Go to page of
Similar user manuals
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Sitecom WL-368, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Sitecom WL-368 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Sitecom WL-368. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Sitecom WL-368 should contain:
- informations concerning technical data of Sitecom WL-368
- name of the manufacturer and a year of construction of the Sitecom WL-368 item
- rules of operation, control and maintenance of the Sitecom WL-368 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Sitecom WL-368 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Sitecom WL-368, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Sitecom service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Sitecom WL-368.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Sitecom WL-368 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
WL -351 Wireless Gigabit R outer 300N X3 WL -368 Wireless Gigabit R outer 300N X2 (802.11bgn)[...]
-
Page 2
User Manual T A B LE OF C ONTENTS ................................................................................................................... ..1 ................................................................................................................... ..1 1KEY FEA T URES ............................................................[...]
-
Page 3
Introduction Congratulations on your purchase o f the WL - 351/368 Wireless Gigabit Router 300N. The WL - 351/368 is compliant with 802.11n and up to 6 times faster than standard 802.11g based routers while still being compatible with 802.11g & 802.11b gadgets. The WL -351/368 is not only a Wireless Access Point, but also doubles as a 4-port fu[...]
-
Page 4
1 Key Features F eatures Advantages Incredible Data Rate up to 300Mbps* Heavy data payloads such as MPEG video streaming IEEE 802.11n Compliant and backward compatible with 802.11b/ g Fully Interoperable with IEEE 802.11b / IEEE802.11g compliant devices with legacy protection Four 10/100/1000 Mbps gigabit Switch P orts (Auto-Crossover) Scalability,[...]
-
Page 5
2 Package Contents Open the p ackage carefully , and make su re that none o f the items l isted below are missing. Do not discar d the packing mater ials, in case of re turn; the unit must be shipped back in its original package. 1. The WL - 351/368 Router 2. A 220V~240V Power Adapter 3. A Quick Install Guide 4. A CD (User’s Manual) 5. A W arran [...]
-
Page 6
3 Product Layout Port Description Power connector Connect the 12V DC adapter to this port LAN ( Y ellow ) Connect your PC’s or network devices to this port W AN ( Blue ) Connect your ADSL/Cable modem to this port[...]
-
Page 7
Backlabel The backlabel describes the IP addre ss, login details, SSID , security code and WPS button functionality . Button Description WPS BUTTON Press 2 seconds for W PS mode Press 10 seconds to reset the router Press 15 Seconds to reset the rout er to factory defaults.[...]
-
Page 8
4 Network + System Requirements T o begin using the WL-351/368, make sure you meet the following as minimum requirements: • PC/Notebook. • Operating System – Microsoft W indows XP/2000/VIST A • 1 Free Ethernet port. • WiFi card/USB dongle (802.1 1 b /g/ n) – optional. • External xDSL (ADSL) or Cable modem with an Ethernet port (RJ-45)[...]
-
Page 9
6 Setup LAN, W AN W AN connection: LAN connection:[...]
-
Page 10
7 PC Network A dapter setup Windows XP • E nter [Start Menu] select [Control panel] select [Network]. • Select [Local Area Connection]) icon=> select [properties][...]
-
Page 11
• Select [Internet Protocol (TCP/IP)] =>Click [Properties]. • Select the [General] tab. a. The WL -351/368 supports [DHCP] func tion, please select both [Obtain an IP add ress automatically] and [Obtain DN S server ad dress automatically].[...]
-
Page 12
Windows Vi sta • E nter [Start Menu] select [Control panel] select [View network status and tasks] -> select [Manage network co nnections]. • Select [Local Area Connection]) icon=> select [properties][...]
-
Page 13
• Select [Internet Protocol V ersion 4 (TCP/IPv4)] =>Click [Properties]. • Select the [General] tab. The WL -351/368 supports [ DHCP] f unction, please select both [Obtain an IP address automatically] and [Obtain DN S server address automatically].[...]
-
Page 14
8 Bring up the WL-351/368 Connect the supplied power-adapter to the power i nlet port and connect it to a wall o utlet. The WL - 351/368 automatically enters the s elf-test phase. During self- test phase, the P ower LED will be lit co ntinuously to indicate that this product is in normal o per ation. 9 Initial Setup WL-351/368 LOGIN procedure 1. OP[...]
-
Page 15
3. T ype user name and password (default is admin/admin). 4. Click OK . 5. Y ou will see the home page of the WL - 351/368. The System status section allows you to monitor the current status of your router the UP time, hardware information, serial number as well as firmware version information is displayed here.[...]
-
Page 16
L A N settings The LAN tab g ives you the opportunity to change the IP se ttings of the WL - 351/368. Click <Apply> at the bottom of th is screen to save an y chan ges. IP addr ess 192.168.0.1. It is the router’s LAN IP address (Y our LAN clients default gateway IP address). IP Subnet Mask 255.255.255.0 Specify a Su bnet Mask for your LAN s[...]
-
Page 17
Lease Time F orever . In the Lease Time se tting you can specify the time period that the DHCP lends an IP address to your LAN clie nts. T he DHCP will change your LAN client’s IP address when this time threshold period is reached. IP Address Pool Y ou can select a par ticular IP addre ss range for your DHCP server to issue IP addresses to your L[...]
-
Page 18
Device Status View the Broadband router’s current configuration settings. Device Status displays t he configuration s ettings you’v e configured in t he Wizard / Basic Settings / Wireless Settings section.[...]
-
Page 19
Internet Status This page displa ys whether the W AN port i s connected to a C able/DSL connection. It also displays the router’s WA N IP address, S ubnet Mask, and ISP Gateway as well as MAC address, the Primary DNS. Press Renew button to renew your WAN IP address.[...]
-
Page 20
DHCP Client Status DHCP This page shows all DHCP clients (LAN PCs) curren tly co nnected to your network. The table shows the assigned IP address, MAC address and e xpiration time for each DHCP leased cl ient. Use the Refresh button to update t he available information. Y ou can check Enable Static DHCP IP . It is possible to add mo re static DHCP [...]
-
Page 21
WL-351/368 Log View the operati on log of the WL-351/368 . This page shows the current system log of the B roadband router . It displays any e vent occurred after system start up. At the bottom of the page, the system log can be sav ed <Save> to a local file for further processing or the system log can be cleared <Clear> o r it can be r[...]
-
Page 22
WL-351/368 Statistics Shows the counters of packets sent and received on WAN, LAN & WLAN.[...]
-
Page 23
10 Configuration Wizard Click Wizard to configure the router . The Setup w izard will now be displayed; check that the modem is connected and click Next. Select your country from the Country list. Select your internet provider . Click Next. Depending on the chosen provider , you may need to enter your user name and password, MAC address or hostname[...]
-
Page 24
Click APPLY to complete the configuration.[...]
-
Page 25
1 1 W ireless Settings Y ou can set par ameters that are used for the wireless stations to connect to this router . The par ameters include Mode, ESSID, Channel Number and Associated Client. Wireless Function Enable or Disable Wireless func tion here. Click Apply and wait for module to be ready & loaded.[...]
-
Page 26
Basic Settings Mode Allows you to set AP or WDS mode. Band A llows you to set the AP fixed at 802.11b or 802.11g mode. Y ou can also select B+G mode to allow 80211b and 802.11g clients at the same time. Enable SSID # Allows you to enable up to four SSIDs for this ro uter . SSID This is the name of the wireless sign al which is broadcasted. All the [...]
-
Page 27
A d vanced Settings This tab allows you to set the advanced wireless options. The options included are Authentication T ype, Fragment Threshold, RT S Threshold, Beacon Interval, and Pre amble T ype. Y o u should not change these parameters unless you know what effect the changes will have on the router . Authentication T ype There ar e two au thent[...]
-
Page 28
Beacon Interval is the interval o f time that this wireless router broadcasts a beacon. A Beacon is used to synchronize the wireless network. Data Rate The “Data Rate” is the rate that t his acce ss point uses to transmit data packets. The access point w ill use the highest possible selected transmission r ate to transmit the data packets. N Da[...]
-
Page 29
Security This Acce ss Point provides complete wireless LAN security functions, included are WEP , IEEE 802.11x, IEEE 802.11x with WEP , WP A with pre-shared key and W PA with RADIUS. With these security functions, y ou can pre vent your wireless L AN from illegal access. Please make sure your wire less stations use the same security function, and a[...]
-
Page 30
Disable When you choose to disable e ncryption, it is very insecure to operate the WL - 351/368. Enable 802.1x Auth IEEE 8 02.1x is an authentication protocol. E very user must use a v alid account to login to this Access P oint before acce ssing the wireless LAN. The authentication is processed by a RADIUS server . This mode o nly authenticates us[...]
-
Page 31
WEP When you select 64-bit or 1 28-bit WEP key , you have to enter WEP keys to encrypt d ata. Y ou can generate t he k ey by y ourself an d e nter i t. Y ou can enter four WEP keys and select one o f them as a default key . Then the router can receive any packets encrypted by one of the four keys. Key Length Y ou can select the WEP key length for e[...]
-
Page 32
WP A Pre-shared Ke y Wi-Fi Protected Access (WPA) is an advanced security standard. Y ou can use a pre-shared k ey to authenticate wireless st ations and e ncrypt d ata d uring communication. It uses TKIP or CCMP (AES) to chan ge the encryption key frequently . So the e ncryption key is not easy to be crack ed by hackers. This is the best security [...]
-
Page 33
ACL This w ireless r outer supports MAC Ad dress Co ntrol, w hich prevents unauthorized clients from accessing your wireless network. Enable wireless access control Enables the wireless access control function Adding an address into the list Enter the "MAC Ad dress" and "Comment" of the wireless station to be ad ded and then cli[...]
-
Page 34
WPS Wi-Fi Protected Setup (WPS) is the simplest way to establish a connection between the wire less clients and the wireless router . Y ou don’ t have to select the encryption mode and fill in a long encryption passphrase every time w hen you try to setup a wire less connection. Y ou only ne ed to press a button on both wireless client and wirele[...]
-
Page 35
WPS Current Status If the wire less s ecurity (encryption) f unction o f this wireless router is properly set, you’ll see a ‘ Configure d’ message here. Otherwise, you’ll see ‘UnConfigured’ . Self Pin Code T his is the WPS PIN code of the wireless router . Y ou may need this information when connecting to o ther WPS-enabled wireless dev[...]
-
Page 36
12 Firewall Settings The Broadband router provides extensive f irewall protection by restricting connection par ameters, thus limiting the risk of hack er attacks, and defending against a wide array o f common In ternet attacks. However , for applications that require unrestricted acce ss to the Internet, y ou can co nfigure a specific client/serve[...]
-
Page 37
DMZ If you have a clien t PC that can not run an Internet application (e.g. Games) properly from b ehind the NA T f irewall, t hen you can o pen up the f irewall restrictions to unrestricted two-way Internet acce ss by defining a DMZ Host. The DMZ function allows you to re-direct all packets going to y our W AN port IP ad dress to a particular IP a[...]
-
Page 38
Denial of Service (DoS) The Broadband ro uter's firewall can block common hacker attacks, inc luding Denial of Service, Ping of Death, Po rt Scan and Sync Flood. If Internet attacks occur the router can log the events. Ping of Death Protections from Ping of Death attack Discard Ping From WAN The router’s WA N port w ill not respond to any Pi[...]
-
Page 39
Access Y ou can r estrict u sers f rom acce ssing c ertain In ternet ap plications/services (e.g. Internet we bsites, email, FT P etc.), Acce ss Control allows users to define the traffic type permitted in y our LAN. Y ou can control which PC cl ient can have access to these services. Deny If you select “Deny” then al l clients will b e allowed[...]
-
Page 40
Filter client P C by MAC Check “ Enable MAC F iltering” to e nable MAC Filtering. Add PC Fill in “Client P C MAC A ddress” and “Comment” of the PC t hat is allowed t o acce ss the Internet, and then cl ick “ Add” . If you find any t ypo before ad ding i t and want to retype again, just click "Reset" and the fields wil l be[...]
-
Page 41
URL block Y ou can block access to some W eb sites from particular PCs by entering a fu ll URL address or just keywords of the W eb site. Enable URL Blocking Enable/disable URL Blocking Add URL Keyword Fill in “URL/K eyword” and the n click “Add” . Y ou can enter the full URL address or the keyword of the web site you want to block. Remove [...]
-
Page 42
13 A dvanced Settings Network Address T ransl a tion (NA T) allows multiple users at your local site to access the Internet through a single Public IP Address or multiple Public IP Addresses. NA T pr ovides Firewall protect ion from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Public IP Addresses for key se rvi[...]
-
Page 43
Port Forwarding Port F orwarding allows y ou to re-direct a p articular range of service p ort numbers (from the Internet/WAN P ort) to a particular LAN IP address. It helps you to host servers behind the router NA T firewall. Enable Port Forwardi ng En able P ort Forwarding Private IP This is the private IP of the server behind the NA T firewall. [...]
-
Page 44
Remove Port Forwarding If you want to remov e a Port Forw arding setting from the "Current P ort Forwarding T able", select the Port Forwarding setting that you want to remove in the table and then click "Delete Se lected". If you want to remove all Port For warding settings from the table, just click "De lete All" but[...]
-
Page 45
Virtual Server Use the V irtual Serv er function when y ou w ant different s ervers/clients in your LAN t o handle dif fere nt service/Internet app lication type (e.g. E mail, FTP , W eb server etc.) from the Internet. Computers use nu mbers called por t numbers to recognize a particular service/Internet application type. The Virtual Server al lows[...]
-
Page 46
Add V irtual Server Fill i n t he "Priv ate IP ", " Private P o rt", "T ype", “ Public Port” and "Comment" of the setting to be added and then click "Add". Then this Virtual Server setting will be added into the "Current Virtual Server T able" below . Remove Virtual Server If you want [...]
-
Page 47
Special A pp lications Some applications r equire multiple co nnections, such as In ternet games, video Conferencing, Internet telephony and others. In this sect ion you can configure the router to support multiple connections for these types of applications. Enable T rigger Port Enable the Special Application function. Trigger Port This is the out[...]
-
Page 48
Applications selection. On ce you ha ve selected an ap plication, select a location (1-10) in the Copy to se lection box and then click the Copy to button. This will automatically list the Public P orts required for this popular application in the location (1-10) you specified. Add Special A pplication Fill in t he "T rigger P o rt", &quo[...]
-
Page 49
A L G Y ou can select applications that need “ Application Layer Gatew ay” support. Enable select enable “ Application Layer Gateway” , then the router will let the selected application correctly pass through the NA T gatewa y .[...]
-
Page 50
UPNP With UP nP , all PCs in you Intr anet will discover th is router automatically , so you don’ t have to configure y our PC and it can easily access t he Internet through this router . UPnP Feature Y ou can enable or Disable the UPnP feature here. After you enable the UPnP feature, all client systems that support UPnP , like Windows XP , can d[...]
-
Page 51
QoS QoS can let you classify Internet application traffic by source/destinat ion IP address and por t number . Y ou can assi gn priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications g[...]
-
Page 52
Edit a Qo S rule Select the rule you want to edit and click “Edit” , then enter the detail fo rm of the QoS rule. Cl ick “ Apply ” after editing the form and the rule will be saved. Adjust QoS rule p riority Y ou can select the r ule and cl ick “Move Up” to make its priority higher . Y ou also can select the rule and click “ Move Down[...]
-
Page 53
14 T OOLBOX Settings Password change options Y ou can ch ange the p assword required t o log i nto the broadband r outer's system web-based management. By default, the password is: adm in. Passwords can contai n 0 to 12 alphanumeric char acters, an d ar e case sensitive. Current Password Fill in the current password to allow changing to a new [...]
-
Page 54
Tim e Zone The T ime Zone allows your router to base its time on the settings co nfigured here, which will affect functions such as Log entries and Firewall settings. Set Time Zone Select the t ime zone of t he country you are cur rently i n. The router will set its time based o n your selection. Time Server Address Y ou can set an NTP server addre[...]
-
Page 55
Remote Management The r emote management f unction allows y ou t o designate a host in t he Internet t he ability t o co nfigure t he Broadband router from a r emote si te. Enter the designated host IP Address i n the Host IP Address field. Host Address This is the IP address of the host in the Internet tha t w ill have management/configuration acc[...]
-
Page 56
Firmware Upgrade This page allows you to upgrade the router’ s firmware. Firmware Upgrade This tool allows you to upgr ade the Broadband router’s system firmwar e. T o upgr ade the firmware of y our Broadband router , you need to download the firmware file to your local hard disk, an d e nter that file name and path in the appropriate field on [...]
-
Page 57
Backup Settings The Backup screen allows you to save (Backup) the router’s current configuration settings. When you sav e the configuration setting (Backup) you can re -load the sa ved configuration i nto the r outer t hrough t he Restore selection. If ex treme p roblems occur y ou can u se the R estor e t o F actory Defaults selection, this will[...]
-
Page 58
Reset Y ou can reset t he router’ s sy stem should an y p roblem exist. T he r eset function essentially re-boots your router ’ s system.[...]
-
Page 59
DDNS DDNS allows you to map the static domain name to a dynamic IP address. Y ou must get an account, password and your static domain name from the DDNS service providers. This r outer supports DynDNS, TZO and ot her common DDNS service providers. Enable/Disable Enable or disable the DDNS function of this router Provider Select a DDNS service provi[...]
-
Page 60
Parts of the firmwar e o f the WL -351 /368 Wirele ss Broadband router are subject to the GNU general public license. Appendix A: Licensing Information This product includes third-party software licensed under the terms of the GNU General Public License. . Y ou can modify or redistribute this free software under the terms of the GNU General Public [...]
-
Page 61
you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. T o protect your rights, w e need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribut[...]
-
Page 62
licensees extend to the entire whole, and thus to each and every part regardless o f who wrote it. Thus, it is not the intent of this sec tion to claim rights or contest your rights to work written entirely by you; rather , the intent is to exercise the right to co ntrol the distribution of derivative or collective works based on the Program. In ad[...]
-
Page 63
software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent appli cation of that system; it is up to the author/dono r to decide if he or she is willing to d istribute software through any other sy[...]