LevelOne WBR-3402TX Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 146 Seiten
- 5.28 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Network Router
LevelOne GNS-2000
92 Seiten 2.18 mb -
Network Router
LevelOne WBR-3407 11g
99 Seiten 2.31 mb -
Network Router
LevelOne WBR-3402TX
146 Seiten 5.28 mb -
Network Router
LevelOne FBR-1409TX
88 Seiten 3.16 mb -
Network Router
LevelOne WBR-3407
99 Seiten 2.31 mb -
Network Router
LevelOne FBR-1403TX
92 Seiten 1.91 mb -
Network Router
LevelOne FBR-1415TX
83 Seiten 1.83 mb -
Network Router
LevelOne NetCon FBR-1415TX
83 Seiten 1.92 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung LevelOne WBR-3402TX an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von LevelOne WBR-3402TX, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung LevelOne WBR-3402TX die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung LevelOne WBR-3402TX. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung LevelOne WBR-3402TX sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts LevelOne WBR-3402TX
- Den Namen des Produzenten und das Produktionsjahr des Geräts LevelOne WBR-3402TX
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts LevelOne WBR-3402TX
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von LevelOne WBR-3402TX zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von LevelOne WBR-3402TX und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service LevelOne finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von LevelOne WBR-3402TX zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts LevelOne WBR-3402TX, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von LevelOne WBR-3402TX widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
1 LevelOne WBR -3402TX 1W ,4L 11g Wireless ADSL R outer w/VPN/Printer Server(USB) User`s Manual[...]
-
Seite 2
2 T able of Contents Chapter 1 In troduction ..................................................................................................... 4 Functions and Features .............................................................................................. 4 Packing List ....................................................................[...]
-
Seite 3
3 4.8.6 Miscellaneous Item s ....................................................................................... 75 Chapter 5 Print Server .................................................................................................... 76 5.1 Configuring on W indo ws 95/ 98 Platforms ........................................................ [...]
-
Seite 4
4 C C C h h h a a a p p p t t t e e e r r r 1 1 1 I I I n n n t t t r r r o o o d d d u u u c c c t t t i i i o o o n n n Congratulations on you r purchase of LevelOne WBR-3402 AD SL W ireless Broadband Router . This product is s pecifically designed f or Small Of fice and Hom e Office needs. It provides a com plete SOHO solution for Internet su rf[...]
-
Seite 5
5 correctly . S tatistics of W AN Supported Enables you to m onitor inbound and outbound packets Wir eless functions High speed for wir eless LAN connection Up to 54Mbps data rate by incorporatin g Orthogonal Frequency Division Multiplexin g (OFDM). Roaming Provides seam less roaming within t he IEEE 802.1 1b(1 1M) and IEEE 80 2.1 1g(54[...]
-
Seite 6
6 When SPI Mode is enabled, the rou ter will check every incoming packet to detect if this packet is valid. DoS Attack Detection Supported When this feature is enabled , the router will detect and log t he DoS attack comes from the Internet. Advanced functions System time Supported Allow you to synchronize syst em time wit h network time se[...]
-
Seite 7
7 C C C h h h a a a p p p t t t e e e r r r 2 2 2 H H H a a a r r r d d d w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n 2.1 Panel Layout 2.1.1. Front Panel Figure 2-1 Front Panel LED: LED Function Color S tatus Description POWER Power indication Green On Power is being applied to this product. ST A [...]
-
Seite 8
8 2.1.2. Rear Panel Figure 2-2 Rear Panel Ports: Port Description 5VDC Power inlet: DC 5V , 2A ADSL the port where you will connect your phone jack.. Port 1-4 the ports where you will connect network ed computers and other devices. USB USB Ports for USB printer . 2.2 Procedur e for Hardware Installation 1. Decide wher e to place your WBR-3402, W ir[...]
-
Seite 9
9 Figure 2-3 Setup of LAN and W AN connections for this product. 3. Setup ADSL connection Prepare a telephone cable for conn ecting this produc t to your ISP . Figure 2-3 illustrates the ADSL connection. 4. Connecting this product with your printer Use the printer cable to connect y our printer to the USB printer port of thi s product. 5. Power on [...]
-
Seite 10
10 C C C h h h a a a p p p t t t e e e r r r 3 3 3 N N N e e e t t t w w w o o o r r r k k k S S S e e e t t t t t t i i i n n n g g g s s s a a a n n n d d d S S S o o o f f f t t t w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n T o use W BR-3402 correctly , you have to properly configure the n etwo[...]
-
Seite 11
11 3.2 Install the Softwar e into Y our Computers Skip this section if y ou do not want to use the print server function of thi s product. Notice : If you are using Wi ndows 2000/X P , please refer to Chapter 5 Printer - 5.3 Configuri ng on W indows 2000 and XP Platforms. It is not necessary to setup any program and the print-server can work. Step [...]
-
Seite 12
12 Step 3: Select the destina tion folder and click on the Ne xt button. Then , the setup program will begin to install the programs into th e destination folder .Step 4: When the following window is displayed, cli ck on the Finish button. Select the item to restart the computer and then click th e OK button to reboot your computer . Step 4: After [...]
-
Seite 13
13 C C C h h h a a a p p p t t t e e e r r r 4 4 4 C C C o o o n n n f f f i i i g g g u u u r r r i i i n n n g g g A A A D D D S S S L L L W W W i i i r r r e e e l l l e e e s s s s s s B B B r r r o o o a a a d d d b b b a a a n n n d d d R R R o o o u u u t t t e e e r r r This product prov ides W eb based configuratio n scheme, that is, co nf[...]
-
Seite 14
14 4.1 S tart-up and Log in Activate your brow ser , and disable the pr oxy or add the IP addr ess of this produc t into the exceptions . Then, type this pr oduct’ s IP a ddress in the Location (for Netscape ) or Address (for IE) field and press ENTER. For example: http:// 192.168.123.254 . After the connection is established, you will see the we[...]
-
Seite 15
15 4.2 S tatus This option provides the funct ion for observing this product’ s working status: A. W AN Port Status. If the W AN port is assigned a dynam ic IP , there may appear a “ Renew ” or “ Release ” button on the Sidenote colum n. Y ou can click this butt on to renew or release IP manually . B. Printer S tatus. The possi ble kinds [...]
-
Seite 16
16 4.3 Wiz ard Setup W izard will guide you thr ough a basic configuration pro cedure step by step. Press ”Next >”[...]
-
Seite 17
17 Setup Wiz ard - Select W AN T ype : For detail settings, please refer to 4.4.1 primary setup. 4.4 Basic Setting[...]
-
Seite 18
18 4.4.1 Primary Setup – W AN T ype Press “Change”[...]
-
Seite 19
19 This page is p rimary to enabl e this product t o work properly . The sett ing items and the w eb appearance depend on the W AN type. Choose correct W AN type before you start. 1. LAN IP Address : the local IP address of this device. The computer s on your network must use th e LAN IP address of your product as their Defa ult Gateway . Y ou can [...]
-
Seite 20
20 4.4.1.1 Ethernet Over A TM (RFC 1483 Bridged) without NA T This W AN typ e disable the NA T , this device becom es a pure bridge between your LA N and W AN, all the clients in your LAN must have legal IPs. If you en able the NA T feature, you have to set the following W AN IP settings. W AN IP Address, W AN Subnet Mask, W AN Gateway , and Primar[...]
-
Seite 21
21 4.4.1.2 Ethernet Over A TM (RFC 1483 Bridged) with NA T Dynamic IP Address : Obtain an IP address from ISP automatically . Host Name : optional. Re quired by some ISPs, for exam ple, @Home. 1. Renew IP F ore ver : this feature enables this prod uct to renew your IP address auto matically when the lease time is expiring-- even when the system is [...]
-
Seite 22
22[...]
-
Seite 23
23 4.4.1.3 IP over A TM (RFC 1483 Routed) In the Router Mode, NA T is always enabled. Y ou have to set the following W AN IP settings: W AN IP Mode: This product supports two W AN IP modes: static a nd dynam ic. If you select dynamic mode, it will try to get a legal IP and W AN settings from ISP’ s DHCP se rver . If you select static mode, you ha[...]
-
Seite 24
24 4.4.1.4 Classical IP over A TM (RFC 1577) In the Classical IP over A TM Mode, NA T is always enabl ed. Y ou have to set the foll owing W AN IP settings: W AN IP Mode: This product supports two W AN IP modes: static a nd dynam ic. If you select dynamic mode, it will try to get a legal IP and W AN settings from ISP’ s DHCP se rver . If you selec[...]
-
Seite 25
25 button to save the configurati on into Flash memory , and the reboot t his device. 4.4.1.5 PPP over A TM (RFC 2364) Press “ More >> ”[...]
-
Seite 26
26 PPPoA Account/Password: The account ID & password provided by your ISP . Maximum Idle T ime: The time of no activity disconnect to your PPPoA se ssion. Y ou can also set it to zero or enable Auto-reconnect to disable this f eature. If Auto-reconnect is enable d, this product will automatically connect to ISP after system is restarted or conn[...]
-
Seite 27
27 "Save" button to save the configuration i nto Flash memory , and the reboot t his device. 4.4.1.6 PPP over Ethernet (RFC 2516) PPPoE Account/Password: The account ID & password provided by your ISP . Maximum Idle T ime: The time of no activity disconnect to your PPPoE se ssion. Y ou can also set it to zero or enable Auto-reconnect [...]
-
Seite 28
28 PPPoE Service Name: Optional. Input the service nam e if your ISP requires it. Assigned IP Address: Optional. Required by some ISPs. Once you finished the requi red configuration, you must cli ck on the "Save" button to save the configuration i nto Flash memory , and the reboot t his device. 4.4.2 OAM Server In this page, you can set t[...]
-
Seite 29
29 4.4.3 DHCP Server Press “More” The settings of a TCP/IP environment include host IP , Subnet Mask, Gateway , and DNS configurations.[...]
-
Seite 30
30 It is not easy to m anually configure all t he computers and devices in your network. Fortunate ly , DHCP Server provides a rather simple approach to handle all these settings. This product supports the function of DHCP server . If you enable this product’ s DHCP server and configure your computers as “automatic IP allocation” mode, then w[...]
-
Seite 31
31 W ireless settings allow you to set the wireless configuration items. 1. Network ID(SSID) : Network ID is used for identifying th e W ireless LAN (WLAN). Client stations can roam freely over this product and ot her Access Points that ha ve the same Network ID. (The factory setting is “ default ”) 2. Channel : The radio channel number . The p[...]
-
Seite 32
32 4.4.5 Change Password Y ou can change Password here. W e strongly recomm end you to change the system password for security reason.[...]
-
Seite 33
33 4.5 Forwarding Rules 4.5.1 V irtual Server[...]
-
Seite 34
34 This product’ s NA T firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisi ble to the outside wo rld. If you wish, you can make som e of them accessible by enabling the V irtual Server Mapping. A virtual server is defined as a Service Port , and all requests to this p ort will be redire[...]
-
Seite 35
35 4.5.2 Special AP Some applicat ions require m ultiple connections, l ike Internet games, V ideo co nferencing, Intern et telephony , etc. Because of the firewall function, t hes e applications cannot work with a pure NA T router . The Special Applications fe ature allows some of these applicatio ns to work with this product. If the mechanism of [...]
-
Seite 36
36 4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a hos t without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way com munication for Int ernet games, V ideo conferencing, Internet telephony and other special applications. NOTE: This feature should be used only when needed. Non-[...]
-
Seite 37
37 4.6 Security Settings[...]
-
Seite 38
38 4.6.1 Packet Filter Packet Filter enables you to control what packets are allowed to pa ss the router . Outbound filter applies on all outbound packets. However , Inbound filter applies on packets that destined to V irtual Servers or DMZ host only . Y ou can select on e of the two filtering policies: 1. Allow all to pass excep t those match the [...]
-
Seite 39
39 For source or destination IP address, you can define a single IP address (4.3.2.1) or a range of IP addresses (4.3.2.1-4.3.2.254). An empty implie s all IP addresses. For source or destination port, you can defi ne a single port (80) or a range of ports (1000-1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For ex[...]
-
Seite 40
40 Example 2: (192.168.123.100-192.168.123.1 19) They can do everyt hing except read net news (port 1 19) and transfer files via FTP (port 21) Others are all allowed. After Inbound Packet Filter setting is configured, cl ick the save button. Outbound Filter: To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet [...]
-
Seite 41
41 (192.168.123.100-192.168.123.149) They are allowed to send m ail (port 25), receive mail (port 1 10), and browse Internet (port 80); port 53 (DNS) i s necessary to resolve the domain nam e. (192.168.123.10-192.168.123.20) They can do every thing (block nothing) Others are all blocked. Example 2: (192.168.123.100-192.168.123.1 19) They can do eve[...]
-
Seite 42
42 4.6.2 Domain Filter Domain Filter let you prevent users under this device from accessing specific URLs. Domain Filter Enable Check if you want to enab le Do main Filter . Log DNS Query Check if you want to log the action wh en someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these hos ts to [...]
-
Seite 43
43 Example: In this example: 1. URL include “www .msn.com” will be blocked, an d the action will be record in log -file. 2. URL include “www .sin a.com” will not be blocked, but the action will be reco rd in log-file. 3. URL include “www .google.com” w ill be blocked, but the action w ill not be record in log-file. 4. IP address X.X.X.1[...]
-
Seite 44
44 4.6.3 URL Blocking URL Blocking will block LAN computers to c onnect to pre-defined W ebsites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suf fix (like .com or .or g, etc), while URL Blocking require user t o input a keyword only . In other words, Domain filter can block specifi[...]
-
Seite 45
45 In this example: 1.URL include “sex” will b e blocked, and the action will b e record in log-file. 2.URL include “erotica” will be blocked, but the action will be record in log-file 3.URL include “girl” will n ot be blocked, but the action will be record in log-file. 4. URL include “game” will be block ed , but the action will be[...]
-
Seite 46
46 4.6.4 MAC Address Contr ol MAC Address C ontrol allows you t o assign diffe rent access right for diffe rent users and to assi gn a specific IP address to a certain MAC address. MAC Address Control Check “Enable” to e nable the “M AC Address Control”. All of the settings in this page will tak e effect only when “En ab le” is checked.[...]
-
Seite 47
47 Control table "Control table" is the tab le at the bottom of the "MAC Address Control" page. Each r ow of this table indicat es the MAC address and the expected IP address mapping of a clie nt. There are four columns i n this table: MAC Address MAC address indicates a specific client. IP Address Expected IP address of the cor[...]
-
Seite 48
48 4.6.5 VPN setting VPN Settings are settings that are used to create virtual private tunnels to rem ote VPN gateways. The tunnel technology supports data confidentiality , data or igin authentication and da ta integrity of network information by utilizing encap su lation protocols, encryp tion algorithms, and hashin g algorithms. • VPN enable i[...]
-
Seite 49
49 System m anagers of both end gateways only need set t he same pre-shared key . Function of Buttons More : T o setup detailer co nfiguration for ma nual key or IKE approa ches by clicking the "Mo re" button. • VPN Settings - IKE There are three parts that are necessary to setup the configurat i on of IKE for the dedicated t unnel : ba[...]
-
Seite 50
50 Local netmask Local netmask com bined with local subnet to form a subnet domain. Remote subnet The subnet of LAN site of rem ote VPN gateway , it can be a host, a partial subnet, and the whol e subnet of LAN site of remote gateway . Remote netmask Remote net mask combined with rem ote subnet to form a subnet dom ain of remote end. ?[...]
-
Seite 51
51 • VPN Settings - Set IKE Proposal IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below . The selecting acti vity is performed by selecti ng a proposal ID and clicking "add to" button in the bott om of the page. There are only four indexes can be chosen from the proposal pool for the dedic[...]
-
Seite 52
52 • VPN Settings -Set IPSec Proposal IPSec Proposal index A list of selected proposal i ndexes from the IPSec proposal pool listed bel ow. The selecting activity is performed by selecti ng a proposal ID and clicking "add to" button in the bott om of the page. There are only four indexes can be chosen for the dedicated t unnel. Remo[...]
-
Seite 53
53 IPSec proposal. Life time The unit of life tim e is based on the value of Life T ime Unit. If the value of unit is second, the value of life tim e represents the life time of dedicated VPN tunnel between both end gateways . Its value ranges from 300 seconds to 172,800 seconds. If the value of unit is KB, the value of life tim e represents th[...]
-
Seite 54
54 4.6.6 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can b rowse the built-in web pages to p erform admi nistration task. This feature enables you to perform administration t ask from remote host. If t his feature is enabled, only the specified IP address can perform rem ote administrati on. If the specified IP[...]
-
Seite 55
55 4.7 Advanced Setting[...]
-
Seite 56
56 4.7.1 ADSL Modem Performance Setting Tx Gain Offset This parameter al lows the user to add an offset on the Tx gain of the CPE Modem. The offset range is limi ted between -10 dB and +3 dB with a granularity of 0.5 dB. The default value i s set to 0 dB, no offset. T arget Noise Margin Offset This parameter allows the user to add an offset on the [...]
-
Seite 57
57 offset. Tx Output Power Offset This paramete r al lows user t o reduce the Tx output power (in the upstream direction). The val ue shoul d be ranged between 0 and 10 dBm. Rx Output Power Offset This parameter al lows user to reduce the Rx out put power . The value should be ranged between 0 and 10 dBm.[...]
-
Seite 58
58 4.7.2 System T i me Get Date and T ime by NTP Protocol Selected if you want to Get Date and T ime by NTP Prot ocol. T ime Server Select a NTP time server to consult UTC time Ti me Z on e Select a time zone where this device locates. Set Date and T i me manually Selected if you want to Set Date and T ime m anually . Function of Buttons Sync Now: [...]
-
Seite 59
59 4.7.3 System Log This page support two me thods to export system logs t o specific destination by means of sy slog(UDP) and SMTP(TCP). The item s you have to setup including: IP Address for Syslog Host IP of destination wh ere syslogs will be sent to. Check Enable to enable this fu nction. E-mail Alert Enable Check if you want to enable Ema il a[...]
-
Seite 60
60 E-mail Subject The subject of email alert. This setting is optional.[...]
-
Seite 61
61 4.7.4 Dynamic DNS To host your server on a changing IP address, you have to use dynami c domain name service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynam ic DNS will map the name of your host to your current IP address, which changes each time y ou connect your Internet service provider. Before you e[...]
-
Seite 62
62 Username/E-mail Password/Key You will get this information when you register an account on a Dynam ic DNS server. Example: After Dynami c DNS setting is configured, click the save but ton.[...]
-
Seite 63
63 4.7.5 SNMP Setting In brief, SNMP, the Sim ple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by pollin g and setting terminal values and monitori ng network events. Enable SNMP Y ou must check either Local or Rem ote or both to enable SNMP function. If Local is checked, th[...]
-
Seite 64
64 1. This device will response to SNMP client which’ s get community is set as “public” 2. This device will response to SNMP client which’ s set community is set as “private” 3. This device will response request from both LAN and W AN[...]
-
Seite 65
65 4.7.6 Routing T able Routing T ables allow you to determ ine which physical in terface address to use for outgoing IP data grams. If you have m ore than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow di f ferent subnets to communicate with each other . Routing T able settings[...]
-
Seite 66
66 Example: So if, for example, the host wanted to send an IP data gram to 192.168.3.88, it woul d use the above table to determ ine that it had to go via 192.168.1.33 (a gateway ), And if it sends Packets to 192.168.5.77 will go via 192.168.1.55 Each rule can be enabled or disabled i ndividually . After routing table set ting is configured, click [...]
-
Seite 67
67 4.7.7 Schedule Rule Y ou can set the schedule time to decide which service at what time will be turned on or off. Select the “enable” item. Press “Add New Rule” Y ou can write a rule name and set which day and what time to schedule from “S tart T ime” to “End T ime”. The following example configure “FTP time” as everyday 14:1[...]
-
Seite 68
68[...]
-
Seite 69
69 Schedule Enable Selected if you want to Enable the Scheduler . Edit T o edit the schedu le ru le. Delete T o delete the schedu le ru le, an d the rule# of the rules b eh ind the deleted one will decrease on e automatically . Schedule Rule can be apply to V irtual server and Packet Filter , for example: Exanple1: V irtual Server – Apply Rule#1 [...]
-
Seite 70
70 Exanple2: Packet Filter – Apply Rule#1 (ftp ti me: everyday 14:10 to 16: 20).[...]
-
Seite 71
71 4.8 T oolbox[...]
-
Seite 72
72 4.8.1 V iew Log Y ou can V iew system log by clicking the Vi e w L o g button[...]
-
Seite 73
73 4.8.2 Firmwar e Upgrade Y ou can upgrade firmware by clicking Firmwar e Upgrade button.[...]
-
Seite 74
74 4.8.3 Backup Setting Y ou can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmwar e Upgrade button and use the bin file you saved. 4.8.4 Reset to default Y ou can also reset this product to factory default by cl icking the Reset to default button. 4.8[...]
-
Seite 75
75 4.8.6 Miscellaneous Items MAC Address for W ake-on-LAN W ake-on-LAN is a technology that enabl es you to power up a networked device remotel y . In order to enjoy this feature, the tar get device must be W ake-on-LAN enabled and you have to know the MAC address of this dev ice, say 00-1 1-22-3 3 -44-55. Clicking "W ake up" button will [...]
-
Seite 76
76 C C C h h h a a a p p p t t t e e e r r r 5 5 5 P P P r r r i i i n n n t t t S S S e e e r r r v v v e e e r r r WBR-3402 provides the fu nction of net work print server for MS W indows 95/98/NT/20 00 and Unix based platforms. (If t he product you purchased doesn’t have printer port , please skip this chapter .) 5.1 Configuring on W indows 95[...]
-
Seite 77
77 1. Find out the correspon ding icon of your server printer , for e xample, the HP LaserJet 6L . Click the mouse’ s right butto n on that icon, and then select the Pr operties item:[...]
-
Seite 78
78 2. Click the Details item: 3. Choose the “PR Tmate: (All-in-1)” from the list attached at the Print T o item. Be sure that the Printer Driver item is configured to the correct driver of yo ur server printer . 4. Click on the button of Port Settings : T ype in the IP address of this product and then clic k the OK button. 8. Make sure that all[...]
-
Seite 79
79 5.2 Configuring on W indows NT Platforms The configuration pro cedure for a W indows NT platform is similar to that of W indows 95/98 ex cept the screen of printer Properties : Compared to the procedure in last section, the selection of Details is equivalent t o the selection of Ports , and Port Settings is equivalent to Configure Port .[...]
-
Seite 80
80 5.3 Configuring on W indows 2000 and XP Platforms W indows 2000 and XP have built-in LPR client, us ers could utilize this feature to Print. Y ou have to install your Printer Driver on LPT1 or other ports before you preceed the following sequence. 1.Open Printers and Faxs .[...]
-
Seite 81
81 2.Select “Ports” page, Cl ick “Add Port…” 3. Select “Standard TCP/IP Port ”, and then click “New Port…”[...]
-
Seite 82
82 4.Click Next and t hen provide the following informat ion: T ype address of server providing LPD that is our NA T device:192.168.123.254 4. Select Custom, then click “Settings…”[...]
-
Seite 83
83 6.Select “LPR”, type ” lp “ lowercase letter in “Queue Name:” And enable “LPR Byte Counting Enabled”.[...]
-
Seite 84
84 7.Apply your setti ngs[...]
-
Seite 85
85 5.4 Configuring on Unix-like based Platforms Please follow the traditional configu ration procedure on Unix platforms to setup the print server of this product. The pri nter name is “lp.” In X-W indows, for example, In Redhat Platforms, Please follow the below steps to confi gure your printer on Red Hat 9.0. 1. Start from the Red Hat---> [...]
-
Seite 86
86 2. Click Add---> Forward. 3. Enter the Pinter Name, Com ments then forward.[...]
-
Seite 87
87 4. Select LPD protocol and then forward. 5. Enter the router LAN IP Address and the queue nam e "lp". Then forward.[...]
-
Seite 88
88 6. Select the Printer Brand and M odel Name. Then Forward. 7. Click Apply to finish setup.[...]
-
Seite 89
89 8. At last you m ust click Apply on the toolbox t o make the change take effective. In Command Mode: Linux has built-in LPR client ,Y ou c an utilize it for printing. Y ou can manual set it or vi a the tool "printtool" in X- windows. PS: The spool name is "lp"------all l owercase letter . Below is my s etting. /etc/printcap -[...]
-
Seite 90
90 5.5 Configuring on Apple PC 1.First, go to Printer center (Printer list) and add printer 2.Choose IP print and setup printer ip address (router Lan ip address). 3.Disable “ Default Queue of Server .” And fill in ‘ lp ‘ in Queue name item. 4.Printer type: C hoose “ General ”.[...]
-
Seite 91
91 A A A p p p p p p e e e n n n d d d i i i x x x A A A T T T C C C P P P / / / I I I P P P C C C o o o n n n f f f i i i g g g u u u r r r a a a t t t i i i o o o n n n f f f o o o r r r W W W i i i n n n d d d o o o w w w s s s 9 9 9 5 5 5 / / / 9 9 9 8 8 8 This section in troduces you how t o install TCP/IP protocol into yo ur personal com pute[...]
-
Seite 92
92 5. Select Micros oft item in the manufactures list. And choose TCP/IP in the Networ k Protocols. Click OK button to return to Network window . 6. Th e TCP/IP protocol shall be listed in the Network window . Click OK to complete the in stall procedure and restart your PC to enable t he TCP/IP protocol.[...]
-
Seite 93
93 A.2 Set TCP/IP Protocol for W orking with NA T Router 1. Clic k St a r t button and choose Settings , then click Control Panel . 2. Double click Network icon. Select the TCP/IP line that ha s been associated to your ne twork card in the Configuration tab of the Network window . 3. Clic k Properties button t o set the TCP/IP protocol for this NA [...]
-
Seite 94
94 a. Select Obtain an IP address automatically in the IP Address tab . b. Don’t input any value in the Gateway tab.[...]
-
Seite 95
95 c. Choose Disable DNS in the DNS Configuration tab. B. Configure IP manual ly a. Select Specify an IP address in the IP Address tab. The default IP address of this product is 192.1 68.12 3.254. So please use 192.1 68.123.xxx (xxx is b etween 1 and 253 ) for IP Address field and 255.255.255.0 for Subnet Mask field.[...]
-
Seite 96
96 b. In the Gatewa y tab, add t he IP address of t his product (default IP is 192.168.123 .254) in the New gateway field and click Add button. c. In the DNS Configurati on tab, add the DNS val ues which are provi ded by the ISP into DNS Server Search Order field and click Add button.[...]
-
Seite 97
97 A A A p p p p p p e e e n n n d d d i i i x x x B B B W W W i i i n n n 2 2 2 0 0 0 0 0 0 0 0 0 / / / X X X P P P I I I P P P S S S E E E C C C S S S e e e t t t t t t i i i n n n g g g g g g u u u i i i d d d e e e Example: W in XP/2000 VPN Router (Configuration on WIN 2000 is similar to X P) 1. On Win 2000/XP, click [Start] button, sel ect[...]
-
Seite 98
98 Double-click [Administrative T ools][...]
-
Seite 99
99 Local Security Policy Settings Double-click [Local Security Policy][...]
-
Seite 100
100 Right-clic k [IP Security Policies on Local Computer] , and click [Create IP Security Policy] . Click the [Next] button, enter your policy’s nam e (Here it is to_vpn_router ). Then, click [Next] . Introduction Dis-select the [Activate the default response rule] check box, and click [Next] button. Click [Finish] button, make sure [Edit] check [...]
-
Seite 101
101 Build 2 Filter Lists: “xp->r outer” and “router ->xp” Filter List 1: xp-> router In the “ new policy’s properties ” screen, select [Use Add Wizard] check box, and then click [Add] button to create a new rule.[...]
-
Seite 102
102 click [Add] button[...]
-
Seite 103
103 Enter a name, for exam ple: xp->router and dis-select [Use Add Wizard] check box. Cl ick [Add] button.[...]
-
Seite 104
104 In the Source address field, select [A specific IP Address] . and fill in IP Address: 192.168.1.1 In the Destination address field, select [A specific IP Subnet] , fill in IP Address: 192.168.123.0 and Subnet mask: 255.255.255.0 . If you want to select a protocol for you r filter, click [Protocol] page.[...]
-
Seite 105
105 Click [OK] button. Then click [OK] button on t he “ IP Filter List ” page.[...]
-
Seite 106
106 select [Filter Action] , select [Require Security] , then click [Edit] button.[...]
-
Seite 107
107 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.[...]
-
Seite 108
108 select [Custom] button[...]
-
Seite 109
109 Select [Data integrity and encryption (ESP)] Configure “ Integrity algorithm ”: [MD5] Configure “ Encryption algorithm ”: [DES ] Configure “ Generate a new key every [10000] seconds ” Click [OK] button[...]
-
Seite 110
11 0 select [Authentication Methods] page, click [Add] button.[...]
-
Seite 111
111 select [Use this string to protect the key exchange (preshared key)] , and enter your preshared key string, such as mypresharedkey . Click [ OK] button. Click [OK] button on [Authentication Methods] page. Select [T unnel Setting][...]
-
Seite 112
11 2 configure [The tunnel endpoint is specified by this IP address] : 192.168.1.254 Select [Connection T ype][...]
-
Seite 113
11 3 select [All network connections] Tunnel 2: router->xp In the “ new policy’s properties ” page, dis-select [ Use Add Wizard] check box, and then click [Add] button to create a new rule.[...]
-
Seite 114
11 4 click [Add] button[...]
-
Seite 115
11 5 Enter a name, such as router->xp and dis-select [Use Add Wizard] check box. C lick [Add] button.[...]
-
Seite 116
11 6 In the Source address field, select [A specific IP Subnet] . fill in IP Address: 192.168.123.0 and Subnet mask: 255.255.255.0 . In the Destination address field, select [ A specific IP Address] , and fill in IP Address: 192.168.1.1 If you want to select a protocol for you r filter, click [Protocol] page.[...]
-
Seite 117
11 7 Click [OK] button. Then click [OK] butt on on [IP Filter List] window.[...]
-
Seite 118
11 8 select [Filter Action tab] , select [Require Security] , then click [Edit] button.[...]
-
Seite 119
11 9 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.[...]
-
Seite 120
120 select [Custom] button[...]
-
Seite 121
121 Select [Data integrity and encryption (ESP)] Configure “ Integrity algorithm ”: [MD5] Configure “ Encryption algorithm ”: [DES] Configure “ Generate a new key every [10000] seconds ” Click [OK] button[...]
-
Seite 122
122 select [Authentication Methods] page, click [Add] button.[...]
-
Seite 123
123 select [Use this string to protect the key exchange (preshared key)] , and enter the preshared key string, such as mypresharedkey . Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [T unnel Setting][...]
-
Seite 124
124 Configure [The tunnel endpoint is specified by this IP address] : 192.168.1.1 Select [Connection T ype][...]
-
Seite 125
125 select [All network connections][...]
-
Seite 126
126 Configure IKE pr operties Select [General] Click [Advanced…][...]
-
Seite 127
127 enable “ Master key perfect forward security (PFS) ” configure “ Authenticate and generate a new key after every [10000] seconds ” click [Methods…] click [Add] button[...]
-
Seite 128
128 Configure “ Integrity algorithm ”: [SHA1] Configure “ Encryption algorithm ”: [3DES] Configure “ Diffie-Helman gr oup ”: [Medium (2)] Settings on VPN router VPN Router: W an IP address:192.168.1.254 Lan IP address:192.168.123.254 PC: 192.168.123.123[...]
-
Seite 129
129 VPN Settings: VPN: Enable Max. number of t unnels: 2 ID: 1 T unnel Name: 1 Method: IKE Press “ More ” [...]
-
Seite 130
130 VPN Settings - T unnel 1 – IKE T unnel:1 Local Subnet:192.168.123.0 Local Netmask: 255.255.255.0 Remot e Subnet:192.168.1.1 Remot e Netmask:255.255.255.255 Remote Gateway:192.168.1.1 Preshare Key: my-preshare-key[...]
-
Seite 131
131 VPN Settings - T unnel 1 - Set IKE Proposal ID: 1 Proposal Name: 1 DH Group: Group2 Encrypt. Algorithm: 3DES Auth. Algorithm: SHA1 Life T ime: 10000 Life T ime Unit: Sec.[...]
-
Seite 132
132 VPN Settings - T unnel 1 - Set IPSec Proposal ID: 1 Proposal Name: proposal 1 DH Group: Group2 Encap. Protocol: ESP Encrypt. Algorithm: DES Auth. Algorithm:MD5 Life T ime: 10000 Life T ime Unit: Sec. User can view VPN connection process in “ System Log ” page, and correct their settings.[...]
-
Seite 133
133 A A A p p p p p p e e e n n n d d d i i i x x x C C C P P P P P P T T T P P P a a a n n n d d d L L L 2 2 2 T T T P P P C C C o o o n n n f f f i i i g g g u u u r r r a a a t t t i i i o o o n n n s s s 1. First, please go to the Net work connection 2. Connect to network at m y workplace[...]
-
Seite 134
134 3. Choose Virtual Privat e Network 4. Do not dial to initial connection[...]
-
Seite 135
135 5. Input the router wan ip address 6. Then ok, please input usernam e and password as you setup in the router.[...]
-
Seite 136
136 7. Select the type of VPN[...]
-
Seite 137
137 However, you should add the Authentica tion Protocol in advanced(Custom setting) of Security option, like below t o support pap, chap, ms chap. If successfully, we will see: This tim e, the client in the internet can ping any pcs in the lan(192.168.123.x) L2TP However, the router is the also vpn-l2tp server and support s three Authentication Pr[...]
-
Seite 138
138 Then the steps refer to pptp settings.[...]
-
Seite 139
139 A A A p p p p p p e e e n n n d d d i i i x x x D D D 8 8 8 0 0 0 2 2 2 . . . 1 1 1 x x x S S S e e e t t t t t t i i i n n n g g g Figure 1: T esting Environment (Use W indows 2000 Radius Server) 1 Equipment Details PC1: Microsoft W indows XP Professional without Service Pack 1. D-Link DWL-650+ wireless LAN adapter Driver version: 3.0.5.0 (Dri[...]
-
Seite 140
140 3.LAN IP address: 192.168.123.254/24. 4.Set RADIUS server IP . 5.Set RADIUS server shared key . 6.Configure WEP key and 802.1X setting. The following test will use th e inbuilt 802.1X authentication method such as ,E AP_TLS, PEAP_CHAPv 2(W indows XP with SP1 only), a nd PEAP_TLS( W indows XP with SP1 only ) using the Smart C ard or other Certif[...]
-
Seite 141
141 Figure 2: Enable IEEE 802.1X access contr ol[...]
-
Seite 142
142 Figure 3: Smart card or certificate properties 4.Window s 2000 RADIUS server Authentication testing: 4.1DUT authenticate PC1 using certificate. (P C2 follows the same test proced u res.) 1. Download an d install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3. Set authentication ty pe of wireless client and [...]
-
Seite 143
143 Figure 4: Certificate information on PC1 Figure 5: Authenticating[...]
-
Seite 144
144 Figure 6: Authentication success 4.2 DUT authenticate PC2 using PEAP-TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication ty pe of wireless client and RADIUS server both t o PEAP_TLS. 3. Disable the wireless conn ection and enable again. 4.The DUT will send the user's certificate to the RADIUS server , and then sen[...]
-
Seite 145
145 A A A p p p p p p e e e n n n d d d i i i x x x E E E F F F A A A Q Q Q a a a n n n d d d T T T r r r o o o u u u b b b l l l e e e s s s h h h o o o o o o t t t i i i n n n g g g Reset to factory Default There are 2 methods to reset t o default. 1. Restore with RESET button First, turn off the router and press the RESET button in. And then, po[...]
-
Seite 146
146 4.If you can find one device and unreachable. Y ou must setup the sam e submask, For example configure the PC IP address to 192.168.12.xxx. 5. Click “Upgrade Button” and t o upgrade the firmware smoothl y . 6 . I f s u c c e s s f u l l y , p l e a s e use “Reset Button” reset to default the router . If failed , the pr ogram will ask to[...]