LevelOne WBR-3405TX Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung LevelOne WBR-3405TX an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von LevelOne WBR-3405TX, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung LevelOne WBR-3405TX die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung LevelOne WBR-3405TX. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung LevelOne WBR-3405TX sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts LevelOne WBR-3405TX
- Den Namen des Produzenten und das Produktionsjahr des Geräts LevelOne WBR-3405TX
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts LevelOne WBR-3405TX
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von LevelOne WBR-3405TX zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von LevelOne WBR-3405TX und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service LevelOne finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von LevelOne WBR-3405TX zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts LevelOne WBR-3405TX, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von LevelOne WBR-3405TX widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    LevelOne WBR -3405TX 11g Wireless AP R outer User`s Manual[...]

  • Seite 2

    Contents 1. Overview ................................................................................................................ 4 1.1 Product Feature ...................................................................................... 4 1.2 System Requirements............................................................................. 4 1.[...]

  • Seite 3

    3.5.4 DMZ ............................................................................................. 42 3.5.5 Firewall Rule ................................................................................ 43 3.6 Management ......................................................................................... 46 3.6.1 SNMP ....................[...]

  • Seite 4

    1. Overview Congratulations on the purchase of your new LevelOne W BR-3405TX, 1 1g W ireless AP Router . The LevelOne 1 1g W ireless AP Router is a multi-func tion device. Before you install and use this product, please read this manual carefully for fully exploiting the functions of this product. 1.1 Pr oduct Feature ● Compliance with IEEE 802.1[...]

  • Seite 5

    ● Enables remote access to corporate ne twork information, for example e-m ail and the company home page 2. Getting Start 2.1 Know the 1 1g W ir eless Router -WBR-3405TX Ports: 5[...]

  • Seite 6

    LEDs: LED Status Description On Indicates proper connection to power supply. Power OFF The unit is not receiving power Status On Indicates that the device is connected to the WLAN. Indicates connection to the WAN port WAN Blinking Data transmission. Link is established Blinking Packet transmit or receive activity WLAN — No Link activity Indicates[...]

  • Seite 7

    Now, the main menu screen is popup. 7[...]

  • Seite 8

    2.2.2 Quick Setup with W izard Setup wizard is provided as the part of th e web configuration u tility. You can sim ply follow the step-by-step process to get your wireless router configuration ready to run in 6 easy steps by clicking on the “ Wizard ” button on the function menu. The following screen will appear. Please click “ Next ” to c[...]

  • Seite 9

    Step2: Choose your time zone Select your time zone from the drop down list. Please click “ Next” to continue. Step 3: Set LAN connection and DHCP server Set your IP address and mask. The default IP is 192.168.1.1. If you like to enable DHCP, please click “ Enabled ”. DHCP enabled is able to automatically assign IP addresses. Please assign t[...]

  • Seite 10

    Step 4: Set Internet connection Select how the router will set up the Intern et connection : Obtained IP automatically; Fixed IP address; PPPoE to ob tain IP automatica lly; PPPoE with a fi xed IP address; PPTP . Obtain IP automatically (DHCP client) : If you have enabled DHCP server , choose "Obt ain IP automatically (DHCP client)" to ha[...]

  • Seite 11

    PPPoE to obtain IP automatically: 11[...]

  • Seite 12

    PPPoE with a fixed IP address: 12[...]

  • Seite 13

    PPTP: 13[...]

  • Seite 14

    Step 5: Set Wireless LAN connection Click “enable” to enable wireless LAN. If you enable the wireless LAN, type the SSID in the text box and select a communi cations channel. The SSID and channel must be the same as wireless devices attemp ting communication to the router . Step 6: Restart The Setup wizard is now completed. The ne w settings wi[...]

  • Seite 15

    3. Configuration 3.1 LAN Setting The screen enables you to configure the LAN & DHCP Server , set W AN param eters, create Administrator and User passwords, and set the local time, time zone, and dynamic DNS. 3.1.1 LAN & DHCP Server This page enables you to set LAN and DHCP properties, such as the host name, IP address, subnet mask, and doma[...]

  • Seite 16

    mask is 255.255.255.0. DHCP Server: Enables the DHCP server to allow the router to automatically assign IP addresses to devices connecting to the LAN. DHCP is enabled by default. All DHCP client computers are listed in the table at the bottom of the screen, providing the host name, IP address, and MAC address of the client. S tart IP: T ype an IP a[...]

  • Seite 17

    Connection T ype: Select the connection type, eith er DHCP client, Fixed IP or PPPoE from the drop-down list. W AN IP: Select whether you want to specify an IP address manually , or want DHCP to obtain an IP address automatically . When Specify IP is selected, type the IP address, subnet mask, and default gateway in the text boxes. Y our ISP will p[...]

  • Seite 18

    3.1.3 Password This screen enables you to set administra tive and user passwords. These passwords are used to gain access to the router interface. Administrator: T ype the password the Administrator will use to log in to the system . The password must be type d again for confirmation. 3.1.4 T ime This screen enables you to set the time and da te fo[...]

  • Seite 19

    Local T ime: Displays the local time and date. Ti m e Z o ne : Select your time zone fr om the drop-down list. Daylight Saving: Enables you to enable or disable daylight saving time. When enabled, select the start and end date for daylight saving time. 19[...]

  • Seite 20

    3.1.5 Dynamic DNS This allows you to set the DNS server . DDNS: Enable or disable DDNS setting by clicking the blanks. Server Addr ess: Entering the Server Address. Fo r example, if you would like to apply the address at dyndns.org, pl ease entering “m embers.dyndns.org”.. Host Name: Entering the address you applied before. For example: user .d[...]

  • Seite 21

    3.2 W irel ess This section enables you to set wireless communications parameters for the router's wireless LAN feature. 3.2.1 Basic This page allow you to enable and disabl e the wireless LAN function, create a SSID, and select the channel fo r wireless communications. Enable/Disable: Enables and disables wi reless LAN via the router . SSID: [...]

  • Seite 22

    3.2.2 Authentication This screen enables you to se t authentication type for secu re wireless communications. Open System allows public access to the router v ia wireless communications. Shared Key requires the user to set a WEP ke y to exchange data with other wireless clients that have the s ame WEP key . Mode: Select the level of en cryption you[...]

  • Seite 23

    23[...]

  • Seite 24

    3.2.3 802.1X There are three essential components to th e 802.1x infrastructure: (1) Supplicant, (2) Authenticator and (3) Server . The Router serves as an Authenticator , and the EAP methods used must be supported by the back end Radius Server . The 802.1x security supports both MD5 and TLS Extensive Authentication Protocol (EAP). Please follow th[...]

  • Seite 25

    3. Enter the IP address of, Port and Shar ed Secret used by the Secondary Radius Server . ( Click “ Help ” to get interpr etation for Encryption Key and Radius Server . ) 4. Click “ Apply ” button for the 802.1x settings to take effect after W ireless router reboots itself. Note: As soon as 802.1X security is enabled, all the wireless c lie[...]

  • Seite 26

    3.3 Advanced This screen enables you to confi gure advanced wireless functions. Beacon Interval: T ype the beacon interval in the text box. Y ou can specify a value from 1 to 1000. The default beacon interval is 100. R TS Thr eshold: T ype the R TS (Request-T o-Send) threshold in the text box. This value stabilizes data flow . If data flow is irreg[...]

  • Seite 27

    3.3 S tatus This selection enables you to view the status of the r outer LAN, W AN connections, and view logs and statistic s pertaining to connections and packet transfers. 3.3.1 Device Information This screen enables you to view the router LAN, W ire less and W AN configuration. Firmwar e V ersion: Displays the latest build of th e router firmwar[...]

  • Seite 28

    status, IP address, subnet ma sk, default gateway , and DNS. Click DHCP Release to release all IP addresses assi gned to client stations connected to the W AN via the router . Click DHCP Renew to reassign IP addresses to client stations connected to the W AN. 3.3.2 Log This screen enables you to vi ew a running log of router sy stem statistics, eve[...]

  • Seite 29

    Note: Displays the IP address of the communication 3.3.3 Log Setting This screen enables you to se t router logging parameters. SMTP Server: T ype the SMTP server address for the email that the log will be sent to in the next field. Send to: T ype an email address for the log to be sent to. Click Email Log Now to immediately send the current log. S[...]

  • Seite 30

    3.3.4 S tatistic This screen displays a table that show s the rate of packet transmission via the rou ter LAN and W AN ports (in bytes per second). Click Reset to erase all statistics and be gin logging statistics again. 30[...]

  • Seite 31

    3.3.5 W ireless This screen enables you to vi ew information about wireless devices that are connected to the wireless router . Connected T ime: Displays how long the wireless device has been connected to the LAN via the router . MAC Address: Displays the dev ices wireless LAN interface MAC address. 31[...]

  • Seite 32

    3.4 Routing This selection enables you to set how the ro uter forwards data: S tatic and Dynamic. Routing T able enables you to view the inform ation created by the router that d isplays the network interconnection topology . 3.4.1 S tatic It enables you to set parameters by which the router forwards data to its d estination if your network has a s[...]

  • Seite 33

    Add: Click to add the configuration to the stat ic IP address table at the bottom of the page. Update: Select one of the entries in the static IP address table at the bottom of the page and, after changing parameters, click Update to confirm the changes. Delete: Select one of the entries in th e static IP address table at th e bottom of the page an[...]

  • Seite 34

    3.4.3 Routing T a ble This screen enables you to view the routing table for the r outer . The routing table is a database created by the router that disp lays the network interconnection topology . Network Addr ess: Displays the network IP address of the connected node. Network Mask: Displays the network (subnet) m ask of the connected node. Gatewa[...]

  • Seite 35

    3.5.1 Filters Using filters to deny or allow the us ers to access. Five types of filters to select: MAC, URL blocking, IP , Protocol filter and Domain blocking. MAC Filters: MAC Filter: Enables you to allow or deny Intern et access to users within the LAN based upon the MAC address of their network interface. Click the radio button nex t to Disable[...]

  • Seite 36

    MAC Address: T ype the MAC address of the user's network interface. Add: Click to add the user to the list at the bottom of the page. Update: Click to update information for the user , if you have changed any of the fields. Delete: Select a user from the table at the botto m of the list and click Delete to remove the user profile. New: Click N[...]

  • Seite 37

    IP Filters: This screen enables you to define a mini mum and maxim um IP a ddress range filter; all IP addresses falling in the range are not allowed Internet access. The I P filter profiles are listed in the tabl e at the bottom of the page. ( Note : Click anywhere in the item. Once the line is selecte d, the fields au tomatically load the item&ap[...]

  • Seite 38

    Domain Blocking: Y ou could specify the domains which allow users to access or deny by clicking one of the two items. Also, add the sp ecified domains in the text box. 38[...]

  • Seite 39

    Protocol Filters: This screen enables you to allow a nd deny access based upon a communications protocol list you create. The protocol f ilter profiles are lis ted in the table at the bottom of the page. Note: W hen selecting items in the table at th e bottom, click anywhere in the item . The line is selected, and the fields automatica lly load the[...]

  • Seite 40

    3.5.2 V irtual Server This screen enables you to create a virtual serv er via the router . If th e router is set as a virtual server , remote users requesting W eb or FTP services through the W AN are directed to local servers in the LAN. The r outer redirects the reque st via the protocol and port numbers to the correct LAN server . The V irtual S[...]

  • Seite 41

    Update: Click to update information for the virt ual server if you ha ve selected a list item and have made changes. Delete: Select a list item and click Delete to remove the item from the list. New: Click New to erase all fields and enter new information. 3.5.3 Special AP This screen enables you to specify special a pplications, such as games, tha[...]

  • Seite 42

    ● Protocol: S elect the protocol (TCP , UDP , or ICMP) that can be used to access the application. ● Port Range: T ype the port range that can be used to access the application in the text boxes. Incoming: Defines which incoming communicati ons users are permitted to connect with. ● Protocol: S elect the protocol (TCP , UDP , or ICMP) that ca[...]

  • Seite 43

    Enable: Click to enable or disable the DMZ. DMZ Host IP: T ype a host IP address for the DMZ. The computer with this IP address acts as a DMZ host with unlimited Intern et access. Apply: Click to save the settings. 3.5.5 Fir ewall Rule This screen enables you to set up the fire wall. The router prov ides basic firewall functions, by filtering a ll [...]

  • Seite 44

    Enable: Click to enable or disabl e the firewall rule profile. Name: T ype a descriptive name fo r the firewall rule profile. Action: Select whether to allow or deny packets that conform to the rule. Inactive T imeout: T ype the number of seconds of network inactivity that elapses before the router refuses the incoming packet. Source: Defines the s[...]

  • Seite 45

    Delete: Select a list item and click Delete to remove the item from the list. New: Click New to erase all fields and enter new information. Priority Up: Select a rule from the list and click Priority Up to inc rease the priority of the rule. Priority Down: Select a rule from the list and click Priority Down to decrease the priority of the rule. Upd[...]

  • Seite 46

    3.6 Management Management enables you to set up SNMP and Remote Management feature. 3.6.1 SNMP This screen enables you to configure SNMP . Enabled/Disabled: Click to enable or disable SNMP . System Name: Displays the name given to the router . System Location: Displays the location of the ro uter (normally , the DNS name). System Contact: Displays [...]

  • Seite 47

    3.6.2 Remote Management This screen enables you to set up remote management. Using rem ote management, the router can be configured through the W A N via a W eb browser . A user name and password are required to perform remote managem ent. HTTP: Enables you to set up HTTP access for remote management. ● Enable: Click to enable or disable H TTP ac[...]

  • Seite 48

    IPSec: Enables you to set up IPSec access for remote management. IDENT : Default is closed. This en ables you to set port 1 13 stealth. 3.7 T ools This page enables you to restart the system, sa ve and load dif ferent settings as profiles, restore factory default s etti ngs, run a setup wizard to configure router settings, upgrade the firmware, and[...]

  • Seite 49

    3.7.2 Settings This screen enables you to save your settings as a profile and load profiles for dif ferent circumstances. Y ou can also load the factory default settings, and run a setup wizard to configure the rout er and router interface. Save Settings: Click to save the curr ent configuration as a profile that you can load when necessary . Load [...]

  • Seite 50

    3.7.3 Firmware This screen enables you to keep the router firmware up to date. Please follow the below instructions: 1. Download the latest firmware from the ma nufacturer's W eb s ite, and save it to your disk. 2. Click Br owse and go to the location of the downloaded firmware file. Select the file and click Upgrade to update the firmwa re to[...]

  • Seite 51

    3.7.4 Ping T est The ping test enables you to determine whethe r an IP address or host is present on the Internet. T ype the host name or IP address in the text box and click Ping. 4. Glossary Access Point An interview networking device that seamlessly connects wired and wireless networks Authentication Authentication refers to the verificati on of[...]

  • Seite 52

    DHCP DHCP (Dynamic Host Configuration Protoc ol) software automatically assigns IP addresses to client stations logging onto a TCP/IP network, which eliminates the need to manually assign permanent IP addresses. DNS DNS stands for Domain Name System. DNS converts m achine names to the IP addresses that all machines on the net have. It translates fr[...]

  • Seite 53

    HTTP HTTP (HyperT ext T ransport Protocol) is the communications protocol used to connect to servers on the W orld W ide W e b. HTTP establishes a connection with a W eb server and transmits HTML pages to client browser (for example W indows IE). HTTP addresses all begin with the pr efix 'http://' prefix (for exam ple, http://www .yahoo.c[...]

  • Seite 54

    NA T NA T (Network Address T ranslation - also known as IP m asquerading) enables an organization to present itself to the Inte rnet with one address. NA T converts the address of each LAN node into one IP a ddress for the Internet (and vice v ersa). NA T also provides a certain amount of secu rity by acting as a firewall by keeping individual IP a[...]

  • Seite 55

    Protocol A protocol is a rule that gove rns the communication of data. RIP RIP (Routing Information Protocol) is a rout ing protocol that is integrated in the TCP/IP protocol. RIP finds a route that is based on the sm allest number of hops between the source of a pack et and its destination. RTS R TS (Request T o Send) is a signal sent fr om the tr[...]

  • Seite 56

    56 information when accurate delivery isn't n ecessary (for example, real-tim e video and audio where packets can be dumped as ther e is no time for retransm itting the data). V irtual Servers V irtual servers are client serv ers (such as W eb servers) that share resources with other virtual servers (i. e., it is not a dedicated server). W AN [...]