Wireless Gaming Router II WL-309 Full Manual
WL-309 Wireless Gaming router II Full Manual INTRODUCTION............................................................................................ 4 FEATURES & BENEFITS .......................................................................................5 PACKAGE CONTENTS ..........................................................................................6 SAFETY GUIDELINES ..........................................................................................6 PRODUCT LAYOUT ...............
WL-309 Wireless Gaming router II Full Manual Time Configuration .................................................................................. 66 System Settings ...................................................................................... 67 Firmware................................................................................................ 71 Syslog.................................................................................................... 71 Administrator Settings .............
Introduction The WL-309 is a draft 802.11n compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with 802.11g and 802.11b devices. It is not only a Wireless Access Point, which lets you connect to the network without wires. There's also a built-in 4-port full-duplex 10/100/1000 Gigabit Switch to connect your wired-Ethernet devices together. The Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection.
Features & Benefits Features High Speed Data Rate Up to Benefits Capable of handling heavy data 300Mbps payloads such as MPEG video streaming Concurrent Dual band (2.4GHz and 5GHz) Connect your client devices via the 2.4GHz band, while streaming media on the clean 5GHz band. IEEE 802.11n draft Compliant and backward compatible with 802.11b/g Fully interoperable with IEEE 802.
Package Contents Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials; in case of return, the device must be shipped in its original package. - One WL-309 Wireless Gaming router II One 12V/1.25A Power Adapter UTP Cable One CD-ROM with User’s Manual One Quick Installation Guide Warranty Card Safety Guidelines In order to reduce the risk of fire, electric shock and injury, please adhere to the following safety guidelines.
Product Layout Item 1 AGE 2 Label LAN Ports (yellow) WAN Port (blue) 3 DC Connector 4 USB port 5 WPS (on the top of the router) Description Use an Ethernet cable to connect each port to a computer on your Local Area Network (LAN). Use an Ethernet cable to connect this port to your WAN router/modem. Use the power cable and connect the adapter to the power socket on the wall, and the DC inlet into the DC connector. The USB port can be used to connect a USB memory stick or hard disk.
Back label The back label describes the IP address, login details, SSID, security code and WPS button functionality. Button Description WPS BUTTON Press 0-5 seconds for 2.4 GHz WPS mode Press 5-10 seconds for 5 GHz WPS mode Press 10 seconds to reset the router Press 15 Seconds to reset the router to factory defaults.
LED Definition From left to right. Port Description Power (Blue) Shows the device is turned on. USB (Blue) Shows an USB device is connected. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band. WAN (Blue) Shows the cable is connected. LAN (Blue) Shows the cable is connected. LAN (Blue) Shows the cable is connected. LAN (Blue) Shows the cable is connected. LAN (Blue) Shows the cable is connected.
System Requirements The following are the minimum system requirements in order configure the device: - AGE 10 PC/Notebook Operating System – Microsoft Windows XP/2000/Vista/Seven 1 Free Ethernet port Wi-Fi card/USB dongle (802.
- 1 Understanding the Hardware Hardware Installation You can place the WL-309 on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven. This location must be close to a power connection and your ADSL/Cable modem.
IP Address Configuration This device can be configured as a Bridge/Router or Access Point. The default IP address of the device is 192.168.0.1. In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook. 1. In the control panel, double click Network Connections and then double click on the connection of your Network Interface Card (NIC). You will then see the following screen. 2. Select Internet Protocol (TCP/IP) and then click on the Properties button.
2 Internet Connection Wizard This device offers a quick and simple configuration through the use of a wizard. This chapter describes how to use the wizard to configure the internet settings. Please refer to Chapter 6 in order to configure the more advanced features of the device. Logging In To configure the device, open a web browser. Type http://192.168.0.1 in the address bar and press [Enter]. After connecting to the IP address, the web-browser will display the login page.
Select your country from the Country list. Select your internet provider. Click Next. Depending on the chosen provider, you may need to enter your user name and password, MAC address or hostname in the following window. After you have entered the correct information, click Next. Click APPLY to complete the configuration.
3 Wi-Fi Protected Setup Wizard Wi-Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. Please refer to Chapter 5 in order to configure the more advanced features of the device Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page.
Add a Wireless Device Click on Basic -> Wireless and click on the Add Wireless Device Wizard button. The wireless wizard will inform you that there are two major steps in the process. o Select the configuration method for your wireless network o Connect your wireless device Click on the Next button to continue.
Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. Access to the wireless network is controlled by a registrar.
Using the Push Button WPS is used for Wi-Fi Protected Setup. By pressing the WPS button on the top panel of the device, the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi-Fi Protected Setup If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the one the router within 60 seconds.
4 Advanced Web Configuration Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page. Fill in the username and password. The default credentials are shown below: Username: Password: admin admin After logging in you will see the graphical user interface (GUI) of the device. The navigation menu on the top is divided into six main sections: 1. 2. 3. 4. 5. 6. AGE 19 Home: This shows the basic status of the router.
4.1 Home Device All of your Internet and network connection details are displayed on this page. The firmware version is also displayed here. Wireless Click on the Wireless link in the navigation menu. The wireless section allows you to view the wireless clients that are connected to the device.
- - MAC Address: The Ethernet ID (MAC address) of the wireless client. IP Address: The LAN-side IP address of the client. Mode: The transmission standard being used by the client. Values are 11a, 11b, 11g, or 11n for 802.11a, 802.11b, 802.11g, or 802.11n respectively. Rate: The actual transmission rate of the client in megabits per second. Signal: This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality.
LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. o CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending. - Priority: The priority given to packets sent wirelessly over this conversation by the WISH logic. The priorities are: o BK: Background (least urgent). o BE: Best Effort. o VI: Video. o VO: Voice (most urgent).
Stats Click on the Statistics link in the navigation menu. This page displays the transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. Click on the Refresh button to refresh the statistics.
DHCP Click on the DHCP link in the navigation menu. This page displays the routing details configured for your router. AGE 24 Local: The IP address and, where appropriate, port number of the local application. NAT: The port number of the LAN-side application as viewed by the WAN-side application. Internet: The IP address and, where appropriate, port number of the application on the Internet. Protocol: The communications protocol used for the conversation.
Firewall Click on the Firewall link in the navigation menu. This page displays the details about firewall holes in your router.
4.2 BASIC Network This device can be configured as a Router or a Bridge. Select Router mode if the WAN port is connected to the Internet. Select Bridge if the device is connected to a local network downstream from another router. Bridge Mode In this mode, the device functions as a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly. Select the Bridge Mode radio button. WAN Port Mode: Select the Bridge Mode radio button.
Router Mode In this mode, the device functions as a NAT router and is connected to the Internet. Select the Router Mode radio button. WAN Port Mode: Select the Router Mode radio button. Router IP Address: Specify the IP address of this device. Subnet Mask: Specify the subnet mask for the IP address. Local Domain Name: This entry is optional. Enter a domain name for the local network. LAN computers will assume this domain name when they get an address from the router's built in DHCP server.
Wireless These options allow you to enable/disable the wireless interface, switch between the 11n, 11b/g and 11b radio band and channel frequency. These settings can be made for 2.4Ghz and 5GHZ on the corresponding tabs. AGE 28 Enable Wireless: Place a check in this box to enable the wireless interface. It is enabled by default. Wireless Network Name (SSID): The SSID is a unique named shared amongst all the points of the wireless network.
Wireless Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network. Transmission Rate: Select a transmission rate from the drop-down list.
WEP Key Length: Select a 64-bit or 128-bit WEP key length from the dropdown list. WEP Key 1-4: You may enter four different WEP keys. Default WEP Key: You may use up to four different keys for four different networks. Select the current key that will be used. Authentication: Select Open, or Shared Key. Authentication method from the drop-down list. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set.
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list. Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. o o o TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption.
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. WPA Mode: Select the WPA / WPA2 from the drop-down list. Cipher Type: Select TKIP or AES as the cipher suite. The encryption algorithm used to secure the data communication.
WAN The device offers several types of WAN connections in order to connect to the Internet. - Static IP Address Dynamic IP Address PPPoE PPTP Select the type of Internet Connection from the drop-down list. Static IP Address Configuration The WAN interface can be configured as Static IP address. In this type of connection, your ISP provides you with a dedicated IP address (which does not change as DHCP). Select Static IP from the My Internet Connection drop-down list.
IP Address: Specify the IP address for this device, which is assigned by your ISP. Subnet Mask: Specify the subnet mask for this IP address, which is assigned by your ISP. Default Gateway: Specify the IP address of the default gateway, which is assigned by your ISP. Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP.
Dynamic IP Address (DHCP) Configuration The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. This is also known as Dynamic IP. Select the Dynamic IP (DHCP) from the My Internet Connection drop-down list. AGE 35 Host Name: Specify a host name to define your system or connection. Use Unicasting: This option is normally turned off, and should remain off as long as the WAN-side DHCP server correctly provides an IP address to the router.
PPPoE connection. If the router's MTU is set too high, packets will be fragmented downstream. If the router's MTU is set too low, the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections. In either case, network performance can suffer.
PPPoE (Point-to-Point Protocol over Ethernet) The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect. Select the PPPoE from the My Internet Connection drop-down list. AGE 37 Address Mode: PPPoE can be used with a dynamic or static IP address. If you select the Dynamic IP radio button, then the IP address in the next field is not required.
Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP. MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP.
PPTP (Point-to-Point Tunneling Protocol) The WAN interface can be configured as PPTP. PPTP (Point to Point Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection is primarily used in Europe. This method of connection requires you to enter a username and password (provided by your ISP) to gain access to the Internet. The supported authentication protocols are PAP and CHAP. Select the PPTP from the My Internet Connection drop-down list.
Always on: A connection to the Internet is always maintained. On demand: A connection to the Internet is made as needed. Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Specify the time after which the router will automatically disconnect the current session when no data-traffic has been detected for the set period of time.
Advanced Wireless This page allows you to configure the fragmentation threshold, RTS threshold, beacon period, transmit power, DTIM interval, wireless isolation, WMM and WDS (wireless distribution system). AGE 41 Transmit Power: You may control the output power of the device by selecting a value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network.
DTIM Interval: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 255.
WAN Port Speed: You may select a WAN port speed from the drop-down list. It is recommended that you select Auto. Enable Multicast Streams: Place a check in this box to enable multicast streams. The router uses the IGMP protocol to support efficient multicasting - transmission of identical content, such as multimedia, from a source to a number of recipients. This option must be enabled if any applications on the LAN participate in a multicast group.
4.3 Firewall Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and LAN port. Enable: Place a check in this box to enable the virtual server rule. Name: Assign a meaningful name to the virtual server, for example Web Server.
Special Application An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a trigger port or port range. An application rule applies to all computers on your internal network. Enable: Place a check in this box to enable the special application rule. Name: Assign a meaningful name to the virtual server, for example Web Server.
Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. Enable: Place a check in this box to enable the port forwarding rule.
Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. When Access Control is disabled, every device on the LAN has unrestricted access to the Internet.
Select a schedule from the drop-down list: Always or Never, or you may define a new schedule. Click on the Next button to continue. Select a machine to which the policy applies. Address Type: Select the IP address or MAC address radio button. IP Address: If you selected IP address above, then specify the IP address here.
Select a filtering method: Log Web Access Only: Select this radio but in order to log web access. Block All Access: Select this radio but in order to block all web access. Block Some Access: Select this radio but in order to block some web access. Click on the Apply button to store the changes.
Website Filter This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. Website/URL/Domain: Specify the web address that you would like to filter. Do not use “http://” Click on the Save button to store the changes.
Schedules Click on the Schedules link in the navigation menu. Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to MonFri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Name: Specify a name for the schedule. Day(s): Select the days at which you would like the schedule to be effective.
4.4 Advanced Settings Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
StreamEngine The StreamEngine feature helps improve the network performance by prioritizing applications. AGE 53 Enable Traffic Shaping: Place a check in the box to enable traffic shaping. When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed. Place a check in this box to enable automatic uplink speed.
the uplink speed manually. Uplink speed is the speed at which data can be transferred from the router to your ISP. Connection Type: By default, the router automatically determines whether the underlying connection is an xDSL/Frame-relay network or some other connection type (such as cable modem or Ethernet), and it displays the result as Detected xDSL or Frame Relay Network.
MAC Address Filter This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. Configure MAC Filtering: Select one of the options from the drop-down list. o Turn MAC Filtering OFF: When "OFF" is selected, MAC addresses are not used to control network access.
Firewall Settings The device provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
AGE 57 application to send data back through a port different from the one used when the outgoing session was created. o Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection. Note: Some of these options can interact with other port restrictions.
Enabling this option (the default setting) enables single VPN connections to a remote host. (But, for multiple VPN connections, the appropriate VPN ALG must be used.) Disabling this option, however, only disables VPN if the appropriate VPN ALG is also disabled. Application Layer Gateway (ALG) Configuration: Place a check in appropriate feature boxes to enable them. .
o o o o o o o RTSP: Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger: Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger. The SIP ALG must also be enabled when the Windows Messenger ALG is enabled.
WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. AGE 60 Enable WISH: Place a check in this box to enable the WISH feature. HTTP: Place a check in this box to add HTTP as a classifier. This allows the device to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic.
applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. Name: Assign a meaningful name to the WISH rule. Priority: Select a priority from the drop-down list. The four priority message flows are: o BK: Background (least urgent). o BE: Best Effort. o VI: Video. o VO: Voice (most urgent).
Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Disk This page shows information regarding the attached storage devices. File system type, total space on the device, and available space is shown in the table. Click the “Safely remove” button, to safely remove the USB disk. Note: AGE 63 Only FAT12, FAT16, and FAT32 drives are supported. For information regarding partitioning and formatting of a drive, see the manual of your operating system.
Share On this page, the sharing mode can be changed. Choose to share all folders with all users, or to restrict the sharing of folders. When Sharing-mode is set to “restrict”, shares can be added and changed.
Users You can add new users and configure user rights for the storage device. Password: Enter a password for the selected user. Share Name: Select a shared folder. The Shared folders can be configured on the “Share” tab. Access: Select “Read Only” to allow the user to read files in the selected share. Select “Read/Write” to also allow users to write to the selected share.
4.5 Toolbox Time Configuration Click on the Time link in the navigation menu. This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server. Note: If the device loses power for any reason, it will not be able to keep its clock running, and will not display the correct time once the device has been restarted.
you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate. NTP Server Used: Specify the NTP server or select one from the drop-down list. Set the Date and Time: Select a date and time from the drop-down list or do to use computer’s time and date click on the Copy Your Computer’s Time Settings button. Click on the Apply button once you have modified the settings. System Settings Click on the System link in the navigation menu.
Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the device. Click on the Browse button to select the file and then click on Restore Configuration from a File button. The system then prompts you to reboot the device. Click on the OK button to continue. You will then see the Rebooting page. Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
Restore To Factory Default Click on the Restore all Settings to Factory Defaults button. This option restores all configuration settings back to the settings that were in effect at the time when the device was shipped from the factory. Once the dialog box appears, click on the OK button to confirm the action. Note: The current settings will be lost. Click on the OK button to continue. You will then see the Rebooting page. Please wait while the system is rebooting.
Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
Firmware Click on the Firmware link in the navigation menu. This page allows you to upgrade the firmware of the device in order to improve the functionality and performance. This page also displays the current firmware version and its release date. Ensure that you have downloaded the appropriate firmware from the vendor’s website. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded using the wireless interface.
Enable Logging to a Syslog Server: Place a check in this box to enable Syslog logging. Syslog Server IP Address: Specify the IP address of the Syslog server. Click on the Apply button once you have modified the settings. Administrator Settings Admin Password You can change the password required to log into the broadband router's system web-based management. By default, the password is: “admin”. Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive.
System Name Gateway Name: Name of your router. Remote Management The remote management function allows you to configure the Broadband router from a remote site. Inactivity Time Out: Time after which you will be automatically logged out of the web-interface. HTTPS Server: Enable HTTPS connection for the web-interface. Enable Remote Management: Select “Enabled” to enable the remote management function. Remote Admin Port: The port number of the remote management web interface.
Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.