Wireless Media Router WL-350 Full Manual
WL-350 Wireless Media Router Full Manual INTRODUCTION............................................................................................ 4 FEATURES & BENEFITS .......................................................................................5 PACKAGE CONTENTS ..........................................................................................6 SAFETY GUIDELINES ..........................................................................................6 PRODUCT LAYOUT ...................
WL-350 Wireless Media Router Full Manual Time Configuration .................................................................................. 64 System Settings ...................................................................................... 65 Firmware................................................................................................ 69 Syslog.................................................................................................... 69 Administrator Settings .................
Introduction The WL-350 is a draft 802.11n compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with 802.11g and 802.11b devices. It is not only a Wireless Access Point, which lets you connect to the network without wires. There's also a built-in 4-port full-duplex 10/100/1000 Gigabit Switch to connect your wired-Ethernet devices together. The Router function ties it all together and lets your whole network share a high-speed cable or DSL Internet connection.
Features & Benefits Features High Speed Data Rate Up to Benefits Capable of handling heavy data 300Mbps payloads such as MPEG video streaming Concurrent Dualband (2.4GHz and 5GHz) Connect your client devices via the 2.4GHz band, while streaming media on the clean 5GHz band. IEEE 802.11n draft Compliant and backward compatible with 802.11b/g Fully interoperable with IEEE 802.
Package Contents Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials; in case of return, the device must be shipped in its original package. - One WL-350 Wireless Media Router One 12V/1.25A Power Adapter UTP Cable One CD-ROM with User’s Manual One Quick Installation Guide Warranty Card Safety Guidelines In order to reduce the risk of fire, electric shock and injury, please adhere to the following safety guidelines.
Product Layout Item 1 2 Label LAN Ports (yellow) WAN Port (blue) 3 DC Connector 4 USB port 5 WPS (on the top of the router) Description Use an Ethernet cable to connect each port to a computer on your Local Area Network (LAN). Use an Ethernet cable to connect this port to your WAN router/modem. Use the power cable and connect the adapter to the power socket on the wall, and the DC inlet into the DC connector. The USB port can be used to connect a USB memory stick or hard disk.
Back label Item 1 Label LAN LED 2 WAN LED 3 WLAN LED 4 Power LED Description This LED will light up once an Ethernet cable is connected to one of the LAN ports. This LED will light up once an Ethernet cable is connected to WAN (Internet) port. This LED will light up once the RF (wireless LAN) feature is enabled This LED will light up once the power cable is connected to the DC connector.
1 Understanding the Hardware Hardware Installation You can place the WL-350 on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven. This location must be close to a power connection and your ADSL/Cable modem.
IP Address Configuration This device can be configured as a Bridge/Router or Access Point. The default IP address of the device is 192.168.0.1. In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook. 1. In the control panel, double click Network Connections and then double click on the connection of your Network Interface Card (NIC). You will then see the following screen. 2. Select Internet Protocol (TCP/IP) and then click on the Properties button.
2 Internet Connection Wizard This device offers a quick and simple configuration through the use of a wizard. This chapter describes how to use the wizard to configure the internet settings. Please refer to Chapter 6 in order to configure the more advanced features of the device. Logging In To configure the device, open a web browser. Type http://192.168.0.1 in the address bar and press [Enter]. After connecting to the IP address, the web-browser will display the login page.
Select your country from the Country list. Select your internet provider. Click Next. Depending on the chosen provider, you may need to enter your user name and password, MAC address or hostname in the following window. After you have entered the correct information, click Next. Click APPLY to complete the configuration.
3 Wi-Fi Protected Setup Wizard Wi-Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. Please refer to Chapter 5 in order to configure the more advanced features of the device Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page.
Add a Wireless Device Click on Basic -> Wireless and click on the Add Wireless Device Wizard button. The wireless wizard will inform you that there are two major steps in the process. o Select the configuration method for your wireless network o Connect your wireless device Click on the Next button to continue.
60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. Access to the wireless network is controlled by a registrar. A registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button on the device. The router acts as a registrar for the network, although other devices may act as a registrar as well.
If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the one the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. Select the Push Button radio button and then click on the Next button. Press the WPS button on the device (which is located on the left side of the front panel) and then click on the Next button.
4 Advanced Web Configuration Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page. Fill in the username and password. The default credentials are shown below: Username: Password: admin admin After logging in you will see the graphical user interface (GUI) of the device. The navigation menu on the top is divided into six main sections: 1. 2. 3. 4. 5. 6. Home: This shows the basic status of the router.
4.1 Home Device All of your Internet and network connection details are displayed on this page. The firmware version is also displayed here. Wireless Click on the Wireless link in the navigation menu. The wireless section allows you to view the wireless clients that are connected to the device. - MAC Address: The Ethernet ID (MAC address) of the wireless client. IP Address: The LAN-side IP address of the client.
- - Mode: The transmission standard being used by the client. Values are 11a, 11b, 11g, or 11n for 802.11a, 802.11b, 802.11g, or 802.11n respectively. Rate: The actual transmission rate of the client in megabits per second. Signal: This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality.
- Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. o 300 seconds - UDP connections. o 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. o 7800 seconds - Established or closing TCP connections. Logs Click on the Logs link in the navigation menu.
Stats Click on the Statistics link in the navigation menu. This page displays the transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. Click on the Refresh button to refresh the statistics.
DHCP Click on the DHCP link in the navigation menu. This page displays the routing details configured for your router. Local: The IP address and, where appropriate, port number of the local application. NAT: The port number of the LAN-side application as viewed by the WAN-side application. Internet: The IP address and, where appropriate, port number of the application on the Internet. Protocol: The communications protocol used for the conversation.
Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. o 300 seconds - UDP connections. o 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. o 7800 seconds - Established or closing TCP connections. Firewall Click on the Firewall link in the navigation menu.
4.2 BASIC Network This device can be configured as a Router or a Bridge. Select Router mode if the WAN port is connected to the Internet. Select Bridge if the device is connected to a local network downstream from another router. Bridge Mode In this mode, the device functions as a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly. Select the Bridge Mode radio button. WAN Port Mode: Select the Bridge Mode radio button.
Router Mode In this mode, the device functions as a NAT router and is connected to the Internet. Select the Router Mode radio button. WAN Port Mode: Select the Router Mode radio button. Router IP Address: Specify the IP address of this device. Subnet Mask: Specify the subnet mask for the IP address. Local Domain Name: This entry is optional. Enter a domain name for the local network. LAN computers will assume this domain name when they get an address from the router's built in DHCP server.
Wireless These options allow you to enable/disable the wireless interface, switch between the 11n, 11b/g and 11b radio band and channel frequency. The “Wireless Settings 1” tab contains the settings for the 2.4GHz interface, and the “Wireless Settings 2” tab contains the settings for the 5GHz interface. Enable Wireless: Place a check in this box to enable the wireless interface. It is enabled by default.
appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode. Wireless Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices.
WEP Key Length: Select a 64-bit or 128-bit WEP key length from the dropdown list. WEP Key 1-4: You may enter four different WEP keys. Default WEP Key: You may use up to four different keys for four different networks. Select the current key that will be used. Authentication: Select Open, or Shared Key. Authentication method from the drop-down list. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set.
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list. Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. o o o TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption.
Cipher Type: Select TKIP or AES as the cipher suite. The encryption algorithm used to secure the data communication. o o o TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption. Note that, if the bridge uses the AES option, the bridge can associate with the access point only if the access point is also set to use only AES.
WAN The device offers several types of WAN connections in order to connect to the Internet. - Static IP Address Dynamic IP Address PPPoE PPTP Select the type of Internet Connection from the drop-down list. Static IP Address Configuration The WAN interface can be configured as Static IP address. In this type of connection, your ISP provides you with a dedicated IP address (which does not change as DHCP). Select Static IP from the My Internet Connection drop-down list.
Subnet Mask: Specify the subnet mask for this IP address, which is assigned by your ISP. Default Gateway: Specify the IP address of the default gateway, which is assigned by your ISP. Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP. MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN.
Dynamic IP Address (DHCP) Configuration The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. This is also known as Dynamic IP. Select the Dynamic IP (DHCP) from the My Internet Connection drop-down list. Host Name: Specify a host name to define your system or connection. Use Unicasting: This option is normally turned off, and should remain off as long as the WAN-side DHCP server correctly provides an IP address to the router.
devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the router's MTU is set too high, packets will be fragmented downstream. If the router's MTU is set too low, the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections.
PPPoE (Point-to-Point Protocol over Ethernet) The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect. Select the PPPoE from the My Internet Connection drop-down list. Address Mode: PPPoE can be used with a dynamic or static IP address. If you select the Dynamic IP radio button, then the IP address in the next field is not required.
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the router's MTU is set too high, packets will be fragmented downstream.
PPTP (Point-to-Point Tunneling Protocol) The WAN interface can be configured as PPTP. PPTP (Point to Point Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection is primarily used in Europe. This method of connection requires you to enter a username and password (provided by your ISP) to gain access to the Internet. The supported authentication protocols are PAP and CHAP. Select the PPTP from the My Internet Connection drop-down list.
Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Specify the time after which the router will automatically disconnect the current session when no data-traffic has been detected for the set period of time. Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP.
Advanced Wireless This page allows you to configure the fragmentation threshold, RTS threshold, beacon period, transmit power, DTIM interval, wireless isolation, WMM and WDS (wireless distribution system). Transmit Power: You may control the output power of the device by selecting a value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network. Beacon Period: Beacons are packets sent by a wireless Access Point to synchronize wireless devices.
Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 65535. The default value is 2346. DTIM Interval: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.
WAN Port Speed: You may select a WAN port speed from the drop-down list. It is recommended that you select Auto. Enable Multicast Streams: Place a check in this box to enable multicast streams. The router uses the IGMP protocol to support efficient multicasting - transmission of identical content, such as multimedia, from a source to a number of recipients. This option must be enabled if any applications on the LAN participate in a multicast group.
4.3 Firewall Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and LAN port. Enable: Place a check in this box to enable the virtual server rule. Name: Assign a meaningful name to the virtual server, for example Web Server.
Special Application An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a trigger port or port range. An application rule applies to all computers on your internal network. Enable: Place a check in this box to enable the special application rule. Name: Assign a meaningful name to the virtual server, for example Web Server. Several well-known types of virtual server are available from the Application Name drop-down list.
Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. Enable: Place a check in this box to enable the port forwarding rule.
Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. When Access Control is disabled, every device on the LAN has unrestricted access to the Internet.
Specify a policy name and then click on the Next button to continue. Select a schedule from the drop-down list: Always or Never, or you may define a new schedule. Click on the Next button to continue. Select a machine to which the policy applies. Address Type: Select the IP address or MAC address radio button. IP Address: If you selected IP address above, then specify the IP address here.
Website Filter This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. Website/URL/Domain: Specify the web address that you would like to filter. Do not use “http://” Click on the Save button to store the changes.
Schedules Click on the Schedules link in the navigation menu. Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to MonFri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Name: Specify a name for the schedule. Day(s): Select the days at which you would like the schedule to be effective.
4.4 Advanced Settings Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
StreamEngine The StreamEngine feature helps improve the network performance by prioritizing applications. Enable Traffic Shaping: Place a check in the box to enable traffic shaping. When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed. Place a check in this box to enable automatic uplink speed.
Connection Type: By default, the router automatically determines whether the underlying connection is an xDSL/Frame-relay network or some other connection type (such as cable modem or Ethernet), and it displays the result as Detected xDSL or Frame Relay Network.
MAC Address Filter This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. Configure MAC Filtering: Select one of the options from the drop-down list. o Turn MAC Filtering OFF: When "OFF" is selected, MAC addresses are not used to control network access.
Firewall Settings The device provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection. Note: Some of these options can interact with other port restrictions. Endpoint Independent Filtering takes priority over inbound filters or schedules, so it is possible for an incoming session request related to an outgoing session to enter through a port in spite of an active inbound filter on that port.
or ICMP initiates a session to the Internet, the router's NAT can track such a session, even though it does not recognize the protocol. This feature is useful because it enables certain applications (most importantly a single VPN connection to a remote host) without the need for an ALG. Note: This feature does not apply to the DMZ host (if one is enabled). The DMZ host always handles these kinds of sessions. Enabling this option (the default setting) enables single VPN connections to a remote host.
o o o o o o o of your corporate network whether your VPN client supports NAT traversal. RTSP: Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger: Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger.
WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable WISH: Place a check in this box to enable the WISH feature. HTTP: Place a check in this box to add HTTP as a classifier. This allows the device to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic.
Enable: Place a check in this box to enable the WISH rule. A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. Name: Assign a meaningful name to the WISH rule.
Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Bandwidth Using this page, it’s possible to perform a variety of network tests between the router and other LAN devices. Choose the Test Type, select a computer (or enter it’s MAC address), and click the Start-button to start bandwidth testing.
Disk This page shows information regarding the attached storage devices. File system type, total space on the device, and available space is shown in the table. Click the “Safely remove” button, to safely remove the USB disk. Note: Only FAT12, FAT16, and FAT32 drives are supported. For information regarding partitioning and formatting of a drive, see the manual of your operating system.
Share On this page, the sharing mode can be changed. Choose to share all folders with all users, or to restrict the sharing of folders. When Sharing-mode is set to “restrict”, shares can be added and changed.
Users You can add new users and configure user rights for the storage device. Password: Enter a password for the selected user. Share Name: Select a shared folder. The Shared folders can be configured on the “Share” tab. Access: Select “Read Only” to allow the user to read files in the selected share. Select “Read/Write” to also allow users to write to the selected share.
4.5 Toolbox Time Configuration Click on the Time link in the navigation menu. This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server. Note: If the device loses power for any reason, it will not be able to keep its clock running, and will not display the correct time once the device has been restarted.
you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate. NTP Server Used: Specify the NTP server or select one from the drop-down list. Set the Date and Time: Select a date and time from the drop-down list or do to use computer’s time and date click on the Copy Your Computer’s Time Settings button. Click on the Apply button once you have modified the settings. System Settings Click on the System link in the navigation menu.
Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the device. Click on the Browse button to select the file and then click on Restore Configuration from a File button. The system then prompts you to reboot the device. Click on the OK button to continue. You will then see the Rebooting page. Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
Restore To Factory Default Click on the Restore all Settings to Factory Defaults button. This option restores all configuration settings back to the settings that were in effect at the time when the device was shipped from the factory. Once the dialog box appears, click on the OK button to confirm the action. Note: The current settings will be lost. Click on the OK button to continue. You will then see the Rebooting page. Please wait while the system is rebooting.
Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
Firmware Click on the Firmware link in the navigation menu. This page allows you to upgrade the firmware of the device in order to improve the functionality and performance. This page also displays the current firmware version and its release date. Ensure that you have downloaded the appropriate firmware from the vendor’s website. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded using the wireless interface.
Enable Logging to a Syslog Server: Place a check in this box to enable Syslog logging. Syslog Server IP Address: Specify the IP address of the Syslog server. Click on the Apply button once you have modified the settings. Administrator Settings Admin Password You can change the password required to log into the broadband router's system web-based management. By default, the password is: “admin”. Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive.
System Name Gateway Name: Name of your router. Remote Management The remote management function allows you to configure the Broadband router from a remote site. Inactivity Time Out: Time after which you will be automatically logged out of the web-interface. HTTPS Server: Enable HTTPS connection for the web-interface. Enable Remote Management: Select “Enabled” to enable the remote management function. Remote Admin Port: The port number of the remote management web interface.
Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.