Wireless Broadband Router User’s Manual MI424WR
Table of Contents 1 Introduction 1 Package Contents Minimum System Requirements Features Getting to Know the Router 2 Connecting the Router 1 2 2 4 9 Setting Up the Router Computer Network Configuration Configuring the Router Home Page 9 11 13 15 3 Configuring My Network Settings 17 Accessing My Network Using My Network 17 18 4 Creating a Wireless Network Overview Wireless Status Basic Security Settings Advanced Security Settings Configuring a Wireless Windows XP Client Connecting a Wireless Win
Wireless Broadband Router User Manual 8 Using Advanced Settings Firmware Upgrade Firmware Restore Configuration File System Settings Date and Time Scheduler Rules Routing IP Address Distribution Diagnostics Restoring Default Settings Reboot the Router MAC Cloning ARP (Address Resolution Protocol) Table Users QoS Local Administration Remote Administration Dynamic DNS DNS Server Network Objects Universal Plug and Play (UPnP) Protocols 9 Monitoring the Router Router Status Advanced Status 103 105 107 108 10
1 Introduction Thank you for purchasing the Wireless Broadband Router. The Wireless Broadband Router supports Multimedia over Coax Alliance (MoCA), a new networking standard that allows digital entertainment and information to be transmitted and distributed to multiple devices over coaxial cables. The Router also supports Ethernet and Wi-Fi networking, making it the most versatile router available.
Wireless Broadband Router User Manual s Wall-mount template s Vertical stand s Warranty Minimum System Requirements s Computer with Ethernet capability s Microsoft Windows 98SE, Me, 2000, or XP; Mac OS 9 or greater; Linux/ BSD, Unix s Internet Explorer 5.0 or higher; Netscape Navigator 7.0 or higher s TCP/IP network protocol installed on each computer Features s Supports multiple networking standards, including: WAN - Ethernet and MoCA interfaces LAN - 802.11g, 802.
Chapter 1 Introduction Intrusion detection MAC address filtering NAT DMZ hosting Access control Advanced wireless protection featuring WPA, WEP 64/128 bit encryption, 802.1x authentication, and MAC address filtering ICSA certified s Other Features DHCP server option DHCP server/PPPoE server auto-detection DNS server LAN IP and WAN IP address selection MAC address cloning Port forwarding PPPoE support QoS support (end to end layer 2/3) featuring Diffserv, 802.
Wireless Broadband Router User Manual Getting to Know the Router This section contains a quick description of the Router’s lights (LEDs), ports, etc. The Router features several indicator lights on its front panel, and a series of ports and switches on its rear panel. Front Panel The front panel of the Router features ten indicator lights: Power, WAN Ethernet, WAN Coax, Internet, LAN Ethernet (4), LAN Coax, and Wireless. Power Light The Power light displays the Router’s current status.
Chapter 1 Introduction Internet Light When the Internet light glows steadily green, the Router is connected to the ISP (Internet Service Provider). If it glows amber, there is a physical connection to the ONT (Optical Network Terminator), but authentication has not taken place (i.e., no IP address is present). LAN Ethernet Lights (1, 2, 3, 4) The LAN Ethernet lights illuminate when the Router is connected to a local network via one or more of its Ethernet ports.
Wireless Broadband Router User Manual Rear Panel The rear panel of the Router features seven ports (Coax, WAN Ethernet, LAN Ethernet [4], and Power), as well as a Reset button and Power switch. Coax Port The Coax port connects the Router to the ISP or other devices using a coaxial cable. Reset Button To restore the Router’s factory default settings, press and hold the Reset button for approximately ten seconds. The reset process will start about ten seconds after releasing the button.
Chapter 1 Introduction Power Switch The Power switch powers the Router on and off. Power Port The Power port connects the Router to an electrical wall outlet via the Power cord.
Wireless Broadband Router User Manual This page left intentionally blank.
Connecting the Router 2 Connecting a computer or local network to the Wireless Broadband Router is a simple procedure, varying slightly depending on the computer’s operating system but designed to seamlessly integrate the Router with the computer or local network. Moreover, addition configuration to access the GUI is not required when taking advantage of Universal Plug-and-Play support in Windows XP.
Wireless Broadband Router User Manual 6. Make sure the computer is powered on, then plug the other end of the yellow Ethernet cable into an Ethernet port on the computer. 7. Make sure at least one of the Ethernet LAN lights on the front of the Router glows steadily green. This may take a few moments. 8. The phone company previously installed a high-speed wall jack somewhere in the house. Locate it and note its type (Ethernet or coaxial). If Ethernet, follow steps 8a and 8b.
Chapter 2 Connecting the Router Computer Network Configuration Each network interface on the computer should either be configured with a statically defined IP address and DNS address, or instructed to automatically obtain an IP address using the Network DHCP server. The Router is set up, by default, with an active DHCP server, and Verizon recommends leaving this setting as is. Configuring Dynamic IP Addressing To set up a computer to use dynamic IP addressing: Windows XP 1.
Wireless Broadband Router User Manual Windows 98/Me 1. Select Network in the Control Panel. 2. Select the TCP/IP settings for the network card, then click Properties. 3. Click the “Obtain an IP address automatically” radio button in the “IP Address” tab. 4. Click Disable DNS in the DNS configuration tab. 5. Click OK in the “TCP/IP Properties” screen. 6. Click OK in the “Network” screen to reboot and save the settings. Windows NT 1. Click Network in the Control Panel. The “Network” window appears. 2.
Chapter 2 Connecting the Router Configuring the Router 1. Open a web browser on the computer connected to the Router. In the “Address” text box, type: http://192.168.1.1 then press Enter on the keyboard. 2. The “Login” screen appears. Enter the default user name (admin) and password (password) in the appropriate text boxes, then click OK. 3. The “Login Setup” screen appears.
Wireless Broadband Router User Manual Connecting Other Computers/Set Top Boxes The Router can connect to other computers or set top boxes in three ways: via Ethernet, via wireless connection, or via coaxial cable. Ethernet 1. Get an Ethernet cable and plug one end into one of the open yellow Ethernet ports on the back of the Router. 2. Plug the other end of the Ethernet cable into an Ethernet port on the computer. 3.
Chapter 2 Connecting the Router 3. Connect one end of the coaxial cable to the coaxial wall jack, and the other end to the red Coax port on the back of the Router. 4. Power up the set top box. 5. Make sure the Coax LAN light on the front of the Router glows steadily green. This may take a few minutes. When it does, the set top box is connected to the Router.
Wireless Broadband Router User Manual Main Menu The “Main Menu” contains links to all of the configuration options of the Router: Wireless Setup (explained in chapter 4 of this manual), My Network (chapter 5), Firewall (chapter 6), Parental Controls (chapter 7), Advanced (chapter 8), and System Monitoring (chapter 9). My Router This section displays the status of the Router’s network and Internet connection.
Configuring My Network Settings 3 Once the Wireless Broadband Router is physically connected and the MegaControl Panel’s Home screen is displayed in a web browser, a list of the devices connected to the Router’s network appears in the “My Network” section of the screen. From here, some basic network settings can be configured. Accessing My Network To access My Network, click on “My Network” in the Home screen.
Wireless Broadband Router User Manual Using My Network Various settings can be accessed for a particular device, as follows. Access Device For devices that can be accessed (such as Internet cameras and networked hard drives), locate it in the My Network column, then click Access Devices to use the device over the network. Access Shared Files To access the shared files on a particular device, locate the device in the My Network column, then click Access Shared Files.
Chapter 3 Configuring My Network Settings 1. Click Add in the “Networked computer/Device” column. The “Add Access Control Rule” screen appears. 2. If this access control rule applies to all networked devices, select “Any” from the “Networked Computer/Device” list box. If this rule applies to certain devices only, select “Specify Address” and click Add. Then, add a network object (for more details about adding network objects, see the “Advanced Settings” chapter of this manual). 3.
Wireless Broadband Router User Manual The user may disable an access control and the service made available without having to remove the service from the Access Control table. This may be useful to make the service available only temporarily, with the expectation that the restriction will be reinstated later. • To temporarily disable an access control clear the check box next to the network computer/device.
Chapter 3 Configuring My Network Settings 1. Click Add. The “Add Port Forwarding Rule” screen appears. 2. Enter the local IP address or the host name of the computer providing the service in the “Networked Computer/Device” text box. Note that only one local network computer can be assigned to provide a specific service or application. 3. Select the Internet protocol to be provided from the “Protocol” drop-down list. 4.
Wireless Broadband Router User Manual View Device Details To view information about a networked device, or to test a device’s connection, locate the device in the My Network column, then click View Device Details. The “Device Information” screen appears. 1. Click Test Connectivity. The “Diagnostics” screen appears. 2. Click Go. The Router runs a ping test, and the results are displayed in the Diagnostics screen.
Chapter 3 Configuring My Network Settings Rename This Device To rename a networked device, locate the device in the My Network column, then click Rename This Device. The “Rename Device” screen appears. Enter the new name of the device in the “New Name” text box and, if needed, select a new icon for the device from the “New Icon” drop-down list.
Wireless Broadband Router User Manual This page left intentionally blank.
4 Creating a Wireless Network This chapter explains how to create a wireless network using the Wireless Broadband Router, including accessing and configuring wireless security options. Overview The Wireless Broadband Router provides the user with wireless connectivity over the 802.11b and g standards (the most common wireless standards). 802.11b has a maximum data rate of 11 Mbps, while 802.11g has a maximum data rate of 54 Mbps. Both operate in the 2.4 GHz range.
Wireless Broadband Router User Manual Wireless Status Clicking on the “Wireless Settings” icon in the Home screen generates the “Wireless Status” screen, which displays the current status of the wireless connection. Radio Enabled Displays whether the Router’s wireless radio is active. SSID The SSID (Service Set Identifier) is the network name shared among all devices on a particular wireless network. The SSID must be identical for all devices on the wireless network.
Chapter 4 Creating a Wireless Network SSID Broadcast Displays whether the Router is broadcasting its SSID. If activated, the SSID of the Router’s wireless network is broadcast wirelessly. MAC Authentication Displays whether the Router is using MAC (Media Access Control) address authentication to allow wireless devices to join the network. Wireless Mode Displays the types of wireless device that can join the network. Options include 802.11b, 802.11g, or Mixed (allows both 802.11b- and 802.
Wireless Broadband Router User Manual Basic Security Settings To configure the Router’s wireless network for basic security, select “Basic Security Settings” from the menu on the left side of any Wireless Settings screen. The “Basic Security Settings” screen appears. 1. Click the “On” radio button to activate the Router’s wireless radio. 2. Enter the name of the wireless network in the “SSID” text box. 3.
Chapter 4 Creating a Wireless Network 5. Select a WEP security level from the “select a WEP Key” drop-down list (options include “64/40 bit” or “128/104 bit”). 6. Enter the key code in the “Key Code” text box. Each character must be a letter from A-F or a number from 0-9. If 64/40 bit was selected in step 5, enter 10 characters. If 128/104 was selected, enter 26 characters. 7. Write down the wireless settings displayed on the screen.
Wireless Broadband Router User Manual Advanced Security Settings To configure the Router’s advanced wireless network security settings, select “Advanced Security Settings” from the menu on the left side of any Wireless Settings screen. The “Advanced Security Settings” screen appears. The advanced settings should only be configured by experi☞ Note: enced technical users. Level 1 (Wireless Security) This section is used to configure different types of wireless security.
Chapter 4 Creating a Wireless Network WEP If WEP was selected in the Advanced Security Settings screen, the “WEP Key” screen appears. 1. Select the appropriate network authentication level from the dropdown list. Options include Open System Authentication, Shared Key Authentication, or Both. 2. Activate WEP key 1 by clicking the radio button next to “1” on the left side. 3. Select the length of key 1 by selecting “64/40 bit” or “128/104 bit” from the appropriate drop-down list in the “Key Length” column.
Wireless Broadband Router User Manual 802.1X WEP If 802.1X WEP (Wired Equivalent Privacy) was selected, the “WEP+802.1x Radius Settings” screen appears. To generate the full screen, click in the “Enabled” check box to activate. 802.1x WEP is a robust security protocol that uses port control with dynamically changing encryption keys automatically updated over the network. 802.11x WEP uses a RADIUS (Remote Authentication Dial-in Service) server for authentication purposes.
Chapter 4 Creating a Wireless Network WPA If WPA (Wi-Fi Protected Access) was selected, the “WPA Key” screen appears. 1. Verify the authentication method selected is “Pre-Shared Key.” 2. Enter a phrase of at least eight characters in the “Pre-Shared Key” text box. Verify that “ASCII” is selected in the associated drop-down list. 3. Select the proper encryption algorithm (TKIP or AES). 4.
Wireless Broadband Router User Manual Level 2 (SSID Broadcast) This section is used to configure the Router’s SSID broadcast capabilities. Selecting “SSID Broadcast” generates the “SSID Broadcast” screen. Click the “Enable” radio button to enable SSID broadcasting. If enabled, the SSID of the Router’s wireless network will be broadcast wirelessly. To disable SSID broadcasting, click the “Disable” radio button.
Chapter 4 Creating a Wireless Network Level 3 (Limiting Access) This section is used to limit access to the Router’s wireless network. Wireless MAC Authentication Wireless MAC authentication allows the user to allow or deny access to the Router’s wireless network by a particular device’s MAC address. Selecting “Wireless MAC Authentication” from the Advanced Security Settings screen generates the “Wireless MAC Authentication” screen. To set up wireless MAC authentication: 1.
Wireless Broadband Router User Manual 3. Enter the MAC address of a device in the “Client MAC address” text box. 4. Click Add. 5. Repeat steps 3 and 4 to add more devices to the list. 6. When finished listing devices, click Apply. To remove a MAC address, select it from the “List” list box, then click Remove. 802.11b/g Mode This option allows the user to select the wireless communication standard compatible with the devices to be connected on the wireless network from the dropdown list.
Chapter 4 Creating a Wireless Network When should this rule occur? Displays the time during which the rule is active. To configure schedule rules, see chapter 9, “Advanced Settings.” Network Select the type of connection being configured from this drop-down list (options: Network [Home/Office], Broadband Connection, or DMZ). MTU MTU (Maximum Transmission Unit) specifies the largest packet size permitted for Internet transmission. “Automatic” sets the MTU at 1500.
Wireless Broadband Router User Manual DTIM Interval Enter the DTIM (Delivery Traffic Indication Message) interval value (in milliseconds) in this text box. A DTIM is a countdown mechanism for the Router, informing wireless network clients of the next window for listening to broadcast and multicast messages. Fragmentation Threshold Setting the correct fragmentation threshold can increase the reliability of frame transmissions on the wireless network. Enter the fragmentation threshold in this text box.
Chapter 4 Creating a Wireless Network 2. Double-click the wireless connection icon. The “Wireless Network Connection” screen appears, displaying all available wireless networks in the vicinity. If the Router is connected and active, the Router’s wireless connection is displayed. Note that the connection’s status is “Not connected” and defined as “Security-enabled wireless network (WPA)” in the figure below. 3. Click the connection once to mark it, then click Connect at the bottom of the screen.
Wireless Broadband Router User Manual Connecting a Wireless Windows XP Client This section assumes the Router is set up with WPA security. 1. Click Network Connections in the Control Panel. The “Network Connections” window appears. 2. Double-click the wireless connection icon. The “Wireless Network Connection” screen appears, displaying the Router’s wireless connection. Note that the connection is defined as “Security-enabled wireless network (WPA).
Chapter 4 Creating a Wireless Network 3. Click the connection once to mark it, then click Connect at the bottom of the screen. The following login window appears, asking for a “Network Key,” which is the pre-shared key used when configuring the Router’s WPA security (see the “WPA” section in this chapter). 4. Enter the pre-shared key in both text boxes and click Connect. After the connection is established, its status will change to “Connected,” as shown below.
Wireless Broadband Router User Manual 2. The “Wireless Network Connection Properties” window appears. Select Wireless Networks. 3. Click the connection to highlight it, then click Properties. The connection’s “Properties Window” appears. 4. From the “Network Authentication” drop-down list, select WPA-PSK. 5. From the “Data Encryption” drop-down list, select TKIP.
Chapter 4 Creating a Wireless Network 6. Enter the pre-shared key in both the “Network key” and the “Confirm network key” text boxes. 7. Click OK, then OK again. 8. When attempting to connect to the wireless network, the login window appears, pre-populated with the pre-shared key. Press Connect to connect. Since the network is now secured, only users who know the pre-shared key will be able to connect. The WPA security protocol is similar to securing network access using a password.
Wireless Broadband Router User Manual This page left intentionally blank.
Using Network Connections 5 The Wireless Broadband Router supports various local area network (LAN) and wide area network (WAN, on Internet) connections via Ethernet or coaxial cables. Network connections is used to configure the various parameters of the Router’s network and Internet connections, and create new connections. The settings covered in this chapter should be configMCaution: ured by experienced network technicians only.
Wireless Broadband Router User Manual To select a connection, click on its name. The rest of this chapter describes the different network connections available on the Router, as well as the connection types that can be created. Network (Home/Office) Select Network (Home/Office) in the Network Connections screen to generate the “Network (Home/Office) Properties” screen. This screen displays a list of the local network’s properties.
Chapter 5 Using Network Connections Configuring the Home/Office Network Click Settings in the “Network (Home/Office) Properties” screen to generate the “Configure Network (Home/Office)” screen. General The top part of the Configure Network (Home/Office) screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts. Status Displays the connection status of the network.
Wireless Broadband Router User Manual Internet Protocol This section has three options: No IP Address, Obtain an IP Address Automatically, and Use the Following IP Address. No IP Address Select this option if the connection will have no IP address. This is useful if the connection operates under a bridge. Obtain an IP Address Automatically Select this option if the network connection is required by the ISP to obtain an IP address automatically.
Chapter 5 Using Network Connections STP Click in the device’s “STP” check box to enable Spanning Tree Protocol on the device. This protocol provides path redundancy while preventing undesirable loops in the network. Action The “Action” column contains an icon that, when clicked, generates the configuration screen of the particular device. DNS Server Domain Name System (DNS) is the method by which website or domain names are translated into IP addresses.
Wireless Broadband Router User Manual 4. Enter the subnet mask address in the “Subnet Mask” text boxes. The subnet mask determines which portion of a destination LAN IP address is the network portion, and which portion is the host portion. 5. If Windows Internet Naming Service (WINS) is being used, enter the WINS server address in the “WINS Server” text boxes. 6.
Chapter 5 Using Network Connections Routing Table Clicking New Route generates the “New Route” window, where a new route can be configured. Additional IP Addresses Clicking New IP Address generates the “Additional IP Address Settings” screen, where additional IP addresses can be created to access the Router via the Network (Home/Office) connection. Ethernet Connection An Ethernet connection connects computers to the Router using Ethernet cables, either directly or via network hubs and switches.
Wireless Broadband Router User Manual Configuring the Ethernet Connection Click Settings at the bottom-right of the Ethernet Properties screen to generate the “Configure Ethernet” screen. General The top part of the Configure Ethernet screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts. Status Displays the connection status of the Ethernet switch.
Chapter 5 Using Network Connections Additional IP Addresses Clicking New IP Address generates the “Additional IP Address Settings” screen, where additional IP addresses can be created to access the Router via the Ethernet connection. 4 Ports Ethernet Switch This section displays the connection status of the Router’s four Ethernet ports. Clicking on a connection’s “Action” icon (in the column on the right) generates the “Port VLANs” screen, where ingress and egress policies can be edited.
Wireless Broadband Router User Manual Coax Connection A Coax connection connects devices (such as set-top boxes) to the Router using a coaxial cable. Click Coax in the Network Connections screen (if needed, click Advanced at the bottom of the screen to reveal the “Coax” link below “Network [Home/Office]”) to generate the “Coax Properties” screen. This screen displays a list of the connection’s properties.
Chapter 5 Using Network Connections Configure Coax Click Settings at the bottom-right of the Coax Properties screen generates the “Configure Coax” screen. General The top part of the Configure Coax screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts. Status Displays the status of the coax connection.v When should this rule occur? Displays when the rule is active.
Wireless Broadband Router User Manual Coax Link Set up the coax link options in this section of the Configure Coax screen. Options include Channel, Privacy, and Password. Channel Select the Channel from the drop-down list (select from 1-6, or “Automatic”). Privacy Toggle “Privacy” by clicking in the “Enabled” check box. If Privacy is activated, all devices connected via coaxial cable must use the same password. Verizon recommends leaving the Privacy option deactivated.
Chapter 5 Using Network Connections Broadband Ethernet Connection A Broadband Ethernet connection connects the Router to the Internet using an Ethernet cable. Click Broadband Connection (Ethernet) from the Network Connections screen to generate the “Broadband Connection (Ethernet) Properties” screen. This screen displays a list of the connection’s properties.
Wireless Broadband Router User Manual Configuring the Broadband Ethernet Connection Click Settings at the bottom-right of the Broadband Connection (Ethernet) Properties window to generate the “Configure Broadband Connection (Ethernet)” screen. General The top part of the screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts.
Chapter 5 Using Network Connections MTU MTU (Maximum Transmission Unit) specifies the largest packet size permitted for Internet transmission. “Automatic, sets the MTU at 1500. Other choices include “Automatic by DHCP,” which sets the MTU according to the DHCP connection, and “Manual,” which allows the MTU to be set manually. Internet Protocol This section includes three options: No IP Address, Obtain an IP Address Automatically, and Use the Following IP Address.
Wireless Broadband Router User Manual IP Address Distribution The “IP Address Distribution” section of the Configure Broadband Connection (Ethernet) screen is used to configure the Router’s Dynamic Host Configuration Protocol (DHCP) server parameters. DHCP automatically assigns IP addresses to network devices. If enabled, make sure to configure the network devices as “DHCP Clients.” There are three options in this section: Disabled, DHCP Server, and DHCP Relay.
Chapter 5 Using Network Connections Additionally, to add a new product or product family, click New IP Range in the “Vendor Class ID” column below “IP Address Distriution According to DHCP Option 60 (Vendor Class Identifier).” This generates the “DHCP Server Pool Settings” screen. Set the device name, IP range, and priority level in the appropriate text boxes, then click Apply. DHCP Relay Select this option to have the Router function as a DHCP relay.
Wireless Broadband Router User Manual 3. Click in the “Default Route” check box to define this device as a the default route. 4. Click in the “Multicast - IGMP Proxy Internal” check box to activate multicasting. Routing Table Clicking New Route generates the “New Route” window, where a new route can be configured. Internet Connection Firewall Click in the “Enabled” check box to activate the Router’s firewall on the connection.
Chapter 5 Using Network Connections If disabling the connection, the Router must be rebooted ☞ Note: for the change to take effect. Configuring the Coax Broadband Connection Click Settings at the bottom of the Broadband Connection (Coax) Properties screen to generate the “Configure Broadband Connection (Coax)” screen. General The top part of the screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts.
Wireless Broadband Router User Manual Network Displays the type of network to which the link is connected. Since this is a broadband connection (connected to the Internet), “Broadband Connection is displayed. Connection Type Displays the type of connection. Since this is a coaxial connection, “Coax” is displayed. Physical Address Displays the physical address of the network card used for the network. MTU MTU (Maximum Transmission Unit) specifies the largest packet size permitted for Internet transmission.
Chapter 5 Using Network Connections Obtain an IP Address Automatically Select this option if the ISP requires the connection to obtain an IP address automatically. The server assigning the IP address also assigns a subnet mask address, which can be overridden by clicking in the “Override Subnet Mask” check box and entering another subnet mask address. Additionally, the DHCP lease can be renewed and/or released by clicking on the appropriate “DHCP Lease” button.
Wireless Broadband Router User Manual DHCP Server To set up the WAN Coax Link Ethernet connection to function as a DHCP server: 1. Select DHCP Server. 2. Enter the IP address at which the Router starts issuing addresses in the “Start IP Address” text boxes. Since the Router’s default IP address is 192.168.1.1, the Start IP Address must be 192.168.1.2. 3. Enter the end of the IP address range used to automatically issue IP addresses in the “End IP Address” text boxes. 4.
Chapter 5 Using Network Connections Advanced To set up the Router’s Coax broadband connection for advanced routing: 1. Select Advanced from the Routing drop-down list. 2. Enter a device metric in the “Device Metric” text box. The device metric is a value used by the Router to determine whether one route is superior to another, considering parameters such as bandwidth and delay time. 3. Click in the “Default Route” check box to define this device as the default route. 4.
Wireless Broadband Router User Manual WAN PPPoE/WAN PPPoE 2 WAN Point-to-Point Protocol over Ethernet (PPPoE) relies on two widely accepted standards: Point-to-Point Protocol and Ethernet. PPPoE enables Ethernet net- worked computers to exchange information with computers on the Internet. PPPoE supports the protocol layers and authentication widely used in PPP and enables a point-to-point connection to be established in the normally multipoint architecture of Ethernet.
Chapter 5 Using Network Connections Configuring the WAN PPPoE Connection Click Settings in the WAN PPPoE Properties screen to generate the “Configure WAN PPPoE” screen. General The top part of the Configure WAN PPPoE screen displays general communication parameters. Verizon recommends not changing the default values in this section unless familiar with networking concepts. Status Displays the connection status of the WAN PPPoE connection. (“Down,” “Disabled,” “Connected,” etc.
Wireless Broadband Router User Manual Network Select the type of connection being configured from the drop-down list (Broadband Connection, Network (Home/Office), or DMZ). Connection Type Displays the type of connection. Since this is PPPoE connection, “PPPoE” is displayed. MTU MTU (Maximum Transmission Unit) specifies the largest packet size permitted for Internet transmission. “Automatic, sets the MTU at 1492.
Chapter 5 Using Network Connections Login User Name Enter the user name (provided by the ISP) in this text box. Login Password Enter the password (provided by the ISP) in this text box. Support Unencrypted Password (PAP) Password Authentication Protocol (PAP) is a simple, plain-text authentication scheme. The user name and password are requested by the networking peer in plain-text. PAP, however, is not a secure authentication protocol.
Wireless Broadband Router User Manual Internet Protocol Select one of the following Internet Protocol options from the “Internet Protocol” drop-down list: Obtain an IP Address Automatically This option is selected by default. Change only if required by the ISP. The server that assigns the Router with an IP address also assigns a subnet mask. Override the dynamically assigned subnet mask by selecting the “Override Subnet Mask” and entering a different subnet mask.
Chapter 5 Using Network Connections • NAPT - Select this option to activate NAPT (Network Address and Port Translation), which refers to network address translation involving the mapping of port numbers and allows multiple machines to share a single IP address. Use NAPT if the local network contains multiple devices, a topology that necessitates port translation in addition to address translation.
Wireless Broadband Router User Manual This page left intentionally blank.
Configuring the Router’s Security 6 The Wireless Broadband Router’s security suite includes comprehensive and robust security services: Stateful Packet Inspection, a firewall, user authentication protocols, and password protection mechanisms. These features allow users to connect their computers to the Internet and be protected from the security threats. The Router’s firewall is the cornerstone of the Router’s security suite.
Wireless Broadband Router User Manual This chapter covers these Security features: • General - select the security level for the firewall. • Access Control - restrict access from the local network to the Internet. • Port Forwarding - enable access from the Internet to specified services provided by computers on the local network. • DMZ Host - configure a network host to receive all traffic arriving at the Router which does not belong to a known session.
Chapter 6 Configuring the Router’s Security General The “General” screen is used to configure the Router’s basic security settings. The firewall regulates the flow of data between the local network and the Internet. Both incoming and outgoing data are inspected and then either accepted (allowed to pass through the Router) or rejected (barred from passing through the Router) according to a flexible and configurable set of rules.
Wireless Broadband Router User Manual Note that it is the origin of the request, not subsequent responses to this request, which determines whether a session can be established or not. The Router features three pre-defined security levels: Minimum, Typical, and Maximum. The table below summarizes the behavior of the Router for each of the three security levels.
Chapter 6 Configuring the Router’s Security 2. Check the “Block IP Fragments” box to protect the local network from a common type of hacker attack that uses fragmented data packets to sabotage the network. Note that VPN over IPSec and some UDP-based services make legitimate use of IP fragments. IP fragments must be allowed to pass into the local network to use these services. 3. Click Apply to save changes.
Wireless Broadband Router User Manual Allow or Restrict Services To view and allow/restrict these services: 1. Select Access Control from the left side of any Security screen. The “Access Control” screen appears. The “Allowed” section is only visible when the firewall is ☞ Note: set to “Maximum.” 2. Click Add. The “Add Access Control Rule” screen appears. To block a service, click Add in the “Blocked” section of ☞ Note: the Access Control screen.
Chapter 6 Configuring the Router’s Security 3. If this access control rule applies to all networked devices, select “Any” from the “Networked Computer/Device” list box. If this rule applies to certain devices only, select “Specify Address” and click Add. Then, create and add a network object (for more details about adding network objects, see the “Advanced Settings” chapter of this manual). 4. Select the Internet protocol to be allowed or blocked from the “Protocol” drop-down list. 5.
Wireless Broadband Router User Manual Port Forwarding In its default state, the Router blocks all external users from connecting to or communicating with the network, making it safe from hackers who may try to intrude on the network and damage it. However, the network can be exposed to the Internet in certain limited and controlled ways to enable some applications to work from the local network (game, voice, and chat applications, for example) and to enable Internet access to servers in the network.
Chapter 6 Configuring the Router’s Security 4. Select the Internet protocol to be provided from the “Protocol” drop-down list. To see all options, select All Services. 5. Select a WAN connection type from the “WAN Connection Type” drop-down list. Verizon recommends selecting All Broadband Devices. 6. To select a port to forward communications to (this is optional), select Specify from the “Forward to Port” drop-down list, then, in the text box that appears, enter the port number.
Wireless Broadband Router User Manual To designate a local computer as a DMZ host: 1. Select DMZ Host from the left side of any Security screen. The “DMZ Host” screen appears. 2. Click in the “DMZ Host IP Address” check box, then enter the IP address of the computer to be designated as a DMZ host. Note that only one network computer can be a DMZ host at any time. 3. Click Apply. Click in the “DMZ Host IP Address” check box again to disable the DMZ host.
Chapter 6 Configuring the Router’s Security To use port triggering: 1. Select Port Triggering from the left side of any Security screen. The “Port Triggering” screen appears. 2. Select either “Specify Protocol” or “Show All Services” from the drop-down list next to “Add.” 3. Click Add. An “Edit Service” screen appears. 4. Specify the port triggering entries by clicking New Trigger Ports and New Opened Ports and entering the protocol and protocol number in the succeeding screens.
Wireless Broadband Router User Manual Remote Administration The Router can be accessed and controlled not only from within the local network, but also from the Internet using remote adminstration. To access, select Remote Administration from the left side of any Security screen. The “Remote Administration” screen appears. Telnet Telnet is used to create a command-line session and gain access to all system settings and parameters using a text-based terminal.
Chapter 6 Configuring the Router’s Security MegaControl Panel MegaControl Panel is used to obtain access to the Router’s MegaControl Panel and gain access to all settings and parameters,using a web browser. Both secure (HTTPS) and non-secure (HTTP) access is available. Select the port to be used by clicking in the appropriate text box, then click Apply. Telnet and MegaControl Panel remote administration ☞ Note: access may be used to modify or disable firewall settings.
Wireless Broadband Router User Manual Static NAT This option allows multiple public addresses to be designated to devices on the network. Static NAT allows devices behind a firewall and configured with private IP addresses appear to have public IP addresses on the Internet. This allows an internal host, such as a web server, to have an unregistered (private) IP address and still be reachable over the Internet. To do this: 1. Select Static NAT from any Security screen. The “Static NAT” screen appears. 2.
Chapter 6 Configuring the Router’s Security Advanced Filtering Advanced filtering is designed to allow comprehensive control over the firewall’s behavior. Specific input and output rules can be defined, the order of logically similar sets of rules controlled, and distinctions made between rules that apply to Internet and local network devices. To access, select Advanced Filtering from any Security screen. The “Advanced Filtering” screen appears.
Wireless Broadband Router User Manual Inbound Packets - Input Rule Sets • Initial rules • All rules defined for the network device on which the packet is • Local servers rules from the local server tab in the security screen • Rules to accept all the packets on a device in case the firewall check box “Internet Connection Firewall” in the connection settings screen is unchecked • Remote administration rules from the remote administration tab • DMZ host rules from the DMZ tab • Final rules Outbound Packets -
Chapter 6 Configuring the Router’s Security To configure advanced filtering rules, click Add next to the rule title. The “Add Advanced Filter” screen appears. To add an advanced filtering rule, define the following rule parameters: Matching To apply a firewall rule, a match must be made between IP addresses or ranges and ports. Use the “Source Address” and “Destination Address” drop-down lists to define the coupling of source and destination traffic. Port matching will be defined when selecting protocols.
Wireless Broadband Router User Manual • Accept - Allow access to packets that match the source and destination IP addresses and protocol ports defined in upper section of the screen. The data transfer session will be handled using Stateful Packet Inspection (SPI). • Accept Packet - Allow access to packets that match the source and destination IP addresses and protocol ports defined in upper section of the screen.
Chapter 6 Configuring the Router’s Security Time The time (based on the Router’s date and time settings) the event occurred. Event There are five kinds of events listed in the system log: • Inbound Traffic - a result of an incoming packet • Outbound Traffic - a result of an outgoing packet. • Firewall Setup - configuration message • WBM Login - a user logged in to WBM • CLI Login - a user logged in to the command line interface via Telnet Event-Type Displays a textual description of the event.
Wireless Broadband Router User Manual sage has been blocked. • ICMP redirect protection - an ICMP redirected message has been blocked. • Packet invalid in connection - an invalid connection packet has been blocked. • ICMP protection - a broadcast ICMP message has been blocked. • Broadcast/Multicast protection - a packet with a broadcast/multicast source IP has been blocked. • Spoofing protection - a packet from the Internet with a source IP belonging the local network has been blocked.
Chapter 6 Configuring the Router’s Security receive a PPTP connection has been accepted. • AUTH:113 request - an outbound packet for AUTH protocol has been accepted (for maximum security level). • IPV6 over IPV4 - an IPv6 over IPv4 packet has been accepted. • ARP - an ARP packet has been accepted. • PPP Discover - a PPP discover packet has been accepted. • PPP Session - a PPP session packet has been accepted. • 802.1Q - a 802.1Q (VLAN) packet has been accepted.
Wireless Broadband Router User Manual • Fragmented packet, packet too big - a packet has been blocked because, after defragmentation, the packet was too big. • Fragmented packet, packet exceeds - a packet has been blocked because, after defragmentation, the packet exceeded. • Fragmented packet, no memory - a fragmented packet has been blocked because there is no memory for fragments.
Chapter 6 Configuring the Router’s Security • FTP port request to 3rd party is forbidden (Possible bounce attack) - a packet has been blocked. • Firewall Rules were changed - the firewall rule set has been modified. • User authentication - a message arrived during login time, including both successful and failed authentication. Security Log Settings To view or change the security log settings: 1. Click Settings in the Security Log screen. The “Security Log Settings” screen appears. 2.
Wireless Broadband Router User Manual 3. Select the type of blocked events to be listed in the log: • All Blocked Connection Attempts - activating this check box generates log messages for all blocked events. • Other Blocked Events - if “All Blocked Connection Attempts” is unchecked, select specific blocked events from this list to generate log messages. 4.
Using Parental Controls 7 The abundance of harmful information on the Internet poses a serious challenge for employers and parents alike - “How can I regulate what my employee/child does on the Internet?” The Wireless Broadband Router’s Parental Controls allows users to regulate, control, and monitor Internet access. By classifying and categorizing online content, it is possible to create numerous Internet access policies and easily apply them to networked computers.
Wireless Broadband Router User Manual 3a. Click the circle next to “Block the following Websites” to block access to a list of websites, or click the circle next to “Allow the following Websites” to allow access to a list of websites. 3b. Enter the URL of the websites to be included on the list in the text box below. For example, enter “www.sample.com.” 3c. Additionally, the Router can block or allow access to websites based on “keywords.
Chapter 7 Parental Controls 5a. Select the computer or device on the network on which the access policy will be enforced from the “Network Computer/Device” drop-down menu. 5a. Select the time period during which the access policy will be enforced from the “Network Computer/Device” drop-down menu. If “Specify Schedule” is selected, see “Scheduler Rules” in the “Advanced Settings” chapter for more infomation. 6. An overview of the rule (or access policy) is displayed at the bottom of the screen.
Wireless Broadband Router User Manual 2. Select the time period during which the access policy will be enforced from the “Network Computer/Device” drop-down menu. If “Specify Schedule” is selected, see “Scheduler Rules” in the “Advanced Settings” chapter for more infomation. 3. When finished, click Apply to have the access policy take effect. 4. An overview of the rule (or access policy) is displayed at the bottom of the screen.
Using Advanced Settings 8 The “Advanced” section of the Wireless Broadband Router’s MegaControl Panel is intended primarily for more advanced users. Some changes to settings within this section could adversely affect the operation of the Router and the local network, and should be made with caution. To access the Router’s Advanced Settings, click Advanced at the top of the Home screen, which generates the “Advanced” screen.
Wireless Broadband Router User Manual Restore Defaults - reset the Router to its default settings Reboot Router - restart the Router MAC Cloning - clone MAC addresses ARP Table - display active devices and their IP and MAC addresses, etc.
Chapter 8 Using Advanced Settings Firmware Upgrade The Router offers a built-in mechanism for upgrading its firmware without losing custom configurations and settings. There are two methods for upgrading the firmware: • Upgrading from a local computer - use a software image file pre-downloaded to the computer’s disk drive or located on the accompanying evaluation CD. • Upgrading from the Internet - use this method to upgrade the Router’s firmware by remotely downloading an updated software image file.
Wireless Broadband Router User Manual 2. In the “Upgrade From a Computer in the Network” section, click Upgrade Now. The “Upgrade From a Computer in the Network” screen appears. 3. Enter the path of the software image file, or press the “Browse” button to browse for the file, and click Apply. Make sure to only use files with an “rmt” extension when performing the firmware upgrade procedure. 4. When loading is completed, a confirmation screen appears, asking whether to upgrade to the new version.
Chapter 8 Using Advanced Settings Automatic Check Disabled If “Automatically Check Disabled” is selected, the Router will not automatically check for firmware upgrades. Manual Checking and Upgrading To manually upgrade the Router’s firmware: 1. Click Check Now in the Firmware Upgrade screen. 2. If a new version is available, click Force Upgrade. A download process will begin. When downloading is completed, a confirmation screen appears, asking whether to upgrade to the new version. 3. Click Apply.
Wireless Broadband Router User Manual Configuration File Use the Router’s Configuration File feature to view, save, and load configuration files, which are used to backup and restore the Router’s current configuration: To do this: 1. Click Configuration File in the Advanced screen. The “Configuration File” screen appears. 2. Click Load Configuration File to load the previous configuration from a file and restart the Router. 3. Click Save Configuration File to backup the current configuration to a file.
Chapter 8 Using Advanced Settings System Settings Clicking System Settings in the Advanced screen generates the “System Settings” screen, where various system and management parameters can be configured.
Wireless Broadband Router User Manual System Use the “System” section of this screen to configure the following two options: Wireless Broadband Router’s Hostname Specify the Router’s host name by entering it into the this text box. The host name is also the Router’s URL address, so it can be entered here rather than 192.168.1.1. Local Domain Specify the network’s local domain by entering it into this text box.
Chapter 8 Using Advanced Settings Management Application Ports This section allows the following management application ports to have their default port numbers to be changed: • Primary/secondary HTTP ports • Primary/secondary HTTPS ports • Primary/secondary Telnet ports • Secure Telnet over SSL ports System Logging Use this section to configure the following system log options. Enable Logging Click in this check box to activate system logging.
Wireless Broadband Router User Manual Security Logging Use this section to configure the following security log options. Enable Logging Click in this check box to activate security logging. Low Capacity Notification Enabled Click in this check box to activate low capacity notification (works in tandem with “Allowed Capacity Before Email Notification” and “Security Log Buffer Size” options).
Chapter 8 Using Advanced Settings Port Enter the port number of the E-mail server in this text box. Server Requires Authentication If the E-mail server requires authentication, click in this check box, then enter a user name and password in the “User Name” and “Password” text boxes that appear. Auto WAN Detection When activated, Auto WAN Detection causes the Router to automatically search for a WAN connection. Enable Logging Clicking in this check box activates automatic WAN detection.
Wireless Broadband Router User Manual Date and Time To configure date, time, and daylight savings time settings perform the following: 1. Click Date and Time in the Advanced screen. The “Date and Time” screen appears. 2. Select the local time zone from the drop-down list. The Router can automatically detect daylight saving setting for selected time zones.
Chapter 8 Using Advanced Settings To perform an automatic time update: 1. Click in the “Enabled” check box in the “Automatic Time Update” section. 2. Select the protocol to be used to perform the time update by selecting either the “Time of Day” or “Network Time Protocol” radio button. 3. Specify how often to perform the update in the “Update Every” text box. 4.
Wireless Broadband Router User Manual 3. Click Add. The “Set Rule Schedule” screen appears. 4. Enter a name for the rule in the “Rule Name” text box. 5. Specify if the rule will be active or inactive during the designated time period by clicking the appropriate “Rule Settings” radio button. 6. Click Add Rule Schedule. The “Edit Rule Schedule” screen appears. 7. Select or active or inactive days of the week by clicking in the appropriate text boxes.
Chapter 8 Using Advanced Settings 8. If applicable, click New Hours Range Entry to define an active/inactive hourly range. The “Edit Hour Range” screen appears. Enter a start and end time in the appropriate text boxes. 9. Click Apply. Make sure the Router’s date and time settings are properly ☞ Note: configured for the time zone. Routing Access the routing table rules by clicking Routing in the Advanced screen. The “Routing” screen appears.
Wireless Broadband Router User Manual When adding a routing rule, the following parameters must be specified: • Rule Name- Select the type of network from the drop-down list. • Destination - The destination is the destination host, subnet address, network address, or default route. The destination for a default route is 0.0.0.0. • Netmask - The network mask is used in conjunction with the destination to determine when a route is used. • Gateway - Enter the Router’s IP address.
Chapter 8 Using Advanced Settings Domain Routing Domain routing is used in multi-router local network configurations. Normally, to accesss a device connected to one router from another router on the network, its IP address must be used. Activating domain routing (by clicking in the appropriate check box) allows the user to access to the computer by name (as well as IP address).
Wireless Broadband Router User Manual To view a summary of the services currently being provided by the DHCP server, click IP Address Distribution in the Advanced screen. The “IP Address Distribution” screen appears. Editing DHCP Server Settings To edit the DHCP server settings for a device: 1. Click the appropriate icon in the “Action” column. The “DHCP Settings” screen for the device appears. 2. Select the “IP Address Distribution” from the drop-down list.
Chapter 8 Using Advanced Settings 3. Complete the following fields: • Start IP Address Range, End IP Address Range - determines the number of hosts connected to the network in this subnet. “Start” specifies the first IP address assigned in this subnet and “End” specifies the last IP address in the range. • Subnet Mask - used to determine to which subnet an IP address belongs. An example of a subnet mask value is 255.255.0.0.
Wireless Broadband Router User Manual To define a new connection with a fixed IP address: 1. Click New Static Connection in the DHCP Connections screen. The “DHCP Connection Settings” screen appears. 2. Enter a host name for this connection. 3. Enter the fixed IP address to assign to the computer. 4. Enter the MAC address of the computer’s network card. 5. Click the Apply to save changes.
Chapter 8 Using Advanced Settings Diagnostics The Diagnostics screen can assist in testing network connectivity. This feature pings (ICMP echo) an IP address and displays the results, such as the number of packets transmitted and received, round trip time, and success status. To diagnose network connectivity: 1. Click Diagnostics from the Advanced screen. The “Diagnostics” screen appears. 2. Enter the IP address or domain name to be tested in the “Destination” field. 3. Click Go. 4.
Wireless Broadband Router User Manual Restoring Default Settings If the Router’s factory default settings need to be restored (to build a new network from the beginning, for example), use the following procedure: 1. If needed click Save Configuration File to save the Router’s current configuration to a file. The Router’s current settings can then be reapplied (see “Configuraton File” in this chapter for more information). 2. Click Restore Defaults.
Chapter 8 Using Advanced Settings MAC Cloning A MAC (Media Access Control) address is a unique hexadecimal code that identifies a device on a network. All networkable devices have a MAC address. When replacing another network device with the Router, the installation process can be simplified by copying the MAC address of the existing computer to the Router. To do this: 1. Click MAC Cloning in the Advanced screen. The “MAC Cloning” screen appears. 2.
Wireless Broadband Router User Manual Users To manage individual users: 1. Click Users in the Advanced screen, which generates the “Users” screen. 2. Click New User, which generates the “User Settings” screen. When adding a user, specify the following parameters: • Full Name - The user’s full name. • User Name - The name a remote user will use to access the home or office network. This entry is case-sensitive. • New Password/Retype New Password - The password for the user (and enter again to confirm).
Chapter 8 Using Advanced Settings • E-mail Notification - E-mail notification can be used to receive indications of system events for a predefined severity classification. The available types of events are “System” or “Security” events. The available severity of events are Error, Warning, and Information. To configure E-mail notification for a specific user: 1. Make sure an outgoing mail server has been configured in “System Settings”.
Wireless Broadband Router User Manual Remote Administration The Router’s Remote Administration capabilities are covered in detail in the “Security” chapter of this manual. Dynamic DNS Dynamic DNS (Domain Name Server) a dynamic IP address to be aliased to a static hostname, allowing a computer on the network to be more easily accessible from the Internet.
Chapter 8 Using Advanced Settings Setting up Dynamic DNS To set up Dynamic DNS on the Router, click Dynamic DNS in the Advanced screen. The “Dynamic DNS” screen appears. Configure the following parameters: Connection To Update Select the connection with which to couple the Dynamic DNS service. Options include Broadband Connection (Ethernet), Broadband Connection (Coax), and WAN PPPoE. Offline Disable the Dynamic DNS feature by clicking this check box.
Wireless Broadband Router User Manual Host Name Enter the full Dynamic DNS domain in this text box. Wildcard Select the “Wildcard” check box to have any URL that includes the domain name (here.yourhost.dyndns.org, for example) to connect. Mail Exchanger Enter the mail exchange server address. This will redirect all E-mails arriving at the Dynamic DNS address to the mail server. Backup MX Select this check box to designate the mail exchange server to be a backup server.
Chapter 8 Using Advanced Settings The DNS server does not require configuration. However, the list of computers known by the DNS can be viewed, the host name or IP address of a computer on the list can be changed, or a new computer can be added to the list. DNS Table To view the list of computers stored in the DNS table, click DNS Server in the Advanced screen. The “DNS Server” screen appears. To add a new entry to the list: 1. Click Add DNS Entry in the DNS Server screen. The “DNS Entry” screen appears.
Wireless Broadband Router User Manual 2. If the host was manually added to the DNS Table, its host name and/or IP address can be modified. Otherwise, only modify its host name. 3. Click Apply to save the changes. To remove a host from the DNS table: Click the appropriate “Delete” icon in the Action column. The entry will be removed from the table.
Chapter 8 Using Advanced Settings 2. Click Add. The “Edit Network Object” screen appears. 3. Specify a name for the network object in the “Description” text box. 4. Click Add. The “Edit Item” screen appears. 5. Select the type of network object type from the “Network Object Type” list box. Options include IP address, IP Subnet, IP Range, MAC Address, and Host Name. 6. Repeat to create other network objects, if needed. When finished, click Apply to save all created network objects.
Wireless Broadband Router User Manual 2. Click in the “Allow Other Network Users to Control Wireless Broadband Router’s Network Features” check box to enable UPnP and allow UPnP services to be defined on any of the network hosts. 3. Click in the “Enable Automatic Cleanup of Old Unused UPnP Services” check box to enable automatic cleanup of invalid rules. When enabled, this feature checks validity of all the UPnP services and rules every five minutes.
Chapter 8 Using Advanced Settings Protocols Protocols features a list of preset and user-defined applications and common port settings. Protocols can be used in various security features, such as Access Control and Port Forwarding. New protocols can be added to support new applications or existing ones can be edited when needed. To define a protocol: 1. Click Protocols in the Advanced screen. The “Protocols” screen appears. 2. Click Add at the bottom of the screen. The “Edit Service” screen appears.
Wireless Broadband Router User Manual 3. Name the service in the “Service Name” text box and, if needed, enter a description of the service in the “Service Description” text box, then click Add Service Ports. The “Edit Service Server Ports” screen appears. 4. Select a protocol from the “Protocol” drop-down list. To create a new protocol, select “Other.” After selecting a protocol, the screen will refresh, displaying the relevant text boxes needed to edit the particular protocol. 5.
Monitoring the Router 9 The Wireless Broadband Router’s System Monitoring screens display important system information, including: • Basic Router settings • System log • Key network device parameters • Network traffic statistics Router Status Click System Monitoring at the top of the Home screen to display the “Router Status” screen, which displays the Router’s basic settings.
Wireless Broadband Router User Manual Advanced Status Clicking Advanced Status displays three other monitoring options: System Logging, Full Status/System wide Monitoring of Connections, and Traffic Monitoring. System Logging Click System Logging in the Advanced Status screen to generate the “System Log” screen. The System Log displays a list of the most recent activities of the Router.
Chapter 9 Monitoring the Router Full Status/System wide Monitoring of Connections 1. Click Full Status/System wide Monitoring of Connections in the Advanced Status screen to generate the “Full Status/System wide Monitoring of Connections” screen, which features a table summarizing the monitored connection data. 2. Click Refresh to update the table, or click Automatic Refresh On to constantly update the displayed parameters.
Wireless Broadband Router User Manual Traffic Monitoring The Router constantly monitors traffic within the local network and between the local network and the Internet. To view up-to-the-second statistical information about data received from and transmitted to the Internet, and about data received from and transmitted to computers in the local network, click Traffic Monitoring in the Advanced Status screen. This generates the “Traffic Monitoring” screen.
Troubleshooting 10 This chapter contains a list of problems that may be encountered while using the Wireless Broadband Router, and techniques to try and overcome the problem. Note that these techniques may not solve the problem (or problems). Accessing the Router if Locked Out If the Router’s connection is lost while making configuration changes, a setting that locks access to the MegaControl Panel may have inadvertantly been activated.
Wireless Broadband Router User Manual LAN Connection Failure • Ensure the Router is properly installed, the LAN connections are correct, and the power is on. • Confirm the computer and Router are on the same network segment. If unsure, let the computer get the IP address automatically by initiating the DHCP function, then verify the computer is using an IP address within the default range (192.168.1.2 through 198.168.1.254).
Chapter 10 Troubleshooting Are the Router’s Ethernet ports auto-sensing? Yes. Either a straight-through or crossover Ethernet cable can be used. Can I use an 802.11b wireless card to connect to the Router? Yes, the Router can interface with 802.11b cards or 802.11g cards. The 802.11g standard is backward compatible with the 802.11b standard. The Router can be setup to handle just “g” wireless cards, just “b” wireless cards, or both.
Wireless Broadband Router User Manual I cannot access the Router’s Graphical User Interface? What should I do? If you cannot access the Router’s Graphical User Interface, make sure the computer connected to the Router is set up to dynamically receive an IP address. I have an FTP or Web server on my network. How can I make it available to users on the Internet? For a Web server, enable port forwarding for port 8088 to the IP address of the server and set up the Web server to receive on that port, as well.
Quality of Service A Network-based applications and traffic are growing at a high rate, producing an ever-increasing demand for bandwidth and network capacity. For obvious reasons, bandwidth and capacity cannot be expanded infinitely, requiring that bandwidthdemanding services be delivered over existing infrastructure, without incurring additional expensive investments.
Wireless Broadband Router User Manual The matching of packets by rules is connection-based, known as Stateful Packet Inspection (SPI), using the Router’s firewall mechanism. Once a packet matches a rule, all subsequent packets with the same attributes receive the same QoS parameters, both inbound and outbound. Connection-based QoS also allows inheriting QoS parameters by some of the applications that open subsequent connections.
Appendix A Quality of Service Setting Priority Rules To set priority rules: 1. Click Quality of Service in the Advanced screen. The “Traffic Priority” screen appears. This screen is divided into two identical sections, one for “QoS input rules” and the other for “QoS output rules,” which are for prioritizing the inbound and outbound traffic, respectively. Each section lists all the devices on which rules can be set. Rules can be set on all devices at once by clicking Add in the “All Devices” row.
Wireless Broadband Router User Manual 2. After choosing the traffic direction and the device on which to set the rule, click Add in the appropriate row. The “Add Traffic Priority Rule” screen appears. Set the following parameters: Source Address - The source address of the packets sent to or received from the network object. To add an address: 1. Select Specify Address from the drop-down list. The screen refreshes and an “Add” link appears. 2.
Appendix A Quality of Service Set Priority - Activate this check box to add a priority to the rule. The screen will refresh, allowing a selection between one of eight priority levels, zero being the lowest and seven the highest (each priority level is mapped to low/medium/high priority). This sets the priority of a packet on the connection matching the rule, while routing the packet. Set DSCP - Activate this check box to mark a DSCP value on packets matching a connection that matches this rule.
Wireless Broadband Router User Manual Device Traffic Shaping This section describes the different Traffic Shaping screens and terms, and presents the feature’s configuration logic. 1. Click Quality of Service in the Advanced screen, then click Traffic Shaping. The following screen appears. 2. Click Add. The “Add Device Traffic Shaping” screen appears. 3. Select the device for which the traffic will be shaped.
Appendix A Quality of Service Configure the following parameters: Tx Bandwidth - Tx bandwidth limits the Router’s bandwidth transmission rate. The purpose is to limit the bandwidth of the WAN device to that of the weakest outbound link.. This forces the Router to be the network bottleneck, where sophisticated QoS prioritization can be performed. Rx Bandwidth - In the same manner, this Rx bandwidth limits the Router’s bandwidth reception rate.
Wireless Broadband Router User Manual To define a shaping class: 1. Click Add in the “Tx Traffic Shaping” section of the Edit Device Traffic Shaping screen. The “Add Shaping Class” screen appears. 2. Name the new class and click Apply. 3. Click the class name to edit the shaping class. The “Edit Class” screen appears. Configure the following parameters: Name Enter the name of the class in this text box.
Appendix A Quality of Service Policy The class policy determines the policy of routing packets inside the class. Select one of four options: • Priority - Priority queuing utilizes multiple queues, so that traffic is distributed among queues based on priority. This priority is defined according to packet’s priority, which can be defined explicitly, by a DSCP value, or by an 802.1p value. • FIFO - The “First In, First Out” priority queue.
Wireless Broadband Router User Manual To add a new outbound/inbound class rule, click Add in the Edit Class screen. The “Add Traffic Priority Rule” screen appears. Source Address - The source address of the packets sent to or received from the network object (computer A in the above example). To add an address: 1. Select Specify Address from the drop-down list. The screen will refresh and an “Add” link appears. 2. Click Add, and add a new network object.
Appendix A Quality of Service Set Priority - Activate this check box to add a priority to the rule. The screen will refresh, allowing a selection of one of eight priority levels, zero being the lowest and seven the highest (each priority level is mapped to low/medium/high priority). This sets the priority of a packet on the connection matching the rule, while routing the packet. Log Packets Matched by This Rule - Check this check box to log the first packet from a connection that was matched by this rule.
Wireless Broadband Router User Manual Furthermore, the Router cannot control the behavior of the ISP, which may not have proper QoS handling. Unfortunately, this is a common situation. Let’s look at a scenario of downloading a large file and surfing the Internet at the same time. Downloading the file is distinguished by small requests, followed by very large responses. This may result in blocking HTML traffic at the ISP.
Appendix A Quality of Service 1. Click Quality of Service at the top of the Home screen, then click DSCP Settings. The “DSCP Settings” screen appears. 2. To edit an existing entry, click the appropriate icon in the “Action” column. To add a new entry, click Add. In either case, the “Edit DSCP Settings” screen appears. 3. Configure the following parameters: DSCP Value (hex) - Enter the DSCP value as a hexadecimal value. 802.1p Priority - Select a 802.
Wireless Broadband Router User Manual 802.1p Settings The IEEE 802.1p priority marking method is a standard for prioritizing network traffic at the data link/Mac sub-layer. 802.1p traffic is simply classified and sent to the destination, with no bandwidth reservations established. The 802.1p header includes a 3-bit prioritization field, which allows packets to be grouped into eight levels of priority. By default, the highest priority is seven, which might be assigned to network-critical traffic.
Appendix A Quality of Service 2. The eight 802.1p values are pre-populated with the three priority levels: Low, Medium, and High. These levels can be changed for each of the eight values in their respective drop-down lists. 3. Click Apply to save the settings. Class Statistics The Router provides accurate, real-time information on the traffic moving through the defined device classes.
Wireless Broadband Router User Manual This page left intentionally blank.
Specifications B General Model Number MI424WR (4-Port Wireless Broadband Router) Standards IEEE 802.3x IEEE 802.3u IEEE 802.11b, g (Wireless) IP IP version 4 MoCA Two channels (WAN, LAN) WAN MoCA frequency: 975 MHz - 1025 MHz (single channel) LAN MoCA frequency: 1125 MHz - 1425 MHz (6 channel) Firewall ICSA certified Speed LAN Ethernet: 10/100 Mbps auto-sensing Wireless: 802.
Wireless Broadband Router User Manual Wireless Operating Range Indoors Up to 91 M (300 ft.) Outdoors Up to 533 M (1750 ft.