EnGenius ESR-1221 EXT Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung EnGenius ESR-1221 EXT an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von EnGenius ESR-1221 EXT, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung EnGenius ESR-1221 EXT die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung EnGenius ESR-1221 EXT. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung EnGenius ESR-1221 EXT sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts EnGenius ESR-1221 EXT
- Den Namen des Produzenten und das Produktionsjahr des Geräts EnGenius ESR-1221 EXT
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts EnGenius ESR-1221 EXT
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von EnGenius ESR-1221 EXT zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von EnGenius ESR-1221 EXT und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service EnGenius finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von EnGenius ESR-1221 EXT zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts EnGenius ESR-1221 EXT, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von EnGenius ESR-1221 EXT widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    1 1 1b/g W i reless SOHO Router User ’ s Manual V ersion: 1.2[...]

  • Seite 2

    2 T able of Content s 1 INTRODUCTIO N.. ......... ......... ........... .......... ......... ......... ......... ......... ......... ......... ........... ......... .......... ...5 1.1 F EATURES & B ENEFITS ........ ......... ......... ......... ............ ......... ......... ......... ......... ......... ......... ......5 1.2 P AC KAGE C ONT[...]

  • Seite 3

    3 3.5.6 DMZ . ... ......... ......... ............ ......... ......... ......... ......... ......... ......... ......... ............ ......... ......... ......44 APPENDIX A – SP ECIFI CA TIONS..... ......... ......... ......... ........... ......... ......... .......... ......... ......... ......... ........45 APPENDIX B – FCC INTE RFERENCE ST[...]

  • Seite 4

    4 Revision History V ersi on Date Notes 1.0 Jul 10, 2008 Initial V ersion 1.1 Aug 6, 2008 1.2 Aug 1 1, 2008[...]

  • Seite 5

    5 1 Introduction The W ire less SOHO Router operates seamlessly in t he 2.4 GHz frequ ency spectru m supporting the 802.1 1b (2.4GHz, 1 1Mbp s) and the newer , faster 802.1 1g (2.4GHz, 54Mbpsw ireless stan dard. High output powe r and high sensitivity can extend range and coverage t o reduce the roaming between APs to get m ore stabi lity wir eles [...]

  • Seite 6

    6 Package Contents Open the p ackage carefully , and make sure th at none of t he items listed below are missing. Do not discard the pac king materials, in case of return; the unit m ust be shipped in its o riginal pac kage. h One W ireless SO HO Router h One Power Ada pter h One CAT5 UTP Cable h One CD-ROM w ith User’s Manual a nd Install W izar[...]

  • Seite 7

    7 socket on the wall, and t he DC inlet into t he DC c onnector . Connection / A ctiv ity LED This LED will light up once an Ethernet cable is c onnected to one of the LAN ports or the WAN port. WAN LED This LED will light up once an Ethernet cable is c onnected to WAN (Internet) port. WLAN LED This LED will light up once the RF (wireless LAN) f ea[...]

  • Seite 8

    8 Network Configurati on To be tter understand how t he wireless L AN prod ucts w ork toge ther to create a wireless network, it mi ght be helpful to dep ict a few of the possible wireless LAN PC card network con fig uration s. The wireless LAN products can be configured as: a) Ad-hoc (or peer-to-peer ) for department al or SOHO L ANs. b) Infrastru[...]

  • Seite 9

    9 2 Understanding t he Hardw are Hardware Installat ion 1. Place the unit in an appropr iate location afte r conducting a site su rvey. 2. Plug o ne end o f the Ethernet cable into the LAN port o f the dev ice and another e nd into y our PC/Notebook. 3. Plug one e nd of another Ethernet cable to WAN port of the d evice and the other end into y ou c[...]

  • Seite 10

    10 2. Select Internet Protocol ( TCP/IP) a nd then click o n th e Properties b utton. This will allow you to con figure the T CP/IP settings of y our PC/Notebook . 3. Select Use the following IP Address radio button and then enter the I P address and s ubnet m ask. Ensure that t he IP address and subnet m ask are on the same subnet as th e device. [...]

  • Seite 11

    1 1  After logging in you will graphical user interface (GUI) of the device. The navigation drop-down menu on left is divided into four main sections: 1. Managemen t : This menu i ncludes the administrator settings, advanced wireless settings such as wireless MAC clone and RTS/frag m entation threshol d. Also included are other sy stem rela ted [...]

  • Seite 12

    12 Status  Click on t he Status link under the M anageme nt menu. The device status page is also displayed o nce you have logged in. This includes details about the system uptime and firmware, LAN IP address and MAC address and the wireless settings such as the radio status, MAC address, SSID, R F channel, as we ll as WAN setti ngs.[...]

  • Seite 13

    13 Statistics  Click on the Statistics link on the navigation drop-down menu. This page displays the trans m itted and received packet statistics of the wired and wireless interface. Click on the R efresh button to refresh the statis tics. Dynamic DNS  Click on the D DNS link on the navigation drop-down menu. This feature allows y o u to main[...]

  • Seite 14

    14 Time Zone Setting  Click on the T ime Zone Setting link i n the n avigation m enu. This feature allows you to configure, update, and m aintain the correct time on t he device’s internal syste m clock as well as configure the time zone. The date a nd t ime of the device can be configured m anua lly or by sy nchr onizing with a time serve r. [...]

  • Seite 15

    15 Denial of Service (DoS)  Click on the Denial of Service li nk in the navigation me nu . T his is a s ecurity f eatu re that blocks in trusions from th e Internet that may disrupt the n etwork service .  Enable DoS protection : P lace a check in this box to enable t he D oS features. Yo u may also enable the othe r DoS protection features l[...]

  • Seite 16

    16 Log  Click on the Log link on the navigation drop-do wn menu. Logs display a list of events that are triggered on the Ethernet and W ireless interface. This log can be referred when an unknown error o ccurs on the sy s tem or w hen a report nee ds to be se nt to the technica l support depart ment for debugging purposes.  Enable Log : Place[...]

  • Seite 17

    17 Upgrade Firmware  Click on the Upgra de Firmware link on the navigation d rop-down menu. Thi s page allows yo u t o upgrad e the f irmware of the device in order to improve the functionality and perfor mance.  Ensure t hat y ou have downloaded the app r opriate firmware fro m the vendor’s website. C onnect the device to your PC u sing an[...]

  • Seite 18

    18 Restore the Confi guration from a File  Click o n the Sa ve / Reload Settings l ink on t he navigation drop-down m enu. This option a llows you to restore a backup configuratio n from a file to t he device. C lick on the Browse bu tton to select the file and then clic k on Upload butt on.  A page indicating the r eloading process will be d[...]

  • Seite 19

    19 A dmini strator Settings  Click on the Password link on the navigation drop-down menu. This page allows you to configure th e password to acc ess this device from the web-br owser. Note : The de fault user name a nd password of t he device is adm in  Use r Nam e : Specify a user n ame that will be us ed to connec t to the device.  New P[...]

  • Seite 20

    20 L A N Settin gs – Static IP  Click on the LAN Interface link on t he naviga tion drop-down m enu. This f eature allows y ou to co nfigu re the LAN interface using a static IP address or as a DHCP server/client . This IP addres s is also used to ac cess the web-base d interface.  IP Address: Enter an IP address fo r this device.  Subne[...]

  • Seite 21

    21 L A N Settin gs – DHC P Client  Click o n the LAN l ink on the navigation drop-down m enu . This feature a llows y ou to configure t he LAN interface using a static IP address or as a DHCP server/client. This IP addr ess is also used to access the web-ba sed interface.  DHCP: If you select DHCP , you are not required to enter the rest of[...]

  • Seite 22

    22 L A N Settin gs – DHC P Server  Click o n the LAN l ink on the navigation drop-down m enu . This feature a llows y ou to configure t he LAN interface using a static IP address or as a DHCP server/client. DHCP s tands for Dyna m ic Host Configu ration Prot ocol. The DHCP sec tion is w here you confi gure the built-in DHCP Server to assign IP[...]

  • Seite 23

    23 W A N Setti ngs – Static IP  Click on the WA N lin k on the navigation drop -down menu. This fe ature allows you to configure the W AN interface usi ng a static IP add ress, DHCP Client , PPoE, or PPTP.  W A N A ccess Type: S elect Static IP from the drop -down list. This ty pe of connec tio n is used when your ISP has provided you a d e[...]

  • Seite 24

    24  Enable I Psec pass t hrough on VPN connectio n : Place a check in this box to enable the pass through of P PTP packets on a VPN connection.  Enable I Psec pass t hrough on VPN connectio n : Place a check in this box to enable the pass through of L2TP packets on a V PN connection.  Click on the A pply Change s to save the cha nges. W A [...]

  • Seite 25

    25  Enable uPNP : Place a check in this box t o enable UPnP. It is reco m mended to enable this feat ure as it’s used by several applica tions.  Enable PING Ac cess on WAN : Place a check in this box if yo u would like the d evi ce to be pinged fr om the W AN side (ISP).  Enable W eb Sever Access on WAN : Place a check in thi s bo x if t[...]

  • Seite 26

    26  Connection Type: Select Continuous (al ways online), Connect on Demand (connect to the ISP only when you click on a website), or Manual (conn ect to the ISP only when y ou click on a ‘ Co nnect ’ button) fro m the drop-down list.  Idle Time: The PPPoE service can automatically d isconnect if the connection is idle. Specify the number [...]

  • Seite 27

    27  W A N Access T ype: Select PPTP from t he drop-down list. This type of connection is used when y our ISP has provided you a dedicated IP address.  IP Address: Enter an IP address fo r this device, which is assigned by your ISP.  Subnet Mask: Enter the subnet mask for this I P a ddress, which is a ssigned b y your ISP.  Default Gate [...]

  • Seite 28

    28 Wireless  Click on the TCP/IP Settings link on t he navigation d rop-down m enu. You w ill then see five options. Basic Settings, Advanced Settings, Security , Access Control, a nd WDS Settings. Each o ption is described below. Wireless Basic Se tting s  Click on the Basic Se ttings link on the navigation drop-dow n menu. These options all[...]

  • Seite 29

    29  Show Active Clients : Click on t his button to view a list of cl ien ts that are as sociate d with this device .  Click on the A pply Change s to save the cha nges. Wireless A dvanced Settings  Click on the Advanced Settings link on the navigation drop-down menu. These options allow you to con figure the authen tication ty pe, fragment[...]

  • Seite 30

    30  Beacon Interval : Beacons are packets s ent b y a wireless A ccess Point to synchronize wireless d evices. Specify a Beacon Period value between 20 and 1 024. The default v alu e is set to 100 m illiseconds.  Data Rate : S elect a transmission rate from t he drop-down list. It is recommended to use the auto option.  Preamble Type: Sele[...]

  • Seite 31

    31 Wireless Security  To protect your privacy this mode supports several types of wireless security : W EP WPA, W PA2, and W PA-Mixed. W EP is the original wireless encryption standard. WPA provides a high er level of security. The following section describes the security configuration i n detail. Wireless Security - Disabled .  Encryption : [...]

  • Seite 32

    32  Encryption : Select WEP from the drop-down list in order to enable W EP security and then clic k on the Set W EP key button. .  Key Length : Selec t a 64-bit or 128 -bit WEP key length from the drop -do wn list.  Key Format: Select a key format such as HEX or ASC II from the drop-do wn list.  Encryption Key: You may use up to four d[...]

  • Seite 33

    33 Wireless Security – WP A / WP A 2-Mixed  Select WPA o r WPA2-Mixed fro m the drop-down list if your wireless network uses WPA encry ption. WPA (Wi-Fi Protected Acce ss) was designed to improve upon t he security f eatures of W E P ( W ired Eq uivalent Privacy ). The techn ology is des igned to work with existing Wi-Fi produc ts that have b [...]

  • Seite 34

    34  Click on the A pply Change s to save the chan ges. Wireless A ccess Control  Click on the Access Control link on t he nav igation drop-down m enu. The MAC address filter section can be used t o filter network access by m achines b ased on t he unique M AC add resses of thei r netwo rk adapter (s). It is m ost u seful t o prevent unauthori[...]

  • Seite 35

    35 WDS (Wireless Di stribution Sys tem) Click on the WD S link on the navigation d rop-down m enu. The W ireless D istributio n System feature configures this device as a repeate r and therefore extends the range/cove r age a rea of the wireless network.  Enable WDS : W h en WD S is enabled, this access point f unctio ns a s a w ireless repeater[...]

  • Seite 36

    36 WDS Security  Click on the Set Security button to configure one of the security o ptions for the W DS. Options available are W EP, W PA and W PA2, and you m ust configure the same security setting on each Access Point linked w ith this one. WDS Security - None  Encryption : Select None fro m the drop-dow n list in order to disable wireless[...]

  • Seite 37

    37  Encryption : Select a 64-bit or 128-bi t WEP encryption from the drop-dow n list.  Key Format: Select a key format such as HEX or ASC II from the drop-do wn list.  WEP Key: Specify the WEP key  Click on the Apply Changes to save the changes and then click on the Close button. WDS Security – WP A (TKIP), WP A 2 (A ES )  Select W[...]

  • Seite 38

    38  Encryption : S elect a W PA or WPA2 encryption f rom the drop-down list. The encry pti on algorithm used to secure th e data comm unic ation. TKIP ( Te mporal Key Integrity Protocol) provides p er-pac ket k ey generation and is based o n WEP. AES (Advanced Encryption Standard) is a very secure block b ased en cryp tion. No te tha t, if the b[...]

  • Seite 39

    39 Firewall  Click on the F irewall lin k on the navigation drop-down menu. You will then see six options. Port filtering, IP filtering, MAC filtering, Port filtering, URL f iltering, DMZ. Each option is described below. Port Filtering  Select Port Filtering from the drop-down list This feature is used to r estrict certain types of da ta p ac[...]

  • Seite 40

    40  You m ay place a check in the b ox on under t he Select column and then click on Delete Selected to re m ove t he selected entry . You may also click on Delete All to delete all the fil tering entries. IP Filtering  Select IP Filtering from the drop-down list. This feature is used to restric t certain IP address from using ce rtain protoc[...]

  • Seite 41

    41 MAC Filtering  Select MAC Filtering fr om the drop -down list. This feature is used to r estrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting y our network.  Enable MAC Filtering: Place a ch eck in this box to enable this featu re.  MAC Address: Enter the MAC address of the devi[...]

  • Seite 42

    42 Port Forwarding  Select Port For w arding from the drop-down lis t. This fe ature is used to automatically redirect common network services to a sp ecifi c m achine behind t he NAT f irewa ll. These settings are only necessary if you wish to host some sort of server like a web server or email server on the private local network b ehind the NA[...]

  • Seite 43

    43 URL Filtering  Select URL Filtering from the drop-down l ist. T his is a type of pa rental control feature used to restrict certain websites for m being accessed through y our network. These filters ca n be used fo r securing and restr icting your ne twork.  Enable URL Filtering: Place a chec k in this box to enable this feature.  URL A[...]

  • Seite 44

    44 DMZ  Select DMZ fro m the drop-do wn lis t. A demilitarized zone i s u sed to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contai ns devices accessib le to Internet t raffic, such as web, FTP, email an d DNS servers.  Enable DMZ: Place a check in this box to enable [...]

  • Seite 45

    45 Appendix A – Sp ecific ations St andards IEEE802.1 1b/g, IEEE802.1x , IEEE8 02.3, IEEE802.3u Wi-Fi data speed IEEE 802.1 1b: 1 1 /5.5/2/1Mbps IEEE 802.1 1g: 54/48 /36/24/18/12/9/6Mbps Compatibility IEEE 802.1 1g/ IEEE 802.1 1b Power Requirements Power Supply: 90 to 240 VDC 10 (depends on different countries) Device: 12 V/ 1.3A St atus LEDs 4*L[...]

  • Seite 46

    46 Appendix B – FCC Interference Statement Federal Communication Commission Inter ference St atement This equipment has been test ed and f ound to c omply w ith the limits for a Class B digital device, purs uant t o Part 15 of the FCC R ules. Thes e limits are des igned t o provide reasonable protection against harmful int erference i n a res ide[...]

  • Seite 47

    47 Industr y Ca nada statement: This de vice c omplies with RSS- 210 of the I ndustry Ca nada R ules. Operatio n is subject to the following t wo conditions : (1) This d evice may no t cause harmful i nterf erence, and ( 2) this d evice must accept any interferenc e received, including interf erence that ma y cause undesire d operation. IMPORT ANT [...]