LevelOne WBR-5400 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation LevelOne WBR-5400. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel LevelOne WBR-5400 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation LevelOne WBR-5400 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation LevelOne WBR-5400 devrait contenir:
- informations sur les caractéristiques techniques du dispositif LevelOne WBR-5400
- nom du fabricant et année de fabrication LevelOne WBR-5400
- instructions d'utilisation, de réglage et d’entretien de l'équipement LevelOne WBR-5400
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage LevelOne WBR-5400 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles LevelOne WBR-5400 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service LevelOne en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées LevelOne WBR-5400, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif LevelOne WBR-5400, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation LevelOne WBR-5400. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    1 LevelOne WBR -5400 MIMO Wireless 1W ,4L Broadband R outer U s e r ` s M a n u a l V er 1.00-0512[...]

  • Page 2

    2 Copyright The contents of th is publication may not be reproduced in any par t or as a whole, stored, transcribed in an information retrieval system, translated into an y language, or transmitted in any form or by an y means, mechanical, magnetic, electr onic, optical, phot ocopying, ma nual, or otherwise, wit hout the prior written permission. T[...]

  • Page 3

    3 T able of Contents CHAPTER 1 INTRODUCTION ............................................................................ 5 F UNCTIONS AND F EA TURES ........................................................................................ 5 P ACKING L IST ...............................................................................................[...]

  • Page 4

    4 APPENDIX B 802.1X SETTING ......................................................................... 76 APPENDIX C RESET T O F A CTOR Y DEF AUL T ............................................. 82 R ESET T O F ACTOR Y D EF AUL T ................................................................................... 82[...]

  • Page 5

    5 C C C h h h a a a p p p t t t e e e r r r 1 1 1 I I I n n n t t t r r r o o o d d d u u u c c c t t t i i i o o o n n n Congratulat ions on your purchase of this out standing LevelO ne WBR-5400, 1 1g MIMO W ireless Broadband R outer . This product is specifically designed for Sm all Office and Home Of fice needs. It provides a complete SOHO solut[...]

  • Page 6

    6 Wir eless functions  High speed for wireless LAN connection Up to 54Mbps data rate by incorporatin g Orthogonal Frequency Division Multiplexin g (OFDM).  Roaming Provides seamless roam ing within the IE EE 802.1 1b (1 1M) and IEEE 802.1 1g (54M) WLAN infrastructure.  IEEE 802.1 1b co mpatible (1 1 M) Allowing inter-operation among multip[...]

  • Page 7

    7 When SPI Mode is enabled, the rou ter will check every incoming packet to detect if this packet is valid.  DoS Attack Detection Supported When this feature is enabled , the router will detect and log the Do S attack comes from the Internet. Advanced functions  System time Supported Allow you to synchronize syste m time with network time ser[...]

  • Page 8

    8 C C C h h h a a a p p p t t t e e e r r r 2 2 2 H H H a a a r r r d d d w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n 2.1 Panel Layout 2.1.1. Fr ont Panel Figure 2-1 Front Panel LED: LED Function Color S tatus Description POWER Power indication Green On Power is being applied to this product. ST A[...]

  • Page 9

    9 2.1.2. Rear Panel Ports: Port Description PWR(DC) Power i nlet W AN the port where you will co nnect your cable (or DSL) modem or Ethernet router . Port 1-4 the ports where you will connect network ed computers and other devices.[...]

  • Page 10

    10 2.2 Procedur e for Hardwar e Installation 2. Decide where to place your Wir eless Broadband Router Y ou can place your W BR-5400, W ireless Broadband Rout er , on a desk or other flat surface, or you can mount it on a wall. For optim al performance, place your W ire less Broadband R outer in the center of your office (or y our home) in a locati [...]

  • Page 11

    11 C C C h h h a a a p p p t t t e e e r r r 3 3 3 N N N e e e t t t w w w o o o r r r k k k S S S e e e t t t t t t i i i n n n g g g s s s a a a n n n d d d S S S o o o f f f t t t w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n T o use WBR-5 400 correctly , you have to properly configur e the netwo[...]

  • Page 12

    12 C C C h h h a a a p p p t t t e e e r r r 4 4 4 C C C o o o n n n f f f i i i g g g u u u r r r i i i n n n g g g W W W i i i r r r e e e l l l e e e s s s s s s B B B r r r o o o a a a d d d b b b a a a n n n d d d R R R o o o u u u t t t e e e r r r This product prov ides W eb based configuratio n scheme, that is, configuring b y your W eb bro[...]

  • Page 13

    13 4.1 S tart-up and Log in Activate your brow ser , and disable the proxy or ad d the IP addr ess of this produc t into the exceptions . Then, type this pr oduct’ s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.123.254 . After the connection is established, you will see the we b [...]

  • Page 14

    14 4.2 S tatus This option p rovides the functi on for observing this pr oduct’ s working stat us: A. W AN Port S tatus. If the W AN port is assigned a dynam ic IP , there may appear a “ Renew ” or “ Release ” button on the Sidenote column. Y ou can click this button to renew or release IP man ually . B. Statistics of W AN: en ables you t[...]

  • Page 15

    15 4.3 Wiz ard Setup W izard will guide you through a basic configuration pro cedure step by step.Press ”Next >” Setup W izard will automatically det ect your W AN type. If W AN type can not be detected successfully , “Dynamic IP Address” will be assigned.[...]

  • Page 16

    16 Setup Wi zard - Select W AN T ype : For detail settings, please refer to 4.4. 1 primary setup. For the rest of the steps, Setup W izard will guide you through a basic configuration. .Press ”Next >”[...]

  • Page 17

    17 4.4 Basic Setting[...]

  • Page 18

    18 4.4.1 Primary Setup – W AN T ype, V irtual Computers Press “Change”[...]

  • Page 19

    19 This option is primary to enable this product to work properly . The settin g items and the web appearance de pend on the W AN type. Choose correct W AN type before you sta rt. 1. LAN IP Addr ess : the local IP address of this device. The computers o n your network m ust use the LAN IP address of your product as their Defa ult Gateway . Y o u ca[...]

  • Page 20

    20 4.4.1.5 PPTP 1. My IP Address and My Subnet Mask: the pr ivate IP address and subn et mask your ISP assigned to you. 2. Server IP Address: the IP address of the PPTP server . 3. PPTP Account and Passwo rd: the account an d password your ISP assigned to you. If you don'twant to change the password, keep it empty . 3. Con nection ID: optional[...]

  • Page 21

    21 4.4.1.6 L 2TP 1. IP Mode: The IP Mode assign ed by your ISP. Y ou can select eit her Static IP Address or Dynamic IP address. 2. My IP Addr ess and My Subnet Mask: the priv ate IP address and sub net mask your ISP assigned to you when your IP Mode is Static IP Address. 3. Server IP Address: the IP a ddress of the L2TP server . 4. L2TP Accoun t a[...]

  • Page 22

    22 4.4.1.7 V irtual Computers V irtual Computer enab les you to use the original NA T feature, and allows you to setup the one-to-one mapping of multiple global IP address and local IP address. • Global IP: Enter the global IP address assigned by y our ISP . • Local IP: Enter th e local IP addr ess of your LAN PC co rresponding to th e global I[...]

  • Page 23

    23 4.4.2 DHCP Server Press “Mor e>>”[...]

  • Page 24

    24 The settings of a TCP/IP en vironment include host IP , Subnet Mask, Gateway , and DNS configuration s. It is not easy to manually conf igure all the computers and devices in your network. Fortunately , DHCP Server provid es a rather sim ple approach to ha ndle all these settings. This product su pports the function of DHCP server . If you ena b[...]

  • Page 25

    25 W ireless settings allow you to set the wireless configuration items. 1. Wir eless function : Enab le or disable wireless fun ction. 2. Network ID (SSID) : Network ID is used for identifyi ng the Wireless LAN (WLAN). Client stations can roam freely over this product and ot her Access Points that have the same Network ID. (The factory se tting is[...]

  • Page 26

    26 802.1X Se tting 802.1 X Check Box wa s used to switch t he function of t he 802.1X. When the 802. 1X function is enabl ed, the W ireless user must authenticate to t his router first to use the Network service. RADIUS Server IP IP address or t he 802.1X server’ s domai n-name. RADIUS port The port setting of 802.1X server RADIUS Shared Key Key [...]

  • Page 27

    27 WP A-PSK 1.Encryption. There are two encr yption methods, TK IP and AES. 1. Select Preshare Key Mode 2. Fill in the key, Ex 12345678 Pre-share Key Mode: Either ASCII or HEX can be selected. Pre-share Key: Please input either 32 ASCII characte rs or 64 Hexadecimal digit s as Pre-share key .[...]

  • Page 28

    28 WP A Check Box was used to switch the fun ction of the WP A. When the WP A function is enabled, the W ireless user must authenticate to t his router first to use th e Network service. RADIUS Server IP address or t he 802.1X server’ s domai n-name. RADIUS Shared Key Key value shared by the RADIUS serve r and this ro uter . This key value is con[...]

  • Page 29

    29 WP A2-PSK(AES) : Accept WP A2 clients only a nd Pre-share key (encryption key) must be entere d manually . Y ou can input either 32 ASCII ch aracter s or 64 Hexadeci mal digits as Pre -share key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII charact ers or 64 Hexa decimal digits a[...]

  • Page 30

    30 WP A2(AES) : Accept WP A2 clients only and work simultaneously with RADIUS Server . The encryption key is got from RA DIUS Server dynamically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS server and this router . This k[...]

  • Page 31

    31 WP A-PSK / WP A2-PSK : Accept WP A1 or WP A2 clients to co nnect simultaneously and Pre-share key (encrypt ion key) must be entered manua lly . Y ou can input either 32 ASCII characters o r 64 Hexadecimal digits as Pre-s hare key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII char[...]

  • Page 32

    32 WP A1/WP A2 : Accept WP A1 or WP A2 clients to connect simultaneously and work simultaneously with RADIUS Server . The encryption key is got from RADIUS Server dy namically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS [...]

  • Page 33

    33 4.4.4 Chan ge Password Y ou can change Password here. W e strong ly recommend y ou to change th e system password for security reason.[...]

  • Page 34

    34 4.5 Forwarding Rules[...]

  • Page 35

    35 4.5.1 V irtual Server This product’ s NA T firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisi ble to the outside wo rld. If you wish, you can make som e of them accessible by enabling the V irtual Server Mapping. A virtual server is defined as a Public Port , and all requests to this[...]

  • Page 36

    36 The Private port is used for multi-comput ers, which might use the same service. For example, if you setup thr ee W eb server(80) in your LAN, which are 192.168.1 23.7, 192.168.1 23.10, and 19 2.168.123.77. Y ou can assign di fferent p ublic port t o diffe rent IP . The public port can be set at any port. But please must avoid the confliction. A[...]

  • Page 37

    37 4.5.2 Special AP Some applicat ions require m ultiple connections, l ike Internet games, V ideo conferenci ng, Internet telephony , etc. Because of the firewall function, thes e a pplications cannot work with a pure NA T router . The Special Appl ications feature allows som e of these applicatio ns to work with this produc t. If the mechanism of[...]

  • Page 38

    38 4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the pr otection of firewall. It a llows a computer to be exposed to unre stricted 2-way communi cation for Internet gam es, V ideo conferenci ng, Internet telephony a nd other special applications. NOTE: This fe ature should be used only whe n needed[...]

  • Page 39

    39 4.6 Security Settings[...]

  • Page 40

    40 4.6.1 Packet Filter Packet Filter enables you to con trol what packets are allowed to pass the router . Outbound filter applies on all outbound packets. However, Inbound filter applies on p ackets that destined to V irtual Servers or DMZ host only . Y ou can select o ne of the two filtering policies: 1. Allow all to pass excep t those match the [...]

  • Page 41

    41 addresses (4.3.2 .1-4.3.2.25 4). An empty implies all I P addresses. For source or destination port, you can define a single por t (80) or a range of ports (1000 -1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For exampl e, T80, U53, U2000-2999. N o prefix indicates bot h TCP and UDP are defined. An empty impli [...]

  • Page 42

    42 Example 2: (1.2.3.100- 1.2.3.1 19) They can do everything except read net news (p ort 1 19) and tra nsfer files via FTP (port 21) Others are all allowed. After Inbound Pa cket Filter setting is co nfigured, click the save button.[...]

  • Page 43

    43 Outbound Filter: To enab le Outbound Packet Filter click the check box nex t to Enable in the Outbound Packet Filter field. Example 1: (192.168.123.100-1 92.168.123.149) They are allowed to se nd mail (port 25), recei ve mail (port 1 10), and browse Internet ( port 80); port 53 (DNS) is necessa ry to resolve the domain name. (192.168.12 3.10-192[...]

  • Page 44

    44 Example 2: (192.168.1 23.100-192.168 .123.1 19) They can do everything e xcept read net new s (port 1 19) and transfer files via FTP (port 21) Others are allowed After Outbound Packet Filter setting is configured, click the save button.[...]

  • Page 45

    45 4.6.2 Domain Filter Domain Filter let you pre vent users under t his device from accessing specific URLs. Domain Filter Enable Check if you want to enab le Domain Filter . Log DNS Query Check if you want to log the action wh en someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these ho sts to[...]

  • Page 46

    46 Example: In this example: 1. URL include “www .msn.com” will be blocked, and the action will b e record in log-file. 2. URL include “www .sina.com” will not be bloc ke d, but the action will be record in log-file. 3. URL include “www .google.co m” will be blocked, but the action will no t be record in log-file. 4. IP address X.X.X.1~[...]

  • Page 47

    47 4.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined W ebsites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suf fix (like .com or .org , etc), while URL Blocking re quire user to input a keyword only . In other words, Domain filter can block specific[...]

  • Page 48

    48 In this example: 1.URL include “msn” will be blocked, and the actio n will be record in log-file. 2.URL include “sina” will be blocked, an d the action will be record in log-file 3.URL include “cnnsi” will be blocked, and the action will be record in log-file. 4. URL include “espn” will be blocked, and the action will be record i[...]

  • Page 49

    49 4.6.4 MAC Address Contr ol MAC Address C ontrol allows you t o assign diffe rent access right for diffe rent users and to assi gn a specific IP address to a certain MAC address. MAC Address Cont rol Check “Enable” to ena ble the “M AC Address Control”. All of the settings in this page will take effect only when “Enable” is checked. C[...]

  • Page 50

    50 Control table "Control table" is the tab le at the bottom of the "MAC Address Control" page. Each r ow of this table indicat es the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a specific client. IP Address Expected IP address of the corre[...]

  • Page 51

    51 4.6.5 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform admin istration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can per form remote admi nistration. If the s pecified IP ad[...]

  • Page 52

    52 packet to detect if this packet is valid. DoS Attack Detection When this feature is enabled, the router will detect and log the DoS attack comes from the Internet. Currently , the router can detect th e following DoS attack: SYN Attack, W inNuke, Port Scan, Ping of Death, Land Attack etc. VPN PPTP/IPSec Pass-Thr ough Please enable this feature, [...]

  • Page 53

    53 4.7 Advanced Settings 4.7.1 System T ime[...]

  • Page 54

    54 Get Date and Time by NTP Protocol Selected if you want to Get Date and T ime by NTP Pro tocol. Time Server Select a NTP time server to consult UTC time Time Z one Select a time zone where this device locates. Get Date and Time using PC`s Date and T ime Selected if you want to synchronize the router time setting with your connected PC. Set Date a[...]

  • Page 55

    55 4.7.2 System Log This page s upport two m ethods to export sy stem logs to s pecific destinatio n by means of sy slog(UDP) and SMTP(TC P). The it ems you have t o setup including: IP Address for Syslog Server Host IP of destination wh ere syslogs will b e sent to. Check Enable to enable this function . E-mail Alert Enable Check if you want to en[...]

  • Page 56

    56 4.7.3 Dynamic DNS To host your s erver on a changi ng IP address, you have to use dynam ic domain nam e service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your curr ent IP address, which changes eac h time you conn ect your Intern et service provid er. Before[...]

  • Page 57

    57 Example: After Dynamic DNS setting is configured, click the save button. The new settings will be ef fective after reboot.[...]

  • Page 58

    58 4.7.4 SNMP Setting In brief, S NMP, the Simpl e Network Mana gement Protoc ol, is a protocol designed to give a user the capability to remotely manage a co mputer network by polling and setting terminal values and monitori ng network events . Enable SNMP Y ou must check either Local or Remote or both to enable SNMP function. If Local is check ed[...]

  • Page 59

    59 Example: 1. This device will response to SNMP client which’ s get co mmunity is set as “public” 2. This device will response to SNMP client which’ s set community is set as “priv ate”[...]

  • Page 60

    60 4.7.5 Routing T able Routing T ables allow you to determine which physical int e rface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to fin d proper routing path and allow di fferent su bnets to comm unicate with each othe r . Routing T able sett i[...]

  • Page 61

    61 Example: Configurati on on NA T Router Destination SubnetMask Gateway Hop Enabled 192.168.1.0 255.255 .255.0 192.1 68.123.216 1 ˇ 192.168.0.0 255.255 .255.0 192.1 68.123.103 1 ˇ So if, for example, the clien t3 wanted to send an IP data gram to 192.168.0.2, it would use the above table to determin e that it had to go via 19 2.168.123.103 (a ga[...]

  • Page 62

    62 4.7.6 Schedule Rule Y ou can set the schedule time to decid e which service will be tu rned on or off. Select the “enable” item. Press “Add New Rule”[...]

  • Page 63

    63 Y ou can write a rule name and set which day and what time to schedule from “S tart T ime” to “End T ime”. The following example confi gure “ftp time” as everyday 14:10 to 16:20[...]

  • Page 64

    64 After c onfigure Rule 1  Schedule Enable Selected if you want to Enable the Scheduler . Edit T o edit the schedule rule. Delete T o delete the schedule rule, an d the rule# of th e rules behind the d eleted one will decrease one automatically . Schedule Rule can be apply to V irtual serv er and Packet Filter , for example:[...]

  • Page 65

    65 Exanple1: Vi rtual Server – Apply Rule#1 (f tp time: everyday 14:10 to 16:20) Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 1 4:10 to 16:20).[...]

  • Page 66

    66 4.8 T oolbox[...]

  • Page 67

    67 4.8.1 Sys tem Log Y ou can V iew system log by clicking the Vi e w L o g button[...]

  • Page 68

    68 4.8.2 Firmwar e Upgrade Y ou can upgrade fi rmware by clicki ng Firmware Upgrade butto n.[...]

  • Page 69

    69 4.8.3 Backup Setting Y ou can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Up grade button and use the bin f ile you saved. 4.8.4 Reset to default Y ou can also reset this product to factor y default by clicking the Reset to default button. 4.[...]

  • Page 70

    70 4.8.6 Miscella neous Items MAC Address for W ake-on-LAN W ake-on -LAN is a technology that enables you to power up a networked device remotely . In orde r to enjoy this feat ure, the tar get device must be W ake-on-LA N enabled and you have to know the MAC address of this device, say 00-11- 22-33-44-55. Clicking "W ake up" button will [...]

  • Page 71

    71 A A A p p p p p p e e e n n n d d d i i i x x x A A A T T T C C C P P P / / / I I I P P P C C C o o o n n n f f f i i i g g g u u u r r r a a a t t t i i i o o o n n n f f f o o o r r r W W W i i i n n n d d d o o o w w w s s s 9 9 9 5 5 5 / / / 9 9 9 8 8 8 This section in troduces you how t o install TCP/IP protocol i nto your personal computer[...]

  • Page 72

    72 6. The TCP/IP protocol shall be listed in the Network window . Click OK to co mplete the install procedure and restart your PC to e nable the TCP/IP protocol. A.2 Set TCP/IP Protocol f or W orking with NA T Router 1. Clic k St a r t button and choose Settings , then click Control Panel . 2. Double click Network icon. Select the TCP/IP line that [...]

  • Page 73

    73 a. Select Obtain an IP addr ess automatically in the IP Address tab. b. Don’t input any val ue in the Gateway tab .[...]

  • Page 74

    74 c. Choose Disable DNS in the DNS Configuration tab. B. Configure I P m anually a. Select Specify an IP addres s in th e IP Add ress tab. The defau lt IP address of this product is 192.1 68.123.254. So please use 192.168.12 3.xxx (xxx is between 1 and 253) for IP Address field and 255.2 55.255.0 for Subnet Mas k field.[...]

  • Page 75

    75 b. In the Gat eway tab, ad d the IP address of this product (de fault IP is 192.168.123.2 54) in the New gateway field and click Add butt on. c. In the DNS Co nfiguration tab, add t he DNS values which a re provided by t he ISP into DNS Server Se arch Order field and click Add button.[...]

  • Page 76

    76 A A A p p p p p p e e e n n n d d d i i i x x x B B B 8 8 8 0 0 0 2 2 2 . . . 1 1 1 x x x S S S e e e t t t t t t i i i n n n g g g Figure 1: T esting Environm ent (Use W indows 200 0 Radius Serve r) 1 Equipment Details PC1 OS: Microsoft Win dows XP Professional without Service Pack 1. PC2 OS: Microsoft W indows XP Professional with Service Pack[...]

  • Page 77

    77 5.Set RADIU S serv er shar ed key . 6.Configure WEP key and 802.1X settin g. The following test will use th e inbuilt 802.1X authentication method such as ,E AP_TLS, PEAP_CHAPv 2(W indows XP with SP1 o nly), and PEAP_TL S(W indows XP with SP1 only) using the Sm art Card or other Certifi cate of the W indows XP Pr ofessional. 3. DUT and Windows 2[...]

  • Page 78

    78 Figure 2: Enable IEEE 802.1X access control[...]

  • Page 79

    79 Figure 3: Sm art card or cer tificate properties 4. W indows 2000 RADIUS server Authenticati on testing: 4.1DUT aut henticate PC1 using certificate. (P C2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3. Set authentication type of wireless client and [...]

  • Page 80

    80 Figure 4: Certificate in formation on PC1 Figure 5: Authenticating[...]

  • Page 81

    81 Figure 6: Authentication success 4.2 DUT authenticate PC2 using PEAP-TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 3. Disable the wireless connection and e nable again. 4.The DUT will send the us er's certificate to the RADIUS server , and then send [...]

  • Page 82

    82 A A A p p p p p p e e e n n n d d d i i i x x x C C C R R R e e e s s s e e e t t t t t t o o o f f f a a a c c c t t t o o o r r r y y y d d d e e e f f f a a a u u u l l l t t t Reset to factory Default There are 2 methods to reset to default. 1. Restore with RESET button First, turn off th e router and press the RESET button in . And then, po[...]