Vai alla pagina of
Manuali d’uso simili
-
Network Router
LevelOne FBR-1416
75 pagine 1.27 mb -
Network Router
LevelOne WBR-3407 11g
99 pagine 2.31 mb -
Network Router
LevelOne NetCon FBR-1409TX
88 pagine 3.31 mb -
Network Router
LevelOne WBR-3404TX
89 pagine 1.9 mb -
Network Router
LevelOne FBR-1415TX
83 pagine 1.83 mb -
Network Router
LevelOne FBR-1700TX
86 pagine 1.77 mb -
Network Router
LevelOne WBR-5400
82 pagine 4.91 mb -
Network Router
LevelOne WBR-3403TX
89 pagine 1.92 mb
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso LevelOne WBR-5400. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica LevelOne WBR-5400 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso LevelOne WBR-5400 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso LevelOne WBR-5400 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo LevelOne WBR-5400
- nome del fabbricante e anno di fabbricazione LevelOne WBR-5400
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature LevelOne WBR-5400
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio LevelOne WBR-5400 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti LevelOne WBR-5400 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio LevelOne in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche LevelOne WBR-5400, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo LevelOne WBR-5400, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso LevelOne WBR-5400. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
1 LevelOne WBR -5400 MIMO Wireless 1W ,4L Broadband R outer U s e r ` s M a n u a l V er 1.00-0512[...]
-
Pagina 2
2 Copyright The contents of th is publication may not be reproduced in any par t or as a whole, stored, transcribed in an information retrieval system, translated into an y language, or transmitted in any form or by an y means, mechanical, magnetic, electr onic, optical, phot ocopying, ma nual, or otherwise, wit hout the prior written permission. T[...]
-
Pagina 3
3 T able of Contents CHAPTER 1 INTRODUCTION ............................................................................ 5 F UNCTIONS AND F EA TURES ........................................................................................ 5 P ACKING L IST ...............................................................................................[...]
-
Pagina 4
4 APPENDIX B 802.1X SETTING ......................................................................... 76 APPENDIX C RESET T O F A CTOR Y DEF AUL T ............................................. 82 R ESET T O F ACTOR Y D EF AUL T ................................................................................... 82[...]
-
Pagina 5
5 C C C h h h a a a p p p t t t e e e r r r 1 1 1 I I I n n n t t t r r r o o o d d d u u u c c c t t t i i i o o o n n n Congratulat ions on your purchase of this out standing LevelO ne WBR-5400, 1 1g MIMO W ireless Broadband R outer . This product is specifically designed for Sm all Office and Home Of fice needs. It provides a complete SOHO solut[...]
-
Pagina 6
6 Wir eless functions High speed for wireless LAN connection Up to 54Mbps data rate by incorporatin g Orthogonal Frequency Division Multiplexin g (OFDM). Roaming Provides seamless roam ing within the IE EE 802.1 1b (1 1M) and IEEE 802.1 1g (54M) WLAN infrastructure. IEEE 802.1 1b co mpatible (1 1 M) Allowing inter-operation among multip[...]
-
Pagina 7
7 When SPI Mode is enabled, the rou ter will check every incoming packet to detect if this packet is valid. DoS Attack Detection Supported When this feature is enabled , the router will detect and log the Do S attack comes from the Internet. Advanced functions System time Supported Allow you to synchronize syste m time with network time ser[...]
-
Pagina 8
8 C C C h h h a a a p p p t t t e e e r r r 2 2 2 H H H a a a r r r d d d w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n 2.1 Panel Layout 2.1.1. Fr ont Panel Figure 2-1 Front Panel LED: LED Function Color S tatus Description POWER Power indication Green On Power is being applied to this product. ST A[...]
-
Pagina 9
9 2.1.2. Rear Panel Ports: Port Description PWR(DC) Power i nlet W AN the port where you will co nnect your cable (or DSL) modem or Ethernet router . Port 1-4 the ports where you will connect network ed computers and other devices.[...]
-
Pagina 10
10 2.2 Procedur e for Hardwar e Installation 2. Decide where to place your Wir eless Broadband Router Y ou can place your W BR-5400, W ireless Broadband Rout er , on a desk or other flat surface, or you can mount it on a wall. For optim al performance, place your W ire less Broadband R outer in the center of your office (or y our home) in a locati [...]
-
Pagina 11
11 C C C h h h a a a p p p t t t e e e r r r 3 3 3 N N N e e e t t t w w w o o o r r r k k k S S S e e e t t t t t t i i i n n n g g g s s s a a a n n n d d d S S S o o o f f f t t t w w w a a a r r r e e e I I I n n n s s s t t t a a a l l l l l l a a a t t t i i i o o o n n n T o use WBR-5 400 correctly , you have to properly configur e the netwo[...]
-
Pagina 12
12 C C C h h h a a a p p p t t t e e e r r r 4 4 4 C C C o o o n n n f f f i i i g g g u u u r r r i i i n n n g g g W W W i i i r r r e e e l l l e e e s s s s s s B B B r r r o o o a a a d d d b b b a a a n n n d d d R R R o o o u u u t t t e e e r r r This product prov ides W eb based configuratio n scheme, that is, configuring b y your W eb bro[...]
-
Pagina 13
13 4.1 S tart-up and Log in Activate your brow ser , and disable the proxy or ad d the IP addr ess of this produc t into the exceptions . Then, type this pr oduct’ s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.123.254 . After the connection is established, you will see the we b [...]
-
Pagina 14
14 4.2 S tatus This option p rovides the functi on for observing this pr oduct’ s working stat us: A. W AN Port S tatus. If the W AN port is assigned a dynam ic IP , there may appear a “ Renew ” or “ Release ” button on the Sidenote column. Y ou can click this button to renew or release IP man ually . B. Statistics of W AN: en ables you t[...]
-
Pagina 15
15 4.3 Wiz ard Setup W izard will guide you through a basic configuration pro cedure step by step.Press ”Next >” Setup W izard will automatically det ect your W AN type. If W AN type can not be detected successfully , “Dynamic IP Address” will be assigned.[...]
-
Pagina 16
16 Setup Wi zard - Select W AN T ype : For detail settings, please refer to 4.4. 1 primary setup. For the rest of the steps, Setup W izard will guide you through a basic configuration. .Press ”Next >”[...]
-
Pagina 17
17 4.4 Basic Setting[...]
-
Pagina 18
18 4.4.1 Primary Setup – W AN T ype, V irtual Computers Press “Change”[...]
-
Pagina 19
19 This option is primary to enable this product to work properly . The settin g items and the web appearance de pend on the W AN type. Choose correct W AN type before you sta rt. 1. LAN IP Addr ess : the local IP address of this device. The computers o n your network m ust use the LAN IP address of your product as their Defa ult Gateway . Y o u ca[...]
-
Pagina 20
20 4.4.1.5 PPTP 1. My IP Address and My Subnet Mask: the pr ivate IP address and subn et mask your ISP assigned to you. 2. Server IP Address: the IP address of the PPTP server . 3. PPTP Account and Passwo rd: the account an d password your ISP assigned to you. If you don'twant to change the password, keep it empty . 3. Con nection ID: optional[...]
-
Pagina 21
21 4.4.1.6 L 2TP 1. IP Mode: The IP Mode assign ed by your ISP. Y ou can select eit her Static IP Address or Dynamic IP address. 2. My IP Addr ess and My Subnet Mask: the priv ate IP address and sub net mask your ISP assigned to you when your IP Mode is Static IP Address. 3. Server IP Address: the IP a ddress of the L2TP server . 4. L2TP Accoun t a[...]
-
Pagina 22
22 4.4.1.7 V irtual Computers V irtual Computer enab les you to use the original NA T feature, and allows you to setup the one-to-one mapping of multiple global IP address and local IP address. • Global IP: Enter the global IP address assigned by y our ISP . • Local IP: Enter th e local IP addr ess of your LAN PC co rresponding to th e global I[...]
-
Pagina 23
23 4.4.2 DHCP Server Press “Mor e>>”[...]
-
Pagina 24
24 The settings of a TCP/IP en vironment include host IP , Subnet Mask, Gateway , and DNS configuration s. It is not easy to manually conf igure all the computers and devices in your network. Fortunately , DHCP Server provid es a rather sim ple approach to ha ndle all these settings. This product su pports the function of DHCP server . If you ena b[...]
-
Pagina 25
25 W ireless settings allow you to set the wireless configuration items. 1. Wir eless function : Enab le or disable wireless fun ction. 2. Network ID (SSID) : Network ID is used for identifyi ng the Wireless LAN (WLAN). Client stations can roam freely over this product and ot her Access Points that have the same Network ID. (The factory se tting is[...]
-
Pagina 26
26 802.1X Se tting 802.1 X Check Box wa s used to switch t he function of t he 802.1X. When the 802. 1X function is enabl ed, the W ireless user must authenticate to t his router first to use the Network service. RADIUS Server IP IP address or t he 802.1X server’ s domai n-name. RADIUS port The port setting of 802.1X server RADIUS Shared Key Key [...]
-
Pagina 27
27 WP A-PSK 1.Encryption. There are two encr yption methods, TK IP and AES. 1. Select Preshare Key Mode 2. Fill in the key, Ex 12345678 Pre-share Key Mode: Either ASCII or HEX can be selected. Pre-share Key: Please input either 32 ASCII characte rs or 64 Hexadecimal digit s as Pre-share key .[...]
-
Pagina 28
28 WP A Check Box was used to switch the fun ction of the WP A. When the WP A function is enabled, the W ireless user must authenticate to t his router first to use th e Network service. RADIUS Server IP address or t he 802.1X server’ s domai n-name. RADIUS Shared Key Key value shared by the RADIUS serve r and this ro uter . This key value is con[...]
-
Pagina 29
29 WP A2-PSK(AES) : Accept WP A2 clients only a nd Pre-share key (encryption key) must be entere d manually . Y ou can input either 32 ASCII ch aracter s or 64 Hexadeci mal digits as Pre -share key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII charact ers or 64 Hexa decimal digits a[...]
-
Pagina 30
30 WP A2(AES) : Accept WP A2 clients only and work simultaneously with RADIUS Server . The encryption key is got from RA DIUS Server dynamically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS server and this router . This k[...]
-
Pagina 31
31 WP A-PSK / WP A2-PSK : Accept WP A1 or WP A2 clients to co nnect simultaneously and Pre-share key (encrypt ion key) must be entered manua lly . Y ou can input either 32 ASCII characters o r 64 Hexadecimal digits as Pre-s hare key . • Pre-shar e Key Mode: Either ASCII or HEX can be selected. • Pre-shar e Key: Please input either 32 ASCII char[...]
-
Pagina 32
32 WP A1/WP A2 : Accept WP A1 or WP A2 clients to connect simultaneously and work simultaneously with RADIUS Server . The encryption key is got from RADIUS Server dy namically . • RADIUS Server IP: The 802.1X server's IP address. • RADIUS port : The 802.1X serve r's service port. • RADIUS Shar ed Key: Key value shared by the RADIUS [...]
-
Pagina 33
33 4.4.4 Chan ge Password Y ou can change Password here. W e strong ly recommend y ou to change th e system password for security reason.[...]
-
Pagina 34
34 4.5 Forwarding Rules[...]
-
Pagina 35
35 4.5.1 V irtual Server This product’ s NA T firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisi ble to the outside wo rld. If you wish, you can make som e of them accessible by enabling the V irtual Server Mapping. A virtual server is defined as a Public Port , and all requests to this[...]
-
Pagina 36
36 The Private port is used for multi-comput ers, which might use the same service. For example, if you setup thr ee W eb server(80) in your LAN, which are 192.168.1 23.7, 192.168.1 23.10, and 19 2.168.123.77. Y ou can assign di fferent p ublic port t o diffe rent IP . The public port can be set at any port. But please must avoid the confliction. A[...]
-
Pagina 37
37 4.5.2 Special AP Some applicat ions require m ultiple connections, l ike Internet games, V ideo conferenci ng, Internet telephony , etc. Because of the firewall function, thes e a pplications cannot work with a pure NA T router . The Special Appl ications feature allows som e of these applicatio ns to work with this produc t. If the mechanism of[...]
-
Pagina 38
38 4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the pr otection of firewall. It a llows a computer to be exposed to unre stricted 2-way communi cation for Internet gam es, V ideo conferenci ng, Internet telephony a nd other special applications. NOTE: This fe ature should be used only whe n needed[...]
-
Pagina 39
39 4.6 Security Settings[...]
-
Pagina 40
40 4.6.1 Packet Filter Packet Filter enables you to con trol what packets are allowed to pass the router . Outbound filter applies on all outbound packets. However, Inbound filter applies on p ackets that destined to V irtual Servers or DMZ host only . Y ou can select o ne of the two filtering policies: 1. Allow all to pass excep t those match the [...]
-
Pagina 41
41 addresses (4.3.2 .1-4.3.2.25 4). An empty implies all I P addresses. For source or destination port, you can define a single por t (80) or a range of ports (1000 -1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For exampl e, T80, U53, U2000-2999. N o prefix indicates bot h TCP and UDP are defined. An empty impli [...]
-
Pagina 42
42 Example 2: (1.2.3.100- 1.2.3.1 19) They can do everything except read net news (p ort 1 19) and tra nsfer files via FTP (port 21) Others are all allowed. After Inbound Pa cket Filter setting is co nfigured, click the save button.[...]
-
Pagina 43
43 Outbound Filter: To enab le Outbound Packet Filter click the check box nex t to Enable in the Outbound Packet Filter field. Example 1: (192.168.123.100-1 92.168.123.149) They are allowed to se nd mail (port 25), recei ve mail (port 1 10), and browse Internet ( port 80); port 53 (DNS) is necessa ry to resolve the domain name. (192.168.12 3.10-192[...]
-
Pagina 44
44 Example 2: (192.168.1 23.100-192.168 .123.1 19) They can do everything e xcept read net new s (port 1 19) and transfer files via FTP (port 21) Others are allowed After Outbound Packet Filter setting is configured, click the save button.[...]
-
Pagina 45
45 4.6.2 Domain Filter Domain Filter let you pre vent users under t his device from accessing specific URLs. Domain Filter Enable Check if you want to enab le Domain Filter . Log DNS Query Check if you want to log the action wh en someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these ho sts to[...]
-
Pagina 46
46 Example: In this example: 1. URL include “www .msn.com” will be blocked, and the action will b e record in log-file. 2. URL include “www .sina.com” will not be bloc ke d, but the action will be record in log-file. 3. URL include “www .google.co m” will be blocked, but the action will no t be record in log-file. 4. IP address X.X.X.1~[...]
-
Pagina 47
47 4.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined W ebsites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suf fix (like .com or .org , etc), while URL Blocking re quire user to input a keyword only . In other words, Domain filter can block specific[...]
-
Pagina 48
48 In this example: 1.URL include “msn” will be blocked, and the actio n will be record in log-file. 2.URL include “sina” will be blocked, an d the action will be record in log-file 3.URL include “cnnsi” will be blocked, and the action will be record in log-file. 4. URL include “espn” will be blocked, and the action will be record i[...]
-
Pagina 49
49 4.6.4 MAC Address Contr ol MAC Address C ontrol allows you t o assign diffe rent access right for diffe rent users and to assi gn a specific IP address to a certain MAC address. MAC Address Cont rol Check “Enable” to ena ble the “M AC Address Control”. All of the settings in this page will take effect only when “Enable” is checked. C[...]
-
Pagina 50
50 Control table "Control table" is the tab le at the bottom of the "MAC Address Control" page. Each r ow of this table indicat es the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a specific client. IP Address Expected IP address of the corre[...]
-
Pagina 51
51 4.6.5 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform admin istration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can per form remote admi nistration. If the s pecified IP ad[...]
-
Pagina 52
52 packet to detect if this packet is valid. DoS Attack Detection When this feature is enabled, the router will detect and log the DoS attack comes from the Internet. Currently , the router can detect th e following DoS attack: SYN Attack, W inNuke, Port Scan, Ping of Death, Land Attack etc. VPN PPTP/IPSec Pass-Thr ough Please enable this feature, [...]
-
Pagina 53
53 4.7 Advanced Settings 4.7.1 System T ime[...]
-
Pagina 54
54 Get Date and Time by NTP Protocol Selected if you want to Get Date and T ime by NTP Pro tocol. Time Server Select a NTP time server to consult UTC time Time Z one Select a time zone where this device locates. Get Date and Time using PC`s Date and T ime Selected if you want to synchronize the router time setting with your connected PC. Set Date a[...]
-
Pagina 55
55 4.7.2 System Log This page s upport two m ethods to export sy stem logs to s pecific destinatio n by means of sy slog(UDP) and SMTP(TC P). The it ems you have t o setup including: IP Address for Syslog Server Host IP of destination wh ere syslogs will b e sent to. Check Enable to enable this function . E-mail Alert Enable Check if you want to en[...]
-
Pagina 56
56 4.7.3 Dynamic DNS To host your s erver on a changi ng IP address, you have to use dynam ic domain nam e service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your curr ent IP address, which changes eac h time you conn ect your Intern et service provid er. Before[...]
-
Pagina 57
57 Example: After Dynamic DNS setting is configured, click the save button. The new settings will be ef fective after reboot.[...]
-
Pagina 58
58 4.7.4 SNMP Setting In brief, S NMP, the Simpl e Network Mana gement Protoc ol, is a protocol designed to give a user the capability to remotely manage a co mputer network by polling and setting terminal values and monitori ng network events . Enable SNMP Y ou must check either Local or Remote or both to enable SNMP function. If Local is check ed[...]
-
Pagina 59
59 Example: 1. This device will response to SNMP client which’ s get co mmunity is set as “public” 2. This device will response to SNMP client which’ s set community is set as “priv ate”[...]
-
Pagina 60
60 4.7.5 Routing T able Routing T ables allow you to determine which physical int e rface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to fin d proper routing path and allow di fferent su bnets to comm unicate with each othe r . Routing T able sett i[...]
-
Pagina 61
61 Example: Configurati on on NA T Router Destination SubnetMask Gateway Hop Enabled 192.168.1.0 255.255 .255.0 192.1 68.123.216 1 ˇ 192.168.0.0 255.255 .255.0 192.1 68.123.103 1 ˇ So if, for example, the clien t3 wanted to send an IP data gram to 192.168.0.2, it would use the above table to determin e that it had to go via 19 2.168.123.103 (a ga[...]
-
Pagina 62
62 4.7.6 Schedule Rule Y ou can set the schedule time to decid e which service will be tu rned on or off. Select the “enable” item. Press “Add New Rule”[...]
-
Pagina 63
63 Y ou can write a rule name and set which day and what time to schedule from “S tart T ime” to “End T ime”. The following example confi gure “ftp time” as everyday 14:10 to 16:20[...]
-
Pagina 64
64 After c onfigure Rule 1 Schedule Enable Selected if you want to Enable the Scheduler . Edit T o edit the schedule rule. Delete T o delete the schedule rule, an d the rule# of th e rules behind the d eleted one will decrease one automatically . Schedule Rule can be apply to V irtual serv er and Packet Filter , for example:[...]
-
Pagina 65
65 Exanple1: Vi rtual Server – Apply Rule#1 (f tp time: everyday 14:10 to 16:20) Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 1 4:10 to 16:20).[...]
-
Pagina 66
66 4.8 T oolbox[...]
-
Pagina 67
67 4.8.1 Sys tem Log Y ou can V iew system log by clicking the Vi e w L o g button[...]
-
Pagina 68
68 4.8.2 Firmwar e Upgrade Y ou can upgrade fi rmware by clicki ng Firmware Upgrade butto n.[...]
-
Pagina 69
69 4.8.3 Backup Setting Y ou can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Up grade button and use the bin f ile you saved. 4.8.4 Reset to default Y ou can also reset this product to factor y default by clicking the Reset to default button. 4.[...]
-
Pagina 70
70 4.8.6 Miscella neous Items MAC Address for W ake-on-LAN W ake-on -LAN is a technology that enables you to power up a networked device remotely . In orde r to enjoy this feat ure, the tar get device must be W ake-on-LA N enabled and you have to know the MAC address of this device, say 00-11- 22-33-44-55. Clicking "W ake up" button will [...]
-
Pagina 71
71 A A A p p p p p p e e e n n n d d d i i i x x x A A A T T T C C C P P P / / / I I I P P P C C C o o o n n n f f f i i i g g g u u u r r r a a a t t t i i i o o o n n n f f f o o o r r r W W W i i i n n n d d d o o o w w w s s s 9 9 9 5 5 5 / / / 9 9 9 8 8 8 This section in troduces you how t o install TCP/IP protocol i nto your personal computer[...]
-
Pagina 72
72 6. The TCP/IP protocol shall be listed in the Network window . Click OK to co mplete the install procedure and restart your PC to e nable the TCP/IP protocol. A.2 Set TCP/IP Protocol f or W orking with NA T Router 1. Clic k St a r t button and choose Settings , then click Control Panel . 2. Double click Network icon. Select the TCP/IP line that [...]
-
Pagina 73
73 a. Select Obtain an IP addr ess automatically in the IP Address tab. b. Don’t input any val ue in the Gateway tab .[...]
-
Pagina 74
74 c. Choose Disable DNS in the DNS Configuration tab. B. Configure I P m anually a. Select Specify an IP addres s in th e IP Add ress tab. The defau lt IP address of this product is 192.1 68.123.254. So please use 192.168.12 3.xxx (xxx is between 1 and 253) for IP Address field and 255.2 55.255.0 for Subnet Mas k field.[...]
-
Pagina 75
75 b. In the Gat eway tab, ad d the IP address of this product (de fault IP is 192.168.123.2 54) in the New gateway field and click Add butt on. c. In the DNS Co nfiguration tab, add t he DNS values which a re provided by t he ISP into DNS Server Se arch Order field and click Add button.[...]
-
Pagina 76
76 A A A p p p p p p e e e n n n d d d i i i x x x B B B 8 8 8 0 0 0 2 2 2 . . . 1 1 1 x x x S S S e e e t t t t t t i i i n n n g g g Figure 1: T esting Environm ent (Use W indows 200 0 Radius Serve r) 1 Equipment Details PC1 OS: Microsoft Win dows XP Professional without Service Pack 1. PC2 OS: Microsoft W indows XP Professional with Service Pack[...]
-
Pagina 77
77 5.Set RADIU S serv er shar ed key . 6.Configure WEP key and 802.1X settin g. The following test will use th e inbuilt 802.1X authentication method such as ,E AP_TLS, PEAP_CHAPv 2(W indows XP with SP1 o nly), and PEAP_TL S(W indows XP with SP1 only) using the Sm art Card or other Certifi cate of the W indows XP Pr ofessional. 3. DUT and Windows 2[...]
-
Pagina 78
78 Figure 2: Enable IEEE 802.1X access control[...]
-
Pagina 79
79 Figure 3: Sm art card or cer tificate properties 4. W indows 2000 RADIUS server Authenticati on testing: 4.1DUT aut henticate PC1 using certificate. (P C2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3. Set authentication type of wireless client and [...]
-
Pagina 80
80 Figure 4: Certificate in formation on PC1 Figure 5: Authenticating[...]
-
Pagina 81
81 Figure 6: Authentication success 4.2 DUT authenticate PC2 using PEAP-TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 3. Disable the wireless connection and e nable again. 4.The DUT will send the us er's certificate to the RADIUS server , and then send [...]
-
Pagina 82
82 A A A p p p p p p e e e n n n d d d i i i x x x C C C R R R e e e s s s e e e t t t t t t o o o f f f a a a c c c t t t o o o r r r y y y d d d e e e f f f a a a u u u l l l t t t Reset to factory Default There are 2 methods to reset to default. 1. Restore with RESET button First, turn off th e router and press the RESET button in . And then, po[...]