2.4GHz Wireless 802.11n(DRAFT) Router WRT-383U V1.1 Rev 0.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
Table of Contents Getting Started with the WRT-383U V1.
Getting Started with the WRT-383U v1.1 Congratulations on purchasing the WRT-383U V1.1! This manual provides information for setting up and configuring the WRT-383U V1.1. This manual is intended for both home users and professionals. Package Contents WRT-383U V1.1 11n(Draft) Wireless Router CAT-5 Ethernet Cable (All the WRT-383U V1.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the Glossary for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WRT-383U V1.1 provides various transmission (data) rate options for you to select.
channel for each station.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS). In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WLAN client devices automatically switches to the channel used in BSS (2).
Introduction The WRT-383U V1.1 11n (Draft) Wireless Router is an high-performance, wireless router that supports high-speed wireless networking at home, at work or in public places. Unlike most routers, the WRT-383U V1.1 provides data transfers at up to 300Mbps when using 11n (Draft) connection. This router is also back compatible with 802.11g or 11b devices. This means that you do not need to change your entire network to maintain connectivity.
Support Static routing – RIPv1 announcer Support Static or WAN assigned DNS servers and 10 verified services for DDNS DHCP Server Support up to 252 leases, and up to 24 reservations MAC address filtering support up to 24 filtering entries Support WEB UI management, firmware upgrade and configuration backup and restore via WLAN/LAN/WAN Support 4 x 10/100Mbps Auto-MDIX LAN Port and 1 x 10/100Mbps WAN Port (Internet) Built-in 2 External Antennas to support high speed performance and
Hardware Overview LED Indications: PWR LAN1 LAN2 LAN3 LAN4 WAN WLAN WPS USB Rear panel: DC-IN RESET Power switch WLAN (ON/OFF) WAN LAN1 LAN2 11
LAN3 LAN4 Side Button: WPS push button Signal strength button USB port Installation Considerations The WRT-383U V1.1 11n (Draft) Wireless Router lets you access your network, using a wireless connection, from virtually anywhere within its operating range. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
that generate extreme RF noise. Getting Started For a typical wireless setup at home, please do the following: 1. You will need broadband Internet access (a Cable or DSL-subscriber line into your home or office) 2. Consult with your Cable or DSL provider for proper installation of the modem. 3. Connect the Cable or DSL modem to the WRT-383U V1.1 Wireless Broadband Router (WAN port). 4. Ethernet LAN ports of the WRT-383U V1.
If you have changed the default IP Address assigned to the WRT-383U V1.1, make sure to enter the correct IP Address. Select admin in the User Name field. Leave the Password blank. Click Login In.
Basic The Basic tab provides the following configuration options: Internet Connection, Wireless Settings, Network Settings Basic_ Internet Connection Internet Connection Setup Wizard If you are new to networking and have never configured a router before, click on Setup Wizard and the router will guide you through a few simple steps to get your network up and running.
Basic_ Wireless Settings The wireless section is used to configure the wireless settings for your router. Note that changes made in this section may also need to be duplicated on wireless clients that you want to connect to your wireless network. To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard.
Wireless Channel A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network. 802.11 Mode If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only" mode.
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the router should employ. WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard.
Basic_Network Settings 19
WAN Port Mode This option controls how the device reacts to traffic on the WAN connector. In this case the term "port" refers to the Ethernet connectors on the device. Router Mode Select this option if the WAN port is connected to the Internet. The device functions as a NAT router. Bridge Mode Select this option if the device is connected to a local network downstream from another router.
If WAN Port Mode is set to "Bridge Mode", the following choices are displayed in place of the above choices, because the device is functioning as a bridge in a network that contains another router. Router IP Address The IP address of the this device on the local area network. Assign any unused IP address in the range of IP addresses available for the LAN. For example, 192.168.0.101. Subnet Mask The subnet mask of the local area network. Gateway The IP address of the router on the local area network.
The amount of time that a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would. The initial lease designates the amount of time before the lease expires. If the tenant wishes to retain the address when the lease is expired then a new lease is established. If the lease expires and the address is no longer needed than another tenant may use the address.
You can assign a name for each computer that is given a reserved IP address. This may help you keep track of which computers are assigned this way. Example: Game Server. IP Address: The LAN address that you want to reserve. MAC Address To input the MAC address of your system, enter it in manually or connect to the router's Web-Management interface from the system and click the Copy Your PC's MAC Address button. A MAC address is usually located on a sticker on the bottom of a network device.
Advanced The Advanced tab provides the following configuration options: Virtual Server, Port Forwarding, Application Rules, StreamEngine, Routing, Access Control, Website Filter, Network Filter, Firewall Settings, Inbound Filter, Advanced Wireless, WISH, Wi-Fi Protected Setup, Advanced Network, Advanced_Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers.
Example: You are hosting a Web Server on a PC that has LAN IP Address of 192.168.0.50 and your ISP is blocking Port 80. 1. Name the Virtual Server (for example: Web Server) 2. Enter the IP Address of the machine on your LAN (for example: 192.168.0.50 3. Enter the Private Port as [80] 4. Enter the Public Port as [8888] 5. Select the Protocol (for example TCP). 6. Ensure the schedule is set to Always 7. Click 8. Repeat these steps for each Virtual Server Rule you wish to add.
The IP address of the system on your internal network that will provide the virtual service, for example 192.168.0.50. You can select a computer from the list of DHCP clients in the "Computer Name" drop-down menu, or you can manually enter the IP address of the server computer. Protocol Select the protocol used by the service. The common choices -- UDP, TCP, and both UDP and TCP -- can be selected from the drop-down menu.
Advanced_Special Applications An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. An application rule applies to all computers on your internal network. Add/Edit Application Rule Example: You need to configure your router to allow a software application running on any computer on your network to connect to a web-based server or another user on the Internet.
Firewall Traffic Type Select the protocol used by the Internet traffic coming back into the router through the opened port range (for example Both). Schedule Select a schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools → Schedules screen and create a new schedule. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made.
redirect data through those ports to a single PC on your network. You can enter ports in various formats: Range (50-100) Individual (80, 68, 888) Mixed (1020-5000, 689) Example: Suppose you are hosting an online game server that is running on a PC with a private IP Address of 192.168.0.50. This game requires that you open multiple ports (6159-6180, 99) on the router so Internet users can connect.
Enter the TCP ports to open (for example 6159-6180, 99). UDP Ports Enter the UDP ports to open (for example 6159-6180, 99). Schedule Select a schedule for the times when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools → Schedules screen and create a new schedule. Inbound Filter Select a filter that controls access as needed for this rule.
WAN Traffic Shaping Enable Traffic Shaping When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed When enabled, this option causes the router to automatically measure the useful uplink bandwidth each time the WAN interface is re-established (after a reboot, for example). Measured Uplink Speed This is the uplink speed measured when the WAN interface was last re-established.
often specify speed as a downlink/uplink pair; for example, 1.5Mbps/284kbps. For this example, you would enter "284". Alternatively you can test your uplink speed with a service such as www.dslreports.com. Note however that sites such as DSL Reports, because they do not consider as many network protocol overheads, will generally note speeds slightly lower than the Measured Uplink Speed or the ISP rated speed.
The rule applies to a flow of messages whose LAN-side port number is within the range set here. Remote IP Range The rule applies to a flow of messages whose WAN-side IP address falls within the range set here. Remote Port Range The rule applies to a flow of messages whose WAN-side port number is within the range set here. Save/Update Record the changes you have made into the following list. Clear Re-initialize this area of the screen, discarding any changes you have made.
Add/Edit Route Adds a new route to the IP routing table or edits an existing route. Enable Specifies whether the entry will be enabled or disabled. Destination IP The IP address of packets that will take this route. Netmask One bits in the mask specify which bits of the IP address must match. Gateway Specifies the next hop to be taken if this route is used. A gateway of 0.0.0.
The section shows the current routing table entries. Certain required routes are predefined and cannot be changed. Routes that you add can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Route" section is activated for editing. Click the Enable checkbox at the left to directly activate or de-activate the entry.
Advanced_Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games. Enable By default, the Access Control feature is disabled. If you need Access Control, check this option.
Advanced_WEB Filter The Web sites listed here are used when the Web Filter option is enabled in Advanced → Access Control. Add Web Filtering Rule This section is where you add the Web sites to be used for Access Control. Website URL/Domain Enter the URL (address) of the Web Site that you want to allow; for example: google.com. Do not enter the http:// preceding the URL. Enter the most inclusive domain; for example, enter ubicom.com and access will be permitted to both www.ubicom.com and support.ubicom.com.
from connecting to your network. A MAC address is a unique ID assigned by the manufacturer of the network adapter. MAC Filtering Setup Choose the type of MAC filtering needed. Turn MAC Filtering OFF: When "OFF" is selected, MAC addresses are not used to control network access. Turn MAC Filtering ON and ALLOW computers listed to access the network: When "ALLOW" is selected, only computers with MAC addresses listed in the MAC Filtering Rules list are granted network access.
Advanced_ Firewall Settings The router provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyberattackers. However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly.
Firewall Settings Enable SPI SPI ("stateful packet inspection" also known as "dynamic packet filtering") helps to prevent cyberattacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers.
describe the behavior of this router's NAT. While not a perfect mapping, the following loose correspondences between the "cone" classification and the "endpoint filtering" modes can be drawn: if this router is configured for endpoint independent filtering, it implements full cone behavior; address restricted filtering implements restricted cone behavior; and port and address restricted filtering implements port restricted cone behavior.
this computer obtains its address Automatically using DHCP, then you may want to make a static reservation on the Basic → Network Settings page so that the IP address of the DMZ computer does not change. Non-UDP/TCP/ICMP LAN Sessions When a LAN application that uses a protocol other than UDP, TCP, or ICMP initiates a session to the Internet, the router's NAT can track such a session, even though it does not recognize the protocol.
SIP Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG off. Wake-On-LAN This feature enables forwarding of "magic packets" (that is, specially formatted wake-up packets) from the WAN to a LAN computer or other device that is "Wake on LAN" (WOL) capable.
Add/Edit Inbound Filter Rule Here you can add entries to the Inbound Filter Rules List below, or edit existing entries. Name Enter a name for the rule that is meaningful to you. Action The rule can either Allow or Deny messages. Remote IP Range Define the ranges of Internet addresses this rule applies to. For a single IP address, enter the same address in both the Start and End boxes. Up to eight ranges can be entered. The Enable checkbox allows you to turn on or off specific entries in the list of ranges.
Allow All Permit any WAN user to access the related capability. Deny All Prevent all WAN users from accessing the related capability. (LAN users are not affected by Inbound Filter Rules.
Advanced_ Advanced Wireless Transmit Power Normally the wireless transmitter operates at 100% power. In some circumstances, however, there might be a need to isolate specific frequencies to a smaller area. By reducing the power of the radio, you can prevent transmissions from reaching beyond your corporate/home office or designated wireless area. Beacon Period Beacons are packets sent by a wireless router to synchronize wireless devices. Specify a Beacon Period value between 20 and 1000.
WMM Enable Enabling WMM can help control latency and jitter when transmitting multimedia content over a wireless connection. Short GI Using a short (400ns) guard interval can increase throughput. However, it can also increase error rate in some installations, due to increased sensitivity to radio-frequency reflections. Select the option that works best for your installation. Extra Wireless Protection Extra protection for neighboring 11b wireless networks.
Advanced_ WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. WISH Enable WISH Enable this option if you want to allow WISH to prioritize your traffic. Priority Classifiers HTTP Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players.
When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the behaviour that the streams exhibit. This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. Add/Edit WISH Rule A WISH Rule identifies a specific message flow and assigns a priority to that flow.
Advanced_ Wi-Fi Protected Setup 50
Wi-Fi Protected Setup Enable Enable the Wi-Fi Protected Setup feature. Lock Wireless Security Settings Locking the wireless security settings prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup. It is still possible to change wireless network settings with Manual Wireless Network Setup, Wireless Network Setup Wizard, or an existing external WLAN Manager Registrar.
supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. Access to the wireless network is controlled by a “registrar”.
UPnP UPnP is short for Universal Plug and Play, which is a networking architecture that provides compatibility among networking equipment, software, and peripherals. This router has optional UPnP capability, and can work with other UPnP devices and software. Enable UPnP If you need to use the UPnP functionality, you can enable it here. Allow Users to disable Internet Access Disabling this option prevents UPnP clients from terminating the WAN connection.
WAN Ping Inbound Filter Select a filter that controls which WAN computers can use the ping feature. If you do not see the filter you need in the list of filters, go to the Advanced → Inbound Filter screen and create a new filter. WAN Port Speed Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings.
Tools The Tools tab provides the following configuration options: Administrator Settings, Time, Syslog, Email Settings, System, Firmware, Dynamic DNS, System Check, Schedules Tools_Admin (Administrator Settings) The Administrator Settings section is used to set-up secure access to the Web-based management. By default no password is configured. It is highly recommended that you create a password to keep your new router secure.
Gateway Name The name of the router can be changed here. Inactivity Time Out If the router does not detect any administrative activity (from WAN or LAN) during this number of minutes, it logs the adminstrator off. Enable HTTPS Server Enabling this option makes it possible to perform remote management with the Secure HTTP (HTTPS) protocol. Enable Remote Management Enabling Remote Management allows you to manage the router from anywhere on the Internet.
Tools_Time The Time Configuration option allows you to configure, update, and maintain the correct time on the router's internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight saving can also be configured to automatically adjust the time when needed. Time Configuration Current Router Time Displays the time currently maintained by the router. If this is not correct, use the following options to configure the time correctly.
Select the starting and ending times for the change to and from daylight saving time. For example, suppose for DST Start you select Month="Oct", Week="3rd", Day="Sun" and Time="2am". This is the same as saying: "Daylight saving starts on the third Sunday of October at 2:00 AM." Automatic Time Configuration Enable NTP Server Select this option if you want to synchronize the router's clock to a Network Time Server over the Internet.
Enable Logging to Syslog Server Enable this option if you have a syslog server currently running on the LAN and wish to send log messages to it. Syslog Server IP Address Enter the LAN IP address of the Syslog Server.
Tools_Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Enable Email Notification When this option is enabled, router activity logs or firmware upgrade notifications can be emailed to a designated email address, and the following parameters are displayed.
Enter your account for sending email. Password Enter the password associated with the account. Verify Password Re-type the password associated with the account. Email Log When Full or on Schedule On Log Full Select this option if you want logs to be sent by email when the log is full. On Schedule Select this option if you want logs to be sent by email according to a schedule. Schedule If you selected the On Schedule option, select one of the defined schedule rules.
Tools_System This section allows you to manage the router's configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you've created. Save To Local Hard Drive This option allows you to save the router's configuration to a file on your computer. Be sure to save the configuration before performing a firmware upgrade.
Tools_Firmware Use the Firmware section to install the latest firmware to improve functionality and performance. If you would like to be notified when new firmware is released, place a checkmark in the box next to Email Notification of Newer Firmware Version. To upgrade the firmware, follow these steps: 1. Click the Browse button to locate the upgrade file on your computer. 2. Once you have found the file to be used, click the Upload button below to start the firmware upgrade process.
Upload Once you have a firmware update on your computer, use this option to browse for the file and then upload the information into the router. Firmware Upgrade Notification Options Automatically Check Online for Latest Firmware Version When this option is enabled, your router will check online periodically to see if a newer version of the firmware is available.
Tools_Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. When you use a Dynamic DNS service provider, your friends can enter your host name to connect to your server, no matter what your IP address is.
Note: After configuring the router for dynamic DNS, you can open a browser and navigate to the URL for your domain (for example http://www.mydomain.info) and the router will attempt to forward the request to port 80 on your LAN. If, however, you do this from a LAN-side computer and there is no virtual server defined for port 80, the router will return the router's configuration home page. Refer to the Advanced → Virtual Server configuration page to set up a a virtual server.
Ping Test "Ping" is an Internet utility function that sends a series of short messages to a target computer and reports the results. You can use it to test whether a computer is running, and to get an idea of the quality of the connection to that computer, based on the speed of the responses. Host Name or IP Address Enter either the IP address of the target computer or enter its fully qualified domain name. Ping Start pinging the specified host.
Tools_Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Add/Edit Schedule Rule In this section you can add entries to the Schedule Rules List below or edit existing entries. Name Give the schedule a name that is meaningful to you, such as "Weekday rule".
Clear Re-initialize this area of the screen, discarding any changes you have made. Schedule Rules List This section shows the currently defined Schedule Rules. An entry can be changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the "Edit Schedule Rule" section is activated for editing.
Status The Status tab provides the following configuration options: Device Info, Wireless, Logs, Statistics, Internet Sessions, WISH Sessions Status_Device info All of your Internet and network connection details are displayed on the Device Info page. The firmware version is also displayed here. Note: Some browsers have limitations that make it impossible to update the WAN status display when the status changes. Some browsers require that you refresh the display to obtain updated status.
DHCP Connection DHCP Release button unassigns the router's IP address. The router will not respond to IP messages from the WAN side until you click the DHCP Renew button or power-up the router again. Clicking the DHCP Renew button causes the router to request a new IP address from the ISP's server.
Status_Wireless The wireless section allows you to view the wireless clients that are connected to your wireless router. MAC Address The Ethernet ID (MAC address) of the wireless client. IP Address The LAN-side IP address of the client. Mode The transmission standard being used by the client. Values are 11b, 11g, or 11n for 802.11b, 802.11g, or 802.11n respectively. Rate The actual transmission rate of the client in megabits per second. Signal This is a relative measure of signal quality.
Status_Routing The routing section displays all of the routing details configured for your router. A value of 0.0.0.0 for gateway means there is no next hop, and the IP address is directly connected to the router on the interface specified: LAN or WAN. A value of 0.0.0.0 in both the destination IP and netmask means that this is the default route.
Status_Logs The router automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of events to view.
Click this button after changing Log Options to make them effective and permanent. Refresh Clicking this button refreshes the display of log entries. There may be new events since the last time you accessed the log. Clear Clicking this button erases all log entries. Email Now If you provided email information with the Tools → Email Settings screen, clicking the sends the router log to the configured email address.
Status_Statistics The Statistics page displays all of the LAN, WAN, and Wireless packet transmit and receive statistics. Sent The number of packets sent from the router. Received The number of packets received by the router. TX Packets Dropped The number of packets that were dropped while being sent, due to errors, collisions, or router resource limitations. RX Packets Dropped The number of packets that were dropped while being received, due to errors, collisions, or router resource limitations.
77
Status_ Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Local The IP address and, where appropriate, port number of the local application. NAT The port number of the LAN-side application as viewed by the WAN-side application.
Out Initiated from LAN to WAN. In Initiated from WAN to LAN. Priority The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. Time Out The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds UDP connections. 240 seconds Reset or closed TCP connections.
Originator The IP address and, where appropriate, port number of the computer that originated a network connection. Target The IP address and, where appropriate, port number of the computer to which a network connection has been made. Protocol The communications protocol used for the conversation. State State for sessions that use the TCP protocol. • NO: None -- This entry is used as a placeholder for a future connection that may occur.
300 seconds UDP connections. 240 seconds Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 7800 seconds Established or closing TCP connections.
Glossary 8 802.11 A family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database of network devices that are allowed to access resources on the network. Access Point AP. Device that allows wireless clients to connect to it and access the network ActiveX A Microsoft specification for the interaction of software components. Address Resolution Protocol ARP.
Authentication To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA.
A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage CAT 5 Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time.
DMZ: A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network.
F Fiber optic A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware Programming that is inserted i
Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0-9 and A-F Hop The action of data packets being transmitted from one router to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together I ICMP Internet Control Message Pr
An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPX Internetwork Packet Exchange is a networking protocol developed by Novel to
A group of computers in a building that usually access files from a server LPR/LPD "Line Printer Requestor"/"Line Printer Daemon". A TCP/IP protocol for transmitting streams of printer data. M MAC Address A unique hardware ID assigned to every Ethernet adapter by the manufacturer.
Network Layer The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and 802.
PPPoE Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over Ethernet PPTP Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial-In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To r
Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SIP Session Initiation Protocol. A standard protocol for initiating a user session that involves multimedia content, such as voice or chat.
The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between you computer and specific destination U UDP User Datagram Protocol Unicast Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another an
Wide Area Network WCN Windows Connect Now. A Microsoft method for configuring and bootstrapping wireless networking hardware (access points) and wireless clients, including PCs and other devices. WDS Wireless Distribution System. A system that enables the interconnection of access points wirelessly.