all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
USERS MANUAL 1 | Users Manual | 3.02 MiB | August 09 2004 | |||
1 |
|
USERS MANUAL 2 | Users Manual | 2.38 MiB | August 09 2004 | |||
1 | Cover Letter(s) | August 09 2004 | ||||||
1 | External Photos | August 09 2004 | ||||||
1 | ID Label/Location Info | August 09 2004 | ||||||
1 | ID Label/Location Info | August 09 2004 | ||||||
1 | RF Exposure Info | August 09 2004 | ||||||
1 | Test Report | August 09 2004 | ||||||
1 | Test Setup Photos | August 09 2004 | ||||||
1 | Internal Photos | / August 09 2004 |
1 | USERS MANUAL 1 | Users Manual | 3.02 MiB | August 09 2004 |
IEEE 802.11g WLAN Router Users Manual Table of contects 1.Welcome to IEEE 802.11g WLAN Router..4 2.Setting up the Hardware5 3.Quick Start Guide.7 4.Understanding the User Interface.8 5.Basic Configuration..9 5.1. WIZARD....................................................................................................................10 5.1.1. Setting up the Configuration Wizard ..................................................................10 5.2. NETWORKING.........................................................................................................11 5.2.1. Connection Type Setup ......................................................................................11 5.2.2. Configuring a Static IP Address..........................................................................12 5.2.3. Configuring a (Dynamic) DHCP Account .....................................................13 5.2.4. Configuring SecureSOHO to Use a ADSL PPPoE Account..............................14 5.2.5. Configuring SecureSOHO to Use a PPTP Connection.......................................15 5.2.6. Configuring the DNS Service .............................................................................16 5.2.7. Cloning a MAC Address.....................................................................................17 5.2.8. Dynamic DNS Configuration..............................................................................18 5.2.9. LAN Interface Configuration...........................................................................19 5.2.10. Virtual DMZ Configuration ..............................................................................20 5.2.11. NAT Configuration (Static Connection) ...........................................................21 5.2.12. Router Service Configuration ...........................................................................22 5.3. SECURITY.................................................................................................................25 5.3.1. Disabling ICMP Replies .....................................................................................26 5.3.2. Blocking Individual (or Service Port) of IP Address on the Internet..................27 5.3.3. Modifying an IP Address or Removing an Policy from the Incoming Policy List .28 5.3.4. Blocking Individual (or Service Port) of LAN Clients from Accessing the Internet ..29 5.3.5. Mapping Internal Ports to the Outside ................................................................31 5.3.6. Configuring a Virtual Server...............................................................................33 5.3.7. Port Triggering Configuration.............................................................................34 5.3.8. SNMP..................................................................................................................36 5.3.9. URL Blocking .....................................................................................................37 5.4. INTRANET................................................................................................................38 5.4.1. DHCP Server Basic Settings............................................................................39 5.4.2. DHCPD Fixed MAC/IP ......................................................................................40 5.4.3. DHCP Server Status.........................................................................................41 5.5. ADMINISTRATION .................................................................................................42 5.5.1. User Account.......................................................................................................43 5.5.2. Access IP.............................................................................................................44 5.5.3. Language..........................................................................................................45 5.5.4. System Status .....................................................................................................46 5.5.5. Time Setup .........................................................................................................47 5.5.6. System Restart....................................................................................................48 5.5.7. Factory Default ..................................................................................................49 5.5.8. Software Update.................................................................................................50 5.5.9. Config Setting ....................................................................................................51 5.5.10. System Log ......................................................................................................52 6. Terminology ............................................................................................................53 Regulatory notes and statements Wireless LAN, Health and Authorization for use Radio frequency electromagnetic energy is emitted from Wireless LAN devices. The energy levels of these emissions however are far much less than the electromagnetic energy emissions from wireless devices like for example mobile phones. Wireless LAN devices are safe for use frequency safety standards and recommendations. The use of Wireless LAN devices may be restricted in some situations or environments for example:
On board of airplanes, or In an explosive environment, or In case the interference risk to other devices or services is perceived or identified as harmful In case the policy regarding the use of Wireless LAN devices in specific organizations or environments (e.g. airports, hospitals, chemical/oil/gas industrial plants, private buildings etc.) is not clear, please ask for authorization to use these devices prior to operating the equipment. Regulatory Information/disclaimers Installation and use of this Wireless LAN device must be in strict accordance with the instructions included in the user documentation provided with the product. Any changes or modifications made to this device that are not expressly approved by the manufacturer may void the users authority to operate the equipment. The Manufacturer is not responsible for any radio or television interference caused by unauthorized modification of this device, of the substitution or attachment. Manufacturer and its authorized resellers or distributors will assume no liability for any damage or violation of government regulations arising from failing to comply with these guidelines. FCC Radio Frequency Exposure statement This Wireless LAN radio device has been evaluated under FCC Bulletin OET 65 and found compliant to the requirements as set forth in CFR 47 Sections 2.1091, 2.1093, and 15.247 (b) (4) addressing RF Exposure from radio frequency devices. The radiated output power of this Wireless LAN device is far below the FCC radio frequency exposure limits. Nevertheless, this device shall be used in such a manner that the potential for human contact during normal operation is minimized. When nearby persons has to be kept to ensure RF exposure compliance, in order to comply with RF exposure limits established in the ANSI C95.1 standards, the distance between the antennas and the user should not be less than 20 cm. CAUTION:
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna. 2. Increase the distance between the equipment and the receiver. 3. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. 4. Consult the dealer or an experienced radio/TV technician for help. Safety Information Your device contains a low power transmitter. When device is transmitted it sends out radio frequency (RF) signal. CAUTION: To maintain compliance with FCC's RF exposure guidelines, this equipment should be installed and operated with minimum distance 20cm between the radiator and your body. Use on the supplied antenna. Unauthorized antenna, modification, or attachments could damage the transmitter and may violate FCC regulations. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. 1. Welcome to IEEE 802.11g WLAN Router Overview Welcome to IEEE 802.11g WLAN Router! This powerful network tool will enable you to securely connect multiple computers to the Internet through a single DSL / Cable modem or T1 / E1 / ISDN CSU /DSU network connection. Through this simple yet comprehensive appliance, you can connect multiple computers in your home or office using standard Ethernet or wireless Ethernet networking. Its highly configurable built-in network firewall provides you with the power to allow specific services to pass through your network, while keeping all malicious internet attackers away. IEEE 802.11g WLAN Router also provides advance features like transparent proxy caching, remote utilization monitoring, virtual private network, printer sharing and sophisticated bandwidth control. The simple Web-based interface will help you configure your IEEE 802.11g WLAN Router with true point-and-click ease. This document will provide you with the guidance needed to customize IEEE 802.11g WLAN Router to your own networking needs. 1.1 Product Feature Compliance with IEEE 802.11g and 802.11b standards Highly efficient design mechanism to provide unbeatable performance Achieving data rate up to 54Mbps for 802.11g and 11Mps for 802.11b with wide Strong network security with WEP encryption range coverage. Quick and easy setup with Web-based management utility 1.2 System Requirements Windows 98, 98SE, Millennium Edition (ME), 2000 and XP operating systems Microsoft Internet Explorer 5.5 or higher DSL/ Cable Modem Broadband Internet connection and ISP account PCs equipped with 10Mbps or 10/100 Mbps Ethernet connection to support TCP/IP protocol One CD-ROM drive 1.3 Applications Home SOHO networking for device sharing and wireless multimedia Wireless office provides a wider range for home and SOHO Ethernet Enables wireless building-to-building data communication Built-in infrastructure mode Router provides ideal solution for:
Difficult-to-wire environments Temporary LANs for scenarios such as trade-exhibitions and meetings Enables LAN adaptability to frequently changing environments Enables remote access to corporate network information, for example e-mail and the company home page 2. Setting up the Hardware Back View:
All Ethernet Ports (WAN and LAN)are auto MDI/MDIX, meaning you can use either a straight-through or a crossover Ethernet cable. Pressing the Reset Button restores the router to its original factory default Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers. The Auto MDI/MDIX WAN port is the connection for the Ethernet cable to the Cable or DSL modem Receptor for the Power Adapter LED Indicators:
LED Color Power Green WAN WLAN LAN On On On Off On On Off Status On OFF Description Indicates proper connection to power supply. The unit is not receiving power Indicates connection to the WAN port Blinking Data transmission. Link is established Blinking Packet transmit or receive activity No Link activity Indicates connection is established. Blinking Data transmissions No LAN connections IEEE 802.11g WLAN Router is a turnkey solution to connect your home or office to the Internet through a high speed or always on connection. The following easy steps will get you hooked up and ready to go onto the Internet. 1. Connect the power adapter to the 802.11g WLAN Router and the outlet, the power will be on automatically. 2. Behind the IEEE 802.11g WLAN Router unit, locate the Ethernet network port (RJ-45) marked with WAN and connect the port to the equipment provided by your Internet Service Provider (ISP) (e.g. Cable/DSL modem or T1/E1/ISDN CSU/DSU connection). 3. Connect the four local area network (LAN) ports to your office network hub or switch if necessary. Congratulations! You have completed the hardware configuration requirements for IEEE 802.11g WLAN Router. 3. Quick Start Guide A brief overview of setting up your IEEE 802.11g WLAN Router Welcome to IEEE 802.11g WLAN Router!
Your IEEE 802.11g WLAN Router is a versatile network component that satisfies the needs of novice and most sophisticated network administrators. This quick start guide will get you connected to Internet in a number of easy steps. Before you start, please gather the Internet connection information from your ISP. You will need to install and configure an Ethernet card properly to obtain a dynamic IP address on a computer. Depending on your network configuration, you might need an Ethernet hub / switch and enough Ethernet cables to connect every computer to the Ethernet hub / switch. To start using IEEE 802.11g WLAN Router :
1. Follow the steps in setting up the hardware in previous chapter and point your browser to http://192.168.1.254 to get the graphical user interface (GUI) screen. 2 Enter username/password which set to admin/admin as default value. 3. Click on the WAN tab and enter the Wide Area information provided by your ISP, click the Update button. 4. Click on the DNS tab and enter the Domain Name Service information provided by your ISP, click the Update button to confirm. 5. Click on Save Changed and Restart the system. 6. Enjoy the Internet 4. Understanding the User Interface Navigation rules IEEE 802.11g WLAN Router has a web-based graphical user interface (GUI) that can be accessed using a standard HTML (HTTP v1.0) compliant browser. Once the LAN is properly connected, a network administrator can connect to it through the URL http://192.168.1.254 The GUI has two main navigational components: Tabs and Menus. Each Tab represents a major group of functions that a user can configure and is located on the top part of the screen. The Home tab presents version information as well as a brief feature list. The Networking tab includes all the essential configuration items required to get a LAN up and running. The Security tab provides configuration items that control firewall behavior. By default, IEEE 802.11g WLAN Router comes configured to lock out unsolicited network connections. To allow specific services to be allowed through IEEE 802.11g WLAN Router, some modifications under this tab is required. The Intranet tab accommodates changes that are LAN specific. Under this tab, a network administrator can specify rules for the assignment of IP addresses as well as manipulate tools that improve local area network performance and resource availability, such as the transparent proxy cache. The Administration Tab provides control, monitoring and troubleshooting tools. The Help Tab provides additional context sensitive information. Menus are located at the left side of the screen to provide additional navigation for tab components. After each session involving configuration modifications, the changes should be saved and the system should be restarted to activate the changes. 5. Basic Configuration First things first This chapter covers the use of all the configuration items under the Networking Tab. Once configured, you should be able to securely access the Internet through your IEEE 802.11g WLAN Router. Wide Area Network (WAN) The Internet is made up of wide area networks (WAN) and local area networks (LAN). Each local area network connects to the Internet through a wide area network. The IEEE 802.11g WLAN Router is the gateway used by your LAN to connect to your WAN. Your WAN is provided by your Internet Service Provider (ISP) using a WAN medium
(Cable/DSL modem or T1/E1/ISDN CSU/DSU connection). You will need information provided by your ISP to complete this step. Depending on your WAN medium, your ISP may provide you with either a static or dynamic
(DHCP/BootP) connection. This information should be included in the package that came from your ISP. Generally, if your ISP has provided you with a fixed IP address, you have a static IP address. If your ISP has provided a username and password, you have a PPPoE link. If your ISP provided neither an IP address or username/password pair, you most likely have a DHCP based connection. If unsure, contact your Internet Service Provider customer support. Dynamic Host Configuration Protocol (DHCP) based configurations do not require further setup since IP address, gateway and DNS information are automatically set by the ISP. 5.1. WIZARD When you first connected to IEEE 802.11g WLAN Router, you will need to complete the setup by answering a sequence of questions provided by the Configuration Wizard. 5.1.1. Setting up the Configuration Wizard 1. Follow the instructions guided by the Configuration Wizard step by step through the graphical user interface on the browser.. 5.2. NETWORKING The Networking section will guide you to complete your Internet setup. 5.2.1. Connection Type Setup 1. Select Connection type item under WAN interface in the Networking section. 2. Click Static. 3. Click Apply. 4. Input settings which the network connection required 5. Wait about 30 seconds for System Restart 6. Verify if LAN clients can access Internet and if there is any error messages shown on the web page. 7. Repeat step 1. 8. Click Dynamic item. 9. Repeat step 3-6. 10. Repeat step 1. 11. Click ADSL-PPPoE item. 12. Repeat procedure 3-6. 13. Repeat step 1. 14. Click ADSL-PPTP item. 15. Repeat procedure 3-6 5.2.2. Configuring a Static IP Address 1. Click on Connection Type under WAN1 Interface in the Networking tab. 2. Click on Static and press Apply. 3. Enter IP Address (ex: 61.220.168.202), Netmask (ex: 255.255.255.248), Gateway (ex:
61.220.168.209) and press Apply. 5.2.3. Configuring a (Dynamic) DHCP Account DHCP accounts do not need further configuration. However, for DHCP accounts with ISPs that restrict IP addresses to specific MAC addresses, see the subsection on MAC Cloning in the Advanced Networking Tools section of this chapter. 1. Click on Connection Type under WAN1 Interface in the Networking tab. 2. Click on Dynamic and press Apply. 5.2.4. Configuring IEEE 802.11g WLAN Router to Use a ADSL PPPoE Account ADSL-PPPoE (always on) 1. Click on Connection Type under WAN1 Interface in the Networking tab. 2. Click on ADSL-PPPoE and press Apply. 3. Enter PPPoE Username (ex: 84591268@hinet.net), Password (ex: sa123455).
<You will need information provided by your ISP to complete this step>
4. Click on Always On and press Apply. ADSL-PPPoE Connect On Demand (CoD) 1. Click on Connection Type under WAN1 Interface in the Networking tab. 2. Click on ADSL-PPPoE and press Apply. 3. Enter PPPoE Username (ex: 84591268), PPPoE Password (ex: 123455). 4. Click on Connect On Demand and enter MAX Idle Time. 5. Press Apply. Starting WAN1 ADSL-PPPoE MANUALLY 1. Click on ADSL-PPPoE under WAN1 Interface in the Networking tab. 2. Click on Start. Stopping WAN1 ADSL-PPPoE MANUALLY 1. Click on ADSL-PPPoE under WAN1 Interface in the Networking tab. 2. Click on Stop. 5.2.5. Configuring IEEE 802.11g WLAN Router to Use a PPTP Connection 1. Click on Connection Type under WAN1 Interface in the Networking tab. 2. Click on ADSL-PPTP and press Apply. 3. Enter My IP Address (192.168.100.100), My Subnet Mask (ex: 255.255.255.0), Server IP Address (ex: 192.168.100.1), PPTP Account (ex: 123456) , PPTP Password (ex:
123456) and press Apply. 5.2.6. Configuring the DNS Service Domain Name Service (DNS) Domain name service helps you to work with IP addresses by mapping them out to simple human readable names. IEEE 802.11g WLAN Router needs the correct values for certain LAN side client services (like web-browsing) to work properly. The DNS server IP addresses should be provided to you by your ISP. 1. Click on DNS Settings under WAN1 Interface in the Networking tab. 2. Enter DNS IP address your ISP gave to you. 3. Press Apply button. 5.2.7. Cloning a MAC Address Some ISPs audit connections using the MAC addresses. These systems only allow registered MAC address to connect to the Internet. To circumvent this obstacle, IEEE 802.11g WLAN Router provides a MAC Cloning feature which allows the Network Administrator to modify the MAC address that is reported to the ISP. This feature facilitates the use of IEEE 802.11g WLAN Router in such environments. 1. Click on MAC Cloning under WAN1 Interface in the Networking tab. 2. Enter MAC Address (ex: 12:35:84:95:23:11) and press Apply. 5.2.8. Dynamic DNS Configuration Conventional DNS information associates a static IP address with a human readable machine name, for use on the World Wide Web. When a DNS server receives a name lookup request, it compares it against a list of published IP-host name associations. Once a match is found, the server replies with either the IP address or host name. Since the published lists are static, conventional DNS servers are unable to map DHCP or PPPoE configured hosts as the configuration protocols do not guarantee that the host computer will always have the same IP address. (thus, the IP address-hostname mapping will not always be correct). Dynamic DNS overcomes the fixed IP requirement of conventional DNS by running a daemon that automatically updates DNS server information. To avail of this service, you will have to register with one of several dynamic DNS service providers and configure IEEE 802.11g WLAN Router to forward IP address changes to the dynamic DNS server. This feature is particularly useful for providing WAN side services (e.g. HTTP or FTP). 1. Click on Dynamic DNS under WAN1 Interface in the Networking tab. 2. Click on Enable. 3. Choose Service Provider form combo box (ex: www.dyndns.org). 4. Enter Host Name (ex: 1234), Username (ex: 123564), Password (ex: 123564). 5. If necessary, click on Enable Wildcard and enter Mail Exchanger (ex:
mail.123564.com). 6. Press Apply. 5.2.9. LAN Interface Configuration In this section, you specify the IP address that the IEEE 802.11g WLAN Router will use. IEEE 802.11g WLAN Router uses 192.168.1.1 as its default address, with a netmask of 255.255.255.0 (Class C netmask) . This IP is used as the default router for the LAN as well as the Web server address for the IEEE 802.11g WLAN Router configuration interface. IEEE 802.11g WLAN Router allows a single Internet account to be shared by several computers. This is done through a principle called Network Address Translation (or NAT). Connection requests from LAN side computers are translated into the single IP address provided through the ISP account. IEEE 802.11g WLAN Router tracks each individual LAN client connection in a way that the process is transparent to the LAN side computers. The NAT mechanism also provides part of the firewall features of IEEE 802.11g WLAN Router since only LAN side initiated connections are translated. WAN side connection attempts are ignored unless specifically configured to be accepted (see chapter on Security). 1. Click on IP Setting under LAN Interface in the Networking tab. 2. Enter Host Name, IP address and press Apply. 5.2.10. Virtual DMZ Configuration The virtual DMZ is used to enable protocols which need to open ports on the gateway. The Gateway will forward all unspecified incoming traffic to the host specified in this page. Therefore, since it is very close to one-to-one NAT mapping, most protocols can be supported. In general, Internet applications use only one unique port and can pass through a NAT Router by enabling Virtual Server. However, some special applications need to implement multiple ports, port ranges, dynamically assigned ports, and special protocols. IEEE 802.11g WLAN Router can support the transparent pass-through of these special applications, such as NetMeeting/H.323, and ICQ etc. Enable Virtual DMZ when you have problems running these applications. 1. Click on Virtual DMZ under DMZ in the Networking tab. 2. Enter Host IP address and press Apply. 5.2.11. NAT Configuration (Static Connection) SET UP ONE-TO-MANY NAT WITH WAN1 INTERFACE 1. Click on NAT under WAN1 Interface in the Networking tab. 2. Click on One-to-Many NAT and press Apply. SET UP MANY-TO-MANY NAT WITH WAN1 INTERFACE 1. Click on NAT under WAN1 Interface in the Networking tab. 2. Click on Advanced Setting. 3. Enter Public IP Range (ex: 61.220.168.202-61.220.168.206). 4. Press Apply. SET UP ONE-TO-ONE NAT WITH WAN1 INTERFACE 1. Click on NAT under WAN Interface in the Networking tab. 2. Click on Advanced Setting. 3. Enter Public IP in WAN (ex: 61.220.168.204), Private IP in LAN (ex: 192.168.1.50). 4. Press Apply. 5.2.12. Router Service Configuration DYNAMIC ROUTING 1. On Dynamic Routing under Router Services in the Networking tab. 2. Click on Yes to enable RIP support. 3. Choose on Version 1 of Send and Receive Protocol. 4. Press Apply. STATIC ROUTE 1. Click on Static Route under Router Services in the Networking tab. 2. Choose net from Type combo box. 3. Enter Destination, Netmask and Gateway. 4. Choose WAN1 from Dev combo box. 5. Press Apply. SETTING STATIC ROUTE (NET-TO-HOST) 1. Click on Static Route under Router Services in the Networking tab. 2. Choose host from Type combo box. 3. Enter Destination. 4. Choose WAN1 from Dev combo box. 5. Press Apply. SETTING STATIC ROUTE (NET-TO-NET) 1. Click on Static Route under Router Services in the Networking tab. 2. Choose net from Type combo box. 3. Enter Destination, Netmask and Gateway. 4. Choose WAN1 from Dev combo box. 5. Press Apply. 5.3. SECURITY IEEE 802.11g WLAN Router is the key to controlling the flow of information A real world firewall is built between buildings to slow down the progress of a disaster, and preserve valuable life and property. Network firewalls are put between networks to control the amount of information that flows through them. One of the fundamental goals of a firewall is to prevent unwanted connections from the outside of the network from entering the LAN. On the other hand, a firewall can also block connection from LAN to the Internet. A common practice of this feature is the URL (Uniform Resource Locator) blocking used by parents to limit access to certain Internet sites for their children. The Security tab enables the network administrator to fine-tune or customize various features of the IEEE 802.11g WLAN Router firewall. Packet Internet Groper (PING) Packet Internet Groper (orPing is a very useful utility used by network administrators to determine if a computer is up and running. The ping program sends a small packet to an address, if there is a computer assigned to the address, it sends a reply. Ping uses the Internet Control Messaging Protocol (ICMP). IEEE 802.11g WLAN Router can be configured not to reply to PING requests. 5.3.1. Disabling ICMP Replies 1. Click on ICMP Blocking under Firewall in the Networking tab. 2. Click on No and press Apply. Keeping Stuff out IEEE 802.11g WLAN Router blocks all traffic from WAN side computers from getting into your LAN by default. On the other hand, LAN clients can connect to any computer that is on the Internet. This behavior can be modified to prevent particular (or all) LAN clients from accessing certain WAN side IP addresses. These features are useful for network administrators of offices or households that have policies or guidelines about the proper use of the Internet. 5.3.2. Blocking Individual (or Service Port) of IP Address on the Internet 1. Click on the Security tab. 2. Under the Firewall menu item, click on Incoming Policy. 3. Enter the IP address and port number (or range) to be blocked onto the corresponding text box at the bottom of the list (marked New) according the following figure. 4. Click combo box and select PERMIT / DENY action. 5. Check Enable box to log the event 6. Press Apply. This figure describes all the IP address coming from WAN port will be allowed to access your LAN clients, but: Accessing to the port 20, 21 of IP 192.168.1.3 from IP 210.201.37.183 (with port 20, 21) will be denied. Accessing to the port 88 of IP 192.168.1.5 from IP 210.201.37.188 (with port 80) will be denied. 5.3.3. Modifying an IP Address or Removing an Policy from the Incoming Policy List 1. Click on the Security tab 2. Under the Firewall menu item, click on Incoming Policy. 3. To modify an IP address, enter new parameters. 4. To remove a Policy, click the del key 5. Press Apply.
1 | USERS MANUAL 2 | Users Manual | 2.38 MiB | August 09 2004 |
5.3.4. Blocking Individual (or Service Port) of LAN Clients from Accessing the Internet 1. Click on the Security tab. 2. Under the Firewall menu item, click on Outgoing Policy. 3. Enter the IP address and port number (or range) to be blocked onto the corresponding text box at the bottom of the list (marked New) according the following figure. 4. Click combo box and select protocol. 5. Click combo box and select PERMIT / DENY action. 6. Check Enable box to log the event. 7. Press Apply. This figure describes all the IP address coming from LAN port will be denied to access WAN services, but: Accessing to the port 80 (HTTP service) of WAN IP 210.201.37.199 from LAN IP 192.168.1.33(with port 80) will be allowed. Accessing to the port 20~80 of WAN IP 66.218.71.198 from LAN IP 192.168.1.52 (with port 20~80) will be allowed. Letting Stuff in By default, IEEE 802.11g WLAN Router is deployed in firewall mode and will not allow outside computers to reach the LAN unless the connection is initiated by a LAN client. IEEE 802.11g WLAN Router empowers network administrators to allow WAN clients to access certain services provided by LAN clients. In other words, it is possible for WAN side computers to initiate connections provided the Network Administrator allows it. This is done through a technique called Port Mapping. When computers on the Internet communicate, they do so through IP addresses and special numbers called port addresses
(or simply ports). The port determines which service is trying to connect to (e.g. port 80=HTTP/Web services). Each service also has what is known as a transmission protocol (either TCP or UDP). To properly use this feature, you would need the connection details for the service you wish to open to the Internet. Each WAN port/LAN IP/port group is called a rule. In addition, IEEE 802.11g WLAN Router rules can be further defined to allow or deny connections according to IP address using filters. Port Mapping allows IEEE 802.11g WLAN Router to pretend to offer the service that an outside computer (WAN side) wishes to reach. Once the connection is made, all the requests between the outside and local (LAN side) computers are redirected by IEEE 802.11g WLAN Router to the proper destination. This process is completely transparent to the outside computers. 5.3.5. Mapping Internal Ports to the Outside Add a record of Port Mapping 1. Click on Port Mapping under Firewall in the Security tab. 2. Click on Add. 3. Enter Service Name (ex: FTP), External Port (ex: 23). 4. Click on TCP. 5. Enter the last digit of IP address into Internal Host (ex: 192.168.1.22), port (ex:23). 6. Click on Enable. 7. Press Apply. Any request from Internet for port 21 (FTP service port) to the IEEE 802.11g WLAN Router will be forwarded to LAN client 192.168.1.22 Deleting a record of Port Mapping 1. Click on Port Mapping under Firewall in the Security tab. 2. Click on Delete? beside record you want to delete and press Apply. Enable a record of Port Mapping 1. Click on Port Mapping under Firewall in the Security tab. 2. Click on some records of Port Mapping and press Apply. 5.3.6. Configuring a Virtual Server Adding a record to virtual server 1. Setup FTP server and Telnet Server in LAN port (ex: 192.168.1.1) 2. Click on Virtual Server under Firewall in the Security tab. 3. Enter Name (ex: Test) 4. Enter Port Range (ex: 20, 30). 5. Select TCP / UDP / ALL. (ex: TCP) 6. Enter IP address (ex: 192.168.1.1). 7. Click on Enable. 8. Press Apply. Deleting a record from virtual server 1. Click on Virtual Server under Firewall in the Security tab. 2. Select the rule you want to delete 3. Press del button in the right of the rule 4. Press Apply. 5.3.7. Port Triggering Configuration Port trigger is a set of rules that are used to open ports in the firewall dynamically. Each rule is composed of a trigger condition and a port opening rule. Add a Port Trigger rule for Realplayer 1. Click on Port trigger under Firewall in networking tab. 2. Add the following items in the port trigger page and press Apply. 3. Input the name. RealOne 4. Input the triggered port: 554-554 5. Select the triggered protocol: TCP 6. Input the opened port range: 7070-7071 7. Select the opened protocol: UDP 8. Select the server check: No Add a Port Trigger rule for mIRC 1. Click on Port trigger under Firewall in Networking tab. 2. Add the following items in the port trigger page and press Apply. 3. Input the name. MIRC 4. Input the triggered port range: 6660:6670 5. Select the triggered protocol: TCP 6. Input the opened port range: 113-113 7. Select the opened protocol: TCP 8. Select the server check: No 5.3.8. SNMP IEEE 802.11g WLAN Router supports the Simple Network Management Protocol
(SNMP). This protocol allows other SNMP aware systems to remotely monitor the behavior of your IEEE 802.11g WLAN Router. IEEE 802.11g WLAN Router complies with SNMP version 1 and version 2 type requests. SNMP compliant network management systems (NMS) can requests information from your IEEE 802.11g WLAN Router by providing the proper community strings.1 Community strings act as passwords between SNMP aware devices (also called agents). IEEE 802.11g WLAN Router distinguishes requests from the WAN and LAN sides. This allows the network administrator to prevent unwanted monitoring. By default, SNMP monitoring is allowed throughout the LAN, while disallowed through the WAN. Enable WAN Access 1. Click on SNMP under Firewall in the Security tab. 2. Click on Enable in the WAN Access item. 3. Modify Read Only Community, Read Write Community. 4. Press Apply. Enable LAN Access 1. Click on SNMP under Firewall in the Security tab. 2. Click on Enable in the LAN Access item. 3. Modify Read Only Community and Read Write Community. 4. Press Apply. 1. Commnuity strings are the primary authentication mechanisms employed by SNMP V1 and SNMP V2. Read-Only SNMP support is available on all models. Read-Write SNMP support is available only on select models. 5.3.9. URL Blocking Uniform Resource Locator (URL) blocking can be used by parents to limit access to certain Internet sites for their children. This feature is more effective than Internet IP Blocking as Internet sites might have multiple IP addresses and the user does not required to know the IP address to set a blocking rule. In addition, the user can set a keyword list that would block any URL that comprises the keyword. This way, the user can make the list short, making it easier to manage. Add a record on URL Blocking 1. Click on URL Blocking under URL Blocking in the Security tab. 2. Click on Enable in the URL Blocking item. 3. Enter URL/URI List, Keyword List and press Apply. Delete a record on URL Blocking 1. Click on URL Blocking under URL Blocking in the Security tab. 2. Click on Enable in the URL Blocking tab. 3. Click on del beside URL/URI List you want to delete. 4. Click on del beside Keyword List you want to delete. 5. Press Apply. 5.4. INTRANET Local Area Network Computing Internet style The technology developed for the Internet has revolutionized so many aspects of modern day society. Applications of the Internet technology within a corporate environment present the same benefits and synergy at a much more personal scale. Dubbed Intranets, local area networks that leverage technology developed for the World Wide Web provide a wealth of resources to the office. Like its global counter-part intranets offer the user with fast, reliable on-line services. Unlike its global counter-parts, intranets that are run behind properly configured firewalls are safe from malicious or unintentional intrusions that cause serious interruptions or intellectual property loss or damage. Dynamic LAN Client Configuration LAN side client computers can automatically obtain new IP addresses from IEEE 802.11g WLAN Router, through its built-in DHCP daemon. To achieve this each client computer should be set to acquire IP addresses via dynamic host configuration protocol
(DHCP) or its predecessor the Bootstrap Protocol (BootP). By default, IEEE 802.11g WLAN Router will assign up to 99 IP addresses within the range starting from 192.168.1.2 up to 192.168.1.100. Once assigned, a client computer would retain or lease the IP address for as long as 1 day (7 day max). Once the lease expires, the client computer can re-apply for a new IP address. It is possible that the DHCP daemon may assign a different IP address from what was just released. In order to guarantee that a LAN side computer gets the same IP address every time, see the section on permanent IP address assignment below. Caution: There should be only one (1) DHCP daemon on your LAN. If you are already running another DHCP daemon or server, you should disable it before activating IEEE 802.11g WLAN Router DHCP daemon. Running more than one DHCP daemon on a LAN can have unpredictable (and sometimes difficult to fix) consequences. 5.4.1. DHCP Server Basic Settings SET UP DHCP SERVER 1. Click on Basic Settings under DHCPD in the Intranet tab. 2. Click on Yes in Enable DHCP?
3. Enter the last digit of DHCP start IP and DHCP end IP. 4. Click on one of Contract Period. 5. Press Apply. MODIFY DHCP IP RANGE OF DHCP SERVER 1. Click on Basic Settings under DHCPD in the Intranet tab. 2. Modify DHCP start IP and DHCP end IP and press Apply. (IP value must be between 1 and 254) MODIFY CONTRACT PERIOD OF DHCP IP 1. Click on Basic Settings under DHCPD in the Intranet tab. 2. Click on other options in the Contract Period item. 5.4.2. DHCPD Fixed MAC/IP Adding a record of fixed MAC/IP 1. Click on Fixed MAC / IP under DHCPD in the Intranet tab. 2. Enter MAC Address, the last digit of IP address, and press Apply. Deleting a record of fixed MAC / IP 1. Click on Fixed MAC / IP under DHCPD in the Intranet tab. 2. Click on del button beside record you want to delete. 3. Press Apply. 5.4.3. DHCP Server Status 1. Click on Current Status under DHCPD in the Intranet tab. 5.5. ADMINISTRATION Access Control and Troubleshooting tools IEEE 802.11g WLAN Router provides an extensive set of system tools that equip the novice network administrator to do advanced network trouble shooting. IEEE 802.11g WLAN Router also provides sophisticated control structures which can restrict access to its configuration. Authentication By now you have familiarized yourself with username/password authentication mechanism used by IEEE 802.11g WLAN Router. This is an industry standard method for authenticating the identity of the user who intends to use the system. Only authorized users should be entrusted with the valid username and password. This feature allows the network administrator to manage the users who can change the IEEE 802.11g WLAN Router configuration or use the tools for trouble shooting. Users are also authenticated through the LAN clients they access IEEE 802.11g WLAN Router through. Users who attempt to access IEEE 802.11g WLAN Router through restricted workstations are denied access. Besides, you can also choose a language setting. IEEE 802.11g WLAN Router currently supports English and Chinese (Big 5). System Tools IEEE 802.11g WLAN Router provides the following tools which aid in administration of the network. System Status. This utility displays the current system status. It displays the current Network Status Current Routing Table, and DHCP clients information. The feature shows read-only system status and it will not allow you to modify the information. It provides a method of inspecting the health of your system. Time Setup. This utility will setup your system time. You can either setup your system time manually or use Network Time Server to synchronize your system clock over the network. Router Service Time. This utility allows user to access Internet based on a predefined time frame. System Restart. This utility is used for restarting IEEE 802.11g WLAN Router. System restarts is needed in events of modified important system settings. Any saved changes of the system activities will be applied after the system rebooted. Factory Default. This utility is used for clearing the configuration and resetting it back to original values (as it came out of the box) Software Update. This utility allows the Network Administrator to connect to a server which provides software which can be used to upgrade IEEE 802.11g WLAN Router. The software update can also be done on local machine. Please check separate information sheet or vendor web site for more details. Config Setting. This utility is used for backup your current IEEE 802.11g WLAN Router configurations in your PC. In the case you need to reset IEEE 802.11g WLAN Router back to factory default value, you can load the configuration you backup before. 5.5.1. User Account User who has Read / Write access right 1. Click on the Authentication tab and choose the User Account menu item. 2. Under the User who has Read/Write access right item, enter the user name in the Username text box. 3. Enter the password in the password text box. 4. Enter password again in the confirm password text box. User who has Read-Only access right 1. Click on the Authentication tab. Choose the User Account menu item, 2. Under the User who has Read-Only access right item, enter the user name in the Username text box. 3. Enter the password in the password text box. 4. Enter password again in the confirm password text box. 5.5.2. Access IP 1. Click on the Authentication tab. Choose the Access IP menu item. 2. Select Enable / Disable on WAN access. 3. Enter up to three sets of LAN IP address (or Ranges) into appropriate text box. 4. Click on Apply button. 5.5.3. Language 1. Click on the Administration tab. 2. Under the Authentication menu item, click on Language. 3. Select your language in the Language box. 4. Clicks Apply to set your language. 5.5.4. System Status 1. Click on the Administration tab. 2. Under the Authentication menu item, click on System status. 5.5.5. Time Setup 1. Click on the Administration tab. 2. Under the System menu item, click on Time Setup. 3. Select your time zone in the Time Zone selection box. 4. Choose either Set Time Manually or Use Time Server. 5. If you choose the setup time manually, enter current time by specifying Month, Day, Hours, Minutes, and Seconds in the appropriate fields. 6. If you choose to use Time Server, specifying the Time server. 7. Click on Apply button to setup time. 5.5.6. System Restart 1. Click on the Administration tab. 2. Under the System menu item, click on System Restart. 3. Press Yes button to restart the system. 5.5.7. Factory Default 1. Click on the Administration tab. 2. Under the system menu item, click on Factory Default. 3. Press Yes button to restart the system with factory default. 5.5.8. Software Update 1. Click on the Administration tab. 2. Under the System menu item, click on Software Update. 3. Choose either the software update file is in the internet or on the local host. 4. If the file is in the internet, type in the URL. 5. If the file is on local host, type in the name file with full path or click on Browse button to search the file on local host. 6. Click Apply button to start update. 5.5.9. Config Setting 1. Click on the Administration tab. 2. Under the System menu item, click on Config Setting. 3. Select following method to Download or Upload configuration file. 4. If you select Download, you can either enter the path and filename in then text box or press browser button to assign path and filename. Press Download button to start. 5. If you select Upload, then press Upload button to save. 5.5.10. System Log IEEE 802.11g WLAN Router provides a system log of all system activities up to 50 entries. Old entries will be purged automatically to ensure a healthy system. However, if you want to keep a full system log, you can setup a remote system log daemon (remote syslogd) to record all system events remotely. This feature can also be very helpful to monitor the system activities at distant. 1. Change some settings of IEEE 802.11g WLAN Router. 2. Click on the Administration tab. 3. Under the Log menu item, click on System Log. 6. Terminology Boot It is the process when the PC starts executing instructions. Browser It is an application program that helps users to view and interact with the information of the World Wide Web. BSS (Basic Service Set) A group of wireless Network PC Card users and an Access Point. Cable Modem It is a device that connects a PC to the Internet via the cable television network. It features asymmetric transmission rates: around 36 Mbps downstream from the Internet to the PC, and from 200 Kbps to 2 Mbps upstream from the PC to the Internet. DHCP (Dynamic Host Configuration Protocol) It is a protocol that automates the assignment and acquirement of IP addresses between a server and a client in a network. DMZ (De-Militarized Zone) It allows LAN clients behind a NAT Router to be totally exposed and accessible to the WAN side in order to run special applications or set up a server. DNS (Domain Name System) Domain Name System explains where Internet domain names are located. In addition, it translates Internet domain names into Internet Protocol (IP) addresses. A domain name must be meaningful, so you can remember it easily for the access of websites. Domain It is a subnet work composed of a group of clients and servers. DoS (Denial of Service) Denial of Service attacks network devices and try to disable the devices. Dynamic IP Address Dynamic IP Address is automatically assigned to a client in a TCP/IP network by a DHCP server in the network. Encryption A security method that applies a specific algorithm to data in order to alter the data appearance and prevent other devices from reading the information. ESS (Extended Service Set) An ESS is composed of two or more BSS, and the users can roam in an ESS. Ethernet It is a common LAN protocol defined as the 802.3 standard by IEEE (Institute of Electrical and Electronics Engineers). All clients in the network share the total bandwidth. It could be 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet) or 1000 Mbps (Gigabit Ethernet). FTP (File Transfer Protocol) File Transfer Protocol enables you to transfer files in a bi-directional method over a TCP/IP network. Firewall It is a mechanism that protects a network from attacks from the other networks. Also, it can provide the Internet access control list that restricts clients?connection to other networks. Firmware It is programming that is inserted into programmable read-only memory and becomes a permanent part of a computing or network device. Hardware It is the physical part of PCs and network device. HTTP (Hyper Text Transport Protocol) (WEB) It is the protocol used to transmit and receive data over the World Wide Web. It can establish connection with a Web server and transmit HTML pages to the client browser. For instance, when you enter a domain name on your browser, you are actually sending an HTTP request to a Web server for Web page information. After the Web server receives your HTTP request, it will send the Web page to you by displaying it via the browser. ICMP (Internet Control Message Protocol) It is a kind of TCP/IP protocol that sends the error message, the control message, and the information messages to a network device. For instance, a router uses ICMP to notify the sender that its destination node is not available. A ping utility can send ICMP echo request to verify the existence of an IP address, too. IP (Internet Protocol) It is the Network Layer protocol in the TCP/IP communication and provides the basic packet delivery for TCP/IP networks. It contains a network address and allows messages to be routed to a different network or subnet. IP Address It is a 32-binary digit number that provides the source or destination information on the Internet. ISP (Internet Service Provider) It is a company that provides individuals and companies the access to the Internet. LAN (Local Area Network) It consists a group of PCs and network devices that communicate with each other over a network and share the resources of a single processor or server within a small geographic area. MAC Address (Media Access Control Address) It is a unique number assigned to any Ethernet network device by the device manufacture. It enables the network to identify the device at the hardware level. NAT (Network Address Translation) (IP Sharing) Network Address Translation can translate the source IP address of a LAN client to the IP address of a WAN client before forwarding a packet from the LAN to the WAN. When the packet returns, NAT translates the destination address from a WAN client to the address of a LAN client before forwarding the packet back to the LAN client. When only one WAN IP address is available, NAT can translate the only WAN IP address into multiple LAN IP addresses for the LAN clients. Therefore the LAN clients Share the only one WAN IP address, and it is called IP Sharing. Port It is a pathway of network device, such as a switch or a router. It can make connection between the LAN and the WAN via the network device. Port Number In a TCP/IP network, a port number is assigned to an application program running in the PC. The port number is included in the transmitted packets and will link the data to the correct service. Well-known ports include port 21 for FTP and port 80 for HTTP. PPPoE (Point to Point Protocol over Ethernet) It enables a point-to-point connection to be established in the normally multipoint architecture of Ethernet and is commonly implemented by xDSL box Internet Service Provider for Dial-Up Internet connections. PPTP (Point to Point Tunneling Protocol) It is a standard VPN protocol that secures a private network with encryption and authentication of User ID and Password. Router It is a network device that divides a large network into small sub-networks, and that transmits packets with a routing table. Server A server is the PC that enables its clients to access files stored in it, to make printing, and to communicate within the same Ethernet network. SMTP ( Simple Mail Transfer Protocol ) It is a standard e-mail protocol that defines the message format and manages the e-mail transmission between e-mail servers. Software It is a series of instructions that tells the PC how to process the data. Static IP Address Static IP is also a WAN access type provided by some Internet Service Providers. You need to enter the information of IP address, Subnet Mask, Default Gateway, Primary DNS, and Secondary DNS IP Address. Subnet Mask It is a method used to split IP networks into a series of subnets. Switch It is a network device that transmits packets between nodes on the same network. TCP/IP (Transmission Control Protocol / Internet Protocol) It is a group of network standards that enable PCs of different operating systems to communicate with each other across the network. Telnet Telnet is a terminal emulation protocol used commonly on the Internet and TCP/IP network. It enables you to log on to a remote PC and to run a program on the remote PC with an established account and password. Virtual DMZ Port forwarding all ports (1-65535) to a dedicated host in LAN. Virtual Server (Port Forwarding) A NAT Router can function as a Virtual Server that can forward the service packet specified with a port number to the LAN host specified by the LAN IP address. In other words, the Gateway can open the port for the service with specified port number and then forward the port to a LAN host. Therefore it is called Port Forwarding, too. VPN (Virtual Private Network) It is a network security mechanism that secures the network data transmission via tunneling, encryption, and authentication etc. WAN (Wide Area Network) It is a kind of network that covers a wide geographic area like a country. WEP (Wired Equivalent Privacy) A data privacy mechanism based on a 64-bit, or 128-bit shared key algorithm, as described in the IEEE 802.11standard. Wireless LAN It is a network technology that uses the air to transmit data between wireless clients and Access Points.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2004-09-08 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2004-09-08
|
||||
1 | Applicant's complete, legal business name |
Well Communication Corporation
|
||||
1 | FCC Registration Number (FRN) |
0008537037
|
||||
1 | Physical Address |
11F, No. 778, Chung Cheng Road
|
||||
1 |
Chung Ho City, Taipei, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
T******@TIMCOENGR.COM
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
JCH
|
||||
1 | Equipment Product Code |
WLL-5410R
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
C**** T********
|
||||
1 | Title |
Manager
|
||||
1 | Telephone Number |
886 2********
|
||||
1 | Fax Number |
886 2********
|
||||
1 |
c******@wellgroups.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11g WIRELESS AP | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power listed is ERP. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Training Research Co., Ltd.
|
||||
1 | Name |
Y****** T****
|
||||
1 | Telephone Number |
886-2******** Extension:
|
||||
1 | Fax Number |
886-2********
|
||||
1 |
y******@trclab.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.1450000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC