EnGenius EVR100 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of EnGenius EVR100, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of EnGenius EVR100 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of EnGenius EVR100. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of EnGenius EVR100 should contain:
- informations concerning technical data of EnGenius EVR100
- name of the manufacturer and a year of construction of the EnGenius EVR100 item
- rules of operation, control and maintenance of the EnGenius EVR100 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of EnGenius EVR100 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of EnGenius EVR100, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the EnGenius service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of EnGenius EVR100.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the EnGenius EVR100 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Wireless Gigabit VPN Router E VR100 Wireless G igab it VPN Ro uter V1.0[...]

  • Page 2

    1 1. Introduction ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ...... 6 1.1. Package Contents ........ ........ ........ ........... ........ ........ ........ ........ .....[...]

  • Page 3

    2 7. Internet ..... ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ........... ....... 46 7.1. Status ...... ........ ........ ........ ........ ........... ........ ........ ........ ....[...]

  • Page 4

    3 9.5. MAC Filter ......... ........ ........ ........ .......... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ .... 79 9.6. IP Filter .. ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ....[...]

  • Page 5

    4 12.2. Time ....... ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ........... ........ ........ ........ ........ ........ ............ ........ ........ ........ ........ ........ ... 125 12.3. Dynamic DNS (DDNS) ....... ........ ........ .......... ........ ........ ........ ........ ........ ......[...]

  • Page 6

    5 Revision History Version Date Notes 1.0 2011/01/11 First Release[...]

  • Page 7

    6 1. Introducti on 1.1. Package Contents • EnGenius WIRELESS GI GABIT VPN ROUTER • AC Adapter • RJ-45 Ethernet LAN Cable • CD-ROM with Us er Manual and Setup Wizard • Quick Guide 1.2. System Requirements • RJ-45 Ethernet Bas ed Internet (ADSL or Cable Modem ) • Computer with Wirel ess Network function • Windows, Mac O S or Linux bas[...]

  • Page 8

    7 1.3. Introduction EVR100 is a 2T 2R Wireless 11N Gigabit VP N Router that delivers up to 6x f aster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network wi th superior throughput and perf ormance and unparallele d wireless range. With easy to use on the WPS function, it helps users to c onnect to wireless device w it[...]

  • Page 9

    8 1.4. LED Overview LED Lights Icon Description Wireless LAN Color – Blue Lights w hen Wirele ss signal i s activated . Blinks when Wireless dat a transfer . Internet Color – Blue Blinks when WPS hands hake i s initiali zed. LAN Color – Blue Lights w hen wire d network devic e is con nected t o RJ-45 port. Blinks when data trans fer occ urs o[...]

  • Page 10

    9 2. Bef ore you Begin This section wi ll guide you through the installation proces s. Place ment of the EVR100 is very important to avoid poor signal recepti on and performance. Avoid placing the device in encl osed spaces such as a closet, cabinet or wardrobe. 2.1. Considerations for Wireless Installa tion The operating distance of all wirel ess [...]

  • Page 11

    10 2.2. Computer Settings (Windows XP /Windows Vista/Windows 7)     Click Start button and open Control Panel. Windows XP Wi ndows Vista Windows 7[...]

  • Page 12

    11     Windows XP, c lick [Network Connection]     Windows Vista, cl ick [View Network Status and Tasks] then [Manage Network Connections]     Windows 7, c lick [View Network Status and Tas ks] then [Change adapter settings][...]

  • Page 13

    12     Right click on [Local Area Connection] and sel ect [Properties ].     Check “Client for Mic rosoft Networks”, “File and Printer Sharing for Microsoft Netw orks”, and “Internet Protocol (TCP/IP) is ticke d. If not, please install them.[...]

  • Page 14

    13     Select “Internet Protocol (T CP/IP)” and click [Properties]     Select “Obtain an IP Addres s automatically ” and “Obtain DNS serve r address automaticall y” then click [O K].[...]

  • Page 15

    14 2.3. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet cabl e to WAN port of the device and the other e nd into you cable/DS L modem (Internet) 4. Insert[...]

  • Page 16

    15 3. Configuring your Router This section wi ll show you how to configure the de vice using the web-based configuration interfac e. Please use your wire less network adapter to connect the WIRELESS RO UTER. Default Settin gs IP Address 192.168.0.1 Username / Passw ord admin / admin Wireless Mode Enable Wireless SSID EnGenius xxxxxx Wireless Sec ur[...]

  • Page 17

    16 4. Set up Wizard 1. Open a we b browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.0.1 Note: If you have changed the default LAN IP Address of the WIRELESS ROUTER, ensure you enter the correct IP Address . 2. The default username and password are admin . Once you have entered the correct username and password, cli[...]

  • Page 18

    17 3. You will see the following webpage if login successfully .[...]

  • Page 19

    18 4. Click Wizard to enter the S etup Wizard. Then click N ext to begin the wizard.[...]

  • Page 20

    19 5. Select the Ope ration Mode. Please ensure y ou have the proper cables c onnected as de scribed in the Hardware Install ation section.[...]

  • Page 21

    20 AP Router M ode a) The device w ill search for the correct Internet settings automaticall y. b) The most appropriate W AN type will be determined and s elected automatically. If i t is incorrect, ple ase select Others to set up the WAN setti ngs manually.[...]

  • Page 22

    21 c) There are many WAN service ty pes available. Please obtain the correct settings from your Internet Service Provide r (ISP). Static IP Address If y our ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subn et mask, Default Gateway IP addre ss, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provi[...]

  • Page 23

    22 Dynamic IP Address The IP Add ress is all ocated autom atically. How ever some ISP’s w ill also recognize th e MAC ad dress an d will reject conne ctions if the MAC add ress d oes not match. If your ISP h as recorded the MA C addres s of your compu ter’s Ethernet L AN c ard, please c onnect only the c omputer w ith the authorized MAC addr es[...]

  • Page 24

    23 PPP over Eth ernet ISP requires an account u sername and pass word. PPP over Ethe rnet Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP.[...]

  • Page 25

    24 Point-to-Point Tun neling Protocol (PPTP ) PPTP is use d by some ISPs.[...]

  • Page 26

    25 PPTP WAN I nterface Settings WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or D ynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. PPTP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame .[...]

  • Page 27

    26 Layer-2 Tunnel ing Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Page 28

    27 L2TP WAN In terface Settings WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or D ynamic IP address. Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC addre ss that is used to connect to the I SP. L2TP Settings Login Username assig ned to you by the ISP Password Password for t his usern ame .[...]

  • Page 29

    28 d) Setup the level of wireless security to be use d. EnGenius recommends the Highest level of sec urity to be use d. Note: 802.11n wireless spe eds may not be achievabl e if the security level is setting the Lowest or Low. SSID Ent er the name of your wi reless netw ork. Key Enter the sec urity key f or your w ireless ne twork.[...]

  • Page 30

    29 e) Check the se ttings are correct, and then click R eboot to apply the settings.[...]

  • Page 31

    30 5. VPN Wizard Using VPN Wi zard, you can establish VPN c onnection easily. Pleas e refer to 11.3 .[...]

  • Page 32

    31 6. Syst em 6.1. Status This page will dis play status of the devi ce. Status Model Description of this devic e. Mode The devic e is cu rrently in w hich mod e. Uptime The duration abou t the devi ce has bee n operating wi thout powe ring down or reboot. Current Da te/Time The devic e’s system t ime. If this is incorrec t, please set the tim e [...]

  • Page 33

    32 WAN Setti ngs Attain IP P rotocol Method used t o conn ect to th e Interne t IP address The WAN I P Address o f the dev ice. Subnet Mask The WAN Subn et Mas k of the device. MAC address The MAC addre ss of the devi ce’s WAN Interface. Primary and Seconda ry DNS Primary and Sec ondar y DNS servers assign ed to th e WAN c onnecti on.[...]

  • Page 34

    33 LAN Settings IP address The LAN I P Address of t he de vice. Subnet Mask The LAN Sub net Mask o f th e device . DHCP Serv er Whether the DHCP serv er i s Enabled or Disabled. MAC address The MAC addre ss of the devi ce’s LA N Interface.[...]

  • Page 35

    34 WLAN Set tings Channel The wirel ess channe l in use. ESSID The SSID (Network Name) of th e wirele ss networ k. (up to 4 SSI Ds are supp orted) Security Wireless enc ryption is en abled for this SSI D. BSSID The MAC addre ss of thi s SSID. Associated Cl ients The number of wireles s client s connec ted to thi s SSID.[...]

  • Page 36

    35 6.2. LAN This page allows you to modify the de vice’s LAN settings.[...]

  • Page 37

    36 LAN IP IP address The LAN I P Address of t his d evice. IP Subnet M ask The LAN Sub net Mask o f th is devic e. 802.1d Sp anning Tre e When Enabl ed, the Spa nn ing Tree p rotocol w ill preve nt netwo rk loops in your LA N network.[...]

  • Page 38

    37 DHCP Serv er DHCP Serv er The DHCP Ser ver autom atic ally allocates IP addres ses to your LA N de vice. Lease Time The duration of the DHCP server al locates e ach I P address to a LAN d evice. Start / End I P The range of I P addresse s of the DHCP server will a llocate to LAN devi ce. Domain nam e The domain name for this LAN network.[...]

  • Page 39

    38 Two DNS servers can be assigned for us e by your LAN device. There are f our modes available. DNS Servers From ISP The DNS serv er IP addr ess i s assigned from your I SP. User-Defin ed The DNS server IP addr es s is assigne d manually . DNS Relay LAN cli ents are assig ned the d evice’s I P address as the DNS se rver. DNS requests are rel aye[...]

  • Page 40

    39 6.3. DHCP This page shows the status of the DHCP server and als o allows you to control how the IP address es are allocated.[...]

  • Page 41

    40 The DHCP Cl ient Table shows the LAN clients that have bee n allocated an IP addre ss from the DHCP Se rver . DHCP Client T able IP address The LAN I P address of th e cl ient. MAC address The MAC addre ss of the cl ient’s LA N interface. Expiration Time The time that the all ocated I P address wil l expire . Refresh Click this button to u pda[...]

  • Page 42

    41 You can also manually specify the IP address that will be allocated to a LAN client by associating the IP addres s with its MAC address. Type the IP address you would like to m anually assign to a specific MAC address and cl ick Add to add the conditi on to the Static DHCP T able.[...]

  • Page 43

    42 6.4. Schedule This page allows you to setup the sc hedule times that the Firew all and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.[...]

  • Page 44

    43 Schedule Schedule Desc riptio n Assign a nam e to the sc hed ule. Service The servic e provides for the s chedule. Days Define the Days to acti vate or deactivate the sche dule. Time of d ay Define the Tim e of d ay to acti vate or deac tivated the sc hedule. Please use 24-hour cloc k format.[...]

  • Page 45

    44 6.5. Log This page displays the system log of the device. When powered down or rebooted, the log wil l be cleared. Log Save Save the log to a file. Clear Clear the log . Refresh Update the log.[...]

  • Page 46

    45 6.6. Language This page allows you to change the Language of the User Interface.[...]

  • Page 47

    46 7. Internet The Internet sec tion allows you to manually set the WAN ty pe connection and its related settings. 7.1. Status This page shows the current status of the de vice’s WAN c onnection.[...]

  • Page 48

    47 7.2. Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and wi ll reject connections if the MAC address does not matc h. If your ISP has rec orded the MAC address of your computer’s Etherne t LAN card, please connect only the compu ter with the authorized MAC addres s, and cli[...]

  • Page 49

    48 Dynamic I P Address Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. DNS Servers Two DNS se rvers can be assign ed for use b y your LAN d evices. There are tw o modes av ail able. From ISP LAN devic es are assig ned t he DNS serve r IP addr ess of your I SP. User-D[...]

  • Page 50

    49 7.3. Static IP Address If your ISP P rovide r has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Sec ondary DNS (if availa ble) of your I SP provider . Static IP Addr ess IP address Assign an I P address Ma nually. IP Subnet M ask Specify an IP address’s s ubnet mask[...]

  • Page 51

    50 7.4. PPP over Ethernet ISP requires an account u sername and pass word.[...]

  • Page 52

    51 PPP over Ethe rnet ( PPPoE) Username Username assig ned to you by the ISP Password Password for t his usern ame . Service You can assign a name for this service. (Optional) MTU The maximum size of p ac kets. Do not change u nless ment ioned by the ISP. Authenticatio n type Select w hether the ISP uses PAP o r CHAP met hods for authent ication. S[...]

  • Page 53

    52 7.5. Point-to-Point Tunneling Protocol (PPTP) PPTP is use d by some ISPs.[...]

  • Page 54

    53 Point-to-Poi nt Tun neling Proto col (PPT P) WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or w ill alloc ate Dynami c IP address . Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Passwor[...]

  • Page 55

    54 7.6. Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.[...]

  • Page 56

    55 Layer-2 Tu nneling Protocol (L2TP) WAN Interf ace Typ e Selec t wheth er the ISP i s set to Stati c IP or w ill alloc ate Dynami c IP address . Hostname This is opt ional. Only re quired if speci fied by ISP MAC address The MAC Ad dress that i s used to connec t to the ISP. Username Username assig ned to you by the ISP Password Password for t hi[...]

  • Page 57

    56 8. Wireless The Wireless se ction allows you to configure the Wireless settings. 8.1. Basic This page shows the current status of the de vice’s Wire less settings.[...]

  • Page 58

    57 Basic Radio Enable or Disab le the de vice ’s wirele ss signal. Mode Select between Acces s Point or Wirel ess Distribut ion System (WDS) m odes . Band Select th e types of wi reless cl ients that t he devic e will ac cept. eg: 2.4 GHz (B+G+N ) Only 802.11b and 11g c lients will be allowed. Enable SSID# Selec t the numb er of SSI D’s (Wirele[...]

  • Page 59

    58 Wireless Dis tribution System (WDS) Using WDS to connect Access Point wireless ly, and in doing so extend a wire d infrastructure to locations where cabling is not possible or i nefficient to implement. Note that compatibility between diffe rent brands and models is not guaranteed. It is recomm ended that the WD S network be created using the sa[...]

  • Page 60

    59 8.2. Advanced This page allows you to configure wirele ss advance settings. It is recommended the def ault settings are used unless the user has expe rience with these functions.[...]

  • Page 61

    60 Advanced Fragment Th reshol d Specifies t he size of the packet per fragm ent. This function c an reduce the chanc e of packet collision . However w hen this value is se t too low, there wil l be increase d overheads r esulti ng in poor performanc e. RTS Thresh old When the pac ket size is s malle r than the RT S Thre shold, then the packet w il[...]

  • Page 62

    61 8.3. Security This page allows you to set the wireless s ecurity settings. Security SSID Selectio n Select the SSID t hat the s ecurity se ttings w ill apply t o. Broadcast SSID If Disabled, th en the dev ice will not be broadc asting the SSID. There fore it will be invisi ble to wireless clients. WMM Wi-Fi Multi-Medi a is a Q uality of Se rvice[...]

  • Page 63

    62 Encryption The encrypti on method t o be ap plied. You can choos e from W EP, W PA pre-sh ared key o r WPA RA DIUS. • Disabled - no data enc ryption is used. • WEP - data is encrypted usin g the WE P standard. • WPA-PSK - dat a is en crypted using the WPA-PSK standard. Th is is a l ater stan dard than WEP, and provides much bet ter se curi[...]

  • Page 64

    63 802.1x Auth enticatio n RADIUS Se rver IP Address The IP Add ress of the RA DIUS Se rver RADIUS Se rver por t The port num ber of the RADIUS Se rver. RADIUS Se rver password The RADIUS Server’s p assword .[...]

  • Page 65

    64 WEP En cryption: WEP Encryp tion Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. Key type ASCII : regular t ext (rec omm ended) HEX : for advanc ed user s Key Length Select th e desired option, and en sure the w ireless clie nts use the same setti ng. • 64 Bit - dat a is encrypte d, usi ng [...]

  • Page 66

    65 WPA Pre-Shared Key En cryption: WPA Pre-Sha red Ke y Encryptio n Authenticatio n Type Please ensur e that you r wi reless cl ients use the same authenti cation ty pe. WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. Pre-shared Key Type Select w hether you w ould l ike to e[...]

  • Page 67

    66 WPA RA DIUS Encryption: WPA RADI US Encryptio n WPA type Select th e WPA encrypti on you w ould like. Please ensur e that you r wi reless cl ients use the same settin gs. RADIUS Se rver IP address Enter the IP add ress of t he RA DIUS Server RADIUS Se rver Port Enter t he port num ber us ed for c onnection s to the RADIUS server. RADIUS Se rver [...]

  • Page 68

    67 8.4. Filter This page allows you to create fil ters to control which wire less clients can connect to this device by only al lowing the MAC addresses entere d into the Filtering Table.[...]

  • Page 69

    68 Wireless Fil ter Enable Wirel ess Acc ess Control Tick the box to Enable W ireless Acce ss Control. When Enable d, only wire less c lients on the Filt ering Tabl e will be allowe d. Description Enter a nam e or descri ption for thi s entr y. MAC address Enter the MA C address o f the w ireless c lient th at you wish to all ow connec tion. Add Cl[...]

  • Page 70

    69 8.5. Wi-Fi Protected Setup (WPS) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi netw orks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable se[...]

  • Page 71

    70 Wi-Fi Prot ected Setup (WPS) WPS Tick to Enable the W PS feature. WPS Butto n Tick to Enable the W PS push bu tton. Wi-Fi Prot ected Setup Inform ation WPS Curren t Status Shows whet her the W PS func tion is C onfigured o r Un-co nfigured . Configured me ans that WPS h as been used to a uthorize c onnection betw een the d evice and wireless cli[...]

  • Page 72

    71 Initializin g WPS Feature There are tw o methods to initialize the W PS feature: Push Button and Pin code m ethods. 1. WPS Push Butto n Method Push the WPS button on the WIRELESS ROUT ER device. T he Wireless LED light will s tart to flash to indicate that the W PS process is ready . While the Wire less LED is flashing on the W IRELESS ROUTER, p[...]

  • Page 73

    72 2. Pin Code Method Note the Pin code of your WIRELESS ROUT ER device. Please use this Pin code to initialize the WPS process from the wireless c lient configuration utility. This process w ill be different for each brand or model. Pl ease consult the user manual of the wirel ess client for more information.[...]

  • Page 74

    73 8.6. Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device .[...]

  • Page 75

    74 8.7. Policy This page allows you to configure the acces s policies for each SS ID (wireless netw ork). Policy WAN Con nection Allow w ireless c lients on thi s SSID to acc ess the W AN port w hich t ypically is an Internet c onnecti on. Communica tion betw een Wirel ess clients Whether each wireles s client can com municate with each ot her in t[...]

  • Page 76

    75 9. Firewall The Firewall secti on allows you to set the acces s control and Firewall s ettings. 9.1. Enable This page allows you to Enable / Disable the Firew all features. If Enabled Firewall service, the De nial of Service (DoS) and SPI (Stateful Packet Inspection) features will als o be enabled.[...]

  • Page 77

    76 9.2. Advanced You can choose whether to allow VPN (Virtual Privat e Network) packets to pass through the Fire wall.[...]

  • Page 78

    77 9.3. DMZ If enabled this fe ature, allows the DMZ computer on your LAN to be expose d to all users on the Internet. • This allows al most any application to be used on the se rver. • The “DMZ PC” w ill receive all Unknown connections and data. • If the DMZ f eature is enabled, please enter the IP address of the PC to be used as the “[...]

  • Page 79

    78 9.4. Denial of Service (DoS) Denial of Se rvice (Denial of Service) is a type of Internet attac k that se nds a high amount of data to y ou with the intent to overload your Internet connection . Enable the DoS fire wall feature to automaticall y detect and block these DoS attacks.[...]

  • Page 80

    79 9.5. MAC Filter You can choose whether to Deny or only All ow those computers listed in the MAC Filtering table to access the Internet. MAC Filter Enable MAC f iltering Tick this box to Enable the MAC filtering feature. Deny all clie nts with MAC addresses listed below to access the network When selec ted, the c omputers l isted in the MAC Fil t[...]

  • Page 81

    80 9.6. IP Filter You can choose whether to Deny or only All ow, computer with those IP Addres ses from accessing c ertain Ports. This can be use d to control which Internet applicati ons the computers c an access. You may need to have certain knowledge of what Internet ports the appli cations use.[...]

  • Page 82

    81 IP Filter Enable IP filte ring Tick this box to Enable the I P filtering feature. Deny all clie nts with IP add resses listed below to access the network When selec ted, the c omputers w ith IP add resses specified will be Denied ac cess to the indic ated Int ernet ports. Allow all c lients with IP addres ses listed below to access the network W[...]

  • Page 83

    82 9.7. URL Filter You can deny acc ess to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL B locking Table. Any web address that includes “gamer” will be blocked.[...]

  • Page 84

    83 10. Advanced The Advanced se ction allows you to configure the Advanced settings of the router. 10.1. Network Address Tra nslation (NAT) This page allows you to Enable / Disable the Network Addres s Translati on (NAT) and Network Turbine features. T he NAT is required to share one Internet ac count with multi ple LAN use rs. Enabling Network Tur[...]

  • Page 85

    84 10.2. Port Mapping Port Mapping allows y ou to redirect a particular range of ports to a computer on your LAN network. This helps you host servers be hind the NAT and Firewall. In the example be low, there is a Mail Server that requires ports 25. When there is a connection from the Internet on those ports, it wil l be redirected to the Mail Serv[...]

  • Page 86

    85 10.3. Port Forwarding Port Forwarding allows you to redirect a particular public port to a compute r on your LAN network. This helps y ou host servers behind the NAT and Firewall. In the example be low, there is a WEB Server running on port 80 on the LAN. For security re asons, the Administrator would like to provide this se rver to Internet con[...]

  • Page 87

    86 10.4. Port Trigger If you use Internet appli cations which use non-standard connections or port num bers, you may find that they do not function correctly becaus e they are blocked by the Wireless Router's firewall. Port Trigger w ill be required for these applicati ons to work. Port Trigger Enable Port Fo rwardin g Tick this box to Enable [...]

  • Page 88

    87 10.5. Application Layer Gateway (ALG) Certain applications may require the use of ALG feature to function correctly. If you use any of the applications listed, please tick and s elect it to enable this feature.[...]

  • Page 89

    88 10.6. Universal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled de vices on your network. It als o provides automatic po rt forwarding for supp orted applications to s eamlessly by pass the Firewall. Universal Pl ug and Pl ay (UP nP) Enable the UPnP Fe ature Tick this box to Enable the U PnP fe[...]

  • Page 90

    89 10.7. Quality of Service (QoS) QoS allows you to c ontrol the priority that the data is transmi tted over the Internet, or to reserve a spec ific amount of Internet bandwidth. This is to e nsure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user expe rience of time sensi tive tra[...]

  • Page 91

    90 Priority Queu e Method Bandwidth priority is set to either H igh or Low. The transmissions in the High queue will be processed first. Unlimited P riority Queue Local IP Add ress The compu ter with this IP Addres s will not be bound by the QoS rules. High / Low Priority Q ueue Protocol The type of networ k prot ocol. High / Low Priority Sets the [...]

  • Page 92

    91 Bandwidth All ocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or y ou can set a minimu m amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth All ocation Type Set whethe r the QoS ru les app ly to tran smission t hat are D ownload, U ploa d or Both d irections. Local IP [...]

  • Page 93

    92 10.8. Routing If your WIRELESS ROUTER de vice is connected a network with diffe rent subnets, then this fe ature will allow the dif ferent subnets to communicate with each other. Static Rou ting Enable Sta tic Routi ng Tick this box to Enable the Stat ic Router feature. Destinatio n LAN IP Enter the IP addre ss of th e desti nation LAN. Subnet M[...]

  • Page 94

    93 Destination Subnet Mask Gateway Hop Interface 192.168.11.0 255.255.255.0 192.168.0.216 1 LAN 192.168.10.0 255.255.255.0 192.168.0.103 1 LAN So if, for exam ple, Client3 wants to send an IP data packet to 192.168.10.2 (Clie nt 2), it would use the above table to determine that it had to go via 192.168.0.103 (Router 2) And if it sends P ackets to [...]

  • Page 95

    94 11. VPN A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Interne t. It provides authentic ation to ensure that th e information is going to and from the correct parties . It provides sec urity to protect the information f rom viewi ng or tampering en route. EVR100 su[...]

  • Page 96

    95 11.2. Profile Setting This page allows you to Enable , A dd , Edit and Delete VPN profiles. Profile Setti ng Enable Tick the box to Enable t he VPN pro file. Add Click this button to ad d the entr y. Edit Select one profile and c lick th is button t o edit th e entry. Delete Select ed Delete the se lected entries. Delete All Delete all en tries[...]

  • Page 97

    96 10.1.1. IPSec IPSec (Internet Protocol Security) is a protocol sui te for securing Internet Protocol (IP) c ommunications by authentic ating and encrypting each IP pac ket of a comm unication session. IPSec also includes protocols for establi shing mutual authentication between agents at the beginning of the session and negotiation of cry ptogra[...]

  • Page 98

    97 General Name Enter a nam e for your V PN pol icy. Connection Type Supports IPS ec and L2 TP ove r IPSec met hods to establ ish VPN connec tio n. Authenticatio n Type Supports p re-shared k ey method for authen ticat ion. Shared Ke y Enter the Shared Key in b ox. Confirm Enter your Sh ared Key ag ain for veri fication. Local ID Ty pe Supports I P[...]

  • Page 99

    98 SA (Security Assoc iation) A Security Ass ociation (SA) is the establishment of s hared security attributes between two netw ork entities to support secure comm unication. An SA may include attributes s uch as: cryptographic algorith m and mode; traffi c encryption key; and parameters for the network data to be passed over the connection. Establ[...]

  • Page 100

    99 Encryption EVR100 support s DES , 3DES , AES128 , AE S192 , A ES256 enc ryption meth od s for traffic through the VPN. Authenticatio n EVR10 0 supports SHA1 , MD5 methods for authe nticati on. Life Time Enter the numb er of sec onds for the IK E Lifetime. The period of tim e to pa ss before establ ishing a new IK E security assoc iation (SA) w i[...]

  • Page 101

    100 Network This page allows you to configure the VPN s erver and local/remote subnet. Network Security Ga teway T ype Security Gatew ay Type s upports I P Add ress and Domain Name . Selec t one of them. Security Ga teway The IP address or domai n name of the V PN server. Local Netwo rk Enter the local (LAN) s ub net and m ask. (ex. 1 92.168.0. 0/2[...]

  • Page 102

    101 Advanced This page allows you to configure advanced VPN settings. Advanced NAT Trave rsal E nabling N AT Trave rsal allow IPSec traffic from t his e ndpoint to traverse t hrough the translation proc ess durin g NAT . The remote VPN endpoint must also su pport t his feature and it must be en abled to func tion properly ov er the VP N. Dead Peer [...]

  • Page 103

    102 10.1.2. L2TP over I PSec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high le vel of security to protect data. You ca n use this type of secure connection for small or remote office cli ents that need access to the corporate network. You can also use L2TP over IPSec VPNs for routers at re[...]

  • Page 104

    103 L2TP L2TP Setting Authenticatio n Select th e desired authenticat ion protocol (PAP, C HAP, Auto). Select Auto by de fault. User Name Enter the usern ame for auth entication . Password Enter the passwo rd for aut henticati on.[...]

  • Page 105

    104 Network Network Server IP Enter the VP N Server IP addre ss. Remote I P Range Assign a rang e of IP ad dresses . The assigne d IP r ange sh ould be on the sam e IP netw ork but not the in the same range as your DHCP IP range.[...]

  • Page 106

    105 11.3. Wizard You can use W izard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then cli ck Next button to next page.[...]

  • Page 107

    106 3. You can sele ct [IPSec] or [L2TP over IPSec] in this page then click Nex t button to next page. If you s elect [IPSec] then go to s tep 3.1. If you select [ L2TP over IPSec] then go to s tep 3.2. 3.1 IPSec You can sele ct [Client to Site] or [Si te to Site] in this page then click Nex t button to next page. Note. If you sel ect [Client to Si[...]

  • Page 108

    107 Enter the Security Gate way and remote network. Then click Next button to next page.[...]

  • Page 109

    108 3.2 L2TP over IPSec Enter the username, pa ssword and VPN server IP setting. Then cl ick Next button to next page.[...]

  • Page 110

    109 4. Enter the shared key for the VPN connection. 5. Setup successf ully, enable this policy immediately. If you don’t want enable this policy, you can un-tick the box. Then click Apply button to apply the settings.[...]

  • Page 111

    110 How to establish a L2 TP over IPSec VPN con nection on Win dows XP 1. Click Start button and open C ontrol Panel. 2. Click [Network Connections], double click [New Connection Wizard] then click Nex t button.[...]

  • Page 112

    111 3. Select [Connect to the netw ork at my workplace ] then click Next button. 4. Select [Virtual Private Network connection] then cl ick Next button.[...]

  • Page 113

    112 5. Enter the [Company N ame] then cl ick Next button. 6. Select [Do not dial the initial connection] then click Next button.[...]

  • Page 114

    113 7. Enter the VPN se rver IP address then click Next button. 8. Select [Do not use my smart card] then cli ck Next button.[...]

  • Page 115

    114 9. Click Finish button to c omplete the wizard. 10. Click Properities button.[...]

  • Page 116

    115 11. I n Security, se lect [Advanced (custom settings)] then cl ick Settings button. 12. Check [Unencrypted password (PAP)] and [Challenge Handshake Authentication Protocol (CHAP)] then cl ick OK button.[...]

  • Page 117

    116 13. Click [IPSec Settings] then tick [Use pre-shared key for authenticati on], Enter the Key then click OK button. 14. I n Networking, se lect [L2TP IPSec VPN] then click OK button.[...]

  • Page 118

    117 15. Click Connect button to connect VPN connection. 16. You can see the VPN Connection has been established.[...]

  • Page 119

    118 How to establish a L2 TP over IPSec VPN con nection in Windows 7 1. Click Start button and open C ontrol Panel. 2. Click [View Ne twork Status and Tasks] then [Set up a new connection or network][...]

  • Page 120

    119 3. Click [Connect to a w orkplace] then [Use my Internet connection (VPN)] 4. Enter the VPN se rver IP address: [ Internet address ], [ Destination name ] and tick [ Don’t connect now; just se t it up so I can connect later], then cli ck the Next button.[...]

  • Page 121

    120 5. Enter the correct User n ame and Password then click the Create button. 6. Click the Close button to close the V PN connection setting.[...]

  • Page 122

    121 7. Click [Change adapter s ettings] i n Step 2, then select VPN Conne ction and click [Change settings of this connection] 8. Change Type of VPN to [Layer 2 Tunneling Protocol w ith IPSec (L2TP/IPSec)] and che ck [Unencrypted password (PAP)] i n Security.[...]

  • Page 123

    122 9. Click the Adv anced settings button and sel ect [Use preshared key for authentication] and e nter the correct key . Then click OK button.[...]

  • Page 124

    123 10. Dou ble click the VPN Connection then c lick the Connect button. 11. You can see the VPN Connection has been established.[...]

  • Page 125

    124 12. Tools This section all ows you to configure some device system settings. 12.1. Admin This page allows you to change the sys tem password and to configure remote manage ment. Change P assword Old Passw ord: Enter the cu rrent passwo rd. New Passw ord: Enter your new password . Repeat New Passw ord: Enter your new password again for v erifica[...]

  • Page 126

    125 12.2. Time This page allows you to set the sys tem time. Time Time Setup : Select th e method you w ant t o set the t ime. Time Zone: Selec t the tim e zone for your current loc ation. NTP Time S erver: Enter the addres s of the Network Ti me Protoc ol (NTP) Server to a utomati call y synchronize with a server on the Internet. Daylight Savi ngs[...]

  • Page 127

    126 12.3. Dynamic DNS (DDNS) This free servic e is very useful when combined with the Virt ual Server feature. It allows Internet users to connect to y our Virtual Servers using a URL, rather than an IP Address . This also solve s the problem of having a dynamic IP address. W ith a dynamic IP addres s, your IP address may c hange whenever you conne[...]

  • Page 128

    127 12.4. Power This page allows you to Enable or Disable the wireless LAN power s aving features.[...]

  • Page 129

    128 12.5. Diagnosis This page allows you determine if the WIRELESS ROUTER devi ce has an active Internet connec tion. Diagnosis Address to Ping: Enter the IP add ress y ou li ke to see i f a successfu l connec tion can b e made. Ping Result: The results of the Ping te st.[...]

  • Page 130

    129 12.6. Firmware The firmw are (software) in the W IRELESS ROUTER device can be upgraded using your Web Brows er. To perform the Firm ware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade f ile. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Apply button to commence the firm[...]

  • Page 131

    130 12.7. Back-up Back-up Restore to f actory default: Restores the device t o factory d efault settin gs. Backup Set tings: Save the cur rent configu ration s ettings to a file. Restore Set tings: Restores a previ ously sa ved configurati on file. Click Brows e to selec t the fil e. Then Uplo ad to lo ad the set tings.[...]

  • Page 132

    131 12.8. Reset In some circums tances it may be re quired to force the device to reboot.[...]

  • Page 133

    132 Appendix A – FCC Interferen ce Stat ement Federal Communi cation Commission Inter ference S tatemen t This equipment has been tested and found to comply with the limits for a Class B digital de vice, pursuant to Par t 15 of th e FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential[...]

  • Page 134

    133 IMPORTANT NOTE: FCC Radiatio n Expos ure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your bod y. We declare that the product is limited in CH1~CH11 by specified firmwa re con[...]

  • Page 135

    134 Appendix B – IC Interference Statement Industry Canada state ment: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to th e following two conditions: (1) This device may not cause harmfu l interference, and (2) t his device must acc ept any interference r eceived, including inte rference that may cause un d[...]