Copyright © 2002-2007 BROWAN COMMUNICATIONS. This DOCUMENT is copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of BROWAN. Notice BROWAN reserves the right to change specifications without prior notice.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
- EN 301 489-17 V1.2.1 (2002-08) - Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries, except in France and Italy where restrictive use applies.
Eesti [Estonian] Käesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tüüp = type of equipment] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. English Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.
[Lithuanian] reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in Nederlands overeenstemming is met de essentiële eisen en de andere relevante bepalingen van [Dutch] richtlijn 1999/5/EG. Malti Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma [Maltese] mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Svenska [Swedish] Härmed intygar [företag] att denna [utrustningstyp] står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
Contents Copyright..........................................................................................................................................................................................2 Notice...............................................................................................................................................................................................2 Trademarks.................................................................................................
Features Highlight ..........................................................................................................................................................................21 CHAPTER 2 - INSTALLATION................................................................................ 22 The Product Package.....................................................................................................................................................................23 Hardware Introduction....
Select Country ...............................................................................................................................................................................46 Welcome | Wizard ..........................................................................................................................................................................47 Welcome | Wizard | Setup Wizard..................................................................................................
Wireless Settings | Multiple SSDIs ...............................................................................................................................................102 Internet Settings | Connection to ISP ...........................................................................................................................................104 Firewall | Virtual Servers ..........................................................................................................................
Advanced | ProxyARP..................................................................................................................................................................161 Advanced | 1 to 1 NAT .................................................................................................................................................................162 Advanced | SNMP.............................................................................................................................
About this Guide Purpose This document provides information and procedures on hardware installation, setup, configuration, and management of the BROWAN BW1230 SMB Wireless Router. Prerequisite Skills and Knowledge To use this document effectively, you should have a working knowledge of Local Area Networking (LAN) concepts and wireless Internet access infrastructures.
Conventions Used in this Document The following typographic conventions and symbols are used throughout this document: Very important information. Failure to observe this may result in damage. Important information that should be observed. Additional information that may be helpful but which is not required.
Help Us to Improve this Document! If you should encounter mistakes in this document or want to provide comments to improve the manual please send e-mail directly to: manuals@browan.com Browan Technical Support If you encounter problems when installing or using this product, please consult the Browan website at www.browan.com for: Direct contact to the Browan support centers. Frequently Asked Questions (FAQ). Download area for the latest software, user documentation and product updates.
Chapter 1 – Introduction Thank you for choosing BROWAN BW1230 SMB Wireless Router. You could have the better and easier wireless network with a series of BROWAN’s products. Product Overview The BW1230 SMB Wireless Router is an integrated router, IEEE 802.11g wireless access point, four-port switch, and firewall to provide a high-speed, secure, affordable and easy-to-use wireless LAN solution that combines the flexibility of wireless networking and services required in Small Medium Business networks.
Sophisticated Firewall and Advanced Security Integrated with sophisticated firewall functionalities including a stateful packet inspection firewall, hacker pattern detection, IP and MAC address filtering and other security features help protect the entire enterprise network from attacks and other Internet security risks.
stateful packet inspection firewall: A stateful firewall (any firewall that performs stateful packet inspection or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) travelling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected.
Features Highlight 802.11b+g compliant, 1-54Mbps with auto-fallback Support Multiple BSSID, up to 3 Virtual AP Concurrent 802.11b and 802.11g user association WDS supported Quality of Service, IEEE 802.
Chapter 2 - Installation This chapter provides installation instructions for the hardware and software components of the BROWAN BW1230 SMB Wireless Router.
The Product Package The items in the package: Item Qty 1 BROWAN BW1230 SMB Wireless Router 1 2 Power adapter 1 3 RJ-45 Ethernet cable 1 4 External antenna 1 5 Installation CD with:: BW1230 User Guide (PDF) Product Firmware Release Notes Adobe Acrobat Reader 1 6 Printed 2 Years Warranty Card 1 BROWAN COMMUNICATIONS If any of these items are missing or damaged, please contact your reseller or Browan sales representative immediately.
Hardware Introduction General Overview Cost-effective solution is the design concept of BW1230. Users could share a single broadband internet connection between several wired and wireless computers. Also BW1230 could present user a safe internet connection by block any unauthorized users to see your files or damage your computers. And users could manage BW1230 easier with Web-based configuration.
TOP Cover View The Top Cover of BW1230 contains some indicator lights (LEDs), and they could help you to know the status of your networking and connection operations. Figure2 shows the Top Cover view of BW1230. 1 Power LED: It tells you the power is on or off. 3 1 2 Wireless LED: 1. If the Wireless LED is on it indicates your wireless networking is enable. 2. If the Wireless LED is off it indicates your wireless networking is disable. 3.
3 WAN LED: 1. If the WAN LED is on it indicates the connection between the BW1230 and your DSL/Cable Modem is working fine. 4 2. If the WAN LED is off it indicates the connection is failed. 3. If the WAN LED is flashing it indicates the connection between the BW1230 and your DSL/Cable Modem is working fine and it is transmitting and receiving the data. LAN LED (Four Ports) : 1. If the LAN LED is on it indicates the connection between the BW1230 and your another network equipment is working fine. 2.
The LED indication of BW1230 shown as below: Item Number LED 1. Power 2. 3. 4.
Connection View Figure3 shows the connectors of BW1230. 1 2 3 4 Power Adapter Socket Please only use the power adapter provided by this BW1230 SMB Wireless Router. 5 3 Reset You could press Reset button to restore your router back to the factory default. 1 2 4 WAN Connect your WAN port to your DSL/Cable Modem for your broadband Internet access with a RJ-45 network cable.
5 External Antenna Socket To install the BW1230 External Antenna. Press the Reset button for less than 5 seconds to reboot the device. Press the Reset button for more than 5 seconds to set the device to factory defaults.
Bottom Case You could find the product label on the bottom case, shown as Figure4.
Product and Safety Label This product label contains : 1. Product Model 6 2 1 4 3 5 2. Product name of BW1230. 3. BW1230 has passed the requirement of CE. 4. BW1230 has passed the requirement of RoHS. 9 5. BW1230 has passed the requirement of WEEE. 6. BW1230 has passed the requirement of FCC. 7. BW1230 has passed the requirement of China RoHS. 8. Browan Logo. 12 11 7 8 10 9. The Revision of BW1230. 10. This device has been made in Taiwan. 11. Serial number of BW1230.
CE : The CE mark is a mandatory European marking for certain product groups to indicate conformity with the essential health and safety requirements set out in European Directives. To permit the use of a CE mark on a product, proof that the item meets the relevant requirements must be documented.
China RoHS : China RoHS is a certification about the administration on the control of pollution caused by electronic information products. Key Differences between China RoHS and EU RoHS: The scope is different The requirements are different There are no exemptions ...
policy. The FCC took over wire communication regulation from the Interstate Commerce Commission. The FCC's jurisdiction covers the 50 states, the District of Columbia, and U.S. possessions.
Hardware Installation Mounting the BW1230 Step 1 : Please use a power drill to make two holes on the wall. 1 Wall Plug ○ Step 2 : 1 Wall Plugs into the two holes. Hammer the ○ Step 3 : 2 Screws to the ○ 1 Wall Plug. And screw the ○ 3 BW1230 ○ Step 4: 3 BW1230 on the wall.
Installing the BW1230 Step1: Install the antenna and connect the power adapter. Step2: Insert one end of RJ-45 network cable into the WAN Port, and insert another end of RJ-45 network cable into your existing Cable/DSL Modem. You might check the connection status of the BW1230 and Cable/DSL modem from the WAN LED indicator. Step3: Connect the Cable/DSL modem to your internet service with a RJ-45 network cable. Step4: Connect your computer to any LAN Port of BW1230 with a RJ-45 network cable.
completed. You could configure the BW1230 with your computer, and then you could set up other computers ( including wireless computers ) after the configuration completed Directly connect a computer to the any LAN Port of BW1230 for your preliminary configuration. Because you might lose contact with router if you configure the router from a wireless computer.
Software Installation Accessing Your BW1230 Use the Web browser to access Step 1 : Please setup your network connection. Select Local Area Connection Status. Click on Properties.
Double click on the Internet Protocol (TCP/IP) Figure 10-2 – Local Area Connection Status BROWAN COMMUNICATIONS Page 39
Please select Obtain an IP address automatically and Obtain DNS sever address automatically. Click on OK to apply the changes.
Connect the BW1230 with local network. Open the Web browser and enter the default IP address of the BW1230: http://192.168.1.
Enter the BW1230 administrator login credential to access the Web management interface. The Default System Password is admin, and it is case sensitive.
Chapter 3 – Application Mode You could share the internet with everybody in anywhere.
Chapter 4 – Reference Manual This chapter contains the illustration of the main functions in the configuration. After the network connection setup (refer to Accessing Your BW1230), open the Web browser and enter the default IP address of the BW1230: http://192.168.1.1 Enter the System Password, admin. Click Log in button to continue the configuration, or click Cancel button to quit the configuration.
If you forget your password, please click on the here. After you click on the here, there will be a popup window. And the popup window will show you what you should do.
Welcome | Wizard The Wizard feature could help you to easily configure the router. The Wizard screen would display automatically for your preliminary configuration, or you could manually click on Wizard tag. Please click on the WIZARD button to launch the wizard feature.
Welcome | Wizard | Setup Wizard Router Configuration Wizard This screen is the first screen appears after you start the setup wizard. Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Change Administration Password You could leave fields blank to keep the default administrator password, or you could change a new password. If you would like to change a new password, please enter the old password in the first field. And enter the new password in the other two fields. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard. Browan recommand you to change a new password for your wireless network sercurity.
Time Zone Please select the time zone from the drop-down menu, and check the Enable Daylight saving selection if necessary Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Internet Settings - Internet Addressing Mode Please select an internet connection mode you are using. PPPoE is required (typically DSL users only) ISP provides configuration dynamically (via DHCP) ISP has provided a static IP address PPTP is required (some DSL users in Europe) Heart Beat Signal (Bigpond/Telstrra) is required L2TP (used by some European providers) Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Internet Settings – PPPoE PPPoE (Point-to-Point Protocol over Ethernet): Only ISP's providing DSL use PPPoE. If the installation instructions that accompany your modem ask you to install a PPPoE client on your PC then select this option. Note that you will not need to use PPPoE software on your PC once the Router is installed. If you are unsure, you should ask your ISP whether you need to use PPPoE. PPPoE User Name: Enter your User Name in this box.
Host Name: Some ISP's require a host name to identify you when you connect. If you have been provided a Host Name by your ISP, you should enter it here. This field is optional, and so if you have not been provided a host name, you may leave it blank. MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value.
Internet Settings – Hostname Dynamic IP address (automatically allocated): This allocation mode may be used by either Cable or DSL ISP's. It is popular with Cable providers, and may also be required if your modem has a built in DHCP server. If this mode is selected, your IP Address, Subnet Mask, and ISP Address will be obtained automatically from your ISP. They are not displayed on this screen, but may be viewed on the Status screen (click on Status and Logs on the left hand menu bar).
Clone MAC address: Some ISP's use the hardware (MAC) address of the device you connect to the Internet with to identify you. If you have previously used a different device with your current ISP, and they use your MAC address to identify you, then you can change the MAC address on the WAN side of your Router to be that of your old device. There are three options available for cloning the Router WAN port MAC address: Use the Router's original MAC address: This option is selected by default.
Enter a new MAC address manually If the MAC addresses given by the previous two options are not correct, then you will need to find the MAC address of the previous device used with your ISP. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Internet Settings - Static IP Mode Static IP address (to be specified manually): This allocation mode may be used by either Cable or DSL ISP's. IP address: This is the IP address of your Router that will be seen from the WAN, or Internet. This setting is required, and will be provided to you by your ISP. Subnet mask: This is the Subnet Mask of your Router's WAN port. This setting is required, and will be provided to you by your ISP. ISP Gateway Address: This is sometimes referred to as Default Gateway.
Primary DNS Address: Your ISP will normally provide you with at least one DNS (Domain Name Server) address, and you should enter the first here. A Domain Name Server performs the translation between user-friendly names (such as www.browan.com) and IP addresses. Note that this setting is optional, and can be left at 0.0.0.0 if it is not required. Secondary DNS Address: If your ISP has provided a second DNS address, you should enter it here. Otherwise, leave this setting at its default of 0.0.0.0.
Internet Settings - PPTP Mode PPTP (Point to Point Tunneling Protocol): Some ISP's require the use of PPTP to establish connections to their networks. At present PPTP is only used by some European ISP's. If the installation instructions that accompany your modem ask you to set up a dialup connection using a PPTP VPN tunnel then select this option. Note that once the Router is installed, you will not need to use the dialup VPN on your PC any more.
PPTP User Name: Enter your User Name in this box. This field is required, and will be provided to you by your ISP. PPTP Password: Enter your password in this box. This field is required, and will be provided to you by your ISP. DNS Addresses: If your ISP has provided you with DNS addresses, you should enter them here. Otherwise, leave these setting at its default of 0.0.0.0. These settings are optional, and most ISP's will also provide you with DNS addresses automatically.
Maximum Idle Time: This is the amount of time that passes before your Internet Connection is dropped due to inactivity. If you want to keep your Internet Connection established at all times, you should select Forever. Otherwise, select the amount of time that you want to pass before your Router disconnects from your ISP. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Get IP By DHCP: Some ISP may have the mechanism that automatically provides Initial IP Address, Subnet Mask and Default Gateway. If your ISP provides such mechanism, you should check this option. Otherwise, you should manually enter your initial IP Address, Subnet Mask and Default Gateway. Initial IP address and Subnet Mask: You must specify some IP settings to be used when establishing the PPTP connection. If your ISP has provided you with these settings, then you should use them.
connection. If the PPTP Server and Initial IP Address are in the same subnet, then you can set the Initial Default Gateway to 0.0.0.0 or 0. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Internet Settings - Heart Beat Signal (Bigpond/Telstrra) Mode Heart Beat Signal (For Australia only): It is a service used in Australia only. If you are using Heart Beat Signal connection, check with your ISP for the necessary setup information. Host Name: Some ISP's require a host name to identify you when you connect. If you have been provided a Host Name by your ISP, you should enter it here. This field is optional, and so if you have not been provided a host name, you may leave it blank.
Heart Beat Password: Enter the Password you use when logging onto your ISP through a Heart Beat Signal connection MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Internet Settings - L2TP Mode L2TP (Layer Two Tunneling Protocol): Some ISP's require the use of L2TP to establish connections to their networks. If the installation instructions that accompany your modem ask you to set up a dialup connection using a L2TP VPN tunnel then select this option. Note that once the Router is installed, you will not need to use the dialup VPN on your PC any more. L2TP Server address: This is the IP address of the L2TP server you are connecting to.
and will be provided to you by your ISP. DNS Addresses: If your ISP has provided you with DNS addresses, you should enter them here. Otherwise, leave these setting at its default of 0.0.0.0. These settings are optional, and most ISP's will also provide you with DNS addresses automatically. When the addresses are obtained from your ISP, they will be displayed on the Status screen. MTU: The MTU settings should be obtained from your Internet Service Provider.
Get IP By DHCP: Some ISP may have the mechanism that automatically provides Initial IP Address, Subnet Mask and Default Gateway. If your ISP provides such mechanism, you should check this option. Otherwise, you should manually enter your initial IP Address, Subnet Mask and Default Gateway. Initial IP address and Subnet Mask: You must specify some IP settings to be used when establishing the L2TP connection. If your ISP has provided you with these settings, then you should use them.
connection. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
LAN Settings - LAN IP Address The Router must be given a valid static IP address and subnet mask for the LAN interface. IP Address: This is the IP address of the Router as seen by the devices on the LAN. The default value is 192.168.1.1. Subnet Mask: This is the Subnet Mask for the Router. For devices to be on the same subnet, they must have the same subnet mask. The default value is 255.255.255.0. Click Back to go to previous screen. Or Click Next to continue the setup wizard.
LAN Settings - DHCP Server Setup Please make selection if you would like to enable DHCP or disable DHCP. IP Pool Start Address: This defines the start address of the IP address range. The default value is 192.168.1.2. IP Pool End Address: This defines the end address of the IP address range. The default value is 192.168.1.254. Click Back to go to previous screen. Or Click Next to continue the setup wizard. Or click Cancel to quit the setup wizard.
Wireless Settings - Wireless Configuration Service Area Name/SSID: This allows you to name your Wireless network. The field will accept any alphanumeric string but not spaces and has a maximum length of 32 characters. Your Wireless PCs must be configured with exactly the same name or you will not establish a connection. The Service Area Name may also be referred to as ESSID depending on your networking vendor. By default the Router uses the name BROWAN. Click Back to go to previous screen.
Configuration Summary This screen will show the configuration of your BW1230. Click Print to print out the configuration. And click Back to go to previous screen. Or Click Finish to complete the setup wizard. Or click Cancel to quit the setup wizard.
Wizard Completed Your BW1230 settings have been completely saved. Now you are ready to enjoy your wire and wireless network.
Welcome | Notice Board The Notice Board is used to display warning messages if you've configured the Router in a non standard manner. For example, you would be warned if you had disabled the Firewall.
Welcome | Password Changing the Administration Password You can change the password to prevent unauthorized access to the Administration System. To do this: 1. 2. 3. 4. Enter the current password in the Old Password field. Enter the new password in the New Password field. Enter the new password again in the Confirm Password field. Click Apply to save the new password. Browan recommand you to change a new password for your wireless network sercurity. And the password is case sensitive.
Welcome | Wizard This option allows you to run the Setup Wizard to change the configuration settings of the Router. You could click WIZARD bottom to start the wizard setup.
LAN Settings | Unit Configuration LAN Settings: The Router must be given a valid static IP address and subnet mask for the LAN interface. IP Address: This is the IP address for PC accessing the Router on the LAN. The default value is 192.168.1.1. Subnet Mask: This is the Subnet Mask for the Router. For devices to be on the same subnet, they must have the same subnet mask. The default value is 255.255.255.0.
IP Pool Start Address This defines the start address of the IP address range. When the Router is acting as a DHCP server, it will issue IP addresses to the devices on the LAN from within the IP address range. The default value is 192.168.1.2. IP Pool End Address This defines the end address of the IP address range. The default value is 192.168.1.254. DHCP Relay: The DHCP Relay Agent can deliver the IP address from the DHCP Server and allows you to place DHCP Clients and DHCP Servers on the same network.
LAN Settings | Static DHCP Assignment Static DHCP Client List This feature is for users would like a PC to be assigned the same IP address when every time it reboots. On the Static DHCP Client List , enter the static local IP address in the Assign this IP field, and enter the MAC address of the PC in the To this MAC field. Then click the Enabled checkbox. When you have finished your entries, click the Save button to save your changes.
LAN Settings | DHCP lease table DHCP Lease Table On the DHCP Lease Table, you will see a list of DHCP clients with the following information: Client Names, Interfaces, IP Addresses, and MAC Addresses. If you want to add any of the DHCP clients to the Static DHCP Client List, just click the Fixed checkbox. Then click the Save button. To view the most up-to-date information, click the Refresh button.
Wireless Settings | Configuration Enable Wireless Networking It allows you to enable/disable the wireless section of your LAN. When disabled, the router will close all the wireless connection and no wireless PCs can get the access to either the Internet in wired LAN of the router. Wireless Mode From this drop-down menu, you could see the selection which including mixed, wireless-B only, wireless-G only, Dynamic SuperG and SuperG without turbo.
depending on your networking vendor. By default the Router uses the name BROWAN. Wireless Settings | Encryption The Router offers two methods of encryption for greater wireless network security: WPA — Wi-Fi Protected Access. WPA is an enhancement over WEP and will strongly increase the level of data protection and access control on your wireless network. WPA allows you to encrypt the switched packet in network between your Wireless PC and the Router. The default value of security mode is disable.
Enterprise Mode. Use the WPA Type box to select the desired type. 2. Manual Pre-Shared Key A Key is a hexadecimal (0-9, A-F) number used to encrypt and decrypt the data. There is only one key available, which are 63 digits long. Each wireless PC client using WPA must be configured to have the exact same Key; otherwise the client will be unable to connect. Manual Pre-Shared Keys provide the greatest combination of possible Keys, which provides greater security to the wireless network. 3.
must be greater than 8 characters and shorter than 64 characters. 4. Enterprise Mode Allows Enterprise-level User Authentication via 802.1x and EAP (Extensible Authentication Protocol). This framework utilizes a central authentication server, such as RADIUS, to authenticate each user on the network before they join it. This option features a WPA used in coordination with a RADIUS server that uses either EAP-TLS or PEAP as its authentication method.
WEP Encryption allows you to configure: Wireless Encryption Type There are two levels of encryption available, 64 bit (sometimes referred to as 40 bit) and 128 bit (sometimes referred to as 104 bit). 128 bit WEP is more secure than 64 bit. Use the Wireless Encryption Type box to select the desired level. Key Generation Method A Key is a hexadecimal (0-9, A-F) number used to encrypt and decrypt the data. There can be up to 4 keys and each key can be as long as 26 digits.
The Router supports 4 methods to specify the WEP Keys: 1 Manual Hex Key — This method allows you to ○ manually enter hex keys. Virtually all manufacturers support this scheme. 2 BROWAN Encryption String — This method is ○ only supported by BROWAN Wireless products. The string can contain any alpha numeric characters and must be between 6 and 30 characters long. A single string will automatically generate 4 unique keys for 64 or 128 bit WEP.
4 Passphrase — This is another common method ○ and similar to the BROWAN Encryption string. In 64 bit WEP, the Passphrase will generate 4 different keys. However, in 128 bit WEP, this method only generates 1 key which is replicated for all 4 keys. Active Transmit Key The Active Transmit Key selects which of the 4 Keys the Router uses when it transmits. You can change the selected key every now and then to increase the security of your network.
Wireless PC can eavesdrop on your network. If you enable WPA or WEP on the Router, you must reconfigure your wireless PCs to use exactly the same Encryption Type and Keys otherwise the devices will not understand each other. Wireless Settings | WDS WDS (Wireless Distribution System) is comprised of a bridging and/or a repeater mode.
If you choose WDS-STA for the router, you have specified the router to act as a Repeater of your wireless distributed system (WDS); whereas if you choose WDA-ROOTA for your router, you have specified this router to act as a Base of your wireless distributed system. Wireless Settings | WMM You can enable Wi-Fi Multimedia (WMM) support to help improve the Quality of Service (QoS) for audio, video, and voice applications over the wireless network.
provides differentiated channel access to frames with different priorities. Typically, voice and video traffic types are delay-sensitive, but are tolerant of some frame losses. On the other hand, data traffic type is delay-tolerable, but requires loss-free transmission. So you may adjust theses parameters with regard to the characteristics of these types of data to better manage your network flow.
indicate the admission control is required for each of the ACs. Access Point Theses values of AIFS, CWmin, and CWmax are announced by the AP via beacon frames. The AP can adapt these parameters dynamically depending on the network conditions. Basically, the smaller AIFS and CWmin, the shorter the channel access delay for the corresponding priority, and hence the more capacity share for a given traffic condition. However, the probability of collisions increases when operating with smaller CWmin.
not been acknowledged. After any unsuccessful transmission attempt, another back off timer is performed, with an upper bound of CWmax. This reduces the collision probability in case there are multiple stations attempting to access the channel.
Admission Mandatory; could be turned on to mandatory execution of the contention control.
Wireless Settings | Connection Control Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your networks radius. Access Restrictions Prevent PC listed below from accessing the wireless network. Clicking this radio button will block wireless access by MAC Address. Permit PC listed below to access the wireless network. Clicking this radio button will allow wireless access by MAC Address.
Wireless Settings | Client List The Wireless Clients List provides details on the devices that are connected to the Wireless LAN. The list is only created when Wireless Networking is enabled. For each device that is connected to the Wireless LAN: the MAC address, Connection Speed and Client Type of that device is displayed. As you connect more devices to the Wireless LAN, the client list will grow to a maximum of 32 (the maximum number of wireless devices that the Router can support).
Wireless Settings | Advanced Authentication Type The default is set to open system (Default), allows choosing Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication. Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit.
actual rate of data transmission. If you want to specify the Router's rate of data transmission, configure the Transmission Rate setting. Transmission Rate The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range of transmission speeds, or you can select Auto (Default) to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature.
Router. Then select the appropriate level, Full (Default), Half, Quarter, Eighth, or Min, from the drop-down menu. The default is Full (Default). CTS Protection Mode CTS (Clear-To-Send) Protection Mode should be set to Auto (Default). The Router will automatically use CTS Protection Mode when your Wireless-G products are experiencing severe problems and are not able to transmit to the Router in an environment with heavy 802.11b traffic.
Beacon Interval A beacon is a packet broadcast by the wireless router to make the client scan the wireless signal. The Beacon Interval value indicates the time interval of the beacon. The default value is 100. DTIM Interval This value indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages.
Threshold too low may result in poor network performance. Only minor reduction of the default value is recommended. In most cases, it should remain at its default value of 2346. RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled.
Wireless Settings | Multiple SSIDs Enable Multiple SSID Allows you to enable/disable the Multiple SSID. When disabled, only one SSID on your Wireless LAN. The default setting is BROWAN. Service Area Name/SSID This allows you to name your Wireless network. The field will accept any alphanumeric string but not spaces and has a maximum length of 32 characters. Your Wireless PCs must be configured with exactly the same name or you will not establish a connection.
Enable Broadcast SSID This feature can be used to improve the security of your wireless network. When the checkbox is unchecked, the Router will not broadcast the Service Area Name / SSID of your wireless network. It will prevent unauthorized clients from detecting your SSID and attempting to connect to your network. If you have a wireless client that can detect all the available SSIDs in your area, your client will not list the Router SSID when this feature is enabled.
Internet Settings | Connection to ISP Connection Parameters IP Allocation Mode: To establish a connection with your ISP's network, select the IP Allocation Mode that they use. There are four different options available: Dynamic IP address (automatically allocated): This allocation mode may be used by either Cable or DSL ISP's. It is popular with Cable providers, and may also be required if your modem has a built in DHCP server.
optional, and so if you have not been provided a host name, you may leave it blank. Clone MAC address: Some ISP's use the hardware (MAC) address of the device you connect to the Internet with to identify you. If you have previously used a different device with your current ISP, and they use your MAC address to identify you, then you can change the MAC address on the WAN side of your Router to be that of your old device.
Enter a new MAC address manually If the MAC addresses given by the previous two options are not correct, then you will need to find the MAC address of the previous device used with your ISP.
Static IP address (to be specified manually): This allocation mode may be used by either Cable or DSL ISP's. IP address: This is the IP address of your Router that will be seen from the WAN, or Internet. This setting is required, and will be provided to you by your ISP. Subnet mask: This is the Subnet Mask of your Router's WAN port. This setting is required, and will be provided to you by your ISP. ISP Gateway Address: This is sometimes referred to as Default Gateway.
the translation between domain name (such as www.browan.com) and IP addresses. Note that this setting is optional, and can be left at 0.0.0.0 if it is not required. Secondary DNS Address: If your ISP has provided a second DNS address, you should enter it here. Otherwise, leave this setting at its default of 0.0.0.0. This setting is optional. MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value.
PPPoE (Point-to-Point Protocol over Ethernet): Only ISP's providing DSL use PPPoE. If the installation instructions that accompany your modem ask you to install a PPPoE client on your PC then select this option. Note that you will not need to use PPPoE software on your PC once the Router is installed. If you are unsure, you should ask your ISP whether you need to use PPPoE. PPPoE User Name: Enter your User Name in this box. This field is required, and will be provided to you by your ISP.
Host Name: Some ISP's require a host name to identify you when you connect. If you have been provided a Host Name by your ISP, you should enter it here. This field is optional, and so if you have not been provided a host name, you may leave it blank. MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value.
PPTP (Point to Point Tunneling Protocol): Some ISP's require the use of PPTP to establish connections to their networks. At present PPTP is only used by some European ISP's. If the installation instructions that accompany your modem ask you to set up a dialup connection using a PPTP VPN tunnel then select this option. Note that once the Router is installed, you will not need to use the dialup VPN on your PC any more. PPTP Server address: This is the IP address of the PPTP server you are connecting to.
PPTP Password: Enter your password in this box. This field is required, and will be provided to you by your ISP. DNS Addresses: If your ISP has provided you with DNS addresses, you should enter them here. Otherwise, leave these setting at its default of 0.0.0.0. These settings are optional, and most ISP's will also provide you with DNS addresses automatically. When the addresses are obtained from your ISP, they will be displayed on the Status screen.
the amount of time that you want to pass before your Router disconnects from your ISP. Get IP By DHCP: Some ISP may have the mechanism that automatically provides Initial IP Address, Subnet Mask and Default Gateway. If your ISP provides such mechanism, you should check this option. Otherwise, you should manually enter your initial IP Address, Subnet Mask and Default Gateway. Initial IP address and Subnet Mask: You must specify some IP settings to be used when establishing the PPTP connection.
that ISP provides sometimes may not be in the same Subnet. In this case, the Initial Default Gateway is necessarily to be provided to establish the PPTP connection. If the PPTP Server and Initial IP Address are in the same subnet, then you can set the Initial Default Gateway to 0.0.0.0 or 0.
Heart Beat Signal (For Australia only): It is a service used in Australia only. If you are using Heart Beat Signal connection, check with your ISP for the necessary setup information. Host Name: Some ISP's require a host name to identify you when you connect. If you have been provided a Host Name by your ISP, you should enter it here. This field is optional, and so if you have not been provided a host name, you may leave it blank.
MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value.
L2TP (Layer Two Tunneling Protocol): Some ISP's require the use of L2TP to establish connections to their networks. If the installation instructions that accompany your modem ask you to set up a dialup connection using a L2TP VPN tunnel then select this option. Note that once the Router is installed, you will not need to use the dialup VPN on your PC any more. L2TP Server address: This is the IP address of the L2TP server you are connecting to.
DNS Addresses: If your ISP has provided you with DNS addresses, you should enter them here. Otherwise, leave these setting at its default of 0.0.0.0. These settings are optional, and most ISP's will also provide you with DNS addresses automatically. When the addresses are obtained from your ISP, they will be displayed on the Status screen. MTU: The MTU settings should be obtained from your Internet Service Provider. If you do not know this value, just leave it at the default value.
Initial IP address and Subnet Mask: You must specify some IP settings to be used when establishing the L2TP connection. If your ISP has provided you with these settings, then you should use them. Otherwise, if the L2TP server is located in your DSL modem, you can use the Suggest button to generate suitable values for you. The Suggest button will select an IP address on the same subnet as the L2TP server.
Firewall | Virtual Servers Virtual DMZ The default operation of the Router is to block any requests from the Internet. This maximizes the security of your network. However, if you want to host a server on your LAN and make it accessible from the internet, you will need to configure a Virtual Server. A Virtual DMZ is a special case of a Virtual Server which can intercept all unsolicited incoming traffic not already assigned to a Virtual Server, and redirects it to a specified PC on the LAN.
Virtual Servers A Virtual Server is used to enable hosting of Internet Services, for example a web site or email server, by opening one or more incoming ports in the Router and redirecting the unsolicited requests from the Internet to a specified PC on the LAN. Application Name Each drop-down menu offers a choice of ten preset applications (select None if you do not want to use any of the preset applications). Select up to five preset applications.
2. Telnet A terminal emulation protocol commonly used on Internet and TCP/IP-based networks. It allows a user at a terminal or host computer to log on to a remote device and run a program. 3. SMTP (Simple Mail Transfer Protocol) The standard e-mail protocol on the Internet. It is a TCP/IP protocol that defines the message format and the message transfer agent (MTA), which stores and forwards the mail. 4.
6. Finger A UNIX command widely used on the Internet to find out information about a particular user, such as a telephone number, whether the user is currently logged on, and the last time the user was logged on. The person being fingered must have placed his or her profile on the system in order for the information to be available. Fingering requires entering the full user@domain address. 7. HTTP (HyperText Transport Protocol) The communications protocol used to connect to servers on the World Wide Web.
downloaded at the same time. POP3 uses the SMTP messaging protocol. 9. NNTP (Network News Transfer Protocol) The protocol used to connect to Usenet groups on the Internet. Usenet newsreaders support the NNTP protocol. 10. SNMP (Simple Network Management Protocol) A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.
application. Check with the software documentation of the Internet application for more information. Protocol Select the protocol(s) used for this application, TCP and/or UDP. To IP Address For each application, enter the IP address of the PC running the specific application. Enabled Click the Enabled checkbox to enable port forwarding for the relevant application.
Firewall | Special Apps Some software applications require special or multiple connections to the Internet and these would normally be blocked by the Firewall. For example Internet Telephony or Video conferencing require multiple connections. So that these special applications can work properly and are not blocked, the firewall needs to be told about them. In each instance there will be a trigger port and incoming port(s), where traffic on the trigger port tells the Firewall to open the incoming ports.
Triggered Range. In the second field, enter the ending port number of the Triggered Range. Forwarded Range For each application, list the forwarded port number range. Check with the Internet application documentation for the port number(s) needed. In the first field, enter the starting port number of the Forwarded Range. In the second field, enter the ending port number of the Forwarded Range. Enabled Click the Enabled checkbox to enable port range triggering for the relevant application.
Firewall | SPI The Router inspects packets at the application layer, and maintains TCP and UDP session information, including timeouts and the number of active sessions. The Router also provides the ability to detect and prevent certain types of network attacks such as DOS attacks. Network attacks that deny access to a network device are called denial-of-service (DOS) attacks. Denials of Service (DOS) attacks are aimed at devices and networks with a connection to the Internet.
Intrusion Detection Enable this feature to employ Stateful Packet Inspection (SPI) for more detailed review of data packets entering your network environment Web Filters Using the Web Filters feature, you may enable up to four specific filtering methods. 1. Proxy Use of WAN proxy servers may compromise the Router's security. Denying Proxy will disable access to any WAN proxy servers. To enable proxy filtering, click the Proxy box. 2. Java Java is a programming language for websites.
you deny ActiveX, you run the risk of not having access to Internet sites created using this programming language. To enable ActiveX filtering, click the ActiveX box. 4. Cookies A cookie is the data stored on your PC and used by Internet sites when you interact with them. To enable cookie filtering, click the Cookies box.
Firewall | QoS QoS (Quality of Service) manages information as it is transmitted and received. It ensures better service to high priority types of Internet traffic, which may involve demanding, real-time applications, such as videoconferencing. QoS can also prioritize traffic for a specific device or the Routers LAN ports. You may give a comparative metric for your selected application with High, Low, or Normal to prioritize bandwidth of your services.
Minimum Uplink/Downlink Bandwidth: 1 kbit/s If NAT is disabled: Maximum Uplink/Downlink Bandwidth: 30 Mbps Minimum Uplink/Downlink Bandwidth: 1 kbit/s Application Port Priority Application Name: 1. FTP (File Transfer Protocol) A protocol used to transfer files over a TCP/IP network (Internet, UNIX, etc.). For example, after developing the HTML pages for a website on a local machine, they are typically uploaded to the web server using FTP. 2.
3. SMTP (Simple Mail Transfer Protocol) The standard e-mail protocol on the Internet. It is a TCP/IP protocol that defines the message format and the message transfer agent (MTA), which stores and forwards the mail. 4. DNS (Domain Name System) The way that Internet domain names are located and translated into IP addresses. A domain name is a meaningful and easy-to-remember handle for an Internet address. 5.
information to be available. Fingering requires entering the full user@domain address. 7. HTTP (HyperText Transport Protocol) The communications protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit HTML pages to the client web browser. 8. POP3 (Post Office Protocol 3) A standard mail server commonly used on the Internet. It provides a message store that holds incoming e-mail until users log on and download it.
10. SNMP (Simple Network Management Protocol) A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.) 11.
advertisements and has a nice, easy to use interface. Firewall and router support is integrated and it is easy and convenient to use functionality like multi-hub connections, auto-connections and resuming of downloads. 13. RSVP The RSVP protocol is part of a larger effort to enhance the current Internet architecture with support for Quality of Service flows. The RSVP protocol is used by a host to request specific qualities of service from the network for particular application data streams or flows.
including LANs, WANs, and the Internet. It was first defined by the ITU in 1996 and has been updated regularly. The scope of H.323 covers real-time voice, video, and data communication over packet-switched networks. It was designed from the outset to operate over IP networks, primarily, though H.323 may also operate over other packet-switched networks.
used to encapsulate IP packets for transport between two peers. To establish a PPP tunnel, both sides send LCP frames to negotiate parameters and test the data link. If authentication is used, at least one of the peers has to authenticate itself before the network layer protocol parameters can be negotiated using NCP. During the LCP and NCP negotiation optional parameters such as encryption, can be negotiated. When LCP and NCP negotiation is done, IP datagram can be sent over the link. 17.
IPSec is framework that is built into various security products to provide end-to-end security in wide area networking communications. Using strong encryption, and public key cryptography, IPSec can secure data links that would otherwise be insecure and susceptible to exploitation. Priority Select one of these priority levels: Highest, High, Above Normal, or Normal. Port For preset applications, the port number is automatically displayed.
Select one of these priority levels: Highest, High, Above Normal, or Normal MAC Enter the MAC address of the device. Enabled Click the Enabled checkbox to enable QoS for the appropriate MAC address.
Firewall | Internet Access Policy The Internet Access Policy screen allows you to block or allow specific kinds of Internet usage and traffic, such as Internet access, designated applications, websites, and inbound traffic during specific days and times. Internet Access Policy Access can be managed by a policy. Use the settings on this screen to establish an access policy (after the Save Settings button is clicked). Selecting a policy from the drop-down menu will display those policies settings.
Click the Save Settings button to save your changes. To view the list of PCs for a specific policy, click the Edit List button. On the List of PCs screen, you can select a PC by MAC Address or IP Address. You can also enter a range of IP Addresses if you want this policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your changes. To create an Internet Access policy 1. Select a number from the Access Policy drop-down menu. 2.
you want this policy to affect a group of PCs. After making your changes, click the Save Settings button to apply your changes. 5. Click the appropriate option, Deny or Allow, depending on whether you want to block or allow Internet access for the PCs you listed on the List of PCs screen. 6. Decide which days and what times you want this policy to be enforced. Select the individual days during which the policy will be in effect, or select Everyday.
applications settings, then select Custom from the drop-down menu. Enter the port range you want to block. Then select its protocol(s), TCP and/or UDP. 8. Internet Access can also be filtered by URL Address, the address entered to access Internet sites, by entering the address in one of the Website Blocking by URL Address fields. If you do not know the URL Address, filtering can be done by Keyword by entering a keyword in one of the Website Blocking by Keyword fields. 9.
Firewall | URL Filter This feature allows you to block or allow access to specified Websites. The feature is used in conjunction with PC Privileges. PC Privileges allow the administrator to control Internet access. There are two types of URL Filter available: Deny List and Allow List. In both cases the Router will only check the URL and not the content of the site.
their system administrator. The Filter Table allows the entry of either URLs or keywords. For example, a URL would typically look take the form: www.examplesite.com, www.another-site.org, www.eg_website.net. Whereas a Keyword would typically be a word or letters that should be blocked, for example: adult, xxx, excite.
System Tools | Restart Pressing the Restart the Router button will cause the Router to restart, simulating the effect of power cycling the unit. No configuration information will be lost. This function may be of use if you are experiencing problems and you wish to re-establish your Internet connection.
System Tools | Time Zone Choose the Time Zone that is closest to your actual location. The time zone setting is used by the system clock when displaying the correct time in the log files. The system time is automatically updated from Time Servers on the Internet. The Daylight saving feature allows you to manually add 1 hour to the Internet time. This is not automatically updated when the Daylight saving time ends.
System Tools | Configuration Backup Configuration Use the Backup button to save the Router's current configuration settings in a file on your computer. When you select this function, your browser will prompt you to enter a file name and folder location in which to save the data. Note that a file saved in this way cannot be viewed or modified with a word processor or spreadsheet program.
configuration information from the Router and return it to the state it was in when it was shipped from BROWAN. The unit will then restart. This function might be useful if, for instance, a Router is moved from one network to another and you wish to start the configuration process from a known clean state. This function should be used with caution, as once a unit has been reset to its factory default state, then the current configuration settings are irrevocably lost.
System Tools | Upgrade The Upgrade facility allows you to install on the Router any new releases of system software that BROWAN may make available. To install new software, you first need to download the software from the BROWAN support web site. Once you have done this, use the Browse button to tell your web browser where this file is on your computer, and then click on Apply. The file will be copied to the Router, and when this has completed, the Router will restart.
Advanced | Static Route The device supports static route functionality. Index The index of the entry for the static route. Network Address The network address of the static route. Subnet Mask The subnet mask of the static route. Gateway Gateways are most commonly used to transfer data between private networks and the internet. Click New button below the table to add the static route entries.
Advanced | RIP RIP (Routing Information Protocol) is a widely-used protocol for managing router information within a self-contained network such as a corporate local area network (LAN) or an interconnected group of such LANs. Check the check box to enable RIP Mode, or uncheck the check box for disable RIP Mode.
Advanced | DDNS Dynamic Domain Name System (DDNS) is a system which allows the domain name data held in a name server to be updated in real time. The most common use for this is in allowing an Internet domain name to be assigned to a computer with a varying (dynamic) IP address. This makes it possible for other sites on the Internet to establish connections to the machine without needing to track the IP address themselves.
You could select DynDNS.org to Enable the DDNS. Please enter the Host Name, Username and Password you acquired form your DDNS provider (http://www.dyndns.com/)..
You could select TZO.com to Enable the DDNS. Please enter the Host Name, Username and Password you acquired form your DDNS provider (http://www.tzo.com/ ).
Advanced | Security The security setup could help you to protect your network. The Router contains both an Advanced Firewall and a Basic Firewall. The Basic Firewall detects the common attack patterns used by people on the Internet and once detected will block their access to your network. The Advanced Firewall uses Stateful Packet Inspection (SPI), which is a more secure method of protection against attacks to your network.
check box so that a tick can be seen. Clicking the Apply button. Allow PING from the Internet Ping is a computer network tool used to test whether a particular host is reachable across an IP network. Ping works by sending ICMP echo request packets to the target host and listening for ICMP echo response replies. Using interval timing and response rate, ping estimates the round-trip time and rate of packet loss (if any) between hosts.
Disable NAT is enabled by: Checking on the Disable NAT check box so that a tick can be seen. Clicking he Apply button. IPSec Pass-through Internet Protocol Security (IPSec) is a suite of protocols used to implement secure exchange of packets at the IP layer. IPSec Pass-Through is enabled by default. L2TP Pass-through Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the Internet on the Layer 2 level. L2TP Pass-Through is enabled by default.
If you do not access the GUI for the specified time span (Default is 10 minutes), the system will ask you to login again. Enabling Remote Administration It is possible to administer the Router from the Internet. You can enable remote administration for a single PC, all PCs in a subnet, or for any PC. The more PCs you enable access for, the less secure your Router will be. To do this : 1. Select the remote administration mode you require. 2. In the case of a single PC, specify its IP address.
Advanced | Proxy ARP Proxy ARP is the technique in which one machine, usually a router, answers ARP requests intended for another machine. By "faking" its identity, the router accepts responsibility for routing packets to the "real" destination. Proxy ARP allows a site to use a single IP address with two physical networks. Following is the setting procedures on Proxy ARP function 1. Set the GW wan IP in static ip mode, such as IP: 10.0.0.2, submask:255.255.0.0, route:10.0.0.1 2.
Advanced | 1 to 1 NAT The following criteria must be met to be able to use One-to-One NAT: You must have a static Internet IP address for every computer on your network plus one for the Router itself. The addresses must be in one continuous block in the same subnet You must have selected Static IP Address as your IP Allocation Mode and have given your VPN Firewall the first of the Internet addresses allocated by your ISP. To set up One-to-One NAT: Enable the entry of One-to-One NAT.
Advanced | SNMP Simple Network Management Protocol (SNMP) allows a management application to retrieve statistics and status from the SNMP agent in this device.
Status and Logs | Status This page summarizes most of the unit's configuration in one place. You may be asked to print this page out if you call BROWAN Support. You can refresh the information by clicking on the Refresh button.
BROWAN COMMUNICATIONS Page 165
Status and Logs | Logs This page allows the user to view or download the System Log files. These files record the date and time of a variety of events that took place when using the Router. Most of them are normal events for example issuing DHCP addresses to requesting PCs. However, this is also where the Router would record security threats like: Hacker Attacks detected. Attempts to login to the admin interface from the LAN side. Attempts to login to the admin interface from the Internet.
Numbers for the incoming Internet traffic The Outgoing Log will display a temporary log of the LAN IP Addresses, Destination URLs or IP Addresses, and Service or Port Numbers for the outgoing Internet traffic. The Security Log will display the login information for the WEB Utility. The DHCP Client Log will display the LAN DHCP server status information. The files can be downloaded and saved as a text file on your PC. To do this: 1. Click on the Save Log button. 2.
Status and Logs | Routing Table The routing table details the default routing used by the router and any routing created using Static routing or RIP.
Status and Logs | Syslog Syslog allows the user to to log system information to a remote server. You may need to modify your remote syslog server settings to accept remote logs.
Support | Support To access help for the Administration System, Click Help button o. The help pop-up window will appear after you click Help button. How to use the help system: Works exactly like a browser's back button. Works exactly like a browser's forward button Opens the Help Table of Contents. Table of Contents: This link will help you to find the keyword in help system quickly. Support from BROWAN: You could visit our support web page with is link.
Appendix Wireless specification Data rate supported IEEE 802.11 b : 1, 2, 5.5, 11 Mbps 802.11 g : 6, 9, 12, 18, 24 , 36 , 48, 54, and 108 Mbps Frequency Band 802.11b/g 2.400 ~ 2.483GHz FCC: 11 , EU : 13 Channel Modulation 802.11b:DBPSK(1Mbps), DQPSK(2Mbps), CCK(5.5Mbps, 11Mbps) 802.11g:OFDM with BPSK, QPSK, 16QAM, 64QAM Transmit Power 18dBm(+/-2dBm)@ 11Mbps (not including Antenna gain) 16dBm(+/-2dBm)@ 54Mbps (not including Antenna gain) Receive Sensitivity -83dBm@11Mbps (IEEE 802.
Product specification Interface WAN :1 port 100BASE-T, auto-sensing LAN :4 ports 100BASE-T, auto-sensing Physical characteristics Dimension: 173mm(L) x 128mm(W) x 33mm(H) Weight: 256 g Environment Operation temperature:0 ~ 55°C (Operating) Storage temperature: -20~85°C (Storing) Humidity:5~95% (Non-condensing) Power supply PoE:IEEE 802.
Regulation Certification FCC, CE Compliance RoHS, WEEE Warranty Two years.