User's Manual
Table Of Contents
- Terminology
 - Introduction
 - Installation
 - Software configuration
- Prepare your PC to configure the WLAN Broadband Router
 - Connect to the WLAN Broadband Router
 - Management and configuration on the WLAN Broadband Router
- Status
 - Setup Wizard
 - Operation Mode
 - Wireless - Basic Settings
 - Wireless - Advanced Settings
 - Wireless - Security Setup
 - Wireless - Access Control
 - WDS Security Setup
 - WDS AP Table
 - WDS Settings
 - Site Survey
 - WPS Settings
 - LAN Interface Setup
 - WAN Interface Setup
 - Firewall - Port Filtering
 - Firewall - IP Filtering
 - Firewall - MAC Filtering
 - Firewall - Port Forwarding
 - Firewall - URL Filtering
 - Firewall - DMZ
 - Management - Statistics
 - Management - DDNS
 - Management - Time Zone Setting
 - Management - Denial-of-Service
 - Management - Log
 - Management - Upgrade Firmware
 - Management - Save/ Reload Settings
 - Management - Password Setup
 
 
 - FREQUENTLY ASKED QUESTIONS (FAQ)
- What and how to find my PC’s IP and MAC address?
 - What is Wireless LAN?
 - What are ISM bands?
 - How does wireless networking work?
 - What is BSSID?
 - What is ESSID?
 - What are potential factors that may causes interference?
 - What are the Open System and Shared Key authentications?
 - What is WEP?
 - What is Fragment Threshold?
 - What is RTS (Request To Send) Threshold?
 - What is Beacon Interval?
 - What is Preamble Type?
 - What is SSID Broadcast?
 - What is Wi-Fi Protected Access (WPA)?
 - What is WPA2?
 - What is 802.1x Authentication?
 - What is Temporal Key Integrity Protocol (TKIP)?
 - What is Advanced Encryption Standard (AES)?
 - What is Inter-Access Point Protocol (IAPP)?
 - What is Wireless Distribution System (WDS)?
 - What is Universal Plug and Play (uPNP)?
 - What is Maximum Transmission Unit (MTU) Size?
 - What is Clone MAC Address?
 - What is DDNS?
 - What is NTP Client?
 - What is VPN?
 - What is IPSEC?
 - What is WLAN Block Relay Between Clients?
 - What is WMM?
 - What is WLAN ACK TIMEOUT?
 - What is Modulation Coding Scheme (MCS)?
 - What is Frame Aggregation?
 - What is Guard Intervals (GI)?
 
 - Configuration examples
 
4
Terminology 
3DES  Triple Data Encryption Standard 
AES  Advanced Encryption Standard 
ANSI  American National Standards Institute 
AP  Access Point 
CCK  Complementary Code Keying 
CSMA/CA  Carrier Sense Multiple Access/Collision Avoidance     
CSMA/CD  Carrier Sense Multiple Access/Collision Detection 
DDNS  Dynamic Domain Name Server 
DH Diffie-Hellman Algorithm 
DHCP  Dynamic Host Configuration Protocol 
DSSS  Direct Sequence Spread Spectrum 
EAP  Extensible Authentication Protocol 
ESP Encapsulating Security Payload 
FCC  Federal Communications Commission 
FTP  File Transfer Protocol 
IEEE  Institute of Electrical and Electronic Engineers 
IKE Internet Key Exchange 
IP  Internet Protocol 
ISM  Industrial, Scientific and Medical 
LAN  Local Area Network 
MAC Media Access Control 
MD5  Message Digest 5 
NAT Network Address Translation 
NT  Network Termination 
NTP  Network Time Protocol 
PPTP  Point to Point Tunneling Protocol 
PSD  Power Spectral Density 
RF  Radio Frequency 
SHA1 Secure Hash Algorithm 
SNR  Signal to Noise Ratio 
SSID  Service Set Identification 
TCP  Transmission Control Protocol 
JTFTP  Trivial File Transfer Protocol 
TKIP  Temporal Key Integrity Protocol 
UPNP  Universal Plug and Play 
VPN  Virtual Private Network 










