Go to page of
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of AlphaShield 8350, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of AlphaShield 8350 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of AlphaShield 8350. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of AlphaShield 8350 should contain:
- informations concerning technical data of AlphaShield 8350
- name of the manufacturer and a year of construction of the AlphaShield 8350 item
- rules of operation, control and maintenance of the AlphaShield 8350 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of AlphaShield 8350 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of AlphaShield 8350, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the AlphaShield service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of AlphaShield 8350.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the AlphaShield 8350 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
U ser Ma nu a l[...]
-
Page 2
Version 1.0 T able of Contents 1. INTRODUCTION 5 2. CONTENTS 6 3. SYSTEM REQUIREMENTS 7 4. FEATURES 8 5. HARDWARE GUIDELINES 10 5.1 Connections 10 5.2 LEDs 11 6. LOGIN 12 7. SETUP 13 7.1 Quick Start 13 7.2 WAN 19 7.3 LAN 24 7.4 DHCP 25 8. ADVANCED 27 8.1 Virtual Server 27 8.2 Special Applications 28 8.3 Gaming 30 ® 8.4 StreamEngine Networking Opti[...]
-
Page 3
T able of Contents 8.12 Schedules 40 9. TOOLS 41 9.1 Admin 41 9.2 Time 43 9.3 Print Server Setup 44 9.4 Syslog 44 9.5 E-mail 45 9.6 System 46 9.7 Firmware 47 9.8 Dynamic DNS 48 10. STA TUS 49 10.1 Device Info 49 10.2 Routing 50 10.3 Print Serve Status 51 10.4 Logs 51 10.5 Statistics 52 10.6 LAN Port Status 53 10.7 Active Sessions 53 10.8 Switch For[...]
-
Page 4
T able of Contents 13.5 Copyright 66 13.6 Trademark 66 13.7 Patents 66 13.8 Restrictions 66 13.9 Liability Limitations 66 13.10 Customer Remedies 67 13.11 Notice of Change of Terms and Conditions 67 13.12 Replacement Components and Specifications 67 14. IMPORTANT NOTICES 68 14.1 FCC Statement 68 14.2 FCC Caution 68 14.3 FCC Radiation Exposure State[...]
-
Page 5
1. INTRODUCTION: Congratulations on your purchase of the Alpha Secure Wireless Router 8350, and thank you for choosing AlphaShield for your networking and security needs. Y our new router allows you to share files and printers on your network, and surf the Internet with ® the performance benefits of network optimization using StreamEngine T echnol[...]
-
Page 6
2. CONTENTS: 1. Alpha Secure Wireless Router 8350 2. Cat5 Ethernet Cable 3. Power Adapter (6.8V , 2.5A) 4. Quick Installation Guide 5. CD-ROM with Manual 6. Vertical S tands Note : Please contact your reseller if any of the above items are missing. Important: Using a power supply other than that included with your router will result in the warranty[...]
-
Page 7
3. SYSTEM REQUIREMENTS: 1. External xDSL or Cable Modem with Ethernet Ports. 2. PC or MAC with following minimum requirements: ? 1.25 Ghz processor ? 256MB Memory ? CD-ROM Drive ? Ethernet Adapter 10/100/1000 with TCP/IP Protocol Inst alled ® ? Windows XP/2000/Vista/ME or Mac® OS X v10.3/v10.2/v10.1or Linux ? Internet Explorer v6, Netscape® Navi[...]
-
Page 8
4.FEA TURES: Hardware Interface Features: Router/Switch Hardware: ? Dedicated 250 MIPS High Speed core Network Processor ? Dedicated High Speed Multi-port Gigabit Switch & Co-Processor ? 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports with MDI /MDI-X ? 1 x 10/100 Auto-Sensing Fast Ethernet W AN Port with MDI/MDI-X ? 4 Universal Serial B[...]
-
Page 9
? User Selectable Logging support ? LAN and WAN T raffic Statistics Additional Features: ? Network Time Protocol ? WAN Mode: St atic, DHCP , PPPoE, PPTP , L2TP and Bigpond ? Other Protocols Support: RIP , IGMP , and DNS Relay ? Application Level Gateway Configuration for: MSN, FTP , NetMeeting, IPSec VPN, MMS, SIP , Wake On LAN, PPTP ? Pre-selectab[...]
-
Page 10
5. 5.1 Connections: 1. All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN. 3. The Auto MDI/MDIX WAN port is the connection for the Ethernet c[...]
-
Page 11
5.2 LEDs: 5 LOCAL NETWORK LEDs: The connection to an Ethernet-enabled computer on ports 1-5 is indicated by a solid light. When data is being transmitted, this LED will flash. 1 POWER LED: A solid light indicates a proper connection to the power supply . 1 WAN LED: A solid light indicates connection on the W AN port. When data is being transmitted,[...]
-
Page 12
6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter . The Login screen will appear. ? Select a User Name . ? By default, there is no password. Simply leave this window blank ? Click Log In to proceed. Version 1.0 Page 12 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Page 13
7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: ? Internet Connection Setup Version 1.0 Page 13 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Page 14
a) Launch Internet Connection Setup Wizard: The following Web-based Setup Wizard will help you connect your new Alpha Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running. Before launching the Wizard, please make sure you have correctly followed all of the steps outlined in[...]
-
Page 15
Step 2: Select Y our Time Zone Select your local time zone from the pull-down menu. ? T o continue click Next Step 3: Configure Y our Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP). If your ISP is not listed in the menu, or you do not know who your ISP is, simply select Not Listed or Don't Know from the[...]
-
Page 16
Step 3: Configure Y our Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem. If the computer you are using was the initial system connected to your broadband modem, simply s[...]
-
Page 17
Step 3: Configure Y our Internet Connection At the Set Username and Password Connection (PPTP) Enter: ? PPTP IP Address ? PPTP Subnet Mask ? PPTP Gateway IP Address ? PPTP Server IP Address ? Your Username ? Your Password . ? T o verify your Password , Re-enter it below ? T o continue click Next At the Set Username and Password Connection (L2TP) sc[...]
-
Page 18
At the Set Static IP Address Connection Enter: ? IP address ? Subnet Mask ? Gateway Address ? Primary and Secondary DNS Address es ? T o continue click Next Setup Complete ? Click Connect . This will save your settings and reboot the router Version 1.0 Page 18 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Page 19
7.2 WAN: The WAN section will help you choose one of 6 connection types: St atic IP , DHCP , PPPoE, PPTP , L2TP , and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP). a) Mod[...]
-
Page 20
DHCP WAN Mode: ? Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below. ? Enter a Service Name (If your ISP requires it). Reconnect Mode ? Always on : The Internet connection is always maintained. ? O[...]
-
Page 21
PPTP WAN Mode: ? Enter the PPTP IP Address provided by your ISP . ? Enter the PPTP Subnet Mask provided by your ISP . ? Enter the PPTP Gateway IP Address provided by your ISP . ? Enter the PPTP Server IP Address you are connecting to, also provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify [...]
-
Page 22
L2TP WAN Mode: Enter: ? The L2TP IP Address provided by your ISP . ? The L2TP Subnet Mask provided by your ISP . ? The L2TP Gateway IP Address provided by your ISP . ? The L2TP Server IP Address provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below . ? Select [...]
-
Page 23
DNS And Advanced Settings: These Options may be used on all WAN Modes: ? If you have the DNS servers provided to you by the ISP , please select the Use these DNS Servers. ? Please enter the Primary DNS Server provided by your ISP . ? Please enter the Secondary DNS Server provided by your IS.P ? Use the Default MTU is enabled by default. ? MTU (Maxi[...]
-
Page 24
7.3 LAN Settings: ? IP Address: Enter of the router on the local area network. The local network settings are based on the address assigned here. ? Subnet Mask: Use the of your router on the local area network. ? RIP Announcement is u sed with multiple routers to broadcast routing information. ? Gateway Metric is only used if you have multiple rout[...]
-
Page 25
7.4 DHCP: Use this section to configure the built-in DHCP Server to assign IP addresses to the computers on your network. DHCP Settings: T o connect to the LAN and Internet the DHCP Server function will assign your network devices the necessary information and you do not have to manually configure each device on your network with IP settings. The d[...]
-
Page 26
Number of Dynamic DHCP Clients: ? This is used to automatically assign IP addresses from a predetermined pool of addresses to computers or devices that requests them shows the number of clients that are receiving an IP address from the router and LAN devices those are leasing IP addresses. ? The Computer Name, MAC Address , and IP Address assigned [...]
-
Page 27
8. ADV ANCED: Advanced Options allows you to configure a number of advanced features including ports, application priority , Internet access, filters, and advanced wireless settings. 8.1 Virtual Server: The Virtual Server option allows you to define a single public port on your router for redirection to an internal LAN IP Address and Private LAN po[...]
-
Page 28
8.2 Special Applications: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a 'trigger' port or port range. Special ApplicationsRrules apply to all computers on your internal network. Application Level Gateway (ALG) Configurations: Application Level [...]
-
Page 29
Add/Edit Special Applications Rule: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. Special Applications Rules apply to all computers on your internal network. ? Rule Name: Enter to identify the Special Application R[...]
-
Page 30
8.3 Gaming: The Gaming option is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. This feature allows you to enter ports in various formats including, Port Ranges (100-50), Individual Ports (80, 68, 888), or Mixed (1020-5000, 689). Add/Edit Game Rule: ? Rule Name: C[...]
-
Page 31
® 8.4 StreamEngine Network Optimization: ® This next section will help you configure the StreamEngine Network Optimization. ® StreamEngine T echnology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web. For best performance, use the Automatic Classification opti[...]
-
Page 32
8.5 Routing: Add/Edit Route: The Routing option allows you to define fixed routes to defined destinations: ? Destination IP: Enter the Destination IP Address that the p ackets will be attempting to access. ? Netmask : Specify which portion of the Destination IP signifies the network trying to be accessed, and which part signifies the packets to whi[...]
-
Page 33
8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games. Enabled: By default, the Access Control feature is disabled. When Access C[...]
-
Page 34
Step 1: Choose Policy Name: ? Policy Name. Typically , this would be a system name or user name such as "John's Computer." ? Click Next to continue. Step 2: Select Schedule: ? Select the Schedule of times when you want the policy to apply. If you do not see the schedule you need in the list of schedules, Go to the T ools > Schedul[...]
-
Page 35
Step 4: Select Filtering Method: ? Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. ? Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged. ? Filter Ports: When this option is enabled , you ca[...]
-
Page 36
8.7 Web Filter: The Web Filter options allows you to set-up a list of allowed Web sites that can be used by multiple users. When Web Filter is enabled, all other Web sites not listed on this page will be blocked. T o use this feature, you must also select the "Apply Web Filter" checkbox in the Access Control section. The Web Filter sectio[...]
-
Page 37
8.8 MAC Address Filters: The MAC (Media Access Controller) Address filter option is used to control network access based on the MAC Address of the network adapter . A MAC address is a unique ID assigned by the manufacturer of the network adapter. This feature can be configured to ALLOW or DENY network/Internet access. Filter Settings: When the MAC [...]
-
Page 38
8.9 Firewall: The DMZ (Demilitarized Zone) option provides you with an option to set a single computer on your network outside of the router. If you have a computer that cannot run Internet applications successfully from behind the router, then you can place the computer into the DMZ for unrestricted Internet access. Note: Putting a computer in the[...]
-
Page 39
8.11 Inbound Filters: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters may be used for limiting access to a server on your network to a system or group of systems. Filter rul[...]
-
Page 40
8.12 Schedules: The Schedule configuration option is used to manage schedule rules for various firewall and parental control features. Add/Edit Schedule Rule: ? Enter the Schedule Name. ? T o select the Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week. ? Select All D[...]
-
Page 41
9 TOOLS: 9.1 Admin: The Admin option is used to set a password for access to the W eb-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure. Admin Password To Set Admin Password ? Enter a Password of your choice ? To Verify your Password, re-enter it below Us[...]
-
Page 42
USB File Sharing: ? Select Enable Remote Access to USB files to allow the Remote User to access the USB files. ? Select the port that you want the Remote User e.g. 8081 ? Select the USB Access Inbound Filer to allow the Remote user to access files. UPnP: ? Select the Enable UPnP Note: Y ou need to have the UPnP selected for the Router to be able to[...]
-
Page 43
9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server . Daylight Saving Settings can also be configured to automatically adjust the time when needed. Time Configuration: ? Select your local time z[...]
-
Page 44
9.3 Print Server Setup: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. From this page you can select which printing protocols to enable. T o use the shared printer from this computer, follow the setup instructions found at the AlphaShield website . ? Please[...]
-
Page 45
9.5 Email: The Email feature can be used to send the system log files, router alert messages, and firmware update notifications to your email address. Email Settings: ? From Email address: Enter the address that will appear as the sender when you receive a log file or firmware upgrade notification via email. ? To Email address: Enter the address wh[...]
-
Page 46
9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created. System Commands: ? T o restart the router click on Reboot the Device . ? T o restore all configuration[...]
-
Page 47
9.7 Firmware: The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. T o check for the latest firmware, click the Check Online Now for Latest Firmware Version button. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notificati[...]
-
Page 48
9.8 Dynamic DNS: Dynamic DNS allows you to host a server (Web, FTP , Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your [...]
-
Page 49
10. ST A TUS: The Status items are mainly informational. 10.1 Device Info: General: ? Time option displays the time and date that the router is set to. ? Firmware Version option displays the currently loaded firmware version. WAN: ? Connection Type shows t he Internet connection type that is being used. ? MAC Address is seen over the Internet. ? IP[...]
-
Page 50
LAN: ? MAC Address displayed for your local area network. ? IP Address displays the router on your local area network. ? Subnet Mask displays the router on your local area network. ? DHCP Server i ndicates if the router is acting as a DHCP server on the local area network. 10.2 Routing T able: ? A Gateway value of 0.0.0.0 means there is no next hop[...]
-
Page 51
10.3 Print Server Status: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. This page displays status information about the print server and any attached printer. 10.4 Logs: Events are automatically logged (recorded) on your router’s internal memory. When th[...]
-
Page 52
10.5 Statistics: Network Traffic St ats: Traffic St atistics: Displays packets passing through your router. Refresh Statistics: Updates the screen with the latest router statistics. Clear Statistics: Clears all of the values on the screen. LAN Statistics: ? Sent shows the number of packets transmitted to the local area network. ? Received shows the[...]
-
Page 53
10.6 LAN Port Status: Traffic S tatistics simply displays Receive and Transmit packet s passing through your router. 10.7 Active Sessions: The Active Session page displays the full details of active sessions to your router. Version 1.0 Page 53 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Page 54
10.8 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 54 Alpha Secure Wireless Router 8350 GIGABIT[...]
-
Page 55
1 1. GLOSSARY : ® Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP . Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP . Used to map MAC addresses to[...]
-
Page 56
Broadcast – Transmitting data in all directions at once Browser – A program that allows you to access resources on the web and provides them to you graphically Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider Card Bus – A newer version of the PC Card or P[...]
-
Page 57
DNS – Domain Name System. Translates Domain Names to IP addresses DOCSIS – Data Over Cable Service Interface Specifications . The standard interface for cable modems Domain name – A name that is associated with an IP address Download – T o send a request from one computer to another and have the ?le transmitted back to the requesting comput[...]
-
Page 58
Graphical user interface – GUI H.323 – A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex – Data cannot be transmitted and received at the same time Hashing – Transforming a string of characters into a shorter string with a prede?ned length Hexadecimal – Charac[...]
-
Page 59
IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol V ersion 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running [...]
-
Page 60
NAT – Network Address T ranslation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an updated version of NetBIOS NetBIOS – Network Basic Input/Output System Netmask – Determines what porti[...]
-
Page 61
Repeater – Retransmits the signal of an Access Point in order to extend it’s coverage RIP – Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ-11 – The most commonly used connection method for telephones RJ-45 – The most commonly used connection method for Ethernet RS-232C – The inte[...]
-
Page 62
Unicast – Communication between a single sender and receiver Universal Plug and Play – A standard that allows network devices to discover each other and configure themselves to be a part of the network UPnP – Universal Plug and Play URL – Uniform Resource Locator is a unique address for files accessible on the Internet UTP – Unshielded Tw[...]
-
Page 63
12. TECHNICAL SPECIFICA TIONS: Internal Dual Processing Dedicated 250 MHz High Speed Network Processor Ip3023 Dedicated High Speed Multi-Port Gigabit Switch & Co-Processor Sp arX-5 Hardware Interfaces 5 x 10/100/1000 Auto-Sensing Gigabit Ethernet LAN Ports MDI/MDI-X 1 x 10/100 Auto-Sensing Fast Ethernet WAN Port MDI/MDI-X 4 x Universal Serial B[...]
-
Page 64
13. SUPPORT : 13.1 100% Unhackable or Money Back Guarantee: If the original purchaser can prove that he or she was hacked while using a properly installed Alpha Router, with AlphaGAP T echnology enabled, AlphaShield Inc. will accept the return of the product and provide a full refund (with proof of purchase) or replace the product at AlphaShield&ap[...]
-
Page 65
13.3 Service and Repairs: In case the Alpha Router device is found to be defective, the Manufacturer will be obligated only to replace or repair the defective product provided that the following is determined: ? The product has not been altered or repaired without the written consent of the Manufacturer. ? The product has not failed due to misuse, [...]
-
Page 66
13.5 Copyright: Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user . Complying with all applicable copyright l[...]
-
Page 67
13.10 Customer Remedies: Any liability of AlphaShield Inc., with respect to software or hardware or the performance thereof or defects therein, under any warranty , negligence, strict liability or other theory, will be limited exclusively to product replacement or , if replacement is inadequate as a remedy or, in AlphaShield Inc.'s opinion, im[...]
-
Page 68
14. IMPORT ANT NOTICES: 14.1 FCC Statement: ? Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ? Consult the dealer or an experienced radio/TV technician for help. 14.2 FCC Caution: This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) T[...]
-
Page 69
14.4 IC Statement: Operation is subject to the following two conditions: 1) This device may not cause interference and; 2) This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 7dBi. An antenna having a high[...]