CWR-901 54Mbps Wireless-G Router User’s Guide
1 INTRODUCTION ..................................................................................................................................... 4 INSTALLING THE WIRELESS ROUTER ....................................................................................................... 4 SYSTEM REQUIREMENTS .......................................................................................................................... 4 INSTALLATION INSTRUCTIONS .....................................................
.9.2 DHCP Settings....................................................................................................................... 48 3.9.3 Password................................................................................................................................ 49 3.9.4 Time Zone Settings.............................................................................................................. 49 3.9.5 Upgrade Firmware................................................................
1 Introduction Installing the Wireless Router In this chapter, you’ll learn how to connect your wireless router. System Requirements ․One or more PCs (desktop or notebook) with Ethernet interface ․Broadband Internet access ․Ethernet cables ․Wireless interface (if planning to use wireless ) Installation Instructions Connecting the Wireless Router: 1. Make sure all systems (wireless router, PC(s), and the cable or DSL modem if applicable) are turned off,. 2.
. Turn on your PC(s).
2 Preparing the Network Preparing the Network This section of the manual covers the tasks that are to be done before configuring the wireless router. First thing is to have all ISP information as described below and second is to make sure that all computers on the network are configured for TCP/IP networking.
3. Click the IP Address tab. Select Obtain an IP address automatically 4. Now click the Gateway tab, and verify that the Installed Gateway field is Blank. Click the OK button. 5. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Check for the files at c:\windows\options\cabs, or insert your Windows CD-ROM into your CDROM drive and check the correct file location, e.g., D:\win98, D:\win9x, etc. (if “D” is the letter of your CD-ROM drive). 6.
2. Select the Local Area Connection icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Double-click the Local Area Connection. Click the Properties button 3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button. 4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
5. Restart your computer. The following instructions assume you are running Windows XP with the default interface. If you are using the Classic interface (where the icons and menus look like previous Windows versions), please follow the instructions for Windows 2000. 1. Click the Start button and then the Control Panel icon. Click the Network and Internet Connections icon. Then click the Network Connections icon. 2.
3. Make sure the box next to Internet Protocol (TCP/IP) is checked. Highlight Internet Protocol (TCP/IP), and click the Properties button.
4. Select Obtain an IP address automatically. Once the new window appears, click the OK button. Click the OK button again to complete the PC configuration.
3 Configuring the Wireless-G Router This chapter describes how to use the web management tool, a web browser-based utility that allows remotely configuring and managing this wireless router. Open the Web browser and type the router’s IP address “http://192.168.1.254” and press . Enter the User name and Password when prompted, default User name is “root”, and default Password is “1234”. 3.
configuration. Click on “Next” to continue. 3.1.1 Time Zone Settings The first step in Setup Wizard is Time Zone Settings. Users can synchronize the local clock to an available NTP server. Enable NTP client update and select the correct Time Zone. - Time Zone Select: Select the time zone of the country where this wireless router is located. NTP server1: Default NTP server address (clock.stdtime.gov.tw) . NTP server2: NTP server 2 (time-b.nist.gov). NTP server3: NTP server3 (time.nist.gov).
- Subnet Mask: Enter the subnet mask for this wireless router. DHCP Server Status: Select to enable the DHCP Server feature. DHCP Server IP Pool Start IP: Enter the Start IP address assigned by the DHCP server. DHCP Server IP Pool End IP: Enter the End IP address assigned by the DHCP server. Back: To skip the current settings and go back to the last page. Next: Go to the next page. Reset: Click on “Reset” button to undo your changes. Cancel: To skip the current settings and jump to the Status page.
Users have to fill up the data in the blank and then click “Next” button. You will enter the Wireless Basic Settings page. 3.1.4 Wireless Basic Settings In the Wireless Basic Settings page, users can configure: “Alias Name”, “SSID”, “Regulation Domain B/G”, “RF Band”, “Channel Number”, and “Operation Mode”. - - Alias Name: Users can assign a unique name to this wireless router. The alias name is especially important for identification when there are more than one wireless router used in a network.
- IP Address: Default IP address of the wireless router. Subnet Mask: Default subnet mask for this wireless router. Enable UPnP: Users can enable or disable uPNP feature here. If enabled, all client systems that support uPNP, like Windows XP, can automatically discover the wireless router and access the Internet through it without any configuration. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes. Help: To request help information.
- Help: To request help information. 3.3.2 DHCP Client DHCP client also called “Dynamic IP Address” is the connection type offered by most cable broadband service providers. In this mode the WAN port will automatically receive all it’s parameters like IP, Subnet, Gateway and DNS addresses from the ISP.
- - Select WAN Connection Type: Select PPPoE connection Login ID: Enter the login ID provided by ISP Password: Enter the Password provided by ISP Service Name: The Service Name set on the access concentrator. Many ISPs give user-name and address in the form of user-name@service-name. The Service Name provided by your ISP, if one is required, otherwise, leave it blank. AC Name: Access concentrator name provided by the ISP, if one is required, otherwise, leave it blank.
- - - Select WAN Connection Type: Select the Unnumbered PPPoE connection Login ID: Enter the login ID provided by ISP Password: Enter the Password provided by ISP Service Name: The Service Name set on the access concentrator. Many ISPs give user-name and address in the form of user-name@service-name. The Service Name provided by ISP, if one is required, otherwise, leave it blank. AC Name: Access concentrator name provided by ISP, if one is required, otherwise, leave it blank.
- Dial Status: Current status of this session. Maybe “connected”, “connecting” or “disconnect”. Dial: Click on this button to manually connect to ISP. Hang Up: Click on this button to disconnect the wireless router from ISP. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes. Cancel: To skip the current settings and jump to the Status page. Help: To request help information. 3.3.
- “disconnect”. Save and Restart: Save the parameters and reboot the wireless router. Reset: Click on “Reset” button to undo your changes. Cancel: To skip the current settings and jump to the Status page. Help: To request help information. 3.3.6 L2TP Select L2TP when ISP requires the L2TP protocol for WAN connection. The ISP should provide all the information required for this connection. - Select WAN Connection Type: Select L2TP connection IP address: Enter the IP address provided by ISP.
- Cancel: To skip the current settings and jump to the Status page. Help: To request help information. 3.3.7 DHCP + L2TP Same as L2TP WAN type, but user only needs to specify Login ID and Password since gateway’s IP address (as L2TP client) is obtained automatically using DHCP. - Select WAN Connection Type: Select the DHCP + L2TP connection Login ID: Enter the Login ID provided by your ISP Password: Enter the Password provided by your ISP MTU Size: MTU is the Maximum Transmission Unit.
- Enable Wireless: Check or uncheck (Enable or Disable this wireless interface). Alias Name: You can assign a unique name to the wireless router. The alias name is especially important for identification when there are more than one wireless router applied in a network. SSID: The SSID differentiates one WLAN from another; therefore, all wireless routers and all devices attempting to connect to a specific WLAN must use the same SSID. It is case-sensitive and must not exceed 32 characters.
- - - - - Fragment Threshold: Fragmentation mechanism is used for improving the efficiency when high traffic flows through the wireless network. If a wireless client often transmits large files, users can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346. The default value is 2346. RTS Threshold: RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem.
- WMM capable: Check the Enable box to enable the WMM (Wireless Multi Media) capability. Apply: Save the parameters. Reset: Click on “Reset” button to undo your changes. Help: To request help information. 3.4.3 Security In this page the security level and type for the wireless network can be defined. Please note that using any encryption may be a significant degradation of the data throughput on the wireless link. There are four Encryption types: “None”, “WEP”, “TKIP” and ”AES” supported on this router.
- - - Data encryption: “WEP – 64bits”: Wired Equivalent Privacy encryption method with 64 bits encryption key length. “WEP – 128bits”: Wired Equivalent Privacy encryption method with 128 bits encryption key length. The longer encryption length, the more security but the lower performance. Authentication: There are four authentication types – “Open System”: Need no authentication. “Shared Key”: Using a Shared Key to authenticate wireless clients. “Auto”: Auto authentication.
- - Data encryption: “TKIP” means Temporal Key Integrity Protocol.
- - Data Encryption: “AES” means Advanced Encryption Standard.
- - Wireless Access Policy: There are three types of access policy options: Accept any client: If you choose “Accept any client”, any wireless client will be allowed to connect to this wireless router. Accept clients in the list and reject all others: If you choose this option, only those clients whose wireless MAC addresses are in the access control list will be allowed to connect to this wireless router.
- wireless router enters the AP-WDS mode automatically. WDS1/WDS2/WDS3/WDS4: You need to enter MAC addresses of other wireless routers you want to communicate with. There are a maximum of four WDS wireless routers that can join together. Apply: Save the parameters. Reset: Click on “Reset” button to undo your changes. Help: To request help information. 3.5 Firewall 3.5.1 Access Control list ACLs are used to block IP packets from being forwarded by the wireless router.
- Ingress, Dest IP/Port: select the packet with an incoming destination IP. Egress, Src IP/Port: select the packet with an outgoing source IP. Ingress, Src IP/Port: select the packet with an incoming source IP. Type: Define the packet type – TCP, UDP or IP Port: Enter the port number. Day: Select the Day – Sun, Mon, Tue, Wed, Thu, Fri or Sat. Time: Define the Time range. Enable: Check the box and enable this ACL group. Apply: Save the parameters. Reset: Click on “Reset” button to undo your changes.
- Enable: Check the Enable Box, to enable ALG of an application and then the wireless router will let that application correctly pass though the NAT gateway. Apply: Save the parameters. Help: To request help information. 3.5.4 Anti-DoS DoS (Denial of Service) defense function protect network servers, hosts, routers and other devices from the attack of a villain using mass data transmission.
- DoS Prevention Enable: check – enable this DoS feature.
- - - Ignore LAN-Side Check: Skip DoS checks for all LAN to WAN packets Whole System Flood: The wireless router will ignore all packets, when the number of received packets for SYN, FIN, UDP or ICMP exceeds the settings (packets/second). Per-Source IP Flood: The wireless router will ignore all packets from this source IP, when the number of received packets for SYN, FIN, UDP or ICMP exceeds the settings (packets/second).
- UDP Blocking: Check the Enable Box, to enable the UDP Blocking feature. Maximum UDP Size: The router will block UDP packets larger the set size. Apply: Save the parameters. Help: To request help information. 3.5.6 Protocol-based NAT This wireless router supports NAT by IP protocol. Users can specify an IP protocol number and internal host’s IP address to let the gateway masquerade IP header then forward to that internal host. This could be useful if user wants to setup a protocol proxy inside LAN.
- - - - - Default don’t masquerade source port number for new UDP flows: The wireless router will try to keep LAN to WAN source UDP port number when doing NAPT if possible. Doing so helps some NAT unfriendly application without ALG module pass NAT gateway. Default don’t masquerade source port number for new TCP flows: The wireless router will try to keep LAN to WAN source TCP port number when doing NAPT if possible. Doing so helps some NAT unfriendly application without ALG module pass NAT gateway.
Tunnel Name: The wireless router can create three simultaneous tunnels, Tunnel A, Tunnel B and Tunnel C. - This tunnel: Enable or disable this selected tunnel. - Local security group: Private network on this VPN router. - Remote security group: Private network on the remote peer VPN router. - Remote security gateway: Private network on the remote side security gateway. - Encryption: There are two encryption methods available: 3DES and AES.
- Disconnect: Start to disconnect this VPN. Help: To request help information. Status: It will display your connection status when you have established the IPSec tunnel. 3.7 QoS Settings 3.7.1 Port/L4 App Based QoS This web page supports two types of QoS: Port based QoS and L4 application based QoS. For Application based QoS, users can specify a destination port number and associate it with an egress priority (high or low).
High Priority: Select to set high priority level. Low Priority: Select to set Low priority level. Specific Port#: Priority can also be assigned based on the port numbers used by applications. For example FTP uses port 21 and Telnet uses port # 23. - Apply: Save the parameters. - Reset: Click on “Reset” button to undo your changes. Hardware QoS by device port number - Enable: Check the box to enable this feature. - Port #: There are five physical ports – Port 0 : WAN port Port 1 : LAN’s port 1.
- IP Address: Enter the IP address. IP Mask: Enter the IP Subnet Mask. Protocol: Select the IP protocol – TCP, UDP or IP. Start port: Enter the Starting port number. End port: Enter the Ending port number. Rate: Enter the average rate value. Unit: Select the unit for this average rate. IsByteCount: Select the counting method based on bytes or packets. Max Rate: Enter the maximum rate value. Unit: Select the unit for this maximum rate. Enable: Check the box to enable this relative priority.
routing tables do not adjust to network changes, so they work best where routes do not change. - Route: The network address of the destination LAN segment. Packets with destination IP addresses matching this field will be routed to the device set in the Next Hop IP field. Route Mask: Destination Network mask NextHop IP: Next hop router for this packet. Interface: You can select to use LAN or WAN as the physical interface from where the packets will be sent. Save: Save the parameters.
LAN - send version: Select the RIP version for send packet – version 1, 2 or 1&2. - receive version: Select the RIP version for receive packet – version 1, 2 or 1&2. - enable passwd authentication: Enter the password and check it to enable this authentication. RIP setting - update timer (in seconds): The rate at which routing updates are sent. - timeout timer (in seconds): Time period after the router decides a route is not valid anymore.
- Name: Enter the application name. Incoming Type: Select the incoming packet to be TCP, UDP or Both. Incoming Port Range: Enter the port range of incoming packets for this type of application. Trigger Type: Select the outbound port protocol to be to be TCP, UDP or Both. Trigger Start Port: Enter the trigger start port number. This is the outgoing start port number for this particular application. Trigger Finish Port: Enter the trigger end port number.
- DMZ Host #1 (default): Enter the IP address of this DMZ host. Check the box and enable this DMZ feature. General L4 protocol forward: When checked L4 protocol forwarding feature is enabled. ICMP forward: When checked ICMP packet forwarding feature is enabled. Apply: Save the parameters. Help: To request help information. 3.8.7 Ping toolkit This is a handy tool for users to test LAN or WAN connectivity using ping command. - IP Address/Host Name: Enter the IP address or host name which you want to ping.
- Help: To request help information. 3.8.9 PPPoE/IPv6 Passthru There are some specific packets to be defined as pass through. - PPPoE - Drop Unknown PPPoE PADT - IPv6 - IPX - NETBIOS - Enabled: Check the box and enable the corresponding passthru protocol. Apply: Save the parameters. Help: To request help information. 3.8.10 IP Multicast User can disable or enable the IP multicast function. - IP Multicast: Check the box and enable the IP multicast feature. Apply: Save the parameters.
range. Note 2: Since some pendrives are not well protected by its hardware. We recommend the pendrive to be plugged in or out when the router is power off. - Samba Server: Check the box and enable this feature. Apply: Save the parameters. Help: To request help information. For Windows XP, you can find the Samba Server in the My Network Places. 3.9 Management 3.9.1 Status The status page provides a brief read-only report for system, LAN and WAN configuration information.
System LAN - Product Model: Shows the model name of this product. Firmware Version: Shows the current firmware version. Firmware Date: Shows the current firmware building date. Loader Version: Shows the current boot loader driver version. Wireless AP Version: Shows the current wireless driver version. Rome Driver Version: Shows the current Rome Driver version. IP Address: Shows the router’s LAN port IP address Subnet Mask: Shows subnet mask on your local network.
- MAC Address: Shows the MAC address on your LAN port. - DHCP Server: Shows the DHCP server status. - Port 1: Shows the LAN’s port 1 status. - Port 2: Shows the LAN’s port 2 status. - Port 3: Shows the LAN’s port 3 status. - Port 4: Shows the LAN’s port 4 status. WAN Configuration - Connection Method: Shows the connection method being used on WAN. - IP Address: Shows the router’s WAN port IP address - Subnet Mask: Shows subnet mask on your public network.
- - DHCP Server IP Pool End IP: Enter the End address assigned by DHCP server. 1st WINS Server: The Windows Internet Naming Service (WINS) manages each PC’s interaction with the Internet. If you use a WINS server, enter that server’s IP address here. Otherwise, leave this blank. 2nd WINS Server: Enter the second WINS server IP. Note: Like DNS, WINS employs a distributed client/server system to maintain the mapping of computer names to addresses.
- Time Zone: Select the time zone of the country where the wireless router is located. NTP server1: Default NTP server address (clock.stdtime.gov.tw). NTP server2: Default NTP server address (time-b.nist.gov). NTP server3: Default NTP server address (time.nist.gov). Time: Display current time of the wireless router. Save/Time Sync: Save the settings and update the time from selected servers. Refresh Time: Update the time from selected servers. Help: To request help information. 3.9.
- Remote Management IP: Enter the remote management IP of the wireless router. Remote Management Netmask: Enter the remote management netmask of this router. Remote Management Port: Define the remote management port of this wireless router. Ping from WAN side: Allow users to ping this wireless router from WAN side. It is turned on by default and could be turned off if the enable box is unchecked.. Save: Save the settings. Help: To request help information. 3.9.
Note: enabling all logs will generate a large amount of data and adversely affect performance. 3.10.1 System Log Log the internal system information - System Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.2 ACL Log Log the Access Control List information - ACL Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.3 URL Filter Log Log the URL Filter information.
- DoS Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information. 3.10.5 New Connection Log Log the WAN connection information - New NAPT Log: Check the box and enable this feature. Apply: Save the settings. Help: To request help information.
Appendix A: Troubleshooting Symptom Inability to access the router Possible Causes Things to Do • Verify that the wireless • Incorrect or incompatible wireless network configuration. network configurations between the wireless client For example, shared key authentication is configured on and wireless AP/Router are the wireless AP/Router and the compatible. Make sure that the client system’s network card is wireless client is attempting set to receive IP automatically.
Intermittent connectivity • AP/Router is not power on • Check the “Power” LED. Make sure that you've plugged in the power cord. • IEEE 802.1X authentication is enabled on the wireless client and is not enabled on the wireless AP/Router • The symptom of this issue is when the wireless client loses connectivity every 3 minutes or so. Disable the authentication feature on the wireless client.
• On a laptop computer, the Configuration services are wireless radio button might be configured to start in the off position automatically. • A wireless network adapter driver failing in early stages of service startup may result in the Wireless Zero Configuration or Wireless Configuration service not initializing over that interface. Client can't connect to the AP/Router's configuration utility. • Wrong IP address 56 • Make sure that your PC is using an IP address within the correct range.
Appendix B: Frequently Asked Questions Q1: What is wireless networking? Ans: The term wireless networking refers to the technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Strictly speaking, any technology that does this could be called wireless networking. The current buzzword however generally refers to wireless LANs. This technology, fuelled by the emergence of cross-vendor industry standards such as IEEE 802.
Figure A2: Hardware Access Point. Wireless connected computers using a Hardware Access Point. Figure A3: Software Access Point. Wireless connected computers using a Software Access Point. Q3: Can I mix wireless equipment from different vendors? Ans: Because most wireless networking hardware vendors support the 802.11 standard they can inter operate.
also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators.
is analogous to Ethernet cabling, the answer to this question becomes clear. To share an Internet connection across a LAN you need two things: (1) an Internet sharing hardware device or software program (2) connection to a LAN If your LAN is wireless, the same criteria apply. You need hardware or software access point and a wireless LAN. Any computer equipped with a wireless network card running suitable Internet sharing software can be used as a software access point.
produces secure scrambled text. Decryption is the opposite of encryption; it is the mathematical operation that transforms cipher text to standard text. Q11: Why do I need a router? Ans: The increased reliance on computers to store valuable information and the development of applications that share information over the internet through networked personal computers, in combination with the advent of computer hacking, has made information and network security an important issue.
Q21: What is the maximum number of users the Access Point facilitates? Ans: It depends on the volume of data and may be less if many users create a large amount of network traffic. Q22: What is the maximum number of IP addresses that the Router will support? Ans: The Router will support up to 253 IP addresses. Q23: Where is the Router installed on the network? Ans: In a typical environment, the Router is installed between the cable/DSL modem and the LAN.