EnGenius EVR100 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung EnGenius EVR100 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von EnGenius EVR100, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung EnGenius EVR100 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung EnGenius EVR100. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung EnGenius EVR100 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts EnGenius EVR100
- Den Namen des Produzenten und das Produktionsjahr des Geräts EnGenius EVR100
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts EnGenius EVR100
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von EnGenius EVR100 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von EnGenius EVR100 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service EnGenius finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von EnGenius EVR100 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts EnGenius EVR100, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von EnGenius EVR100 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Wireless Gigabit VPN Router E VR100 Wireless G igab it VPN Ro uter V1.0[...]

  • Seite 2

    1 1. Introduction ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ...... 6 1.1. Package Contents ........ ........ ........ ........... ........ ........ ........ ........ .....[...]

  • Seite 3

    2 7. Internet ..... ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ........... ....... 46 7.1. Status ...... ........ ........ ........ ........ ........... ........ ........ ........ ....[...]

  • Seite 4

    3 9.5. MAC Filter ......... ........ ........ ........ .......... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ .... 79 9.6. IP Filter .. ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ....[...]

  • Seite 5

    4 12.2. Time ....... ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ... 125 12.3. Dynamic DNS (DDNS) ....... ........ ........ .......... ........ ........ ........ ........ ........ ......[...]

  • Seite 6

    5 Revision History Version Date Notes 1.0 2011/01/11 First Release[...]

  • Seite 7

    6 1. Introducti on 1.1. Package Contents • EnGenius WIRELESS GI GABIT VPN ROUTER • AC Adapter • RJ-45 Ethernet LAN Cable • CD-ROM with Us er Manual and Setup Wizard • Quick Guide 1.2. System Requirements • RJ-45 Ethernet Bas ed Internet (ADSL or Cable Modem ) • Computer with Wirel ess Network function • Windows, Mac O S or Linux bas[...]

  • Seite 8

    7 1.3. Introduction EVR100 is a 2T 2R Wireless 11N Gigabit VP N Router that delivers up to 6x f aster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network wi th superior throughput and perf ormance and unparallele d wireless range. With easy to use on the WPS function, it helps users to c onnect to wireless device w it[...]

  • Seite 9

    8 1.4. LED Overview LED Lights Icon Description Wireless LAN Color – Blue Lights w hen Wirele ss signal i s activated . Blinks when Wireless dat a transfer . Internet Color – Blue Blinks when WPS hands hake i s initiali zed. LAN Color – Blue Lights w hen wire d network devic e is con nected t o RJ-45 port. Blinks when data trans fer occ urs o[...]

  • Seite 10

    9 2. Bef ore you Begin This section wi ll guide you through the installation proces s. Place ment of the EVR100 is very important to avoid poor signal recepti on and performance. Avoid placing the device in encl osed spaces such as a closet, cabinet or wardrobe. 2.1. Considerations for Wireless Installa tion The operating distance of all wirel ess [...]

  • Seite 11

    10 2.2. Computer Settings (Windows XP /Windows Vista/Windows 7)     Click Start button and open Control Panel. Windows XP Wi ndows Vista Windows 7[...]

  • Seite 12

    11     Windows XP, c lick [Network Connection]     Windows Vista, cl ick [View Network Status and Tasks] then [Manage Network Connections]     Windows 7, c lick [View Network Status and Tas ks] then [Change adapter settings][...]

  • Seite 13

    12     Right click on [Local Area Connection] and sel ect [Properties ].     Check “Client for Mic rosoft Networks”, “File and Printer Sharing for Microsoft Netw orks”, and “Internet Protocol (TCP/IP) is ticke d. If not, please install them.[...]

  • Seite 14

    13     Select “Internet Protocol (T CP/IP)” and click [Properties]     Select “Obtain an IP Addres s automatically ” and “Obtain DNS serve r address automaticall y” then click [O K].[...]

  • Seite 15

    14 2.3. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet cabl e to WAN port of the device and the other e nd into you cable/DS L modem (Internet) 4. Insert[...]

  • Seite 16

    15 3. Configuring your Router This section wi ll show you how to configure the de vice using the web-based configuration interfac e. Please use your wire less network adapter to connect the WIRELESS RO UTER. Default Settin gs IP Address 192.168.0.1 Username / Passw ord admin / admin Wireless Mode Enable Wireless SSID EnGenius xxxxxx Wireless Sec ur[...]

  • Seite 17

    16 4. Set up Wizard 1. Open a we b browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.0.1 Note: If you have changed the default LAN IP Address of the WIRELESS ROUTER, ensure you enter the correct IP Address . 2. The default username and password are admin . Once you have entered the correct username and password, cli[...]

  • Seite 18

    17 3. You will see the following webpage if login successfully .[...]

  • Seite 19

    18 4. Click Wizard to enter the S etup Wizard. Then click N ext to begin the wizard.[...]

  • Seite 20

    19 5. Select the Ope ration Mode. Please ensure y ou have the proper cables c onnected as de scribed in the Hardware Install ation section.[...]

  • Seite 21

    20 AP Router M ode a) The device w ill search for the correct Internet settings automaticall y. b) The most appropriate W AN type will be determined and s elected automatically. If i t is incorrect, ple ase select Others to set up the WAN setti ngs manually.[...]

  • Seite 22

    21 c) There are many WAN service ty pes available. Please obtain the correct settings from your Internet Service Provide r (ISP). Static IP Address If y our ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subn et mask, Default Gateway IP addre ss, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provi[...]

  • Seite 23

    22 Dynamic IP Address The IP Add ress is all ocated autom atically. How ever some ISP’s w ill also recognize th e MAC ad dress an d will reject conne ctions if the MAC add ress d oes not match. If your ISP h as recorded the MA C addres s of your compu ter’s Ethernet L AN c ard, please c onnect only the c omputer w ith the authorized MAC addr es[...]

  • Seite 24

    23 PPP over Eth ernet ISP requires an account u sername and pass word. PPP over Ethe rnet Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP.[...]

  • Seite 25

    24 Point-to-Point Tun neling Protocol (PPTP ) PPTP is use d by some ISPs.[...]

  • Seite 26

    25 PPTP WAN I nterface Settings WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or D ynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. PPTP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame .[...]

  • Seite 27

    26 Layer-2 Tunnel ing Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Seite 28

    27 L2TP WAN In terface Settings WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or D ynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. L2TP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame .[...]

  • Seite 29

    28 d) Setup the level of wireless security to be use d. EnGenius recommends the Highest level of sec urity to be use d. Note: 802.11n wireless spe eds may not be achievabl e if the security level is setting the Lowest or Low. SSID Ent er the name of your wi reless netw ork. Key Enter the sec urity key f or your w ireless ne twork.[...]

  • Seite 30

    29 e) Check the se ttings are correct, and then click R eboot to apply the settings.[...]

  • Seite 31

    30 5. VPN Wizard Using VPN Wi zard, you can establish VPN c onnection easily. Pleas e refer to 11.3 .[...]

  • Seite 32

    31 6. Syst em 6.1. Status This page will dis play status of the devi ce. Status Model Description of this devic e. Mode The devic e is cu rrently in w hich mod e. Uptime The duration abou t the devi ce has bee n operating wi thout powe ring down or reboot. Current Da te/Time The devic e’s system t ime. If this is incorrec t, please set the tim e [...]

  • Seite 33

    32 WAN Setti ngs Attain IP P rotocol Method used t o conn ect to th e Interne t IP address The WAN I P Address o f the dev ice. Subnet Mask The WAN Subn et Mas k of the device. MAC address The MAC addre ss of the devi ce’s WAN Interface. Primary and Seconda ry DNS Primary and Sec ondar y DNS servers assign ed to th e WAN c onnecti on.[...]

  • Seite 34

    33 LAN Settings IP address The LAN I P Address of t he de vice. Subnet Mask The LAN Sub net Mask o f th e device . DHCP Serv er Whether the DHCP serv er i s Enabled or Disabled. MAC address The MAC addre ss of the devi ce’s LA N Interface.[...]

  • Seite 35

    34 WLAN Set tings Channel The wirel ess channe l in use. ESSID The SSID (Network Name) of th e wirele ss networ k. (up to 4 SSI Ds are supp orted) Security Wireless enc ryption is en abled for this SSI D. BSSID The MAC addre ss of thi s SSID. Associated Cl ients The number of wireles s client s connec ted to thi s SSID.[...]

  • Seite 36

    35 6.2. LAN This page allows you to modify the de vice’s LAN settings.[...]

  • Seite 37

    36 LAN IP IP address The LAN I P Address of t his d evice. IP Subnet M ask The LAN Sub net Mask o f th is devic e. 802.1d Sp anning Tre e When Enabl ed, the Spa nn ing Tree p rotocol w ill preve nt netwo rk loops in your LA N network.[...]

  • Seite 38

    37 DHCP Serv er DHCP Serv er The DHCP Ser ver autom atic ally allocates IP addres ses to your LA N de vice. Lease Time The duration of the DHCP server al locates e ach I P address to a LAN d evice. Start / End I P The range of I P addresse s of the DHCP server will a llocate to LAN devi ce. Domain nam e The domain name for this LAN network.[...]

  • Seite 39

    38 Two DNS servers can be assigned for us e by your LAN device. There are f our modes available. DNS Servers From ISP The DNS serv er IP addr ess i s assigned from your I SP. User-Defin ed The DNS server IP addr es s is assigne d manually . DNS Relay LAN cli ents are assig ned the d evice’s I P address as the DNS se rver. DNS requests are rel aye[...]

  • Seite 40

    39 6.3. DHCP This page shows the status of the DHCP server and als o allows you to control how the IP address es are allocated.[...]

  • Seite 41

    40 The DHCP Cl ient Table shows the LAN clients that have bee n allocated an IP addre ss from the DHCP Se rver . DHCP Client T able IP address The LAN I P address of th e cl ient. MAC address The MAC addre ss of the cl ient’s LA N interface. Expiration Time The time that the all ocated I P address wil l expire . Refresh Click this button to u pda[...]

  • Seite 42

    41 You can also manually specify the IP address that will be allocated to a LAN client by associating the IP addres s with its MAC address. Type the IP address you would like to m anually assign to a specific MAC address and cl ick Add to add the conditi on to the Static DHCP T able.[...]

  • Seite 43

    42 6.4. Schedule This page allows you to setup the sc hedule times that the Firew all and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.[...]

  • Seite 44

    43 Schedule Schedule Desc riptio n Assign a nam e to the sc hed ule. Service The servic e provides for the s chedule. Days Define the Days to acti vate or deactivate the sche dule. Time of d ay Define the Tim e of d ay to acti vate or deac tivated the sc hedule. Please use 24-hour cloc k format.[...]

  • Seite 45

    44 6.5. Log This page displays the system log of the device. When powered down or rebooted, the log wil l be cleared. Log Save Save the log to a file. Clear Clear the log . Refresh Update the log.[...]

  • Seite 46

    45 6.6. Language This page allows you to change the Language of the User Interface.[...]

  • Seite 47

    46 7. Internet The Internet sec tion allows you to manually set the WAN ty pe connection and its related settings. 7.1. Status This page shows the current status of the de vice’s WAN c onnection.[...]

  • Seite 48

    47 7.2. Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and wi ll reject connections if the MAC address does not matc h. If your ISP has rec orded the MAC address of your computer’s Etherne t LAN card, please connect only the compu ter with the authorized MAC addres s, and cli[...]

  • Seite 49

    48 Dynamic I P Address Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. DNS Servers Two DNS se rvers can be assign ed for use b y your LAN d evices. There are tw o modes av ail able. From ISP LAN devic es are assig ned t he DNS serve r IP addr ess of your I SP. User-D[...]

  • Seite 50

    49 7.3. Static IP Address If your ISP P rovide r has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provider . Static IP Addr ess IP address Assign an I P address Ma nually. IP Subnet M ask Specify an IP address’s s ubnet mask[...]

  • Seite 51

    50 7.4. PPP over Ethernet ISP requires an account u sername and pass word.[...]

  • Seite 52

    51 PPP over Ethe rnet ( PPPoE) Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP. Authenticatio n type Select w hether the ISP uses PAP o r CHAP met hods for authent ication. S[...]

  • Seite 53

    52 7.5. Point-to-Point Tunneling Protocol (PPTP) PPTP is use d by some ISPs.[...]

  • Seite 54

    53 Point-to-Poi nt Tun neling Proto col (PPT P) WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or w ill alloc ate Dynami c IP address . Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Passwor[...]

  • Seite 55

    54 7.6. Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Seite 56

    55 Layer-2 Tu nneling Protocol (L2TP) WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or w ill alloc ate Dynami c IP address . Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for t hi[...]

  • Seite 57

    56 8. Wireless The Wireless se ction allows you to configure the Wireless settings. 8.1. Basic This page shows the current status of the de vice’s Wire less settings.[...]

  • Seite 58

    57 Basic Radio Enable or Disab le the de vice ’s wirele ss signal. Mode Select between Acces s Point or Wirel ess Distribut ion System (WDS) m odes . Band Select th e types of wi reless cl ients that t he devic e will ac cept. eg: 2.4 GHz (B+G+N ) Only 802.11b and 11g c lients will be allowed. Enable SSID# Selec t the numb er of SSI D’s (Wirele[...]

  • Seite 59

    58 Wireless Dis tribution System (WDS) Using WDS to connect Access Point wireless ly, and in doing so extend a wire d infrastructure to locations where cabling is not possible or i nefficient to implement. Note that compatibility between diffe rent brands and models is not guaranteed. It is recomm ended that the WD S network be created using the sa[...]

  • Seite 60

    59 8.2. Advanced This page allows you to configure wirele ss advance settings. It is recommended the def ault settings are used unless the user has expe rience with these functions.[...]

  • Seite 61

    60 Advanced Fragment Th reshol d Specifies t he size of the packet per fragm ent. This function c an reduce the chanc e of packet collision . However w hen this value is se t too low, there wil l be increase d overheads r esulti ng in poor performanc e. RTS Thresh old When the pac ket size is s malle r than the RT S Thre shold, then the packet w il[...]

  • Seite 62

    61 8.3. Security This page allows you to set the wireless s ecurity settings. Security SSID Selectio n Select the SSID t hat the s ecurity se ttings w ill apply t o. Broadcast SSID If Disabled, th en the dev ice will not be broadc asting the SSID. There fore it will be invisi ble to wireless clients. WMM Wi-Fi Multi-Medi a is a Q uality of Se rvice[...]

  • Seite 63

    62 Encryption The encrypti on method t o be ap plied. You can choos e from W EP, W PA pre-sh ared key o r WPA RA DIUS. • Disabled - no data enc ryption is used. • WEP - data is encrypted usin g the WE P standard. • WPA-PSK - dat a is en crypted using the WPA-PSK standard. Th is is a l ater stan dard than WEP, and provides much bet ter se curi[...]

  • Seite 64

    63 802.1x Auth enticatio n RADIUS Se rver IP Address The IP Add ress of the RA DIUS Se rver RADIUS Se rver por t The port num ber of the RADIUS Se rver. RADIUS Se rver password The RADIUS Server’s p assword .[...]

  • Seite 65

    64 WEP En cryption: WEP Encryp tion Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. Key type ASCII : regular t ext (rec omm ended) HEX : for advanc ed user s Key Length Select th e desired option, and en sure the w ireless clie nts use the same setti ng. • 64 Bit - dat a is encrypte d, usi ng [...]

  • Seite 66

    65 WPA Pre-Shared Key En cryption: WPA Pre-Sha red Ke y Encryptio n Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. Pre-shared Key Type Select w hether you w ould l ike to e[...]

  • Seite 67

    66 WPA RA DIUS Encryption: WPA RADI US Encryptio n WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. RADIUS Se rver IP address Enter the IP add ress of t he RA DIUS Server RADIUS Se rver Port Enter t he port num ber us ed for c onnection s to the RADIUS server. RADIUS Se rver [...]

  • Seite 68

    67 8.4. Filter This page allows you to create fil ters to control which wire less clients can connect to this device by only al lowing the MAC addresses entere d into the Filtering Table.[...]

  • Seite 69

    68 Wireless Fil ter Enable Wirel ess Acc ess Control Tick the box to Enable W ireless Acce ss Control. When Enable d, only wire less c lients on the Filt ering Tabl e will be allowe d. Description Enter a nam e or descri ption for thi s entr y. MAC address Enter the MA C address o f the w ireless c lient th at you wish to all ow connec tion. Add Cl[...]

  • Seite 70

    69 8.5. Wi-Fi Protected Setup (WPS) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi netw orks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable se[...]

  • Seite 71

    70 Wi-Fi Prot ected Setup (WPS) WPS Tick to Enable the W PS feature. WPS Butto n Tick to Enable the W PS push bu tton. Wi-Fi Prot ected Setup Inform ation WPS Curren t Status Shows whet her the W PS func tion is C onfigured o r Un-co nfigured . Configured me ans that WPS h as been used to a uthorize c onnection betw een the d evice and wireless cli[...]

  • Seite 72

    71 Initializin g WPS Feature There are tw o methods to initialize the W PS feature: Push Button and Pin code m ethods. 1. WPS Push Butto n Method Push the WPS button on the WIRELESS ROUT ER device. T he Wireless LED light will s tart to flash to indicate that the W PS process is ready . While the Wire less LED is flashing on the W IRELESS ROUTER, p[...]

  • Seite 73

    72 2. Pin Code Method Note the Pin code of your WIRELESS ROUT ER device. Please use this Pin code to initialize the WPS process from the wireless c lient configuration utility. This process w ill be different for each brand or model. Pl ease consult the user manual of the wirel ess client for more information.[...]

  • Seite 74

    73 8.6. Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device .[...]

  • Seite 75

    74 8.7. Policy This page allows you to configure the acces s policies for each SS ID (wireless netw ork). Policy WAN Con nection Allow w ireless c lients on thi s SSID to acc ess the W AN port w hich t ypically is an Internet c onnecti on. Communica tion betw een Wirel ess clients Whether each wireles s client can com municate with each ot her in t[...]

  • Seite 76

    75 9. Firewall The Firewall secti on allows you to set the acces s control and Firewall s ettings. 9.1. Enable This page allows you to Enable / Disable the Firew all features. If Enabled Firewall service, the De nial of Service (DoS) and SPI (Stateful Packet Inspection) features will als o be enabled.[...]

  • Seite 77

    76 9.2. Advanced You can choose whether to allow VPN (Virtual Privat e Network) packets to pass through the Fire wall.[...]

  • Seite 78

    77 9.3. DMZ If enabled this fe ature, allows the DMZ computer on your LAN to be expose d to all users on the Internet. • This allows al most any application to be used on the se rver. • The “DMZ PC” w ill receive all Unknown connections and data. • If the DMZ f eature is enabled, please enter the IP address of the PC to be used as the “[...]

  • Seite 79

    78 9.4. Denial of Service (DoS) Denial of Se rvice (Denial of Service) is a type of Internet attac k that se nds a high amount of data to y ou with the intent to overload your Internet connection . Enable the DoS fire wall feature to automaticall y detect and block these DoS attacks.[...]

  • Seite 80

    79 9.5. MAC Filter You can choose whether to Deny or only All ow those computers listed in the MAC Filtering table to access the Internet. MAC Filter Enable MAC f iltering Tick this box to Enable the MAC filtering feature. Deny all clie nts with MAC addresses listed below to access the network When selec ted, the c omputers l isted in the MAC Fil t[...]

  • Seite 81

    80 9.6. IP Filter You can choose whether to Deny or only All ow, computer with those IP Addres ses from accessing c ertain Ports. This can be use d to control which Internet applicati ons the computers c an access. You may need to have certain knowledge of what Internet ports the appli cations use.[...]

  • Seite 82

    81 IP Filter Enable IP filte ring Tick this box to Enable the I P filtering feature. Deny all clie nts with IP add resses listed below to access the network When selec ted, the c omputers w ith IP add resses specified will be Denied ac cess to the indic ated Int ernet ports. Allow all c lients with IP addres ses listed below to access the network W[...]

  • Seite 83

    82 9.7. URL Filter You can deny acc ess to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL B locking Table. Any web address that includes “gamer” will be blocked.[...]

  • Seite 84

    83 10. Advanced The Advanced se ction allows you to configure the Advanced settings of the router. 10.1. Network Address Tra nslation (NAT) This page allows you to Enable / Disable the Network Addres s Translati on (NAT) and Network Turbine features. T he NAT is required to share one Internet ac count with multi ple LAN use rs. Enabling Network Tur[...]

  • Seite 85

    84 10.2. Port Mapping Port Mapping allows y ou to redirect a particular range of ports to a computer on your LAN network. This helps you host servers be hind the NAT and Firewall. In the example be low, there is a Mail Server that requires ports 25. When there is a connection from the Internet on those ports, it wil l be redirected to the Mail Serv[...]

  • Seite 86

    85 10.3. Port Forwarding Port Forwarding allows you to redirect a particular public port to a compute r on your LAN network. This helps y ou host servers behind the NAT and Firewall. In the example be low, there is a WEB Server running on port 80 on the LAN. For security re asons, the Administrator would like to provide this se rver to Internet con[...]

  • Seite 87

    86 10.4. Port Trigger If you use Internet appli cations which use non-standard connections or port num bers, you may find that they do not function correctly becaus e they are blocked by the Wireless Router's firewall. Port Trigger w ill be required for these applicati ons to work. Port Trigger Enable Port Fo rwardin g Tick this box to Enable [...]

  • Seite 88

    87 10.5. Application Layer Gateway (ALG) Certain applications may require the use of ALG feature to function correctly. If you use any of the applications listed, please tick and s elect it to enable this feature.[...]

  • Seite 89

    88 10.6. Universal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled de vices on your network. It als o provides automatic po rt forwarding for supp orted applications to s eamlessly by pass the Firewall. Universal Pl ug and Pl ay (UP nP) Enable the UPnP Fe ature Tick this box to Enable the U PnP fe[...]

  • Seite 90

    89 10.7. Quality of Service (QoS) QoS allows you to c ontrol the priority that the data is transmi tted over the Internet, or to reserve a spec ific amount of Internet bandwidth. This is to e nsure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user expe rience of time sensi tive tra[...]

  • Seite 91

    90 Priority Queu e Method Bandwidth priority is set to either H igh or Low. The transmissions in the High queue will be processed first. Unlimited P riority Queue Local IP Add ress The compu ter with this IP Addres s will not be bound by the QoS rules. High / Low Priority Q ueue Protocol The type of networ k prot ocol. High / Low Priority Sets the [...]

  • Seite 92

    91 Bandwidth All ocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or y ou can set a minimu m amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth All ocation Type Set whethe r the QoS ru les app ly to tran smission t hat are D ownload, U ploa d or Both d irections. Local IP [...]

  • Seite 93

    92 10.8. Routing If your WIRELESS ROUTER de vice is connected a network with diffe rent subnets, then this fe ature will allow the dif ferent subnets to communicate with each other. Static Rou ting Enable Sta tic Routi ng Tick this box to Enable the Stat ic Router feature. Destinatio n LAN IP Enter the IP addre ss of th e desti nation LAN. Subnet M[...]

  • Seite 94

    93 Destination Subnet Mask Gateway Hop Interface 192.168.11.0 255.255.255.0 192.168.0.216 1 LAN 192.168.10.0 255.255.255.0 192.168.0.103 1 LAN So if, for exam ple, Client3 wants to send an IP data packet to 192.168.10.2 (Clie nt 2), it would use the above table to determine that it had to go via 192.168.0.103 (Router 2) And if it sends P ackets to [...]

  • Seite 95

    94 11. VPN A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Interne t. It provides authentic ation to ensure that th e information is going to and from the correct parties . It provides sec urity to protect the information f rom viewi ng or tampering en route. EVR100 su[...]

  • Seite 96

    95 11.2. Profile Setting This page allows you to Enable , A dd , Edit and Delete VPN profiles. Profile Setti ng Enable Tick the box to Enable t he VPN pro file. Add Click this button to ad d the entr y. Edit Select one profile and c lick th is button t o edit th e entry. Delete Select ed Delete the se lected entries. Delete All Delete all en tries[...]

  • Seite 97

    96 10.1.1. IPSec IPSec (Internet Protocol Security) is a protocol sui te for securing Internet Protocol (IP) c ommunications by authentic ating and encrypting each IP pac ket of a comm unication session. IPSec also includes protocols for establi shing mutual authentication between agents at the beginning of the session and negotiation of cry ptogra[...]

  • Seite 98

    97 General Name Enter a nam e for your V PN pol icy. Connection Type Supports IPS ec and L2 TP ove r IPSec met hods to establ ish VPN connec tio n. Authenticatio n Type Supports p re-shared k ey method for authen ticat ion. Shared Ke y Enter the Shared Key in b ox. Confirm Enter your Sh ared Key ag ain for veri fication. Local ID Ty pe Supports I P[...]

  • Seite 99

    98 SA (Security Assoc iation) A Security Ass ociation (SA) is the establishment of s hared security attributes between two netw ork entities to support secure comm unication. An SA may include attributes s uch as: cryptographic algorith m and mode; traffi c encryption key; and parameters for the network data to be passed over the connection. Establ[...]

  • Seite 100

    99 Encryption EVR100 support s DES , 3DES , AES128 , AE S192 , A ES256 enc ryption meth od s for traffic through the VPN. Authenticatio n EVR10 0 supports SHA1 , MD5 methods for authe nticati on. Life Time Enter the numb er of sec onds for the IK E Lifetime. The period of tim e to pa ss before establ ishing a new IK E security assoc iation (SA) w i[...]

  • Seite 101

    100 Network This page allows you to configure the VPN s erver and local/remote subnet. Network Security Ga teway T ype Security Gatew ay Type s upports I P Add ress and Domain Name . Selec t one of them. Security Ga teway The IP address or domai n name of the V PN server. Local Netwo rk Enter the local (LAN) s ub net and m ask. (ex. 1 92.168.0. 0/2[...]

  • Seite 102

    101 Advanced This page allows you to configure advanced VPN settings. Advanced NAT Trave rsal E nabling N AT Trave rsal allow IPSec traffic from t his e ndpoint to traverse t hrough the translation proc ess durin g NAT . The remote VPN endpoint must also su pport t his feature and it must be en abled to func tion properly ov er the VP N. Dead Peer [...]

  • Seite 103

    102 10.1.2. L2TP over I PSec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high le vel of security to protect data. You ca n use this type of secure connection for small or remote office cli ents that need access to the corporate network. You can also use L2TP over IPSec VPNs for routers at re[...]

  • Seite 104

    103 L2TP L2TP Setting Authenticatio n Select th e desired authenticat ion protocol (PAP, C HAP, Auto). Select Auto by de fault. User Name Enter the usern ame for auth entication . Password Enter the passwo rd for aut henticati on.[...]

  • Seite 105

    104 Network Network Server IP Enter the VP N Server IP addre ss. Remote I P Range Assign a rang e of IP ad dresses . The assigne d IP r ange sh ould be on the sam e IP netw ork but not the in the same range as your DHCP IP range.[...]

  • Seite 106

    105 11.3. Wizard You can use W izard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then cli ck Next button to next page.[...]

  • Seite 107

    106 3. You can sele ct [IPSec] or [L2TP over IPSec] in this page then click Nex t button to next page. If you s elect [IPSec] then go to s tep 3.1. If you select [ L2TP over IPSec] then go to s tep 3.2. 3.1 IPSec You can sele ct [Client to Site] or [Si te to Site] in this page then click Nex t button to next page. Note. If you sel ect [Client to Si[...]

  • Seite 108

    107 Enter the Security Gate way and remote network. Then click Next button to next page.[...]

  • Seite 109

    108 3.2 L2TP over IPSec Enter the username, pa ssword and VPN server IP setting. Then cl ick Next button to next page.[...]

  • Seite 110

    109 4. Enter the shared key for the VPN connection. 5. Setup successf ully, enable this policy immediately. If you don’t want enable this policy, you can un-tick the box. Then click Apply button to apply the settings.[...]

  • Seite 111

    110 How to establish a L2 TP over IPSec VPN con nection on Win dows XP 1. Click Start button and open C ontrol Panel. 2. Click [Network Connections], double click [New Connection Wizard] then click Nex t button.[...]

  • Seite 112

    111 3. Select [Connect to the netw ork at my workplace ] then click Next button. 4. Select [Virtual Private Network connection] then cl ick Next button.[...]

  • Seite 113

    112 5. Enter the [Company N ame] then cl ick Next button. 6. Select [Do not dial the initial connection] then click Next button.[...]

  • Seite 114

    113 7. Enter the VPN se rver IP address then click Next button. 8. Select [Do not use my smart card] then cli ck Next button.[...]

  • Seite 115

    114 9. Click Finish button to c omplete the wizard. 10. Click Properities button.[...]

  • Seite 116

    115 11. I n Security, se lect [Advanced (custom settings)] then cl ick Settings button. 12. Check [Unencrypted password (PAP)] and [Challenge Handshake Authentication Protocol (CHAP)] then cl ick OK button.[...]

  • Seite 117

    116 13. Click [IPSec Settings] then tick [Use pre-shared key for authenticati on], Enter the Key then click OK button. 14. I n Networking, se lect [L2TP IPSec VPN] then click OK button.[...]

  • Seite 118

    117 15. Click Connect button to connect VPN connection. 16. You can see the VPN Connection has been established.[...]

  • Seite 119

    118 How to establish a L2 TP over IPSec VPN con nection in Windows 7 1. Click Start button and open C ontrol Panel. 2. Click [View Ne twork Status and Tasks] then [Set up a new connection or network][...]

  • Seite 120

    119 3. Click [Connect to a w orkplace] then [Use my Internet connection (VPN)] 4. Enter the VPN se rver IP address: [ Internet address ], [ Destination name ] and tick [ Don’t connect now; just se t it up so I can connect later], then cli ck the Next button.[...]

  • Seite 121

    120 5. Enter the correct User n ame and Password then click the Create button. 6. Click the Close button to close the V PN connection setting.[...]

  • Seite 122

    121 7. Click [Change adapter s ettings] i n Step 2, then select VPN Conne ction and click [Change settings of this connection] 8. Change Type of VPN to [Layer 2 Tunneling Protocol w ith IPSec (L2TP/IPSec)] and che ck [Unencrypted password (PAP)] i n Security.[...]

  • Seite 123

    122 9. Click the Adv anced settings button and sel ect [Use preshared key for authentication] and e nter the correct key . Then click OK button.[...]

  • Seite 124

    123 10. Dou ble click the VPN Connection then c lick the Connect button. 11. You can see the VPN Connection has been established.[...]

  • Seite 125

    124 12. Tools This section all ows you to configure some device system settings. 12.1. Admin This page allows you to change the sys tem password and to configure remote manage ment. Change P assword Old Passw ord: Enter the cu rrent passwo rd. New Passw ord: Enter your new password . Repeat New Passw ord: Enter your new password again for v erifica[...]

  • Seite 126

    125 12.2. Time This page allows you to set the sys tem time. Time Time Setup : Select th e method you w ant t o set the t ime. Time Zone: Selec t the tim e zone for your current loc ation. NTP Time S erver: Enter the addres s of the Network Ti me Protoc ol (NTP) Server to a utomati call y synchronize with a server on the Internet. Daylight Savi ngs[...]

  • Seite 127

    126 12.3. Dynamic DNS (DDNS) This free servic e is very useful when combined with the Virt ual Server feature. It allows Internet users to connect to y our Virtual Servers using a URL, rather than an IP Address . This also solve s the problem of having a dynamic IP address. W ith a dynamic IP addres s, your IP address may c hange whenever you conne[...]

  • Seite 128

    127 12.4. Power This page allows you to Enable or Disable the wireless LAN power s aving features.[...]

  • Seite 129

    128 12.5. Diagnosis This page allows you determine if the WIRELESS ROUTER devi ce has an active Internet connec tion. Diagnosis Address to Ping: Enter the IP add ress y ou li ke to see i f a successfu l connec tion can b e made. Ping Result: The results of the Ping te st.[...]

  • Seite 130

    129 12.6. Firmware The firmw are (software) in the W IRELESS ROUTER device can be upgraded using your Web Brows er. To perform the Firm ware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade f ile. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Apply button to commence the firm[...]

  • Seite 131

    130 12.7. Back-up Back-up Restore to f actory default: Restores the device t o factory d efault settin gs. Backup Set tings: Save the cur rent configu ration s ettings to a file. Restore Set tings: Restores a previ ously sa ved configurati on file. Click Brows e to selec t the fil e. Then Uplo ad to lo ad the set tings.[...]

  • Seite 132

    131 12.8. Reset In some circums tances it may be re quired to force the device to reboot.[...]

  • Seite 133

    132 Appendix A – FCC Interferen ce Stat ement Federal Communi cation Commission Inter ference S tatemen t This equipment has been tested and found to comply with the limits for a Class B digital de vice, pursuant to Par t 15 of th e FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential[...]

  • Seite 134

    133 IMPORTANT NOTE: FCC Radiatio n Expos ure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your bod y. We declare that the product is limited in CH1~CH11 by specified firmwa re con[...]

  • Seite 135

    134 Appendix B – IC Interference Statement Industry Canada state ment: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmfu l interference, and (2) t his device must acc ept any interference r eceived, including inte rference that may cause un d[...]