User`s manual
Table Of Contents
- Revision History
- Terminology
- 1 Introduction
- 2 Installation
- 3 Software configuration
- 3.1 Prepare your PC to configure the WNAP 3G Mobile Router
- 3.2 Connect to the WNAP 3G Mobile Router
- 3.3 Management and configuration on the WNAP 3G Mobile Router
- 3.3.1 Status
- 3.3.2 Setup Wizard
- 3.3.3 Operation Mode
- 3.3.4 Wireless - Basic Settings
- 3.3.5 Wireless - Advanced Settings
- 3.3.6 Wireless - Security Setup
- 3.3.7 Wireless - Access Control
- 3.3.8 WDS Settings
- 3.3.9 Mesh Settings
- 3.3.10 Site Survey
- 3.3.11 WPS
- 3.3.12 Schedule
- 3.3.13 LAN Interface Setup
- 3.3.14 WAN Interface Setup
- 3.3.15 Firewall - Port Filtering
- 3.3.16 Firewall - IP Filtering
- 3.3.17 Firewall - MAC Filtering
- 3.3.18 Firewall - Port Forwarding
- 3.3.19 Firewall – URL Filtering
- 3.3.20 Firewall - DMZ
- 3.3.21 Firewall – VLAN
- 3.3.22 Firewall – Virtual Server
- 3.3.23 Route Setup
- 3.3.24 QoS
- 3.3.25 USB Storage
- 3.3.26 Management - Statistics
- 3.3.27 Management - DDNS
- 3.3.28 Management - Time Zone Setting
- 3.3.29 Management – Denial-of-Service
- 3.3.30 Management - Log
- 3.3.31 Management - Upgrade Firmware
- 3.3.32 Management Save/ Reload Settings
- 3.3.33 Management - Password Setup
- 3.3.34 Management - WatchDog
- 3.3.35 Management – Reboot
- 3.3.36 Logout
- 3.3.37 Management - Password Setup
- 4 Frequently Asked Questions (FAQ)
- 4.1 What and how to find my PC’s IP and MAC address?
- 4.2 What is Wireless LAN?
- 4.3 What are ISM bands?
- 4.4 How does wireless networking work?
- 4.5 What is BSSID?
- 4.6 What is ESSID?
- 4.7 What are potential factors that may causes interference?
- 4.8 What are the Open System and Shared Key authentications?
- 4.9 What is WEP?
- 4.10 What is Fragment Threshold?
- 4.11 What is RTS (Request To Send) Threshold?
- 4.12 What is Beacon Interval?
- 4.13 What is Preamble Type?
- 4.14 What is SSID Broadcast?
- 4.15 What is Wi-Fi Protected Access (WPA)?
- 4.16 What is WPA2?
- 4.17 What is 802.1x Authentication?
- 4.18 What is Temporal Key Integrity Protocol (TKIP)?
- 4.19 What is Advanced Encryption Standard (AES)?
- 4.20 What is Inter-Access Point Protocol (IAPP)?
- 4.21 What is Wireless Distribution System (WDS)?
- 4.22 What is Universal Plug and Play (uPNP)?
- 4.23 What is Maximum Transmission Unit (MTU) Size?
- 4.24 What is Clone MAC Address?
- 4.25 What is DDNS?
- 4.26 What is NTP Client?
- 4.27 What is VPN?
- 4.28 What is IPSEC?
- 4.29 What is WLAN Block Relay Between Clients?
- 4.30 What is WMM?
- 4.31 What is WLAN ACK TIMOUT?
- 4.32 What is Modulation Coding Scheme (MCS)?
- 4.33 What is Frame Aggregation?
- 4.34 What is Guard Intervals (GI)?
- 5 Configuration Examples

USER’S MANUAL OF WNAP 3G MOBILE ROUTER Version: 2.0
77
to the wired LAN for services (file servers, printers, Internet links) they will operate in
infrastructure mode.
Example 1: wireless Infrastructure Mode
Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or
IBSS) is simply a set of 802.11 wireless stations that communicate directly with one
another without using an access point or any connection to a wired network. This mode
is useful for quickly and easily setting up a wireless network anywhere that a wireless
infrastructure does not exist or is not required for services, such as a hotel room,
convention center, or airport, or where access to the wired network is barred (such as for
consultants at a client site).
Example 2: wireless Ad Hoc Mode
4.5 What is BSSID?
A six-byte address that distinguishes a particular a particular access point from others.
Also know as just SSID. Serves as a network ID or name.
4.6 What is ESSID?
The Extended Service Set ID (ESSID) is the name of the network you want to access. It
is used to identify different wireless networks.