format Version 4.2.0 3.2.1 TEST MODE APPLICABILITY AND TESTED CHANNEL DETAIL EUT CONFIGURE MODE A B Where APPLICABLE TO RE<1G PLC DESCRIPTION Power from Adapter 1 Power from Adapter 2 PLC: Power Line Conducted Emission RE<1G: Radiated Emission below 1GHz RADIATED EMISSION TEST (BELOW 1GHz):
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A, B MODE AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY MODULATION TYPE DATA RATE
(Mbps) 802.11n (20MHz) 1 to 11 6 OFDM BPSK 7.2 POWER LINE CONDUCTED EMISSION TEST:
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A, B MODE AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY MODULATION TYPE DATA RATE
(Mbps) 802.11n (20MHz) 1 to 11 6 OFDM BPSK 7.2 TEST CONDITION:
APPLICABLE TO RE<1G PLC ENVIRONMENTAL CONDITIONS 25deg. C, 65%RH 25deg. C, 65%RH INPUT POWER TESTED BY 120Vac, 60Hz 120Vac, 60Hz Alan Wu Anderson Hong Report No.: RF991214C28A Reference No.: 120417C09 9 Report Format Version 4.2.0 3.3 DESCRIPTION OF SUPPORT UNITS The EUT has been tested as an independent unit together with other necessary accessories or support units. The following support units or accessories were used to form a representative test configuration during the tests. NO. 1 2 PRODUCT NOTEBOOK NOTEBOOK BRAND DELL DELL MODEL NO. PP18L D820 FCC ID SERIAL NO. 33497605792 CXSMM01BRD02D330 21498926752 NA SIGNAL CABLE DESCRIPTION OF THE ABOVE SUPPORT UNITS NO. 1 10m RJ45 UTP cable 2 10m RJ45 UTP cable NOTE:
1. All power cords of the above support units are non shielded (1.8m). 2. Items 1, 2 acted as communication partners to transfer data. Report No.: RF991214C28A Reference No.: 120417C09 10 Report Format Version 4.2.0 1.5m RJ45 UTP cable x 3 with 100 load 10m RJ45 UTP cable EUT
*Test table
(Power from adapter) 3.3.1 CONFIGURATION OF SYSTEM UNDER TEST 10m RJ45 UTP cable
*Kept in a remote area Notebook Notebook Report No.: RF991214C28A Reference No.: 120417C09 11 Report Format Version 4.2.0 3.4 GENERAL DESCRIPTION OF APPLIED STANDARDS The EUT is a RF Product. According to the specifications of the manufacturer, it must comply with the requirements of the following standards:
FCC Part 15, Subpart C (15.247) ANSI C63.10-2009 All test items have been performed and recorded as per the above standards. NOTE: The EUT is also considered as a kind of computer peripheral, because the connection to computer is necessary for typical use. It has been verified to comply with the requirements of FCC Part 15, Subpart B, Class B (DoC). The test report has been issued separately. Report No.: RF991214C28A Reference No.: 120417C09 12 Report Format Version 4.2.0 4. TEST TYPES AND RESULTS 4.1 RADIATED EMISSION AND BANDEDGE MEASUREMENT 4.1.1 LIMITS OF RADIATED EMISSION AND BANDEDGE MEASUREMENT Radiated emissions which fall in the restricted bands must comply with the radiated emission limits specified as below table. Other emissions shall be at least 20dB below the highest level of the desired power:
FREQUENCIES (MHz) FIELD STRENGTH
(microvolts/meter) MEASUREMENT DISTANCE
(meters) 0.009 ~ 0.490 0.490 ~ 1.705 1.705 ~ 30.0 30 ~ 88 88 ~ 216 216 ~ 960 Above 960 2400/F(kHz) 24000/F(kHz) 30 100 150 200 500 300 30 30 3 3 3 3 NOTE:
1. The lower limit shall apply at the transition frequencies. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m). 3. For frequencies above 1000MHz, the field strength limits are based on average detector, however, the peak field strength of any emission shall not exceed the maximum permitted average limits, specified above by more than 20dB under any condition of modulation. Report No.: RF991214C28A Reference No.: 120417C09 13 Report Format Version 4.2.0 4.1.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION Apr. 06, 2012 Apr. 05, 2013 Oct. 29, 2011 Oct. 28, 2012 Jan. 02, 2013 Jan. 29, 2013 Jan. 04, 2013 Jul. 19, 2012 148 ESI7 8449B 8447D FSP40 100269 9168-155 VULB9168 9120D-408 BBHA 9170 838496/016 Jul. 20, 2011 3008A01961 BBHA 9120D Jan. 05, 2012 Jan. 30, 2012 Jan. 03, 2012 Test Receiver ROHDE & SCHWARZ Spectrum Analyzer ROHDE & SCHWARZ BILOG Antenna SCHWARZBECK HORN Antenna SCHWARZBECK HORN Antenna SCHWARZBECK Preamplifier Agilent Preamplifier Agilent RF signal cable HUBER+SUHNNER RF signal cable HUBER+SUHNNER RF signal cable HUBER+SUHNNER Software ADT. Antenna Tower inn-co GmbH Antenna Tower Controller inn-co GmbH Turn Table ADT. Turn Table Controller ADT. NOTE: 1. The calibration interval of the above test instruments is 12 months and the calibrations SUCOFLEX 104 ADT_Radiated_ V7.6.15.9.2 MA 4000 SUCOFLEX 104 SUCOFLEX 104 SC93021704 TT93021704 2944A10738 309220/4 250724/4 295012/4 CO2000 SC100. 019303 010303 TT100. NA NA NA NA NA NA NA NA NA NA NA Oct. 29, 2011 Oct. 28, 2012 Nov. 03, 2011 Nov. 02, 2012 Nov. 03, 2011 Nov. 02, 2012 Nov. 03, 2011 Nov. 02, 2012 are traceable to NML/ROC and NIST/USA. 2. The test was performed in HwaYa Chamber 4. 3. The horn antenna and HP preamplifier (model: 8449B) are used only for the measurement of emission frequency above 1GHz if tested. 4. The FCC Site Registration No. is 460141. 5. The IC Site Registration No. is IC7450F-4. Report No.: RF991214C28A Reference No.: 120417C09 14 Report Format Version 4.2.0 4.1.3 TEST PROCEDURES a. The EUT was placed on the top of a rotating table 0.8 meters above the ground at a 3 meters semi-anechoic chamber. The table was rotated 360 degrees to determine the position of the highest radiation. b. The EUT was set 3 meters away from the interference-receiving antenna, which was mounted on the top of a variable-height antenna tower. c. The antenna is a broadband antenna, and its height is varied from one meter to four meters above the ground to determine the maximum value of the field strength. Both horizontal and vertical polarizations of the antenna are set to make the measurement. d. For each suspected emission, the EUT was arranged to its worst case and then the antenna was tuned to heights from 1 meter to 4 meters and the rotatable table was turned from 0 degrees to 360 degrees to find the maximum reading. e. The test-receiver system was set to Peak Detect Function and Specified Bandwidth with Maximum Hold Mode. f. If the emission level of the EUT in peak mode was lower than the limit specified, then testing could be stopped and the peak values of the EUT would be reported. Otherwise the emissions would be re-tested one by one using peak, quasi-peak or average method as specified and then reported in a data sheet. NOTE:
1. The resolution bandwidth and video bandwidth of test receiver/spectrum analyzer is 120kHz for Quasi-peak detection at frequency below 1GHz. 2. The resolution bandwidth of test receiver/spectrum analyzer is 100kHz and video bandwidth is 300kHz for Peak detection at frequency above 1GHz. 3. The resolution bandwidth of test receiver/spectrum analyzer is 1MHz and the video bandwidth is 1kHz for Average detection (AV) at frequency above 1GHz. 4. All modes of operation were investigated and the worst-case emissions are reported. 4.1.4 DEVIATION FROM TEST STANDARD No deviation. Report No.: RF991214C28A Reference No.: 120417C09 15 Report Format Version 4.2.0 4.1.5 TEST SETUP For the actual test configuration, please refer to the attached file (Test Setup Photo). 4.1.6 EUT OPERATING CONDITIONS a. Placed the EUT on the testing table. b. Prepared notebook systems outside of testing area to act as communication partners. c. The communication partners connected with EUT via a RJ45 cable and run a test program (provided by manufacturer) to enable EUT under transmission condition continuously at specific channel frequency. d. The communication partner sent data to EUT by command "PING". Report No.: RF991214C28A Reference No.: 120417C09 16 Report Format Version 4.2.0 4.1.7 TEST RESULTS BELOW 1GHz WORST-CASE DATA802.11n (20MHz) EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz MEASUREMENT DETAIL FREQUENCY RANGE Below 1000MHz DETECTOR FUNCTION Quasi-Peak ENVIRONMENTAL CONDITIONS TEST MODE 25deg. C, 65%RH TESTED BY Alan Wu A ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 156.28 263.21 304.04 360.43 500.42 751.23 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 32.8 QP 18.40 40.0 QP 25.80 39.9 QP 24.10 34.9 QP 17.60 37.6 QP 16.50 36.1 QP 10.30 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.75 H 1.50 H 1.00 H 1.25 H 2.00 H 1.25 H
-10.7
-6.0
-6.1
-11.1
-8.4
-9.9 43.5 46.0 46.0 46.0 46.0 46.0 105 81 150 2 204 191 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 53.23 267.10 304.04 424.59 500.42 751.23 REMARKS:
LEVEL
(dBuV/m) 32.8 QP 35.1 QP 36.1 QP 35.2 QP 36.9 QP 37.7 QP LIMIT
(dBuV/m) 40.0 46.0 46.0 46.0 46.0 46.0
-7.2
-10.9
-9.9
-10.8
-9.1
-8.3 1.00 V 1.00 V 1.75 V 1.25 V 1.25 V 1.00 V 24 177 125 267 98 224
(dBuV) 18.80 20.80 20.30 16.10 15.80 11.90 CORRECTION FACTOR
(dB/m) 14.40 14.20 15.80 17.30 21.10 25.80 CORRECTION FACTOR
(dB/m) 14.00 14.30 15.80 19.10 21.10 25.80 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. Report No.: RF991214C28A Reference No.: 120417C09 17 Report Format Version 4.2.0 EUT TEST CONDITION CHANNEL INPUT POWER
(SYSTEM) ENVIRONMENTAL CONDITIONS TEST MODE Channel 6 120Vac, 60 Hz MEASUREMENT DETAIL FREQUENCY RANGE Below 1000MHz DETECTOR FUNCTION Quasi-Peak 25deg. C, 65%RH TESTED BY Alan Wu B ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 125.17 140.72 156.28 304.04 751.23 830.95 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 35.2 QP 22.60 36.2 QP 22.20 37.6 QP 23.20 41.8 QP 26.00 38.5 QP 12.70 43.0 QP 15.50 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.75 H 2.00 H 1.00 H 1.00 H 1.00 H 1.00 H 43.5 43.5 43.5 46.0 46.0 46.0
-8.3
-7.3
-5.9
-4.2
-7.5
-3.0 120 100 269 150 218 320 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 53.23 76.56 101.84 304.04 500.42 751.23 REMARKS:
LEVEL
(dBuV/m) 36.5 QP 36.6 QP 36.0 QP 35.3 QP 35.4 QP 40.6 QP LIMIT
(dBuV/m) 40.0 40.0 43.5 46.0 46.0 46.0
-3.5
-3.4
-7.5
-10.7
-10.6
-5.4 1.00 V 1.00 V 1.00 V 1.50 V 1.75 V 1.00 V 344 169 300 181 196 242
(dBuV) 22.50 25.70 26.10 19.50 14.30 14.80 CORRECTION FACTOR
(dB/m) 12.60 14.00 14.40 15.80 25.80 27.50 CORRECTION FACTOR
(dB/m) 14.00 10.90 9.90 15.80 21.10 25.80 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. Report No.: RF991214C28A Reference No.: 120417C09 18 Report Format Version 4.2.0 4.2 CONDUCTED EMISSION MEASUREMENT 4.2.1 LIMITS OF CONDUCTED EMISSION MEASUREMENT FREQUENCY OF EMISSION (MHz) 0.15 ~ 0.5 0.5 ~ 5 5 ~ 30 CONDUCTED LIMIT (dBV) Average 56 to 46 66 to 56 Quasi-peak 56 60 46 50 NOTE: 1. The lower limit shall apply at the transition frequencies. 2. The limit decreases in line with the logarithm of the frequency in the range of 0.15 to 0.50MHz. 3. All emanations from a class A/B digital device or system, including any network of conductors and apparatus connected thereto, shall not exceed the level of field strengths specified above. 4.2.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION Nov. 18, 2012 5D-FB 100289 ESCS30 ESH2-Z5 Nov. 19, 2011 Dec. 22, 2011 Cable-HYCO2-01 Test Receiver ROHDE & SCHWARZ RF signal cable Woken LISN ROHDE & SCHWARZ LISN ROHDE & SCHWARZ V-LISN SCHWARZBECK LISN ROHDE & SCHWARZ Software ADT NOTE: 1. The calibration interval of the above test instruments is 12 months and the calibrations ENV216 ADT_Cond_ Dec. 30, 2011 Jun. 30, 2011 Jun. 10, 2011 NNBL 8226-2 Jul. 07, 2011 8226-142 ESH3-Z5 100100 100072 100312 V7.3.7 NA NA NA Dec. 21, 2012 Dec. 29, 2012 Jul. 06, 2012 Jun. 09, 2012 Jun. 29, 2012 are traceable to NML/ROC and NIST/USA. 2. The test was performed in HwaYa Shielded Room 2. 3. The VCCI Site Registration No. is C-2047. Report No.: RF991214C28A Reference No.: 120417C09 19 Report Format Version 4.2.0 4.2.3 TEST PROCEDURES a. The EUT was placed 0.4 meters from the conducting wall of the shielded room with EUT being connected to the power mains through a line impedance stabilization network (LISN). Other support units were connected to the power mains through another LISN. The two LISNs provide 50 ohm/ 50uH of coupling impedance for the measuring instrument. b. Both lines of the power mains connected to the EUT were checked for maximum conducted interference. c. The frequency range from 150kHz to 30MHz was searched. Emission levels under (Limit - 20dB) was not recorded. NOTE: All modes of operation were investigated and the worst-case emissions are reported. 4.2.4 DEVIATION FROM TEST STANDARD No deviation. Report No.: RF991214C28A Reference No.: 120417C09 20 Report Format Version 4.2.0 4.2.5 TEST SETUP Ve rtic a l G ro u n d R e fe re n c e P la n e Te s t R e c e iv e r 4 0 c m E U T L IS N 8 0 c m H o riz o n ta l G ro u n d R e fe re n c e P la n e N o te : 1 .S u p p o rt u n its w e re c o n n e c te d to s e c o n d L IS N . 2 .B o th o f L IS N s (A M N ) a re 8 0 c m fro m E U T a n d a t le a s t 8 0 fro m o th e r u n its a n d o th e r m e ta l p la n e s For the actual test configuration, please refer to the attached file (Test Setup Photo). 4.2.6 EUT OPERATING CONDITIONS Same as 4.1.6. Report No.: RF991214C28A Reference No.: 120417C09 21 Report Format Version 4.2.0 4.2.7 TEST RESULTS CONDUCTED WORST-CASE DATA802.11n (20MHz) PHASE TEST MODE Line 1 A 6dB BANDWIDTH 9kHz Freq. No
[MHz]
0.19687 0.27109 0.63438 0.97422 16.51172 22.70703 1 2 3 4 5 6 Corr. Reading Value Factor
(dB) 0.15 0.16 0.18 0.19 0.56 0.60
[dB (uV)]
Q.P. AV. 51.49 37.77 51.06 41.54 39.49 29.01 39.20 27.26 40.83 36.04 38.69 36.90 Emission Level
[dB (uV)]
AV. 37.92 41.70 29.19 27.45 36.60 37.50 Q.P. 51.64 51.22 39.67 39.39 41.39 39.29 Limit
[dB (uV)]
AV. 53.74 51.08 46.00 46.00 50.00 50.00 Q.P. 63.74 61.08 56.00 56.00 60.00 60.00 Margin
(dB) Q.P.
-12.10
-9.87
-16.33
-16.61
-18.61
-20.71 AV.
-15.82
-9.39
-16.81
-18.55
-13.40
-12.50 REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. The emission levels of other frequencies were very low against the limit. 3. Margin value = Emission level - Limit value 4. Correction factor = Insertion loss + Cable loss 5. Emission Level = Correction Factor + Reading Value. 22 Report Format Version 4.2.0 Report No.: RF991214C28A Reference No.: 120417C09 PHASE TEST MODE Line 2 A Freq. No
[MHz]
0.19297 0.27109 0.68125 4.38672 16.51172 22.70703 1 2 3 4 5 6 Corr. Reading Value Factor
(dB) 0.14 0.15 0.17 0.36 0.64 0.67
[dB (uV)]
Q.P. AV. 52.30 36.39 51.31 39.04 40.87 30.30 36.39 26.92 40.61 35.78 38.69 36.56 6dB BANDWIDTH 9kHz Emission Level
[dB (uV)]
AV. 36.53 39.19 30.47 27.28 36.42 37.23 Q.P. 52.44 51.46 41.04 36.75 41.25 39.36 Limit
[dB (uV)]
AV. 53.91 51.08 46.00 46.00 50.00 50.00 Q.P. 63.91 61.08 56.00 56.00 60.00 60.00 Margin
(dB) Q.P.
-11.47
-9.63
-14.96
-19.25
-18.75
-20.64 AV.
-17.38
-11.90
-15.53
-18.72
-13.58
-12.77 REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. The emission levels of other frequencies were very low against the limit. 3. Margin value = Emission level - Limit value 4. Correction factor = Insertion loss + Cable loss 5. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28A Reference No.: 120417C09 23 Report Format Version 4.2.0 PHASE TEST MODE Line 1 B 6dB BANDWIDTH 9kHz Freq. No
[MHz]
0.16172 0.19297 2.32422 4.12891 16.52344 22.72266 1 2 3 4 5 6 Corr. Reading Value Factor
(dB) 0.15 0.15 0.27 0.34 0.56 0.60
[dB (uV)]
Q.P. AV. 33.50 17.26 31.46 14.96 35.00 25.73 35.48 32.58 41.71 38.16 40.10 34.00 Emission Level
[dB (uV)]
AV. 17.41 15.11 26.00 32.92 38.72 34.60 Q.P. 33.65 31.61 35.27 35.82 42.27 40.70 Limit
[dB (uV)]
AV. 55.38 53.91 46.00 46.00 50.00 50.00 Q.P. 65.38 63.91 56.00 56.00 60.00 60.00 Margin
(dB) Q.P.
-31.73
-32.30
-20.73
-20.18
-17.73
-19.30 AV.
-37.97
-38.80
-20.00
-13.08
-11.28
-15.40 REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. The emission levels of other frequencies were very low against the limit. 3. Margin value = Emission level - Limit value 4. Correction factor = Insertion loss + Cable loss 5. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28A Reference No.: 120417C09 24 Report Format Version 4.2.0 PHASE TEST MODE Line 2 B Freq. No
[MHz]
0.15000 0.19297 2.14453 4.12891 16.51953 22.71484 1 2 3 4 5 6 Corr. Reading Value Factor
(dB) 0.13 0.14 0.27 0.35 0.64 0.67
[dB (uV)]
Q.P. AV. 33.07 15.65 31.22 13.20 26.84 12.01 31.84 26.15 38.08 33.18 38.87 34.82 6dB BANDWIDTH 9kHz Emission Level
[dB (uV)]
AV. 15.78 13.34 12.28 26.50 33.82 35.49 Q.P. 33.20 31.36 27.11 32.19 38.72 39.54 Limit
[dB (uV)]
AV. 56.00 53.91 46.00 46.00 50.00 50.00 Q.P. 66.00 63.91 56.00 56.00 60.00 60.00 Margin
(dB) Q.P.
-32.80
-32.55
-28.89
-23.81
-21.28
-20.46 AV.
-40.22
-40.57
-33.72
-19.50
-16.18
-14.51 REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. The emission levels of other frequencies were very low against the limit. 3. Margin value = Emission level - Limit value 4. Correction factor = Insertion loss + Cable loss 5. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28A Reference No.: 120417C09 25 Report Format Version 4.2.0 5. PHOTOGRAPHS OF THE TEST CONFIGURATION Please refer to the attached file (Test Setup Photo). Report No.: RF991214C28A Reference No.: 120417C09 26 Report Format Version 4.2.0 6. INFORMATION ON THE TESTING LABORATORIES We, Bureau Veritas Consumer Products Services (H.K.) Ltd., Taoyuan Branch, were founded in 1988 to provide our best service in EMC, Radio, Telecom and Safety consultation. Our laboratories are accredited and approved according to ISO/IEC 17025. Copies of accreditation and authorization certificates of our laboratories obtained from approval agencies can be downloaded from our web site: www.adt.com.tw/index.5.phtml. If you have any comments, please feel free to contact us at the following:
Linko EMC/RF Lab Tel: 886-2-26052180 Fax: 886-2-26051924 Hwa Ya EMC/RF/Safety/Telecom Lab Tel: 886-3-3183232 Fax: 886-3-3270892 Email: service.adt@tw.bureauveritas.com Web Site: www.adt.com.tw The address and road map of all our labs can be found in our web site also. Hsin Chu EMC/RF Lab Tel: 886-3-5935343 Fax: 886-3-5935342 Report No.: RF991214C28A Reference No.: 120417C09 27 Report Format Version 4.2.0 7. APPENDIX A - MODIFICATIONS RECORDERS FOR ENGINEERING CHANGES TO THE EUT BY THE LAB No modifications were made to the EUT by the lab during the test.
---END---
Report No.: RF991214C28A Reference No.: 120417C09 28 Report Format Version 4.2.0
1 2 | Attestation Statement Ad Hoc Declaration | Attestation Statements | 29.89 KiB | August 03 2011 |
Netgear Inc. 350 East Plumeria Drive San Jose, CA 95134 Date: 2011-01-19 General Declaration General Declaration General Declaration General Declaration FCC ID: PY310400149 We, Netgear Inc. declares that the device does not have Ad Hoc on non-US frequencies and/or on DFS frequencies. If you have any questions regarding the declaration, please dont hesitate to contact us. Thank you!
Sincerely yours,
-------------------------------------------------
Mark Gandler / project manager Netgear Inc. TEL.: 408-907-8000 FAX: 408-907-8097 E-mail: mark.Gandlerl@netgear.com
1 2 | Confidentiality Request | Cover Letter(s) | 37.59 KiB | August 03 2011 |
Netgear Inc. 350 East Plumeria Drive San Jose, CA 95134 FCC ID: PY310400149 Date: 2011-01-19 Federal Communications Commission Authorization and Evaluation Division Confidentiality Request Pursuant to Sections 0.457 and 0.459 of the Commissions Rules, the Applicant hereby requests confidential treatment of information accompanying this Application as outlined below:
Schematics Block diagram The above materials contain trade secrets and proprietary information not customarily released to the public. The public disclosure of these matters might be harmful to the Applicant and provide unjustified benefits to its competitors. The Applicant understands that pursuant to Rule 0.457, disclosure of this Application and all accompanying documentation will not be made before the date of the Grant for this application. Sincerely,
-------------------------------------------------
Mark Gandler/ project manager Netgear Inc. TEL.: 408-907-8000 FAX: 408-907-8097 E-mail: mark.gandler@netgear.com
1 2 | Cover Letter Agent Authorization | Cover Letter(s) | 25.57 KiB | August 03 2011 |
Netgear Inc. 350 East Plumeria Drive San Jose, CA 95134 A U T H O R I Z A T I O N L E T T E R FCC ID: PY310400149 Date:2011/2/15 To whom it may concern:
We, the undersigned UNetgear Inc.U hereby authorize Bureau Veritas Consumer Products Services
(H.K.) Ltd., Taoyuan Branch (BV CPS Taoyuan) of Taiwan to act on our behalf in all matters relating to all processes required in FCC Part15C and any communication needed with the national authority. Any and all acts carried out by BV CPS Taoyuan on our behalf shall have the same effects as acts of our own. If you have any questions regarding the authorization, please dont hesitate to contact us. Thank you!
Sincerely yours,
-------------------------------------------------
Mark Gandler / project manager UNetgear Inc.U TEL.: 408-907-8000 FAX: 408-907-8097 E-mail: mark.Gandler@netgear.com
1 2 | Operational Description | Operational Description | 13.69 KiB | August 03 2011 |
FCC ID: PY310400149 OPERATIONAL DESCRIPTION This device is a N300 WIRELESS ROUTER, which operates in the 2.4GHz frequency spectrum with throughput of up to 300Mbps which OFDM technique will be applied. If the signal to noise ratio is too poor which could not support 300Mbps, the 11Mbps data rate with DSSS technique will be applied. The transmitter of the EUT is powered by 7.5Vdc from the AC adapter. The antenna is used printed antenna without antenna connectors. For more detailed instruction, please take a look at the users manual. Report No.: RF991214C28
1 2 | RF Exposure Info | RF Exposure Info | 36.29 KiB | August 03 2011 |
RF EXPOSURE REPORT REPORT NO.: SA991214C28 MODEL NO.: JWNR2000v2 FCC ID: PY310400149 ACCORDING: FCC Guidelines for Human Exposure IEEE C95.1 APPLICANT: NETGEAR, INC. ADDRESS: 350 East Plumeria Drive San Jose, CA 95134 ISSUED BY: Bureau Veritas Consumer Products Services
(H.K.) Ltd., Taoyuan Branch LAB ADDRESS: No. 47, 14th Ling, Chia Pau Tsuen, Lin Kou Hsiang, Taipei Hsien 244, Taiwan, R.O.C. Report No.: SA991214C28 Report Format Version 4.0.0 1 RELEASE CONTROL RECORD ISSUE NO. Original release REASON FOR CHANGE NA DATE ISSUED Jan. 19, 2011 Report No.: SA991214C28 Report Format Version 4.0.0 2 1. RF EXPOSURE LIMIT LIMITS FOR MAXIMUM PERMISSIBLE EXPOSURE (MPE) FREQUENCY RANGE (MHz) ELECTRIC FIELD STRENGTH (V/m) MAGNETIC FIELD STRENGTH (A/m) POWER DENSITY
(mW/cm2) AVERAGE TIME
(minutes) LIMITS FOR GENERAL POPULATION / UNCONTROLLED EXPOSURE 300-1500 1500-100,000 F = Frequency in MHz F/1500 1.0 30 30 2. MPE CALCULATION FORMULA Pd = (Pout*G) / (4*pi*r2) where Pd = power density in mW/cm2 Pout = output power to antenna in mW G = gain of antenna in linear scale Pi = 3.1416 R = distance between observation point and center of the radiator in cm 3. CLASSIFICATION The antenna of this product, under normal use condition, is at least 20cm away from the body of the user. So, this device is classified as Mobile Device. 4. CALCULATION RESULT OF MAXIMUM CONDUCTED POWER MODULATION MODE FREQUENCY BAND
(MHz) MAX POWER
(dBm) ANTENNA GAIN
(dBi) DISTANCE
(cm) POWER DENSITY
(mW/cm2) LIMIT
(mW/cm2) 802.11b 2412-2462 19.4 802.11g 2412-2462 24.6 802.11n
(20MHz) 802.11n
(40MHz) 2412-2462 24.7 2422-2452 24.6 2.77 2.77 2.77 2.77 20 20 20 20 0.033 0.109 0.111 0.109 1 1 1 1 Report No.: SA991214C28 Report Format Version 4.0.0 3
1 2 | Test Report | Test Report | 665.23 KiB | August 03 2011 |
FCC TEST REPORT REPORT NO.: RF991214C28 MODEL NO.: JWNR2000v2 FCC ID: PY310400149 RECEIVED: Dec. 14, 2010 TESTED: Dec. 17, 2010 ~ Jan. 15, 2011 ISSUED: Jan. 19, 2011 APPLICANT: NETGEAR, INC. ADDRESS: 350 East Plumeria Drive San Jose, CA 95134 ISSUED BY: Bureau Veritas Consumer Products Services (H.K.) Ltd., Taoyuan Branch LAB ADDRESS: No. 47, 14th Ling, Chia Pau Tsuen, Lin Kou Hsiang, Taipei Hsien 244, Taiwan, R.O.C. TEST LOCATION: No. 19, Hwa Ya 2nd Rd, Wen Hwa Tsuen, Kwei Shan Hsiang, Taoyuan Hsien 333, Taiwan, R.O.C. This test report consists of 73 pages in total. It may be duplicated completely for legal use with the approval of the applicant. It should not be reproduced except in full, without the written approval of our laboratory. The client should not use it to claim product certification, approval or endorsement by TAF or any government agency. The test results in the report only apply to the tested sample. Report No.: RF991214C28 1 Report Format Version 4.0.0 TABLE OF CONTENTS RELEASE CONTROL RECORD...............................................................................................4 CERTIFICATION............................................................................................................5 1. 2. SUMMARY OF TEST RESULTS ...................................................................................6 2.1 MEASUREMENT UNCERTAINTY.................................................................................6 3. GENERAL INFORMATION............................................................................................7 3.1 GENERAL DESCRIPTION OF EUT ..............................................................................7 3.2 DESCRIPTION OF TEST MODES................................................................................8 3.2.1 CONFIGURATION OF SYSTEM UNDER TEST ...........................................................9 3.2.2 TEST MODE APPLICABILITY AND TESTED CHANNEL DETAIL ..............................10 3.3 GENERAL DESCRIPTION OF APPLIED STANDARDS .............................................12 DESCRIPTION OF SUPPORT UNITS ........................................................................12 3.4 TEST TYPES AND RESULTS .....................................................................................13 4. 4.1 RADIATED EMISSION MEASUREMENT ...................................................................13 4.1.1 LIMITS OF RADIATED EMISSION MEASUREMENT.................................................13 4.1.2 TEST INSTRUMENTS.................................................................................................14 4.1.3 TEST PROCEDURES .................................................................................................15 4.1.4 DEVIATION FROM TEST STANDARD........................................................................15 4.1.5 TEST SETUP...............................................................................................................16 4.1.6 EUT OPERATING CONDITIONS ................................................................................16 4.1.7 TEST RESULTS ..........................................................................................................17 4.2 CONDUCTED EMISSION MEASUREMENT ..............................................................31 4.2.1 LIMITS OF CONDUCTED EMISSION MEASUREMENT............................................31 4.2.2 TEST INSTRUMENTS.................................................................................................31 4.2.3 TEST PROCEDURES .................................................................................................32 4.2.4 DEVIATION FROM TEST STANDARD........................................................................32 4.2.5 TEST SETUP...............................................................................................................33 4.2.6 EUT OPERATING CONDITIONS ................................................................................33 4.2.7 TEST RESULTS ..........................................................................................................34 4.3 6dB BANDWIDTH MEASUREMENT...........................................................................38 4.3.1 LIMITS OF 6dB BANDWIDTH MEASUREMENT ........................................................38 4.3.2 TEST INSTRUMENTS.................................................................................................38 4.3.3 TEST PROCEDURE....................................................................................................38 4.3.4 DEVIATION FROM TEST STANDARD........................................................................38 4.3.5 TEST SETUP...............................................................................................................39 4.3.6 EUT OPERATING CONDITIONS ................................................................................39 4.3.7 TEST RESULTS ..........................................................................................................40 4.4 MAXIMUM OUTPUT POWER .....................................................................................44 4.4.1 LIMITS OF MAXIMUM OUTPUT POWER MEASUREMENT......................................44 4.4.2 INSTRUMENTS...........................................................................................................44 4.4.3 TEST PROCEDURES .................................................................................................44 4.4.4 DEVIATION FROM TEST STANDARD........................................................................45 Report No.: RF991214C28 2 Report Format Version 4.0.0 4.4.5 TEST SETUP...............................................................................................................45 4.4.6 EUT OPERATING CONDITIONS ................................................................................45 4.4.7 TEST RESULTS ..........................................................................................................46 4.5 POWER SPECTRAL DENSITY MEASUREMENT......................................................47 4.5.1 LIMITS OF POWER SPECTRAL DENSITY MEASUREMENT ...................................47 4.5.2 TEST INSTRUMENTS.................................................................................................47 4.5.3 TEST PROCEDURE....................................................................................................47 4.5.4 DEVIATION FROM TEST STANDARD........................................................................48 4.5.5 TEST SETUP...............................................................................................................48 4.5.6 EUT OPERATING CONDITION...................................................................................48 4.5.7 TEST RESULTS ..........................................................................................................49 4.6 BAND EDGES MEASUREMENT ................................................................................53 4.6.1 LIMITS OF BAND EDGES MEASUREMENT..............................................................53 4.6.2 TEST INSTRUMENTS.................................................................................................53 4.6.3 TEST PROCEDURE....................................................................................................54 4.6.4 DEVIATION FROM TEST STANDARD........................................................................54 4.6.5 EUT OPERATING CONDITION...................................................................................54 4.6.6 TEST RESULTS ..........................................................................................................55 5. PHOTOGRAPHS OF THE TEST CONFIGURATION..................................................71 INFORMATION ON THE TESTING LABORATORIES ................................................72 6. APPENDIX A - MODIFICATIONS RECORDERS FOR ENGINEERING CHANGES 7. TO THE EUT BY THE LAB..........................................................................................73 Report No.: RF991214C28 3 Report Format Version 4.0.0 RELEASE CONTROL RECORD ISSUE NO. Original release REASON FOR CHANGE NA DATE ISSUED Jan. 19, 2011 Report No.: RF991214C28 4 Report Format Version 4.0.0 1. CERTIFICATION PRODUCT: N300 WIRELESS ROUTER MODEL: JWNR2000v2 BRAND: NETGEAR APPLICANT: NETGEAR, INC. TESTED: Dec. 17, 2010 ~ Jan. 15, 2011 TEST SAMPLE: ENGINEERING SAMPLE STANDARDS: FCC Part 15, Subpart C (Section 15.247) ANSI C63.4-2003 ANSI C63.10-2009 The above equipment (Model: JWNR2000v2) has been tested by Bureau Veritas Consumer Products Services (H.K.) Ltd., Taoyuan Branch, and found compliance with the requirement of the above standards. The test record, data evaluation & Equipment Under Test (EUT) configurations represented herein are true and accurate accounts of the measurements of the samples EMC characteristics under the conditions specified in this report. PREPARED BY APPROVED BY
:
:
, DATE:
Jan. 19, 2011 Polly Chien / Specialist Gary Chang / Assistant Manager
, DATE:
Jan. 19, 2011 Report No.: RF991214C28 5 Report Format Version 4.0.0 2. SUMMARY OF TEST RESULTS The EUT has been tested according to the following specifications:
APPLIED STANDARD: FCC PART 15, SUBPART C (SECTION 15.247) STANDARD SECTION TEST TYPE AND LIMIT RESULT REMARK 15.207 AC Power Conducted Emission PASS Meet the requirement of limit. Minimum passing margin is
-22.37dB at 0.373MHz. 15.247(a)(2) 15.247(b) 15.247(d) 15.247(e) 15.247(d) 15.203 Spectrum Bandwidth of a Direct Sequence Spread Spectrum System Limit: min. 500kHz Maximum Output Power Limit: max. 30dBm Radiated Emissions Limit: Table 15.209 Power Spectral Density Limit: max. 8dBm Band Edge Measurement Limit: 20dB less than the peak value of fundamental frequency Antenna Requirement PASS Meet the requirement of limit. PASS Meet the requirement of limit. PASS Meet the requirement of limit. Minimum passing margin is
-1.0dB at 7311.00MHz. PASS Meet the requirement of limit. PASS Meet the requirement of limit. PASS No antenna connector is used. 2.1 MEASUREMENT UNCERTAINTY Where relevant, the following measurement uncertainty levels have been estimated for tests performed on the EUT as specified in CISPR 16-4-2:
MEASUREMENT Conducted emissions Radiated emissions FREQUENCY 150kHz~30MHz 30MHz ~ 200MHz 200MHz ~1000MHz 1GHz ~ 18GHz 18GHz ~ 40GHz UNCERTAINTY 2.44 dB 3.34 dB 3.35 dB 2.26 dB 1.94 dB This uncertainty represents an expanded uncertainty expressed at approximately the 95% confidence level using a coverage factor of k = 2. Report No.: RF991214C28 6 Report Format Version 4.0.0 3. GENERAL INFORMATION 3.1 GENERAL DESCRIPTION OF EUT EUT MODEL NO. FCC ID POWER SUPPLY MODULATION TYPE N300 WIRELESS ROUTER JWNR2000v2 PY310400149 7.5Vdc (adapter) CCK, DQPSK, DBPSK for DSSS 64QAM, 16QAM, QPSK, BPSK for OFDM MODULATION TECHNOLOGY DSSS, OFDM TRANSFER RATE OPERATING FREQUENCY NUMBER OF CHANNEL 802.11b:11.0/ 5.5/ 2.0/ 1.0Mbps 802.11g: 54.0/ 48.0/ 36.0/ 24.0/ 18.0/ 12.0/ 9.0/ 6.0Mbps 802.11n: up to 300.0Mbps 2412 ~ 2462MHz 11 for 802.11b, 802.11g, 802.11n (20MHz) 7 for 802.11n (40MHz) 292.9mW Printed antenna with 2.77dBi gain NA NA RJ45 Adapter OUTPUT POWER ANTENNA TYPE ANTENNA CONNECTOR DATA CABLE I/O PORTS ACCESSORY DEVICES NOTE:
1. The EUT incorporates a MIMO function. Physically, the EUT provides two completed transmitters and two receivers. MODULATION MODE 802.11b 802.11g 802.11n (20MHz) 802.11n (40MHz) TX FUNCTION 1TX 1TX 2TX 2TX 2. The EUT is designed with and without ON/OFF switch on the PCB as an option and PCB with ON/OFF switch is tested in this report. Report No.: RF991214C28 7 Report Format Version 4.0.0 3. The EUT were powered by the following adapters:
ADAPTER 1 BRAND: NETGEAR MODEL: MU08A9075100-A1 P/N: 332-10239-01 INPUT: 100-240Vac, 50/60Hz, 0.3A OUTPUT: 7.5Vdc, 1.0A POWER LINE: 1.8m non-shielded cable without core ADAPTER 2 BRAND: NETGEAR MODEL: AD810F22 P/N: 332-10281-01 INPUT: 100-240Vac, 50/60Hz, 0.3A OUTPUT: 7.5Vdc, 1.0A POWER LINE: 1.8m non-shielded cable without core 4. The above EUT information is declared by manufacturer and for more detailed features description, please refer to the manufacturer's specifications or user's manual. 3.2 DESCRIPTION OF TEST MODES 11 channels are provided for 802.11b, 802.11g and 802.11n (20MHz):
CHANNEL FREQUENCY CHANNEL FREQUENCY 1 2 3 4 5 6 2412MHz 2417MHz 2422MHz 2427MHz 2432MHz 2437MHz 7 8 9 10 11 2442MHz 2447MHz 2452MHz 2457MHz 2462MHz 7 channels are provided for 802.11n (40MHz):
CHANNEL FREQUENCY CHANNEL FREQUENCY 1 2 3 4 2422MHz 2427MHz 2432MHz 2437MHz 5 6 7 2442MHz 2447MHz 2452MHz Report No.: RF991214C28 8 Report Format Version 4.0.0 1.5m RJ45 UTP cable x 3 with 100 load 10m RJ45 UTP cable EUT
*Test table
(Power from adapter) 3.2.1 CONFIGURATION OF SYSTEM UNDER TEST 10m RJ45 UTP cable
*Kept in a remote area Notebook Notebook Report No.: RF991214C28 9 Report Format Version 4.0.0 3.2.2 TEST MODE APPLICABILITY AND TESTED CHANNEL DETAIL EUT CONFIGURE MODE A B Where APPLICABLE TO RE1G RE<1G
-
PLC APCM
-
DESCRIPTION Power from Adapter: MU08A9075100-A1 Power from Adapter: AD810F22 RE1G: Radiated Emission above 1GHz PLC: Power Line Conducted Emission RE<1G: Radiated Emission below 1GHz APCM: Antenna Port Conducted Measurement NOTE: -means no effect RADIATED EMISSION TEST (ABOVE 1GHz):
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A A A A MODE 802.11b 802.11g 802.11n (20MHz) 802.11n (40MHz) AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY MODULATION TYPE 1 to 11 1 to 11 1 to 11 1 to 7 1, 6, 11 1, 6, 11 1, 6, 11 1, 4, 7 DSSS OFDM OFDM OFDM DBPSK BPSK BPSK BPSK DATA RATE
(Mbps) 1.0 6.0 7.2 15.0 RADIATED EMISSION TEST (BELOW 1GHz):
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A, B MODE AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY 802.11n (20MHz) 1 to 11 6 OFDM MODULATION TYPE BPSK DATA RATE
(Mbps) 7.2 POWER LINE CONDUCTED EMISSION TEST:
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A, B MODE AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY 802.11n (20MHz) 1 to 11 6 OFDM MODULATION TYPE BPSK DATA RATE
(Mbps) 7.2 Report No.: RF991214C28 10 Report Format Version 4.0.0 BANDEDGE MEASUREMENT:
Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A A A A MODE 802.11b 802.11g 802.11n (20MHz) 802.11n (40MHz) AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY MODULATION TYPE 1 to 11 1 to 11 1 to 11 1 to 7 1, 11 1, 11 1, 11 1, 7 DSSS OFDM OFDM OFDM DBPSK BPSK BPSK BPSK DATA RATE
(Mbps) 1.0 6.0 7.2 15.0 ANTENNA PORT CONDUCTED MEASUREMENT:
This item includes all test value of each mode, but only includes spectrum plot of worst value of each mode. Pre-Scan has been conducted to determine the worst-case mode from all possible combinations between available modulations, data rates and antenna ports (if EUT with antenna diversity architecture). Following channel(s) was (were) selected for the final test as listed below. EUT CONFIGURE MODE A A A A MODE 802.11b 802.11g 802.11n (20MHz) 802.11n (40MHz) AVAILABLE CHANNEL TESTED CHANNEL MODULATION TECHNOLOGY MODULATION TYPE 1 to 11 1 to 11 1 to 11 1 to 7 1, 6, 11 1, 6, 11 1, 6, 11 1, 4, 7 DSSS OFDM OFDM OFDM DBPSK BPSK BPSK BPSK DATA RATE
(Mbps) 1.0 6.0 7.2 15.0 TEST CONDITION:
APPLICABLE TO ENVIRONMENTAL CONDITIONS INPUT POWER TESTED BY RE1G RE<1G PLC APCM 25deg. C, 68%RH, 1000 hPa 23deg. C, 65%RH, 1012 hPa 23deg. C, 60%RH, 1016 hPa 23deg. C, 64%RH, 1017 hPa 120Vac, 60Hz 120Vac, 60Hz 120Vac, 60Hz 120Vac, 60Hz Sun Lin David Huang David Huang Sun Lin Report No.: RF991214C28 11 Report Format Version 4.0.0 3.3 GENERAL DESCRIPTION OF APPLIED STANDARDS The EUT is a RF Product. According to the specifications of the manufacturer, it must comply with the requirements of the following standards:
FCC Part 15, Subpart C (15.247) ANSI C63.4-2003 ANSI C63.10-2009 All test items have been performed and recorded as per the above standards. NOTE: The EUT is also considered as a kind of computer peripheral, because the connection to computer is necessary for typical use. It has been verified to comply with the requirements of FCC Part 15, Subpart B, Class B (DoC). The test report has been issued separately. 3.4 DESCRIPTION OF SUPPORT UNITS The EUT has been tested as an independent unit together with other necessary accessories or support units. The following support units or accessories were used to form a representative test configuration during the tests. NO. 1 2 PRODUCT NOTEBOOK NOTEBOOK BRAND DELL DELL MODEL NO. PP18L D820 FCC ID SERIAL NO. 33497605792 CXSMM01BRD02D330 21498926752 NA SIGNAL CABLE DESCRIPTION OF THE ABOVE SUPPORT UNITS NO. 1 10m RJ45 UTP cable 2 10m RJ45 UTP cable NOTE:
1. All power cords of the above support units are non shielded (1.8m). 2. Items 1, 2 acted as communication partners to transfer data. Report No.: RF991214C28 12 Report Format Version 4.0.0 4. TEST TYPES AND RESULTS 4.1 RADIATED EMISSION MEASUREMENT 4.1.1 LIMITS OF RADIATED EMISSION MEASUREMENT Emissions radiated outside of the specified bands, shall be according to the general radiated limits in 15.209 as following:
FREQUENCIES
(MHz) FIELD STRENGTH
(microvolts/meter) MEASUREMENT DISTANCE
(meters) 0.009 ~ 0.490 0.490 ~ 1.705 1.705 ~ 30.0 30 ~ 88 88 ~ 216 216 ~ 960 Above 960 2400/F(kHz) 24000/F(kHz) 30 100 150 200 500 300 30 30 3 3 3 3 NOTE:
1. The lower limit shall apply at the transition frequencies. 2. Emission level (dBuV/m) = 20 log Emission level (uV/m). 3. As shown in 15.35(b), for frequencies above 1000MHz, the field strength limits are based on average detector, however, the peak field strength of any emission shall not exceed the maximum permitted average limits, specified above by more than 20dB under any condition of modulation. Report No.: RF991214C28 13 Report Format Version 4.0.0 4.1.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION ESIB7 8449B 9120D 8447D 100033 E4446A 9168-160 VULB9168 9120D-405 BBHA 9170 2944A10633 Jul. 29, 2010 MY48250266 Apr. 27, 2010 Jan. 29, 2010 Nov. 02, 2010 Aug. 11, 2010 Feb. 03, 2010 BBHA9170147 Test Receiver ROHDE & SCHWARZ Spectrum Analyzer Agilent BILOG Antenna SCHWARZBECK HORN Antenna SCHWARZBECK HORN Antenna SCHWARZBECK Preamplifier Agilent Preamplifier Agilent RF signal cable HUBER+SUHNNER RF signal cable HUBER+SUHNNER Software ADT. Antenna Tower inn-co GmbH Antenna Tower Controller inn-co GmbH Turn Table ADT. Turn Table Controller ADT. NOTE: 1. The calibration interval of the above test instruments is 12 months and the SUCOFLEX 104 ADT_Radiated_ V7.6.15.9.2 MA 4000 SUCOFLEX 104 Nov. 02, 2010 May 14, 2010 May 14, 2010 SC93021703 TT93021703 3008A01964 238141/4 CO2000 12738/6 017303 013303 SC100. TT100. NA NA NA NA NA NA calibrations are traceable to NML/ROC and NIST/USA. Jul. 28, 2011 Aug. 10, 2011 Apr. 26, 2011 Feb. 02, 2011 Jan. 28, 2011 Nov. 01, 2011 Nov. 01, 2011 May 13, 2011 May 13, 2011 NA NA NA NA NA 2. The test was performed in HwaYa Chamber 3. 3. The horn antenna and HP preamplifier (model: 8449B) are used only for the measurement of emission frequency above 1GHz if tested. 4. The FCC Site Registration No. is 988962. 5. The IC Site Registration No. is IC 7450F-3. Report No.: RF991214C28 14 Report Format Version 4.0.0 4.1.3 TEST PROCEDURES a. The EUT was placed on the top of a rotating table 0.8 meters above the ground at a 3 meters semi-anechoic chamber. The table was rotated 360 degrees to determine the position of the highest radiation. b. The EUT was set 3 meters away from the interference-receiving antenna, which was mounted on the top of a variable-height antenna tower. c. The antenna is a broadband antenna, and its height is varied from one meter to four meters above the ground to determine the maximum value of the field strength. Both horizontal and vertical polarizations of the antenna are set to make the measurement. d. For each suspected emission, the EUT was arranged to its worst case and then the antenna was tuned to heights from 1 meter to 4 meters and the rotatable table was turned from 0 degrees to 360 degrees to find the maximum reading. e. The test-receiver system was set to Peak Detect Function and Specified Bandwidth with Maximum Hold Mode. f. If the emission level of the EUT in peak mode was lower than the limit specified, then testing could be stopped and the peak values of the EUT would be reported. Otherwise the emissions would be re-tested one by one using peak, quasi-peak or average method as specified and then reported in a data sheet. NOTE:
1. The resolution bandwidth and video bandwidth of test receiver/spectrum analyzer is 120kHz for Quasi-peak detection at frequency below 1GHz. 2. The resolution bandwidth of test receiver/spectrum analyzer is 1MHz and video bandwidth is 3MHz for Peak detection at frequency above 1GHz. 3. The resolution bandwidth of test receiver/spectrum analyzer is 1MHz and the video bandwidth is 10Hz for Average detection (AV) at frequency above 1GHz. 4. All modes of operation were investigated and the worst-case emissions are reported. 4.1.4 DEVIATION FROM TEST STANDARD No deviation. Report No.: RF991214C28 15 Report Format Version 4.0.0 4.1.5 TEST SETUP For the actual test configuration, please refer to the attached file (Test Setup Photo). 4.1.6 EUT OPERATING CONDITIONS a. Placed the EUT on the testing table. b. Prepared notebook systems outside of testing area to act as communication partners. c. The communication partners connected with EUT via a RJ45 cable and run a test program (provided by manufacturer) to enable EUT under transmission condition continuously at specific channel frequency. d. The communication partner sent data to EUT by command "PING". Report No.: RF991214C28 16 Report Format Version 4.0.0 4.1.7 TEST RESULTS 802.11b EUT TEST CONDITION CHANNEL Channel 1 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 7 8 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00
#7236.00
#7236.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) 74.0 54.0
-20.0
-9.9 MARGIN (dB) LEVEL
(dBuV/m) 54.0 PK 23.50 44.1 AV 13.60 101.3 PK 70.70 97.2 AV 66.60 52.1 PK 16.00 48.7 AV 12.60 59.4 PK 17.00 53.8 AV 11.40 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 2.15 H 2.15 H 2.15 H 2.15 H 1.14 H 1.14 H 1.15 H 1.15 H 262 262 262 262 267 267 280 280
-21.9
-5.3
-21.9
-23.4 74.0 54.0 81.3 77.2 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 7 8 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00
#7236.00
#7236.00 LEVEL
(dBuV/m) 55.1 PK 45.8 AV 105.1 PK 101.1 AV 54.7 PK 52.3 AV 54.8 PK 46.7 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0 85.1 81.1
-18.9
-8.2
-19.3
-1.7
-30.3
-34.4 1.00 V 1.00 V 1.00 V 1.00 V 1.77 V 1.77 V 2.02 V 2.02 V 46 46 46 46 61 61 123 123
(dBuV) 24.60 15.30 74.50 70.50 18.60 16.20 12.40 4.30 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 42.40 42.40 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 42.40 42.40 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. 6. "#":The radiated frequency is out the restricted band. Report No.: RF991214C28 17 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6
*2437.00
*2437.00 4874.00 4874.00 7311.00 7311.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 101.7 PK 71.10 97.8 AV 67.20 50.3 PK 14.10 46.3 AV 10.10 59.6 PK 17.00 53.0 AV 10.40 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 2.07 H 2.07 H 1.12 H 1.12 H 1.15 H 1.15 H 277 277 267 267 281 281
-23.7
-7.7
-14.4
-1.0 74.0 54.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6
*2437.00
*2437.00 4874.00 4874.00 7311.00 7311.00 LEVEL
(dBuV/m) 105.8 PK 101.6 AV 54.3 PK 51.8 AV 54.5 PK 46.2 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-19.7
-2.2
-19.5
-7.8 1.06 V 1.06 V 1.60 V 1.60 V 1.99 V 1.99 V 35 35 61 61 152 152
(dBuV) 75.20 71.00 18.10 15.60 11.90 3.60 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 42.60 42.60 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 42.60 42.60 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 18 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 11 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 7 8
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 7386.00 7386.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 102.0 PK 71.30 98.1 AV 67.40 54.2 PK 23.40 44.3 AV 13.50 51.8 PK 15.50 46.7 AV 10.40 59.2 PK 16.50 52.9 AV 10.20 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 2.17 H 2.17 H 2.17 H 2.17 H 1.08 H 1.08 H 1.12 H 1.12 H 258 258 258 258 271 271 283 283
-19.8
-9.7
-22.2
-7.3
-14.8
-1.1 74.0 54.0 74.0 54.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 7 8
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 7386.00 7386.00 LEVEL
(dBuV/m) 106.2 PK 101.9 AV 58.0 PK 47.2 AV 54.6 PK 52.1 AV 54.7 PK 46.5 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0 74.0 54.0
-16.0
-6.8
-19.4
-1.9
-19.3
-7.5 1.16 V 1.16 V 1.16 V 1.16 V 1.58 V 1.58 V 1.78 V 1.78 V 79 79 79 79 83 83 169 169
(dBuV) 75.50 71.20 27.20 16.40 18.30 15.80 12.00 3.80 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 42.70 42.70 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 42.70 42.70 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 19 Report Format Version 4.0.0 802.11g EUT TEST CONDITION CHANNEL Channel 1 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) 74.0 54.0
-18.7
-10.2 MARGIN (dB) LEVEL
(dBuV/m) 55.3 PK 24.80 43.8 AV 13.30 99.9 PK 69.30 90.9 AV 60.30 47.7 PK 11.60 35.2 AV
-0.90 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 2.17 H 2.17 H 2.17 H 2.17 H 1.00 H 1.00 H 261 261 261 261 268 268
-26.3
-18.8 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00 LEVEL
(dBuV/m) 59.0 PK 46.0 AV 104.4 PK 95.1 AV 49.5 PK 36.1 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-15.0
-8.0
-24.5
-17.9 1.00 V 1.00 V 1.00 V 1.00 V 1.77 V 1.77 V 78 78 78 78 56 56
(dBuV) 28.50 15.50 73.80 64.50 13.40 0.00 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 20 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 100.3 PK 69.70 91.2 AV 60.60 47.8 PK 11.60 35.5 AV
-0.70 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.89 H 1.89 H 1.02 H 1.02 H 258 258 235 235
-26.2
-18.5 74.0 54.0
(dBuV) RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree)
-24.0
-17.3 1.05 V 1.05 V 1.53 V 1.53 V 99 99 77 77
(dBuV) 74.20 65.00 13.80 0.50 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 LEVEL
(dBuV/m) 104.8 PK 95.6 AV 50.0 PK 36.7 AV LIMIT
(dBuV/m) 74.0 54.0 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 21 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 11 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 100.7 PK 70.00 91.6 AV 60.90 55.2 PK 24.40 44.0 AV 13.20 47.8 PK 11.50 35.9 AV
-0.40 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.78 H 1.78 H 1.78 H 1.78 H 1.05 H 1.05 H 269 269 269 269 192 192
-18.8
-10.0
-26.2
-18.1 74.0 54.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 LEVEL
(dBuV/m) 105.1 PK 95.9 AV 59.7 PK 46.4 AV 49.8 PK 36.7 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-14.3
-7.6
-24.2
-17.3 1.22 V 1.22 V 1.22 V 1.22 V 1.52 V 1.52 V 105 105 105 105 68 68
(dBuV) 74.40 65.20 28.90 15.60 13.50 0.40 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 22 Report Format Version 4.0.0 802.11n (20MHz) EUT TEST CONDITION CHANNEL Channel 1 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) 74.0 54.0
-15.2
-7.7 MARGIN (dB) LEVEL
(dBuV/m) 58.8 PK 28.30 46.3 AV 15.80 103.6 PK 73.00 92.6 AV 62.00 48.3 PK 12.20 35.0 AV
-1.10 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.82 H 1.82 H 1.82 H 1.82 H 1.00 H 1.00 H 261 261 261 261 202 202
-25.7
-19.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2412.00
*2412.00 4824.00 4824.00 LEVEL
(dBuV/m) 60.9 PK 48.1 AV 105.8 PK 95.0 AV 50.3 PK 36.7 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-13.1
-5.9
-23.7
-17.3 1.00 V 1.00 V 1.00 V 1.00 V 1.27 V 1.27 V 78 78 78 78 102 102
(dBuV) 30.40 17.60 75.20 64.40 14.20 0.60 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.10 36.10 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 23 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 103.9 PK 73.30 92.9 AV 62.30 48.8 PK 12.60 35.7 AV
-0.50 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.75 H 1.75 H 1.05 H 1.05 H 243 243 183 183
-25.2
-18.3 74.0 54.0
(dBuV) RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree)
-23.5
-17.1 1.02 V 1.02 V 1.27 V 1.27 V 103 103 98 98
(dBuV) 75.50 64.70 14.30 0.70 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 LEVEL
(dBuV/m) 106.1 PK 95.3 AV 50.5 PK 36.9 AV LIMIT
(dBuV/m) 74.0 54.0 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 24 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 11 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 104.2 PK 73.50 92.9 AV 62.20 59.2 PK 28.40 46.5 AV 15.70 48.5 PK 12.20 35.3 AV
-1.00 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.77 H 1.77 H 1.77 H 1.77 H 1.02 H 1.02 H 235 235 235 235 199 199
-14.8
-7.5
-25.5
-18.7 74.0 54.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6
*2462.00
*2462.00 2483.50 2483.50 4924.00 4924.00 LEVEL
(dBuV/m) 106.6 PK 95.8 AV 64.3 PK 51.1 AV 51.2 PK 37.2 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-9.7
-2.9
-22.8
-16.8 1.23 V 1.23 V 1.23 V 1.23 V 1.33 V 1.33 V 259 259 259 259 108 108
(dBuV) 75.90 65.10 33.50 20.30 14.90 0.90 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.30 36.30 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 25 Report Format Version 4.0.0 802.11n (40MHz) EUT TEST CONDITION CHANNEL Channel 1 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2422.00
*2422.00 4844.00 4844.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) 74.0 54.0
-14.5
-5.4 MARGIN (dB) LEVEL
(dBuV/m) 59.5 PK 29.00 48.6 AV 18.10 98.3 PK 67.70 87.8 AV 57.20 48.8 PK 12.60 35.6 AV
-0.60 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.78 H 1.78 H 1.78 H 1.78 H 1.07 H 1.07 H 265 265 265 265 269 269
-25.2
-18.4 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 2390.00 2390.00
*2422.00
*2422.00 4844.00 4844.00 LEVEL
(dBuV/m) 65.0 PK 52.4 AV 104.0 PK 93.5 AV 47.8 PK 34.6 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-9.0
-1.6
-26.2
-19.4 1.00 V 1.00 V 1.26 V 1.26 V 1.25 V 1.25 V 260 260 260 260 106 106
(dBuV) 34.50 21.90 73.40 62.90 11.60
-1.60 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.20 36.20 CORRECTION FACTOR
(dB/m) 30.50 30.50 30.60 30.60 36.20 36.20 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 26 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 4 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 98.6 PK 68.00 88.0 AV 57.40 49.0 PK 12.80 35.9 AV
-0.30 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.58 H 1.58 H 1.22 H 1.22 H 241 241 193 193
-25.0
-18.1 74.0 54.0
(dBuV) RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree)
-26.1
-19.2 1.00 V 1.00 V 1.32 V 1.32 V 281 281 143 143
(dBuV) 73.60 63.20 11.70
-1.40 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 CORRECTION FACTOR
(dB/m) 30.60 30.60 36.20 36.20 NO. FREQ. (MHz) 1 2 3 4
*2437.00
*2437.00 4874.00 4874.00 LEVEL
(dBuV/m) 104.2 PK 93.8 AV 47.9 PK 34.8 AV LIMIT
(dBuV/m) 74.0 54.0 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 27 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 7 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS 25deg. C, 68%RH 1000 hPa MEASUREMENT DETAIL FREQUENCY RANGE 1 ~ 25GHz DETECTOR Peak (PK) FUNCTION Average (AV) TESTED BY Sun Lin ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6
*2452.00
*2452.00 2483.50 2483.50 4904.00 4904.00 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 98.8 PK 68.10 88.3 AV 57.60 59.2 PK 28.40 48.3 AV 17.50 48.7 PK 12.50 35.9 AV
-0.30 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.69 H 1.69 H 1.65 H 1.65 H 1.05 H 1.05 H 247 247 252 252 158 158
-14.8
-5.7
-25.3
-18.1 74.0 54.0 74.0 54.0 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6
*2452.00
*2452.00 2483.50 2483.50 4904.00 4904.00 LEVEL
(dBuV/m) 104.5 PK 94.0 AV 64.7 PK 52.2 AV 47.9 PK 35.2 AV LIMIT
(dBuV/m) 74.0 54.0 74.0 54.0
-9.3
-1.8
-26.1
-18.8 1.21 V 1.21 V 1.01 V 1.01 V 1.18 V 1.18 V 259 259 262 262 257 257
(dBuV) 73.80 63.30 33.90 21.40 11.70
-1.00 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.20 36.20 CORRECTION FACTOR
(dB/m) 30.70 30.70 30.80 30.80 36.20 36.20 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. 5. * : Fundamental frequency. Report No.: RF991214C28 28 Report Format Version 4.0.0 BELOW 1GHz WORST-CASE DATA802.11n (20MHz) EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS TEST MODE 23deg. C, 65%RH 1012 hPa A MEASUREMENT DETAIL FREQUENCY RANGE Below 1000MHz DETECTOR FUNCTION Quasi-Peak TESTED BY David Huang ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 125.17 249.60 319.60 457.64 500.42 751.23 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 37.3 QP 24.20 41.7 QP 28.20 40.4 QP 24.50 40.5 QP 20.30 35.5 QP 14.10 37.0 QP 10.80 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.75 H 1.25 H 1.00 H 2.00 H 1.50 H 1.00 H
-6.2
-4.3
-5.6
-5.5
-10.5
-9.0 43.5 46.0 46.0 46.0 46.0 46.0 94 85 286 214 211 202 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 57.12 156.28 249.60 457.64 751.23 875.67 LEVEL
(dBuV/m) 35.4 QP 38.1 QP 37.1 QP 35.1 QP 33.1 QP 42.9 QP LIMIT
(dBuV/m) 40.0 43.5 46.0 46.0 46.0 46.0
-4.6
-5.4
-8.9
-10.9
-12.9
-3.1 1.25 V 1.00 V 1.00 V 1.00 V 1.50 V 1.00 V 34 169 37 151 262 160
(dBuV) 21.20 23.30 23.60 14.90 6.90 14.50 CORRECTION FACTOR
(dB/m) 13.10 13.50 15.90 20.20 21.40 26.20 CORRECTION FACTOR
(dB/m) 14.20 14.80 13.50 20.20 26.20 28.40 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. Report No.: RF991214C28 29 Report Format Version 4.0.0 EUT TEST CONDITION CHANNEL Channel 6 INPUT POWER 120Vac, 60 Hz ENVIRONMENTAL CONDITIONS TEST MODE 23deg. C, 65%RH 1012 hPa B MEASUREMENT DETAIL FREQUENCY RANGE Below 1000MHz DETECTOR FUNCTION Quasi-Peak TESTED BY David Huang ANTENNA POLARITY & TEST DISTANCE: HORIZONTAL AT 3 M NO. FREQ. (MHz) 1 2 3 4 5 6 249.60 319.60 457.64 613.19 751.23 875.67 RAW VALUE TABLE ANGLE
(Degree) EMISSION LIMIT ANTENNA HEIGHT (m)
(dBuV)
(dBuV/m) MARGIN (dB) LEVEL
(dBuV/m) 42.3 QP 28.80 37.2 QP 21.30 36.1 QP 15.90 30.7 QP 6.80 36.3 QP 10.10 39.6 QP 11.20 ANTENNA POLARITY & TEST DISTANCE: VERTICAL AT 3 M EMISSION 1.25 H 1.00 H 1.75 H 1.25 H 1.00 H 1.50 H
-3.7
-8.8
-9.9
-15.3
-9.7
-6.4 46.0 46.0 46.0 46.0 46.0 46.0 100 241 238 319 130 127 RAW VALUE MARGIN (dB) ANTENNA HEIGHT (m) TABLE ANGLE
(Degree) NO. FREQ. (MHz) 1 2 3 4 5 6 62.95 105.73 156.28 251.55 751.23 875.67 LEVEL
(dBuV/m) 36.6 QP 40.4 QP 37.8 QP 41.1 QP 37.6 QP 42.6 QP LIMIT
(dBuV/m) 40.0 43.5 43.5 46.0 46.0 46.0
-3.4
-3.1
-5.7
-4.9
-8.4
-3.4 1.00 V 1.00 V 1.75 V 1.25 V 1.25 V 1.00 V 229 280 175 172 166 148
(dBuV) 22.90 28.80 23.00 27.50 11.40 14.20 CORRECTION FACTOR
(dB/m) 13.50 15.90 20.20 23.90 26.20 28.40 CORRECTION FACTOR
(dB/m) 13.70 11.60 14.80 13.60 26.20 28.40 REMARKS: 1. Emission level (dBuV/m) = Raw Value (dBuV) + Correction Factor (dB/m). 2. Correction Factor (dB/m) = Antenna Factor (dB/m) + Cable Factor (dB). 3. The other emission levels were very low against the limit. 4. Margin value = Emission level Limit value. Report No.: RF991214C28 30 Report Format Version 4.0.0 4.2 CONDUCTED EMISSION MEASUREMENT 4.2.1 LIMITS OF CONDUCTED EMISSION MEASUREMENT FREQUENCY OF EMISSION (MHz) CONDUCTED LIMIT (dBV) 0.15 ~ 0.5 0.5 ~ 5 5 ~ 30 Quasi-peak 66 to 56 56 60 Average 56 to 46 46 50 NOTE: 1. The lower limit shall apply at the transition frequencies. 2. The limit decreases in line with the logarithm of the frequency in the range of 0.15 to 0.50MHz. 3. All emanations from a class A/B digital device or system, including any network of conductors and apparatus connected thereto, shall not exceed the level of field strengths specified above. 4.2.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION 5D-FB 100291 ESCS30 Nov. 30, 2010 Test Receiver ROHDE & SCHWARZ RF signal cable Woken LISN ROHDE & SCHWARZ LISN ROHDE & SCHWARZ Software ADT NOTE: 1. The calibration interval of the above test instruments is 12 months and the calibrations Cable-HYC01-01 Dec. 30, 2010 Feb. 10, 2010 Jun. 28, 2010 ADT_Cond_ 835239/001 ESH3-Z5 ESH3-Z5 100312 V7.3.7 NA NA NA Nov. 29, 2011 Dec. 29, 2011 Feb. 09, 2011 Jun. 27, 2011 are traceable to NML/ROC and NIST/USA. 2. The test was performed in HwaYa Shielded Room 1. 3. The VCCI Site Registration No. is C-2040. Report No.: RF991214C28 31 Report Format Version 4.0.0 4.2.3 TEST PROCEDURES a. The EUT was placed 0.4 meters from the conducting wall of the shielded room with EUT being connected to the power mains through a line impedance stabilization network (LISN). Other support units were connected to the power mains through another LISN. The two LISNs provide 50 ohm/ 50uH of coupling impedance for the measuring instrument. b. Both lines of the power mains connected to the EUT were checked for maximum conducted interference. c. The frequency range from 150kHz to 30MHz was searched. Emission levels under (Limit - 20dB) was not recorded. NOTE: All modes of operation were investigated and the worst-case emissions are reported. 4.2.4 DEVIATION FROM TEST STANDARD No deviation. Report No.: RF991214C28 32 Report Format Version 4.0.0 4.2.5 TEST SETUP Ve rtic a l G ro u n d R e fe re n c e P la n e Te s t R e c e iv e r 4 0 c m E U T L IS N 8 0 c m H o riz o n ta l G ro u n d R e fe re n c e P la n e N o te : 1 .S u p p o rt u n its w e re c o n n e c te d to s e c o n d L IS N . 2 .B o th o f L IS N s (A M N ) a re 8 0 c m fro m E U T a n d a t le a s t 8 0 fro m o th e r u n its a n d o th e r m e ta l p la n e s For the actual test configuration, please refer to the attached file (Test Setup Photo). 4.2.6 EUT OPERATING CONDITIONS Same as 4.1.6. Report No.: RF991214C28 33 Report Format Version 4.0.0 4.2.7 TEST RESULTS CONDUCTED WORST-CASE DATA802.11n (20MHz) PHASE TEST MODE Line 1 A 6dB BANDWIDTH 9kHz No 1 2 3 4 5 6 Freq.
[MHz]
0.170 0.197 0.423 1.770 4.574 27.934 Corr. Factor
(dB) 0.14 0.14 0.15 0.21 0.40 2.08 Reading Value
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 39.41 38.01 33.22 18.67 14.67 17.23 Emission Level
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 39.55 38.15 33.37 18.88 15.07 19.31 Limit
[dB (uV)]
AV. 54.98 53.74 47.38 46.00 46.00 50.00 Q.P. 64.98 63.74 57.38 56.00 56.00 60.00 Margin
(dB) Q.P.
-25.43
-25.59
-24.01
-37.12
-40.93
-40.69 AV.
-
-
-
-
-
-
REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. "-": The Quasi-peak reading value also meets average limit and measurement with the average detector is unnecessary. 3. The emission levels of other frequencies were very low against the limit. 4. Margin value = Emission level - Limit value 5. Correction factor = Insertion loss + Cable loss 6. Emission Level = Correction Factor + Reading Value. 34 Report Format Version 4.0.0 Report No.: RF991214C28 PHASE TEST MODE Line 2 A No 1 2 3 4 5 6 Freq.
[MHz]
0.173 0.224 0.443 1.316 4.340 27.398 Corr. Factor
(dB) 0.13 0.13 0.14 0.19 0.35 1.79 Reading Value
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 41.43 35.31 34.11 20.31 13.74 17.61 6dB BANDWIDTH 9kHz Emission Level
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 41.56 35.44 34.25 20.50 14.09 19.40 Limit
[dB (uV)]
AV. 54.79 52.66 47.01 46.00 46.00 50.00 Q.P. 64.79 62.66 57.01 56.00 56.00 60.00 Margin
(dB) Q.P.
-23.24
-27.22
-22.75
-35.50
-41.91
-40.60 AV.
-
-
-
-
-
-
REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. "-": The Quasi-peak reading value also meets average limit and measurement with the average detector is unnecessary. 3. The emission levels of other frequencies were very low against the limit. 4. Margin value = Emission level - Limit value 5. Correction factor = Insertion loss + Cable loss 6. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28 35 Report Format Version 4.0.0 PHASE TEST MODE Line 1 B No 1 2 3 4 5 6 Freq.
[MHz]
0.166 0.369 0.752 1.910 6.625 14.762 Corr. Factor
(dB) 0.14 0.15 0.17 0.22 0.55 1.12 Reading Value
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 38.49 33.95 28.72 18.71 23.98 22.04 6dB BANDWIDTH 9kHz Emission Level
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 38.63 34.10 28.89 18.93 24.53 23.16 Limit
[dB (uV)]
AV. 55.18 48.53 46.00 46.00 50.00 50.00 Q.P. 65.18 58.53 56.00 56.00 60.00 60.00 Margin
(dB) Q.P.
-26.54
-24.43
-27.11
-37.07
-35.47
-36.84 AV.
-
-
-
-
-
-
REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. "-": The Quasi-peak reading value also meets average limit and measurement with the average detector is unnecessary. 3. The emission levels of other frequencies were very low against the limit. 4. Margin value = Emission level - Limit value 5. Correction factor = Insertion loss + Cable loss 6. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28 36 Report Format Version 4.0.0 PHASE TEST MODE Line 2 B No 1 2 3 4 5 6 Freq.
[MHz]
0.158 0.205 0.373 2.582 6.832 15.801 Corr. Factor
(dB) 0.13 0.13 0.14 0.24 0.51 1.05 Reading Value
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 40.00 36.81 35.93 19.33 23.54 22.17 6dB BANDWIDTH 9kHz Emission Level
[dB (uV)]
AV.
-
-
-
-
-
-
Q.P. 40.13 36.94 36.07 19.57 24.05 23.22 Limit
[dB (uV)]
AV. 55.58 53.42 48.44 46.00 50.00 50.00 Q.P. 65.58 63.42 58.44 56.00 60.00 60.00 Margin
(dB) Q.P.
-25.45
-26.48
-22.37
-36.43
-35.95
-36.78 AV.
-
-
-
-
-
-
REMARKS: 1. Q.P. and AV. are abbreviations of quasi-peak and average individually. 2. "-": The Quasi-peak reading value also meets average limit and measurement with the average detector is unnecessary. 3. The emission levels of other frequencies were very low against the limit. 4. Margin value = Emission level - Limit value 5. Correction factor = Insertion loss + Cable loss 6. Emission Level = Correction Factor + Reading Value. Report No.: RF991214C28 37 Report Format Version 4.0.0 4.3 6dB BANDWIDTH MEASUREMENT 4.3.1 LIMITS OF 6dB BANDWIDTH MEASUREMENT The minimum of 6dB Bandwidth Measurement is 0.5 MHz. 4.3.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION SPECTRUM ANALYZER R&S NOTE: The calibration interval of the above test instruments is 12 months and the calibrations are Jul. 17, 2010 Jul. 16, 2011 100040 FSP40 traceable to NML/ROC and NIST/USA. 4.3.3 TEST PROCEDURE The transmitter output was connected to the spectrum analyzer through an attenuator. The bandwidth of the fundamental frequency was measured by spectrum analyzer with 100kHz RBW and 300kHz VBW. The 6dB bandwidth is defined as the total spectrum the power of which is higher than peak power minus 6dB. 4.3.4 DEVIATION FROM TEST STANDARD No deviation. Report No.: RF991214C28 38 Report Format Version 4.0.0 4.3.5 TEST SETUP EUT SPECTRUM ANALYZER 20dB ATTENUATION PAD 4.3.6 EUT OPERATING CONDITIONS The software provided by client to enable the EUT under transmission condition continuously at lowest, middle and highest channel frequencies individually. Report No.: RF991214C28 39 Report Format Version 4.0.0 4.3.7 TEST RESULTS 802.11b CHANNEL 1 6 11 CH 1 CHANNEL FREQUENCY
(MHz) 2412 2437 2462 6dB BANDWIDTH
(MHz) MINIMUM LIMIT
(MHz) PASS / FAIL 10.12 10.07 10.08 0.5 0.5 0.5 PASS PASS PASS Report No.: RF991214C28 40 Report Format Version 4.0.0 802.11g CHANNEL CHANNEL FREQUENCY
(MHz) 6dB BANDWIDTH
(MHz) MINIMUM LIMIT
(MHz) PASS / FAIL 2412 2437 2462 16.55 16.58 16.58 0.5 0.5 0.5 PASS PASS PASS 1 6 11 CH 6 Report No.: RF991214C28 41 Report Format Version 4.0.0 802.11n (20MHz) CHANNEL CHANNEL FREQUENCY
(MHz) 6dB BANDWIDTH (MHz) CHAIN 0 CHAIN 1 MINIMUM LIMIT (MHz) PASS / FAIL 1 6 11 2412 2437 2462 17.85 17.84 17.82 17.71 17.72 17.71 0.5 0.5 0.5 PASS PASS PASS FOR CHAIN 0: CH 1 Report No.: RF991214C28 42 Report Format Version 4.0.0 802.11n (40MHz) CHANNEL CHANNEL FREQUENCY
(MHz) 6dB BANDWIDTH (MHz) CHAIN 0 CHAIN 1 MINIMUM LIMIT (MHz) PASS / FAIL 1 4 7 2422 2437 2452 36.43 36.44 36.45 36.45 36.44 36.43 0.5 0.5 0.5 PASS PASS PASS FOR CHAIN 0: CH 7 Report No.: RF991214C28 43 Report Format Version 4.0.0 4.4 MAXIMUM OUTPUT POWER 4.4.1 LIMITS OF MAXIMUM OUTPUT POWER MEASUREMENT The Maximum Output Power Measurement is 30dBm. 4.4.2 INSTRUMENTS DESCRIPTION &
MANUFACTURER High Speed Peak Power Meter Power Sensor MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION ML2495A 0842014 Apr. 21, 2010 Apr. 20, 2011 MA2411B 0738404 Apr. 21, 2010 Apr. 20, 2011 NOTE:
1. The calibration interval of the above test instruments is 12 months and the calibrations are traceable to NML/ROC and NIST/USA. 2. Measurement Bandwidth of ML2495A is 65MHz greater than 6dB bandwidth of emission. 4.4.3 TEST PROCEDURES A power sensor was used on the output port of the EUT. A power meter was used to read the response of the power sensor. Record the power level. Report No.: RF991214C28 44 Report Format Version 4.0.0 4.4.4 DEVIATION FROM TEST STANDARD No deviation. 4.4.5 TEST SETUP EUT 20dB ATTENUATION PAD Power Sensor Power Meter 4.4.6 EUT OPERATING CONDITIONS Same as Item 4.3.6. Report No.: RF991214C28 45 Report Format Version 4.0.0 4.4.7 TEST RESULTS 802.11b CHANNEL 1 6 11 802.11g CHANNEL 1 6 11 CHANNEL FREQUENCY
(MHz) 2412 2437 2462 CHANNEL FREQUENCY
(MHz) 2412 2437 2462 PEAK POWER OUTPUT (mW) PEAK POWER OUTPUT (dBm) PEAK POWER LIMIT (dBm) PASS/FAIL 85.1 87.1 83.2 19.3 19.4 19.2 30 30 30 PASS PASS PASS PEAK POWER OUTPUT (mW) PEAK POWER OUTPUT (dBm) PEAK POWER LIMIT (dBm) PASS/FAIL 269.2 288.4 275.4 24.3 24.6 24.4 30 30 30 PASS PASS PASS 802.11n (20MHz) CHAN. FREQ.
(MHz) CHAN. POWER OUTPUT (dBm) CHAIN 0 CHAIN 1 TOTAL POWER
(mW) TOTAL POWER
(dBm) POWER LIMIT
(dBm) PASS /
FAIL 1 6 11 2412 2437 2462 21.9 21.9 21.9 21.2 21.4 21.3 286.7 292.9 289.8 24.6 24.7 24.6 30 30 30 PASS PASS PASS 802.11n (40MHz) CHAN. FREQ.
(MHz) CHAN. POWER OUTPUT (dBm) CHAIN 0 CHAIN 1 TOTAL POWER
(mW) TOTAL POWER
(dBm) POWER LIMIT
(dBm) PASS /
FAIL 1 4 7 2422 2437 2452 21.9 21.8 21.8 21.2 21.3 21.2 286.7 286.3 283.2 24.6 24.6 24.5 30 30 30 PASS PASS PASS Report No.: RF991214C28 46 Report Format Version 4.0.0 4.5 POWER SPECTRAL DENSITY MEASUREMENT 4.5.1 LIMITS OF POWER SPECTRAL DENSITY MEASUREMENT The Maximum of Power Spectral Density Measurement is 8dBm. 4.5.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER SPECTRUM ANALYZER R&S MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION FSP40 100040 Jul. 17, 2010 Jul. 16, 2011 NOTE: The calibration interval of the above test instruments is 12 months and the calibrations are traceable to NML/ROC and NIST/USA. 4.5.3 TEST PROCEDURE The transmitter output was connected to the spectrum analyzer through an attenuator, the bandwidth of the fundamental frequency was measured with the spectrum analyzer using 3kHz RBW and 30kHz VBW, set sweep time = span/3kHz. The power spectral density was measured and recorded. The sweep time is allowed to be longer than span/3kHz for a full response of the mixer in the spectrum analyzer. Report No.: RF991214C28 47 Report Format Version 4.0.0 4.5.4 DEVIATION FROM TEST STANDARD No deviation. 4.5.5 TEST SETUP EUT 20dB ATTENUATION PAD SPECTRUM ANALYZER 4.5.6 EUT OPERATING CONDITION Same as Item 4.3.6 Report No.: RF991214C28 48 Report Format Version 4.0.0 4.5.7 TEST RESULTS 802.11b CHANNEL 1 6 11 CH 6 CHANNEL FREQUENCY
(MHz) 2412 2437 2462 RF POWER LEVEL IN 3 kHz BW
(dBm)
-12.8
-12.6
-12.7 MAXIMUM LIMIT
(dBm) PASS/FAIL 8 8 8 PASS PASS PASS Report No.: RF991214C28 49 Report Format Version 4.0.0 802.11g CHANNEL CHANNEL FREQUENCY
(MHz) 1 6 11 2412 2437 2462 RF POWER LEVEL IN 3 kHz BW
(dBm)
-13.1
-13.0
-13.0 MAXIMUM LIMIT
(dBm) PASS/FAIL 8 8 8 PASS PASS PASS CH 6 Report No.: RF991214C28 50 Report Format Version 4.0.0 RF POWER LEVEL IN 3kHz BW (dBm) CHAIN 0 CHAIN 1 TOTAL POWER DENSITY
(dBm) MAX. LIMIT (dBm) PASS / FAIL
-14.3
-14.2
-14.2
-14.9
-14.7
-14.7
-11.6
-11.4
-11.4 8 8 8 PASS PASS PASS 802.11n (20MHz) CHAN. FREQ.
(MHz) 2412 2437 2462 CHAN. 1 6 11 FOR CHAIN 0: CH 6 Report No.: RF991214C28 51 Report Format Version 4.0.0 RF POWER LEVEL IN 3kHz BW (dBm) CHAIN 0 CHAIN 1 TOTAL POWER DENSITY
(dBm) MAX. LIMIT (dBm) PASS / FAIL
-17.8
-17.7
-17.7
-17.4
-17.4
-17.5
-14.6
-14.6
-14.6 8 8 8 PASS PASS PASS 802.11n (40MHz) CHAN. FREQ.
(MHz) 2422 2437 2452 CHAN. 1 4 7 FOR CHAIN 1: CH 4 Report No.: RF991214C28 52 Report Format Version 4.0.0 4.6 BAND EDGES MEASUREMENT 4.6.1 LIMITS OF BAND EDGES MEASUREMENT Below 20dB of the highest emission level of operating band (in 100kHz Resolution Bandwidth). 4.6.2 TEST INSTRUMENTS DESCRIPTION &
MANUFACTURER MODEL NO. SERIAL NO. DATE OF CALIBRATION DUE DATE OF CALIBRATION FOR CONDUCTED MEASUREMENT SPECTRUM ANALYZER R&S FSP40 100040 Jul. 17, 2010 Jul. 16, 2011 ESIB7 9120D 8447D 100033 E4446A Aug. 10, 2011 Feb. 02, 2011 Jan. 28, 2011 Apr. 26, 2011 9168-160 VULB9168 9120D-405 BBHA 9170 Jul. 28, 2011 2944A10633 Jul. 29, 2010 MY48250266 Apr. 27, 2010 Jan. 29, 2010 Aug. 11, 2010 Feb. 03, 2010 BBHA9170147 FOR RADIATED MEASUREMENT Test Receiver ROHDE & SCHWARZ Spectrum Analyzer Agilent BILOG Antenna SCHWARZBECK HORN Antenna SCHWARZBECK HORN Antenna SCHWARZBECK Preamplifier Agilent Preamplifier Agilent RF signal cable HUBER+SUHNNER RF signal cable HUBER+SUHNNER Software ADT. Antenna Tower inn-co GmbH Antenna Tower Controller inn-co GmbH Turn Table ADT. Turn Table Controller ADT. NOTE: The calibration interval of the above test instruments is 12 months and the calibrations are SUCOFLEX 104 ADT_Radiated_ V7.6.15.9.2 MA 4000 SUCOFLEX 104 Nov. 02, 2010 Nov. 02, 2010 May 14, 2010 May 14, 2010 SC93021703 TT93021703 3008A01964 238141/4 May 13, 2011 May 13, 2011 Nov. 01, 2011 Nov. 01, 2011 CO2000 12738/6 017303 013303 SC100. TT100. 8449B NA NA NA NA NA NA NA NA NA NA NA traceable to NML/ROC and NIST/USA. Report No.: RF991214C28 53 Report Format Version 4.0.0 4.6.3 TEST PROCEDURE a. The EUT was placed on the top of a rotating table 0.8 meters above the ground at a 3 meter semi-anechoic chamber. The table was rotated 360 degrees to determine the position of the highest radiation. b. The EUT was set 3 meters away from the interference-receiving antenna, which was mounted on the top of a variable-height antenna tower. c. The antenna is a broadband antenna, and its height is varied from one meter to four meters above the ground to determine the maximum value of the field strength. Both horizontal and vertical polarizations of the antenna are set to make the measurement. d. For each suspected emission, the EUT was arranged to its worst case and then the antenna was tuned to heights from 1 meter to 4 meters and the rotatable table was turned from 0 degrees to 360 degrees to find the maximum reading. e. Set both RBW and VBW of spectrum analyzer to 100kHz and 300kHz with suitable frequency span including 100MHz bandwidth from band edge. The band edges was measured and recorded. The spectrum plots (Peak RBW = 100kHz, VBW = 300kHz) are attached on the following pages. NOTE: The resolution bandwidth of test receiver/spectrum analyzer is 1MHz and the video bandwidth is 10Hz for Average detection (AV) at frequency above 1GHz. 4.6.4 DEVIATION FROM TEST STANDARD No deviation. 4.6.5 EUT OPERATING CONDITION Same as Item 4.3.6. Report No.: RF991214C28 54 Report Format Version 4.0.0 4.6.6 TEST RESULTS The spectrum plots are attached on the following pages. D1 line indicates the highest level, and D2 line indicates the 20dB offset below D1. It shows compliance with the requirement in part 15.247(d). 802.11b RESTRICT BAND (2310 ~ 2390 MHz) FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2412.00 (PK) 2412.00 (AV) 105.1 101.1 RESTRICT BAND (2483.5 ~ 2500 MHz) 50.82 55.82 54.28 45.28 FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2462.00 (PK) 2462.00 (AV) 106.2 101.9 50.78 55.63 55.42 46.27 LIMIT
(dBuV/m) 74.00 54.00 LIMIT
(dBuV/m) 74.00 54.00 NOTE:
1. Delta = Amplitude between the peak of the fundamental and the peak of the band edge emission. Please check following 3 pages. 2. Maximum field strength in restrict band = Fundamental emission Delta. Report No.: RF991214C28 55 Report Format Version 4.0.0 Report No.: RF991214C28 56 Report Format Version 4.0.0 Report No.: RF991214C28 57 Report Format Version 4.0.0 Report No.: RF991214C28 58 Report Format Version 4.0.0 802.11g RESTRICT BAND (2310 ~ 2390 MHz) FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2412.00 (PK) 2412.00 (AV) 104.4 95.1 RESTRICT BAND (2483.5 ~ 2500 MHz) 43.59 48.77 60.81 46.33 FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2462.00 (PK) 2462.00 (AV) 105.1 95.9 41.26 45.35 63.84 50.55 LIMIT
(dBuV/m) 74.00 54.00 LIMIT
(dBuV/m) 74.00 54.00 NOTE:
1. Delta = Amplitude between the peak of the fundamental and the peak of the band edge emission. Please check following 3 pages. 2. Maximum field strength in restrict band = Fundamental emission Delta. Report No.: RF991214C28 59 Report Format Version 4.0.0 Report No.: RF991214C28 60 Report Format Version 4.0.0 Report No.: RF991214C28 61 Report Format Version 4.0.0 Report No.: RF991214C28 62 Report Format Version 4.0.0 802.11n (20MHz) RESTRICT BAND (2310 ~ 2390 MHz) FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2412.00 (PK) 2412.00 (AV) 105.8 95.0 RESTRICT BAND (2483.5 ~ 2500 MHz) 47.24 46.59 58.56 48.41 FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2462.00 (PK) 2462.00 (AV) 106.6 95.8 43.73 44.35 62.87 51.45 LIMIT
(dBuV/m) 74.00 54.00 LIMIT
(dBuV/m) 74.00 54.00 NOTE:
1. Delta = Amplitude between the peak of the fundamental and the peak of the band edge emission. Please check following 3 pages. 2. Maximum field strength in restrict band = Fundamental emission Delta. Report No.: RF991214C28 63 Report Format Version 4.0.0 Report No.: RF991214C28 64 Report Format Version 4.0.0 Report No.: RF991214C28 65 Report Format Version 4.0.0 Report No.: RF991214C28 66 Report Format Version 4.0.0 802.11n (40MHz) RESTRICT BAND (2310 ~ 2390 MHz) FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2422.00 (PK) 2422.00 (AV) 104.0 93.5 RESTRICT BAND (2483.5 ~ 2500 MHz) 41.33 45.32 62.67 48.18 FREQUENCY
(MHz) FUNDAMENTAL EMISSION
(dBuV/m) DELTA (dB) MAXIMUM FIELD STRENGTH IN RESTRICT BAND
(dBuV/m) 2452.00 (PK) 2452.00 (AV) 104.5 94.0 39.72 41.36 64.78 52.64 LIMIT
(dBuV/m) 74.00 54.00 LIMIT
(dBuV/m) 74.00 54.00 NOTE:
1. Delta = Amplitude between the peak of the fundamental and the peak of the band edge emission. Please check following 3 pages. 2. Maximum field strength in restrict band = Fundamental emission Delta. Report No.: RF991214C28 67 Report Format Version 4.0.0 Report No.: RF991214C28 68 Report Format Version 4.0.0 Report No.: RF991214C28 69 Report Format Version 4.0.0 Report No.: RF991214C28 70 Report Format Version 4.0.0 5. PHOTOGRAPHS OF THE TEST CONFIGURATION Please refer to the attached file (Test Setup Photo). Report No.: RF991214C28 71 Report Format Version 4.0.0 6. INFORMATION ON THE TESTING LABORATORIES We, Bureau Veritas Consumer Products Services (H.K.) Ltd., Taoyuan Branch, were founded in 1988 to provide our best service in EMC, Radio, Telecom and Safety consultation. Our laboratories are accredited and approved according to ISO/IEC 17025. Copies of accreditation certificates of our laboratories obtained from approval agencies can be downloaded from our web site:
www.adt.com.tw/index.5.phtml. If you have any comments, please feel free to contact us at the following:
Linko EMC/RF Lab:
Tel: 886-2-26052180 Fax: 886-2-26051924 Hwa Ya EMC/RF/Safety Telecom Lab:
Tel: 886-3-3183232 Fax: 886-3-3185050 Web Site: www.adt.com.tw Hsin Chu EMC/RF Lab:
Tel: 886-3-5935343 Fax: 886-3-5935342 The address and road map of all our labs can be found in our web site also. Report No.: RF991214C28 72 Report Format Version 4.0.0 7. APPENDIX A - MODIFICATIONS RECORDERS FOR ENGINEERING CHANGES TO THE EUT BY THE LAB No any modifications are made to the EUT by the lab during the test.
---END---
Report No.: RF991214C28 73 Report Format Version 4.0.0
1 2 | Test Setup Photos | Test Setup Photos | 278.18 KiB | August 03 2011 |
PHOTOGRAPHS OF THE TEST CONFIGURATION CONDUCTED EMISSION TEST Test Mode A 1 Test Mode B 2 RADIATED EMISSION TEST Test Mode A 3 Test Mode B 4
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2012-05-24 | 2412 ~ 2462 | DTS - Digital Transmission System | Class II Permissive Change |
2 | 2011-03-08 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2012-05-24
|
||||
1 2 |
2011-03-08
|
|||||
1 2 | Applicant's complete, legal business name |
Netgear Incorporated
|
||||
1 2 | FCC Registration Number (FRN) |
0022158786
|
||||
1 2 | Physical Address |
350 East Plumeria Drive
|
||||
1 2 |
San Jose, CA
|
|||||
1 2 |
United States
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
c******@curtis-straus.com
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 | Grantee Code |
PY3
|
||||
1 2 | Equipment Product Code |
10400149
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
D****** K****
|
||||
1 2 | Telephone Number |
40889********
|
||||
1 2 | Fax Number |
40890********
|
||||
1 2 |
d******@netgear.com
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 2 | Name |
G**** C******
|
||||
1 2 | Physical Address |
No. 19, Hwa Ya 2nd Rd., Kwei Shan Hsiang
|
||||
1 2 |
Taoyuan Hsien, 333
|
|||||
1 2 |
Taiwan
|
|||||
1 2 | Telephone Number |
886-3******** Extension:
|
||||
1 2 | Fax Number |
886-3********
|
||||
1 2 |
g******@tw.bureauveritas.com
|
|||||
app s | Non Technical Contact | |||||
1 2 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 2 | Name |
D****** C********
|
||||
1 2 |
N**** C******
|
|||||
1 2 | Physical Address |
No. 19, Hwa Ya 2nd Rd., Kwei Shan Hsiang
|
||||
1 2 |
Taoyuan Hsien, 333
|
|||||
1 2 |
Taiwan
|
|||||
1 2 | Telephone Number |
886-3******** Extension:
|
||||
1 2 |
886-3******** Extension:
|
|||||
1 2 | Fax Number |
886-3********
|
||||
1 2 |
d******@tw.bureauveritas.com
|
|||||
1 2 |
n******@tw.bureauveritas.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | N300 WiFi Router | ||||
1 2 | N300 WIRELESS ROUTER | |||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Class II Permissive Change | ||||
1 2 | Original Equipment | |||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Power listed is the maximum combined conducted output power. Device is an 802.11bgn router operating in a 2x2 Spatial Multiplexing MIMO configuration as described in this filing. End-users and responsible parties must be provided with operating and installation instructions to ensure RF exposure compliance. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. Class II permissive change as described in the filing. | ||||
1 2 | Power listed is the maximum combined conducted output power. Device is an 802.11bgn router operating in a 2x2 Spatial Multiplexing MIMO configuration as described in this filing. End-users and responsible parties must be provided with operating and installation instructions to ensure RF exposure compliance. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
||||
1 2 | Name |
R**** C********
|
||||
1 2 | Telephone Number |
886-3******** Extension:
|
||||
1 2 | Fax Number |
886-3********
|
||||
1 2 |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.2930000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.2930000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC