LevelOne WBR-5400 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung LevelOne WBR-5400 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von LevelOne WBR-5400, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung LevelOne WBR-5400 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung LevelOne WBR-5400. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung LevelOne WBR-5400 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts LevelOne WBR-5400
- Den Namen des Produzenten und das Produktionsjahr des Geräts LevelOne WBR-5400
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts LevelOne WBR-5400
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von LevelOne WBR-5400 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von LevelOne WBR-5400 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service LevelOne finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von LevelOne WBR-5400 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts LevelOne WBR-5400, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von LevelOne WBR-5400 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    1 LevelOne WBR -5400 MIMO Wireless 1W ,4L Broadband R outer U s e r ` s M a n u a l V er 1.00-0512[...]

  • Seite 2

    2 Copyright The contents of th is publication may not be reproduced in any par t or as a whole, stored, transcribed in an information retrieval system, translated into an y language, or transmitted in any form or by an y means, mechanical, magnetic, electr onic, optical, phot ocopying, ma nual, or otherwise, wit hout the prior written permission. T[...]

  • Seite 3

    3 T able of Contents CHAPTER 1 INTRODUCTION ............................................................................ 5 F UNCTIONS AND F EA TURES ........................................................................................ 5 P ACKING L IST ...............................................................................................[...]

  • Seite 4

    4 APPENDIX B 802.1X SETTING ......................................................................... 76 APPENDIX C RESET T O F A CTOR Y DEF AUL T ............................................. 82 R ESET T O F ACTOR Y D EF AUL T ................................................................................... 82[...]

  • Seite 5

    5 C C C h h h a a a p p p t t t e e e r r r 1 1 1 I I I n n n t t t r r r o o o d d d u u u c c c t t t i i i o o o n n n Congratulat ions on your purchase of this out standing LevelO ne WBR-5400, 1 1g MIMO W ireless Broadband R outer . This product is specifically designed for Sm all Office and Home Of fice needs. It provides a complete SOHO solut[...]

  • Seite 6

    6 Wir eless functions  High speed for wireless LAN connection Up to 54Mbps data rate by incorporatin g Orthogonal Frequency Division Multiplexin g (OFDM).  Roaming Provides seamless roam ing within the IE EE 802.1 1b (1 1M) and IEEE 802.1 1g (54M) WLAN infrastructure.  IEEE 802.1 1b co mpatible (1 1 M) Allowing inter-operation among multip[...]

  • Seite 7

    7 When SPI Mode is enabled, the rou ter will check every incoming packet to detect if this packet is valid.  DoS Attack Detection Supported When this feature is enabled , the router will detect and log the Do S attack comes from the Internet. Advanced functions  System time Supported Allow you to synchronize syste m time with network time ser[...]

  • Seite 8

    8 C C C h h h a a a p p p t t t e e e r r r 2 2 2 H H H a a a r r r d d d w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n 2.1 Panel Layout 2.1.1. Fr ont Panel Figure 2-1 Front Panel LED: LED Function Color S tatus Description POWER Power indication Green On Power is being applied to this product. ST A[...]

  • Seite 9

    9 2.1.2. Rear Panel Ports: Port Description PWR(DC) Power i nlet W AN the port where you will co nnect your cable (or DSL) modem or Ethernet router . Port 1-4 the ports where you will connect network ed computers and other devices.[...]

  • Seite 10

    10 2.2 Procedur e for Hardwar e Installation 2. Decide where to place your Wir eless Broadband Router Y ou can place your W BR-5400, W ireless Broadband Rout er , on a desk or other flat surface, or you can mount it on a wall. For optim al performance, place your W ire less Broadband R outer in the center of your office (or y our home) in a locati [...]

  • Seite 11

    11 C C C h h h a a a p p p t t t e e e r r r 3 3 3 N N N e e e t t t w w w o o o r r r k k k S S S e e e t t t t t t i i i n n n g g g s s s a a a n n n d d d S S S o o o f f f t t t w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n T o use WBR-5 400 correctly , you have to properly configur e the netwo[...]

  • Seite 12

    12 C C C h h h a a a p p p t t t e e e r r r 4 4 4 C C C o o o n n n f f f i i i g g g u u u r r r i i i n n n g g g W W W i i i r r r e e e l l l e e e s s s s s s B B B r r r o o o a a a d d d b b b a a a n n n d d d R R R o o o u u u t t t e e e r r r This product prov ides W eb based configuratio n scheme, that is, configuring b y your W eb bro[...]

  • Seite 13

    13 4.1 S tart-up and Log in Activate your brow ser , and disable the proxy or ad d the IP addr ess of this produc t into the exceptions . Then, type this pr oduct’ s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.123.254 . After the connection is established, you will see the we b [...]

  • Seite 14

    14 4.2 S tatus This option p rovides the functi on for observing this pr oduct’ s working stat us: A. W AN Port S tatus. If the W AN port is assigned a dynam ic IP , there may appear a “ Renew ” or “ Release ” button on the Sidenote column. Y ou can click this button to renew or release IP man ually . B. Statistics of W AN: en ables you t[...]

  • Seite 15

    15 4.3 Wiz ard Setup W izard will guide you through a basic configuration pro cedure step by step.Press ”Next >” Setup W izard will automatically det ect your W AN type. If W AN type can not be detected successfully , “Dynamic IP Address” will be assigned.[...]

  • Seite 16

    16 Setup Wi zard - Select W AN T ype : For detail settings, please refer to 4.4. 1 primary setup. For the rest of the steps, Setup W izard will guide you through a basic configuration. .Press ”Next >”[...]

  • Seite 17

    17 4.4 Basic Setting[...]

  • Seite 18

    18 4.4.1 Primary Setup – W AN T ype, V irtual Computers Press “Change”[...]

  • Seite 19

    19 This option is primary to enable this product to work properly . The settin g items and the web appearance de pend on the W AN type. Choose correct W AN type before you sta rt. 1. LAN IP Addr ess : the local IP address of this device. The computers o n your network m ust use the LAN IP address of your product as their Defa ult Gateway . Y o u ca[...]

  • Seite 20

    20 4.4.1.5 PPTP 1. My IP Address and My Subnet Mask: the pr ivate IP address and subn et mask your ISP assigned to you. 2. Server IP Address: the IP address of the PPTP server . 3. PPTP Account and Passwo rd: the account an d password your ISP assigned to you. If you don'twant to change the password, keep it empty . 3. Con nection ID: optional[...]

  • Seite 21

    21 4.4.1.6 L 2TP 1. IP Mode: The IP Mode assign ed by your ISP. Y ou can select eit her Static IP Address or Dynamic IP address. 2. My IP Addr ess and My Subnet Mask: the priv ate IP address and sub net mask your ISP assigned to you when your IP Mode is Static IP Address. 3. Server IP Address: the IP a ddress of the L2TP server . 4. L2TP Accoun t a[...]

  • Seite 22

    22 4.4.1.7 V irtual Computers V irtual Computer enab les you to use the original NA T feature, and allows you to setup the one-to-one mapping of multiple global IP address and local IP address. • Global IP: Enter the global IP address assigned by y our ISP . • Local IP: Enter th e local IP addr ess of your LAN PC co rresponding to th e global I[...]

  • Seite 23

    23 4.4.2 DHCP Server Press “Mor e>>”[...]

  • Seite 24

    24 The settings of a TCP/IP en vironment include host IP , Subnet Mask, Gateway , and DNS configuration s. It is not easy to manually conf igure all the computers and devices in your network. Fortunately , DHCP Server provid es a rather sim ple approach to ha ndle all these settings. This product su pports the function of DHCP server . If you ena b[...]

  • Seite 25

    25 W ireless settings allow you to set the wireless configuration items. 1. Wir eless function : Enab le or disable wireless fun ction. 2. Network ID (SSID) : Network ID is used for identifyi ng the Wireless LAN (WLAN). Client stations can roam freely over this product and ot her Access Points that have the same Network ID. (The factory se tting is[...]

  • Seite 26

    26 802.1X Se tting 802.1 X Check Box wa s used to switch t he function of t he 802.1X. When the 802. 1X function is enabl ed, the W ireless user must authenticate to t his router first to use the Network service. RADIUS Server IP IP address or t he 802.1X server’ s domai n-name. RADIUS port The port setting of 802.1X server RADIUS Shared Key Key [...]

  • Seite 27

    27 WP A-PSK 1.Encryption. There are two encr yption methods, TK IP and AES. 1. Select Preshare Key Mode 2. Fill in the key, Ex 12345678 Pre-share Key Mode: Either ASCII or HEX can be selected. Pre-share Key: Please input either 32 ASCII characte rs or 64 Hexadecimal digit s as Pre-share key .[...]

  • Seite 28

    28 WP A Check Box was used to switch the fun ction of the WP A. When the WP A function is enabled, the W ireless user must authenticate to t his router first to use th e Network service. RADIUS Server IP address or t he 802.1X server’ s domai n-name. RADIUS Shared Key Key value shared by the RADIUS serve r and this ro uter . This key value is con[...]

  • Seite 29

    29 WP A2-PSK(AES) : Accept WP A2 clients only a nd Pre-share key (encryption key) must be entere d manually . Y ou can input either 32 ASCII ch aracter s or 64 Hexadeci mal digits as Pre -share key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII charact ers or 64 Hexa decimal digits a[...]

  • Seite 30

    30 WP A2(AES) : Accept WP A2 clients only and work simultaneously with RADIUS Server . The encryption key is got from RA DIUS Server dynamically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS server and this router . This k[...]

  • Seite 31

    31 WP A-PSK / WP A2-PSK : Accept WP A1 or WP A2 clients to co nnect simultaneously and Pre-share key (encrypt ion key) must be entered manua lly . Y ou can input either 32 ASCII characters o r 64 Hexadecimal digits as Pre-s hare key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII char[...]

  • Seite 32

    32 WP A1/WP A2 : Accept WP A1 or WP A2 clients to connect simultaneously and work simultaneously with RADIUS Server . The encryption key is got from RADIUS Server dy namically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS [...]

  • Seite 33

    33 4.4.4 Chan ge Password Y ou can change Password here. W e strong ly recommend y ou to change th e system password for security reason.[...]

  • Seite 34

    34 4.5 Forwarding Rules[...]

  • Seite 35

    35 4.5.1 V irtual Server This product’ s NA T firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisi ble to the outside wo rld. If you wish, you can make som e of them accessible by enabling the V irtual Server Mapping. A virtual server is defined as a Public Port , and all requests to this[...]

  • Seite 36

    36 The Private port is used for multi-comput ers, which might use the same service. For example, if you setup thr ee W eb server(80) in your LAN, which are 192.168.1 23.7, 192.168.1 23.10, and 19 2.168.123.77. Y ou can assign di fferent p ublic port t o diffe rent IP . The public port can be set at any port. But please must avoid the confliction. A[...]

  • Seite 37

    37 4.5.2 Special AP Some applicat ions require m ultiple connections, l ike Internet games, V ideo conferenci ng, Internet telephony , etc. Because of the firewall function, thes e a pplications cannot work with a pure NA T router . The Special Appl ications feature allows som e of these applicatio ns to work with this produc t. If the mechanism of[...]

  • Seite 38

    38 4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the pr otection of firewall. It a llows a computer to be exposed to unre stricted 2-way communi cation for Internet gam es, V ideo conferenci ng, Internet telephony a nd other special applications. NOTE: This fe ature should be used only whe n needed[...]

  • Seite 39

    39 4.6 Security Settings[...]

  • Seite 40

    40 4.6.1 Packet Filter Packet Filter enables you to con trol what packets are allowed to pass the router . Outbound filter applies on all outbound packets. However, Inbound filter applies on p ackets that destined to V irtual Servers or DMZ host only . Y ou can select o ne of the two filtering policies: 1. Allow all to pass excep t those match the [...]

  • Seite 41

    41 addresses (4.3.2 .1-4.3.2.25 4). An empty implies all I P addresses. For source or destination port, you can define a single por t (80) or a range of ports (1000 -1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For exampl e, T80, U53, U2000-2999. N o prefix indicates bot h TCP and UDP are defined. An empty impli [...]

  • Seite 42

    42 Example 2: (1.2.3.100- 1.2.3.1 19) They can do everything except read net news (p ort 1 19) and tra nsfer files via FTP (port 21) Others are all allowed. After Inbound Pa cket Filter setting is co nfigured, click the save button.[...]

  • Seite 43

    43 Outbound Filter: To enab le Outbound Packet Filter click the check box nex t to Enable in the Outbound Packet Filter field. Example 1: (192.168.123.100-1 92.168.123.149) They are allowed to se nd mail (port 25), recei ve mail (port 1 10), and browse Internet ( port 80); port 53 (DNS) is necessa ry to resolve the domain name. (192.168.12 3.10-192[...]

  • Seite 44

    44 Example 2: (192.168.1 23.100-192.168 .123.1 19) They can do everything e xcept read net new s (port 1 19) and transfer files via FTP (port 21) Others are allowed After Outbound Packet Filter setting is configured, click the save button.[...]

  • Seite 45

    45 4.6.2 Domain Filter Domain Filter let you pre vent users under t his device from accessing specific URLs. Domain Filter Enable Check if you want to enab le Domain Filter . Log DNS Query Check if you want to log the action wh en someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these ho sts to[...]

  • Seite 46

    46 Example: In this example: 1. URL include “www .msn.com” will be blocked, and the action will b e record in log-file. 2. URL include “www .sina.com” will not be bloc ke d, but the action will be record in log-file. 3. URL include “www .google.co m” will be blocked, but the action will no t be record in log-file. 4. IP address X.X.X.1~[...]

  • Seite 47

    47 4.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined W ebsites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suf fix (like .com or .org , etc), while URL Blocking re quire user to input a keyword only . In other words, Domain filter can block specific[...]

  • Seite 48

    48 In this example: 1.URL include “msn” will be blocked, and the actio n will be record in log-file. 2.URL include “sina” will be blocked, an d the action will be record in log-file 3.URL include “cnnsi” will be blocked, and the action will be record in log-file. 4. URL include “espn” will be blocked, and the action will be record i[...]

  • Seite 49

    49 4.6.4 MAC Address Contr ol MAC Address C ontrol allows you t o assign diffe rent access right for diffe rent users and to assi gn a specific IP address to a certain MAC address. MAC Address Cont rol Check “Enable” to ena ble the “M AC Address Control”. All of the settings in this page will take effect only when “Enable” is checked. C[...]

  • Seite 50

    50 Control table "Control table" is the tab le at the bottom of the "MAC Address Control" page. Each r ow of this table indicat es the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a specific client. IP Address Expected IP address of the corre[...]

  • Seite 51

    51 4.6.5 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform admin istration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can per form remote admi nistration. If the s pecified IP ad[...]

  • Seite 52

    52 packet to detect if this packet is valid. DoS Attack Detection When this feature is enabled, the router will detect and log the DoS attack comes from the Internet. Currently , the router can detect th e following DoS attack: SYN Attack, W inNuke, Port Scan, Ping of Death, Land Attack etc. VPN PPTP/IPSec Pass-Thr ough Please enable this feature, [...]

  • Seite 53

    53 4.7 Advanced Settings 4.7.1 System T ime[...]

  • Seite 54

    54 Get Date and Time by NTP Protocol Selected if you want to Get Date and T ime by NTP Pro tocol. Time Server Select a NTP time server to consult UTC time Time Z one Select a time zone where this device locates. Get Date and Time using PC`s Date and T ime Selected if you want to synchronize the router time setting with your connected PC. Set Date a[...]

  • Seite 55

    55 4.7.2 System Log This page s upport two m ethods to export sy stem logs to s pecific destinatio n by means of sy slog(UDP) and SMTP(TC P). The it ems you have t o setup including: IP Address for Syslog Server Host IP of destination wh ere syslogs will b e sent to. Check Enable to enable this function . E-mail Alert Enable Check if you want to en[...]

  • Seite 56

    56 4.7.3 Dynamic DNS To host your s erver on a changi ng IP address, you have to use dynam ic domain nam e service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your curr ent IP address, which changes eac h time you conn ect your Intern et service provid er. Before[...]

  • Seite 57

    57 Example: After Dynamic DNS setting is configured, click the save button. The new settings will be ef fective after reboot.[...]

  • Seite 58

    58 4.7.4 SNMP Setting In brief, S NMP, the Simpl e Network Mana gement Protoc ol, is a protocol designed to give a user the capability to remotely manage a co mputer network by polling and setting terminal values and monitori ng network events . Enable SNMP Y ou must check either Local or Remote or both to enable SNMP function. If Local is check ed[...]

  • Seite 59

    59 Example: 1. This device will response to SNMP client which’ s get co mmunity is set as “public” 2. This device will response to SNMP client which’ s set community is set as “priv ate”[...]

  • Seite 60

    60 4.7.5 Routing T able Routing T ables allow you to determine which physical int e rface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to fin d proper routing path and allow di fferent su bnets to comm unicate with each othe r . Routing T able sett i[...]

  • Seite 61

    61 Example: Configurati on on NA T Router Destination SubnetMask Gateway Hop Enabled 192.168.1.0 255.255 .255.0 192.1 68.123.216 1 ˇ 192.168.0.0 255.255 .255.0 192.1 68.123.103 1 ˇ So if, for example, the clien t3 wanted to send an IP data gram to 192.168.0.2, it would use the above table to determin e that it had to go via 19 2.168.123.103 (a ga[...]

  • Seite 62

    62 4.7.6 Schedule Rule Y ou can set the schedule time to decid e which service will be tu rned on or off. Select the “enable” item. Press “Add New Rule”[...]

  • Seite 63

    63 Y ou can write a rule name and set which day and what time to schedule from “S tart T ime” to “End T ime”. The following example confi gure “ftp time” as everyday 14:10 to 16:20[...]

  • Seite 64

    64 After c onfigure Rule 1  Schedule Enable Selected if you want to Enable the Scheduler . Edit T o edit the schedule rule. Delete T o delete the schedule rule, an d the rule# of th e rules behind the d eleted one will decrease one automatically . Schedule Rule can be apply to V irtual serv er and Packet Filter , for example:[...]

  • Seite 65

    65 Exanple1: Vi rtual Server – Apply Rule#1 (f tp time: everyday 14:10 to 16:20) Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 1 4:10 to 16:20).[...]

  • Seite 66

    66 4.8 T oolbox[...]

  • Seite 67

    67 4.8.1 Sys tem Log Y ou can V iew system log by clicking the Vi e w L o g button[...]

  • Seite 68

    68 4.8.2 Firmwar e Upgrade Y ou can upgrade fi rmware by clicki ng Firmware Upgrade butto n.[...]

  • Seite 69

    69 4.8.3 Backup Setting Y ou can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Up grade button and use the bin f ile you saved. 4.8.4 Reset to default Y ou can also reset this product to factor y default by clicking the Reset to default button. 4.[...]

  • Seite 70

    70 4.8.6 Miscella neous Items MAC Address for W ake-on-LAN W ake-on -LAN is a technology that enables you to power up a networked device remotely . In orde r to enjoy this feat ure, the tar get device must be W ake-on-LA N enabled and you have to know the MAC address of this device, say 00-11- 22-33-44-55. Clicking "W ake up" button will [...]

  • Seite 71

    71 A A A p p p p p p e e e n n n d d d i i i x x x A A A T T T C C C P P P / / / I I I P P P C C C o o o n n n f f f i i i g g g u u u r r r a a a t t t i i i o o o n n n f f f o o o r r r W W W i i i n n n d d d o o o w w w s s s 9 9 9 5 5 5 / / / 9 9 9 8 8 8 This section in troduces you how t o install TCP/IP protocol i nto your personal computer[...]

  • Seite 72

    72 6. The TCP/IP protocol shall be listed in the Network window . Click OK to co mplete the install procedure and restart your PC to e nable the TCP/IP protocol. A.2 Set TCP/IP Protocol f or W orking with NA T Router 1. Clic k St a r t button and choose Settings , then click Control Panel . 2. Double click Network icon. Select the TCP/IP line that [...]

  • Seite 73

    73 a. Select Obtain an IP addr ess automatically in the IP Address tab. b. Don’t input any val ue in the Gateway tab .[...]

  • Seite 74

    74 c. Choose Disable DNS in the DNS Configuration tab. B. Configure I P m anually a. Select Specify an IP addres s in th e IP Add ress tab. The defau lt IP address of this product is 192.1 68.123.254. So please use 192.168.12 3.xxx (xxx is between 1 and 253) for IP Address field and 255.2 55.255.0 for Subnet Mas k field.[...]

  • Seite 75

    75 b. In the Gat eway tab, ad d the IP address of this product (de fault IP is 192.168.123.2 54) in the New gateway field and click Add butt on. c. In the DNS Co nfiguration tab, add t he DNS values which a re provided by t he ISP into DNS Server Se arch Order field and click Add button.[...]

  • Seite 76

    76 A A A p p p p p p e e e n n n d d d i i i x x x B B B 8 8 8 0 0 0 2 2 2 . . . 1 1 1 x x x S S S e e e t t t t t t i i i n n n g g g Figure 1: T esting Environm ent (Use W indows 200 0 Radius Serve r) 1 Equipment Details PC1 OS: Microsoft Win dows XP Professional without Service Pack 1. PC2 OS: Microsoft W indows XP Professional with Service Pack[...]

  • Seite 77

    77 5.Set RADIU S serv er shar ed key . 6.Configure WEP key and 802.1X settin g. The following test will use th e inbuilt 802.1X authentication method such as ,E AP_TLS, PEAP_CHAPv 2(W indows XP with SP1 o nly), and PEAP_TL S(W indows XP with SP1 only) using the Sm art Card or other Certifi cate of the W indows XP Pr ofessional. 3. DUT and Windows 2[...]

  • Seite 78

    78 Figure 2: Enable IEEE 802.1X access control[...]

  • Seite 79

    79 Figure 3: Sm art card or cer tificate properties 4. W indows 2000 RADIUS server Authenticati on testing: 4.1DUT aut henticate PC1 using certificate. (P C2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3. Set authentication type of wireless client and [...]

  • Seite 80

    80 Figure 4: Certificate in formation on PC1 Figure 5: Authenticating[...]

  • Seite 81

    81 Figure 6: Authentication success 4.2 DUT authenticate PC2 using PEAP-TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 3. Disable the wireless connection and e nable again. 4.The DUT will send the us er's certificate to the RADIUS server , and then send [...]

  • Seite 82

    82 A A A p p p p p p e e e n n n d d d i i i x x x C C C R R R e e e s s s e e e t t t t t t o o o f f f a a a c c c t t t o o o r r r y y y d d d e e e f f f a a a u u u l l l t t t Reset to factory Default There are 2 methods to reset to default. 1. Restore with RESET button First, turn off th e router and press the RESET button in . And then, po[...]