X Micro Tech Network Router XWL 11GRTX User Manual

WLAN 11g Broadband Router  
User Manual  
V 1.0  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Federal Communications Commission (FCC) Statement  
This equipment has been tested and found to comply with the limits for a Class B digital  
device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable  
protection against harmful interference in a residential installation. This equipment generates,  
uses and can radiate radio frequency energy and, if not installed and used in accordance  
with the instructions, may cause harmful interference to radio communications. However,  
there is no guarantee that interference will not occur in a particular installation. If this  
equipment does cause harmful interference to radio or television reception, which can be  
determined by turning the equipment off and on, the user is encouraged to try to correct the  
interference by one or more of the following measures:  
-Reorient or relocate the receiving antenna.  
-Increase the separation between the equipment and receiver.  
-Connect the equipment into an outlet on a circuit different from that to which the receiver is  
connected.  
-Consult the dealer or an experienced radio/TV technician for help.  
Operation is subject to the following two conditions:  
1) this device may not cause interference and  
2) this device must accept any interference, including interference that may cause undesired  
operation of the device.  
FCC RF Radiation Exposure Statement:  
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled  
environment. End users must follow the specific operating instructions for satisfying RF  
exposure compliance. This device must not be co-located or operating in conjunction with  
any other antenna or transmitter.  
Your device contains a low power transmitter. When device is transmitted it sends out Radio  
Frequency (RF) signal. In order to maintain compliance with the FCC RF exposure guidelines,  
this equipment should be installed and operated with minimum distance 20cm between the  
radiator and your body.  
Use only with supplied antenna. Unauthorized antenna, modification, or attachments could  
damage the transmitter and may violate FCC regulations.  
X-Micro declares that US model of XWL-11GRTX, (FCC ID: RAFRTX) is limited in CH 1~ CH  
11 for 2.4G band by specific firmware controlled by the manufacturer and is not user  
changeable.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Copyright  
Copyright 2007 by X-Micro Technology Corp., All rights reserved. No part of  
this publication may be reproduced, transmitted, transcribed, stored in a  
retrieval system, or translated into any language or computer language, in any  
form or by any means, electronic, mechanical, magnetic, optical, chemical,  
manual or otherwise, without the prior written permission of X-Micro  
Technology Corp.  
Disclaimer  
X-Micro Technology Corp. makes no representations or warranties, either  
expressed or implied, with respect to the contents hereof and specifically  
disclaims any warranties, merchantability or fitness for any particular purpose.  
Any software described in this manual is sold or licensed "as is". Should the  
programs prove defective following their purchase, the buyer (and not this  
company, its distributor, or its dealer) assumes the entire cost of all necessary  
servicing, repair, and any incidental or consequential damages resulting from  
any defect in the software. Further, X-Micro Technology Corp., reserves the  
right to revise this publication and to make changes from time to time in the  
contents hereof without obligation to notify any person of such revision or  
change.  
All brand and product names mentioned in this manual are trademarks and/or  
registered trademarks of their respective holders.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table of Contents  
TERMINOLOGY...............................................................................................................................I  
1
INTRODUCTION..................................................................................................................... 1  
1.1 PACKAGE CONTENTS........................................................................................................... 1  
1.2 PRODUCT SPECIFICATIONS................................................................................................. 1  
1.3 PRODUCT FEATURES .......................................................................................................... 2  
1.4 PANEL DESCRIPTION........................................................................................................... 3  
2
3
INSTALLATION....................................................................................................................... 5  
2.1 HARDWARE INSTALLATION .................................................................................................. 5  
2.2 SOFTWARE INSTALLATION................................................................................................... 5  
SOFTWARE CONFIGURATION .......................................................................................... 6  
3.1 PREPARE YOUR PC TO CONFIGURE THE X-MICRO WLAN 11G BROADBAND ROUTER .... 6  
3.2 CONNECT TO THE X-MICRO WLAN 11G BROADBAND ROUTER........................................ 7  
3.3 MANAGEMENT AND CONFIGURATION ON THE X-MICRO WLAN 11G BROADBAND ROUTER  
8
3.3.1  
3.3.2  
I
Status ........................................................................................................................ 8  
Setup Wizard ......................................................................................................... 10  
Operation Mode......................................................................................................... 10  
II Time Zone Setting..................................................................................................... 11  
III LAN Interface Setup ................................................................................................. 11  
IV WAN Interface Setup................................................................................................ 12  
V
Wireless Basic Settings............................................................................................ 12  
VI Wireless Security Setup........................................................................................... 13  
3.3.3  
Operation Mode..................................................................................................... 13  
Wireless - Basic Settings ..................................................................................... 14  
Wireless - Advanced Settings ............................................................................. 15  
Wireless - Security Setup..................................................................................... 17  
WEP Key Setup......................................................................................................... 19  
Wireless - Access Control.................................................................................... 20  
WDS Settings......................................................................................................... 21  
WDS Security Setup................................................................................................. 22  
3.3.4  
3.3.5  
3.3.6  
I
3.3.7  
3.3.8  
I
II WDS AP Table ........................................................................................................... 22  
3.3.9  
Site Survey............................................................................................................. 23  
3.3.10 LAN Interface Setup ............................................................................................. 24  
i
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3.11 WAN Interface Setup............................................................................................ 25  
Static IP....................................................................................................................... 26  
I
II DHCP Client............................................................................................................... 27  
III PPPoE......................................................................................................................... 29  
IV PPTP........................................................................................................................... 31  
3.3.12 Firewall - Port Filtering.......................................................................................... 32  
3.3.13 Firewall - IP Filtering............................................................................................. 33  
3.3.14 Firewall - MAC Filtering........................................................................................ 34  
3.3.15 Firewall - Port Forwarding.................................................................................... 35  
3.3.16 Firewall – URL Filtering........................................................................................ 37  
3.3.17 Firewall - DMZ........................................................................................................ 37  
3.3.18 VPN Setting............................................................................................................ 38  
I
VPN Setup - Edit Tunnel.......................................................................................... 40  
II Advanced IKE Setup................................................................................................. 42  
3.3.19 Management - Statistics....................................................................................... 43  
3.3.20 Management - DDNS ........................................................................................... 44  
3.3.21 Management - Time Zone Setting...................................................................... 44  
3.3.22 Management – Denial-of-Service....................................................................... 45  
3.3.23 Management - Log................................................................................................ 46  
3.3.24 Management - Upgrade Firmware ..................................................................... 47  
3.3.25 Management Save/ Reload Settings ................................................................. 48  
3.3.26 Management - Password Setup ......................................................................... 49  
3.3.27 Management - WatchDog.................................................................................... 49  
3.3.28 Management - Quality of Service ....................................................................... 50  
3.3.29 Logout ..................................................................................................................... 52  
4
FREQUENTLY ASKED QUESTIONS (FAQ) ................................................................... 53  
4.1 WHAT AND HOW TO FIND MY PC’S IPAND MAC ADDRESS? ............................................ 53  
4.2 WHAT IS WIRELESS LAN?................................................................................................ 53  
4.3 WHAT ARE ISM BANDS? ................................................................................................... 53  
4.4 HOW DOES WIRELESS NETWORKING WORK? ................................................................... 53  
4.5 WHAT IS BSSID?.............................................................................................................. 54  
4.6 WHAT IS ESSID?.............................................................................................................. 54  
4.7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE? ............................. 54  
4.8 WHAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS?........................... 55  
4.9 WHAT IS WEP?................................................................................................................. 55  
4.10 WHAT IS FRAGMENT THRESHOLD?................................................................................... 55  
4.11 WHAT IS RTS (REQUEST TO SEND) THRESHOLD?.......................................................... 56  
4.12 WHAT IS BEACON INTERVAL? ........................................................................................... 56  
ii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4.13 WHAT IS PREAMBLE TYPE? .............................................................................................. 57  
4.14 WHAT IS SSID BROADCAST? ........................................................................................... 57  
4.15 WHAT IS WI-FI PROTECTED ACCESS (WPA)?................................................................. 57  
4.16 WHAT IS WPA2?............................................................................................................... 57  
4.17 WHAT IS 802.1X AUTHENTICATION?................................................................................. 58  
4.18 WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)?............................................... 58  
4.19 WHAT IS ADVANCED ENCRYPTION STANDARD (AES)?.................................................... 58  
4.20 WHAT IS INTER-ACCESS POINT PROTOCOL (IAPP)? ...................................................... 58  
4.21 WHAT IS WIRELESS DISTRIBUTION SYSTEM (WDS)? ..................................................... 58  
4.22 WHAT IS UNIVERSAL PLUG AND PLAY (UPNP)?............................................................... 58  
4.23 WHAT IS MAXIMUM TRANSMISSION UNIT (MTU) SIZE?................................................... 59  
4.24 WHAT IS CLONE MAC ADDRESS?.................................................................................... 59  
4.25 WHAT IS DDNS? .............................................................................................................. 59  
4.26 WHAT IS NTP CLIENT?..................................................................................................... 59  
4.27 WHAT IS VPN? ................................................................................................................. 59  
4.28 WHAT IS IPSEC?.............................................................................................................. 59  
4.29 WHAT IS WLAN BLOCK RELAY BETWEEN CLIENTS? ...................................................... 59  
4.30 WHAT IS WMM? ............................................................................................................... 59  
4.31 WHAT IS WLAN ACK TIMOUT?..................................................................................... 60  
5.1 EXAMPLE ONE – PPPOE ON THE WAN ............................................................................... 61  
5.2 EXAMPLE TWO – FIXED IP ON THE WAN.............................................................................. 63  
WWW.X-MICRO.COM......................................................................................................................... 67  
iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Terminology  
i
Download from Www.Somanuals.com. All Manuals Search And Download.  
ii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1 Introduction  
The X-Micro Wireless LAN Broadband Router is an affordable IEEE 802.11b/g wireless  
LAN broadband router solution; setting SOHO and enterprise standard for high  
performance, secure, manageable and reliable WLAN.  
This document describes the steps required for the initial IP address assign and other  
WLAN router configuration. The description includes the implementation of the above  
steps.  
1.1Package contents  
The package of the X-Micro WLAN 11g Broadband Router includes the following  
items,  
9
9
9
9
9
X-Micro WLAN 11g Broadband Router  
DC 7.5V Power Adapter  
Quick installation Guide  
CD-ROM  
1.8M RJ-45 Cable Line  
1.2Product Specifications  
Product Name  
X-Micro WLAN 11g Broadband Router  
Standard  
802.11b/g(Wireless), 802.3(10BaseT), 802.3u(100BaseT)  
54Mbps(Wireless), 100Mbps(Ethernet)  
CCK(802.11b), OFDM(802.11g)  
Data Transfer Rate  
Modulation Method  
Frequency Band  
RF Output Power  
Receiver Sensitivity  
Operation Range  
Antenna  
2.4GHz – 2.497GJz ISM Band, DSSS  
CCK< 17 dBm, OFDM< 13.5 dBm  
802.11b -80 dBm@8%, 802.11g -68 dBm@5%  
30 to 300 meters (depend on surrounding)  
External Antenna  
LED  
Power, Active (WLAN/Ethernet)  
Security  
64 bit/ 128 bit WEP, WPA, WPA2, port filtering, IP filtering, MAC  
filtering, port forwarding and DMZ hosting  
One (WAN) Four (LAN) , 10/100BaseT, RJ45 connectors  
LAN interface  
Power Consumption 7.5V DC Power Adapter  
Operating Temperature 0 ~ 50oC ambient temperature  
Storage Temperature -20 ~ 70oC ambient temperature  
Humidity  
5 to 90 % maximum (non-condensing)  
137x96x35mm  
Dimension  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.3 Product Features  
Generic Router  
¾
¾
Complies with IEEE 802.11b/g standard for 2.4GHz Wireless LAN.  
Supports multi-operation (bridge/gateway/WISP) modes between wireless  
and wired Ethernet interfaces.  
¾
Supports 64-bit and 128-bit WEP, WPA, WPA2 encryption/decryption  
function to protect the wireless data transmission.  
Supports IEEE 802.1x Authentication.  
¾
¾
Support Wi-Fi Protected Access Authentication with Radius and Pre-Shared  
Key mode.  
¾
¾
¾
¾
¾
Supports Inter-Access Point Protocol (IAPP).  
Supports Wireless Distribution System (WDS).  
Supports IEEE 802.3x full duplex flow control on 10/100M Ethernet interface.  
Supports DHCP server to provide clients auto IP addresses assignment.  
Supports DHCP client for WAN interface auto IP address assignment from  
ISP.  
¾
¾
¾
¾
Supports PPPoE on WAN interface.  
Supports PPTP Client on Ethernet WAN interface.  
Supports clone MAC address function.  
Supports firewall security with port filtering, IP filtering, MAC filtering, port  
forwarding, trigger port, DMZ hosting and URL filtering functions.  
Supports WEB based management and configuration.  
Supports UPnP for automatic Internet access.  
Supports Dynamic DNS service.  
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
Supports NTP client service.  
Supports Log table and remote Log service.  
Support Setup Wizard mode.  
Support DoS (Denial of Service) function.  
Support WMM function.  
Support Ping watchdog.  
Support QoS/Bandwidth Control function.  
VPN Router  
¾
¾
Supports Virtual Private Network (VPN) connection.  
Supports IPSEC tunnel encryption(3DES/AES128) and  
authentication(MD5/SHA1)  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
1.4 Panel Description  
Power LED  
WLAN LED  
LAN LED  
WAN LED  
LED Indicator  
State  
Description  
On  
The X-Micro WLAN 11g Broadband Router  
is powered on.  
1. Power LED  
Off  
The X-Micro WLAN 11g Broadband Router  
is powered off.  
Flashing  
Off  
2. WLAN LED  
Data is transmitting or receiving on the  
antenna.  
No data is transmitting or receiving on the  
antenna.  
3. WAN LED  
ACT  
Flashing  
Off  
Data is transmitting or receiving on the  
WAN interface.  
No data is transmitting or receiving on the  
WAN interface.  
On  
10/100M  
Connection speed is 100Mbps on WAN  
interface.  
Off  
Connection speed is 10Mbps on WAN  
interface.  
4. LAN LED  
ACT  
Flashing  
Off  
Data is transmitting or receiving on the LAN  
interface.  
No data is transmitting or receiving on the  
LAN interface.  
On  
10/100M  
Connection speed is 100Mbps on LAN  
interface.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Antenna  
Reset  
LAN  
Power  
WAN  
Interfaces  
Description  
1. Antenna  
2. WAN  
The Wireless LAN Antenna.  
The RJ-45 socket allows WAN connection through a  
Category 5 cable. Support auto-sensing on 10/100M  
speed and half/ full duplex; comply with IEEE 802.3/  
802.3u respectively.  
3. LAN  
The RJ-45 sockets allow LAN connection through  
Category 5 cables. Support auto-sensing on 10/100M  
speed and half/ full duplex; comply with IEEE 802.3/  
802.3u respectively.  
4. Power  
The power jack allows an external DC +7.5 V power  
supply connection.  
The external AC to DC adaptor provide adaptive power  
requirement to the X-Micro WLAN 11g Broadband  
Router.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
2 Installation  
2.1Hardware Installation  
Step 1: Place the Wireless LAN Broadband Router to the best optimum  
transmission location. The best transmission location for your X-Micro  
WLAN 11g Broadband Router is usually at the geographic center of your  
wireless network, with line of sign to all of your mobile stations.  
Step 2: Connect the X-Micro WLAN 11g Broadband Router to your wired network.  
Connect the Ethernet WAN interface of X-Micro WLAN 11g Broadband  
Router by category 5 Ethernet cable to your switch/ hub/ xDSL modem or  
cable modem. A straight-through Ethernet cable with appropriate cable  
length is needed.  
Step 3: Supply DC power to the X-Micro WLAN 11g Broadband Router. Use only  
the AC/DC power adapter supplied with the X-Micro WLAN 11g  
Broadband Router; it may occur damage by using a different type of  
power adapter.  
The hardware installation finished.  
2.2Software Installation  
¾
There are no software drivers, patches or utilities installation needed, but  
only the configuration setting. Please refer to chapter 3 for software  
configuration.  
Notice: It will take about 55 seconds to complete the boot up sequence  
after powered on the X-Micro WLAN 11g Broadband Router;  
Power LED will be active, and after that the WLAN Activity LED  
will be flashing to show the WLAN interface is enabled and  
working now.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
3 Software configuration  
There are web based management and configuration functions allowing you to have  
the jobs done easily.  
The X-Micro WLAN 11g Broadband Router is delivered with the following factory  
default parameters on the Ethernet LAN interfaces.  
Default IP Address: 192.168.1.254  
Default IP subnet mask: 255.255.255.0  
WEB login User Name: <empty>  
WEB login Password: <empty>  
3.1 Prepare your PC to configure the X-Micro WLAN 11g Broadband  
Router  
For OS of Microsoft Windows 95/ 98/ Me:  
1. Click the Start button and select Settings, then click Control Panel. The  
Control Panel window will appear.  
Note: Windows Me users may not see the Network control panel. If so, select  
View all Control Panel options on the left side of the window  
2. Move mouse and double-click the right button on Network icon. The Network  
window will appear.  
3. Check the installed list of Network Components. If TCP/IP is not installed,  
click the Add button to install it; otherwise go to step 6.  
4. Select Protocol in the Network Component Type dialog box and click Add  
button.  
5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click  
OK button to install the TCP/IP protocol, it may need the Microsoft Windows  
CD to complete the installation. Close and go back to Network dialog box after  
the TCP/IP installation.  
6. Select TCP/IP and click the properties button on the Network dialog box.  
7. Select Specify an IP address and type in values as following example.  
9
IP Address: 192.168.1.1, any IP address within 192.168.1.1 to  
192.168.1.253 is good to connect the Wireless LAN Access Point.  
IP Subnet Mask: 255.255.255.0  
9
8. Click OK and reboot your PC after completes the IP parameters setting.  
For OS of Microsoft Windows 2000, XP:  
1. Click the Start button and select Settings, then click Control Panel. The  
Control Panel window will appear.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
2. Move mouse and double-click the right button on Network and Dial-up  
Connections icon. Move mouse and double-click the Local Area  
Connection icon. The Local Area Connection window will appear. Click  
Properties button in the Local Area Connection window.  
3. Check the installed list of Network Components. If TCP/IP is not installed,  
click the Add button to install it; otherwise go to step 6.  
4. Select Protocol in the Network Component Type dialog box and click Add  
button.  
5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click  
OK button to install the TCP/IP protocol, it may need the Microsoft Windows  
CD to complete the installation. Close and go back to Network dialog box after  
the TCP/IP installation.  
6. Select TCP/IP and click the properties button on the Network dialog box.  
7. Select Specify an IP address and type in values as following example.  
9
IP Address: 192.168.1.1, any IP address within 192.168.1.1 to  
192.168.1.253 is good to connect the Wireless LAN Access Point.  
IP Subnet Mask: 255.255.255.0  
9
8. Click OK to completes the IP parameters setting.  
For OS of Microsoft Windows NT:  
1. Click the Start button and select Settings, then click Control Panel. The  
Control Panel window will appear.  
2. Move mouse and double-click the right button on Network icon. The Network  
window will appear. Click Protocol tab from the Network window.  
3. Check the installed list of Network Protocol window. If TCP/IP is not installed,  
click the Add button to install it; otherwise go to step 6.  
4. Select Protocol in the Network Component Type dialog box and click Add  
button.  
5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click  
OK button to install the TCP/IP protocol, it may need the Microsoft Windows  
CD to complete the installation. Close and go back to Network dialog box after  
the TCP/IP installation.  
6. Select TCP/IP and click the properties button on the Network dialog box.  
7. Select Specify an IP address and type in values as following example.  
9
IP Address: 192.168.1.1, any IP address within 192.168.1.1 to  
192.168.1.253 is good to connect the Wireless LAN Access Point.  
IP Subnet Mask: 255.255.255.0  
9
8. Click OK to complete the IP parameters setting.  
3.2 Connect to the X-Micro WLAN 11g Broadband Router  
Open a WEB browser, i.e. Microsoft Internet Explore, then enter 192.168.1.254  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
on the URL to connect the X-Micro WLAN 11g Broadband Router.  
3.3 Management and configuration on the X-Micro WLAN 11g Broadband  
Router  
3.3.1 Status  
This page shows the current status and some basic settings of the device,  
includes system, wireless, Ethernet LAN and WAN configuration  
information.  
Screen snapshot – Status  
Item  
Description  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
System  
Uptime  
It shows the duration since X-Micro WLAN 11g Broadband Router  
is powered on.  
Firmware version  
It shows the firmware version of X-Micro WLAN 11g Broadband  
Router.  
Wireless  
configuration  
Mode  
It shows wireless operation mode  
Band  
It shows the current wireless operating frequency.  
It shows the SSID of this X-Micro WLAN 11g Broadband Router.  
The SSID is the unique name of X-Micro WLAN 11g Broadband  
Router and shared among its service area, so all devices  
attempts to join the same wireless network can identify it.  
It shows the wireless channel connected currently.  
It shows the status of encryption function.  
SSID  
Channel Number  
Encryption  
BSSID  
It shows the BSSID address of the X-Micro WLAN 11g Broadband  
Router. BSSID is a six-byte address.  
Associated Clients  
TCP/IP configuration  
Attain IP Protocol  
IP Address  
It shows the number of connected clients (or stations, PCs).  
It shows type of connection.  
It shows the IP address of LAN interfaces of X-Micro WLAN 11g  
Broadband Router.  
Subnet Mask  
It shows the IP subnet mask of LAN interfaces of X-Micro WLAN  
11g Broadband Router.  
Default Gateway  
It shows the default gateway setting for LAN interfaces outgoing  
data packets.  
DHCP Server  
MAC Address  
It shows the DHCP server is enabled or not.  
It shows the MAC address of LAN interfaces of X-Micro WLAN  
11g Broadband Router.  
WAN configuration  
Attain IP Protocol  
It shows how the X-Micro WLAN 11g Broadband Router gets the  
IP address. The IP address can be set manually to a fixed one or  
set dynamically by DHCP server or attain IP by PPPoE / PPTP  
connection.  
IP Address  
It shows the IP address of WAN interface of X-Micro WLAN 11g  
Broadband Router.  
Subnet Mask  
It shows the IP subnet mask of WAN interface of X-Micro WLAN  
11g Broadband Router.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
DNS1/DNS2/DNS3 It shows the DNS server information.  
3.3.2 Setup Wizard  
This page guides you to configure wireless broadband router for first time  
Screen snapshot – Setup Wizard  
I
Operation Mode  
This page followed by Setup Wizard page to define the operation  
mode.  
Screen snapshot – Operation Mode  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
II  
Time Zone Setting  
This page is used to enable and configure NTP client  
Screen snapshot – Time Zone Settings  
III LAN Interface Setup  
This page is used to configure local area network IP address and  
subnet mask  
Screen snapshot – LAN Interface Setup  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IV WAN Interface Setup  
This page is used to configure WAN access type  
Screen snapshot – WAN Interface Setup  
V
Wireless Basic Settings  
This page is used to configure basic wireless parameters like Band,  
Mode, Network Type SSID, Channel Number, Enable Mac  
Clone(Single Ethernet Client)  
Screen snapshot – Wireless Basic Settings  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VI Wireless Security Setup  
This page is used to configure wireless security  
Screen snapshot – Wireless Security Setup  
3.3.3 Operation Mode  
This page is used to configure which mode wireless broadband router  
acts  
Screen snapshot – Operation Mode  
Item  
Description  
Gateway  
Traditional gateway configuration. It always  
connects internet via ADSL/Cable Modem. LAN  
interface, WAN interface, Wireless interface, NAT  
and Firewall modules are applied to this mode  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Bridge  
Each interface (LAN, WAN and Wireless) regards as  
bridge. NAT, Firewall and all router’s functions are  
not supported  
Wireless ISP  
Switch Wireless interface to WAN port and all  
Ethernet ports in bridge mode. Wireless interface  
can do all router’s functions  
Apply Changes  
Reset  
Click the Apply Changes button to complete the  
new configuration setting.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
3.3.4 Wireless - Basic Settings  
This page is used to configure the parameters for wireless LAN clients  
that may connect to your Broadband Router. Here you may change  
wireless encryption settings as well as wireless network parameters.  
Screen snapshot – Wireless Basic Settings  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
Disable Wireless LAN Click on to disable the wireless LAN data  
Interface  
Band  
transmission.  
Click to select 2.4GHz(B) / 2.4GHz(G) /  
2.4GHz(B+G)  
Mode  
Click to select the WLAN AP / Client / WDS /  
AP+WDS wireless mode.  
Site Survey  
The Site Survey button provides tool to scan the  
wireless network. If any Access Point or IBSS is  
found, you could choose to connect it manually  
when client mode is enabled. Refer to 3.3.9 Site  
Survey.  
SSID  
It is the wireless network name. The SSID can be 32  
bytes long.  
Channel Number  
Associated Clients  
Select the wireless communication channel from  
pull-down menu.  
Click the Show Active Clients button to open Active  
Wireless Client Table that shows the MAC address,  
transmit-packet, receive-packet and  
transmission-rate for each associated wireless  
client.  
Enable Mac Clone  
(Single Ethernet  
Client)  
Take Laptop NIC MAC address as wireless client  
MAC address. [Client Mode only]  
Enable Universal  
Repeater Mode  
SSID of Extended  
Interface  
Click to enable Universal Repeater Mode  
Assign SSID when enables Universal Repeater  
Mode.  
Apply Changes  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.5 Wireless - Advanced Settings  
These settings are only for more technically advanced users who have a  
sufficient knowledge about wireless LAN. These settings should not be  
changed unless you know what effect the changes will have on your  
X-Micro WLAN 11g Broadband Router.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Wireless Advanced Settings  
Item  
Description  
Authentication Type  
Click to select the authentication type in Open  
System, Shared Key or Auto selection.  
Fragment Threshold Set the data packet fragmentation threshold, value  
can be written between 256 and 2346 bytes.  
Refer to 4.10 What is Fragment Threshold?  
RTS Threshold  
Set the RTS Threshold, value can be written  
between 0 and 2347 bytes.  
Refer to 4.11 What is RTS(Request To Send)  
Threshold?  
Beacon Interval  
Data Rate  
Set the Beacon Interval, value can be written  
between 20 and 1024 ms.  
Refer to 4.12 What is Beacon Interval?  
Select the transmission data rate from pull-down  
menu. Data rate can be auto-select, 11M, 5.5M, 2M  
or 1Mbps.  
Preamble Type  
Click to select the Long Preamble or Short  
Preamble support on the wireless data packet  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
transmission.  
Refer to 4.13 What is Preamble Type?  
Click to enable or disable the SSID broadcast  
function.  
Broadcast SSID  
IAPP  
Refer to 4.14 What is SSID Broadcast?  
Click to enable or disable the IAPP function.  
Refer to 4.20 What is Inter-Access Point  
Protocol(IAPP)?  
802.11g Protection  
RF Output Power  
Turbo Mode  
Protect 802.11b user.  
To adjust transmission power level.  
Click to Enable/Disable turbo mode.(Only apply to  
WLAN IC of Realtek).  
Block Relay Between Click Enabled/Disabled to decide if blocking relay  
Clients  
packets between clients.  
WMM  
Click Enabled/Disabled to init WMM feature.  
Set ACK timeout value. It shows current time in the  
end.  
ACK Timeout  
Apply Changes  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.6 Wireless - Security Setup  
This page allows you setup the wireless security. Turn on WEP, WPA,  
WPA2 by using encryption keys could prevent any unauthorized access to  
your wireless network.  
Screen snapshot – Wireless Security Setup  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
Encryption  
Select the encryption supported over wireless  
access. The encryption method can be None, WEP,  
WPA(TKIP), WPA2 or WPA2 Mixed  
Refer to 4.9 What is WEP?  
4.15 What is Wi-Fi Protected Access (WPA)?  
4.16 What is WPA2(AES)?  
4.17 What is 802.1X Authentication?  
4.18 What is Temporal Key Integrity Protocol  
(TKIP)? 4.19 What is Advanced Encryption Standard  
(AES)?  
Use 802.1x  
While Encryption is selected to be WEP.  
Click the check box to enable IEEE 802.1x  
authentication function.  
Authentication  
Refer to 4.16 What is 802.1x Authentication?  
WPA Authentication While Encryption is selected to be WPA.  
Mode  
Click to select the WPAAuthentication Mode with  
Enterprise (RADIUS) or Personal (Pre-Shared Key).  
Refer to 4.15 What is Wi-Fi Protected Access  
(WPA)?  
Pre-Shared Key  
Format  
While Encryption is selected to be WPA.  
Select the Pre-shared key format from the pull-down  
menu. The format can be Passphrase or Hex (64  
characters). [WPA, Personal(Pre-Shared Key)  
only]  
Pre-Shared Key  
Fill in the key value. [WPA, Personal(Pre-Shared  
Key) only]  
Enable  
Click to enable Pre-Authentication. [WPA2/WPA2  
Mixed only, Enterprise only]  
Pre-Authentication  
Authentication  
RADIUS Server  
Apply Changes  
Set the IP address, port and login password  
information of authentication RADIUS sever.  
Click the Apply Changes button to complete the  
new configuration setting.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
I
WEP Key Setup  
Screen snapshot – WEP Key Setup  
Item  
Description  
Key Length  
Select the WEP shared secret key length from  
pull-down menu. The length can be chose between  
64-bit and 128-bit (known as “WEP2”) keys.  
The WEP key is composed of initialization vector (24  
bits) and secret key (40-bit or 104-bit).  
Key Format  
Select the WEP shared secret key format from  
pull-down menu. The format can be chose between  
plant text (ASCII) and hexadecimal (HEX) code.  
Set the default secret key for WEP security function.  
Value can be chose between 1 and 4.  
Default Tx Key  
Encryption Key 1  
Encryption Key 2  
Encryption Key 3  
Encryption Key 4  
Apply Changes  
Secret key 1 of WEP security encryption function.  
Secret key 2 of WEP security encryption function.  
Secret key 3 of WEP security encryption function.  
Secret key 4 of WEP security encryption function.  
Click the Apply Changes button to complete the  
new configuration setting.  
Close  
Click to close this WEP Key setup window.  
WEP encryption key (secret key) length:  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3.7 Wireless - Access Control  
If you enable wireless access control, only those clients whose wireless  
MAC addresses are in the access control list will be able to connect to  
your Access Point. When this option is enabled, no wireless clients will be  
able to connect if the list contains no entries.  
Screen snapshot – Wireless Access Control  
Item  
Description  
Wireless Access  
Control Mode  
Click the Disabled, Allow Listed or Deny Listed of  
drop down menu choose wireless access control  
mode.  
This is a security control function; only those clients  
registered in the access control list can link to this  
X-Micro WLAN 11g Broadband Router.  
Fill in the MAC address of client to register this  
X-Micro WLAN 11g Broadband Router access  
capability.  
MAC Address  
Comment  
Fill in the comment tag for the registered client.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Reset  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Current Access  
Control List  
It shows the registered clients that are allowed to  
link to this X-Micro WLAN 11g Broadband Router.  
Click to delete the selected clients that will be  
access right removed from this X-Micro WLAN 11g  
Broadband Router.  
Delete Selected  
Delete All  
Click to delete all the registered clients from the  
access allowed list.  
3.3.8 WDS Settings  
Wireless Distribution System uses wireless media to communicate with  
other APs, like the Ethernet does. To do this, you must set these APs in  
the same channel and set MAC address of other AP that you want to  
communicate with in the table and then enable the WDS.  
Screen snapshot – WDS Setup  
Item  
Description  
Enable WDS  
Click the check box to enable wireless distribution  
system. Refer to 4.21 What is Wireless Distribution  
System (WDS)?  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Comment  
Fill in the comment tag for the registered AP.  
Click the Apply Changes button to register the AP  
to new configuration setting.  
Apply Changes  
Reset  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Set Security  
Click button to configure wireless security like  
WEP(64bits), WEP(128bits), WPA(TKIP),  
WPA2(AES) or None  
Show Statistics  
Delete Selected  
It shows the TX, RX packets, rate statistics  
Click to delete the selected clients that will be  
removed from the wireless distribution system.  
Click to delete all the registered APs from the  
wireless distribution system allowed list.  
Delete All  
I
WDS Security Setup  
Requirement: Set [Wireless]->[Basic  
Settings]->[Mode]->AP+WDS  
This page is used to configure the wireless security between APs.  
Refer to 3.3.6 Wireless Security Setup.  
Screen snapshot – WDS Security Setup  
II  
WDS AP Table  
This page is used to show WDS statistics  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – WDS AP Table  
Item  
Description  
MAC Address  
Tx Packets  
It shows the MAC Address within WDS.  
It shows the statistic count of sent packets on the  
wireless LAN interface.  
Tx Errors  
It shows the statistic count of error sent packets on  
the Wireless LAN interface.  
Rx Packets  
It shows the statistic count of received packets on  
the wireless LAN interface.  
Tx Rare (Mbps)  
Refresh  
It shows the wireless link rate within WDS.  
Click to refresh the statistic counters on the screen.  
3.3.9 Site Survey  
This page is used to view or configure other APs near yours.  
Screen snapshot – Wireless Site Survey  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Item  
Description  
SSID  
It shows the SSID of AP.  
BSSID  
Channel  
Type  
It shows BSSID of AP.  
It show the current channel of AP occupied.  
It show which type AP acts.  
Encrypt  
Signal  
Select  
Refresh  
It shows the encryption status.  
It shows the power level of current AP.  
Click to select AP or client you’d like to connect.  
Click the Refresh button to re-scan site survey on  
the screen.  
3.3.10 LAN Interface Setup  
This page is used to configure the parameters for local area network that  
connects to the LAN ports of your X-Micro WLAN 11g Broadband Router.  
Here you may change the setting for IP address, subnet mask, DHCP,  
etc.  
Screen snapshot – LAN Interface Setup  
Item  
Description  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Subnet Mask  
Default Gateway  
DHCP  
Fill in the subnet mask of LAN interfaces of this  
WLAN Access Point.  
Fill in the default gateway for LAN interfaces out  
going data packets.  
Click to select Disabled, Client or Server in  
different operation mode of wireless Access Point.  
DHCP Client Range Fill in the start IP address and end IP address to  
allocate a range of IP addresses; client with DHCP  
function set will be assigned an IP address from the  
range.  
Show Client  
Click to open the Active DHCP Client Table window  
that shows the active clients with their assigned IP  
address, MAC address and time expired  
information. [Server mode only]  
DNS Server  
Manual setup DNS server IP address.  
Assign Domain Name and dispatch to DHCP clients.  
It is optional field.  
Domain Name  
802.1d Spanning  
Tree  
Select to enable or disable the IEEE 802.1d  
Spanning Tree function from pull-down menu.  
Clone MAC Address Fill in the MAC address that is the MAC address to  
be cloned. Refer to 4.24 What is Clone MAC  
Address?  
Apply Changes  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.11 WAN Interface Setup  
This page is used to configure the parameters for wide area network that  
connects to the WAN port of your X-Micro WLAN 11g Broadband Router.  
Here you may change the access method to Static IP, DHCP, PPPoE  
or PPTP by click the item value of WAN Access Type.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
I
Static IP  
Screen snapshot – WAN Interface Setup – Static IP  
Item  
Description  
Static IP  
Click to select Static IP support on WAN interface.  
There are IP address, subnet mask and default  
gateway settings need to be done.  
IP Address  
If you select the Static IP support on WAN interface,  
fill in the IP address for it.  
Subnet Mask  
Default Gateway  
If you select the Static IP support on WAN interface,  
fill in the subnet mask for it.  
If you select the Static IP support on WAN interface,  
fill in the default gateway for WAN interface out  
going data packets.  
MTU Size  
Fill in the mtu size of MTU Size. The default value is  
1400  
DNS 1  
DNS 2  
DNS 3  
Fill in the IP address of Domain Name Server 1.  
Fill in the IP address of Domain Name Server 2.  
Fill in the IP address of Domain Name Server 3.  
Clone MAC Address Fill in the MAC address that is the MAC address to  
be cloned. Refer to 4.24 What is Clone MAC  
Address?  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Enable Web Server Click the checkbox to enable web configuration from  
Access on WAN  
Enable WAN Echo  
Reply  
WAN side.  
Click the checkbox to enable WAN ICMP response.  
Enable IPsec pass  
through on VPN  
connection  
Click the checkbox to enable IPSec packet pass  
through  
Enable PPTP pass  
through on VPN  
connection  
Click the checkbox to enable PPTP packet pass  
through  
Enable L2TP pass  
through on VPN  
connection  
Click the checkbox to enable L2TP packet pass  
through  
Set TTL value  
Apply Changes  
Click to Enable and set Time to Live value.  
Click the Apply Changes button to complete the  
new configuration setting.  
II  
DHCP Client  
Screen snapshot – WAN Interface Setup – DHCP Client  
Item  
Description  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
server.  
Host Name  
MTU Size  
Fill in the host name of Host Name. The default  
value is empty  
Fill in the mtu size of MTU Size. The default value is  
1400  
Attain DNS  
Click to select getting DNS address for DHCP  
support. Please select Set DNS Manually if the  
DHCP support is selected.  
Automatically  
Set DNS Manually  
Click to select getting DNS address for DHCP  
support.  
DNS 1  
DNS 2  
DNS 3  
Fill in the IP address of Domain Name Server 1.  
Fill in the IP address of Domain Name Server 2.  
Fill in the IP address of Domain Name Server 3.  
Clone MAC Address Fill in the MAC address that is the MAC address to  
be cloned. Refer to 4.24 What is Clone MAC  
Address?  
Enable uPNP  
Click the checkbox to enable uPNP function.  
Refer to 4.22 What is Universal Plug and Play  
(uPNP)?  
Enable Web Server Click the checkbox to enable web configuration from  
Access on WAN  
Enable WAN Echo  
Reply  
WAN side.  
Click the checkbox to enable WAN ICMP response.  
Set TTL value  
Apply Changes  
Click to Enable and set Time to Live value.  
Click the Apply Changes button to complete the  
new configuration setting.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
III  
PPPoE  
Screen snapshot – WAN Interface Setup – PPPoE  
Item  
Description  
PPPoE  
Click to select PPPoE support on WAN interface.  
There are user name, password, connection type  
and idle time settings need to be done.  
If you select the PPPoE support on WAN interface,  
fill in the user name and password to login the  
PPPoE server.  
User Name  
Password  
If you select the PPPoE support on WAN interface,  
fill in the user name and password to login the  
PPPoE server.  
Service Name  
Fill in the service name of Service Name. The  
default value is empty.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
setup the connection through PPPoE protocol  
whenever you send the data packets out through the  
WAN interface; there are a watchdog implemented  
to close the PPPoE connection while there are no  
data sent out longer than the idle time set.  
Manual connection type means to setup the  
connection through the PPPoE protocol by clicking  
the Connect button manually, and clicking the  
Disconnect button manually.  
Idle Time  
MTU Size  
If you select the PPPoE and Connect on Demand  
connection type, fill in the idle time for  
auto-disconnect function. Value can be between 1  
and 1000 minutes.  
Fill in the mtu size of MTU Size. The default value is  
1400. Refer to 4.23 What is Maximum Transmission  
Unit (MTU) Size?  
Attain DNS  
Click to select getting DNS address for PPPoE  
support. Please select Set DNS Manually if the  
PPPoE support is selected.  
Automatically  
Set DNS Manually  
Click to select getting DNS address for Static IP  
support.  
DNS 1  
DNS 2  
DNS 3  
Fill in the IP address of Domain Name Server 1.  
Fill in the IP address of Domain Name Server 2.  
Fill in the IP address of Domain Name Server 3.  
Clone MAC Address Fill in the MAC address that is the MAC address to  
be cloned. Refer to 4.24 What is Clone MAC  
Address?  
Enable uPNP  
Click the checkbox to enable uPNP function.  
Refer to 4.22 What is Universal Plug and Play  
(uPNP)?  
Enable Web Server Click the checkbox to enable web configuration from  
Access on WAN  
Enable WAN Echo  
Reply  
WAN side.  
Click the checkbox to enable WAN ICMP response.  
Set TTL value  
Apply Changes  
Click to Enable and set Time to Live value.  
Click the Apply Changes button to complete the  
new configuration setting.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IV  
PPTP  
Screen snapshot – WAN Interface Setup – PPTP  
Item  
Description  
PPTP  
Allow user to make a tunnel with remote site directly  
to secure the data transmission among the  
connection. User can use embedded PPTP client  
supported by this router to make a VPN connection.  
If you select the PPTP support on WAN interface, fill  
in the IP address for it.  
IP Address  
Subnet Mask  
If you select the PPTP support on WAN interface, fill  
in the subnet mask for it.  
Server IP Address  
User Name  
Enter the IP address of the PPTP Server.  
If you select the PPTP support on WAN interface, fill  
in the user name and password to login the PPTP  
server.  
Password  
f you select the PPTP support on WAN interface, fill  
in the user name and password to login the PPTP  
server.  
MTU Size  
Fill in the mtu size of MTU Size. The default value is  
1400. Refer to 4.23 What is Maximum Transmission  
Unit (MTU) Size?  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Encryption  
encryption.  
Attain DNS  
Automatically  
Click to select getting DNS address for PPTP  
support. Please select Set DNS Manually if the  
PPTP support is selected.  
Set DNS Manually  
Click to select getting DNS address for PPTP  
support.  
DNS 1  
DNS 2  
DNS 3  
Fill in the IP address of Domain Name Server 1.  
Fill in the IP address of Domain Name Server 2.  
Fill in the IP address of Domain Name Server 3.  
Clone MAC Address Fill in the MAC address that is the MAC address to  
be cloned. Refer to 4.24 What is Clone MAC  
Address?  
Enable uPNP  
Click the checkbox to enable uPNP function.  
Refer to 4.22 What is Universal Plug and Play  
(uPNP)?  
Enable Web Server Click the checkbox to enable web configuration from  
Access on WAN  
Enable WAN Echo  
Reply  
WAN side.  
Click the checkbox to enable WAN ICMP response.  
Set TTL value  
Apply Changes  
Click to Enable and set Time to Live value.  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.12 Firewall - Port Filtering  
Entries in this table are used to restrict certain types of data packets  
from your local network to Internet through the Gateway. Use of such  
filters can be helpful in securing or restricting your local network.  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Firewall - Port Filtering  
Item  
Description  
Enable Port Filtering Click to enable the port filtering security function.  
Port Range  
Protocol  
To restrict data transmission from the local network  
on certain ports, fill in the range of start-port and  
end-port, and the protocol, also put your comments  
on it.  
Comments  
The Protocol can be TCP, UDP or Both.  
Comments let you know about whys to restrict data  
from the ports.  
Apply Changes  
Reset  
Click the Apply Changes button to register the ports  
to port filtering list.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Delete Selected  
Delete All  
Click to delete the selected port range that will be  
removed from the port-filtering list.  
Click to delete all the registered entries from the  
port-filtering list.  
3.3.13 Firewall - IP Filtering  
Entries in this table are used to restrict certain types of data packets  
from your local network to Internet through the Gateway. Use of such  
filters can be helpful in securing or restricting your local network.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Firewall - IP Filtering  
Item  
Description  
Enable IP Filtering  
Local IP Address  
Protocol  
Click to enable the IP filtering security function.  
To restrict data transmission from local network on  
certain IP addresses, fill in the IP address and the  
protocol, also put your comments on it.  
The Protocol can be TCP, UDP or Both.  
Comments let you know about whys to restrict data  
from the IP address.  
Comments  
Apply Changes  
Reset  
Click the Apply Changes button to register the IP  
address to IP filtering list.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Delete Selected  
Delete All  
Click to delete the selected IP address that will be  
removed from the IP-filtering list.  
Click to delete all the registered entries from the  
IP-filtering list.  
3.3.14 Firewall - MAC Filtering  
Entries in this table are used to restrict certain types of data packets  
from your local network to Internet through the Gateway. Use of such  
filters can be helpful in securing or restricting your local network.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Firewall - MAC Filtering  
Item  
Description  
Enable MAC Filtering Click to enable the MAC filtering security function.  
MAC Address  
Comments  
To restrict data transmission from local network on  
certain MAC addresses, fill in the MAC address and  
your comments on it.  
Comments let you know about whys to restrict data  
from the MAC address.  
Apply Changes  
Reset  
Click the Apply Changes button to register the MAC  
address to MAC filtering list.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Delete Selected  
Delete All  
Click to delete the selected MAC address that will be  
removed from the MAC-filtering list.  
Click to delete all the registered entries from the  
MAC-filtering list.  
3.3.15 Firewall - Port Forwarding  
Entries in this table allow you to automatically redirect common network  
services to a specific machine behind the NAT firewall. These settings  
are only necessary if you wish to host some sort of server like a web  
server or mail server on the private local network behind your Gateway's  
NAT firewall.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Firewall - Port Forwarding  
Item  
Description  
Enable Port  
Forwarding  
IP Address  
Protocol  
Click to enable the Port Forwarding security  
function.  
To forward data packets coming from WAN to a  
specific IP address that hosted in local network  
behind the NAT firewall, fill in the IP address,  
protocol, port range and your comments.  
The Protocol can be TCP, UDP or Both.  
The Port Range for data transmission.  
Comments let you know about whys to allow data  
packets forward to the IP address and port number.  
Click the Apply Changes button to register the IP  
address and port number to Port forwarding list.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Port Range  
Comment  
Apply Changes  
Reset  
Delete Selected  
Click to delete the selected IP address and port  
number that will be removed from the  
port-forwarding list.  
Delete All  
Click to delete all the registered entries from the  
port-forwarding list.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3.16 Firewall – URL Filtering  
URL Filtering is used to restrict users to access specific websites in  
internet.  
Screen snapshot – Firewall – URL Filtering  
Item  
Description  
Enable URL Filtering Click to enable the URL Filtering function.  
URL Address  
Add one URL address.  
Apply Changes  
Reset  
Click the Apply Changes button to save settings.  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Delete Selected  
Delete All  
Click to delete the selected URL address that will be  
removed from the URL Filtering list.  
Click to delete all the registered entries from the  
URL Filtering list.  
3.3.17 Firewall - DMZ  
A Demilitarized Zone is used to provide Internet services without  
sacrificing unauthorized access to its local private network. Typically, the  
DMZ host contains devices accessible to Internet traffic, such as Web  
(HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers.  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Firewall - DMZ  
Item  
Description  
Enable DMZ  
Click to enable the DMZ function.  
DMZ Host IP Address To support DMZ in your firewall design, fill in the IP  
address of DMZ host that can be access from the  
WAN interface.  
Apply Changes  
Click the Apply Changes button to register the IP  
address of DMZ host.  
3.3.18 VPN Setting  
This page is used to show VPN connection table, configure IPSEC VPN,  
NAT Traversal, Generate RSA Key, Show RSA Public Key.  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – VPN Setup  
Item  
Description  
Enable IPSEC VPN Click to enable IPSEC VPN function. Refer to 4.27  
What is VPN? and 4.28 What is IPSEC?  
Enable NAT  
Traversal  
Click to enable NAT Traversal function.  
Generate RSA Key Click to generate RSA key.  
Show RSA Public  
Key  
Click to show RSA public key that we generate.  
Apply Changes  
Click the Apply Changes button to enable IPSEC  
VPN, NAT Traversal settings.  
Current VPN  
Connection Table  
Edit  
It shows current WAN interface information and VPN  
connection table.  
Click to enter the current VPN tunnel configuration  
page.  
Delete  
Click to delete the current VPN tunnel that radio  
button stay.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
I
VPN Setup - Edit Tunnel  
Screen snapshot – VPN Setup-Edit-1  
Item  
Description  
Enable Tunnel #  
Connection Name  
Auth Type  
Click to enable the IPSEC VPN current tunnel.  
Assign the connection name tag.  
Click to select PSK or RSA.  
Local Site  
Click to select Single Address or Subnet Address  
VPN connection.  
Fill in IP address or subnet address depends on  
which Local Site option you choose.  
Fill in the local subnet mask.  
Local IP  
Address/Network  
Local Subnet Mask  
Remote Site  
Click to select Single Address, Subnet Address,  
Any Address or NAT-T Any Address VPN remote  
connection.  
Remote Secure  
Gateway  
Fill in remote gateway IP address  
Remote IP  
Fill in IP address or subnet address depends on  
which Remote Site option you choose.  
Fill in remote subnet mask  
Address/Network  
Remote Subnet  
Mask  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – VPN Setup-Edit-2  
Item  
Description  
Key Management  
Advanced  
Click to select IKE or Manual mode.  
Click Advanced button to configure more IKE  
settings.  
Connection Type  
Connect  
Click to select Initiator or Responder mode.  
Click to connect manually. [Responder mode only]  
Click to disconnect manually. [Responder mode  
only].  
Disconnect  
ESP  
Click to configure 3DES, AES128 or NULL  
encryption.  
Click to configure MD5 or SHA1 authentication.  
Fill in the key value. [IKE mode only]  
Fill in the remote gateway RSA key. [IKE mode  
only]  
PreShared Key  
Remote RSA Key  
Status  
SPI  
It shows connection status. [IKE mode only]  
Fill in Security Parameter Index value. [Manual  
mode only]  
Encryption Key  
Authentication Key  
Apply Change  
Fill in encryption key. [Manual mode only]  
Fill in authentication key. [Manual mode only]  
Click the Apply Changes button to save current  
tunnel settings.  
Reset  
Refresh  
Click the Reset button to abort change and recover  
the previous configuration setting.  
It shows the current connection status. [Manual  
mode only]  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
II  
Advanced IKE Setup  
Screen snapshot – Advanced VPN Settings for IKE  
Item  
Description  
Phase 1  
Negotiation Mode  
Encryption Algorithm  
Authentication  
Algorithm  
Main mode.  
Click to select 3DES or AES128 encryption.  
Click to select MD5 or SHA1 authentication.  
Key Group  
Click to select DH1(modp768), DH2(modp1024) or  
DH5(modp1536) key group. Default value is DH2  
Fill in the key life time value by seconds.  
Key Life Time  
Phase 2  
Active Protocol  
Encryption Algorithm  
ESP.  
Click to select 3DES, AES128 or NULL encryption.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Key Life Time  
Encapsulation  
Perfect Forward  
Secrecy (PFS)  
Ok  
Fill in the key life time value by seconds.  
Tunnel mode.  
Click to select ON or NONE.  
Click the Ok button to save current tunnel settings.  
3.3.19 Management - Statistics  
This page shows the packet counters for transmission and reception  
regarding to wireless, Ethernet LAN and Ethernet WAN networks.  
Screen snapshot – Management - Statistics  
Item  
Description  
Wireless LAN  
Sent Packets  
Wireless LAN  
Received Packets  
Ethernet LAN  
Sent Packets  
Ethernet LAN  
Received Packets  
Ethernet WAN  
Sent Packets  
Ethernet WAN  
Received Packets  
It shows the statistic count of sent packets on the  
wireless LAN interface.  
It shows the statistic count of received packets on  
the wireless LAN interface.  
It shows the statistic count of sent packets on the  
Ethernet LAN interface.  
It shows the statistic count of received packets on  
the Ethernet LAN interface.  
It shows the statistic count of sent packets on the  
Ethernet WAN interface.  
It shows the statistic count of received packets on  
the Ethernet WAN interface.  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3.3.20 Management - DDNS  
This page is used to configure Dynamic DNS service to have DNS with  
dynamic IP address.  
Screen snapshot – Management – DDNS  
Item  
Description  
Enable DDNS  
Click the checkbox to enable DDNS service. Refer  
to 4.25 What is DDNS?  
Service Provider  
Click the drop down menu to pickup the right  
provider.  
Domain Name  
User Name/Email  
Password/Key  
Apply Change  
To configure the Domain Name.  
Configure User Name, Email.  
Configure Password, Key.  
Click the Apply Changes button to save the enable  
DDNS service.  
3.3.21 Management - Time Zone Setting  
This page is used to configure NTP client to get current time.  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management – Time Zone Settings  
Item  
Description  
Current Time  
Time Zone Select  
Enable NTP client  
update  
It shows the current time.  
Click the time zone in your country.  
Click the checkbox to enable NTP client update.  
Refer to 4.26 What is NTP Client?  
Click select default or input NTP server IP address.  
Click the Apply Changes button to save and enable  
NTP client service.  
NTP Server  
Apply Change  
Reset  
Click the Reset button to abort change and recover  
the previous configuration setting.  
3.3.22 Management – Denial-of-Service  
This page is used to enable and setup protection to prevent attack by  
hacker’s program. It provides more security for users.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management – Denial-of-Service  
Item  
Description  
Enable DoS  
Prevention  
Click the checkbox to enable DoS prevention.  
Whole System Flood Enable and setup prevention in details.  
/ Per-Source IP  
Flood…  
Select ALL  
Click the checkbox to enable all prevention items.  
Click the checkbox to disable all prevention items.  
Clear ALL  
3.3.23 Management - Log  
This page is used to configure the remote log server and shown the  
current log.  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management – Log  
Item  
Description  
Enable Log  
System all  
Wirelessy  
Click the checkbox to enable log.  
Show all log of wireless broadband router  
Only show wireless log  
Only show Denial-of-Service log  
Click the checkbox to enable remote log service.  
Input the remote log IP address  
DoS  
Enable Remote Log  
Log Server IP  
Address  
Apply Changes  
Click the Apply Changes button to save above  
settings.  
Refresh  
Click the refresh the log shown on the screen.  
3.3.24 Management - Upgrade Firmware  
This page allows you upgrade the Access Point firmware to new version.  
Please note, do not power off the device during the upload because it  
may crash the system.  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management - Upgrade Firmware  
Item  
Description  
Select File  
Click the Browse button to select the new version of  
web firmware image file.  
Upload  
Click the Upload button to update the selected web  
firmware image to the X-Micro WLAN 11g  
Broadband Router.  
3.3.25 Management Save/ Reload Settings  
This page allows you save current settings to a file or reload the settings  
from the file that was saved previously. Besides, you could reset the  
current configuration to factory default.  
Screen snapshot – Management - Save/Reload Settings  
Item  
Description  
Save Settings to File  
Click the Save button to download the configuration  
parameters to your personal computer.  
Load Settings from  
File  
Click the Browse button to select the configuration  
files then click the Upload button to update the  
selected configuration to the X-Micro WLAN 11g  
Broadband Router.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Default  
parameter to factory defaults.  
3.3.26 Management - Password Setup  
This page is used to set the account to access the web server of Access  
Point. Empty user name and password will disable the protection.  
+
Screen snapshot – Management - Password Setup  
Item  
Description  
User Name  
Fill in the user name for web management login  
control.  
New Password  
Fill in the password for web management login  
control.  
Confirmed Password Because the password input is invisible, so please  
fill in the password again for confirmation purpose.  
Apply Changes  
Clear the User Name and Password fields to  
empty, means to apply no web management login  
control.  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.27 Management - WatchDog  
This page is used to do watchdog function using ping command. User  
set IP address, interval and ping fail count conditions to decide whether  
router reboots or not.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management – WatchDog Settiing  
Item  
Description  
Enable WatchDog  
WatchDog IP  
Address  
Click to enable watchdog.  
IP address that is referred.  
Ping Interval  
Ping Fail to reboot  
Count  
Fill in the value by seconds.  
Fill in the value that is the threshold to reboot router  
when ping fails.  
Apply Changes  
Click the Apply Changes button to complete the  
new configuration setting.  
3.3.28 Management - Quality of Service  
This page is used to do bandwidth control by ip address. User sets total  
and undefined bandwidth first. Then set bandwidth by range of ip  
addresses.  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Screen snapshot – Management – Qaulity of Service  
Item  
Description  
Enable QoS  
ISP Bandwidth  
Download  
Click to enable QoS.  
Fill in the value that is the download stream from ISP  
by KB/s.  
Upload  
Fill in the value that is the upload stream from ISP by  
KB/s.  
Undef IP Bandwidth  
Download  
Define the download bandwidth that is not defined.  
Define the upload bandwidth that is not defined.  
Click the Apply Changes button to complete the  
new configuration setting.  
Upload  
Apply Changes  
Item  
Description  
Bandwidth Control  
IP Address Range  
Guarantee Bandwidth  
Download  
Set start and end ip address.  
Fill in the value by KB/s.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Piority  
Click to pick High, Medium or Low  
Apply Changes  
Click the Apply Changes button to complete the  
new configuration setting. It is added into Current  
Bandwidth Control Table.  
Reset  
Click the Reset button to abort change and recover  
the previous configuration setting.  
Delete Selected  
Click to delete the selected ip addresses that will be  
removed from the Current Bandwidth Control  
Table.  
Delete All  
Click to delete all the registered entries from the ip  
addresses Current Bandwidth Control Table.  
3.3.29 Logout  
This page is used to logout web management page. This item will be  
activated next time you login after you define user account and  
password.  
Screen snapshot – Logout  
Screen snapshot – Logout - OK  
Item  
Description  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4 Frequently Asked Questions (FAQ)  
4.1What and how to find my PC’s IP and MAC address?  
IP address is the identifier for a computer or device on a TCP/IP network.  
Networks using the TCP/IP protocol route messages based on the IP address of  
the destination. The format of an IP address is a 32-bit numeric address written  
as four numbers separated by periods. Each number can be zero to 255. For  
example, 191.168.1.254 could be an IP address.  
The MAC (Media Access Control) address is your computer's unique hardware  
number. (On an Ethernet LAN, it's the same as your Ethernet address.) When  
you're connected to the Internet from your computer (or host as the Internet  
protocol thinks of it), a correspondence table relates your IP address to your  
computer's physical (MAC) address on the LAN.  
To find your PC’s IP and MAC address,  
9
9
Open the Command program in the Microsoft Windows.  
Type in ipconfig /all then press the Enter button.  
¾
Your PC’s IP address is the one entitled IP Address and your PC’s MAC  
address is the one entitled Physical Address.  
4.2What is Wireless LAN?  
A wireless LAN (WLAN) is a network that allows access to Internet without the  
need for any wired connections to the user’s machine.  
4.3What are ISM bands?  
ISM stands for Industrial, Scientific and Medical; radio frequency bands that the  
Federal Communications Commission (FCC) authorized for wireless LANs. The  
ISM bands are located at 915 +/- 13 MHz, 2450 +/- 50 MHz and 5800 +/- 75  
MHz.  
4.4How does wireless networking work?  
The 802.11 standard define two modes: infrastructure mode and ad hoc mode. In  
infrastructure mode, the wireless network consists of at least one access point  
connected to the wired network infrastructure and a set of wireless end stations.  
This configuration is called a Basic Service Set (BSS). An Extended Service Set  
(ESS) is a set of two or more BSSs forming a single subnetwork. Since most  
corporate WLANs require access to the wired LAN for services (file servers,  
printers, Internet links) they will operate in infrastructure mode.  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Example 1: wireless Infrastructure Mode  
Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service  
Set, or IBSS) is simply a set of 802.11 wireless stations that communicate  
directly with one another without using an access point or any connection to a  
wired network. This mode is useful for quickly and easily setting up a wireless  
network anywhere that a wireless infrastructure does not exist or is not required  
for services, such as a hotel room, convention center, or airport, or where access  
to the wired network is barred (such as for consultants at a client site).  
Example 2: wireless Ad Hoc Mode  
4.5What is BSSID?  
A six-byte address that distinguishes a particular a particular access point from  
others. Also know as just SSID. Serves as a network ID or name.  
4.6What is ESSID?  
The Extended Service Set ID (ESSID) is the name of the network you want to  
access. It is used to identify different wireless networks.  
4.7What are potential factors that may causes interference?  
Factors of interference:  
¾
¾
Obstacles: walls, ceilings, furniture… etc.  
Building Materials: metal door, aluminum studs.  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
¾
Electrical devices: microwaves, monitors and electrical motors.  
Solutions to overcome the interferences:  
9
9
9
Minimizing the number of walls and ceilings.  
Position the WLAN antenna for best reception.  
Keep WLAN devices away from other electrical devices, eg: microwaves,  
monitors, electric motors, … etc.  
9
Add additional WLAN Access Points if necessary.  
4.8What are the Open System and Shared Key authentications?  
IEEE 802.11 supports two subtypes of network authentication services: open  
system and shared key. Under open system authentication, any wireless station  
can request authentication. The station that needs to authenticate with another  
wireless station sends an authentication management frame that contains the  
identity of the sending station. The receiving station then returns a frame that  
indicates whether it recognizes the sending station. Under shared key  
authentication, each wireless station is assumed to have received a secret  
shared key over a secure channel that is independent from the 802.11 wireless  
network communications channel.  
4.9What is WEP?  
An optional IEEE 802.11 function that offers frame transmission privacy similar to  
a wired network. The Wired Equivalent Privacy generates secret shared  
encryption keys that both source and destination stations can use to alert frame  
bits to avoid disclosure to eavesdroppers.  
WEP relies on a secret key that is shared between a mobile station (e.g. a laptop  
with a wireless Ethernet card) and an access point (i.e. a base station). The  
secret key is used to encrypt packets before they are transmitted, and an  
integrity check is used to ensure that packets are not modified in transit.  
4.10 What is Fragment Threshold?  
The proposed protocol uses the frame fragmentation mechanism defined in  
IEEE 802.11 to achieve parallel transmissions. A large data frame is fragmented  
into several fragments each of size equal to fragment threshold. By tuning the  
fragment threshold value, we can get varying fragment sizes. The determination  
of an efficient fragment threshold is an important issue in this scheme. If the  
fragment threshold is small, the overlap part of the master and parallel  
transmissions is large. This means the spatial reuse ratio of parallel  
transmissions is high. In contrast, with a large fragment threshold, the overlap is  
small and the spatial reuse ratio is low. However high fragment threshold leads  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
to low fragment overhead. Hence there is a trade-off between spatial re-use and  
fragment overhead.  
Fragment threshold is the maximum packet size used for fragmentation. Packets  
larger than the size programmed in this field will be fragmented.  
If you find that your corrupted packets or asymmetric packet reception (all send  
packets, for example). You may want to try lowering your fragmentation  
threshold. This will cause packets to be broken into smaller fragments. These  
small fragments, if corrupted, can be resent faster than a larger fragment.  
Fragmentation increases overhead, so you'll want to keep this value as close to  
the maximum value as possible.  
4.11 What is RTS (Request To Send) Threshold?  
The RTS threshold is the packet size at which packet transmission is governed  
by the RTS/CTS transaction. The IEEE 802.11-1997 standard allows for short  
packets to be transmitted without RTS/CTS transactions. Each station can have  
a different RTS threshold. RTS/CTS is used when the data packet size exceeds  
the defined RTS threshold. With the CSMA/CA transmission mechanism, the  
transmitting station sends out an RTS packet to the receiving station, and waits  
for the receiving station to send back a CTS (Clear to Send) packet before  
sending the actual packet data.  
This setting is useful for networks with many clients. With many clients, and a  
high network load, there will be many more collisions. By lowering the RTS  
threshold, there may be fewer collisions, and performance should improve.  
Basically, with a faster RTS threshold, the system can recover from problems  
faster. RTS packets consume valuable bandwidth, however, so setting this value  
too low will limit performance.  
4.12 What is Beacon Interval?  
In addition to data frames that carry information from higher layers, 802.11  
includes management and control frames that support data transfer. The beacon  
frame, which is a type of management frame, provides the "heartbeat" of a  
wireless LAN, enabling stations to establish and maintain communications in an  
orderly fashion.  
Beacon Interval represents the amount of time between beacon transmissions.  
Before a station enters power save mode, the station needs the beacon interval  
to know when to wake up to receive the beacon (and learn whether there are  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
buffered frames at the access point).  
4.13 What is Preamble Type?  
There are two preamble types defined in IEEE 802.11 specification. A long  
preamble basically gives the decoder more time to process the preamble. All  
802.11 devices support a long preamble. The short preamble is designed to  
improve efficiency (for example, for VoIP systems). The difference between the  
two is in the Synchronization field. The long preamble is 128 bits, and the short is  
56 bits.  
4.14 What is SSID Broadcast?  
Broadcast of SSID is done in access points by the beacon. This announces your  
access point (including various bits of information about it) to the wireless world  
around it. By disabling that feature, the SSID configured in the client must match  
the SSID of the access point.  
Some wireless devices don't work properly if SSID isn't broadcast (for example  
the D-link DWL-120 USB 802.11b adapter). Generally if your client hardware  
supports operation with SSID disabled, it's not a bad idea to run that way to  
enhance network security. However it's no replacement for WEP, MAC filtering or  
other protections.  
4.15 What is Wi-Fi Protected Access (WPA)?  
Wi-Fi’s original security mechanism, Wired Equivalent Privacy (WEP), has been  
viewed as insufficient for securing confidential business communications. A  
longer-term solution, the IEEE 802.11i standard, is under development. However,  
since the IEEE 802.11i standard is not expected to be published until the end of  
2003, several members of the WI-Fi Alliance teamed up with members of the  
IEEE 802.11i task group to develop a significant near-term enhancement to  
Wi-Fi security. Together, this team developed Wi-Fi Protected Access.  
To upgrade a WLAN network to support WPA, Access Points will require a WPA  
software upgrade. Clients will require a software upgrade for the network  
interface card, and possibly a software update for the operating system. For  
enterprise networks, an authentication server, typically one that supports  
RADIUS and the selected EAP authentication protocol, will be added to the  
network.  
4.16 What is WPA2?  
It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
amendment to the 802.11 standard.  
4.17 What is 802.1x Authentication?  
802.1x is a framework for authenticated MAC-level access control, defines  
Extensible Authentication Protocol (EAP) over LANs (WAPOL). The standard  
encapsulates and leverages much of EAP, which was defined for dial-up  
authentication with Point-to-Point Protocol in RFC 2284.  
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL  
messages that convey the shared key information critical for wireless security.  
4.18 What is Temporal Key Integrity Protocol (TKIP)?  
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE  
802.11i encryption standard for wireless LANs. TKIP is the next generation of  
WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless  
LANs. TKIP provides per-packet key mixing, a message integrity check and a  
re-keying mechanism, thus fixing the flaws of WEP.  
4.19 What is Advanced Encryption Standard (AES)?  
Security issues are a major concern for wireless LANs, AES is the U.S.  
government’s next-generation cryptography algorithm, which will replace DES  
and 3DES.  
4.20 What is Inter-Access Point Protocol (IAPP)?  
The IEEE 802.11f Inter-Access Point Protocol (IAPP) supports Access Point  
Vendor interoperability, enabling roaming of 802.11 Stations within IP subnet.  
IAPP defines messages and data to be exchanged between Access Points and  
between the IAPP and high layer management entities to support roaming. The  
IAPP protocol uses TCP for inter-Access Point communication and UDP for  
RADIUS request/response exchanges. It also uses Layer 2 frames to update the  
forwarding tables of Layer 2 devices.  
4.21 What is Wireless Distribution System (WDS)?  
The Wireless Distribution System feature allows WLAN AP to talk directly to  
other APs via wireless channel, like the wireless bridge or repeater service.  
4.22 What is Universal Plug and Play (uPNP)?  
UPnP is an open networking architecture that consists of services, devices, and  
control points. The ultimate goal is to allow data communication among all UPnP  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
devices regardless of media, operating system, programming language, and  
wired/wireless connection.  
4.23 What is Maximum Transmission Unit (MTU) Size?  
Maximum Transmission Unit (MTU) indicates the network stack of any packet is  
larger than this value will be fragmented before the transmission. During the PPP  
negotiation, the peer of the PPP connection will indicate its MRU and will be  
accepted. The actual MTU of the PPP connection will be set to the smaller one of  
MTU and the peer’s MRU. The default is value 1400.  
4.24 What is Clone MAC Address?  
Clone MAC address is designed for your special application that request the  
clients to register to a server machine with one identified MAC address.  
Since that all the clients will communicate outside world through the X-Micro  
WLAN 11g Broadband Router, so have the cloned MAC address set on the  
X-Micro WLAN 11g Broadband Router will solve the issue.  
4.25 What is DDNS?  
DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for  
user own the DNS server with dynamic WAN IP address.  
4.26 What is NTP Client?  
NTP client is designed for fetching the current timestamp from internet via  
Network Time protocol. User can specify time zone, NTP server IP address.  
4.27 What is VPN?  
VPN is the abbreviation of Virtual Private Network. It is designed for creating  
point-to point private link via shared or public network.  
4.28 What is IPSEC?  
IPSEC is the abbreviation of IP Security. It is used to transferring data securely  
under VPN.  
4.29 What is WLAN Block Relay Between Clients?  
An Infrastructure Basic Service Set is a BSS with a component called an Access  
Point (AP). The access point provides a local relay function for the BSS. All  
stations in the BSS communicate with the access point and no longer  
communicate directly. All frames are relayed between stations by the access  
point. This local relay function effectively doubles the range of the IBSS  
4.30 What is WMM?  
WMM is based on a subset of the IEEE 802.11e WLAN QoS draft standard.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WMM adds prioritized capabilities to Wi-Fi networks and optimizes their  
performance when multiple concurring applications, each with different latency  
and throughput requirements, compete for network resources. By using WMM,  
end-user satisfaction is maintained in a wider variety of environments and traffic  
conditions. WMM makes it possible for home network users and enterprise  
network managers to decide which data streams are most important and assign  
them a higher traffic priority.  
4.31 What is WLAN ACK TIMOUT?  
ACK frame has to receive ACK timeout frame. If remote does not receive in  
specified period, it will be retransmitted.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
5 Configuration Examples  
5.1 Example One – PPPoE on the WAN  
Sales division of Company ABC likes to establish a WLAN network to support  
mobile communication on sales’ Notebook PCs. MIS engineer collects  
information and plans the X-Micro WLAN 11g Broadband Router implementation  
by the following configuration.  
WAN configuration:  
PPPoE  
User Name  
Password  
H890123456  
PW192867543210  
LAN configuration  
IP Address  
192.168.1.254  
255.255.255.0  
0.0.0.0  
Subnet Mask  
Default Gateway  
DHCP  
Range  
Client 192.168.1.100 – 192.168.1.200  
WLAN configuration  
SSID  
MyWLAN  
Channel Number 11  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
SSID: MyWLAN  
Channel: 11  
DHCP client  
DHCP range: 192.168.1.100 to 192.168.1.200  
Ethernet  
Cable  
Ethernet cable  
xDSL/ CM  
Internet  
DHCP client  
Bridge mode  
Power adapter  
PPPoE connection parameters:  
User Name: H890123456  
Passwrod: pw192867543210  
Figure 3 – Configuration Example One – PPPoE on the WAN  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure the WAN  
interface:  
Open WAN Interface  
Setup page, select PPPoE  
then enter the User Name  
H890123456” and  
Password  
PW192867543210”, the  
password is encrypted to  
display on the screen.  
Press button to confirm the configuration setting.  
Configure the LAN interface:  
Open LAN Interface  
Setup page, enter the IP  
Address “192.168.1.254”,  
Subnet Mask  
255.255.255.0”, Default  
Gateway “0.0.0.0”,  
enable DHCP Server,  
DHCP client range  
192.168.1.100” to  
192.168.1.200”.  
Press button to confirm the configuration setting.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure the WLAN  
interface:  
Open WLAN Interface  
Setup page, enter the  
SSID “MyWLAN”,  
Channel Number “11”.  
Press button to confirm the configuration setting.  
5.2 Example Two – Fixed IP on the WAN  
Company ABC likes to establish a WLAN network to support mobile  
communication on all employees’ Notebook PCs. MIS engineer collects  
information and plans the X-Micro WLAN 11g Broadband Router implementation  
by the following configuration.  
WAN configuration:  
Fixed IP  
IP Address  
192.168.2.254  
255.255.255.0  
192.168.2.10  
168.95.1.1  
Subnet Mask  
Default Gateway  
DNS Address  
LAN configuration  
IP Address  
192.168.1.254  
255.255.255.0  
192.168.2.254  
Subnet Mask  
Default Gateway  
DHCP  
Range  
Client 192.168.1.100 – 192.168.1.200  
WLAN configuration  
SSID  
MyWLAN  
Channel Number 11  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
DHCP client  
SSID: MyWLAN  
Channel: 11  
SSID: MyWLAN  
Channel: 11  
DHCP client  
DHCP range: 192.168.1.100 to 192.168.1.200  
WAN IP: 192.168.2.254/ 255.255.255.0  
Ethernet  
Cable  
Ethernet cable  
192.168.2.10/ 255.255.255.0  
xDSL/ CM  
Internet  
DHCP client  
Router mode  
Power adapter  
Figure 4 – Configuration Example Two – Fixed IP on the WAN  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure the WAN  
interface:  
Open WAN Interface  
Setup page, select  
Fixed IP then enter IP  
Address  
192.168.2.254”,  
subnet mask  
255.255.255.0”,  
Default gateway  
192.168.2.10”.  
Press  
button to confirm the configuration setting.  
Configure the LAN interface:  
Open LAN Interface  
Setup page, enter the  
IP Address  
192.168.1.254”,  
Subnet Mask  
255.255.255.0”,  
enable DHCP Server,  
DHCP client range  
192.168.1.100” to  
192.168.1.200”.  
Press button to confirm the configuration setting.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configure the WLAN  
interface:  
Open WLAN Interface Setup  
page, enter the SSID  
MyWLAN”, Channel Number  
“11”.  
Press button to confirm the configuration setting.  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Weider Home Gym PRO 900 User Manual
Westcott Camera Accessories 1819 User Manual
Westinghouse Flat Panel Television LD 265 User Manual
Whirlpool Freezer TCF1510W User Manual
Whirlpool Range 56OSOLSPC5 816412 User Manual
Whirlpool Washer CAM2762TQ0 User Manual
Williams Sound Games 16P 3001 103 R T User Manual
Williams Sound Stereo System WIR TX238 User Manual
Woods Equipment TV Mount 1022120 User Manual
Zanussi Microwave Oven ZM 24ST User Manual