Buffalo HighPower N300 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Buffalo HighPower N300, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Buffalo HighPower N300 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Buffalo HighPower N300. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Buffalo HighPower N300 should contain:
- informations concerning technical data of Buffalo HighPower N300
- name of the manufacturer and a year of construction of the Buffalo HighPower N300 item
- rules of operation, control and maintenance of the Buffalo HighPower N300 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Buffalo HighPower N300 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Buffalo HighPower N300, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Buffalo service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Buffalo HighPower N300.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Buffalo HighPower N300 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    User Manual for Professional Firmware AirStation NFINITI HighPower Router and AccessPoint WHR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-600DHP www.buffalotech.com[...]

  • Page 2

    - 1 - 1. Introduction 3 1.1. Welcome 3 1.2. Device Configuration 3 1.2.1. Factory Settings 3 1.2.2. Initial Operation 3 2. Configuration via the Web Interface 4 2.1. Preparation 4 2.2. Web Interface Access 4 2.3. Web Interface Structure 5 2.3.1. Setup 6 2.3.1.1. Basic Configuration 6 2.3.1.2. Dynamic DNS (DynDNS or DDNS) 7 2.3.1.3. MAC Address Clon[...]

  • Page 3

    - 2 - 2.3.8.5. Bandwidth 18 2.3.8.6. SysInfo 18 3. Use Cases 19 3.1. Access Point 19 3.1.1. Access Point with NAT / DHCP 19 3.1.1. Access Point attached to a network / Internet gateway 20 3.2. Wireless Client 21 3.3. Wireless Client Bridge 22 3.4. FTP Server 23 3.4.1. Examples 23 3.4.2. Logging into the FTP server 25 3.4.3. Common FTP commands 25 3[...]

  • Page 4

    - 3 - 1. Introduction 1.1. Welcome This AirStation wireless router comes with two different firmware packages. You may use either the dd-wrt-based Professional firmware or the simple User-friendly firmware. By default, the Professional firmware is preinstalled for US/EU products, and the User-friendly firmware is preinstalled for Asia-Pacific produ[...]

  • Page 5

    - 4 - 2. Configuration via the Web Interface The router contains an integrated web server that provides an easy to use web interface. It allows configuration, administration, and status checking in a simple but effective way. The web interface was successfully tested on the following browsers: - Internet Explorer 7.x and newer versions - Firefox 2.[...]

  • Page 6

    - 5 - 2.3. Web Interface Structure[...]

  • Page 7

    - 6 - 2.3.1. Setup 2.3.1.1. Basic Configuration Setup Information The SSID, wireless passphrase, IP address, username, and password that were set for the AirStation are displayed. Clicking [Run Initial Setup Wizard] opens the "Setup Assistant" screen. Follow the on-screen instructions to make the initial settings for the AirStation. Click[...]

  • Page 8

    - 7 - Network Setup Network Setup configures the router’s basic settings to match the local network. By default these settings are valid for all network ports except the WAN because they are all attached to the default bridge. If ports are disassociated from the bridge they will have different settings. 2.3.1.2. Dynamic DNS (DynDNS or DDNS) Dynam[...]

  • Page 9

    - 8 - Static Routing The Static Routing section lets you add static routes. The input parameters are equivalent to the parameters of the Linux command “route”. 2.3.1.5. Networking The Networking section allows detailed network configuration. VLAN Tagging Use this option to configure VLAN tagging. Bridging By default, one bridge (br0) is defined[...]

  • Page 10

    - 9 - Modus Description AP WLAN Access Point mode (default) Client WLAN Client mode Client-Bridge Client-Bridge mode allows connecting to another Wireless LAN access point and establishing a network bridge with that access point Adhoc Adhoc operating mode, required for building mesh networks WDS Station WDS Station is the client in a WDS-AP <-&g[...]

  • Page 11

    - 10 - Wireless Channel (AP only) Set the desired wireless channel, or let the router choose a free channel automatically. If the router is in classic WDS (MAC address based) mode, then the wireless channel must be selected manually. Wireless Network Name (SSID) The name of the wireless network the radio transmits or connects to (depending on the w[...]

  • Page 12

    - 11 - Key length Description 64 Bit (10 Hexadecimal characters) Standard 128 Bit (26 Hexadecimal characters) With WPA or WPA2 encryption, there are several encryption algorithms to choose from. AES is more secure but TKIP is more widely supported. There is also a TKIP + AES setting, but that does not offer more security than TKIP. Algorithm Descri[...]

  • Page 13

    - 12 - Start AOSS Negotiation To initiate AOSS, either click the AOSS button in the GUI or hold down the AOSS button on the front of the router for 3 seconds. Security Modes You may choose which security modes are offered in the AOSS negotiation process. The use of WEP in general is not recommended due to security concerns. WPS Button Enables the W[...]

  • Page 14

    - 13 - 2.3.3. Services 2.3.3.1. Services The services section allows the configuration of basic service settings. Telnet and SSH can be configured this way. Remote access options are configured in the Administration section. Available DHCP Server Domains Description WAN Standard LAN / WLAN Rflow / MACupd Interface Options Description LAN & WLAN[...]

  • Page 15

    - 14 - PPTP When defining the PPTP server’s IP range, avoid overlap with the range of IP addresses handed out by DHCP if DHCP is enabled. The IP range is defined using the following syntax: xxx.xxx.xxx.<start-ip>-<end-ip> for example 192.168.1.20-30 Enter client login data follows: <username> * <password> * for example tes[...]

  • Page 16

    - 15 - Be careful enabling anonymous login. If anonymous login is enabled, everyone accessing your network has permission to read and write data. 2.3.3.7. Hotspot Most hotspot software requires a server to store user settings and login information. Please note that Sputnik is a commercial hotspot service that requires an agreement with Sputnik for [...]

  • Page 17

    - 16 - 2.3.6.2. Port Range Forwarding Port range forwarding works similarly to port forwarding. Unlike port forwarding, instead of a single port, a range of ports is forwarded to the same range of ports at the internal target IP address. 2.3.6.3. Port Triggering Port triggering is a kind of port range forwarding where outgoing traffic on specific p[...]

  • Page 18

    - 17 - 2.3.7.2. Keep Alive Keep-Alive lets you configure monitoring options that automatically reboot the router if a service malfunction causes it to fail to respond. 2.3.7.3. Commands Entering Linux commands is one of the most powerful ways to access the router’s functionality. This enables you to access services and configure options that are [...]

  • Page 19

    - 18 - 2.3.8.3. LAN Here you can find LAN-related information like active clients and DHCP clients. 2.3.8.4. Wireless The wireless LAN status screen displays the current wireless LAN interface configuration, wireless LAN clients (in AP modes), and access points (in client modes). If there’s more than one wireless LAN interface, you can switch bet[...]

  • Page 20

    - 19 - 3. Use Cases The following use cases relate to the most commonly used router configurations. The related router configuration is explained step by step. 3.1. Access Point Access Point (AP, sometimes also called “Infrastructure Mode”) is the mode where the router is also the central wireless hub that connects to the LAN and provides acces[...]

  • Page 21

    - 20 -  Configure “Wireless Mode“ to “AP“  Set your desired wireless mode in “Wireless Network Mode“. Please note that mixed modes will lead to reduced performance because of maintaining compatibility.  Enter a name for your wireless network into “Wireless Network Name (SSID)”  Click “Save“ Wireless -> Wireless Se[...]

  • Page 22

    - 21 - 3.2. Wireless Client The router can be also used as a wireless LAN client. This can be useful if you want to connect devices to your wireless LAN that do not have a wireless LAN interface. In this configuration, the wireless LAN interface acts as a wireless client. Attached wired Ethernet devices can also access the WAN through the wireless [...]

  • Page 23

    - 22 - Wireless -> Wireless Security  Configure the security mode to match the security settings of the access point you want to connect to.  Click “Apply Settings“. After the router reboots, please confirm that it has connected to the access point. If there is a DHCP server available on the access point side, and the router is configu[...]

  • Page 24

    - 23 - Wireless -> Basic Settings  Configure “Wireless Mode” to “Client Bridge”.  Set “Wireless Network Mode” to match the access point you want to connect to.  Enter the network name (SSID) of the AP you want to connect to.  Click “Save”. Wireless -> Wireless Security  Configure security to match the security s[...]

  • Page 25

    - 24 - ・ Connect a USB disk to the router. After a short wait, the disk information is displayed in the Disk Info section. Services -> NAS ・ Make the settings in the ProFTPD section, and click [Apply Settings]. Setting example: ProFTPD Enable Server Port 21 Files Directory /mnt Allow Write Enable User Password List buffalo 12345678 Anonymous[...]

  • Page 26

    - 25 - 3.4.2. Logging into the FTP server ・ Open a command prompt window. ・ Enter “ftp 192.168.11.1” to access the FTP server. ・ Enter the user name, and press the Enter key. ・ Enter the password, and press the Enter key. ・ When the login is successful, “ftp>” appears on the screen. ・ To logout, enter the “bye” command. 3[...]

  • Page 27

    - 26 - delete Deletes a file on the remote computer delete test1.jpg mdelete Deletes multiple files on the remote computer mdelete test1.jpg test2.jpg test3.jpg rename Renames a file on the remote computer rename test1.jpg new1.jpg help Displays the Help for FTP commands help bye Exits FTP bye 3.5. Changing Firmware To change between the profession[...]

  • Page 28

    - 27 - User-friendly firmware update screen:[...]

  • Page 29

    - 28 - 4. GPL Statement The firmware that is used in this product includes software that is subject to the GNU Public Licence (GPL)/the GNU Lesser Public Licence (LGPL). To the extent that it is applicable within the context of the GPL and the LGPL, the conditions of the GPL and the LGPL, as well as the relevant source codes, are available from the[...]

  • Page 30

    - 29 - software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger [...]

  • Page 31

    - 30 - thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright noti[...]

  • Page 32

    - 31 - The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a spec[...]

  • Page 33

    - 32 - apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is im[...]

  • Page 34

    - 33 - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRI[...]