2.4GHz 11n Draft 2.0 1+4 Port WLAN Router WRT-383U Rev 0.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Copyright This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Copyright 2006 Trademark recognition All product names used in this manual are the properties of their respective owners and are acknowledged.
Table of Contents Getting Started with the WRT-383U Package Contents Minimum System Requirements Wireless LAN Networking Introduction Features 4 4 4 5 9 9 Hardware Overview LED Indications Rear Panel Installation Considerations Getting Started 11 11 12 13 13 Using the Configuration Menu Basic Advanced Tools Status 14 15 26 57 72 Glossary 85 3
Getting Started with the WRT-383U Congratulations on purchasing the WRT-390U! This manual provides information for setting up and configuring the WRT-390U. This manual is intended for both home users and professionals.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WRT-383U provides various transmission (data) rate options for you to select.
sometimes be referred to as an Independent Basic Service Set (IBSS). To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel for each station.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
Introduction The WRT-383U 11n (Draft) Wireless Router is an high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the WRT-383U provides data transfers at up to 300Mbps when using 11n (Draft) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
Support Streaming Engine to accelerate the LAN to WAN traffic by Automatic traffic classification & prioritization Support configurable virtual servers & game servers and DMZ host Support Static routing – RIPv1 announcer Support Static or WAN assigned DNS servers and 10 verified services for DDNS DHCP Server Support up to 252 leases, and up to 24 reservations MAC address filtering support up to 24 filtering entries Support WEB UI management, firmware upgrade and configuration backup and restore via WLAN/LAN
Hardware Overview LED Indications: (from bottom to top) PWR LAN1 LAN2 LAN3 LAN4 WAN WLAN 11
Rear panel: (from bottom to top) DC-IN RESET WLAN (ON/OFF) WAN LAN1 LAN2 LAN3 LAN4 Side Button: WPS push button 12
Installation Considerations The WRT-383U 11n (Draft) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Using the Configuration Menu Whenever you want to configure your WRT-390U, you can access the Configuration Menu through your PC by opening the Web-browser and typing in the IP Address of the WRT-383U. The WRT-383U’s default IP Address is http://192.168.0.1 Open the Web browser. Type in the IP Address of the Router (http://192.168.0.1). If you have changed the default IP Address assigned to the WRT-390U, make sure to enter the correct IP Address. Select admin in the User Name field.
Basic The Basic tab provides the following configuration options: Internet Connection, Wireless Settings, Network Settings Basic_ Internet Connection Internet Connection Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running.
Basic_ Wireless Settings The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard.
If you select this option, the router automatically finds the channel with least interference and uses that channel for wireless networking. If you disable this option, the router uses the channel that you specify with the following Wireless Channel option. Wireless Channel A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices.
128-bit hexadecimal keys are exactly 26 characters in length. (456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit encryption.) 64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption.) 128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for 128-bit encryption.
Advanced: Optional Backup RADIUS Server This option enables configuration of an optional second RADIUS server. A second RADIUS server can be used as backup for the primary RADIUS server. The second RADIUS server is consulted only when the primary server is not available or not responding. The fields Second RADIUS Server IP Address, RADIUS Server Port, Second RADIUS server Shared Secret, Second MAC Address Authentication provide the corresponding parameters for the second RADIUS Server.
Basic_Network Settings 20
WAN Port Mode This option controls how the device reacts to traffic on the WAN connector. In this case the term "port" refers to the Ethernet connectors on the device. Router Mode Select this option if the WAN port is connected to the Internet. The device functions as a NAT router. Bridge Mode Select this option if the device is connected to a local network downstream from another router.
server. DNS Relay When DNS Relay is enabled, the router plays the role of a DNS server. DNS requests sent to the router are forwarded to the ISP's DNS server. This provides a constant DNS address that LAN computers can use, even when the router obtains a different DNS server address from the ISP upon re-establishing the WAN connection. You should disable DNS relay if you implement a LAN-side DNS server as a virtual server.
Example: Your router uses 192.168.0.1 for the IP address. You've assigned a computer that you want to designate as a Web server with a static IP address of 192.168.0.3. You've assigned another computer that you want to designate as an FTP server with a static IP address of 192.168.0.4. Therefore the starting IP address for your DHCP IP address range needs to be 192.168.0.5 or greater. Example: Suppose you configure the DHCP Server to manage addresses From 192.168.0.100 To 192.168.0.199. This means that 192.
NetBIOS Registration mode Indicates how network hosts are to perform NetBIOS name registration and discovery. H-Node, this indicates a Hybrid-State of operation. First WINS servers are tried, if any, followed by local network broadcast. This is generally the preferred mode if you have configured WINS servers. M-Node (default), this indicates a Mixed-Mode of operation.
Mac OS X Go to the Apple Menu, select System Preferences, select Network, and select the Ethernet Adapter connecting to the router. Select the Ethernet button and the Ethernet ID will be listed. This is the same as the MAC address. Enable Specifies whether the entry will be active or inactive. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made.
Advanced The Advanced tab provides the following configuration options: Virtual Server, Port Forwarding, Application Rules, StreamEngine, Routing, Access Control, Website Filter, Network Filter, Firewall Settings, Inbound Filter, Advanced Wireless, WISH, Wi-Fi Protected Setup, Advanced Network, Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
6. Ensure the schedule is set to 7. Click Save Always to add the settings to the Virtual Servers List 8. Repeat these steps for each Virtual Server Rule you wish to add. With this Virtual Server entry, all Internet traffic on Port 8888 will be redirected to your internal web server on port 80 at IP Address 192.168.0.50. Add/Edit Virtual Server Enable Specifies whether the entry will be active or inactive. Name Assign a meaningful name to the virtual server, for example Web Server.
activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Virtual Servers" section is activated for editing. Note: You might have trouble accessing a virtual server using its public identity (WAN-side IP-address of the gateway or its dynamic DNS name) from a machine on the LAN. Your requests may not be looped back or you may be redirected to the "Forbidden" page.
Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Add/Edit Application Rule Example: You need to configure your router to allow a software application running on any computer on your network to connect to a web-based server or another user on the Internet.
Firewall Port Enter the port range that you want to open up to Internet traffic (for example 6000-6200). Firewall Traffic Type Select the protocol used by the Internet traffic coming back into the router through the opened port range (for example Both). Schedule Select a schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools → Schedules screen and create a new schedule.
Advanced_ Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
in accordingly. However, you should check whether the port values have changed since this list was created, and you must fill in the IP address field. IP Address Enter the local network IP address of the system hosting the server, for example 192.168.0.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer. TCP Ports Enter the TCP ports to open (for example 6159-6180, 99).
The StreamEngine feature helps improve your network performance by prioritizing applications. WAN Traffic Shaping Enable Traffic Shaping When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed When enabled, this option causes the router to automatically measure the useful uplink bandwidth each time the WAN interface is re-established (after a reboot, for example).
network connections. Manual Uplink Speed If Automatic Uplink Speed is disabled, this options allows you to set the uplink speed manually. Uplink speed is the speed at which data can be transferred from the router to your ISP. This is determined by your ISP. ISPs often specify speed as a downlink/uplink pair; for example, 1.5Mbps/284kbps. For this example, you would enter "284". Alternatively you can test your uplink speed with a service such as www.dslreports.com.
Priority The priority of the message flow is entered here -- 0 receives the highest priority (most urgent) and 255 receives the lowest priority (least urgent). Protocol The protocol used by the messages. Local IP Range The rule applies to a flow of messages whose LAN-side IP address falls within the range set here. Local Port Range The rule applies to a flow of messages whose LAN-side port number is within the range set here.
Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable Specifies whether the entry will be enabled or disabled. Destination IP The IP address of packets that will take this route. Netmask One bits in the mask specify which bits of the IP address must match. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.
Routes List The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route" section is activated for editing. Click the Enable checkbox at the left to directly activate or de-activate the entry.
Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. Enable By default, the Access Control feature is disabled. If you need Access Control, check this option.
Advanced_WEB Filter The Web sites listed here are used when the Web Filter option is enabled in Advanced → Access Control. Add Web Filtering Rule This section is where you add the Web sites to be used for Access Control. Website URL/Domain google.com. http:// preceding the URL. Enter the most inclusive domain; for example, enter ubicom.com and access will be permitted to both www.ubicom.com and support.ubicom.com.
Advanced_ MAC Address Filter (Network Filter) The MAC address filter section can be used to filter network access by machines based on the unique MAC addresses of their network adapter(s). It is most useful to prevent unauthorized wireless devices from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. MAC Filtering Setup Choose the type of MAC filtering needed.
Advanced_ Firewall Settings The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyberattackers. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyberattacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
TCP Endpoint Filtering Controls endpoint filtering for packets of the TCP protocol. Formerly, the terms "Full Cone", "Restricted Cone", "Port Restricted Cone" and "Symmetric" were used to refer to different variations of NATs. These terms are purposely not used here, because they do not fully describe the behavior of this router's NAT.
• A host needs to support several applications that might use overlapping ingress ports such that two port forwarding rules cannot be used because they would potentially be in conflict. • To handle incoming connections that use a protocol other than ICMP, TCP, UDP, and IGMP (also GRE and ESP, when these protocols are enabled by the PPTP and IPSec ALGs ). Enable DMZ Note: Putting a computer in the DMZ may expose that computer to a variety of security risks.
multiple VPN pass-through in this case, the IPSec ALG must be enabled. RTSP Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger. The SIP ALG must also be enabled when the Windows Messenger ALG is enabled.
Advanced_ Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyberattacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges. Save/Update Record the changes you have made into the following list.
Advanced_ Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000.
beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 255. Wireless Isolation Enabling Wireless Isolation prevents associated wireless clients from communicating with each other. WMM Enable Enabling WMM can help control latency and jitter when transmitting multimedia content over a wireless connection. Short GI Using a short (400ns) guard interval can increase throughput.
Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
Automatic When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the behaviour that the streams exhibit. This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. Add/Edit WISH Rule A WISH Rule identifies a specific message flow and assigns a priority to that flow.
WISH Rules This section lists the defined WISH Rules. Click the Enable checkbox at the left to directly activate or de-activate the entry. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit WISH Rule" section is activated for editing.
Advanced_ Wi-Fi Protected Setup Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. It is still possible to change wireless network settings with Manual Wireless Network Setup, Wireless Network Setup Wizard, or an existing external WLAN Manager Registrar.
Add Wireless Station This Wizard helps you add wireless devices to the wireless network. The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds.
Advanced_ Advanced Network UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here. Allow Users to disable Internet Access Disabling this option prevents UPnP clients from terminating the WAN connection.
your WAN IP address is valid. Enable WAN Ping Respond If you leave this option unchecked, you are causing the router to ignore the public WAN IP address of the router. ping commands for WAN Ping Inbound Filter Select a filter that controls which WAN computers can use the ping feature. If you do not see the filter you need in the list of filters, go to the Advanced → Inbound Filter screen and create a new filter. WAN Port Speed Normally, this is set to "auto".
Tools The Tools tab provides the following configuration options: Administrator Settings, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, System Check, Schedules Tools_Admin (Administrator Settings) The Administrator Settings section is used to set-up secure access to the Web-based management. By default no password is configured. It is highly recommended that you create a password to keep your new router secure.
management interface. Gateway Name The name of the router can be changed here. Inactivity Time Out If the router does not detect any administrative activity (from WAN or LAN) during this number of minutes, it logs the adminstrator off. Enable HTTPS Server Enabling this option makes it possible to perform remote management with the Secure HTTP (HTTPS) protocol. Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet.
Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly.
Select the starting and ending times for the change to and from daylight saving time. For example, suppose for DST Start you select Month="Oct", Week="3rd", Day="Sun" and Time="2am". This is the same as saying: "Daylight saving starts on the third Sunday of October at 2:00 AM." Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet.
Tools_Syslog This section allows you to archive your log files to a Syslog Server. Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
Account Name Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule. Schedule If you selected the On Schedule option, select one of the defined schedule rules.
Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save To Local Hard Drive This option allows you to save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade.
Tools_Firmware Use the Firmware section to install the latest firmware to improve functionality and performance. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version. To upgrade the firmware, follow these steps: 1. Click the Browse button to locate the upgrade file on your computer. 2. Once you have found the file to be used, click the Upload button below to start the firmware upgrade process.
performing an upgrade, be sure to save the current configuration from the Tools → System screen. Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router. Firmware Upgrade Notification Options Automatically Check Online for Latest Firmware Version When this option is enabled, your router will check online periodically to see if a newer version of the firmware is available.
Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
changed. The timeout period is entered in hours. Note: If a dynamic DNS update fails for any reason (for example, when incorrect parameters are entered), the router automatically disables the Dynamic DNS feature and records the failure in the log. Note: After configuring the router for dynamic DNS, you can open a browser and navigate to the URL for your domain (for example http://www.mydomain.info) and the router will attempt to forward the request to port 80 on your LAN.
Tools_System Check Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Address Enter either the IP address of the target computer or enter its fully qualified domain name. Ping Start pinging the specified host.
Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made. Schedule Rules List This section shows the currently defined Schedule Rules. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Schedule Rule" section is activated for editing.
Status The Status tab provides the following configuration options: Device Info, Wireless, Logs, Statistics, Internet Sessions, WISH Sessions Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Note: Some browsers have limitations that make it impossible to update the WAN status display when the status changes. Some browsers require that you refresh the display to obtain updated status.
DHCP Connection Clicking the DHCP Release button unassigns the router's IP address. The router will not respond to IP messages from the WAN side until you click the power-up the router again. Clicking the new IP address from the ISP's server.
Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, 11g, or 11n for 802.11b, 802.11g, or 802.11n respectively. Rate The actual transmission rate of the client in megabits per second. Signal This is a relative measure of signal quality.
Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
• Informational Apply Log Settings Now Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Email Now If you provided email information with the Tools → Email Settings screen, clicking the Now Email button sends the router log to the configured email address.
Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
79
Status_ Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Local The IP address and, where appropriate, port number of the local application. NAT The port number of the LAN-side application as viewed by the WAN-side application.
Dir The direction of initiation of the conversation: Out Initiated from LAN to WAN. In Initiated from WAN to LAN. Priority The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds UDP connections. 240 seconds Reset or closed TCP connections.
Status_WISH Sessions The WISH Sessions page displays full details of active local wireless sessions through your router when WISH has been enabled. A WISH session is a conversation between a program or application on a wirelessly connected LAN-side computer and another computer, however connected. Originator The IP address and, where appropriate, port number of the computer that originated a network connection.
• BK: Background (least urgent). • BE: Best Effort. • VI: Video. • VO: Voice (most urgent). Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds UDP connections. 240 seconds Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
Glossary 8 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Address Resolution Protocol ARP.
Attenuation The loss in strength of digital and analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA.
C Cable modem A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time.
dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers. E EAP Extensible Authentication Protocol Email Electronic Mail is a computer-stored message that is transmitted over the Internet Encryption Converting data into cyphertext so that it cannot be easily read Ethernet The most widely used technology for Local Area Networks.
Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second GUI Graphical user interface H H.
IKE Internet Key Exchange is used to ensure security for VPN connections Infrastructure In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Prot
Kbps Kilobits per second Kbyte Kilobyte L L2TP Layer 2 Tunneling Protocol LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data.
MPPE Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections MTU Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protoco
Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routing table are sent to all the other routers in the network as opposed to sending the entire routing table at a regular interval, which is how RIP functions P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Physical layer The first layer o
Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it's operating software or firmware from nonvolatile storage.
Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office/Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests are allowed to pass though the firewall Subnet mask Determines what port
User Datagram Protocol Unicast Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files acce
WDS Wireless Distribution System. A system that enables the interconnection of access points wirelessly.