User`s manual
Table Of Contents
- Revision History
- Terminology
- 1 Introduction
- 2 Installation
- 3 Software configuration
- 3.1 Prepare your PC to configure the WNAP 3G Mobile Router
- 3.2 Connect to the WNAP 3G Mobile Router
- 3.3 Management and configuration on the WNAP 3G Mobile Router
- 3.3.1 Status
- 3.3.2 Setup Wizard
- 3.3.3 Operation Mode
- 3.3.4 Wireless - Basic Settings
- 3.3.5 Wireless - Advanced Settings
- 3.3.6 Wireless - Security Setup
- 3.3.7 Wireless - Access Control
- 3.3.8 WDS Settings
- 3.3.9 Mesh Settings
- 3.3.10 Site Survey
- 3.3.11 WPS
- 3.3.12 Schedule
- 3.3.13 LAN Interface Setup
- 3.3.14 WAN Interface Setup
- 3.3.15 Firewall - Port Filtering
- 3.3.16 Firewall - IP Filtering
- 3.3.17 Firewall - MAC Filtering
- 3.3.18 Firewall - Port Forwarding
- 3.3.19 Firewall – URL Filtering
- 3.3.20 Firewall - DMZ
- 3.3.21 Firewall – VLAN
- 3.3.22 Firewall – Virtual Server
- 3.3.23 Route Setup
- 3.3.24 QoS
- 3.3.25 USB Storage
- 3.3.26 Management - Statistics
- 3.3.27 Management - DDNS
- 3.3.28 Management - Time Zone Setting
- 3.3.29 Management – Denial-of-Service
- 3.3.30 Management - Log
- 3.3.31 Management - Upgrade Firmware
- 3.3.32 Management Save/ Reload Settings
- 3.3.33 Management - Password Setup
- 3.3.34 Management - WatchDog
- 3.3.35 Management – Reboot
- 3.3.36 Logout
- 3.3.37 Management - Password Setup
- 4 Frequently Asked Questions (FAQ)
- 4.1 What and how to find my PC’s IP and MAC address?
- 4.2 What is Wireless LAN?
- 4.3 What are ISM bands?
- 4.4 How does wireless networking work?
- 4.5 What is BSSID?
- 4.6 What is ESSID?
- 4.7 What are potential factors that may causes interference?
- 4.8 What are the Open System and Shared Key authentications?
- 4.9 What is WEP?
- 4.10 What is Fragment Threshold?
- 4.11 What is RTS (Request To Send) Threshold?
- 4.12 What is Beacon Interval?
- 4.13 What is Preamble Type?
- 4.14 What is SSID Broadcast?
- 4.15 What is Wi-Fi Protected Access (WPA)?
- 4.16 What is WPA2?
- 4.17 What is 802.1x Authentication?
- 4.18 What is Temporal Key Integrity Protocol (TKIP)?
- 4.19 What is Advanced Encryption Standard (AES)?
- 4.20 What is Inter-Access Point Protocol (IAPP)?
- 4.21 What is Wireless Distribution System (WDS)?
- 4.22 What is Universal Plug and Play (uPNP)?
- 4.23 What is Maximum Transmission Unit (MTU) Size?
- 4.24 What is Clone MAC Address?
- 4.25 What is DDNS?
- 4.26 What is NTP Client?
- 4.27 What is VPN?
- 4.28 What is IPSEC?
- 4.29 What is WLAN Block Relay Between Clients?
- 4.30 What is WMM?
- 4.31 What is WLAN ACK TIMOUT?
- 4.32 What is Modulation Coding Scheme (MCS)?
- 4.33 What is Frame Aggregation?
- 4.34 What is Guard Intervals (GI)?
- 5 Configuration Examples

USER’S MANUAL OF WNAP 3G MOBILE ROUTER Version: 2.0
81
authentication server, typically one that supports RADIUS and the selected EAP
authentication protocol, will be added to the network.
4.16 What is WPA2?
It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i
amendment to the 802.11 standard.
4.17 What is 802.1x Authentication?
802.1x is a framework for authenticated MAC-level access control, defines Extensible
Authentication Protocol (EAP) over LANs (WAPOL). The standard encapsulates and
leverages much of EAP, which was defined for dial-up authentication with
Point-to-Point Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages
that convey the shared key information critical for wireless security.
4.18 What is Temporal Key Integrity Protocol (TKIP)?
The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i
encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired
Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides
per-packet key mixing, a message integrity check and a re-keying mechanism, thus
fixing the flaws of WEP.
4.19 What is Advanced Encryption Standard (AES)?
Security issues are a major concern for wireless LANs, AES is the U.S. government’s
next-generation cryptography algorithm, which will replace DES and 3DES.
4.20 What is Inter-Access Point Protocol (IAPP)?
The IEEE 802.11f Inter-Access Point Protocol (IAPP) supports Access Point Vendor
interoperability, enabling roaming of 802.11 Stations within IP subnet.
IAPP defines messages and data to be exchanged between Access Points and between
the IAPP and high layer management entities to support roaming. The IAPP protocol
uses TCP for inter-Access Point communication and UDP for RADIUS request/response
exchanges. It also uses Layer 2 frames to update the forwarding tables of Layer 2
devices.