Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
EnGenius Technologies EVR100 manuale d’uso - BKManuals

EnGenius Technologies EVR100 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso EnGenius Technologies EVR100. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica EnGenius Technologies EVR100 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso EnGenius Technologies EVR100 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso EnGenius Technologies EVR100 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo EnGenius Technologies EVR100
- nome del fabbricante e anno di fabbricazione EnGenius Technologies EVR100
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature EnGenius Technologies EVR100
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio EnGenius Technologies EVR100 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti EnGenius Technologies EVR100 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio EnGenius Technologies in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche EnGenius Technologies EVR100, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo EnGenius Technologies EVR100, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso EnGenius Technologies EVR100. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Wireless Gigabit VPN Router E VR100 Wireless G igab it VPN Ro uter V1.0[...]

  • Pagina 2

    1 1. Introduct ion ........................................................................................................................................... .................................................................6 1.1. Package Contents ........ ............... ........... ....... ........ ....... ........ ....... ........ ........... ..[...]

  • Pagina 3

    2 7. Internet .................................................................................................................................................................................................................. 46 7.1. St atus..............................................................................................................[...]

  • Pagina 4

    3 9.5. MAC Filte r .......................................................................................................................................... ..................................................... 79 9.6. IP Filte r .......................................................................................................................[...]

  • Pagina 5

    4 12.2. T ime.................................................................................................................................................................................................... 125 12.3. Dynamic DNS (DDNS) ....... ....... ........ ......... ........ ....... ........ ........ ....... ........ ........... ........ ...[...]

  • Pagina 6

    5 Revision History Version Date Notes 1.0 2011/01/11 First Release[...]

  • Pagina 7

    6 1. Introduction 1.1. Package Contents • EnGenius WIRELESS GI GABIT VPN ROUTER • AC Adapter • RJ-45 Ethernet LAN Cable • CD-ROM with Us er Manual and Setup Wizard • Quick Guide 1.2. System Requirements • RJ-45 Ethernet Bas ed Internet (ADSL or Cable Modem ) • Computer with Wire less Network function • Windows, Mac O S or Linux base[...]

  • Pagina 8

    7 1.3. Introduction EVR100 is a 2T 2R Wireless 11N Gigabit VP N Router that delivers up to 6x f aster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network wi th superior throughput and perf ormance and unparallele d wireless range. With easy to use on the WPS function, it helps users to c onnect to wireless device w it[...]

  • Pagina 9

    8 1.4. LED Overview LED Lights Icon Description Wireless LAN Color – Blue Lights w hen Wirele ss signal i s activated . Blinks when Wireless dat a transfer . Internet Color – Blue Blinks when WPS hands hake i s initiali zed. LAN Color – Blue Lights w hen wire d network devic e is con nected t o RJ-45 port. Blinks when data trans fer occ urs o[...]

  • Pagina 10

    9 2. Before you B egin This section wi ll guide you through the installation proces s. Place ment of the EVR100 is very important to avoid poor signal recepti on and performance. Avoid placing the device in encl osed spaces such as a closet, cabinet or wardrobe. 2.1. Considerations for Wireless Installa tion The operating distance of all wirel ess [...]

  • Pagina 11

    10 2.2. Computer Settings (Windows XP /Windows Vista/Windows 7)     Click Start button and open C ontrol Panel. Windows XP Wi ndows Vista Windows 7[...]

  • Pagina 12

    11     Windows XP, c lick [Network Connection]     Windows Vista, cl ick [View Network Status and Tasks] then [Manage Network Connections]     Windows 7, cl ick [View Network Status and Tas ks] then [Change adapte r settings][...]

  • Pagina 13

    12     Right click on [Local Area Connection] and sele ct [Properties ].     Check “Client for Mic rosoft Networks”, “File and Printer Sharing for Microsoft Netw orks”, and “Internet Protocol (TCP/IP) is ticke d. If not, please install them.[...]

  • Pagina 14

    13     Select “Internet Protocol (T CP/IP)” and click [Properties]     Select “Obtain an IP Addres s automatically ” and “Obtain DNS server address automaticall y” then click [O K].[...]

  • Pagina 15

    14 2.3. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet cabl e to WAN port of the device and the other e nd into you cable/DS L modem (Internet) 4. Insert[...]

  • Pagina 16

    15 3. Configuring your Rout er This section wi ll show you how to configure the de vice using the web-based configuration interfac e. Please use your wire less network adapter to connect the WIRELESS RO UTER. Default Settin gs IP Address 192.168.0.1 Username / Passw ord admin / admin Wireless Mode Enable Wireless SSID EnGenius xxxxxx Wireless Sec u[...]

  • Pagina 17

    16 4. Setup Wizard 1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.0.1 Note: If you have changed the default LAN IP Addr ess of the WIRELESS ROUTER, ensure you enter the correct IP Addre ss . 2. The default use rname and password are admin . Once you have entered the c orrect username and pas sword, [...]

  • Pagina 18

    17 3. You will see the f ollowing webpage if login s uccessfully.[...]

  • Pagina 19

    18 4. Click Wizard to enter the Se tup Wizard. Then click N ext to begin the wizard.[...]

  • Pagina 20

    19 5. Select the Operation Mode. Please ensure y ou have the proper cables c onnected as de scribed in the Hardware Install ation section.[...]

  • Pagina 21

    20 AP Router M ode a) The device will se arch for the correct Internet settings automaticall y. b) The most appropriate W AN type w ill be determined and s elected automatically. If i t is incorrect, ple ase select Others to set up the WAN setti ngs manually.[...]

  • Pagina 22

    21 c) There are m any WAN service types available. Please obtain the correct settings from your Internet Service Provide r (ISP). Static IP Address If y our ISP Provider has assigned y ou a fixed IP address, enter the assigned IP address, Subn et mask, Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provi[...]

  • Pagina 23

    22 Dynamic IP Address The IP Add ress is all ocated autom atically. How ever some ISP’s w ill also recognize th e MAC ad dress an d will reject conne ctions if the MAC add ress d oes not match. If your ISP h as recorded the MA C addres s of your compu ter’s Ethernet L AN c ard, please c onnect only the c omputer w ith the authorized MAC addr es[...]

  • Pagina 24

    23 PPP over Eth ernet ISP requires an account u sername and pass word. PPP over Ethe rnet Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP.[...]

  • Pagina 25

    24 Point-to-Point Tun neling Protocol (PPTP ) PPTP is use d by some ISPs.[...]

  • Pagina 26

    25 PPTP WAN I nterface Settings WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or Dynami c I P address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. PPTP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame . [...]

  • Pagina 27

    26 Layer-2 Tunnel ing Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Pagina 28

    27 L2TP WAN In terface Settings WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or Dynami c I P address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. L2TP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame . [...]

  • Pagina 29

    28 d) Setup the leve l of wireless security to be us ed. EnGenius recommends the Highest level of sec urity to be use d. Note: 802.11n wireless spe eds may not be achievabl e if the security level is se tting the Lowest or Low. SSID Ent er the name of your wi reless netw ork. Key Enter the sec urity key f or your w ireless ne twork.[...]

  • Pagina 30

    29 e) Check the se ttings are correct, and then click R eboot to apply the settings.[...]

  • Pagina 31

    30 5. VPN Wizard Using VPN Wi zard, you can establish VPN c onnection easily. Pleas e refer to 11.3 .[...]

  • Pagina 32

    31 6. System 6.1. Status This page will dis play status of the devi ce. Status Model Description of this devic e. Mode The devic e is cu rrently in w hich mod e. Uptime The duration abou t the devi ce has bee n operating wi thout powe ring down or reboot. Current Da te/Time The devic e’s system t ime. If this is incorrec t, please set the tim e i[...]

  • Pagina 33

    32 WAN Setti ngs Attain IP P rotocol Method used t o conn ect to th e Interne t IP address The WAN I P Address o f the dev ice. Subnet Mask The WAN Subn et Mas k of the device. MAC address The MAC addre ss of the devi ce’s WAN Interface. Primary and Seconda ry DNS Primary and Sec ondar y DNS servers assign ed to th e WAN c onnecti on.[...]

  • Pagina 34

    33 LAN Settings IP address The LAN I P Address of t he de vice. Subnet Mask The LAN Sub net Mask o f th e device . DHCP Serv er Whether the DHCP serv er i s Enabled or Disabled. MAC address The MAC addre ss of the devi ce’s LA N Interface.[...]

  • Pagina 35

    34 WLAN Set tings Channel The wirel ess channe l in use. ESSID The SSID (Network Name) of th e wirele ss networ k. (up to 4 SSI Ds are supp orted) Security Wireless enc ryption is en abled for this SSI D. BSSID The MAC addre ss of thi s SSID. Associated Cl ients The number of wireles s client s connec ted to thi s SSID.[...]

  • Pagina 36

    35 6.2. LAN This page allows you to modify the de vice’s LAN settings.[...]

  • Pagina 37

    36 LAN IP IP address The LAN I P Address of t his d evice. IP Subnet M ask The LAN Sub net Mask o f th is devic e. 802.1d Sp anning Tre e When Enabled, t he Span ning T ree protocol will prevent ne twork loops i n y our LAN net work.[...]

  • Pagina 38

    37 DHCP Serv er DHCP Serv er The DHCP Ser ver autom atic ally allocates IP addres ses to your LA N de vice. Lease Time The duration of the DHCP server al locates e ach I P address to a LAN d evice. Start / End I P The range of I P addresse s of the DHCP server will a llocate to LAN devi ce. Domain nam e The domain name for this LAN network.[...]

  • Pagina 39

    38 Two DNS servers can be assigned for us e by your LAN device. There are f our modes available. DNS Servers From ISP The DNS serv er IP addr ess i s assigned from your I SP. User-Defin ed The DNS server IP addr es s is assigne d manually . DNS Relay LAN cli ents are assig ned the d evice’s I P address as the DNS se rver. DNS requests are rel aye[...]

  • Pagina 40

    39 6.3. DHCP This page shows the status of the DHCP server and als o allows you to control how the IP address es are allocated.[...]

  • Pagina 41

    40 The DHCP Cl ient Table shows the LAN clients that have bee n allocated an IP addre ss from the DHCP Se rver . DHCP Client T able IP address The LAN I P address of th e cl ient. MAC address The MAC addre ss of the cl ient’s LA N interface. Expiration Time The time that the all ocated I P address wil l expire . Refresh Click this button to u pda[...]

  • Pagina 42

    41 You can also manually specify the IP address that will be allocated to a LAN client by associating the IP addres s with its MAC address. Type the IP address you would like to m anually assign to a specific MAC address and cl ick Add to add the conditi on to the Static DHCP T able.[...]

  • Pagina 43

    42 6.4. Schedule This page allows you to setup the sc hedule times that the Firew all and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.[...]

  • Pagina 44

    43 Schedule Schedule Desc riptio n Assign a nam e to the sc hed ule. Service The servic e provides for the s chedule. Days Define the Days to acti vate or deactivate the sche dule. Time of d ay Define the Tim e of d ay to acti vate or deac tivated the sc hedule. Please use 24-hour cloc k format.[...]

  • Pagina 45

    44 6.5. Log This page displays the system log of the device. When powered down or rebooted, the log wil l be cleared. Log Save Save the log to a file. Clear Clear the log . Refresh Update the log.[...]

  • Pagina 46

    45 6.6. Language This page allows you to change the Language of the User Interface.[...]

  • Pagina 47

    46 7. Internet The Internet sec tion allows you to manually set the WAN ty pe connection and its related settings. 7.1. Status This page shows the current status of the de vice’s WAN c onnection.[...]

  • Pagina 48

    47 7.2. Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and wi ll reject connections if the MAC address does not matc h. If your ISP has rec orded the MAC address of your computer’s Etherne t LAN card, please connect only the compu ter with the authorized MAC addres s, and cli[...]

  • Pagina 49

    48 Dynamic I P Address Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. DNS Servers Two DNS se rvers can be assign ed for use b y your LAN d evices. There are tw o modes av ail able. From ISP LAN devic es are assig ned t he DNS serve r IP addr ess of your I SP. User-D[...]

  • Pagina 50

    49 7.3. Static IP Address If your ISP P rovider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask , Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provider . Static IP Addr ess IP address Assign an I P address Ma nually. IP Subnet M ask Specify an IP address’s s ubnet mask[...]

  • Pagina 51

    50 7.4. PPP over Ethernet ISP requires an account u sername and pass word.[...]

  • Pagina 52

    51 PPP over Ethe rnet ( PPPoE) Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP. Authenticatio n type Select w hether the ISP uses PAP o r CHAP met hods for authent ication. S[...]

  • Pagina 53

    52 7.5. Point-to-Point Tunneling Protocol (PPTP) PPTP is use d by some ISPs.[...]

  • Pagina 54

    53 Point-to-Poi nt Tun neling Proto col (PPT P) WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or wil l allocate Dynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for[...]

  • Pagina 55

    54 7.6. Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Pagina 56

    55 Layer-2 Tu nneling Protocol (L2TP) WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or wil l allocate Dynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for t his use[...]

  • Pagina 57

    56 8. Wireless The Wireless se ction allows you to configure the Wireless settings. 8.1. Basic This page shows the current status of the de vice’s Wire less settings.[...]

  • Pagina 58

    57 Basic Radio Enable or Disab le the de vice ’s wirele ss signal. Mode Select betw een Acc ess Point or W ireless Distri butio n System (WD S) mode s. Band Select th e types of wi reless cl ients that t he devic e will ac cept. eg: 2.4 GHz (B+G+N ) Only 802.11b and 11g c lients will be allowed. Enable SSID# Selec t the numb er of SSI D’s (Wire[...]

  • Pagina 59

    58 Wireless Dis tribution System (WDS) Using WDS to connect Access Point wireless ly, and in doing so extend a wire d infrastructure to locations where cabling is not possible or i nefficient to implement. Note that compatibility between diffe rent brands and models is not guaranteed. It is recomm ended that the WD S network be created using the sa[...]

  • Pagina 60

    59 8.2. Advanced This page allows you to configure wirele ss advance settings. It is recommended the def ault settings are used unless the user has expe rience with these functions.[...]

  • Pagina 61

    60 Advanced Fragment Th reshol d Specifies t he size of the packet per fragm ent. This function c an reduce the chanc e of packet collision . However w hen this value is se t too low, there wil l be increase d overheads r esulti ng in poor performanc e. RTS Thresh old When the pac ket size is s malle r than the RT S Thre shold, then the packet w il[...]

  • Pagina 62

    61 8.3. Security This page allows you to set the wireless s ecurity settings. Security SSID Selectio n Select the SSID t hat the s ecurity se ttings w ill apply t o. Broadcast SSID If Disabled, th en the dev ice will not be broadc asting the SSID. There fore it will be invisi ble to wireless clients. WMM Wi-Fi Multi-Medi a is a Q uality of Se rvice[...]

  • Pagina 63

    62 Encryption The encrypti on method t o be ap plied. You can choos e from W EP, W PA pre-sh ared key o r WPA RA DIUS. • Disabled - no data encrypti on is used. • WEP - dat a is encr ypted usi ng the WE P standard . • WPA-PSK - data is encrypt ed using t he WPA-PSK standard. This is a later st andard than WEP, and provides much bet ter se cur[...]

  • Pagina 64

    63 802.1x Auth enticatio n RADIUS Se rver IP Address The IP Add ress of the RA DIUS Se rver RADIUS Se rver por t The port num ber of the RADIUS Se rver. RADIUS Se rver password The RADIUS Server’s p assword .[...]

  • Pagina 65

    64 WEP En cryption: WEP Encryp tion Authenticatio n Type P lease ensur e that y our w ireless c lients use the same authent ication t ype. Key type ASCII : regular t ext (rec omm ended) HEX : for advanc ed user s Key Length Select th e desired option, and en sure the w ireless clie nts use the same setti ng. • 64 Bit - dat a is enc rypted, u sing[...]

  • Pagina 66

    65 WPA Pre-Shared Key En cryption: WPA Pre-Sha red Ke y Encryptio n Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. Pre-shared Key Type Select w hether you w ould l ike to e[...]

  • Pagina 67

    66 WPA RA DIUS Encryption: WPA RADI US Encryptio n WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. RADIUS Se rver IP address Enter the IP add ress of t he RA DIUS Server RADIUS Se rver Port Enter t he port num ber us ed for c onnection s to the RADIUS server. RADIUS Se rver [...]

  • Pagina 68

    67 8.4. Filter This page allows you to create fil ters to control which wire less clients can connect to this device by only al lowing the MAC addresses entere d into the Filtering Table.[...]

  • Pagina 69

    68 Wireless Fil ter Enable Wirel ess Acc ess Control Tick the box to Enable W ireless Acce ss Control. When Enable d, only wire less c lients on the Filt ering Tabl e will be allowe d. Description Enter a nam e or descri ption for thi s entr y. MAC address Enter the MA C address o f the w ireless c lient th at you wish to all ow connec tion. Add Cl[...]

  • Pagina 70

    69 8.5. Wi-Fi Protected Setup (WPS) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi netw orks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable se[...]

  • Pagina 71

    70 Wi-Fi Prot ected Setup (WPS) WPS Tick to Enable the W PS feature. WPS Butto n Tick to Enable the W PS push bu tton. Wi-Fi Prot ected Setup Inform ation WPS Curren t Status Shows whet her the W PS func tion is C onfigured o r Un-co nfigured . Configured me ans that WPS h as been used to a uthorize c onnection betw een the d evice and wireless cli[...]

  • Pagina 72

    71 Initializin g WPS Feature There are tw o methods to initialize the W PS feature: Push Button and Pin code m ethods. 1. WPS Push Button Method Push the WPS button on the WIRELESS ROUT ER device. T he Wireless LED light will s tart to flash to indicate that the W PS process is ready . While the Wire less LED is flashing on the W IRELESS ROUTER, pr[...]

  • Pagina 73

    72 2. Pin Code Method Note the Pin code of your WIRELESS ROUT ER device. Please use this Pin code to initialize the WPS process from the wireless c lient configuration utility. This process w ill be different for each brand or model. Pl ease consult the user manual of the wirel ess client for more information.[...]

  • Pagina 74

    73 8.6. Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device .[...]

  • Pagina 75

    74 8.7. Policy This page allows you to configure the acces s policies for each SS ID (wireless netw ork). Policy WAN Con nection Allow wireless clients on thi s SSID to acc ess the W AN port which typically is an Internet c onnecti on. Communica tion betw een Wirel ess clients Whether each wireles s client can com municate with each ot her in thi s[...]

  • Pagina 76

    75 9. Firewall The Firewall secti on allows you to set the acces s control and Firewall s ettings. 9.1. Enable This page allows you to Enable / Disable the Firew all features. If Enabled Firewall service, the De nial of Service (DoS) and SPI (Stateful Packet Inspection) features will als o be enabled.[...]

  • Pagina 77

    76 9.2. Advanced You can choose whether to allow VPN (Virtual Privat e Network) packets to pass through the Fire wall.[...]

  • Pagina 78

    77 9.3. DMZ If enabled this fe ature, allows the DMZ computer on your LAN to be expose d to all users on the Internet. • This allows al most any application to be used on the s erver. • The “DMZ PC” w ill receive all Unknown connections and data. • If the DMZ f eature is enabled, please ente r the IP address of the PC to be used as the ?[...]

  • Pagina 79

    78 9.4. Denial of Service (DoS) Denial of Se rvice (Denial of Service) is a type of Internet attac k that se nds a high amount of data to y ou with the intent to overload your Internet connection . Enable the DoS fire wall feature to automaticall y detect and block these DoS attacks.[...]

  • Pagina 80

    79 9.5. MAC Filter You can choose whether to Deny or only All ow those computers listed in the MAC Filtering table to access the Internet. MAC Filter Enable MAC f iltering Tic k this box to Enable th e MAC filt ering feature . Deny all clie nts with MAC addresses listed below to access the network When selec ted, the c omputers l isted in the MAC F[...]

  • Pagina 81

    80 9.6. IP Filter You can choose whether to Deny or only All ow, computer with those IP Addres ses from accessing c ertain Ports. This can be use d to control which Internet applicati ons the computers c an access. You may need to have certain knowledge of what Internet ports the appli cations use.[...]

  • Pagina 82

    81 IP Filter Enable IP filte ring Tick this box to Enable the I P filtering feature. Deny all clie nts with IP add resses listed below to access the network When selec ted, the c omputers w ith IP add resses specified will be Denied ac cess to the indic ated Int ernet ports. Allow all c lients with IP addres ses listed below to access the network W[...]

  • Pagina 83

    82 9.7. URL Filter You can deny acc ess to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL B locking Table. Any web address that includes “gamer” will be blocked.[...]

  • Pagina 84

    83 10. Advanced The Advanced se ction allows you to configure the Advanced settings of the router. 10.1. N etwork Address Translation (NAT) This page allows you to Enable / Disable the Network Addres s Translati on (NAT) and Network Turbine features. T he NAT is required to share one Internet ac count with multi ple LAN use rs. Enabling Network Tur[...]

  • Pagina 85

    84 10.2. Po rt Mapping Port Mapping allows y ou to redirect a particular range of ports to a computer on your LAN network. This helps you host servers be hind the NAT and Firewall. In the example be low, there is a Mail Server that requires ports 25. When there is a connection from the Internet on those ports, it wil l be redirected to the Mail Ser[...]

  • Pagina 86

    85 10.3. Po rt Forwarding Port Forwarding allows you to redirect a particular public port to a compute r on your LAN network. This helps y ou host servers behind the NAT and Firewall. In the example be low, there is a WEB Server running on port 80 on the LAN. For security re asons, the Administrator would like to provide this se rver to Internet co[...]

  • Pagina 87

    86 10.4. Po rt Trigger If you use Internet appli cations which use non-standard connections or port num bers, you may find that they do not function correctly becaus e they are blocked by the Wireless Router's firewall. Port Trigger w ill be required for these applicati ons to work. Port Trigger Enable Port Fo rwardin g Tick this box to Enable[...]

  • Pagina 88

    87 10.5. Ap plication Layer Gateway (ALG) Certain applications may require the use of ALG feature to function correctly. If you use any of the applications listed, please tick and s elect it to enable this feature.[...]

  • Pagina 89

    88 10.6. U niversal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled de vices on your network. It als o provides automatic po rt forwarding for supp orted applications to s eamlessly by pass the Firewall. Universal Pl ug and Pl ay (UP nP) Enable the UPnP Fe ature Tic k this box to Enable th e UPnP [...]

  • Pagina 90

    89 10.7. Qu ality of Service (QoS) QoS allows you to c ontrol the priority that the data is transmi tted over the Internet, or to reserve a spec ific amount of Internet bandwidth. This is to e nsure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user expe rience of time sensi tive tr[...]

  • Pagina 91

    90 Priority Queu e Method Bandwidth priority is set to either H igh or Low. The transmissions in the High queue will be processed first. Unlimited P riority Queue Local IP Add ress The compu ter with this IP Addres s will not be bound by the QoS rules. High / Low Priority Q ueue Protocol The type of networ k prot ocol. High / Low Priority Sets the [...]

  • Pagina 92

    91 Bandwidth All ocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or y ou can set a minimu m amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth All ocation Type Set whethe r the QoS ru les app ly to tran smission t hat are D ownload, U ploa d or Both d irections. Local IP [...]

  • Pagina 93

    92 10.8. Ro uting If your WIRELESS ROUTER de vice is connected a network with diffe rent subnets, then this fe ature will allow the dif ferent subnets to communicate with each other. Static Rou ting Enable Sta tic Routi ng Tick this box to Enable the Stat ic Router feature. Destinatio n LAN IP Enter the IP addre ss of th e desti nation LAN. Subnet [...]

  • Pagina 94

    93 Destination Subnet Mask Gateway Hop Interface 192.168.11.0 255.255.255.0 192.168.0.216 1 LAN 192.168.10.0 255.255.255.0 192.168.0.103 1 LAN So if, for exam ple, Client3 wants to send an IP data packet to 192.168.10.2 (Clie nt 2), it would use the above table to determine that it had to go via 192.168.0.103 (Router 2) And if it sends P ackets to [...]

  • Pagina 95

    94 11. VPN A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Interne t. It provides authentic ation to ensure that th e information is going to and from the correct parties . It provides sec urity to protect the information f rom viewi ng or tampering en route. EVR100 su[...]

  • Pagina 96

    95 11.2. Pro file Setting This page allows you to Enable , A dd , Edit and Delete VPN profiles. Profile Setti ng Enable Tick the box to Enable t he VPN pro file. Add Click this button to ad d the entr y. Edit Select one profile and c lick th is button t o edit th e entry. Delete Select ed Delete the se lected entries. Delete All Delete all en tries[...]

  • Pagina 97

    96 10.1.1. IPSe c IPSec (Internet Protocol Security) is a protocol sui te for securing Internet Protocol (IP) c ommunications by authentic ating and encrypting each IP pac ket of a comm unication session. IPSec also includes protocols for establi shing mutual authentication between agents at the beginning of the session and negotiation of cry ptogr[...]

  • Pagina 98

    97 General Name Enter a nam e for your V PN pol icy. Connection Type Supports IPS ec and L2 TP ove r IPSec met hods to establ ish VPN connec tio n. Authenticatio n Type Supports pre-shared k ey meth od for auth enticat ion. Shared Ke y Enter the Shared Key in b ox. Confirm Enter your Sh ared Key ag ain for veri fication. Local ID Ty pe Supports I P[...]

  • Pagina 99

    98 SA (Security Assoc iation) A Security Ass ociation (SA) is the establishment of s hared security attributes between two netw ork entities to support secure comm unication. An SA may include attributes s uch as: cryptographic algorith m and mode; traffi c encryption key; and parameters for the network data to be passed over the connection. Establ[...]

  • Pagina 100

    99 Encryption EVR100 support s DES , 3DES , AES128 , AE S192 , A ES256 enc ryption meth od s for traffic through the VPN. Authenticatio n EVR10 0 supports SHA1 , MD5 methods for authe nticati on. Life Time Enter the numb er of sec onds for the IK E Lifetime. The period of tim e to pa ss before establ ishing a new IK E security assoc iation (SA) w i[...]

  • Pagina 101

    100 Network This page allows you to configure the VPN s erver and local/remote subnet. Network Security Ga teway T ype Security Gatew ay Type s upports I P Add ress and Domain Name . Selec t one of them. Security Ga teway The IP address or domai n name of the V PN server. Local Netwo rk Enter the local (LAN) s ub net and m ask. (ex. 1 92.168.0. 0/2[...]

  • Pagina 102

    101 Advanced This page allows you to configure advanced VPN settings. Advanced NAT Trave rsal E nabling N AT Trave rsal al low IPSec traffic from t his en dpoint to t raverse t hrough the translation proc ess durin g NAT . The remote VPN endpoint must also su pport t his feature and it must be en abled to func tion properly ov er the VP N. Dead Pee[...]

  • Pagina 103

    102 10.1.2. L2 TP over IP Sec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high le vel of security to protect data. You ca n use this type of secure connection for small or remote office cli ents that need access to the corporate network. You can also use L2TP over IPSec VPNs for routers at r[...]

  • Pagina 104

    103 L2TP L2TP Setting Authenticatio n Selec t the d esired authen tication protocol (PA P, CHA P, Auto). Select Auto by default. User Name Enter the usern ame for auth entication . Password Enter the passwo rd for aut henticati on.[...]

  • Pagina 105

    104 Network Network Server IP Enter the VP N Server IP addre ss. Remote I P Range Assign a rang e of IP ad dresses . The assigne d IP r ange sh ould be on the sam e IP netw ork but not the in the same range as your DHCP IP range.[...]

  • Pagina 106

    105 11.3. Wizard You can use W izard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then clic k Next button to next page.[...]

  • Pagina 107

    106 3. You can selec t [IPSec] or [L2TP over IPSec] in this page then click Nex t button to next page. If you s elect [IPSec] then go to s tep 3.1. If you select [ L2TP over IPSec] then go to s tep 3.2. 3.1 IPSec You can sele ct [Client to Site] or [Si te to Site] in this page then click Nex t button to next page. Note. If you sel ect [Client to Si[...]

  • Pagina 108

    107 Enter the Security Gate way and remote network. Then click Next button to next page.[...]

  • Pagina 109

    108 3.2 L2TP over IPSec Enter the username, pa ssword and VPN server IP setting. Then cl ick Next button to next page.[...]

  • Pagina 110

    109 4. Enter the shared key for the VPN connection. 5. Setup successfull y, enable this policy i mmediately. If you don’t want enable this policy, you can un-tick the box. Then click Apply button to apply the settings.[...]

  • Pagina 111

    110 How to establish a L2 TP over IPSec VPN con nection on Win dows XP 1. Click Start button and open Cont rol Panel. 2. Click [Network Connections], double click [New Connecti on Wizard] then click Nex t button.[...]

  • Pagina 112

    111 3. Select [Connect to the netw ork at my workplace] then click Next button. 4. Select [Virtual Private Network connection] then cl ick Next button.[...]

  • Pagina 113

    112 5. Enter the [Company Nam e] then click Next button. 6. Select [Do not dial the initial connection] then click Next button.[...]

  • Pagina 114

    113 7. Enter the VPN serve r IP address then click Next button. 8. Select [Do not use my smart card] then clic k Next button.[...]

  • Pagina 115

    114 9. Click Finish button to compl ete the wizard. 10. Clic k Properities button.[...]

  • Pagina 116

    115 11. In Sec urity, select [Advanced (custom se ttings)] then click Settin gs button. 12. Chec k [Unencrypted pass word (PAP)] and [ Challenge Handshake Authentication Protocol (CHAP)] then cl ick OK button.[...]

  • Pagina 117

    116 13. Clic k [IPSec Settings] then tick [Use pre-shared key for authentication], Enter the Key then click OK button. 14. In Networking , selec t [L2TP IPSec VPN] then click OK button.[...]

  • Pagina 118

    117 15. Clic k Connect button to connect V PN connection. 16. You can see the VPN Connection has been established .[...]

  • Pagina 119

    118 How to establish a L2 TP over IPSec VPN con nection in Windows 7 1. Click Start button and open Cont rol Panel. 2. Click [View Ne twork Status and Tasks] then [Set up a new c onnection or network][...]

  • Pagina 120

    119 3. Click [Connect to a w orkplace] then [Use my Internet connection (VPN)] 4. Enter the VPN serve r IP address: [ Internet address ], [ Destinat ion name ] and tick [ Don’t connect now; just se t it up so I can connect later], then cli ck the Next button.[...]

  • Pagina 121

    120 5. Enter the correct User na me and Password then c lick the Create button. 6. Click the Close button to close the VPN connection se tting.[...]

  • Pagina 122

    121 7. Click [Change adapter s ettings] in Step 2, then select VPN Connection and click [Change settings of this connection] 8. Change Type of VPN to [Layer 2 Tunneling Protocol wi th IPSec (L2TP/IPSec)] and che ck [Unencrypted password (PAP)] i n Security.[...]

  • Pagina 123

    122 9. Click the Adv anced settings button and select [ Use preshared key for authentication] and e nter the correct key . Then click OK button.[...]

  • Pagina 124

    123 10. Double click the VP N Connection then click the Conne ct button. 11. You can see the VPN Connection has been established .[...]

  • Pagina 125

    124 12. Tools This section all ows you to configure some device system settings. 12.1. Adm in This page allows you to change the sys tem password and to configure remote manage ment. Change P assword Old Passw ord: Enter the cu rrent passwo rd. New Passw ord: Enter your new passw ord. Repeat New Passw ord: Enter your n ew passwor d again for verifi[...]

  • Pagina 126

    125 12.2. Time This page allows you to set the sys tem time. Time Time Setup : Select th e method you w ant t o set the t ime. Time Zone: Selec t the tim e zone for your current loc ation. NTP Time S erver: Enter the addres s of the Network Ti me Protoc ol (NTP) Server to a utomati call y synchronize with a server on the Internet. Daylight Savi ngs[...]

  • Pagina 127

    126 12.3. D ynamic DNS (DDNS) This free servic e is very useful when combined with the Virt ual Server feature. It allows Internet users to connect to y our Virtual Servers using a URL, rather than an IP Address . This also solve s the problem of having a dynamic IP address. W ith a dynamic IP addres s, your IP address may c hange whenever you conn[...]

  • Pagina 128

    127 12.4. Po wer This page allows you to Enable or Disable the wireless LAN power s aving features.[...]

  • Pagina 129

    128 12.5. D iagnosis This page allows you determine if the WIRELESS ROUTER devi ce has an active Internet connec tion. Diagnosis Address to Ping: Enter the IP add ress y ou li ke to see i f a successfu l connec tion can b e made. Ping Result: The results of the Ping te st.[...]

  • Pagina 130

    129 12.6. F irmware The firmw are (software) in the W IRELESS ROUTER device can be upgraded using your Web Brows er. To perform the Firm ware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade fil e. 2. Select the upgrade fil e. Its name will appear in the Upgrade File field. 3. Click the Apply button to commence the fi[...]

  • Pagina 131

    130 12.7. B ack-up Back-up Restore to f actory default: Restores the device t o factory d efault settin gs. Backup Set tings: Save the cur rent configu ration s ettings to a file. Restore Set tings: Restores a previ ously sa ved configurati on file. Click Brows e to selec t the fil e. Then Uplo ad to lo ad the set tings.[...]

  • Pagina 132

    131 12.8. Reset In some circums tances it may be re quired to force the device to reboot.[...]

  • Pagina 133

    132 Appendix A – FCC Interferen ce Stat ement Federal Communi cation Commission Inter ference St atemen t This equipment has been tested and found to com ply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limi ts are designed to provide reasonable protection against harmful interference in a residential [...]

  • Pagina 134

    133 IMPORTANT NOTE: FCC Radiatio n Expos ure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your bod y. We declare that the product is limited in CH1~CH11 by specified firmwa re con[...]

  • Pagina 135

    134 Appendix B – IC Interference Statement Industry Canada state ment: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired[...]