Go to page of
Similar user manuals
-
Network Router
EnGenius Technologies ECB-1220R
69 pages 1.35 mb -
Network Router
EnGenius Technologies ESR9855G
126 pages 3.07 mb -
Network Router
EnGenius Technologies ESR-9752
2 pages 0.34 mb -
Network Router
EnGenius Technologies EVR100
135 pages 5.09 mb -
Network Router
EnGenius Technologies EOA7530
84 pages 2.07 mb -
Network Router
EnGenius Technologies EOC2611P
89 pages 2.09 mb -
Network Router
EnGenius Technologies 1.2
47 pages 0.87 mb -
Network Router
EnGenius Technologies ESR-9710
95 pages 4.34 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius Technologies EVR100, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius Technologies EVR100 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of EnGenius Technologies EVR100. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of EnGenius Technologies EVR100 should contain:
- informations concerning technical data of EnGenius Technologies EVR100
- name of the manufacturer and a year of construction of the EnGenius Technologies EVR100 item
- rules of operation, control and maintenance of the EnGenius Technologies EVR100 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius Technologies EVR100 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius Technologies EVR100, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius Technologies EVR100.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius Technologies EVR100 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
Wireless Gigabit VPN Router E VR100 Wireless G igab it VPN Ro uter V1.0[...]
-
Page 2
1 1. Introduct ion ........................................................................................................................................... .................................................................6 1.1. Package Contents ........ ............... ........... ....... ........ ....... ........ ....... ........ ........... ..[...]
-
Page 3
2 7. Internet .................................................................................................................................................................................................................. 46 7.1. St atus..............................................................................................................[...]
-
Page 4
3 9.5. MAC Filte r .......................................................................................................................................... ..................................................... 79 9.6. IP Filte r .......................................................................................................................[...]
-
Page 5
4 12.2. T ime.................................................................................................................................................................................................... 125 12.3. Dynamic DNS (DDNS) ....... ....... ........ ......... ........ ....... ........ ........ ....... ........ ........... ........ ...[...]
-
Page 6
5 Revision History Version Date Notes 1.0 2011/01/11 First Release[...]
-
Page 7
6 1. Introduction 1.1. Package Contents • EnGenius WIRELESS GI GABIT VPN ROUTER • AC Adapter • RJ-45 Ethernet LAN Cable • CD-ROM with Us er Manual and Setup Wizard • Quick Guide 1.2. System Requirements • RJ-45 Ethernet Bas ed Internet (ADSL or Cable Modem ) • Computer with Wire less Network function • Windows, Mac O S or Linux base[...]
-
Page 8
7 1.3. Introduction EVR100 is a 2T 2R Wireless 11N Gigabit VP N Router that delivers up to 6x f aster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network wi th superior throughput and perf ormance and unparallele d wireless range. With easy to use on the WPS function, it helps users to c onnect to wireless device w it[...]
-
Page 9
8 1.4. LED Overview LED Lights Icon Description Wireless LAN Color – Blue Lights w hen Wirele ss signal i s activated . Blinks when Wireless dat a transfer . Internet Color – Blue Blinks when WPS hands hake i s initiali zed. LAN Color – Blue Lights w hen wire d network devic e is con nected t o RJ-45 port. Blinks when data trans fer occ urs o[...]
-
Page 10
9 2. Before you B egin This section wi ll guide you through the installation proces s. Place ment of the EVR100 is very important to avoid poor signal recepti on and performance. Avoid placing the device in encl osed spaces such as a closet, cabinet or wardrobe. 2.1. Considerations for Wireless Installa tion The operating distance of all wirel ess [...]
-
Page 11
10 2.2. Computer Settings (Windows XP /Windows Vista/Windows 7) Click Start button and open C ontrol Panel. Windows XP Wi ndows Vista Windows 7[...]
-
Page 12
11 Windows XP, c lick [Network Connection] Windows Vista, cl ick [View Network Status and Tasks] then [Manage Network Connections] Windows 7, cl ick [View Network Status and Tas ks] then [Change adapte r settings][...]
-
Page 13
12 Right click on [Local Area Connection] and sele ct [Properties ]. Check “Client for Mic rosoft Networks”, “File and Printer Sharing for Microsoft Netw orks”, and “Internet Protocol (TCP/IP) is ticke d. If not, please install them.[...]
-
Page 14
13 Select “Internet Protocol (T CP/IP)” and click [Properties] Select “Obtain an IP Addres s automatically ” and “Obtain DNS server address automaticall y” then click [O K].[...]
-
Page 15
14 2.3. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet cabl e to WAN port of the device and the other e nd into you cable/DS L modem (Internet) 4. Insert[...]
-
Page 16
15 3. Configuring your Rout er This section wi ll show you how to configure the de vice using the web-based configuration interfac e. Please use your wire less network adapter to connect the WIRELESS RO UTER. Default Settin gs IP Address 192.168.0.1 Username / Passw ord admin / admin Wireless Mode Enable Wireless SSID EnGenius xxxxxx Wireless Sec u[...]
-
Page 17
16 4. Setup Wizard 1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.0.1 Note: If you have changed the default LAN IP Addr ess of the WIRELESS ROUTER, ensure you enter the correct IP Addre ss . 2. The default use rname and password are admin . Once you have entered the c orrect username and pas sword, [...]
-
Page 18
17 3. You will see the f ollowing webpage if login s uccessfully.[...]
-
Page 19
18 4. Click Wizard to enter the Se tup Wizard. Then click N ext to begin the wizard.[...]
-
Page 20
19 5. Select the Operation Mode. Please ensure y ou have the proper cables c onnected as de scribed in the Hardware Install ation section.[...]
-
Page 21
20 AP Router M ode a) The device will se arch for the correct Internet settings automaticall y. b) The most appropriate W AN type w ill be determined and s elected automatically. If i t is incorrect, ple ase select Others to set up the WAN setti ngs manually.[...]
-
Page 22
21 c) There are m any WAN service types available. Please obtain the correct settings from your Internet Service Provide r (ISP). Static IP Address If y our ISP Provider has assigned y ou a fixed IP address, enter the assigned IP address, Subn et mask, Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provi[...]
-
Page 23
22 Dynamic IP Address The IP Add ress is all ocated autom atically. How ever some ISP’s w ill also recognize th e MAC ad dress an d will reject conne ctions if the MAC add ress d oes not match. If your ISP h as recorded the MA C addres s of your compu ter’s Ethernet L AN c ard, please c onnect only the c omputer w ith the authorized MAC addr es[...]
-
Page 24
23 PPP over Eth ernet ISP requires an account u sername and pass word. PPP over Ethe rnet Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP.[...]
-
Page 25
24 Point-to-Point Tun neling Protocol (PPTP ) PPTP is use d by some ISPs.[...]
-
Page 26
25 PPTP WAN I nterface Settings WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or Dynami c I P address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. PPTP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame . [...]
-
Page 27
26 Layer-2 Tunnel ing Protocol (L2TP) L2TP is used by some ISPs.[...]
-
Page 28
27 L2TP WAN In terface Settings WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or Dynami c I P address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. L2TP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame . [...]
-
Page 29
28 d) Setup the leve l of wireless security to be us ed. EnGenius recommends the Highest level of sec urity to be use d. Note: 802.11n wireless spe eds may not be achievabl e if the security level is se tting the Lowest or Low. SSID Ent er the name of your wi reless netw ork. Key Enter the sec urity key f or your w ireless ne twork.[...]
-
Page 30
29 e) Check the se ttings are correct, and then click R eboot to apply the settings.[...]
-
Page 31
30 5. VPN Wizard Using VPN Wi zard, you can establish VPN c onnection easily. Pleas e refer to 11.3 .[...]
-
Page 32
31 6. System 6.1. Status This page will dis play status of the devi ce. Status Model Description of this devic e. Mode The devic e is cu rrently in w hich mod e. Uptime The duration abou t the devi ce has bee n operating wi thout powe ring down or reboot. Current Da te/Time The devic e’s system t ime. If this is incorrec t, please set the tim e i[...]
-
Page 33
32 WAN Setti ngs Attain IP P rotocol Method used t o conn ect to th e Interne t IP address The WAN I P Address o f the dev ice. Subnet Mask The WAN Subn et Mas k of the device. MAC address The MAC addre ss of the devi ce’s WAN Interface. Primary and Seconda ry DNS Primary and Sec ondar y DNS servers assign ed to th e WAN c onnecti on.[...]
-
Page 34
33 LAN Settings IP address The LAN I P Address of t he de vice. Subnet Mask The LAN Sub net Mask o f th e device . DHCP Serv er Whether the DHCP serv er i s Enabled or Disabled. MAC address The MAC addre ss of the devi ce’s LA N Interface.[...]
-
Page 35
34 WLAN Set tings Channel The wirel ess channe l in use. ESSID The SSID (Network Name) of th e wirele ss networ k. (up to 4 SSI Ds are supp orted) Security Wireless enc ryption is en abled for this SSI D. BSSID The MAC addre ss of thi s SSID. Associated Cl ients The number of wireles s client s connec ted to thi s SSID.[...]
-
Page 36
35 6.2. LAN This page allows you to modify the de vice’s LAN settings.[...]
-
Page 37
36 LAN IP IP address The LAN I P Address of t his d evice. IP Subnet M ask The LAN Sub net Mask o f th is devic e. 802.1d Sp anning Tre e When Enabled, t he Span ning T ree protocol will prevent ne twork loops i n y our LAN net work.[...]
-
Page 38
37 DHCP Serv er DHCP Serv er The DHCP Ser ver autom atic ally allocates IP addres ses to your LA N de vice. Lease Time The duration of the DHCP server al locates e ach I P address to a LAN d evice. Start / End I P The range of I P addresse s of the DHCP server will a llocate to LAN devi ce. Domain nam e The domain name for this LAN network.[...]
-
Page 39
38 Two DNS servers can be assigned for us e by your LAN device. There are f our modes available. DNS Servers From ISP The DNS serv er IP addr ess i s assigned from your I SP. User-Defin ed The DNS server IP addr es s is assigne d manually . DNS Relay LAN cli ents are assig ned the d evice’s I P address as the DNS se rver. DNS requests are rel aye[...]
-
Page 40
39 6.3. DHCP This page shows the status of the DHCP server and als o allows you to control how the IP address es are allocated.[...]
-
Page 41
40 The DHCP Cl ient Table shows the LAN clients that have bee n allocated an IP addre ss from the DHCP Se rver . DHCP Client T able IP address The LAN I P address of th e cl ient. MAC address The MAC addre ss of the cl ient’s LA N interface. Expiration Time The time that the all ocated I P address wil l expire . Refresh Click this button to u pda[...]
-
Page 42
41 You can also manually specify the IP address that will be allocated to a LAN client by associating the IP addres s with its MAC address. Type the IP address you would like to m anually assign to a specific MAC address and cl ick Add to add the conditi on to the Static DHCP T able.[...]
-
Page 43
42 6.4. Schedule This page allows you to setup the sc hedule times that the Firew all and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.[...]
-
Page 44
43 Schedule Schedule Desc riptio n Assign a nam e to the sc hed ule. Service The servic e provides for the s chedule. Days Define the Days to acti vate or deactivate the sche dule. Time of d ay Define the Tim e of d ay to acti vate or deac tivated the sc hedule. Please use 24-hour cloc k format.[...]
-
Page 45
44 6.5. Log This page displays the system log of the device. When powered down or rebooted, the log wil l be cleared. Log Save Save the log to a file. Clear Clear the log . Refresh Update the log.[...]
-
Page 46
45 6.6. Language This page allows you to change the Language of the User Interface.[...]
-
Page 47
46 7. Internet The Internet sec tion allows you to manually set the WAN ty pe connection and its related settings. 7.1. Status This page shows the current status of the de vice’s WAN c onnection.[...]
-
Page 48
47 7.2. Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and wi ll reject connections if the MAC address does not matc h. If your ISP has rec orded the MAC address of your computer’s Etherne t LAN card, please connect only the compu ter with the authorized MAC addres s, and cli[...]
-
Page 49
48 Dynamic I P Address Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. DNS Servers Two DNS se rvers can be assign ed for use b y your LAN d evices. There are tw o modes av ail able. From ISP LAN devic es are assig ned t he DNS serve r IP addr ess of your I SP. User-D[...]
-
Page 50
49 7.3. Static IP Address If your ISP P rovider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask , Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provider . Static IP Addr ess IP address Assign an I P address Ma nually. IP Subnet M ask Specify an IP address’s s ubnet mask[...]
-
Page 51
50 7.4. PPP over Ethernet ISP requires an account u sername and pass word.[...]
-
Page 52
51 PPP over Ethe rnet ( PPPoE) Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP. Authenticatio n type Select w hether the ISP uses PAP o r CHAP met hods for authent ication. S[...]
-
Page 53
52 7.5. Point-to-Point Tunneling Protocol (PPTP) PPTP is use d by some ISPs.[...]
-
Page 54
53 Point-to-Poi nt Tun neling Proto col (PPT P) WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or wil l allocate Dynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for[...]
-
Page 55
54 7.6. Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.[...]
-
Page 56
55 Layer-2 Tu nneling Protocol (L2TP) WAN Interf ace Typ e Select w hether th e ISP is set to Static IP or wil l allocate Dynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for t his use[...]
-
Page 57
56 8. Wireless The Wireless se ction allows you to configure the Wireless settings. 8.1. Basic This page shows the current status of the de vice’s Wire less settings.[...]
-
Page 58
57 Basic Radio Enable or Disab le the de vice ’s wirele ss signal. Mode Select betw een Acc ess Point or W ireless Distri butio n System (WD S) mode s. Band Select th e types of wi reless cl ients that t he devic e will ac cept. eg: 2.4 GHz (B+G+N ) Only 802.11b and 11g c lients will be allowed. Enable SSID# Selec t the numb er of SSI D’s (Wire[...]
-
Page 59
58 Wireless Dis tribution System (WDS) Using WDS to connect Access Point wireless ly, and in doing so extend a wire d infrastructure to locations where cabling is not possible or i nefficient to implement. Note that compatibility between diffe rent brands and models is not guaranteed. It is recomm ended that the WD S network be created using the sa[...]
-
Page 60
59 8.2. Advanced This page allows you to configure wirele ss advance settings. It is recommended the def ault settings are used unless the user has expe rience with these functions.[...]
-
Page 61
60 Advanced Fragment Th reshol d Specifies t he size of the packet per fragm ent. This function c an reduce the chanc e of packet collision . However w hen this value is se t too low, there wil l be increase d overheads r esulti ng in poor performanc e. RTS Thresh old When the pac ket size is s malle r than the RT S Thre shold, then the packet w il[...]
-
Page 62
61 8.3. Security This page allows you to set the wireless s ecurity settings. Security SSID Selectio n Select the SSID t hat the s ecurity se ttings w ill apply t o. Broadcast SSID If Disabled, th en the dev ice will not be broadc asting the SSID. There fore it will be invisi ble to wireless clients. WMM Wi-Fi Multi-Medi a is a Q uality of Se rvice[...]
-
Page 63
62 Encryption The encrypti on method t o be ap plied. You can choos e from W EP, W PA pre-sh ared key o r WPA RA DIUS. • Disabled - no data encrypti on is used. • WEP - dat a is encr ypted usi ng the WE P standard . • WPA-PSK - data is encrypt ed using t he WPA-PSK standard. This is a later st andard than WEP, and provides much bet ter se cur[...]
-
Page 64
63 802.1x Auth enticatio n RADIUS Se rver IP Address The IP Add ress of the RA DIUS Se rver RADIUS Se rver por t The port num ber of the RADIUS Se rver. RADIUS Se rver password The RADIUS Server’s p assword .[...]
-
Page 65
64 WEP En cryption: WEP Encryp tion Authenticatio n Type P lease ensur e that y our w ireless c lients use the same authent ication t ype. Key type ASCII : regular t ext (rec omm ended) HEX : for advanc ed user s Key Length Select th e desired option, and en sure the w ireless clie nts use the same setti ng. • 64 Bit - dat a is enc rypted, u sing[...]
-
Page 66
65 WPA Pre-Shared Key En cryption: WPA Pre-Sha red Ke y Encryptio n Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. Pre-shared Key Type Select w hether you w ould l ike to e[...]
-
Page 67
66 WPA RA DIUS Encryption: WPA RADI US Encryptio n WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. RADIUS Se rver IP address Enter the IP add ress of t he RA DIUS Server RADIUS Se rver Port Enter t he port num ber us ed for c onnection s to the RADIUS server. RADIUS Se rver [...]
-
Page 68
67 8.4. Filter This page allows you to create fil ters to control which wire less clients can connect to this device by only al lowing the MAC addresses entere d into the Filtering Table.[...]
-
Page 69
68 Wireless Fil ter Enable Wirel ess Acc ess Control Tick the box to Enable W ireless Acce ss Control. When Enable d, only wire less c lients on the Filt ering Tabl e will be allowe d. Description Enter a nam e or descri ption for thi s entr y. MAC address Enter the MA C address o f the w ireless c lient th at you wish to all ow connec tion. Add Cl[...]
-
Page 70
69 8.5. Wi-Fi Protected Setup (WPS) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi netw orks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable se[...]
-
Page 71
70 Wi-Fi Prot ected Setup (WPS) WPS Tick to Enable the W PS feature. WPS Butto n Tick to Enable the W PS push bu tton. Wi-Fi Prot ected Setup Inform ation WPS Curren t Status Shows whet her the W PS func tion is C onfigured o r Un-co nfigured . Configured me ans that WPS h as been used to a uthorize c onnection betw een the d evice and wireless cli[...]
-
Page 72
71 Initializin g WPS Feature There are tw o methods to initialize the W PS feature: Push Button and Pin code m ethods. 1. WPS Push Button Method Push the WPS button on the WIRELESS ROUT ER device. T he Wireless LED light will s tart to flash to indicate that the W PS process is ready . While the Wire less LED is flashing on the W IRELESS ROUTER, pr[...]
-
Page 73
72 2. Pin Code Method Note the Pin code of your WIRELESS ROUT ER device. Please use this Pin code to initialize the WPS process from the wireless c lient configuration utility. This process w ill be different for each brand or model. Pl ease consult the user manual of the wirel ess client for more information.[...]
-
Page 74
73 8.6. Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device .[...]
-
Page 75
74 8.7. Policy This page allows you to configure the acces s policies for each SS ID (wireless netw ork). Policy WAN Con nection Allow wireless clients on thi s SSID to acc ess the W AN port which typically is an Internet c onnecti on. Communica tion betw een Wirel ess clients Whether each wireles s client can com municate with each ot her in thi s[...]
-
Page 76
75 9. Firewall The Firewall secti on allows you to set the acces s control and Firewall s ettings. 9.1. Enable This page allows you to Enable / Disable the Firew all features. If Enabled Firewall service, the De nial of Service (DoS) and SPI (Stateful Packet Inspection) features will als o be enabled.[...]
-
Page 77
76 9.2. Advanced You can choose whether to allow VPN (Virtual Privat e Network) packets to pass through the Fire wall.[...]
-
Page 78
77 9.3. DMZ If enabled this fe ature, allows the DMZ computer on your LAN to be expose d to all users on the Internet. • This allows al most any application to be used on the s erver. • The “DMZ PC” w ill receive all Unknown connections and data. • If the DMZ f eature is enabled, please ente r the IP address of the PC to be used as the ?[...]
-
Page 79
78 9.4. Denial of Service (DoS) Denial of Se rvice (Denial of Service) is a type of Internet attac k that se nds a high amount of data to y ou with the intent to overload your Internet connection . Enable the DoS fire wall feature to automaticall y detect and block these DoS attacks.[...]
-
Page 80
79 9.5. MAC Filter You can choose whether to Deny or only All ow those computers listed in the MAC Filtering table to access the Internet. MAC Filter Enable MAC f iltering Tic k this box to Enable th e MAC filt ering feature . Deny all clie nts with MAC addresses listed below to access the network When selec ted, the c omputers l isted in the MAC F[...]
-
Page 81
80 9.6. IP Filter You can choose whether to Deny or only All ow, computer with those IP Addres ses from accessing c ertain Ports. This can be use d to control which Internet applicati ons the computers c an access. You may need to have certain knowledge of what Internet ports the appli cations use.[...]
-
Page 82
81 IP Filter Enable IP filte ring Tick this box to Enable the I P filtering feature. Deny all clie nts with IP add resses listed below to access the network When selec ted, the c omputers w ith IP add resses specified will be Denied ac cess to the indic ated Int ernet ports. Allow all c lients with IP addres ses listed below to access the network W[...]
-
Page 83
82 9.7. URL Filter You can deny acc ess to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL B locking Table. Any web address that includes “gamer” will be blocked.[...]
-
Page 84
83 10. Advanced The Advanced se ction allows you to configure the Advanced settings of the router. 10.1. N etwork Address Translation (NAT) This page allows you to Enable / Disable the Network Addres s Translati on (NAT) and Network Turbine features. T he NAT is required to share one Internet ac count with multi ple LAN use rs. Enabling Network Tur[...]
-
Page 85
84 10.2. Po rt Mapping Port Mapping allows y ou to redirect a particular range of ports to a computer on your LAN network. This helps you host servers be hind the NAT and Firewall. In the example be low, there is a Mail Server that requires ports 25. When there is a connection from the Internet on those ports, it wil l be redirected to the Mail Ser[...]
-
Page 86
85 10.3. Po rt Forwarding Port Forwarding allows you to redirect a particular public port to a compute r on your LAN network. This helps y ou host servers behind the NAT and Firewall. In the example be low, there is a WEB Server running on port 80 on the LAN. For security re asons, the Administrator would like to provide this se rver to Internet co[...]
-
Page 87
86 10.4. Po rt Trigger If you use Internet appli cations which use non-standard connections or port num bers, you may find that they do not function correctly becaus e they are blocked by the Wireless Router's firewall. Port Trigger w ill be required for these applicati ons to work. Port Trigger Enable Port Fo rwardin g Tick this box to Enable[...]
-
Page 88
87 10.5. Ap plication Layer Gateway (ALG) Certain applications may require the use of ALG feature to function correctly. If you use any of the applications listed, please tick and s elect it to enable this feature.[...]
-
Page 89
88 10.6. U niversal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled de vices on your network. It als o provides automatic po rt forwarding for supp orted applications to s eamlessly by pass the Firewall. Universal Pl ug and Pl ay (UP nP) Enable the UPnP Fe ature Tic k this box to Enable th e UPnP [...]
-
Page 90
89 10.7. Qu ality of Service (QoS) QoS allows you to c ontrol the priority that the data is transmi tted over the Internet, or to reserve a spec ific amount of Internet bandwidth. This is to e nsure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user expe rience of time sensi tive tr[...]
-
Page 91
90 Priority Queu e Method Bandwidth priority is set to either H igh or Low. The transmissions in the High queue will be processed first. Unlimited P riority Queue Local IP Add ress The compu ter with this IP Addres s will not be bound by the QoS rules. High / Low Priority Q ueue Protocol The type of networ k prot ocol. High / Low Priority Sets the [...]
-
Page 92
91 Bandwidth All ocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or y ou can set a minimu m amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth All ocation Type Set whethe r the QoS ru les app ly to tran smission t hat are D ownload, U ploa d or Both d irections. Local IP [...]
-
Page 93
92 10.8. Ro uting If your WIRELESS ROUTER de vice is connected a network with diffe rent subnets, then this fe ature will allow the dif ferent subnets to communicate with each other. Static Rou ting Enable Sta tic Routi ng Tick this box to Enable the Stat ic Router feature. Destinatio n LAN IP Enter the IP addre ss of th e desti nation LAN. Subnet [...]
-
Page 94
93 Destination Subnet Mask Gateway Hop Interface 192.168.11.0 255.255.255.0 192.168.0.216 1 LAN 192.168.10.0 255.255.255.0 192.168.0.103 1 LAN So if, for exam ple, Client3 wants to send an IP data packet to 192.168.10.2 (Clie nt 2), it would use the above table to determine that it had to go via 192.168.0.103 (Router 2) And if it sends P ackets to [...]
-
Page 95
94 11. VPN A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Interne t. It provides authentic ation to ensure that th e information is going to and from the correct parties . It provides sec urity to protect the information f rom viewi ng or tampering en route. EVR100 su[...]
-
Page 96
95 11.2. Pro file Setting This page allows you to Enable , A dd , Edit and Delete VPN profiles. Profile Setti ng Enable Tick the box to Enable t he VPN pro file. Add Click this button to ad d the entr y. Edit Select one profile and c lick th is button t o edit th e entry. Delete Select ed Delete the se lected entries. Delete All Delete all en tries[...]
-
Page 97
96 10.1.1. IPSe c IPSec (Internet Protocol Security) is a protocol sui te for securing Internet Protocol (IP) c ommunications by authentic ating and encrypting each IP pac ket of a comm unication session. IPSec also includes protocols for establi shing mutual authentication between agents at the beginning of the session and negotiation of cry ptogr[...]
-
Page 98
97 General Name Enter a nam e for your V PN pol icy. Connection Type Supports IPS ec and L2 TP ove r IPSec met hods to establ ish VPN connec tio n. Authenticatio n Type Supports pre-shared k ey meth od for auth enticat ion. Shared Ke y Enter the Shared Key in b ox. Confirm Enter your Sh ared Key ag ain for veri fication. Local ID Ty pe Supports I P[...]
-
Page 99
98 SA (Security Assoc iation) A Security Ass ociation (SA) is the establishment of s hared security attributes between two netw ork entities to support secure comm unication. An SA may include attributes s uch as: cryptographic algorith m and mode; traffi c encryption key; and parameters for the network data to be passed over the connection. Establ[...]
-
Page 100
99 Encryption EVR100 support s DES , 3DES , AES128 , AE S192 , A ES256 enc ryption meth od s for traffic through the VPN. Authenticatio n EVR10 0 supports SHA1 , MD5 methods for authe nticati on. Life Time Enter the numb er of sec onds for the IK E Lifetime. The period of tim e to pa ss before establ ishing a new IK E security assoc iation (SA) w i[...]
-
Page 101
100 Network This page allows you to configure the VPN s erver and local/remote subnet. Network Security Ga teway T ype Security Gatew ay Type s upports I P Add ress and Domain Name . Selec t one of them. Security Ga teway The IP address or domai n name of the V PN server. Local Netwo rk Enter the local (LAN) s ub net and m ask. (ex. 1 92.168.0. 0/2[...]
-
Page 102
101 Advanced This page allows you to configure advanced VPN settings. Advanced NAT Trave rsal E nabling N AT Trave rsal al low IPSec traffic from t his en dpoint to t raverse t hrough the translation proc ess durin g NAT . The remote VPN endpoint must also su pport t his feature and it must be en abled to func tion properly ov er the VP N. Dead Pee[...]
-
Page 103
102 10.1.2. L2 TP over IP Sec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high le vel of security to protect data. You ca n use this type of secure connection for small or remote office cli ents that need access to the corporate network. You can also use L2TP over IPSec VPNs for routers at r[...]
-
Page 104
103 L2TP L2TP Setting Authenticatio n Selec t the d esired authen tication protocol (PA P, CHA P, Auto). Select Auto by default. User Name Enter the usern ame for auth entication . Password Enter the passwo rd for aut henticati on.[...]
-
Page 105
104 Network Network Server IP Enter the VP N Server IP addre ss. Remote I P Range Assign a rang e of IP ad dresses . The assigne d IP r ange sh ould be on the sam e IP netw ork but not the in the same range as your DHCP IP range.[...]
-
Page 106
105 11.3. Wizard You can use W izard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then clic k Next button to next page.[...]
-
Page 107
106 3. You can selec t [IPSec] or [L2TP over IPSec] in this page then click Nex t button to next page. If you s elect [IPSec] then go to s tep 3.1. If you select [ L2TP over IPSec] then go to s tep 3.2. 3.1 IPSec You can sele ct [Client to Site] or [Si te to Site] in this page then click Nex t button to next page. Note. If you sel ect [Client to Si[...]
-
Page 108
107 Enter the Security Gate way and remote network. Then click Next button to next page.[...]
-
Page 109
108 3.2 L2TP over IPSec Enter the username, pa ssword and VPN server IP setting. Then cl ick Next button to next page.[...]
-
Page 110
109 4. Enter the shared key for the VPN connection. 5. Setup successfull y, enable this policy i mmediately. If you don’t want enable this policy, you can un-tick the box. Then click Apply button to apply the settings.[...]
-
Page 111
110 How to establish a L2 TP over IPSec VPN con nection on Win dows XP 1. Click Start button and open Cont rol Panel. 2. Click [Network Connections], double click [New Connecti on Wizard] then click Nex t button.[...]
-
Page 112
111 3. Select [Connect to the netw ork at my workplace] then click Next button. 4. Select [Virtual Private Network connection] then cl ick Next button.[...]
-
Page 113
112 5. Enter the [Company Nam e] then click Next button. 6. Select [Do not dial the initial connection] then click Next button.[...]
-
Page 114
113 7. Enter the VPN serve r IP address then click Next button. 8. Select [Do not use my smart card] then clic k Next button.[...]
-
Page 115
114 9. Click Finish button to compl ete the wizard. 10. Clic k Properities button.[...]
-
Page 116
115 11. In Sec urity, select [Advanced (custom se ttings)] then click Settin gs button. 12. Chec k [Unencrypted pass word (PAP)] and [ Challenge Handshake Authentication Protocol (CHAP)] then cl ick OK button.[...]
-
Page 117
116 13. Clic k [IPSec Settings] then tick [Use pre-shared key for authentication], Enter the Key then click OK button. 14. In Networking , selec t [L2TP IPSec VPN] then click OK button.[...]
-
Page 118
117 15. Clic k Connect button to connect V PN connection. 16. You can see the VPN Connection has been established .[...]
-
Page 119
118 How to establish a L2 TP over IPSec VPN con nection in Windows 7 1. Click Start button and open Cont rol Panel. 2. Click [View Ne twork Status and Tasks] then [Set up a new c onnection or network][...]
-
Page 120
119 3. Click [Connect to a w orkplace] then [Use my Internet connection (VPN)] 4. Enter the VPN serve r IP address: [ Internet address ], [ Destinat ion name ] and tick [ Don’t connect now; just se t it up so I can connect later], then cli ck the Next button.[...]
-
Page 121
120 5. Enter the correct User na me and Password then c lick the Create button. 6. Click the Close button to close the VPN connection se tting.[...]
-
Page 122
121 7. Click [Change adapter s ettings] in Step 2, then select VPN Connection and click [Change settings of this connection] 8. Change Type of VPN to [Layer 2 Tunneling Protocol wi th IPSec (L2TP/IPSec)] and che ck [Unencrypted password (PAP)] i n Security.[...]
-
Page 123
122 9. Click the Adv anced settings button and select [ Use preshared key for authentication] and e nter the correct key . Then click OK button.[...]
-
Page 124
123 10. Double click the VP N Connection then click the Conne ct button. 11. You can see the VPN Connection has been established .[...]
-
Page 125
124 12. Tools This section all ows you to configure some device system settings. 12.1. Adm in This page allows you to change the sys tem password and to configure remote manage ment. Change P assword Old Passw ord: Enter the cu rrent passwo rd. New Passw ord: Enter your new passw ord. Repeat New Passw ord: Enter your n ew passwor d again for verifi[...]
-
Page 126
125 12.2. Time This page allows you to set the sys tem time. Time Time Setup : Select th e method you w ant t o set the t ime. Time Zone: Selec t the tim e zone for your current loc ation. NTP Time S erver: Enter the addres s of the Network Ti me Protoc ol (NTP) Server to a utomati call y synchronize with a server on the Internet. Daylight Savi ngs[...]
-
Page 127
126 12.3. D ynamic DNS (DDNS) This free servic e is very useful when combined with the Virt ual Server feature. It allows Internet users to connect to y our Virtual Servers using a URL, rather than an IP Address . This also solve s the problem of having a dynamic IP address. W ith a dynamic IP addres s, your IP address may c hange whenever you conn[...]
-
Page 128
127 12.4. Po wer This page allows you to Enable or Disable the wireless LAN power s aving features.[...]
-
Page 129
128 12.5. D iagnosis This page allows you determine if the WIRELESS ROUTER devi ce has an active Internet connec tion. Diagnosis Address to Ping: Enter the IP add ress y ou li ke to see i f a successfu l connec tion can b e made. Ping Result: The results of the Ping te st.[...]
-
Page 130
129 12.6. F irmware The firmw are (software) in the W IRELESS ROUTER device can be upgraded using your Web Brows er. To perform the Firm ware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade fil e. 2. Select the upgrade fil e. Its name will appear in the Upgrade File field. 3. Click the Apply button to commence the fi[...]
-
Page 131
130 12.7. B ack-up Back-up Restore to f actory default: Restores the device t o factory d efault settin gs. Backup Set tings: Save the cur rent configu ration s ettings to a file. Restore Set tings: Restores a previ ously sa ved configurati on file. Click Brows e to selec t the fil e. Then Uplo ad to lo ad the set tings.[...]
-
Page 132
131 12.8. Reset In some circums tances it may be re quired to force the device to reboot.[...]
-
Page 133
132 Appendix A – FCC Interferen ce Stat ement Federal Communi cation Commission Inter ference St atemen t This equipment has been tested and found to com ply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limi ts are designed to provide reasonable protection against harmful interference in a residential [...]
-
Page 134
133 IMPORTANT NOTE: FCC Radiatio n Expos ure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your bod y. We declare that the product is limited in CH1~CH11 by specified firmwa re con[...]
-
Page 135
134 Appendix B – IC Interference Statement Industry Canada state ment: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired[...]