EM-WNRT632_2
EM-WNRT632_2
WNRT-632
User’s Manual
1
Copyright
Copyright © 2010 PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any
form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior
PLANET makes no representations or warranties, either expressed or implied, with respect to the contents hereof
and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software
described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase,
the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing,
repair, and any incidental or consequential damages resulting from any defect in the software. Further, this company
reserves the right to revise this publication and to make changes from time to time in the contents hereof without
All brand and product names mentioned in this manual are trademarks and/or registered trademarks of their
respective holders.
of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and on, the user
is encouraged to try to correct the interference by one or more of the following measures:
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
FCC Caution:
To assure continued compliance, (example-use only shielded interface cables when connecting to computer or
peripheral devices) any changes or modifications not expressly approved by the party responsible for compliance
not cause harmful interference, and (2) this Device must accept any interference received, including interference that may
2
Federal Communication Commission (FCC) Radiation Exposure Statement
This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In order to avoid
the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be
CE mark Warning
This is a class B device, in a domestic environment; this product may cause radio interference, in which case the
For energy saving, please remove the DC-plug or push the hardware Power Switch to OFF position to disconnect
Without remove the DC-plug or switch off the device, the device will still consuming power from the power circuit. In
the view of Saving the Energy and reduce the unnecessary power consuming, it is strongly suggested to switch off
or remove the DC-plug for the device if this device is not intended to be active.
AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal Equipment and the
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. However, special
attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment.
All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use
of the equipment.
WEEE regulation
To avoid the potential effects on the environment and human health as a result of the presence of
hazardous substances in electrical and electronic equipment, end users of electrical and electronic
equipment should understand the meaning of the crossed-out wheeled bin symbol. Do not dispose of
WEEE as unsorted municipal waste and have to collect such WEEE separately.
3
Revision
User’s Manual for PLANET 802.11n Wireless Gigabit Broadband Router
Model: WNRT-632
4
Table of Contents
5
2.3.5.3 Backup Setting ....................................................................................... 63
2.3.5.4 Reset to default ...................................................................................... 64
2.3.5.5 Reboot ..................................................................................................... 64
2.3.5.6 Miscellaneous Items .............................................................................. 65
Appendices and Index ............................................................................................................... 66
802.1x Setting ........................................................................................................ 66
WPA Settings ......................................................................................................... 72
FAQ and Troubleshooting ......................................................................................................... 81
What can I do when I have some trouble at the first time?................................... 81
How do I connect router by using wireless? ........................................................... 84
6
C
Chhaapptteerr 11 IInnttrroodduuccttiioonn
Thank you for purchasing WNRT-632. This manual guides you on how to install and properly use the
WNRT-632 in order to take full advantage of its features.
Note: If any of the above items are missing, please contact your supplier for support.
7
1.2 Spec Summary Table
8
Environment & Certification
Package dimension (W x D x H) (mm) 245 x 207 x 60
Package Information
Package weight (gross weight) (g) 674
Operation Temp. Temp.: 0~40°C, Humidity 10%~90% non-condensing ●
Storage Temp. Temp.: -10~70°C, Humidity: 0~95% non-condensing ●
EMI Certification CE/FCC compliance ●
RoHS RoHS compliance ●
Note: Reset = Press Wi-Fi on/off and WPS buttons simultaneously about 5 sec.
9
Figure 2-2 Rear Panel
Antenna
Power Jack
10
1.4 LED indicators
Green WLAN is on
11
1.5 Procedure for Hardware Installation
12
Step 3 Insert the Ethernet patch cable into
Wired WAN port:
Insert the Ethernet patch cable form DSL
Modem into Wired WAN port on the back panel
of Router.
13
C
Chhaapptteerr 22 M
Maakkiinngg C
Coonnffiigguurraattiioonn
This product provides Web based configuration scheme, that is, configuring by your Web browser, such as
Mozilla Firefox or or Internet Explorer. This approach can be adopted in any MS Windows, Macintosh or
UNIX based platforms.
14
2.1 Login to Configure from Wizard
15
2.5 Select “Auto Detecting WAN Type” and
then click “Next >” button.
16
2.8 Setup the Wireless Security.
Click “Next >” if setting by default. (Strongly
suggest configuring the security to protect
your wireless network.)
17
2.11 Click “Finish” to complete the Setup.
Or you can click “Configure Again” to setup
the wizard again.
18
2.2 System Status
This option provides the function for observing this product’s working status:
WAN Status:
If the WAN port is assigned a dynamic IP, there may appear a “Renew” or “Release” button on the
Sidenote column. You can click this button to renew or release IP manually.
Statistics of WAN:
Enables you to monitor inbound and outbound packets
19
2.3 Advanced
20
2.3.1.1 Primary Setup – WAN Type, Virtual Computers
Click “Change”
21
This option is primary to enable this product to work properly. The setting items and the web appearance
depend on the WAN type. Choose correct WAN type before you start.
1. LAN IP Address: the local IP address of this device. The computers on your network must use the
LAN IP address of your product as their Default Gateway. You can change it if necessary.
2. WAN Type: WAN connection type of your ISP. You can click Change button to choose a correct one
from the following four options:
D. PPP over Ethernet: Some ISPs require the use of PPPoE to connect to their services.
E. PPTP: Some ISPs require the use of PPTP to connect to their services.
F. L2TP: Some ISPs require the use of L2TP to connect to their services
G. Russia PPPoE(Dual Access): Russia PPP over Ethernet(Dual Access) is a common connection
method used for XDSL.
H. Russia PPTP(Dual Access): Russia PPP Tunneling(Dual Access) can support multi-protocol
Virtual Private Network(VPN).
22
PPP over Ethernet: Some ISPs require the use of PPPoE to connect to their services.
PPPoE Account and Password: the account and password your ISP assigned to you. For security, this field
appears blank. If you don't want to change the password, leave it empty.
PPPoE Service Name: optional. Input the service name if your ISP requires it. Otherwise, leave it blank.
Maximum Idle Time: the amount of time of inactivity before disconnecting your PPPoE session.
Set it to zero or enable Auto-reconnect to disable this feature.
Maximum Transmission Unit (MTU): Most ISP offers MTU value to users. The most common MTU value is
1492.
PPTP: Some ISPs require the use of PPTP to connect to their services
First, please check your ISP assigned and Select Static IP Address or Dynamic IP Address.
My IP Address and My Subnet Mask: the private IP address and subnet mask your ISP assigned to you.
Server IP Address: the IP address of the PPTP server.
PPTP Account and Password: the account and password your ISP assigned to you. If you don't want to
change the password, keep it empty.
Connection ID: optional. Input the connection ID if your ISP requires it.
Maximum Idle Time: the time of no activity to disconnect your PPTP session. Set it to zero or enable
Auto-reconnect to disable this feature. If Auto-reconnect is enabled, this product will connect to ISP
automatically, after system is restarted or connection is dropped.
Connection Control: There are 3 modes to select:
Connect-on-demand: The device will link up with ISP when the clients send outgoing packets.
Auto-Reconnect (Always-on): The device will link with ISP until the connection is established.
Manually: The device will not make the link until someone clicks the connect-button in the Status-page.
L2TP: Some ISPs require the use of L2TP to connect to their services
First, please check your ISP assigned and Select Static IP Address or Dynamic IP Address.
For example: Use Static
My IP Address and My Subnet Mask: the private IP address and subnet mask your ISP assigned to you.
Server IP Address: the IP address of the PPTP server.
PPTP Account and Password: the account and password your ISP assigned to you. If you don't want to
change the password, keep it empty.
Connection ID: optional. Input the connection ID if your ISP requires it.
Maximum Idle Time: the time of no activity to disconnect your PPTP session. Set it to zero or enable
23
Auto-reconnect to disable this feature. If Auto-reconnect is enabled, this product will connect to ISP
automatically, after system is restarted or connection is dropped.
Connection Control: There are 3 modes to select:
Connect-on-demand: The device will link up with ISP when the clients send outgoing packets.
Auto-Reconnect (Always-on): The device will link with ISP until the connection is established.
Manually: The device will not make the link until someone clicks the connect-button in the Status-page.
This mode only activate for Russia ISP that support dual layer Access to the Internet.
This mode only activate for Russia ISP that support dual layer Access to the Internet.
Virtual Computers (Only for Static and dynamic IP address Wan type)
Virtual Computer enables you to use the original NAT feature, and allows you to setup the one-to-one
mapping of multiple global IP address and local IP address.
24
2.3.1.2 DHCP Server
2. Lease time: This is the length of time that the client may use the IP address it has been
3. IP pool starting Address/ IP pool starting Address: Whenever there is a request, the DHCP
server will automatically allocate an unused IP address from the IP address pool to the requesting
computer. You must specify the starting and ending address of the IP address pool.
5. Primary DNS/Secondary DNS: This feature allows you to assign DNS Servers
6. Primary WINS/Secondary WINS: This feature allows you to assign WINS Servers
This function enables you to assign another gateway to your PC, when DHCP server
offers an IP to your PC.
25
2.3.1.3 Wireless
Schedule Setting: The device can turn off Wireless depend as Schedule.
Network ID (SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam
freely over this product and other Access Points that have the same Network ID. (The factory setting is
“default”)
SSID Broadcast: The router will Broadcast beacons that have some information, including SSID so that
The wireless clients can know how many ap devices by scanning function in the network. Therefore,
This function is disabled; the wireless clients can not find the device from beacons.
Channel: The radio channel number. The permissible channels depend on the Regulatory Domain.
26
WPS (WiFi Protection Setup)
WPS is WiFi Protection Setup which is similar to WCN-NET and offers safe and easy way in Wireless
Connection.
27
WDS (Wireless Distribution System)
WDS operation as defined by the IEEE802.11 standard has been made available. Using WDS it is possible
to wirelessly connect Access Points, and in doing so extend a wired infrastructure to locations where
cabling is not possible or inefficient to implement.
Hybrid Mode
It means the device can support WDS and AP Mode simultaneously.
28
Security: Select the data privacy algorithm you want. Enabling the security can protect your data while it is
transferred from one station to another.
WEP:
When you enable the 128 or 64 bit WEP key security, please select one WEP key to be used and input 26
or 10 hexadecimal (0, 1, 2…8, 9, A, B…F) digits.
802.1X
Check Box was used to switch the function of the 802.1X. When the 802.1X function is enabled, the
Wireless user must authenticate to this router first to use the Network service.
RADIUS Server
IP address or the 802.1X server’s domain-name.
RADIUS Shared Key
Key value shared by the RADIUS server and this router. This key value is consistent with the key value in
the RADIUS server.
WPA-PSK
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
WPA
Check Box was used to switch the function of the WPA. When the WPA function is enabled, the Wireless
user must authenticate to this router first to use the Network service. RADIUS Server IP address or the
802.1X server’s domain-name.
Select Encryption and RADIUS Shared Key
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
Key value shared by the RADIUS server and this router. This key value is consistent with the key value in
the RADIUS server.
29
WPA2-PSK (AES)
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
WPA2 (AES)
Check Box was used to switch the function of the WPA. When the WPA function is enabled, the Wireless
user must authenticate to this router first to use the Network service. RADIUS Server
IP address or the 802.1X server’s domain-name.
Select RADIUS Shared Key
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
Key value shared by the RADIUS server and this router. This key value is consistent with the key value in
the RADIUS server.
WPA-PSK /WPA2-PSK
The router will detect automatically which Security type the client
uses to encrypt.
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
WPA/WPA2
Check Box was used to switch the function of the WPA. When the WPA function is enabled, the Wireless
user must authenticate to this router first to use the Network service. RADIUS Server
The router will detect automatically which Security type(Wpa-psk version 1 or 2) the client uses to encrypt.
IP address or the 802.1X server’s domain-name.
Select RADIUS Shared Key
If you select HEX, you have to fill in 64 hexadecimal (0, 1, 2…8, 9, A, B…F) digits
Key value shared by the RADIUS server and this router. This key value is consistent with the key value in
the RADIUS server.
30
Wireless Client List
You can change Password here. We strongly recommend you to change the system password for security
reason.
31
2.3.2 Forwarding Rules
32
This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this
product are invisible to the outside world. If you wish, you can make some of them accessible by enabling
the Virtual Server Mapping.
A virtual server is defined as a Service Port, and all requests to this port will be redirected to the
computer specified by the Server IP. Virtual Server can work with Scheduling Rules, and give
user more flexibility on Access control. For Detail, please refer to Scheduling Rule.
2.3.2.2 Special AP
Some applications require multiple connections, like Internet games, Video conferencing, Internet
telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router. The
Special Applications feature allows some of these applications to work with this product. If the
mechanism of Special Applications fails to make an application work, try setting your computer as the DMZ
host instead.
2. Incoming Ports: when the trigger packet is detected, the inbound packets sent to the specified port
numbers are allowed to pass through the firewall.
This product provides some predefined settings Select your application and click “Copy to” to add the
predefined setting to your list.
Note! At any given time, only one PC can use each Special Application tunnel.
33
2.3.2.3 Miscellaneous Items
Xbox Support
The Xbox is a video game console produced by Microsoft Corporation. Please enable this function when
you play games.
34
UPnP Setting
The device also supports this function. If the OS supports this function enable it, like Windows XP. When
the user get IP from Device and will see icon as below:
35
2.3.3.1 Packet Filters
Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on
all outbound packets. However, Inbound filter applies on packets that destined to Virtual Servers or DMZ
host only. You can select one of the two filtering policies:
You can specify 8 rules for each direction: inbound or outbound. For each rule, you can define the following:
• Source IP address
• Source port address
• Destination IP address
• Destination port address
• Protocol: TCP or UDP or both.
• Use Rule#
36
For source or destination IP address, you can define a single IP address (4.3.2.1) or a range of IP
addresses (4.3.2.1-4.3.2.254). An empty implies all IP addresses.
For source or destination port, you can define a single port (80) or a range of ports (1000-1999). Add prefix
"T" or "U" to specify TCP or UDP protocol. For example, T80, U53, U2000-2999. No prefix indicates both
TCP and UDP are defined. An empty implies all port addresses. Packet Filter can work with Scheduling
Rules, and give user more flexibility on Access control. For Detail, please refer to Scheduling Rule.
Inbound Filter:
To enable Inbound Packet Filter click the check box next to Enable in the Inbound Packet Filter field.
Suppose you have SMTP Server (25), POP Server (110), Web Server (80), FTP Server (21), and News
Server (119) defined in Virtual Server or DMZ Host.
Example 1:
(1.2.3.100-1.2.3.149) Remote hosts are allow to send mail (port 25), and browse the Internet (port 80)
(1.2.3.10-1.2.3.20) Remote hosts can do everything (block nothing) Others are all blocked.
37
Example 2:
(1.2.3.100-1.2.3.119) Remote hosts can do everything except read net news (port 119) and transfer files via
FTP (port 21) behind Router Server.
Others are all allowed.
After Inbound Packet Filter setting is configured, click the save button.
38
Outbound Filter:
To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet Filter
field.
Example 1:
Router LAN IP is 192.168.12.254
(192.168.12.100-192.168.12.149) Located hosts are only allowed to send mail (port 25), receive mail (port
110), and browse Internet (port 80); port 53 (DNS) is necessary to resolve the domain name.
39
Example 2:
Router LAN IP is 192.168.12.254
(192.168.12.100 and 192.168.12.119) Located Hosts can do everything except read net news (port 119)
and transfer files via FTP (port 21)
After Outbound Packet Filter setting is configured, click the save button.
40
2.3.3.2 Domain filters
Domain Filter
Let you prevent users under this device from accessing specific URLs.
Domain Filter Enable
Check if you want to enable Domain Filter.
Log DNS Query
Check if you want to log the action when someone accesses the specific URLs.
Privilege IP Addresses Range
Setting a group of hosts and privilege these hosts to access network without restriction.
Domain Suffix
A suffix of URL to be restricted. For example, ".com", "xxx.com".
Action
When someone is accessing the URL met the domain-suffix, what kind of action you want.
Check drop to block the access. Check log to log these access.
Enable
Check to enable each rule.
41
Example:
In this example:
1. URL include “www.msn.com” will be blocked, and the action will be record in log-file.
2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file.
3. URL include “www.baidu.com” will be blocked, but the action will not be record in log-file.
4. IP address x.x.x.1~x.x.x.99 can access Internet without restriction.
42
2.3.3.3 URL Blocking
URL
If any part of the Website's URL matches the pre-defined word, the connection will be blocked.
For example, you can use pre-defined word "sex" to block all websites if their URLs contain pre-defined
word "sex".
Enable
43
In this example:
1. URL include “msn” will be blocked, and the action will be record in log-file.
2. URL include “sina” will be blocked, but the action will be record in log-file
44
2.3.3.4 Internet Access Control
The device provides "Administrator MAC Control" for specific MAC to access the device or Internet without
restriction. It also provides 3 features to access Internet: MAC Control by host, Group MAC Control and
Interface Access Control depend as user-defined time Schedule.
Regardless the MAC access configuration of administrator, specific MAC can access the device.
This device can record 3 sets. When the host(should be admin) logins Web management, the device will
record MAC address of this host. Before this host configures Internet Access Control , Suggest end-user to
enable this feature, first.
45
1. MAC control
MAC Address Control allows you to assign different access right for different users and to assign a specific
IP address to a certain MAC address.
MAC Address Control Check “Enable” to enable the “MAC Address Control”. All of the settings in this
page will take effect only when “Enable” is checked.
Connection control Check "Connection control" to enable the controlling of which wired and
wireless clients can connect to this device. If a client is denied to connect to this
device, it means the client can't access to the Internet either. Choose "allow" or
"deny" to allow or deny the clients, whose MAC addresses are not in the
"Control table" (please see below), to connect to this device.
Association control Check "Association control" to enable the controlling of which wireless client
Can associate to the wireless LAN. If a client is denied to associate to the wireless
LAN, it means the client can't send or receive any data via this device. Choose
"allow" or "deny" to allow or deny the clients, whose MAC addresses are not in the
46
Control table
"Control table" is the table at the bottom of the "MAC Address Control" page.
Each row of this table indicates the MAC address and the expected IP address
mapping of a client. There are four columns in this table:
In this page, we provide the following Combobox and button to help you to input the MAC address.
You can select a specific client in the “DHCP clients” Combobox, and then click on the “Copy to” button to
copy the MAC address of the client you select to the ID selected in the “ID” Combobox.
Previous page and Next Page To make this setup page simple and clear, we have divided the “Control
table” into several pages. You can use these buttons to navigate to
different pages.
47
Example:
In this scenario, there are three clients listed in the Control Table. Clients 1 and 2 are wireless, and client 3
is wired.
2."Connection control" is enabled, and all of the wired and wireless clients not listed in the "Control table"
are "allowed" to connect to this device.
3."Association control" is enabled, and all of the wireless clients not listed in the "Control table" are "denied"
to associate to the wireless LAN.
4.Clients 1 and 3 have fixed IP addresses either from the DHCP server of this device or manually assigned:
If, for example, client 3 tries to use an IP address different from the address listed in the Control
5.Clients 2 and 3 and other wired clients with a MAC address unspecified in the Control table are all
allowed to connect to this device. But client 1 is denied to connect to this device.
48
6.Clients 1 and 2 are allowed to associate to the wireless LAN, but a wireless client with a MAC address not
specified in the Control table is denied to associate to the wireless LAN. Client 3 is a wired client and so
is not affected by Association control.
Mother are in Group1 without limitation and hosts Brother and Sister are in Group2 to access according as
Schedule Rule2.
For example,
49
3. Interface Access Control
The device defines 5 Interfaces as Lan1,Lan2, Lan3,Lan4 and WiFi. The device
For example,
Administrator can set guests in Lan3 and Lan4 to access Internet according as Schedule Rule
50
51
2.3.3.5 Miscellaneous Items
52
DoS Attack Detection
When this feature is enabled, the router will detect and log the DoS attack comes from the Internet.
Currently, the router can detect the following DoS attack: SYN Attack, WinNuke, Port Scan, Ping of Death,
Land Attack etc.
VPN IPSec Pass-Through
53
2.3.4.1 System Time
54
2.3.4.2 System Log
This page supports two methods to export system logs to specific destination by means of syslog (UDP)
and SMTP (TCP). The items you have to setup including:
Check if you want to enable Email alert (send syslog via email).
SMTP Server IP and Port
Input the SMTP server IP and port, which are concatenated with ':'. If you do not specify port number, the
default value is 25.
For example, "mail.your_url.com" or "192.168.1.100:26".
Send E-mail alert to
55
2.3.4.3 DDNS Service
To host your server on a changing IP address, you have to use dynamic domain name service (DDNS).
So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the
name of your host to your current IP address, which changes each time you connect your Internet service
provider.
Before you enable Dynamic DNS, you need to register an account on one of these Dynamic DNS servers
that we list in provider field.
To enable Dynamic DNS click the check box next to Enable in the DDNS field.
Next you can enter the appropriate information about your Dynamic DNS Server.
You will get this information when you register an account on a Dynamic DNS server.
56
2.3.4.4 SNMP
In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the
capability to remotely manage a computer network by polling and setting terminal values and monitoring
network events.
Enable SNMP
You must check Local, Remote or both to enable SNMP function. If Local is checked, this device will
response request from LAN. If Remote is checked, this device will response request from WAN.
Get Community
Setting the community of GetRequest your device will response.
Set Community
Setting the community of SetRequest your device will accept.
IP 1, IP 2, IP 3, IP 4
Input your SNMP Management PC’s IP here. User has to configure to where this device should send
SNMP Trap message.
SNMP Version
Please select proper SNMP Version that your SNMP Management software supports.
57
2.3.4.5 Routing
Routing Tables allow you to determine which physical interface address to use for outgoing IP data grams.
If you have more than one routers and subnets, you will need to enable routing table to allow packets to find
proper routing path and allow different subnets to communicate with each other.
Routing Table settings are settings used to setup the functions of static.
Dynamic Routing
Routing Information Protocol (RIP) will exchange information about destinations for computing routes
throughout the network. Please select RIPv2 only if you have different subnet in your network.
Otherwise, please select RIPv1 if you need this protocol.
Static Routing: For static routing, you can specify up to 8 routing rules. You can enter the destination IP
address, subnet mask, gateway, and hop for each routing rule, and then enable or disable the rule by check
or uncheck the Enable checkbox.
58
Example:
So if, for example, the client3 wanted to send an IP data gram to 192.168.0.2, it would use the above table
to determine that it had to go via 192.168.123.103 (a gateway).
And if it sends Packets to 192.168.1.11 will go via 192.168.123.216
Each rule can be enabled or disabled individually.
After routing table setting is configured, click the save button.
59
2.3.4.6 Schedule Rule
You can set the schedule time to decide which service will be turned on or off. Select the “enable” item.
Press “Add New Rule”
You can write a rule name and set which day and what time to schedule from “Start Time” to “End Time”.
The following example configure “ftp time” as everyday 14:10 to 16:20
Schedule Enable
Selected if you want to Enable the Scheduler.
Edit
To edit the schedule rule.
Delete
To delete the schedule rule, and the rule# of the rules behind the deleted one will decrease one
automatically.Schedule Rule can be apply to Virtual server and Packet Filter, for example:
Exanple1: Virtual Server – Apply Rule#1 (ftp time: everyday 14:20 to 16:30)
Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 14:20 to 16:30).
60
2.3.4.7 QoS Rule
Local IP:
Please input Client IP, ex:192.168.12.33.
Remote Priority:
Please input Global IP and port, ex:168.96.2.3 and port 21
61
2.3.5 Toolbox
You can View system log by clicking the View Log button.
62
2.3.5.2 Firmware Upgrade
You can backup your settings by clicking the Backup Setting button and save it as a bin file.
Once you want to restore these settings, please click Firmware Upgrade button and use the bin
file you saved.
63
2.3.5.4 Reset to default
You can also reset this product to factory default by clicking the Reset to default button.
2.3.5.5 Reboot
You can also reboot this product by clicking the Reboot button.
64
2.3.5.6 Miscellaneous Items
Allow you to configure an IP, and ping the device. You can ping a specific IP to test whether it is
alive.
65
A
Appppeennddiicceess aanndd IInnddeexx
802.1x Setting
1. Equipment Details
PC1:
PC2:
Authentication Server: Windows 2000 RADIUS server with Service Pack 3 and HotFix Q313664.
Note. Windows 2000 RADIUS server only supports PEAP after upgrade to service pack 3 and
http://support.microsoft.com/default.aspx?scid=kb; en-us;313664)
66
2. DUT
Configuration:
The following test will use the inbuilt 802.1X authentication method such as ,EAP_TLS,
PEAP_CHAPv2(Windows XP with SP1 only), and PEAP_TLS(Windows XP with SP1 only) using the
Smart Card or other Certificate of the Windows XP Professional.
3.Enter the shared key. (The key shared by the RADIUS server and DUT).
4.We will change 802.1X encryption key length to fit the variable test
condition.
Note.
type.
67
3.If choosing use smart card or the certificate as the EAP type, we select to
68
Figure 3: Smart card or certificate properties
4.1 DUT authenticate PC1 using certificate. (PC2 follows the same test procedures.)
EAP_TLS.
5. The DUT will send the user's certificate to the RADIUS server, and then
7. Terminate the test steps when PC1 get dynamic IP and PING remote host
successfully.
69
Figure 4: Certificate information on PC1
Figure 5: Authenticating
70
Figure 6: Authentication success
PEAP_TLS.
4.The DUT will send the user's certificate to the RADIUS server, and then
6. Terminate the test steps when PC2 get dynamic IP and PING remote host
successfully.
71
WPA Settings
Or Another Configuration:
72
WPA:
For this function, we need the server to authenticate. This function is like 802.1x.
Method 1:
1. The UserA or UserB have to get certificate from Radius, first.
http://192.168.122.1/certsrv
account : fae1
passwd : fae1
73
4. Go to Odyssey Client Manager, choose “Profiles” and Setup Profile name as “1”
74
5. Then Choose “certificate” like above.
75
6. Then go to Authentication and first Remove EAP/ TLS and Add EAP/TLS again.
76
7. Go “Network” and Select “1” and ok
77
8. Back to Connection and Select “123kk.
If successfully, the wireless client has to authenticate with Radius Server, like below:
9.Result:
Method 2:
1. The UserA or UserB have to get certificate from Radius,first.
http://192.168.122.1/certsrv
account:fae1
passwd:fae1
78
2. Then Install this certificate and finish.
3. Setting on the router and client:
Router:
79
Client:
Go to “Network Connection” and select wireless adapter.
Choose “View available Wireless Networks” like below:
AdvancedÆ choose “123kk”
Select “WirelessCA and Enable” in Trusted root certificate authority:
80
FFA
AQQ aanndd TTrroouubblleesshhoooottiinngg
What can I do when I have some trouble at the first time?
1. Why can I not configure the router even if the cable is plugged in the ports of
Router and the led is also light?
A: First, make sure that which port is plugged. If the cable is in the Wan port, please change to plug in Lan
port 1 or Lan port 4:
Then, please check if the Pc gets ip address from Router. Use command mode as below:
If yes, please execute Browser, like Mozilla and key 192.168.0.1 in address.
Whatever I setup, the pc can not get ip. Please check Status Led and refer to the Q2:
81
82
2. Why can I not connect the router even if the cable is plugged in Lan port and the
led is light?
A: First, please check Status Led. If the device is normal, the led will blink per second.
Status Led is bright or dark in work: The system hanged up .Suggest powering off and on
the router. But this symptom often occurs, please reset to default or upgrade latest fw to try
again.
Status led flashes irregularly: Maybe the root cause is Flash rom and please press reset
Status flashes very fast while powering on: Maybe the router is the recovery mode and
Status will start flashing about 5 times, remove the finger. The RESTORE process is completed.
4. Why can I not connect Internet even though the cables are plugged in Wan port
and Lan port and the leds are blink. In addition, Status led is also normal and I can
configure web management?
A: Make sure that the network cable from DSL or Cable modem is plugged in Wan port of Router and
that the network cable from Lan port of router is plugged in Ethernet adapter. Then, please check which
wan type you use. If you are not sure, please call the isp. Then please go to this page to input the
information isp is
assigned.
83
5. When I use Static IP Address to roam Internet, I can access or ping global IP
202.93.91.218, But I can not access the site that inputs domain name, for example
http://espn.com ?
A: Please check the dns configuration of Static IP Address. Please refer to the information of ISP
and assign one or two in dns item.
84
About wireless client, you will see wireless icon:
Then click and will see the ap list that wireless client can be accessed:
If the client can not access your wireless router, please refresh network list again. However, I still can not
fine the device which ssid is “default”, please refer to Q3.
Choose the one that you will want to connect and Connect:
85
If successfully, the computer will show
2. When I use AES encryption of WPA-PSK to connect even if I input the correct
pre-share key?
A: First, you must check if the driver of wireless client supports AES encryption. Please refer to the below:
If SSID is default and click “Properties” to check if the driver of wireless client supports AES encryption.
86
3. When I use wireless to connect the router, but I find the signal is very low even if
I am close to the router?
A: Please check if the wireless client is normal, first. If yes, please send the unit to the seller and verify
87