CWR-854 54Mbps Wireless-G Router User’s Guide 1
1 INTRODUCTION ..................................................................................................................................... 3 INSTALLING YOUR ROUTER ....................................................................................................................... 3 SYSTEM REQUIREMENTS .......................................................................................................................... 3 INSTALLATION INSTRUCTIONS .............................................
1 Introduction Installing Your Router In this chapter, you’ll learn how to connect your router. System Requirements ․One or more PCs (desktop or notebook) with Ethernet interface ․Broadband Internet access ․Ethernet cables ․Wireless interface (if planning to use wireless functions) Installation Instructions Connecting the Router: 1. Make sure all systems are turned off, including the router, PC(s), and the cable or DSL modem (if applicable). 2.
5. Turn on your PC(s).
2 Preparing Your Network Preparing Your Network In this chapter, you’ll learn what to do before configuring your router. Before you can configure your router, you need to set up all the computers on your network for TCP/IP networking.
3. Click the IP Address tab. Select Obtain an IP address automatically 4. Now click the Gateway tab, and verify that the Installed Gateway field is Blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Check for the files at c:\windows\options\cabs, or insert your Windows CD-ROM into your CDROM drive and check the correct file location, e.g., D:\win98, D:\win9x, etc. (if “D” is the letter of your CD-ROM drive). 6.
2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button. 4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
5. Restart your computer. The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1. Click the Start button and then the Control Panel icon. Click the Network and Internet Connections icon. Then click the Network Connections icon. 2.
3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
3 Configuring this Wireless-G Router In this chapter, it describes how to use the web management tool, a web browser-based utility that allows you to remotely configure and manage this Wireless-G Router. Open your Web browser and type the IP address “http://192.168.1.254” and press . Enter the User name and Password when prompted, the default User name is “root”, and the default Password is “1234”. 3.
3.1.1 Time Zone Settings The first step in Setup Wizard is Time Zone Settings. Users can synchronize the local clock to an available NTP server. You can enable NTP client update and select the correct Time Zone. - Enable NTP client update: enable this time zone update function Time Zone Select: Select the time zone of the country where this router is located. NTP server: you can select the existing NTP server by clicking the down arrow or manually assign time server address.
- IP Address: Enter IP address for this Wireless-G Router. Subnet Mask: Enter the subnet mask for this Wireless-G Router. Cancel: To skip the current settings and jump to the Setup Wizard page. Back: To skip the current settings and go back to the last page. Next: Go to the next page. After typing in the IP Address and Subnet Mask, click on “Next” button. You will enter the Wireless Basic Settings page. 3.1.3 WAN Interface Setup After specifying your LAN settings, click on “Next” button.
- - - - Operating Band: 802.11B/G, 802.11G or 802.11B Operating Mode: AP, Client, WDS, and AP+WDS. Network type: when operating mode is “Client” mode, users can select the network type as “infrastructure” or “Adhoc”. SSID: The SSID differentiates one WLAN from another, therefore, all wireless access points/routers and all wireless devices attempting to connect to a specific WLAN must use the same SSID.
- IP Address: Enter IP address for this Wireless-G Router. Subnet Mask: Enter the subnet mask for this Wireless-G Router. Default Gateway: Enter Default Gatewayfor this Wireless-G Router. 802.1d Spanning Tree: On LAN side, it supports Spanning Tree Protocol to avoid physical loop problem. Clone MAC Address: You can assign a new MAC address for external DHCP server to be cloned. Apply Changes: Click on “Apply Changes” to confirm to logout right now. Reset: Click on “Reset” to undo your changes.
- - - WAN Access Type: select the Static IP connection IP Address: this is the IP address that your ISP has given you. Subnet Mask: enter the subnet mask provided by your ISP Default Gateway: enter the default gateway provided by your ISP DNS1: enter this Primary DNS provided by your ISP DNS2: enter this Secondary DNS if necessary. DNS3: enter this Tertiary DNS if necessary.
- - - WAN Access Type: select the DHCP Client connection Attain DNS Automatically: enable to attain DNS from your ISP automatically. Set DNS Manually: allow user to set the DNS manually. DNS1: enter a specific DNS to this Primary field. DNS2: enter this Secondary DNS if necessary. DNS3: enter this Tertiary DNS if necessary. Clone MAC Address: if your ISP blocked the MAC address of a network card, you may use “Clone MAC Address to” duplicate the MAC address to the MAC address in the WAN port.
- - - - WAN Access Type: select the PPPoE connection User Name: enter the User Name provided by your ISP Password: enter the Password provided by your ISP Connection Type: there are three connection type – continuous, connect on demand and manual. Continuous: the connection to the ISP is already connected. Connect On Demand: the connection to the ISP is build only your application is active to connect the Internet. Manual: the connection to the ISP is build if you set manually.
- - in the WAN port. Enable UPnP: It allows to enable or disable uPNP feature here. After you enable the uPNP feature, all client systems that support uPNP, like Windows XP, can discover this router automatically and access the Internet throuth this router without any configuration. Apply Changes: Click on “Apply Changes” to confirm to logout right now. Reset: Click on “Reset” to undo your changes. Help: To request help information. 3.3.4 PPTP PPTP stands for “Point-to-Point Tunneling Protocol”.
- - - - MTU Size: MTU is the Maximum Transmission Unit. It specifies the largest packet size permitted for Internet transmission. Keep the default setting, 1452, to have the router select the best MTU for your Internet connection. Attain DNS Automatically: enable to attain DNS from your ISP automatically. Set DNS Manually: allow user to set the DNS manually. DNS1: enter a specific DNS to this Primary field. DNS2: enter this Secondary DNS if necessary. DNS3: enter this Tertiary DNS if necessary.
- - - - - Mode: This Wireless-G Router supports four operating modes: AP, client, WDS, and AP+WDS. Network Type: when operating mode is Client mode, users can select the network type as “Infrastructure” or “Adhoc” mode. SSID: The SSID differentiates one WLAN from another, therefore, all wireless access points/routers and all wireless devices attempting to connect to a specific WLAN must use the same SSID. It is case-sensitive and must not exceed 32 characters.
- Refresh: Click on “Refresh” button to show the latest information. Close: Click on “Close” button to close this window. 3.4.2 Advanced Settings In Advanced Settings page, more 802.11 related parameters are tunable. - Authentication Type: There are three Authentication Type- Open System, Shared Key, and Auto Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network.
- - - - - Threshold value to split the packet. The value can be set from 256 to 2346. The default value is 2346. RTS Threshold: RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. “Hidden Node” is a situation in which two stations are within range of the same wireless access point/router, but are not within range of each other. Therefore, they are hidden nodes for each other.
- - - - Encryption: “None” means no encryption being selected. Users can enable the 802.1x Authentication and set the RADIUS server authentication parameters – port, IP address and Password. Use 802.1x Authentication: It is a port access protocol for protecting networks via authentication. If a wireless user is authenticated via 802.1x for network access, a virtual port is opened on the access point allowing for communication.
- - Encryption: Select “WEP” (Wired Equivalent Privacy) encryption type. Set WEP Key: Only valid if not select “Use 802.1x Authentication” is not selected. Use 802.1x Authentication: When this feature is enable, please enter the parameters of “RADIUS Server” and select the encryption length to be “WEP 64bits” or “WEP 128bits”. Authentication RADIUS Server: You must enter this RADIUS Server’s Port number, IP address and Password correctly. Apply Changes: Click on “Apply Changes” to save the setting.
- Key Length: You can choose either 64-bit or 128-bit as the encryption key. Key Format: You can select hexadecimal or ASCII mode as the format of input value. Default Tx Key: You can select the default encryption Key (Key1 to Key4) being transmitted. Encryption Key 1: enter any key code for this Encryption Key 1. Encryption Key 2: enter any key code for this Encryption Key 2. Encryption Key 3: enter any key code for this Encryption Key 3. Encryption Key 4: enter any key code for this Encryption Key 4.
- - - - Encryption: “WPA” stands for Wi-Fi Protected Access. There are three encryption modes – TKIP, AES and Mixed. TKIP: Temporal Key Integrity Protocol AES: Advanced Encryption Standard Mixed: WPA2 Mixed mode operation permits the coexistence of WPA and WPA2 clients on a common SSID. WPA2 Mixed Mode is a Wi-Fi Certified feature. During WPA2 Mixed Mode, the Wireless-G Router advertises the encryption ciphers (TKIP, CCMP, other) that are available for use.
“Delete Selected” button. - - - Wireless Access Control Mode: There are three types of access control options: Disable: disable this control feature. Allow Listed: If you choose “Allow Listed”, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Wireless-G Router. Deny Listed: When “Deny Listed” is selected, these wireless clients on the list will not be able to connect to the Wireless-G Router.
set these Wireless-G Routers in the same channel and set MAC address of all other Wireless-G Routers which you want to communicate with in the table and then enable the WDS. - - Enable WDS: enable the WDS function. Add WDS AP: you need to fill out the other AP’s MAC address which you want to communicate. Comment: you can add any comment in this blank.
- Show Client button: A table shows the assigned IP address, MAC address and time expired for each DHCP leased client. 3.5 Firewall 3.5.1 IP Filtering You can set up the filter against the IP addresses to block specific users from accessing the Internet. - Enable IP Filtering: Enable the IP Filtering function. Local IP Address: Enter the private IP address that you want to block accessing the Internet. Protocol: This allows you to select UDP, TCP or both protocol types you want to block.
- Delete All: Allow user to delete all Local IP Address in the Current Filter Table. Reset: Click on “Reset” to undo your changes. Help: To request help information. 3.5.2 Port Filtering The Port filtering can restrict certain type of data packets from your LAN to Internet through the router. - Enable Port Filtering: Enable the Port Filtering function. Port Range: Enter the Port range 1 to 65535 those you want to block accessing the Internet.
- Enable MAC Filtering: Enable the MAC Filtering function. MAC Address: Enter the MAC Address that you want to block accessing the Internet. Comment: Allow user to add any description to this MAC Address. Apply Changes: Click on “Apply Changes” to save the setting. Current Filter Table: A table shows the current MAC Address filtering. Delete Selected: Allow user to delete any MAC Address in the Current Filter Table. Delete All: Allow user to delete all MAC Address in the Current Filter Table.
- - Enable IPSec VPN: to enable IPSec VPN function. Enable NAT Traversal: enable this function to detect NAT gateways between IIPSec hosts and to negotiate the use of UDP encapsulation of IPSec packets. Generate RSA Key: here you can generate a new public key. Show RSA Public Key: to show the new public key. Current VPN Connection Table: a table shows the current VPN connection status. Edit: you can edit any VPN connection in the Current VPN Connection Table.
When you click on the Edit button, the VPN Setup window will display as below: - Enable Tunnel 1: Enable the IPSec VPN tunnel. Connection Name: Specify a name for the VPN connection. Auth Type: Allow user to choice the method of authenticating gateways for Diffie-Hellman key negotiation. Local Site: You can select the Single Address or Subnet Address for the secured local IP. Local IP Address/Network: Enter IP address for the local network for VPN connection.
- Remote Secure Gateway: Enter remote site gateway. Remote IP Address/Network: Enter remote site IP Address (for Single Address) or IP network (for Subnet Address). Remote Subnet Mask: Enter remote site subnet mask. Local ID Type: Specify the local ID type, which is supported IP, DNS and Email. Local ID: Specify a local ID to be used for setup VPN connection. Remote ID Type: Specify the remote ID type, which is supported IP, DND and Email. Remote ID: Specify a remote ID to be used for setup VPN connection.
Phase 1 - Negotiation Mode: This negotiation is a main process to build a VPN connection in phase 1. - Encryption Algorithm: There are two encryption algorithm – 3DES and AES128. - Authentication Algorithm: There are two authentication algorithm – MD5 and SHA1. - Key Group: There are three Key groups to be defined – DH1, DH2 and DH5. - Key Life Time: Define the life time for this key.
- Help: To request help information. 3.7 Advanced 3.7.1 Port Forwarding The Port Forwarding allows you to re-direct a particular range of service port numbers (from the WAN port) to a particular LAN IP address. It helps you to host some servers behind the router’s NAT firewall. - - Enable Port Forwarding: IP Address: This is the private IP of the server behind the NAT firewall. (Note: You need to give your LAN PC clients a fixed/static IP address for Port Forwarding to work properly.
3.7.2 DMZ DMZ feature allows one local user to be exposed to the Internet for use of a special-purpose service such as Internet gaming or videoconferencing. It will forward all the ports at the same time to one PC. The port forwarding feature is more secure because it only opens the ports you want to have opened, while DMZ opens all the ports of one computer, exposing the computer so the Internet can see it. - - Enable DMZ: Enable one PC to be exposed to the Internet.
- Enable DDNS: Enable this DDNS function. Service Provider: Select the DDNS Service Provider. Domain Name: Enter the Service Provider Domain Name if needed. Username/Email: Enter the user name or Email address required to log into the DDNS account Password/Key: Enter the password or Key number required to log into the DDNS account. Apply Changes: Click on “Apply Changes” to save the setting. Reset: Click on “Reset” to undo your changes. Help: To request help information. 3.8 Management 3.8.
System - Uptime: The date/time shows how long the router power on. - Firmware Version: Show the current firmware version. Wireless Configuration - Mode: Shows the current operating modes. - Band: Shows the current operating band. - SSID: Shows the current SSID. - Channel Number: Shows the current operating channel. - Encryption: Shows the current encryption mode. - BBSID: Shows the current BBSID on your Wireless LAN port.
- DHCP Server: Shows the DHCP server status. - MAC Address: Shows the MAC address on your LAN port. WAN Configuration - Attain IP Protocol: Shows the IP protocol is being used on WAN. - IP Address: Shows the router’s WAN port IP address - Subnet Mask: Shows subnet mask on your public network. - Default Gateway: Shows the defined Default Gateway on your public network. - MAC Address: Shows the MAC address on your WAN port. 3.8.2 DHCP Settings There is a DHCP server running on LAN interface.
- Current Time: Show the current time of this router. Time Zone Select: Select the time zone of the country where this router is located. Enable NTP client update: enable this time zone update function NTP server: you can select the existing NTP server by clicking the down arrow or manually assign time server address. Apply Changes: Click on “Apply Changes” to save the setting. Reset: Click on “Reset” to undo your changes. Refresh: Get the date/time from NTP server again. Help: To request help information.
- name, the password login protection will be disable.) New Password: Enter the new login password. The passwords can contain 1 to 30 characters and/or digits, and are case sensitive. Confirmed Password: Enter the new login password again. Apply Changes: Click on “Apply Changes” to save the setting. Reset: Click on “Reset” to clear all fields. Help: To request help information. 3.8.5 Upgrade Firmware This wireless router allows you to easily upgrade the firmware.
- Reset: Click on “Reset” to undo your changes. Help: To request help information. 3.8.7 Save/Reload Settings You can create a backup file that contains your current router settings. After you create a backup file, you can use it to restore your settings in the event you need to reset the router’s defaults. - Save Settings to File: Click on “Save” button to save the settings to a file “config.dat”. - Load Settings from File: Enter the location and name “config.dat” of the file which was saved.
- Apply Changes: Click on “Apply Changes” to confirm to reset this router. Help: To request help information. 3.9 Event Log This wireless router supports System Log information. This data is useful for monitoring and troubleshooting the network. - Enable Log: Enable the Log function. Wireless only or system all: Select to log the wireless events only or all system events. Enable Remote Log: Enable the Remote Log function.
- running a syslog daemon. Apply Changes: Click on “Apply Changes” to save the setting. Refresh: Get the log data again. Clear: Click on “Clear” to clear all log data in the message box. Help: To request help information.
Appendix A: Troubleshooting Symptom Inability to connect physically Possible Causes Things to Do • Verify that the wireless • Incorrect or incompatible wireless network configuration. network configurations between the wireless client For example, shared key authentication is configured on and wireless AP/Router are the wireless AP/Router and the compatible. wireless client is attempting •Using utility “Ipconfig”: open system authentication 1.
Intermittent connectivity • Cable failure • Check the “Link” LED. Make sure that your Ethernet cables connect properly. • AP/Router is not power on • Check the “Power” LED. Make sure that you've plugged in the power cord. • IEEE 802.1X authentication is enabled on the wireless client and is not enabled on the wireless AP/Router • The symptom of this issue is when the wireless client loses connectivity every 3 minutes or so. Disable the authentication feature on the wireless client.
outdated wireless network adapter driver • With the Services snap-in, ensure that the Wireless Zero Configuration or Wireless • On a laptop computer, the Configuration services are wireless radio button might be configured to start in the off position automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless Configuration service not initializing over that interface.
Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs. This technology, fuelled by the emergence of cross-vendor industry standards such as IEEE 802.
Figure A2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Figure A3: Software Access Point. Wireless connected computers using a Software Access Point. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802.11 standard they can inter operate.
also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
is analogous to Ethernet cabling, the answer to this question becomes clear. To share an Internet connection across a LAN you need two things: (1) an Internet sharing hardware device or software program (2) connection to a LAN If your LAN is wireless, the same criteria apply. You need a hardware or software access point and a wireless LAN. Any computer equipped with a wireless network card running suitable Internet sharing software can be used as a software access point.
produces secure scrambled text. Decryption is the opposite of encryption; it is the mathematical operation that transforms cipher text to standard text. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers, in combination with the advent of computer hacking, has made information and network security an important issue.
Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses. Q23: Where is the Router installed on the network? Ans: In a typical environment, the Router is installed between the cable/DSL modem and the LAN.