User Manual
Table Of Contents
- Revision History
- Terminology
- 1 Introduction
- 1.1 Package contents
- 1.2 Product Features
- 2 Installation
- 3 Software configuration
- 3.1 Prepare your PC to configure the WLAN Broadband Router
- 3.2 Connect to the WLAN Broadband Router
- 3.3 Management and configuration on the WLAN Broadband Router
- 3.3.1 Status
- 3.3.2 Setup Wizard
- 3.3.3 Operation Mode
- 3.3.4 Wireless - Basic Settings
- 3.3.5 Wireless - Advanced Settings
- 3.3.6 Wireless - Security Setup
- 3.3.7 Wireless - Access Control
- 3.3.8 WDS Settings
- 3.3.9 Site Survey
- 3.3.10 WPS
- 3.3.11 Schedule
- 3.3.12 LAN Interface Setup
- 3.3.13 WAN Interface Setup
- 3.3.14 Firewall - Port Filtering
- 3.3.15 Firewall - IP Filtering
- 3.3.16 Firewall - MAC Filtering
- 3.3.17 Firewall - Port Forwarding
- 3.3.18 Firewall – URL Filtering
- 3.3.19 Firewall - DMZ
- 3.3.20 QoS
- 3.3.21 Management - Statistics
- 3.3.22 Management - DDNS
- 3.3.23 Management - Time Zone Setting
- 3.3.24 Management – Denial-of-Service
- 3.3.25 Management - Log
- 3.3.26 Management - Upgrade Firmware
- 3.3.27 Management Save/ Reload Settings
- 3.3.28 Management - Password Setup
- 3.3.29 Management – Watchdog Setting
- 4 Frequently Asked Questions (FAQ)
- 4.1 What and how to find my PC’s IP and MAC address?
- 4.2 What is Wireless LAN?
- 4.3 What are ISM bands?
- 4.4 How does wireless networking work?
- 4.5 What is BSSID?
- 4.6 What is ESSID?
- 4.7 What are potential factors that may causes interference?
- 4.8 What are the Open System and Shared Key authentications?
- 4.9 What is WEP?
- 4.10 What is Fragment Threshold?
- 4.11 What is RTS (Request To Send) Threshold?
- 4.12 What is Beacon Interval?
- 4.13 What is Preamble Type?
- 4.14 What is SSID Broadcast?
- 4.15 What is Wi-Fi Protected Access (WPA)?
- 4.16 What is WPA2?
- 4.17 What is 802.1x Authentication?
- 4.18 What is Temporal Key Integrity Protocol (TKIP)?
- 4.19 What is Advanced Encryption Standard (AES)?
- 4.20 What is Inter-Access Point Protocol (IAPP)?
- 4.21 What is Wireless Distribution System (WDS)?
- 4.22 What is Universal Plug and Play (uPNP)?
- 4.23 What is Maximum Transmission Unit (MTU) Size?
- 4.24 What is Clone MAC Address?
- 4.25 What is DDNS?
- 4.26 What is NTP Client?
- 4.27 What is VPN?
- 4.28 What is IPSEC?
- 4.29 What is WLAN Block Relay Between Clients?
- 4.30 What is WMM?
- 4.31 What is WLAN ACK TIMOUT?
- 4.32 What is Modulation Coding Scheme (MCS)?
- 4.33 What is Frame Aggregation?
- 4.34 What is Guard Intervals (GI)?
- 5 Configuration Examples
USER’S MANUAL OF WLAN BROADBAND ROUTER Version: 1.0
48
services to a specific machine behind the NAT firewall. These settings are only
necessary if you wish to host some sort of server like a web server or mail
server on the private local network behind your Gateway's NAT firewall.
Screen snapshot – Firewall - Port Forwarding
Item Description
Enable Port Forwarding Click to enable the Port Forwarding security function.
IP Address
Protocol
Port Range
Comment
To forward data packets coming from WAN to a specific
IP address that hosted in local network behind the NAT
firewall, fill in the IP address, protocol, port range and
your comments.
The Protocol can be TCP, UDP or Both.
The Port Range for data transmission.
Comments let you know about whys to allow data
packets forward to the IP address and port number.
Apply Changes Click the Apply Changes button to register the IP address
and port number to Port forwarding list.
Reset Click the Reset button to abort change and recover the
previous configuration setting.
Delete Selected Click to delete the selected IP address and port number
that will be removed from the port-forwarding list.
Delete All Click to delete all the registered entries from the