EnGenius ECB150 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius ECB150, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius ECB150 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of EnGenius ECB150. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of EnGenius ECB150 should contain:
- informations concerning technical data of EnGenius ECB150
- name of the manufacturer and a year of construction of the EnGenius ECB150 item
- rules of operation, control and maintenance of the EnGenius ECB150 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius ECB150 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius ECB150, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius ECB150.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius ECB150 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    1 11N Long Range Multi-Function Client Bridge / Access P oint ECB150 11 N Long Range Multi-Function Client Bridge / Access P oint V1.0[...]

  • Page 2

    1 T able of Content s 1 Introduction ....................................................................................................................................................................... 6 1.1 Features and Benefits .....................................................................................................................[...]

  • Page 3

    2 5.3 DHCP ............................................................................................................................... ....................................................................................... 32 5.4 Schedule ...........................................................................................................[...]

  • Page 4

    3 8.2 DMZ ........................................................................................................................................................................................................................ 77 8.3 DoS ................................................................................................................[...]

  • Page 5

    4 Appendix A – FCC Interference St atement ........................................................................................................................ 107 Appendix B – IC Inter ference St atement ........................................................................................................................... 108 Appendix [...]

  • Page 6

    5 R evision Histor y V er sion Date Notes 1.0 Feb. 15, 2012 F irst Relea se[...]

  • Page 7

    6 1 Introduction The ECB150 is a multi-function 802.11b/g/n product with 6 major mult i-functions. The ECB150 is designed to operat e in ever y working environment including enterprises. The ECB150 is a W ireless Network device that delivers up to 3x faster speeds an d 7x extended cov erage than 802.11b/g devices. The ECB150 suppor ts use in the ho[...]

  • Page 8

    7 Suppor t Multiple S SID in AP mode (up to 4) Allow clients to access different networks thro ugh a single access point and assign different policies and functions for each SSID through the built in software. WP A/WP A2/IEEE 802.1x Suppor t Po w e r f u l d a ta s e c u r i t y. MAC Address Filtering in AP Mode Ensure a secure network connection. [...]

  • Page 9

    8 1.3 System Requirements The following are the minimum system r equir ements in or der conf igure the device.  Computer with an Ethernet in terface or Wireless Network.  Windows, Mac OS, or Linux based operating systems.  Web-Browsing Application (example : Internet Explorer, FireFox, Sa fari, or other similar software) 1.4 Applications W[...]

  • Page 10

    9 f) W ireless Extensions to Ether net Networks Extend network coverage wher e the network cannot reach (i.e .: There is no wired internet connection to reach certain location of the environment). g) W ired L AN Backup Implement wireless LANs to provide backup for mission-critical applic ations running on wired networks. h) T raining/Educational Fa[...]

  • Page 11

    10 2 Before you Begin This section will guide you through the installation pr ocess. Placement o f the ENGENIUS ECB150 is essential to maximize the ECB150’ s per formance. A void placing the ECB150 in an enclosed space such as a closet, cabinet, or war drobe. 2.1 Considerations for Wireless Installation The operating distance o f all wireless dev[...]

  • Page 12

    11 2.2 Computer Settings (Windows XP /Windows Vista/Windows 7) In order t o use the ECB150, you mu st f irst conf igure the T CP/IPv4 connection of your computer syst em.  Click Start button and select Control Panel . W indows XP W indows V ista/W indows 7[...]

  • Page 13

    12  In Windows XP , click Network Connections  In Windows 7 , click View Network Status and Tasks in the Network and Internet section, then select Change Adapter Settings  Right click on Local Area Connection and select Properties[...]

  • Page 14

    13  Select Use the following IP address and enter IP address and subnet mask then press OK . Note: Ensure that the IP address and subnet mask are on the same subnet as the device. For example: Device IP address: 192.168.1.1 PC IP address: 192.168.1.2 - 192.168.1.254  Highlight Internet Protocol Version 4 (TCP/IPv4) and select Properties PC su[...]

  • Page 15

    14 2.3 Apple Mac X OS  Open the System Preferences (can be opened in the Ap plications folder or selecting it in the Apple Menu)  Select Network in the Internet & Network section  Highlight Ethernet  In Configure IPv4 , select Manually  Enter IP address and subnet mas k then press OK . Note: Ensure that the IP address an d subnet[...]

  • Page 16

    15 2.4 Hardware Installation 1) Ensure that the computer in use has an Ethernet Card (RJ- 45 Ethernet Port). For more info rmation, verify with our computer user manual. 2) Connect one end of the Category 5 Ethern et cable into RJ-45 port of the ECB1 50 and the other end to the RJ-45 port on the computer that will use the ECB150. Ensure that the ca[...]

  • Page 17

    16 Front Panel Rear Panel Front P anel LED Lights LED lights for W ireless, Ethernet por t and P ower . R ear Panel DC IN DC IN for P ower . Re s e t B u t t o n One click for reset the device. Press over 10 seconds for r eset to factor y default. Ethernet por t for R J-45 cable. Ethernet Port[...]

  • Page 18

    17 3 Configuring Your Client Bridge This section will show you how to conf igure the de vice using the web-b ased conf iguration interface. 3.1 Default Settings Please use your Ethern et por t or wireless network adapte r to connect the Client Bridge. Default Settings IP Address 192.168.1.1 Username / P assword admin / admin Operation Mode Client B[...]

  • Page 19

    18 3.2 Web Configuration  Open a web browser (Internet Explorer/ Fir efox/Safari) and enter the IP Address: http://192.168.1.1 Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address.  The default username and password are admin . Once you have entered the correct username and password[...]

  • Page 20

    19  If successful, you will be logging in and see the ECB150 User Menu[...]

  • Page 21

    20 4 Building a Wireless Network The ECB150 has the ability t o operate in v arious operating mode s. The ECB150 is the ideal device in which you can build your WL AN. This chapter describes how to build a WL AN ar ound your ECB150 using the operating modes o f the ECB150. 4.1 Client Bridge Mode In Client Bridge Mode, the ECB150 act s as a wireless[...]

  • Page 22

    21 4.2 Access Point Mode In Access P oint Mode, ECB150 behaves lik es a central connection for stations or client s that suppor t IEEE 802.11b/g/n networks. The stations and client s must be conf igured to use the same SSID and security pa ssword t o associate with the ECB150. The ECB150 suppor ts up to four SSIDs at the s ame time for secure guest[...]

  • Page 23

    22 4.3 WDS AP Mode The ECB150 also suppor ts WDS AP mode. This operating mo de allows wir eless connections to the ECB150 using WDS technology . In this mode, conf igure the MA C addresses in bo th Access P oint s to enlarge the wireless area by enabling WDS Link settings. WDS sup por ts four AP MA C addr esses.[...]

  • Page 24

    23 4.4 WDS Bridge Mode In WDS Bridge Mode, the ECB150 can wi relessly connect differ ent L ANs by conf iguring the MAC addr ess and security settings of each ECB150 device. Use this mode when two wired LANs located a sm all distance ap ar t want to communicate with each other . The best solution is to use the ECB150 to wir elessly connect two wired[...]

  • Page 25

    24 4.5 Router Mode In Access P oint R outer Mode, ECB150 grant s Internet access t o multiple wireless client s. In this mode, the ECB150’ s internal Dynamic Host Conf iguration Protocol (DHCP) ser ver automatically allocates ranges of IP a ddresses t o each wireless client that will access the Internet thr ough the ECB150. This mode requir es yo[...]

  • Page 26

    25 4.6 Repeater Mode R epeater is used t o regenerat e or replicat e signals that are w eaken ed or distor ted by transm ission over long distances and through ar eas with high levels o f electromagnetic int er ference (EMI).[...]

  • Page 27

    26 5 System 5.1 Operation Mode Each operating mode o ffers differen t features. In or der to swit ch the operating mode, select it from the Operation Mode from the S ys tem Menu . There ar e six operation modes: Access P oint , Client Bridge , WDS AP , WDS Bridge , Access P oint R outer and Universal R epeater . A dialog box will appear to notify y[...]

  • Page 28

    27 The ECB150 will display how much time it will tak e to rest ar t the device in the new oper ating mode as shown below .[...]

  • Page 29

    28 5.2 Status This page will display status o f the device. S ystem Operation Mode Displays the current mode of operation o f the ECB150. S ystem T ime Displays the current time of the ECB150. S ystem Up T ime The elapsed time of operation o f the ECB150. Hardware V er sion and Serial Number Hardware information o f the ECB150. Firmware V ersion Th[...]

  • Page 30

    29 W AN Settings (Rout er mode) Att ain IP Protocol Method used to connect to the Int ernet. This is your W AN connection type. IP Address The W AN IP address o f the R outer . Subnet Mask The W AN subnet mask o f the R outer . Default G a teway The default gateway of the R outer . MAC Addr ess The W AN MAC a ddress o f the R outer . Primar y and S[...]

  • Page 31

    30 WL AN S tation Information (Client Bridge mode) Connection St atus The connection status: Successful or Fai l . Channel The wireless channel in use. ESSID The SSID (Network Name) of the wireless netw ork which ECB150 connected. Security The wireless encr yption in use. BSSID The MAC addr ess of this SSID which ECB150 connected. WL AN R epeater I[...]

  • Page 32

    31 Security W ireless encr yp tion for this SSID . BSSID The MAC address o f this SSID . WL AN Settings (Access P oint / WDS AP / Repeater / R outer mode) Channel Displays the current W ireless Channel in use by the ECB150. ESSID The SSID (Network Name) of the wireless network (up to 4 SSIDs suppor ted). Security Current wire less encr yp tion for [...]

  • Page 33

    32 5.3 DHCP The DHCP option in the System menu displays the client IP address a ssigned by the DHCP Ser ver . Y ou can also set the IP Addresses o f the connected devices manually . Note: Only in Access P oint / R outer mode.[...]

  • Page 34

    33 The DHCP Client T able shows the LAN clients that have been allocated an IP a ddress fro m the DHCP Ser ver . DHCP Client T able IP address Displays the IP Address of the client on the LAN. MAC a ddress Dis plays the MAC Address o f the client on the L AN. Expiration T ime Displays the time of expiration of the IP Address o f the client. Click t[...]

  • Page 35

    34 5.4 Schedule The Schedule option of the S ystem menu allows you to set a schedule when the ECB1 50’ s W ireless is active. The Schedule T able will display:  NO .: The entr y number of the sc hedule.  Description: The name given to the schedule.  Ser vice: Dis plays whether the wireless ser vice will be ac tiv ate or not during the sc[...]

  • Page 36

    35 Af ter selecting Add or Edit , the following form will show up. Fill in the form to set the schedule you want. Schedule Schedule Description Assign a name to the schedule. Ser vice The ser vice provided for the schedule. Days Set which days the schedule will be active. Set what time of the selected days the schedule will be active. Ti me o f d a[...]

  • Page 37

    36 5.5 Event Log The Event Log of t h e Sy s t e m menu displays the system event s and acti ons o f the ECB150. When power ed down or rebooted, the Event Log will be cleared. Event Log Save Save the log to a .t xt f ile. Clear Clear the log. Re f r e s h Update the log.[...]

  • Page 38

    37 5.6 Monitor The Monitor op tion of the Sys t e m menu displays 2 his togram graphs. The hist ograms repr esent the b andwidth usage o f both the daily use o f the Ethernet and th e daily use o f the WL AN. If you click on Detail , a new br owser window will open with 4 additional histograms (6 tot al ). In the new browser window , you will be ab[...]

  • Page 39

    38 6 Wireless 6.1 Status The Sta t u s of the Wi r e l e s s menu displays the current st atus of the ECB150' s wireless conf iguration. Client Bridge mode: Access Point / Router mode:[...]

  • Page 40

    39 Repeater mode:[...]

  • Page 41

    40 6.2 Basic The Basic option of the Wi r e l e s s menu displays the basic wir eless options of the ECB150. Client Bridge: Basic (Client Bridge mode) Radio Enable or Disable the device’ s wireless signal. Band Select the types of wir eless clients that the device will accept. Site Sur vey Click on [ Site Sur vey ] t o search the existing AP .[...]

  • Page 42

    41 Access Point / Router mode: Basic (Access P oint / R outer mode) Radio Enable or Disable the ECB150’ s wireless signal. Mode Select between Access P oint or W ireless Distribution System (WDS) modes. Band Select the types of wir eless clients that the device will accept. Enable SSID# Select the number of SSID’ s (W ireless Network names) you[...]

  • Page 43

    42 Check Channel T ime When Auto Channel is Enabled , you can specif y the period o f device will scan the wireless signals around your area. WDS AP / WDS Bridge mode: W ireless Dis tribution S ystem (WDS) Using a WDS to connect Access P oints wirelessly ext ends a wired infrastructure to locati ons where ca bling is not possible or ineff icient to[...]

  • Page 44

    43 R epeater mode: Basic (R epeater mode ) Radio Enable or Disable the device’ s wireless signal. Band Select the types of wir eless clients that the device will accept. eg: 2.4 Ghz (B+G) Only 802.11b and 11g client s will be allowed. ESSID1 Enter the name o f your wireless netw ork . Y ou can use up to 32 charact ers. Click on [ Site Sur vey ] t[...]

  • Page 45

    44 6.3 Site Survey Client Bridge mode: 1. AP li st af ter s ite s ur vey . 2. Select an AP and click on [ Add to AP Pro f ile ].[...]

  • Page 46

    45 3. Enter the c orrect security setting. 4. Add AP pro f ile successfully , click o n [ Close ] to close the br owser . 5. The AP pro f ile is added in AP Pro f ile T able.[...]

  • Page 47

    46 R epeater mode: 1. AP li st af ter s ite s ur vey . 2. Select an AP and click on [ Connect ]. 3. Enter the c orrect security setting.[...]

  • Page 48

    47 4. Connect AP successf ully , click on [ Close ] to close the br owser . 5. Y ou can see the Connection S tatus in S tatus WEB p age.[...]

  • Page 49

    48 6.4 Advanced The Advan ced op tion o f the Wi r e l e s s menu displays the advanced wir eless options of the ECB150. It is recommended that the EC B150’ s default settings are used unless the user has experience with a dvanced networking. Client Bridge mode: Advanced (Client Bridge mode) Fragment Threshold Specif ies the maximum size of the p[...]

  • Page 50

    49 Access P oint / WDS AP / Ro u t e r / R epeater mode: Advanced (Access P oint / WDS AP / R outer / Repeater mode) Fragment Threshold Specif ies the maximum size of the p acket per frag ment. This function can r educe the chance of pack et collision. However , when the fragment thresh old is set too low , there will be increased overhead r esulti[...]

  • Page 51

    50 D TIM P eriod A Deliver y T raff ic Indication Message (D TIM) informs all wireless clients that the access point will be transmitting Multi-casted data. N Data Rate Y ou can limit the transfer rates between the device and wireless client s. Each Modulation Coding Scheme (MCS) refers to a specif ic transfer speed. Channel Bandwidth Set whether e[...]

  • Page 52

    51 Advanced (WDS Bridge mode) Fragment Threshold Specif ies the maximum size of the p acket per frag ment. This function can r educe the chance of pack et collision. However , when the fragment thresh old is set too low , there will be increased overhead r esulting in poor perfor mance. RTS T h r es h o l d When the pack et size is smaller than the[...]

  • Page 53

    52 6.5 Security The Security option in the W ireless menu allows you to set the wir eless security settings. Note: Only in Access P oint / WDS AP / R outer and R epeater mode. Security (Access Point / WDS AP / R outer / Repeater mode) SSID Selection Select the SSID that the correspondin g security settings will apply to. Sepa rate Separating the SS[...]

  • Page 54

    53 Encr yption The encr yption method to be used on the corresponding SSID . Y ou can choose between WEP , WP A Pre-Shared K ey , or WP A RADIUS.  Disabled - No data encryption is used.  WEP - Data is encrypted using the WEP standard. WEP is the Wired Equi valent Privacy security over a wireless network.  WPA-PSK - Data is encrypted using [...]

  • Page 55

    54 802.1x Authentication RADIUS Ser ver IP Address The IP Address o f the RADIUS Ser ver . RADIUS Ser ver por t The por t number of the RADIUS Ser ver . RADIUS Ser ver pa ssword The RADIUS Ser ver passw ord.[...]

  • Page 56

    55 WEP Encryption: WEP Encr yption Authentication T ype Please ensure that your wir eless clie nts use the same authentication type. Key type ASCII : Using characters from the ASCII standard (recommended) HEX : Uses hexadecimal characters . Key L en gth The amount of bit s the WEP k ey will use.  64 Bit - data is encrypted, using the default key[...]

  • Page 57

    56 WPA Pre-Shared Key Encryption: WP A Pre-Shared Key Encr yp tion WP A type Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings.  WPA(TKIP): Uses a Pre-Shared Key with a dyna mically generated key for each 128-bit packet.  WPA2(AES): Government standard of WPA2 encryption.  WPA2 Mixed: [...]

  • Page 58

    57 WPA RADIUS Encryption: WP A RADIUS Encr yption WP A type Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings.  WPA(TKIP): Uses a Pre-Shared Key with a dyna mically generated key for each 128-bit packet.  WPA2(AES): Government standard of WPA2 encryption. WPA2 Mixed: Allows the use of bot[...]

  • Page 59

    58 6.6 Filter The Filter op tion in the Wi r e l e s s menu allows users to allow clients with specif ic MAC Addresses t o join the SSID . Note: Only in Access P oint / WDS AP / R outer and R epeater mode. W ireless MAC Filter (Access Point / WDS AP / R outer / Repeater mode) Enable W ireless Access Control Enable Wireless Access Control. When Enab[...]

  • Page 60

    59 Add Click this button to add the entr y . Re s e t Click this button if you have made a mistak e and want to reset the MAC addr ess and Description f ields. MAC Address Filtering T able Only clients listed in this t able will be allowed access to the wireless network . Delete Selected Delete the selected entries. Delete All Delete all entries. R[...]

  • Page 61

    60 6.7 WPS (Wi-Fi Protected Setup) The WPS feature in the Wi r e l es s menu follows the W i-Fi Alliance WPS standar d. It eases the set up of security-enabled W i-Fi networks in homes and/or small off ice environment s. It reduces the user steps requir ed to conf igure a network an d suppor t s two methods that are familiar to most consumers to co[...]

  • Page 62

    61 SSID The SSID (network name) used when connecting using WPS. Authentication Mode Shows the encr yp tion method used by the WPS proc ess. This is set as the mode selected in the Security option in the W ireless menu. P assphra se Key This is the pa ssphrase key that is randomly gene rated during the WPS process. It is r equired if wireless client[...]

  • Page 63

    62 6.8 Client List The Client List op tion o f the W ireless menu shows all the wireless client s that are curr ently connected t o the ECB150. Note: Only in Access P oint / WDS AP / R outer and R epeater mode.[...]

  • Page 64

    63 6.9 VLAN The VLAN op tion of the Wi r e l e s s menu allows you to conf igure the VL AN (V ir tual L AN). Note: Only in Access P oint mode. VL AN (Access P oint and WDS AP mode) Vi rt ua l LA N Choose to Enable or Disable the VLAN feature. SSID# T ag Specify the VL AN tag for each SSID . LA N V LA N M GM T Choose to Enable or Disable the L AN VL[...]

  • Page 65

    64 6.10 AP Profile This page allows you t o conf igure the pro f ile of the Client Br idge including Security Setting ex actly the same a s the Access P oint. Y ou can save thr ee AP pro f iles at mos t. Note : Only in Client Bridge mode. AP Prof ile T able (Client Bridge mo de) Add / Edit Select a profile to add or edit. Move Up / Move Down Select[...]

  • Page 66

    65 AP Prof ile Settings Network Name (SSID) Enter the SSID (Network Name) of the wireless network which ERB9260 want to connect. Encr yption The encr yption method to be ap plied. Y ou can choose from Disable, WEP , WP A pre-shar ed k ey and RADIUS. Please select the corr ect security type.[...]

  • Page 67

    66 7 Network 7.1 Status The S tatus option of the Network menu shows the curr ent status o f th e ECB150’ s L AN and W AN (R outer mode) connection.[...]

  • Page 68

    67 7.2 LAN The LAN option of the Network menu allows you t o modif y the device 's LAN settings. The L AN setting in Router mode: There is a dditional setting Default G ateway in Access P oint / Clien t Bridge / WD S AP / WDS Bridge and R epeater mode.[...]

  • Page 69

    68 L AN IP Bridge T ype Select the Bridge type of the L AN. S tatic IP: Manually s pecify an IP address and subnet ma sk for the ECB150 to use. Dynamic IP: The IP address is received aut omatically from the external DHCP ser ver . Note : The option: Dynamic IP is only in Access Po int and WDS AP mode. IP Address The L AN IP Address of this device. [...]

  • Page 70

    69 The DHCP Ser ver feature is only av ailable in Access P oint and R outer mode. DHCP Ser ver (Access Point / R ou ter mode) DHCP Ser ver Enable or disable DHCP feature. The DHCP Ser ver automatically allocates IP addr esses to your L AN device. Disabled as default. Lease T ime The duration of the DHCP ser ver allocates each IP a ddress to a LAN d[...]

  • Page 71

    70 7.3 Spanning Tree The Spanning T ree option of the Network menu allows you t o set the ECB150 to use the Sp anning T ree Prot ocol. Enabling Spanning T ree Pr otocol will preven t network loops in your L AN network . Note : Only in Access P oint / Client Bridge / WDS AP / WDS Bridge and R epeater mode. Spanning T ree Settings Spanning T ree St a[...]

  • Page 72

    71 7.4 WAN (Router mode) The W AN section allows you to manually set the W AN type connection and its r elated settings. Note : Only in R outer mode. 7.4.1 S t atic IP Address If your ISP Provider has assign ed you a fixed IP address, ente r the assigned IP address, Su bnet mask, Default Gateway IP address, and Primary DNS and Secondary DN S (if av[...]

  • Page 73

    72 7.4.2 Dynamic IP Address The IP Address is allocated aut omatically . However some ISP’ s will also recognize the MA C address and will r eject connections if the MAC a ddress does not mat ch. If your ISP has recorded the MAC addre ss of your computer’s Ethernet LAN card , please connect only the computer with the authorized MAC address, and[...]

  • Page 74

    73 7.4.3 PPP over Ethernet (PPP oE) This prot ocol is used by most DSL ser vices worldwide. Select this option if you have a DSL connection. Enter the username and p assword pr ovided by your ISP . PPP over Ether net (PPP oE) Login Username assigned to you by the ISP P assword P assw ord for this username. Ser vice Name Y ou can a ssign a name for [...]

  • Page 75

    74 7.4.4 P oint -to-P oint T unneling Protocol (PPTP) PPTP is used by very few ISPs.[...]

  • Page 76

    75 P oint -to-P oint T unneling Protocol (PPTP) W AN Interf ace T ype Select whether the ISP is set to S tatic IP or will allocate Dynamic IP addr ess. Hostname This is op tional. Only required if specif ied by ISP MAC a ddress The MAC Address that is used to connect to the ISP . Login Username assigned to you by the ISP P assword P assw ord for th[...]

  • Page 77

    76 8 Firewall The F ir ewall section allows you to set the access contr ol and F irewall settings. Note : Only in R outer mode. 8.1 Enable This page allows you t o Enable / Disable the F irewall featur es. If enabled F irewall service, the Denial of Ser vice (DoS) and SPI (S tateful P acket In spection) features will also be enabled.[...]

  • Page 78

    77 8.2 DMZ If enabled this feature, allows th e DMZ comput er on your L AN to be exposed t o all users on the Internet.  This allows almost any applicat ion to be used on the server.  The “DMZ PC” will receive all Unknown connections and data.  If the DMZ feature is enabled, please enter the IP address of the P C to be used as the “D[...]

  • Page 79

    78 8.3 DoS Denial o f Ser vice (Denial of Ser vice) is a type o f Internet attack that sends a high amount o f data t o you with the intent t o overloa d your Internet connection. Enable the DoS f irewall featur e to automati cally detect and block these DoS attacks.[...]

  • Page 80

    79 8.4 MAC Filter Y ou can choose whether to Deny or only Allow those computers listed in the MAC F iltering t able to access the Int ernet. MAC Filter Enable MAC f ilter ing Tick this box to Enable the MAC filte ring feature. Deny all client s with MAC addresses listed below to access the network When selected, the computers listed in the MA C F i[...]

  • Page 81

    80 8.5 IP Filter Y ou can choose whether to Deny or only Allow , computer with those IP Addr esses fr om accessing cer tain P or ts. This can be used to contr ol which Intern et applications the computers can access. Y ou may need to have certain knowledge o f what Internet ports the applications use.[...]

  • Page 82

    81 IP Filter Enable IP f iltering Tick this box to Enable the IP filtering feature. Deny all client s with IP addresses listed below to access the network When selected, the computers with IP addr esses specif ied will be Denied access to the indicated Internet ports. Allow all clients with IP addresses listed below to access the network When selec[...]

  • Page 83

    82 8.6 URL Filter Y ou can deny access to certain websites by blocking k eywords in the URL web a ddress. For example, “ gamer ” has been a dded to the URL Blocking T able. Any web addr ess that includes “ gamer ” will be block ed.[...]

  • Page 84

    83 9 Advanced The Advan ced section allows you to conf igure the Adv anced settings of the ro uter . Note : Only in Access P oint Client R outer mode. 9.1 Network Address Translation (NAT) This page allows you t o Enabl e / Disable the Network Address T ranslation (NA T) feature. The NA T is required t o share one Internet account with multiple L A[...]

  • Page 85

    84 9.2 Port Mapping Port Mapping allows you to re direct a particular range of ports to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. In the example below, there is a FTP Server that requires ports 21 to 22. When there is a connection fr om the Internet on those por ts, it will be r edirect ed to the FTP S[...]

  • Page 86

    85 9.3 Port Forwarding Port Forwarding allows you to redirect a particular public port to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. In the example below, there is a Web Server running on port 80 on the LAN. For security reasons, the Admini strator would like to prov ide this server to Internet connecti[...]

  • Page 87

    86 9.4 Port Triggering If you use Internet applicat ions which use non-standard connections or port numbers, yo u may find that they do not function correctly because they are blocked by the Wireless Router's firewall. Port Trigge ring will be required for these applications to work. P or t T rigge ring Enable P or t T riggering Check this box[...]

  • Page 88

    87 9.5 Application Layer Gateway (ALG) Certain applications may require the use of the ALG feature to functi on correctly. If you use any of the applications listed on the table below, select the fea ture and click Apply.[...]

  • Page 89

    88 9.6 Universal Plug and Play (UPnP) The UPnP function allows automatic disc overy and configuration of UPnP enable d devices on your network. It also provides automatic port forwardi ng for supported applications to seamlessly bypass the Firewall.[...]

  • Page 90

    89 9.7 Quality of Service (QoS) QoS allows you to control the priority that the data is transm itted over the Internet, or to reserve a specific amount of Internet bandwidth. This is to ensure that applications get enough Internet bandwidth for a good user experience. QoS Priority Queue Sets the QoS method to Priority Queue. Bandwidth Allocation Se[...]

  • Page 91

    90 Priority Queue Method Bandwidth priority is set to either High or Low. The data transmissions in the High Priority queues will be processed first. Unlimited Priority Queue IP Address The computer with this IP Address will n ot be bound by the QoS rules. High / Low Priority Queue Protocol The type o f network protocol. High / Low Priority Sets th[...]

  • Page 92

    91 Bandwidth Allocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or you can set a minimum amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth Allocation Ty p e Set whether the QoS rules apply to transmission t hat are Downlo ad, Upload or Both directions. IP range Enter the[...]

  • Page 93

    92 9.8 Static Routing If your wireless router is connected to a network with different subnets, th is feature will allow the different subnets to communicate with each other. Note : The NAT func tion needs to be disabled for the Routing feature to be enabled. Sta t i c Ro u t i n g Enable S tatic R outing Check this box to enable the S tatic R oute[...]

  • Page 94

    93 9.9 Dynamic Routing Dynamic routing allows r outing tables in r outers to change as the possible rout es change. This device use RIP to suppor t dynamic routing.[...]

  • Page 95

    94 9.10 Routing Table This page allows you t o obse r ve the current r outing table.[...]

  • Page 96

    95 10 Management 10.1 Admin The Admin section o f the Management menu allows you to change the ECB 150 default p assword and t o conf igure remote management ( R outer mode). By default, the pa ssword is: admin . The password can cont ain 0 to 12 alphanumeric characters and is case sensitive. Change Password Old P assword Enter the current pa sswor[...]

  • Page 97

    Y ou can only per form remote management fr om the specif ied IP address. Leave blank to allow any host to perform remote management. 96 There is a dditional setting Remote Management in R outer mode. R emote Management (R outer mode) Host Address Po r t Enter the port number you want to accept remote management connections. T ick to Enable the rem[...]

  • Page 98

    97 10.2 SNMP The SNMP section o f the Management menu allows you to assign the cont ac t det ails, location, community name, and trap settings for the Simple Network Management Pr otocol (SNMP). The SNMP is a networking management pr otocol used to monitor network -attached devices. SNMP allows messa ges (called protocol dat a unit s) to be sent to[...]

  • Page 99

    98 SNMP SNMP Active Enable or disable the SNMP feature. SNMP V ersion Y ou may select the SNMP version you want to deploy . All: Interope rability between SNMPv1 and SNMPv2c devices. v1: The standard SNMP version. v2c: Improvement in performance and security o f SNMPv1. R ead Community Specif y the pa ssword for access the SNMP community for rea d [...]

  • Page 100

    99 10.3 Firmware Upgrade The Fir mw ar e Upg r ad e section o f the Management allows you to upgra de the ECB150' s f irmwar e. To perform the Firmware Upgrade: 1. Download the firmware version that you want to install into the ECB150 and place it in a known location. 2. Click the Browse button and navigate to the locati on of the firmware upg[...]

  • Page 101

    100 Emergency Upgrade If your f irmware upgra de failed, you ma y enter the Emer gency Upgrade WEB p age. 1. Enter IP ad dress: 192.168.99.9 and ent er Emergency Upgra de WEB page. Note: R efer to 2.2 to conf igure PC/Not e book IP address to 192.168.99.8. 2. Click the Browse button and navigate to the location o f the upgrade f ile and then click [...]

  • Page 102

    101 4. Y ou can access the device again.[...]

  • Page 103

    102 10.4 Configure The Conf igure op tion of the Management menu allows you t o save the current device conf igurations. When you save the conf igurations, you also can re-loa d the save d conf igurations into the device through the R estore Settings . If extreme problems o ccur press the Res e t but ton o f the R estore to F actor y Defaults optio[...]

  • Page 104

    103 10.5 Reset In some circumstances it may be r equired t o force the device t o reboot. Click on Apply t o reboot o f the Res e t op tion of the Management menu.[...]

  • Page 105

    104 11 Tools 11.1 Time Setting The T ime Set ting section of the T ools menu allows you to set the ECB150’ s time. Ti me Ti me S e t u p Select the method you want to set the time. Ti me Z o ne Select the time zone for your current location. NTP T ime Ser ver Enter the addr ess of the Netw ork T ime Pr otocol (NTP) Ser ver to automat ically synch[...]

  • Page 106

    105 11.2 Diagnosis The Diagnosis section o f the T ools menu allows you to test your network . T y pe in the IP Address o f the device for diagnosis. Diagnosis Address to Ping Enter the IP a ddress you lik e to see if a successful connection can be made. Ping Frequency Select the frequency for Ping test. Ping R esult The results o f the Ping test.[...]

  • Page 107

    106 12 Logout Click on Logout button to logout of the ECB150.[...]

  • Page 108

    107 Appendix A – FCC Interference Statement Federal Communication Commission Inter ference S tatement This equipment has been tested an d found to comply with the limits for a Class B di gital device, pursuant to Part 15 of the FC C Rules. These limits are designed to pr ovide reasonable pr otecti on against harmful inter ference in a residential[...]

  • Page 109

    108 Appendix B – IC Interference Statement Industr y Canada statement: This device complies with RSS-210 of the Industr y Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2 ) this de vice must accept any interference re ceived, including inter fer ence that may cause unde[...]

  • Page 110

    109 Ce dispositif a été conçu pour foncti onner avec une antenne ayant un gain maximal de diople antenne avec dB [5] . Une antenne à gain plus élevé est st rictement interdite par les règlement s d 'Industri e Canada. L'impédance d 'antenne req uise est de 50 ohms. Conformément à la r églementation d 'Indus tri e Cana[...]

  • Page 111

    110 Appendix C – CE Interference Statement Europe – EU Declaration of Conformity This device complies with the essential r equ irements of the R&TTE Directive 1999/5/EC. The following test methods have been app lied in order to prove pr esumption of conformity with the esse ntial requir ements of the R &T TE Directive 199 9/5/EC:  EN[...]

  • Page 112

    111 This device may not be use d for setting up outdoor radio links in France and in some area s the RF output power may be limited t o 1 0 m W E I R P i n the frequenc y range of 2454 – 2483.5 MHz. For detailed information the end-user should cont act th e national spectrum authority in France. 0560 [Jméno výrobce] tímto prohlašuje, že t en[...]

  • Page 113

    Hierbij verklaart [naam van de fabrikant] dat het to estel [type van toestel] in overeenstemming is met de esse ntiële eisen en de andere r e leva nte bepalingen v an richtlijn 1999/5/EG . 112 Latviski [Latvian] Ar šo [name of manufacturer / izgatavot ā ja nos aukums] deklar ē , ka [type of equipment / iek ā rtas tips] atbils t Direk t ī va s[...]