User`s manual
Table Of Contents
- Revision History
- Terminology
- 1 Introduction
- 2 Installation
- 3 Software configuration
- 3.1 Prepare your PC to configure the WNAP 3G Mobile Router
- 3.2 Connect to the WNAP 3G Mobile Router
- 3.3 Management and configuration on the WNAP 3G Mobile Router
- 3.3.1 Status
- 3.3.2 Setup Wizard
- 3.3.3 Operation Mode
- 3.3.4 Wireless - Basic Settings
- 3.3.5 Wireless - Advanced Settings
- 3.3.6 Wireless - Security Setup
- 3.3.7 Wireless - Access Control
- 3.3.8 WDS Settings
- 3.3.9 Mesh Settings
- 3.3.10 Site Survey
- 3.3.11 WPS
- 3.3.12 Schedule
- 3.3.13 LAN Interface Setup
- 3.3.14 WAN Interface Setup
- 3.3.15 Firewall - Port Filtering
- 3.3.16 Firewall - IP Filtering
- 3.3.17 Firewall - MAC Filtering
- 3.3.18 Firewall - Port Forwarding
- 3.3.19 Firewall – URL Filtering
- 3.3.20 Firewall - DMZ
- 3.3.21 Firewall – VLAN
- 3.3.22 Firewall – Virtual Server
- 3.3.23 Route Setup
- 3.3.24 QoS
- 3.3.25 USB Storage
- 3.3.26 Management - Statistics
- 3.3.27 Management - DDNS
- 3.3.28 Management - Time Zone Setting
- 3.3.29 Management – Denial-of-Service
- 3.3.30 Management - Log
- 3.3.31 Management - Upgrade Firmware
- 3.3.32 Management Save/ Reload Settings
- 3.3.33 Management - Password Setup
- 3.3.34 Management - WatchDog
- 3.3.35 Management – Reboot
- 3.3.36 Logout
- 3.3.37 Management - Password Setup
- 4 Frequently Asked Questions (FAQ)
- 4.1 What and how to find my PC’s IP and MAC address?
- 4.2 What is Wireless LAN?
- 4.3 What are ISM bands?
- 4.4 How does wireless networking work?
- 4.5 What is BSSID?
- 4.6 What is ESSID?
- 4.7 What are potential factors that may causes interference?
- 4.8 What are the Open System and Shared Key authentications?
- 4.9 What is WEP?
- 4.10 What is Fragment Threshold?
- 4.11 What is RTS (Request To Send) Threshold?
- 4.12 What is Beacon Interval?
- 4.13 What is Preamble Type?
- 4.14 What is SSID Broadcast?
- 4.15 What is Wi-Fi Protected Access (WPA)?
- 4.16 What is WPA2?
- 4.17 What is 802.1x Authentication?
- 4.18 What is Temporal Key Integrity Protocol (TKIP)?
- 4.19 What is Advanced Encryption Standard (AES)?
- 4.20 What is Inter-Access Point Protocol (IAPP)?
- 4.21 What is Wireless Distribution System (WDS)?
- 4.22 What is Universal Plug and Play (uPNP)?
- 4.23 What is Maximum Transmission Unit (MTU) Size?
- 4.24 What is Clone MAC Address?
- 4.25 What is DDNS?
- 4.26 What is NTP Client?
- 4.27 What is VPN?
- 4.28 What is IPSEC?
- 4.29 What is WLAN Block Relay Between Clients?
- 4.30 What is WMM?
- 4.31 What is WLAN ACK TIMOUT?
- 4.32 What is Modulation Coding Scheme (MCS)?
- 4.33 What is Frame Aggregation?
- 4.34 What is Guard Intervals (GI)?
- 5 Configuration Examples

USER’S MANUAL OF WNAP 3G MOBILE ROUTER Version: 2.0
78
4.7 What are potential factors that may causes interference?
Factors of interference:
¾ Obstacles: walls, ceilings, furniture… etc.
¾ Building Materials: metal door, aluminum studs.
¾ Electrical devices: microwaves, monitors and electrical motors.
Solutions to overcome the interferences:
9 Minimizing the number of walls and ceilings.
9 Position the WLAN antenna for best reception.
9 Keep WLAN devices away from other electrical devices, eg: microwaves,
monitors, electric motors, … etc.
9 Add additional WLAN Access Points if necessary.
4.8 What are the Open System and Shared Key authentications?
IEEE 802.11 supports two subtypes of network authentication services: open system and
shared key. Under open system authentication, any wireless station can request
authentication. The station that needs to authenticate with another wireless station sends
an authentication management frame that contains the identity of the sending station.
The receiving station then returns a frame that indicates whether it recognizes the
sending station. Under shared key authentication, each wireless station is assumed to
have received a secret shared key over a secure channel that is independent from the
802.11 wireless network communications channel.
4.9 What is WEP?
An optional IEEE 802.11 function that offers frame transmission privacy similar to a
wired network. The Wired Equivalent Privacy generates secret shared encryption keys
that both source and destination stations can use to alert frame bits to avoid disclosure to
eavesdroppers.
WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a
wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to
encrypt packets before they are transmitted, and an integrity check is used to ensure that
packets are not modified in transit.
4.10 What is Fragment Threshold?
The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11
to achieve parallel transmissions. A large data frame is fragmented into several