User's Manual
Table Of Contents
- Terminology
- Introduction
- Installation
- Software configuration
- Prepare your PC to configure the WLAN Broadband Router
- Connect to the WLAN Broadband Router
- Management and configuration on the WLAN Broadband Router
- Status
- Setup Wizard
- Operation Mode
- Wireless - Basic Settings
- Wireless - Advanced Settings
- Wireless - Security Setup
- Wireless - Access Control
- WDS Security Setup
- WDS AP Table
- WDS Settings
- Site Survey
- WPS Settings
- LAN Interface Setup
- WAN Interface Setup
- Firewall - Port Filtering
- Firewall - IP Filtering
- Firewall - MAC Filtering
- Firewall - Port Forwarding
- Firewall - URL Filtering
- Firewall - DMZ
- Management - Statistics
- Management - DDNS
- Management - Time Zone Setting
- Management - Denial-of-Service
- Management - Log
- Management - Upgrade Firmware
- Management - Save/ Reload Settings
- Management - Password Setup
- FREQUENTLY ASKED QUESTIONS (FAQ)
- What and how to find my PC’s IP and MAC address?
- What is Wireless LAN?
- What are ISM bands?
- How does wireless networking work?
- What is BSSID?
- What is ESSID?
- What are potential factors that may causes interference?
- What are the Open System and Shared Key authentications?
- What is WEP?
- What is Fragment Threshold?
- What is RTS (Request To Send) Threshold?
- What is Beacon Interval?
- What is Preamble Type?
- What is SSID Broadcast?
- What is Wi-Fi Protected Access (WPA)?
- What is WPA2?
- What is 802.1x Authentication?
- What is Temporal Key Integrity Protocol (TKIP)?
- What is Advanced Encryption Standard (AES)?
- What is Inter-Access Point Protocol (IAPP)?
- What is Wireless Distribution System (WDS)?
- What is Universal Plug and Play (uPNP)?
- What is Maximum Transmission Unit (MTU) Size?
- What is Clone MAC Address?
- What is DDNS?
- What is NTP Client?
- What is VPN?
- What is IPSEC?
- What is WLAN Block Relay Between Clients?
- What is WMM?
- What is WLAN ACK TIMEOUT?
- What is Modulation Coding Scheme (MCS)?
- What is Frame Aggregation?
- What is Guard Intervals (GI)?
- Configuration examples
54
What is RTS (Request To Send) Threshold?
The RTS thre
shold is the packet size at whi
ch packet transmission is governed by the RTS/CTS transaction. The
IEEE 802.11-1997 standard allows for short packets to be transmitted without RTS/CTS transactions. Each station
can have a different RTS threshold. RTS/CTS is used when the data packet size exceeds the defined RTS threshold.
With the CSMA/CA transmission mechanism, the transmitting station sends out an RTS packet to the receiving station,
and waits for the receiving station to send back a CTS (Clear to Send) packet before sending the actual packet data.
This setting is useful for networks with many clients. With many clients, and a high network load, there will be many
more collisions. By lowering the RTS threshold, there may be fewer collisions, and performance should improve.
Basically, with a faster RTS threshold, the system can recover from problems faster. RTS packets consume valuable
bandwidth, however, so setting this value too low will limit performance.
What is Beacon Interval?
In addition to data frame
s that carry information from highe
r layers, 802.11 includes management and control frames
that support data transfer. The beacon frame, which is a type of management frame, provides the "heartbeat" of a
wireless LAN, enabling stations to establish and maintain communications in an orderly fashion.
Beacon Interval represents the amount of time between beacon transmissions. Before a station enters power save
mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there
are buffered frames at the access point).
What is Preamble Type?
There are two preamble types defined i
n IEEE 802.11 specification. A long preamble basically gives the decoder more
time to process the p
reamble. All 802.11 devices support a long preamble. The short preamble is designed to improve
efficiency (for example, for VoIP systems). The difference between the two is in the Synchronization field. The long
preamble is 128 bits, and the short is 56 bits.
What is SSID Broadcast?
Broad
cast of SSID is done in access po
ints by the beacon. This announces your access point (including various bits
of information about it) to the wireless world around it. By disabling that feature, the SSID configured in the client must
match the SSID of the access point.
Some wireless devices don't work properly if SSID isn't broadcast (for example the D-link DWL-120 USB 802.11b
adapter). Generally if your client hardware supports operation with SSID disabled, it's not a bad idea to run that way to
enhance network security. However it's no replacement for WEP, MAC filtering or other protections.
What is Wi-Fi Protected Access (WPA)?
Wi-Fi’
s original secu
rity mechanism, Wired Equivalent Privacy (WEP), has been viewed as insufficient for securing
confidential business communications. A longer-term solution, the IEEE 802.11i standard, is under development.
However, since the IEEE 802.11i standard is not expected to be published until the end of 2003, several members of
the WI-Fi Alliance teamed up with members of the IEEE 802.11i task group to develop a significant near-term
enhancement to Wi-Fi security. Together, this team developed Wi-Fi Protected Access.
To upgrade a WLAN network to support WPA, Access Points will require a WPA software upgrade. Clients will require
a software upgrade for the network interface card, and possibly a software update for the operating system. For
enterprise networks, an authentication server, typically one that supports RADIUS and the selected EAP
authentication protocol, will be added to the network.
What is WPA2?
It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendm
ent to the 802.11 standard.
What is 802.1x
Authentication?
802.1x is a framework for
authenticated MAC-level access control, defines Extensible Authentication Protocol (EAP)
over LANs (WAPOL). The standard encapsul
ates and leverages much of EAP, which was defined for dial-up
authentication with Point-to-Point Protocol in RFC 2284.