Firewall Firewall 69 This section is for configuration settings of the Router’s firewall function. Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including Ping of Death (PoD) and Denial of Service (DoS) attacks. You can turn the firewall function off if needed. Turning off the firewall protection will not leave your network completely vulnerable to hacker attacks, but 3Com recommends that you leave the firewall enabled whenever possible.
70 CHAPTER 5: CONFIGURING THE ROUTER To enable the firewall function: 1 Select the level of protection (High, Medium, or Low) that you desire from the Firewall level drop-down menu. 2 Click Apply. ■ For low and medium levels of firewall protection, refer to Figure 56. ■ For high level of firewall protection, refer to Figure 57. Figure 56 Low and Medium Level Firewall Protection Screen When abnormal network activity occurs, an alerting email will be sent out to you.
Firewall 71 Figure 57 High Level Firewall Protection Screen If you select high level of protection, you will need to configure additional parameters for the firewall. ■ Fragmentation half-open wait - Configures the number of seconds that a packet state structure remains active. When the timeout value expires, the Router drops the un-assembled packet, freeing that structure for use by another packet.
72 CHAPTER 5: CONFIGURING THE ROUTER ■ Total incomplete TCP/UDP sessions HIGH - Defines the rate of new unestablished sessions that will cause the software to start deleting half-open sessions. ■ Total incomplete TCP/UDP sessions LOW - Defines the rate of new unestablished sessions that will cause the software to stop deleting half-open sessions. ■ Incomplete TCP/UDP sessions (per min) HIGH - Maximum number of allowed incomplete TCP/UDP sessions per minute.
Firewall Special Applications 73 Special Applications let you choose specific ports to be open for specific applications to work properly with the Network Address Translation (NAT) feature of the Router. Figure 58 Special Applications Screen A list of popular applications has been included to choose from. Select the application from the Popular Applications drop-down menu. Then select the row that you want to copy the settings to from the Copy To drop-down menu, and click Copy To.
74 CHAPTER 5: CONFIGURING THE ROUTER Virtual Servers The Virtual servers feature allows you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be 'seen'.
Firewall 75 3 Specify the public port that will be seen by clients on the Internet, and the LAN port which the traffic will be routed to. 4 You can enable or disable each Virtual Server entry by checking or unchecking the appropriate Enabled checkbox. 5 Click Apply to save the changes for each Virtual Server entry. DMZ If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access.
76 CHAPTER 5: CONFIGURING THE ROUTER PC Privileges The Router can be configured to restrict access to the Internet, email or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. You can define the traffic type permitted or not-permitted to the Internet.
Firewall 77 Figure 62 PC Privileges Add PC Screen 1 Enter a description in the Client PC Description field, and the IP address or IP address range into the Client PC IP Address fields. 2 To bypass the URL Filter and Content Filter, check the corresponding Bypass checkbox. If you check the two options: Bypass URL Filter, and Bypass Content Filter, then the Web sites and keywords defined in this screen will not be filtered out. 3 Select the services to be blocked.
78 CHAPTER 5: CONFIGURING THE ROUTER Schedule Rule The Router can be configured to restrict access to the Internet, email or other network services at specific days and times. Define the time in this screen, and define the rules in the PC Privileges screen (see page 76). Figure 63 Schedule Rule Screen 1 Click Add Rule to add a schedule rule (refer to Figure 64). Figure 64 Add Schedule Rule Screen 2 Enter a name and comment for the schedule rule in the Name and Comment fields.
Firewall URL Filter 79 To configure the URL filter feature, use the table on the URL Filter screen to specify the Web sites (www.somesite.com) and/or keywords you want to filter on your network. For example, entering a keyword of xxx would block access to any URL that contains the string xxx. Figure 65 URL Filter Screen 1 Check the Enable URL Filtering Function checkbox. The rule table will appear. 2 Enter the URL address or keywords in the URL/Keyword field.
80 CHAPTER 5: CONFIGURING THE ROUTER Advanced The Advanced section allows you to set additional parameter details for the Router. You can configure: Security ■ Security ■ VLAN ■ Static Routes ■ RIP ■ DDNS ■ SNMP ■ Syslog ■ Proxy Arp ■ QoS Settings Use the Security screen to set the advanced security settings for the Router.
Advanced ■ 81 NAT — Before you enable NAT (Network Address Translation), make sure you have changed the administrator password. NAT is the method by which the Router shares the single IP address assigned by your ISP with the computers on your network. This function should only be disabled by advanced users, and if your ISP assigns you multiple IP addresses or you need NAT disabled for an advanced system configuration.
82 CHAPTER 5: CONFIGURING THE ROUTER ■ MSS Clamping — You might not be able to browse some Web sites or to send email messages that contain attachments from an Internet Connection Sharing client computer if your outbound connection is through a Windows XP-based Internet Connection Sharing host computer that uses Point-to-Point Protocol over Ethernet (PPPoE).
Advanced VLAN 83 The VLAN screen allows you to setup VLAN groups. Figure 67 VLAN Screen Click Add VLAN to create a new entry (see Figure 68). Figure 68 VLAN Profile Screen ■ Enter a description for your VLAN in the Description field. ■ Enter the IP Address and subnet mask in the corresponding fields. ■ Select to set the NAT Domain as public or private.
84 CHAPTER 5: CONFIGURING THE ROUTER Static Routes You can configure static routes in this screen. Figure 69 Static Routes Screen To add a static route entry to the table, click Add (see Figure 70). To change an existing entry, click Edit. To delete an entry, click Delete. Figure 70 Add Static Route Screen Enter the following information: ■ Network Address — the network address of the static route. ■ Subnet Mask — the subnet mask of the route. A network address of 0.0.0.0 and a subnet mask of 0.0.
Advanced ■ 85 Interface — select the interface. After you have finished making changes to the table, click Apply. RIP RIP (Routing Information Protocol) - RIP allows the network administrator to set up routing information on one RIP-enabled device and send that information to all RIP-enabled devices on the network. Figure 71 RIP Parameter Screen You can set up RIP independently on both LAN and WAN interfaces. 1 Check the Enable RIP checkbox. 2 Check the Enable Auto summary checkbox.
86 CHAPTER 5: CONFIGURING THE ROUTER 5 Use the Poison Reverse drop-down menu to enable or disable Poison Reverse on the Router. Enabling Poison Reverse on your Router allows it to indicate to other RIP-enabled devices that they have both routes that point to each other, preventing data loops. 6 Use the Authentication Required field to choose the mode of authentication: ■ None — Switches off authentication on the specified interface.
Advanced DDNS 87 The Router provides a list of dynamic DNS providers for you to choose from. Dynamic Domain Name Server (DDNS) enables you to map a static domain name to a dynamic IP address. Before you set up DDNS, you must obtain an account, password or key and static domain name from your DDNS provider. The Router supports five DDNS providers: ■ DynDNS.org ■ TZO.com ■ Dt DNS.com ■ No-IP.com ■ Zoneedit.com Figure 72 Dynamic Domain Name Server (DDNS) Screen 1 Check Enable DDNS.
88 CHAPTER 5: CONFIGURING THE ROUTER SNMP SNMP (Simple Network Management Protocol) allows remote management of your Router by a PC that has an SNMP management agent installed. Check the Enable SNMP box, the table will appear. Figure 73 SNMP Screen To Configure SNMP Community: 1 In the Community column, enter the name of the SNMP communication channel. Your SNMP management agent needs to be configured with this name so that it can communicate with your Router.
Advanced 89 You can configure your Router to send status messages to the SNMP management agent if a problem occurs on the network. To configure SNMP traps: 1 In the IP Address field, enter the IP address of the PC to which you want your Router to send status messages. 2 In the Community field, enter the name of the SNMP communication channel to which you want your Router to send status messages. 3 Set the Version field to match the version of trap messaging that your SNMP management agent supports.
90 CHAPTER 5: CONFIGURING THE ROUTER Proxy ARP Proxy ARP is the technique in which one host, usually a Router, answers ARP requests intended for another machine. By “faking” its identity, the Router accepts responsibility for routing packets to the “real” or intended destination. This heightens the security for your network. Figure 75 Proxy ARP Screen 1 Check the Enable ProxyARP box. 2 Enter the corresponding IP address in the IP Address From and IP Address To fields. 3 Click Apply.
Advanced QoS Settings 91 The QoS (Quality of Service) function allows you to differentiate your network traffic and provide it with high-priority forwarding service. The bandwidth gap between LAN and WAN may significantly degrade performance of critical network applications, such as VoIP, gaming, and VPN. This QoS function allows you to classify traffic of applications and provides them with differentiated services (Diffserv). Figure 76 QoS Settings Screen 1 Check the Enable QoS box.
92 VPN CHAPTER 5: CONFIGURING THE ROUTER The Router has a Virtual Private Network (VPN) feature that provides a secure link between remote users and the corporate network by establishing an authenticated and encrypted tunnel for passing secure data over the Internet. The Router supports three modes of VPN operation: ■ IPsec (IP Security) — provides IP network-layer encryption. IPSec can support large encryption networks (such as the Internet) by using digital certificates for device authentication.
VPN 1 Check the Enable IPsec box. Figure 77 VPN Screen 2 Enter the Local ID Name of your VPN. 3 Click Add to create a new entry.
94 CHAPTER 5: CONFIGURING THE ROUTER On the VPN Tunnel Configuration screen, 1 Select IPSec as the VPN Tunnel Type. 2 Enter a descriptive name for the tunnel in the Tunnel Name field. 3 Remote VPN Gateway - select IP address, and then enter the IP address in the IP Address/Host Name field. If you select ANY, then it would be no need to enter the IP address, as any remote server can be used. 4 At the Remote Party ID drop-down list, select either IP_IPV4_ADDR or ID_USER_FQDN.
VPN Enter the following Phase II IPSec Parameters: ■ Authentication Algorithm ■ Encrypt Algorithm ■ Key lifetime ■ PFS ■ Diffie-Hellman Group ■ IKE Keep Alive - 95
96 CHAPTER 5: CONFIGURING THE ROUTER System Tools Restart Router These screens allow you to manage different parameters of the Router and perform certain administrative functions. Sometimes it may be necessary to restart (or reboot) the Router. Restarting the Router from this screen will not delete any of your configuration settings. Click the Restart the Router button to restart the Router.
System Tools Upgrade 97 ■ Backup Configuration — You can save your current configuration by clicking the Backup button. Saving your configuration will allow you to restore it later if your settings are lost or changed. It is recommended that you backup your current configuration before performing a firmware update. ■ Restore Configuration Data — The Restore Settings option will allow you to restore a previously saved configuration.
98 CHAPTER 5: CONFIGURING THE ROUTER Time Zone You can set the time settings for the Router on this screen. Figure 82 Time Zone Screen The Router keeps time by connecting to a Network Time Protocol (NTP) server. This allows the Router to synchronize the system clock to the Internet. The synchronized clock in the Router is used to record the security log and control client filtering. Select the time zone that you reside in.
System Tools Ping 99 The ping tool is used to test if the network is working properly. Figure 83 Ping Screen 1 Enter the IP address or domain name in the IP Address or Domain Name field, and click Ping. 2 Select from the Number of times to Ping drop-down menu. 3 The Router keeps a log of the ping test, click Clear Log to delete the records.
100 CHAPTER 5: CONFIGURING THE ROUTER Traceroute Traceroute is the program that shows you the route over the network between two systems, listing all the intermediate routers a connection must pass through to get to its destination. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is.
System Tools DNS Lookup 101 DNS Lookup is the process of resolving an IP address (i.e. 192.168.11.137) to a host name (i.e. xxxcompany.net). Figure 85 DNS Lookup Screen 1 Enter the IP address or domain name in the IP Address or Domain Name field, and click Dns lookup. 2 The Router keeps a log of the DNS lookup test, click Clear Log to delete the records.
102 CHAPTER 5: CONFIGURING THE ROUTER Status and Logs Status You can use the Status Screen to view version numbers for your Router’s software and hardware and check the status of connections to WAN, LAN and WLAN interfaces. This screen shows Router status and statistics. Figure 86 Status Screen Routing Table This screen displays details for the default routing used by your Router and any routing created using Static Routing or RIP.
Status and Logs Logs 103 This screen shows any attempts that have been made to gain access to your network as well as the system activities. Figure 88 Logs Screen Traffic Statistics ■ Click Help to view the help file. ■ Click Save to save the log to the hard disk as a text file. When prompted for a location to save the file to, specify a filename and location, and then click OK. ■ Click Clear to clear the log (note that all current entries will be erased). ■ Click Refresh to update the record.
104 CHAPTER 5: CONFIGURING THE ROUTER Support/Feedback Support You can use the Support/Feedback screen to obtain support and help, and also provide feedback to 3Com. Figure 90 Support Screen This screen shows support information. Feedback To provide feedback to 3Com, please click Provide Feedback, and this will connect you to the 3Com Web site. Figure 91 Feedback Screen This screen shows feedback information.
6 Basic Connection Checks Browsing to the Router Configuration Screens TROUBLESHOOTING ■ Check that the Router is connected to your computers and to the telephone line, and that all the equipment is powered on. Check that the LAN Status and SYNC LEDs on the Router are illuminated, and that any corresponding LEDs on the NIC are also illuminated. ■ Ensure that the computers have completed their start-up procedure and are ready for use.
106 CHAPTER 6: TROUBLESHOOTING ■ Connecting to the Internet Forgotten Password and Reset to Factory Defaults If you cannot browse to the Router, use the winipcfg utility in Windows 98/ME to verify that your computer has received the correct address information from the Router. From the Start menu, choose Run and then enter winipcfg. Check that the computer has an IP address of the form 192.168.1.xxx (where xxx is in the range 2-254), the subnet mask is 255.255.255.0, and the default Router is 192.168.
Wireless Networking 107 4 Press and hold the Reset button on the rear panel (see Figure 4 on page 16) for 5 seconds. 5 The Router will restart, and when the start-up sequence has completed, browse to: http://192.168.1.1 and run the configuration wizard. You may need to restart your computer before you attempt this. 6 When the configuration wizard has completed, you may reconnect your network as it was before. Wireless Networking ■ Ensure that you have an 802.11b or 802.11g or 802.
108 CHAPTER 6: TROUBLESHOOTING Additionally consider moving the wireless computer closer to the Router to confirm that the building structure or fittings are not adversely affecting the connectivity. If this resolves the problem consider relocating the wireless computer or the Router, or trying a different channel on the Router. ■ Sources of interference: The 2.4Ghz ISM band is used for 802.11b and 802.11g.
Recovering from Corrupted Software Recovering from Corrupted Software 109 If the system software has become corrupted, the Router will enter a “recovery” state; DHCP is enabled, and the LAN IP address is set to 192.168.1.1. Follow the instructions below to upload a new copy of the system software to a Router unit in this state. Ensure that one of your computers has a copy of the new software image file stored on its hard disk or available on CD-ROM. Check your ISP for the latest version firmware.
110 CHAPTER 6: TROUBLESHOOTING Frequently Asked Questions How do I reset the Router to Factory Defaults? See Forgotten Password and Reset to Factory Defaults on page 106. How many computers on the LAN does the Router support? A maximum of 253 computers on the LAN are supported. How many wireless clients does the Router support? A maximum of 128 wireless clients are supported. There are only 4 LAN ports on the Router.
A IP ADDRESSING The Internet Protocol Suite The Internet Protocol suite consists of a well-defined set of communications protocols and several standard application protocols. Transmission Control Protocol/Internet Protocol (TCP/IP) is probably the most widely known and is a combination of two of the protocols (IP and TCP) working together.
112 APPENDIX A: IP ADDRESSING For your network to work correctly, all devices on the network must have: ■ The same sub-network address. ■ The same subnet mask. The only value that will be different is the specific host device number. This value must always be unique. An example IP address is ‘192.168.100.8’. However, the size of the network determines the structure of this IP address. In using the Router, you will probably only encounter two types of IP address and subnet mask structures.
How does a Device Obtain an IP Address and Subnet Mask? 113 This type of IP Address operates on a subnet mask of ‘255.255.0.0’. See Table 4 for an example about how a network (only four computers represented) and a Router might be configured. Table 4 IP Addressing and Subnet Masking How does a Device Obtain an IP Address and Subnet Mask? DHCP Addressing Device IP Address Subnet Mask PC 1 192.168.100.8 255.255.0.0 PC 2 192.168.201.30 255.255.0.0 PC 3 192.168.113.155 255.255.0.0 PC 4 192.
114 APPENDIX A: IP ADDRESSING an IP address at random from the industry standard subnet of 169.254.x.x (with a subnet mask of 255.255.0.0). If two devices allocate themselves the same address, the conflict is detected and one of the devices allocates itself a new address. Automatic IP addressing support was introduced by Microsoft in the Windows 98 operating system and is also supported in Windows 2000 and Windows XP.
B TECHNICAL SPECIFICATIONS This section lists the technical specifications for the 3Com Wireless 11n Cable/DSL Firewall Router. 3Com Wireless 11n Cable/DSL Firewall Router Interfaces WAN connection LAN connection — four 10 Mbps/100 Mbps dual speed Ethernet ports (10BASE-T/100BASE-TX) WLAN Interfaces IEEE draft 802.11n, Orthogonal Frequency Division Multiplexing (OFDM) Transmission rate: 802.11n 40MHz: 270Mbps, automatic fallback to 243, 216, 162, 135, 121,5, 108, 81, 54, 40.5, 27, 13.5Mbps 802.
116 APPENDIX B: TECHNICAL SPECIFICATIONS Modulation: CCK, BPSK, QPSK, OFDM Encryption: 40/64 bit WEP, 128 bit WEP, WPA/WPA2 Maximum clients: 128 O/P Power: 14dBm Standard IEEE 802.11b, Direct Sequence Spread Spectrum (DSSS) Transmission rate: 11Mbps, automatic fallback to 5.5, 2, or 1 Mbps Maximum channels: 13 Range up to 304.8m (1000ft) Sensitivity: 1, 2, 5.
3Com Wireless 11n Cable/DSL Firewall Router EMC: FCC Part15 B EN 55022 EN 55024 EN 61000 EN 301 489-1 ICES-003 Radio FCC Part 15 C RSS-210 EN 300 328 Environmental: EN 60068 (IEC 68) *See “Regulatory Notices” for conditions of operation.
118 APPENDIX B: TECHNICAL SPECIFICATIONS System Requirements Operating Systems The Router will support the following Operating Systems: Ethernet Performance Cable Specifications ■ Windows 98Se ■ Windows NT 4.0 ■ Windows ME ■ Windows 2000 ■ Windows XP ■ Windows Vista ■ Mac OS 8.5 or higher ■ Unix The Router complies to the IEEE 802.3i, u and x specifications.
C SAFETY INFORMATION Important Safety Information WARNING: Warnings contain directions that you must follow for your personal safety. Follow all directions carefully. You must read the following safety information carefully before you install or remove the unit: WARNING: The Router generates and uses radio frequency (rf) energy. In some environments, the use of rf energy is not permitted. The user should seek local advice on whether or not rf energy is permitted within the area of intended use.
120 APPENDIX C: SAFETY INFORMATION WARNING: RJ-45 ports. These are shielded RJ-45 data sockets. They cannot be used as telephone sockets. Only connect RJ-45 data connectors to these sockets. Wichtige Sicherheitshinweise VORSICHT: Warnhinweise enthalten Anweisungen, die Sie zu Ihrer eigenen Sicherheit befolgen müssen. Alle Anweisungen sind sorgfältig zu befolgen.
121 VORSICHT: Es sind keine von dem Benutzer zu ersetzende oder zu wartende Teile in dem Gerät vorhanden. Wenn Sie ein Problem mit dem Router haben, das nicht mittels der Fehleranalyse in dieser Anleitung behoben werden kann, setzen Sie sich mit Ihrem Lieferanten in Verbindung. VORSICHT: Vor dem Ausbau des Geräts das Netzadapterkabel herausziehen. VORSICHT: RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden.
122 APPENDIX C: SAFETY INFORMATION conditions ne sont maintenues que si l'équipement auquel il est raccordé fonctionne dans les mêmes conditions. AVERTISSEMENT: Il n’y a pas de parties remplaceables par les utilisateurs ou entretenues par les utilisateurs à l’intérieur du moyeu. Si vous avez un problème physique avec le moyeu qui ne peut pas être résolu avec les actions de la résolution des problèmes dans ce guide, contacter votre fournisseur.
D END USER SOFTWARE LICENSE AGREEMENT 3Com Corporation END USER SOFTWARE LICENSE AGREEMENT YOU SHOULD CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE DOWNLOADING, INSTALLING AND USING THIS PRODUCT, THE USE OF WHICH IS LICENSED BY 3COM CORPORATION ("3COM") TO ITS CUSTOMERS FOR THEIR USE ONLY AS SET FORTH BELOW. DOWNLOADING, INSTALLING OR OTHERWISE USING ANY PART OF THE SOFTWARE OR DOCUMENTATION INDICATES THAT YOU ACCEPT THESE TERMS AND CONDITIONS.
124 APPENDIX D: END USER SOFTWARE LICENSE AGREEMENT TRADE SECRETS; TITLE: You acknowledge and agree that the structure, sequence and organization of the Software are the valuable trade secrets of 3Com and its suppliers. You agree to hold such trade secrets in confidence. You further acknowledge and agree that ownership of, and title to, the Software and Documentation and all subsequent copies thereof regardless of the form or media are held by 3Com and its suppliers.
E OBTAINING SUPPORT FOR YOUR PRODUCT To obtain support for your product, please contact the ISP that supplied this product.
126 APPENDIX E: OBTAINING SUPPORT FOR YOUR PRODUCT
GLOSSARY 802.11b The IEEE specification for wireless Ethernet which allows speeds of up to 11 Mbps. The standard provides for 1, 2, 5.5 and 11 Mbps data rates. The rates will switch automatically depending on range and environment. 802.11g The IEEE specification for wireless Ethernet which allows speeds of up to 54 Mbps. The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data rates. The rates will switch automatically depending on range and environment.
128 GLOSSARY Auto-negotiation Some devices in the range support auto-negotiation. Auto-negotiation is where two devices sharing a link, automatically configure to use the best common speed. The order of preference (best first) is: 100BASE-TX full duplex, 100BASE-TX half duplex, 10BASE-T full duplex, and 10BASE-T half duplex. Auto-negotiation is defined in the IEEE 802.3 standard for Ethernet and is an operation that takes place in a few milliseconds.
GLOSSARY DNS Server Address DSL modem 129 DNS stands for Domain Name System, which allows Internet host computers to have a domain name (such as 3com.com) and one or more IP addresses (such as 192.34.45.8). A DNS server keeps a database of host computers and their respective domain names and IP addresses, so that when a domain name is requested (as in typing “3com.com” into your Internet browser), the user is sent to the proper IP address.
130 GLOSSARY Hub A device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Hubs are similar to repeaters, in that they connect LANs of the same type; however they connect more LANs than a repeater and are generally more sophisticated. IEEE Institute of Electrical and Electronics Engineers. This American organization was founded in 1963 and sets standards for computers and communications. IETF Internet Engineering Task Force.
GLOSSARY LAN 131 Local Area Network. A network of end stations (such as PCs, printers, servers) and network devices (hubs and switches) that cover a relatively small geographic area (usually not larger than a floor or building). LANs are characterized by high transmission speeds over short distances (up to 1000 metres). MAC Media Access Control. A protocol specified by the IEEE for determining which devices have access to a network at any one time. MAC Address Media Access Control Address.
132 GLOSSARY RJ-45 A standard connector used to connect Ethernet networks. The “RJ” stands for “registered jack”. Router A device that acts as a central hub by connecting to each computer's network interface card and managing the data traffic between the local network and the Internet. Server A computer in a network that is shared by multiple end stations. Servers provide end stations with access to shared network services such as computer files and printer queues. SSID Service Set Identifier.
GLOSSARY Traffic 133 The movement of data packets on a network. Universal Plug and Play Universal Plug and Play is a system which allows compatible applications to read some of their settings from the Router. This allows them to automatically configure some, or all, of their settings and need less user configuration. URL Filter A URL Filter is a feature of a firewall that allows it to stop its clients form browsing inappropriate Web sites. WAN Wide Area Network.
134 GLOSSARY WLAN WPA Wireless Local Area Network. A WLAN is a group of computers and devices connected together by wireless in a relatively small area (such as a house or office). Wi-Fi Protected Access. A dynamically changing encryption mechanism for wireless networking. Encryption strength is 256 bit.
135 REGULATORY NOTICES For 3Com Wireless 11n Cable/DSL Firewall Router GENERAL STATEMENTS The 3Com Wireless 11n Cable/DSL Firewall Router (WL-602) must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. This product contains encryption. It is unlawful to export out of the U.S. without obtaining a U.S. Export License. This product does not contain any user serviceable components.
136 The correction of interference caused by such unauthorized modification, substitution or attachment will be the responsibility of the user. Changes or modifications not expressly approved by 3Com could void the user's authority to operate this equipment.
137 EU COMPLIANCE For connection to DSL/Cable networks This equipment may be operated in: AT BE CY CZ DK EE FI FR DE GR HU IE IT LV LT LU MT NL PL PT SK SI ES SE GB IS LI NO CH BG RO TR Intended use: DSL/Cable 802.11g/b/n Firewall Router For connection to DSL/Cable networks NOTE: To ensure product operation is in compliance with local regulations, select the country in which the product is installed. Refer to 3CRWER300-73 User Guide.
138 Français [French] Par la présente 3Com Corporation déclare que l'appareil RLAN device est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Italiano [Italian] Con la presente 3Com Corporation dichiara che questo RLAN device è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
139 EU - RESTRICTIONS FOR USE IN THE 2.4GHZ BAND This device can be operated in the EU without restrictions indoor. However, operated outdoors in France is restricted to 2400 ~ 2454 MHz : (Channel 1 ~ 7). BRAZIL RF COMPLIANCE Este equipamento opera em caráter secundário, isto é, não tem direito a proteção contra interferência prejudicial, mesmo de estações do mesmo tipo, e não causar interferência a sistema operando em caráter primário. DGT STATEMENT 1.
140
INDEX Numbers 128-bit WEP 46 128-bit WEP Screen 46 1483 Bridge Mode 55 64-bit WEP Screen 47 A Access Control Screen 62 Add PC Screen 63 Add Schedule Rule Screen 65 Addresses IP 85 Admin Password Screen 75 Advanced Screen 68 Automatic Addressing 87 B Backup/Restore Settings Screen 74 Bridge Mode for Single PC Screen 53 Bridged Mode Configuration Screen 33 C Cable Specifications 91 Channels 111 Configuration Summary Screen 37 Connection Type Screen 29, 50 Conventions notice icons, About This Guide 8 text,
142 INDEX MAC Address Filtering Screen 66 mode 30 N NAT (Network Address Translation) 68 NAT-T (NAT Traversal) 68 Network addresses 85 Networking wireless 81 NIC wireless 14 P Password 27, 75 Poison Reverse 58 PPPoA 31 PPPoA Screen 31 PPPoA Settings Screen 52 PPPoE 26, 30, 31 PPPoE Screen 30 PPPoE Settings Screen 51 R Remote Admin 68 Reset to Factory Default Screen 73 Reset to Factory Defaults 80 Restart Router Screen 73 RFC 1483 Bridged Mode 32, 53 RFC 1483 Routed Mode 34 RIP (Routing Information Prot