TeleWell TW-EAV510 V2 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 169 pages
- N/A
Aller à la page of
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation TeleWell TW-EAV510 V2. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel TeleWell TW-EAV510 V2 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation TeleWell TW-EAV510 V2 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation TeleWell TW-EAV510 V2 devrait contenir:
- informations sur les caractéristiques techniques du dispositif TeleWell TW-EAV510 V2
- nom du fabricant et année de fabrication TeleWell TW-EAV510 V2
- instructions d'utilisation, de réglage et d’entretien de l'équipement TeleWell TW-EAV510 V2
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage TeleWell TW-EAV510 V2 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles TeleWell TW-EAV510 V2 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service TeleWell en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées TeleWell TW-EAV510 V2, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif TeleWell TW-EAV510 V2, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation TeleWell TW-EAV510 V2. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
TW - EAV510 v2 3G/4G/LTE Wireless VPN ADSL2+/Fibre Broadband Router User Manual Copyright © TeleWell Oy[...]
-
Page 2
2 Table of Contents Chapter(1:(Introduction ( ................................................................................................................................................. ( 3 ! Introdu ctio n(to (yo u r(R ou te r ( ..................................................................................................................[...]
-
Page 3
3 Chapter 1: I ntroduct ion Introduction to your Router The TeleWell TW -EAV510V2 is a fibre-ready ADSL2+/VDSL modem, an all- in -one advanced device integrating Wireless-N 300Mbps, 100 Mb Ethernet, 3G/4G/LTE, and NAS (Network Attached Storage) in one unit. As well as being IPv6-capable, the TeleWell TW-EAV510V2 ADSL2+ router supports super fast fi[...]
-
Page 4
4 Jumbo frames supported Jumbo frames are Ethernet frames with more than 1500 bytes (standard Ethernet frame) of payload. Conventionally, jumbo frames can carry up to 9720 bytes of payload to enjoy a high-efficiency communication in Gigabit Ethernet. Jumbo frames increase the frame size so that a certain large amount of date can be transported with[...]
-
Page 5
5 Features - Triple-WAN ports for 3G/4G/LTE, ADSL2+, VDSL2, 100Mb Ethernet WAN (EWAN) for broadband connectivity - 100/10 Mb WAN and LAN - Fibre (FTTC/FTTP/FTTH) ready with high WAN throughput - IPv6 ready (IPv4/IPv6 dual stack) - Auto fail- over - High -speed Internet Access via ADSL2 / 2+; Backward Compatible with ADSL - Jumbo frames - IEEE 802.1[...]
-
Page 6
6 Firewall - Built-in NAT Firewall - Stateful Packet Inspection (SPI) - DoS attack prevention - Packet Filtering (v4/v6) - port, source IP address, destination IP address, MAC address - URL Content Filtering (v4/v6) – string or domain name detection in URL string - MAC Filtering Quality of Service Control - Supports the DiffServ approach - Traffi[...]
-
Page 7
7 Management - Web -based GUI for remote and local management (IPv4/IPv6) - Firmware upgrades and configuration data upload and download via web -based GUI - Embedded Telnet server for remote and local management - Supports DHCP server / client / relay - Supports SNMP v1,v2, MIB- I and MIB - II - TR -069 supports remote management - Available Syslo[...]
-
Page 8
8 Only use the power adapter that comes with the package. Using a different voltage rating power adapter may damage the router. Devic e De scri pti on The Front LEDs LED Status Meaning 1 Power Red Boot failure or in emergency mode Green System ready 2 Ethernet Port 1- 4 (EWAN) Green Transmission speed hitting 100 Mbps Blinking Data being transmitte[...]
-
Page 9
9 The Rear Ports Port Meaning 1 Power Switch Power ON / OFF switch. 2 Power Connect the supplied power adapter to this jack. 3 RESET After the device is powered on, press it 5 seconds or above: to restore to factory default settings (this is used when you cannot login to the router, e.g. forgot the password) 4 USB Connect the USB device (Printer, 3[...]
-
Page 10
10 Chapter 2 : Bas ic Installat ion The router can be configured through your web browser. A web browser is included as a standard application in the following operating systems: Linux, Mac OS, Windows 8 / 7 / 98 / NT / 2000 / XP / Me / Vista, etc. The product provides an easy and user-friendly interface for configuration. Please check your PC netw[...]
-
Page 11
11 IPv4: Select Internet Protocol Version 4 (TCP/IPv4) then click Properties[...]
-
Page 12
12 In the TCP/IPv4 properties window, select the Obtain an IP address automatically and Obtain DNS Server address automatically radio buttons. Then click OK to exit the setting. Click OK again in the Local Area Connection Properties window to apply the new configuration. IPv6: Select Internet Protocol Version 6 (TCP/IPv6) then click Properties[...]
-
Page 13
13 In the TCP/IPv6 properties window, select the Obtain an IPv6 addr ess automatically and Obtain DNS Server address automatically radio buttons. Then click OK to exit the setting. Click OK again in the Local Area Connection Properties window to apply the new configuration. Config uring a PC i n Windows Vista Go to Start. Click on Network. Then cli[...]
-
Page 14
14 connections on the left window panel. Select the Local Area Connection, and right click the icon to select Properties. IPv4: Select Internet Protocol Version 4 (TCP/IPv4) then click Properties. In the TCP/IPv4 properties window, select the Obtain an IP address automatically and Obtain DNS Server address automatically radio buttons. Then click OK[...]
-
Page 15
15 Click OK again in the Local Area Connection Properties window to apply the new configuration. IPv6: Select Internet Protocol Version 6 (TCP/IPv6) then click Properties.[...]
-
Page 16
16 In the TCP/IPv6 properties window, select the Obtain an IPv6 address automatically and Obtain DNS Server address automatically radio buttons. Then click OK to exit the setting. Click OK again in the Local Area Connection Properties window to apply the new configuration. Factory Default Settings Before configuring your router, you need to setting[...]
-
Page 17
17 DHCP server for IPv4 - DHCP server is enabled - Start IP Address: 192.168.0.100 - IP pool counts: 100 LAN and WAN Por t Address es The parameters of LAN and WAN ports are pre-set in the factory. The default values are shown in the table. IPv4 LAN Port WAN Port IPv4 address 192.168.0.254 The RFC1483 Bridged IP LLC function is enabled to automatic[...]
-
Page 18
18 Informa tion from yo ur ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) to find out what kind of service is provided. Gather the information as illustrated in the following table and keep it for reference. PPPoE(RFC2516) VPI/VCI, VC / LLC-based multiplexing, Username, Password, Service Name, and Do[...]
-
Page 19
19 Chapter 3 : Con figuration Config uratio n via Web Int erface Open your web browser; enter the IP address of your router, which by default is 192.168.0.254, and click ok or press ‘Enter’ key on the keyboard, a login prompt window will appear. The default root username and password are “admin” and “admin” respectively. Congratulations[...]
-
Page 20
20 Status This Section gives users an easy access to the information about the working router and access to view the current status of the router. Here Summary, WAN, Statistics, Bandwidth Usage, 3G/LTE Status, Route, ARP, DHCP, VPN and Log subsections are included. Summary The basic information about the device is provided here (the following is a [...]
-
Page 21
21 Device Information Model Name : Displays the model name. Host Name : Displays the name of the router. System Up- Time : Displays the elapsed time since the device is on. Date/Time : Displays the current exact date and time. Sync button is to synchronize the Date/Time with your PC time without regard to connecting to internet or not. Software Ver[...]
-
Page 22
22 Statistics LAN The table shows the statistics of LAN. Note : P4 can be configured as EWAN, and when the device is in EWAN profile, there is no P4/EWAN interface as P4 is working as a WAN port. (DSL) (EWAN) Interface : List each LAN interface. P1-P4 indicates the four LAN interfaces. Bytes : Display the Received and Transmitted traffic statistics[...]
-
Page 23
23 Interface : Display the connection interface. Description : the description for the connection. Bytes : Display the WAN Received and Transmitted traffic statistics in Bytes. Packets : Display the WAN Received and Transmitted traffic statistics in Packests. Errors : Display the statistics of errors arising in Receiving or Transmitting data. Drops[...]
-
Page 24
24 xDSL M ode : Modulation protocol, including G.dmt, G.lite, T1.413, ADSL2, AnnexL, ADSL2+ and AnnexM. Traffic Type : Transfer mode, here supports ATM and PTM. Status : Show the status of DSL link. Link Power State : Show link output power state. Line Coding (Trellis): Trellis on/off.[...]
-
Page 25
25 SNR Margin (dB): Show the Signal to Noise Ratio (SNR) margin. Attenuation (dB): Thi s is estimate of average loop attenuation of signal. Output Power (dBm): Show the output power. Attainable Rate (Kbps): The sync rate you would obtain. Rate (Kbps): Show the downstream and upstream rate in Kbps. MSGc (#of bytes in overhead channel message): The n[...]
-
Page 26
26 When it is OK, the following test result window will appear. You can view the quality of ADSL connection. Here the connection is OK. Reset: Click this button to reset the statistics. Bandwidth Usa ge Bandwidth Usage provides users direct view of bandwidth usage with simple diagram. Bandwidth usage shows the use of the bandwidth from two angles: [...]
-
Page 27
27 Press View LAN Transmitted button to change the diagram to the statistics from a Received Bytes of view. (Note: means Ethernet port #3, and the traffic information of the port #3 is identified with green, the same color with P3 in the diagram; other ports all take the same mechanism.) When you press View WAN Traffic concurrently button, the WAN [...]
-
Page 28
28 3G/LTE Status Status : The current status of the 3G/LTE card. Signal Strength : The signal strength bar indicates current 3G signal strength. Network Name : The network name that the device is connected to. Network Mode : The current operation mode for 3G/LTE card, it depends on service provider and card’s limitation, GSM or UMTS. Card Name : [...]
-
Page 29
29 Route Destination : The IP address of destination network. Gateway : The IP address of the gateway this route uses. Subnet Mask : The destination subnet mask. Flag : Show the status of the route. i U: Show the route is activated or enabled. i H (host): destination is host not the subnet. i G: Show that the outside gateway is needed to forward pa[...]
-
Page 30
30 DHCP The DHCP Table lists the DHCP lease information for all IP addresses assigned by the DHCP server in the device. Host Name : The Host Name of DHCP client. MAC Address : The MAC Address of internal DHCP client host. IP Address : The IP address which is assigned to the host with this MAC address. Expires in : Show the remaining time after regi[...]
-
Page 31
31 PPTP PPTP Server Name : The PPTP connection name. Enable : Display the connection status with icons. Status : The connection status. Connection Type : Remote Access or LAN to LAN. Peer Network IP : Display the remote network and subnet mask in LAN to LAN PPTP connection. Connected By : Display the IP of remote connected client. Action : Act to t[...]
-
Page 32
32 L2TP Client Name : The L2TP connection name. Enable: Display the connection status with icons. Status : The connection status. Connection Type : Remote Access or LAN to LAN. Peer Network IP : Display the remote network and subnet mask in LAN to LAN L2TP connection. Client : Assigned IP by L2TP server. Action : Act to the connection. Click Drop b[...]
-
Page 33
33 Security Log Security log displays the message logged about security, like filter messages and some firewall message. You can turn to IP Filtering Outgoing , IP Filtering Incoming , URL Filter to determine if you want to log this information. Also you can turn to Configure Log section below to determine the level to log the message. You can use [...]
-
Page 34
34 LAN - Local Area Network A Local Area Network AN) is a shared communication system network where many computers are connected. This type of network is area defined and is usually limited to a confined region within a building. Ethernet Parameters Group Nam e : This refers to the group you set in Interface IP address : the IP address of the route[...]
-
Page 35
35 When enabled, you will see two modes: i Standard Mode : In standard mode, multicast traffic will flood to all bridge ports when no client subscribes to a multicast group. i Blocking Mode : In blocking mode, the multicast data will be blocked when there are no client subscribes to a multicast group, it won’t flood to the bridge ports. LAN side [...]
-
Page 36
36 Static IP List The specified IP will be assigned to the corresponding MAC Address listed in the following table when DHCP Server assigns IP Addresses to Clients. Press Add to the Static IP List. Enter the MAC Address, IP Address, and then click Apply to confirm your settings. But the IP assigned should be outside the range of 192.168.0.100- 192.[...]
-
Page 37
37 The second way is “stateless” configuration. Stateless auto-configuration requires no manual configuration of hosts, minimal (if any) configuration of routers, and no additional servers. The stateless mechanism allows a host to generate its own addresses using a combination of locally available information (MAC address) and information (pref[...]
-
Page 38
38 Leased Time (hour): The leased time, similar to leased time in DHCPv4, is a time limit assigned to clients, when expires, the assigned ID will be recycled and reassigned. Issue Router Advertisement : Check whether to enable issue Router Advertisement feature. It is to send Router Advertisement messages periodically. ULA Prefix Advertisement : En[...]
-
Page 39
39 Stateful: two methods can be adopted. i With only DHCPv6 enabled With this method, the PCs’ addresses are configured the same as in IPv4, that is addresses are assigned by DHCPv6 server. i With both DHCPv6 and Issue Router Advertisement Enabled With this method, the PCs’ addresses are configured the same like above, and the address informati[...]
-
Page 40
40 Group Isolation : If enabled, devices in one group are not able to access those in the other group. Click Add to add groups.[...]
-
Page 41
41 Group Name : Type a group name. Grouped WAN Interfaces : Select from the box the WAN interface you want to applied in the group. Grouped LAN Interfaces : Select the LAN interfaces you want to group as a single group from Available LAN Interfaces. Automatically Add Clients with following DHCP Vendor IDs : Enter the DHCP Vendor IDs for which you w[...]
-
Page 42
42 Wireles s This section provides you ways to configure wireless access. The TW-EAV510v2 supports wireless on the 2.4GH z for users. This part has sub-items as Basic, Security, MAC Filter, Wireless Bridge, Advanced and Station Info here. Basic It let you determine whether to enable Wireless function and set the basic parameters of an AP and the Vi[...]
-
Page 43
43 Wireless : Default setting is set to Enable. If you do not have any wireless devices, check the checkbox again to unselect. Hide SSID : It is function in which transmits its SSID to the air so that when wireless client searches for a network, router can then be discovered and recognized. Check the checkbox to determine whether you want to hide S[...]
-
Page 44
44 Note : The WPS feature will also be unavailable when the security setting is not WPA2 or OPEN. So, if you manually set the wireless security setting, you should give notice to it, but you can find prompt indicating configuration. Manual Setup AP Select SSID: Select the SSID you want these settings apply to. Network Authentication i Open WEP En[...]
-
Page 45
45 i 802.1x RADIUS Server IP Address : RADIUS(Remote Authentication Dial In User Service), Enter the IP address of RADIUS authentication server. RADIUS Server Port : Enter the port number of RADIUS authentication server here. RADIUS Key : Enter the password of RADIUS authentication server. WEP Encryption : Select to enable or disable WEP Encryption[...]
-
Page 46
46 WPA/WAPI passphrase : Enter the WPA.WAPI passphrase; you can click here to display to view it. WPA Group ReKey Internal : The per iod of renewal time for changing the security key automatically between wireless client and Access Point (AP). This is in seconds. WPA/ WAPI Encryption : There are two Algorithms, AES (Advanced Encryption Standard) an[...]
-
Page 47
47 WPA/WAPI Encryption : There are two Algorithms, AES (Advanced Encryption Standard) and TKIP (Temporal Key Integrity Protocol) which help to protect the wireless communication. i Mixed WPA2/WPA-PSK WPA/WAPI passphrase : enter the WPA.WAPI passphrase, you can click here to display to view it. WPA Group ReKey Internal : The period of renewal time f[...]
-
Page 48
48 Configure AP as Registrar Add Enrollee with PIN method Select radio button “Enter STA PIN”. Input PIN from Enrollee Station (16837546 in this example), Or else users can alternatively enter the authorized station MAC Help: it is to help users to understand the concept and correct operation. Click . (Station PIN) (Station MAC) Note : Users ca[...]
-
Page 49
49 Operate Station to start WPS Adding Enrollee. Launch the wireless client’s WPS utility. Set the Config Mode as Enrollee, press the WPS button on the top bar, select the AP (eg. wlan-ap) from the WPS AP List column. Then press the PIN button located on the middle left of the page to run the scan. The client’s SSID and security settings will n[...]
-
Page 50
50 Configure AP as Enrollee Add Registrar with PIN Method Set AP to “Unconfigured Mode”. Launch the wireless client's WPS utility. Set the Config Mode as Registrar. Enter the PIN number (76229909 (device) for example) in the PIN Code column then choose the The router’s (AP’s) SSID and security setting will now be configured to match th[...]
-
Page 51
51 MAC Address : enter the MAC address(es). The format of MAC address could be: xx:xx:xx:xx:xx:xx or xx - xx - xx - xx - xx - xx. Click Apply to apply your settings and the item will be listed below. If you don’t need a rule, check the remove checkbox and press Remove to delete it. Wire less Br idge WDS (wireless distributed system) is a wireless[...]
-
Page 52
52 Remote Bridge MAC Address : Enter the remote bridge MAC addresses. Here up to 4 bridge MAC addresses are supported. i Enabled(Scan): To enable wireless bridge restriction. Only those scanned by the gateway can communica te. Remote Bridge MAC Address: select the remote bridge MAC addresses. i Disable: Does not restrict the gateway communicating w[...]
-
Page 53
53 Advanced Here users can set some advanced parameters about wireless. Band : Select frequency band. Here 2.4GHz. Channel : Allows channel selection of a specific channel (1-7) or Auto mode. Scan Used Channel : Press the button to scan and list all channels being used. Auto Channel Timer (min): The auto channel times length it takes to scan in min[...]
-
Page 54
54 to disable this function or auto to enable this function. OBSS Co-Existence : coexistence (or not) between 20 MHZ and 40 MHZ overlapping basic service sets (OBSS) in wireless local area networks. RX Chain Power Save : Enabling this feature turns off one of the Receive chains, going from 2x2 to 2x1 to save power. RX Chain Power Save Quiet Time : [...]
-
Page 55
55 MAC Address : The MAC address of the wireless clients. Associated : List all the stations that are associated with the Access Point. If a station is idle for too long, it is removed from this list Authorized : List those devices with authorized access. SSID: Show the current SSID of the client. Interface : To show which interface the wireless cl[...]
-
Page 56
56 WAN - Wide Ar ea Netwo rk A WAN (Wide Area Network) is a computer network that covers a broad geographical area (eg. Internet) that is used to connect LAN and other types of network systems. WAN Se rvi ce Three WAN interfaces are provided for WAN connection: ADSL, VDSL and 3G/4G/LTE Click Add to add new WAN connections. There are three transfer [...]
-
Page 57
57 A) DSL PPPoE PPPoE (PPP over Ethernet) provides access control in a manner which is similar to dial-up services using PPP. VCI/VPI : Enter the VCI/VPI combination from you ISP. Encapsulation Mode : Select the encapsulation mode, LLC/SNAP-BRIDGING, or VC/MUX. Description : User-defined description for the connection, commonly for friendly use. 80[...]
-
Page 58
58 Furthermore, any external host can send a packet to the internal host by sending a packet to the mapped external address. Note : In PPPoE connection, NAT is enabled by default, you can determine whether to enable Fullcone NAT or disable Fullcone NAT and only use NAT, the default NAT type is Port Restricted cone NAT. Of Port-Restricted cone NAT, [...]
-
Page 59
59 Here you can configure WAN Service, if it is OK, you can access the internet. You can go to Status > WAN or Summary to view the WAN connection information (if your ISP provides IPv6 service, then you will obtain an IPv6 address). PPPoA VCI/VPI : Enter the VCI/VPI combination from you ISP. Encapsulation Mode : Select the encapsulation mode, LL[...]
-
Page 60
60 Fullcone NAT : Enable or disable fullcone NAT. Fullcone is a kind of NAT, in this mode, all requests from the same internal IP address and port are mapped to the same external IP address and port. Furthermore, any external host can send a packet to the internal host by sending a packet to the mapped external address. Note: In this connection, NA[...]
-
Page 61
61 IP over Ethernet VCI/VPI : Enter the VCI/VPI combination from you ISP. Encapsulation Mode : Select the encapsulation mode, LLC/SNAP-BRIDGING, or VC/MUX. Description : User-defined description for the connection, commonly for friendly use. Authentication Method : Default is Auto. Or else your ISP will advise you the appropriate mode. 802.1P Prior[...]
-
Page 62
62 Obtain DNS : I Use WAN interfaces: Select a desirable WAN interface as the IPv6 DNS server. I Use Static DNS : To specify DNS server manually by entering your primary and secondary DNS server addresses. I Parental Controls : If user registers and gets a DNS account in the parental control provider website, expecting to enjoy a more reliable and [...]
-
Page 63
63 VCI/VPI : Enter the VCI/VPI combination from you ISP. Encapsulation Mode : Select the encapsulation mode, LLC/SNAP-BRIDGING, or VC/MUX. Description : User-defined description for the connection, commonly for friendly use. WAN IP : Enter the WAN IP from the ISP. WAN Subnet Mask : Enter the WAN Subnet Mask from the ISP. Obtain DNS : I Use Static D[...]
-
Page 64
64 B) Ethernet Ethernet WAN connection is well known as directly broadband WAN connection. Click Add on WAN Service page to add new Ethernet WAN connection PPPoE Description : User-defined description for the connection, commonly for friendly use. 802.1P Priority : The parameter indicates the frame priority level from 0 owest) to 7 (highest), which[...]
-
Page 65
65 send a packet, with source IP address X and source port P, to the internal host only if the internal host had previously sent a packet to IP address X and port P IPv4 Address : Select whether to set static IPv4 address or obtain automatically. IP Address: If Static is enabled in the above field, enter the static IPv4 address get from the ISP. Di[...]
-
Page 66
66 Default Gateway Select default gateway for you connection (IPv4 and IPv6). DNS IPv4 Three ways to set an IPv4 DNS server i Available WAN interfaces: Select a desirable WAN interface as the IPv4 DNS server. i Static DNS Address: To specify DNS server manually by entering your primary and secondary DNS server addresses. i Parental Controls: If use[...]
-
Page 67
67 IP over Ethernet Description : User-defined description for the connection, commonly for friendly use. 802.1P Priority : The parameter indicates the frame priority level from 0 owest) to 7 (highest), which can be used to prioritize different classes of traffic (voice, video, data, etc). Enter the priority identification , tagged: 0 - 1, untagged[...]
-
Page 68
68 Obtain an IPv6 address automatically : check whether to enable or disable this feature. WAN IPv6 Address/Prefix Length : Enter the WAN IPv6 Address/Prefix Length from your ISP. WAN Next -Hop IPv6 Address : Enter the WAN Next-Hop IPv6 Address from your ISP. Note : If you don’t know well about the DHCP Option, you can leave it empty or leave it [...]
-
Page 69
69 C) 3G/LTE Select 3G/4G/LTE to configure the route to enjoy the mobility. By default the 3G/4G/LTE interface is on, user can edit the parameters to meet your own requirements. Click Edit button to enter the 3G/LTE configuration page. Failover : If enabled, the 3G/LTE will work in failover mode and be brought up only when there is no active defaul[...]
-
Page 70
70 they use to connect to a DHCP Server, thus giving you access to the internet i.e. some 3G operators use the APN ‘internet’ for their portal. The default value is “internet”. Username/Password : Enter the username and password provided by your service provider. The username and password are case sensitive. Authentication Protocol: Default[...]
-
Page 71
71 DSL This screen allows you to set DSL parameters. DSL knowledge is required to configure these settings. Contact your ISP to make sure that these parameters are correct. Modulation: There are 7 modes “G.Dmt”, “G.lite”, “T1.413”, “ADSL2”, “AnnexL”, ”ADSL2+”, “AnnexM” that user can select for this connection. Phone line[...]
-
Page 72
72 SNR Signal- to -noise ratio (often abbreviated SNR or S/N) is a measure used in science and engineering that compares the level of a desired sig nal to the level of background noise. It is defined as the ratio of signal power to the noise power. SNR : Change the value to adjust the DSL link rate, more suitable for an advanced user. System Inter [...]
-
Page 73
73 Firmware Upgrade Software upgrading lets you experience new and integral functions of your router. Restart device with : i Factory Default Settings: Restart the device with factory default settings automatically when finishing upgrading. i Current Settings: Restart the device with the current settings automatically when finishing upgrading. Your[...]
-
Page 74
74 Click Backup Settings, a window appears, click save , then browse the location where you want to save the backup file. Click Browse and browse to the location where your backup file is saved, the click Open. Then in the above page, click Update Settings, the following process indicating screen will appear. Let it update to 100%, it will automati[...]
-
Page 75
75 Click Apply to apply your new settings. Mail Aler t Mail alert is designed to keep system administrator or other relevant personnel alerted of any unexpected events that might have occurred to the network computers or server for monitoring efficiency. With this alert system, appropriate solutions may be tackled to fix problems that may have aris[...]
-
Page 76
76 Port: the port, default is 25. Account Test: Press this button to test the connectivity and feasibility to your sender’s e- mail. Recipient’s Email (WAN IP Change Alert): Enter the email address that will receive the alert message once a WAN IP change has been detected. SMS Alert SMS, Short Message Service, is to inform clients the informati[...]
-
Page 77
77 USB Storage here refers to network sharing in the network environment, USB devices act as the storage carrier for DLNA, common file sharing. Storage Dev ice Inf o This part provides users direct access to the storage information like the total volume, the used and the remaining capacity of the device. Volume Name : Display the storage volume nam[...]
-
Page 78
78 Username : user-defined name, but simpler and more convenient to remember would be favorable. Password : Set the password. Confirm Password : Reset the password for confirmation. Volume Name : Select Volume name, as to create access to the volume of the specified partition of the storage. For example, a user test is setup behind the usb1_1. Acce[...]
-
Page 79
79 When accessing the network storage, you can see a folder named “public”, users should have the account to enter, and the account can be set at the User Accounts section. When first logged on to the network folder, you will see the “public” folder. Public: The public sharing space for each user in the USB Storage. When user register a USB[...]
-
Page 80
80 When successfully accessed, the private folder of each user is established, and user can see from the following picture. The test fold in the picture is the private space for ach user. Print Server The Print Server feature allows you to share a printer on your network by connecting a USB cable from your printer to the USB port on the TW-EAV5102.[...]
-
Page 81
81 Note : Only USB printers are supported Setup of the printer is a 3 step process (for example) Connect the printer to the ’s USB port Enable the print server on the Install the printer drivers on the PC you want to print from On -board Print S erver : Check Enable to activate the print server Printer Name : Enter the Printer name, for example, [...]
-
Page 82
82 Step 2: Click ‘’Add a Printer’’. Step 3: Click “Add a network, wireless or Bluetooth printer[...]
-
Page 83
83 Step 4: Click “The printer that I want isn’t listed” Step 5: Select “Select a shared printer by name” Enter http:// - LAN- IP :631/printers/printer-name or. Make sure printer’s name is the same as what you set in the earlier For Example: http://192.168.0.254:631/printers/OfficePrinter OfficePrinter is the Printer Name we setup earlie[...]
-
Page 84
84 Step 6: Click “Next” to add the printer driver. If your printer is not listed and your printer came with an installation disk, click “Have Disk” find it and install the driver. Step 7: Click “Next”[...]
-
Page 85
85 Step 8: Click “Next” and you are done You will now be able to see your printer on the Devices and Printers Page DLNA The Digital Living Network Alliance (DLNA) is a non-profit collaborative trade organization established by Sony in June 2003, which is responsible for defining interoperability guidelines to enable sharing of digital media bet[...]
-
Page 86
86 On -board digital media server: Enable to share the device as a DLNA server. Interface: The VLAN group, it is the bound interface for DLNA server accessing. Media L ibrary Path: Default is usb1_1, total USB space (pictures, videos, music, etc, all can be accessed with this path). Take Windows media player in Windows 7 accessing the DLNA server f[...]
-
Page 87
87 Click Add button to manually add the 6in4 rules. Tunnel Name : User- defined name. Mechanism : Here only 6RD. Associated WAN Interface : The applied WAN interface with the set tunnel, thus when there are packets from/to the WAN interface, the tunnel would be used to transport the packets. Associated LAN Interface : Set the linked LAN interface w[...]
-
Page 88
88 Click Add button to manually add the 4in6 rules. Tunnel Name : User- defined tunnel name. Mechani sm : It is the 4in6 tunnel operation technology. Please select DS- Lite. Associated WAN Interface : The applied WAN interface with the set tunnel, and when there are packets from/to the WAN interface, the tunnel would be used to transport the packet[...]
-
Page 89
89 Click Add button to enter the exact rule setting page. Fi lter Name : A user-defined rule name. User can select simply from the list box for the application for quick setup. IP Version : Select the IP Version, IPv4 or IPv6. Protocol: Set the traffic type (TCP/UDP, TCP, UDP, ICMP ) that the rule applies to. Source IP address : This is the Address[...]
-
Page 90
90 (The rule is active; disable field shows the status of the rule, active or inactive) (Rule Inactive)[...]
-
Page 91
91 IP Filtering Incoming Incoming IP Filtering is set by default to block all incoming traffic, but user can set rules to forward the specific incoming traffic. Note: The maximum number of entries: 32. When LAN side firewall or firewall in WAN interface(s) is enabled, user can move here to add allowing rules to pass through the firewall. Click Add [...]
-
Page 92
92 Time Schedule : Select or set exactly when the rule works. When set to “Always On”, the rule will work all time; and also you can set the precise time when the rule works, like 01:00-19:00 from Monday to Friday. Or you can select the already set timeslot in “Time Schedule” during which the rule works. And when set to “Disable”, the r[...]
-
Page 93
93 Protocol type : Select from the drop-down menu the protocol that applies to this rule. Destination /Source MAC Address : Enter the destination/source address. Frame Direction : Select the frame direction this rule applies, both LAN and WAN: LAN <=>WAN, only LAN to WAN : LAN=>WAN, only WAN to LAN: WAN=>LAN. WAN Interfaces : Select the[...]
-
Page 94
94 Host Label : User- defined name. MAC Address : Enter the MAC address(es) you want to allow or block to access the router and LAN. The format of MAC address could be : xx:xx:xx:xx:xx:xx or xx-xx- xx - xx - xx -xx. For convenience, user can select from the list box. Days of the week : Select the days of a week the rule takes efforts. Start Time: E[...]
-
Page 95
95 Keywords Filtering : Allow blocking against specific keywords within a particular URL rather than having to specify a complete URL (e.g.to block any image called “advertisement.gif”). When enabled, your specified keywords list will be checked to see if any keywords are present in URLs accessed to det ermine if the connection attempt should b[...]
-
Page 96
96 You can add other keywords like this. The keywords you add will be listed as above. If you want to reedit the keyword, press the Edit radio button left beside the item, and the word will listed in the Keyword field, edit, and then press Edit/Delete to confirm. If you want to delete certain keyword, check Delete checkbox right beside the item, an[...]
-
Page 97
97 Parental Control Pro vider Parental Control Provider provides Web content filtering offering safer and more reliable web surfing for users. Please get an account and configure at the selected Provider “www.opendns.com” in advance. To use parental control (DNS), user needs to configure to use parental control (DNS provided by parental control[...]
-
Page 98
98 IP Version : Select either IPv4 or IPv6 base on need. Application : Assign a name that identifies the new QoS application rule. Select from the list box for quick setup. Direction : Shows the direction mode of the QoS application. i LAN to WAN: You want to control the traffic from local network to the outside (Upstream). You can assign the prior[...]
-
Page 99
99 DSCP offers three levels of service, Class Selector (CS), Assured Forwarding (AF) and Expedited Forwarding (EF). AF1, AF2, AF3 and AF4 are four levels of assured forwarding services. Each AF has three different packet loss priorities from high, medium, to low. Also, CS1-CS7 indicates the IP precedence. Rate Type : You can choose Limited or Prior[...]
-
Page 100
100 Examples: Common usage Give outgoing VoIP traffic more priority. The default queue priority is normal, so if you have VoIP users in your local network, you can set a higher priority to the outgoing VoIP traffic. Give regular web http access a limited rate[...]
-
Page 101
101 If you are actively engaged in P2P and are afraid of slowing down internet access for other users within your network, you can then use QoS to set a rule that has low priority. In this way, P2P application will not congest the data transmission with other applications. Other applications, like FTP, Mail access, users can use QoS to control base[...]
-
Page 102
102 Interface : P1-P4. P4 used as EWAN also covered. Type : All LAN when P4 is LAN port; P4 used as EWAN, type WAN and all others LAN. QoS Shaping Rate (Kbps): Set the forcefully maximum rate. Burst Size (Bytes): Set the forcefully Burst Size. NAT NAT (Network Address Translation) feature translates a private IP to a public IP, allowing multiple us[...]
-
Page 103
103 Virtual Servers In TCP/IP and UDP networks a port is a 16-bit number used to identify which application program (usually a server) incoming connections should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (the Internet Assigned Numbers Authority), and these are referred to as “well-known ports”. Servers [...]
-
Page 104
104 Interface: select from the drop-down menu the interface you want the virtual server(s) to apply. Server Name: select the server name from the drop- down menu. Custom Service: It is a kind of service to let users customize the service they want. Enter the user- defined service name here. It is a parameter only available when users select Custom [...]
-
Page 105
105 Press Apply to conform, and the items will be list in the Virtual Servers Setup table.[...]
-
Page 106
106 Remove If you don’t need a specified Server, you can remove it. Check the check box beside the item you want to remove, then press Remove, it will be OK. DMZ Host The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets will be checked by Firewall and NAT alg[...]
-
Page 107
107 One - to - One NAT One - to -One NAT maps a specific private/local address to a global/public IP address. If user has multiple global/public IP addresses from your ISP, you are free to use one- to -one NAT to assign some specific public IP for an internal IP like a public web server mapped with a global/public IP for outside access. Valid : Che[...]
-
Page 108
108 Interface : Select from the drop- down menu t he interface you want the port triggering rules apply to. Application : Preinstalled applications or Custom Application user can customize the utility yourself. Custom Application: It is a kind of service to let users themselves customizes the service they want. Enter the user-defined service name h[...]
-
Page 109
109 Select a Server Name from the drop- down menu, then the port will automatically appear, modify some as you like, or you can just leave it as default. Remember to enter your server IP Address. Press Apply to conform, and the items will be list in the Virtual Servers Setup table. Remove If you d on’t need a specified Server, you can remove it. [...]
-
Page 110
110 ALG The ALG Controls enable or disable protocols over application layer. Wake On L AN Wake on LAN (WOL, sometimes WoL) is an Ethernet computer networking standard that allows a computer to be turned on or woken up remotely by a network message. Host Label: Enter identification for the host. Select: Select MAC address of the computer that you wa[...]
-
Page 111
111 VPN A virtual private network (VPN) is a private network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely co[...]
-
Page 112
112 IPSec Settings L2TP over IPSec : Select Enable if user wants to use L2TP over IPSec. See L2TPover IPSec Connection Name: A given name for the connection, but it should contain no spaces (e.g. “connection- to -office”). WAN Interface : Select the set used interface for the IPSec connection, when you select adsl pppoe_0_0_35/ppp0.1 interface,[...]
-
Page 113
113 entering the pre-shared key into both sides (router or hosts). Local ID Type and Remote ID Type : When the mode of phase 1 is aggressive, Local and Remote peers can be identified by other IDs. ID content : Enter ID content the name you want to identify when the Local and Remote Type are Domain Name : Enter ID content IP address you want to iden[...]
-
Page 114
114 Please be noted, it must be enabled on the both sites. Detection Interval: The period cycle for dead peer detection. The interval can be 180~86400 seconds. Idle Timeout : Auto-disconnect the IPSec connection after trying several consecutive times. Ping: This mode will detect whether the remote IPSec peer has lost or not by pinging specify IP ad[...]
-
Page 115
115 i MD5: A one-way hashing algorithm that produces a 128 − bit hash. i SHA1: A one-way hashing algorithm that produces a 160 − bit hash. DH Group : It is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel (i.e. over the Internet). MODP stands for Modular Exponentiati[...]
-
Page 116
116 5 Proposal Method ESP Security Plan Authentication MD5 Encryption 3DES Prefer Forwar d Security MODP 1024(group2) Pre-shared Key 123456 Branch Office Side: Setup details: the same operation as done in Head Office side Item Function Description 1 Connection Name B- to -H Give a name for IPSec connection 2 Local Network Subnet Select Subnet IP Ad[...]
-
Page 117
117 2. Host to LAN Router servers as VPN server, and host should install the IPSec client to connect to head office through IPSec VPN. Item Function Description 1 Connection Name Headoffice- to -Host Give a name for IPSec connection Local Network Subnet Select Subnet[...]
-
Page 118
118 2 IP Address 192.168.1.0 Head Office network Netmask 255.255.255.0 3 Remote Secure Gateway (Hostanme) 69.121.1.30 IP address of the Branch office router (on WAN side) 4 Remote Network Single Address 69.121.1.30 Host 5 Proposal Method ESP Security Plan Authentication MD5 Encryption 3DES Prefer Forwar d Security MODP 1024(group2) Pre-shared Key 1[...]
-
Page 119
119 PPTP Server In PPTP session, users can set the basaic parameters(authentication, encyption, peer address, etc) for PPTP Server, and accounts in the next page of PPTP Account. They both constitutes the PPTP Server setting. PPTP Funtion : Select Enable to activate PPTP Server. Disable to deactivate PPTP Server function. WAN Interface : Select the[...]
-
Page 120
120 Name : user-defined name for identification. WAN Interface : Select the exact WAN interface configured for the tunnel. Select Default to use the now -working WAN interface for the tunnel. Username : Enter the username provided by your VPN Server. Password : Enter the password provided by your VPN Server. Auth. Type : Default is Auto if you want[...]
-
Page 121
121 Create a PPTP Account “test”. Client Side: In Windows7 click Start > Control Panel> Network and Sharing Center, Click Set up a new connection network.[...]
-
Page 122
122 Click Connect to a workplace, and press Next. Select Use my Internet connection (VPN) and press Next.[...]
-
Page 123
123 Input Internet address and Destination name for this connection and press Next.[...]
-
Page 124
124 Input the account (user name and password) and press Create.[...]
-
Page 125
125 Connect to the server[...]
-
Page 126
126 Successfully connected. PS: You can also go to Network Connections shown below to check the detail of the connection. Right click “test” icon, and select “Properties” to change the security parameters (if the connection fails, users can go here to change the settings)[...]
-
Page 127
127[...]
-
Page 128
128 Example: Configuring a LAN- to -LAN PPTP VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch offices accordingly. Server side: Head Office The above is the common setting for PPTP Server, set as you like for aut[...]
-
Page 129
129 Then the PPTP Account. Client Side: Branch Office The client user can set up a tunnel connecting to the PPTP server, and can also set the tunnel as the default route for all outgoing traffic. Note: users can see the “Default Gateway” item in the bar, and user can check to select the tunnel as the default gateway (default route) for traffic.[...]
-
Page 130
130 L2TP Server In L2TP session, users can set the bassic parameters(authentication, encyption, peer address, etc) for L2TP Server, and accounts in the page of VPN Account. They both constitutes the complete L2TP Server settings. L2TP : Select Enable to activate L2TP Server. Disable to deactivate L2TP Server. WAN Interface: Select the exact WAN int[...]
-
Page 131
131 Name : user- defined name for identification. L2TP over IPSec : If your L2TP server has used L2TP over IPSec feature, please enable this item. Under this circumstance, client and server communicate using L2TP over IPSec. i Enable IPSec Tunnel: Select the appropriate IPSec for L2TP rule configured for the L2TP Client. Username : Enter the userna[...]
-
Page 132
132 i Disable WAN Interface : Select the exact WAN interface configured for the tunnel. Select Default to use the now -working WAN interface for the tunnel. Under this circumstance, client and server communicate through pure L2TP server. Username : Enter the username provided by your L2TP Server. Password : Enter the password provided by your L2TP [...]
-
Page 133
133 Server Side: Configuration > VPN > L2TP and Enable the L2TP function, Click Apply. The IPSec for L2TP rule Create a L2TP Account “test1”.[...]
-
Page 134
134 Client Side: In Windows7 click Start > Control Panel> Network and Sharing Center, Click Set up a new connection network. Click Connect to a workplace, and press Next.[...]
-
Page 135
135 Select Use my Internet connection (VPN) and press Next. Input Internet address and Destination name for this connection and press Next.[...]
-
Page 136
136 Input the account (user name and password) and press Create.[...]
-
Page 137
137 Connection created. Press Close. Go to Network Connections shown below to check the detail of the connection. Right click “L2TP_IPSec” icon, and select “Properties” to change the security parameters.[...]
-
Page 138
138 Chang the type of VPN to “Layer 2 Tunneling Protocol with IPSec 2TP/IPSec)” and Click Advanced Settings to set the pre-shared (set in IPSec) key for authentication. Go to Network connections, enter username and password to connect L2TP_IPSec and check the connection status.[...]
-
Page 139
139 Example: Configuring L2TP LAN- to -LAN VPN Connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Note : Both office LAN networks must be in different subnets with the LAN-LAN application.[...]
-
Page 140
140 Server side: Head Office[...]
-
Page 141
141 The above is the commonly setting for L2TP Server, set as you like for authentication and encryption. The settings in Client side should be in accordance with settings in Server side. Then account the L2TP Account. Client Side: Branch Office The client user can set up a tunnel connecting to the PPTP server, and can also set the tunnel as the de[...]
-
Page 142
142 GRE Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a wide variety of network layer protocol packets inside virtual point - to -point links over an Internet Protocol (IP) network. And the common use can be GRE over IPSec. Note : up to 8 tunnels can be added, but only 4 can be activated. Name : User-defined ident[...]
-
Page 143
143 Advanc ed S etup There are sub-items within the System section: Routing, DNS, Static ARP, UPnP, Certificate, Multicast, Management, and Diagnostics. Routing Defaul t Gate way WAN port : Select the port this gateway applies to. To set Default Gateway and Available Routed WAN Interface. This interfaces are the ones you have set in WAN section, he[...]
-
Page 144
144 Static Route With static route feature, you can control the routing of all the traffic across your network. With each routing rule created, you can specifically assign the destination where the traffic will be routed. Above is the static route listing table, click Add to create static routing. IP Ve rsion : Select the IP version, IPv4 or IPv6. [...]
-
Page 145
145 Click Add to create a policy route. Policy Name : User-defined name. Physical LAN Port: Select the LAN port. Source IP: Enter the Host Source IP. Interface : Select the WAN interface which you want the Source IP to access outside through. Default Gateway : Enter the default gateway which you want the Source IP to access outside through. Click A[...]
-
Page 146
146 Note : RIP can’t be configured on the WAN interface which has NAT enabled (such as PPPoE). Click Apply to apply your settings. DNS DNS, Domain Names system, is a distributed database of TCP/IP application. DNS provides translation of Domain name to IP. DNS IPv4 Three ways to set an IPv4 DNS server i Select DNS server from available WAN interf[...]
-
Page 147
147 Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your ADSL connection, so that anyone wishing to connect to you may use your domain name, rather than having [...]
-
Page 148
148 2. ipoe_ethO with DDNS: www.hometest1.co m using usemame/password test/test. DNS Proxy DNS proxy is used to forward request and response message between DNS Client and DNS Server. Hosts in LAN can use router serving as a DNS proxy to connect to the DNS Server in public to correctly resolve Domain name to access the internet. DNS Proxy: Select w[...]
-
Page 149
149 Host Name: Type the domain name (host name) for the specific IP. IP Address : Type the IP address bound to the set host name above. Click Add to save your settings. Static ARP ARP (Address Resolution Protocol) is a TCP/IP protocol that allows the resolution of network layer addresses into the link layer addresses. And “Static ARP” here allo[...]
-
Page 150
150 Installing UPnP in Windows Example Follow the steps below to install the UPnP in Windows Me. Step 1: Click Start and Control Panel. Double-click Add/Remove Programs. Step 2: Click on the Windows Setup tab and select Communication in the Components selection box. Click Details. Step 3: In the Communications window, select the Universal Plug and [...]
-
Page 151
151 Follow the steps below to install the UPnP in Windows XP. Step 1: Click Start and Control Panel. Step 2: Double-click Network Connections. Step 3: In the Network Connections window, click Advanced in the main menu and select Optional Networking Components … . The Windows Optional Networking Components Wizard window displays. Step 4: Select Ne[...]
-
Page 152
152 Step 5: In the Networking Services window, select the Universal Plug and Play check box. Step 6: Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. Auto-discover Your UPnP-enabled Network Device Step 1: Click start and Control Panel. Double-click Network Connections. An icon displays under Internet Ga[...]
-
Page 153
153 Step 3: In the Internet Connection Properties window, click Settings to see the port mappings that were automatically created. Step 4: You may edit or delete the port mappings or click Add to manually add port mappings.[...]
-
Page 154
154 Step 5: Select Show icon in notification area when connected option and click OK. An icon displays in the system tray Step 6: Double-click on the icon to display your current Internet connection status. Web Configurator Easy Access With UPnP, you can access web-based configuration for the TeleWell TW-EAv510v2 without first finding out the IP ad[...]
-
Page 155
155 Step 4: An icon describing each UPnP-enabled device shows under Local Network. Step 5: Right-click on the icon of your TeleWell TW -EAV510v2 and select Invoke. The web configuration login screen displays. Step 6: Right-click on the icon of your TeleWell TW-EAV510v2 and select Properties. A properties window displays basic information about the [...]
-
Page 156
156 Enter the certificate name and insert the certificate. Click Apply to confirm your settings.[...]
-
Page 157
157 Multica st Multicast is one of the three network transmission modes, Unicast, Multicast, Broadcast. It is a transmission mode that supports point- to -multipoint connections between the sender and the recipient. IGMP protocol is used to establish and maintain the relationship between IP host and the host directly connected multicast router. IGM[...]
-
Page 158
158 Query Response Interval : Enter the response interval time (sec). Last Member Query Interval : Enter the interval time (sec) the multicast router query the specified group after it has received leave message. Robustness Value : Enter the router robustness parameter, 2-7, the greater the robustness value, the more robust the Querier is. Maximum [...]
-
Page 159
159 Trap message, is the message automatically sent by the managed device without request to the ma nager about the emergency events. SNMP Agent: enable or disable SNMP Agent. Read Community : Type the Get Community, which is the authentication for the incoming Get- and GetNext requests from the management station. Set Community : Type the Set Comm[...]
-
Page 160
160 Inform : select enable to let CPE be authorized to send Inform message to automatically connect to ACS. Inform Interval : Specify the inform interval time (sec) which CPE used to periodically send inform message to automatically connect to ACS. When the inform interval time arrives, the CPE will send inform message to automatically connect to A[...]
-
Page 161
161 access to IPs. Enable Service : Select to determine which service(s) is (are) allowed for remote access when remote access is enabled. By default (on condition that remote access is enabled), the web service (HTTP) is allowed for remote access. Click Apply button to submit your settings. "Allowed Access IP Address Range" was used to r[...]
-
Page 162
162 For example, user can add a timeslot named “timeslot1” features a period of 9:00-19:00 every weekday. Auto Reboot Auto reboot offers flexible rebooting service (reboot with the current configuration) of router for users in line with scheduled timetable settings. Enable to set the time schedule for rebooting. For example, the router is sched[...]
-
Page 163
163 Diagnostics Diagnost ics T ools TeleWell TW -EAV510v2 offers diagnostics tools including “Ping” and “Trace route test” tools to check for problems associated with network connections. Ping Test : to verify the connectivity between source and destination. Destination Host: Enter the destination host (IP, domain name) to be checked for co[...]
-
Page 164
164 Example: “trace” www.google.com Push Servi ce With push service, the system can send email messages with consumption data and system information. Recipient’s E- mail : Enter the destination mail address. The email is used to receive system log , system configuration , security log sent by the device when the Push Now button is pressed[...]
-
Page 165
165 Diagnost ics Check the connections, including Ethernet connection, Internet Connection and wireless connection. Click Help link that can lead you to the interpretation of the results and the possible, simply troubleshooting. Fault Management IEEE 802.1ag Connectivity Fault Management (CFM) is a standard defined by IEEE. It defines protocols and[...]
-
Page 166
166 Maintenance Domain (MD) Level : Maintenance Domains (MDs) are management spaces on a network, typically owned and operated by a single entity. MDs are configured with Names and Levels, where the eight levels range from 0 to 7. A hierarchal relationship exists between domains based on levels. The larger the domain, the higher the level value. Ma[...]
-
Page 167
167 Chapter 4 : Trou bleshoo ting If your router is not functioning properly, please refer to the suggested solutions provided in this chapter. If your problems persist or the suggested solutions do not meet your needs, please kindly contact your service provider or TeleWell for support. Problems with the router Problem Suggested Action None of the[...]
-
Page 168
168 Problem with LAN interface Problem Suggested Action Cannot PING any PC on LAN Check the Ethernet LEDs on the front panel. The LED should be on for the port that has a PC connected. If it does not lit, check to see if the cable between your router and the PC is properly connected. Make sure you have first uninstalled your firewall program before[...]
-
Page 169
169[...]