Home
USER MANUAL
Contents
1. N2 2 4GHz 802 11b g n Outdoor AP CPE User Guide TABLE OF CONTENTS 3 HARDWARE DESCRIPTION eee 3 HARDWARE INSTALLATION ccccccsccsscsssscseeessscseseeesesessesesseeeeeeseeeseseeeseesaeeesseueeeaess 4 INITIALE CONFIGURATION n text tentem tese ten estem MEA e rq 6 CONNECTING TO THE LOGIN PAGE eese eene natns 6 STATUS ay Seen eee OR tons SAU E OSA DRUMS 6 EASY SETUP E 7 OPERATION MODE AP ROUTER cccccsccseccsssecsssssssuseceuseeessessseueessuueesesseseaes 7 SETINGS PPPOE ADSL munter metten 8 INN TIS IP nonnen 9 SETTINGS CABLE DYNAMIC IP DHCP eese 10 PP eru MEM EE EE 11 SETTINGS L2 TP eost ERES MM NIMM NIE E 12 OPERATION MODE AP BRIDGE u0 cccccccssccccsscessssssseeeesussesssssssueeesuueesessseeaees 14 OPERATION MODE CLIENT ROUTER eene eene nennen 14 OPERATION MODE CLIENT 16 ADVANCED SETUP notennamen bebe eden babsen tederheid 18 MANAGEMENT BRI TERT 19 ADVANCED SETTINGS rotiera ieas iana O hoses 21 22 FIREWALL CONFIGURATION ceeeeeeeeeeeee enne nnne nnne
2. The N2 will behave just the same as Wireless adapter With Client Bridges the WLAN and the LAN are on the same subnet Consequently NAT is no longer used and services that are running on the original network 22 FIREWALL CONFIGURATION MAC IP PORT FILTERING MAC IP Port filtering restricts connection parameters to limit the risk of intrusion and defends against a wide array of common hacker attacks MAC IP Port filtering allows the unit to permit deny or proxy traffic through its MAC addresses IP addresses and ports The N2 allows you define a sequential list of permit or deny filtering rules This device tests ingress packets against the filter rules one by one A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match the packet is either accepted or dropped depending on the default policy setting Advanced we English Ka MAC IP Port Filtering Enables or disables MAC IP Port Filtering Default Disable Default Policy When MAC IP Port Filtering is enabled the default policy will be enabled If you set the default policy to Dropped all incoming packets that don t match the rules will be dropped If the policy is set to Accepted all incoming packets that don t match the rules are accepted Default Dropped MAC Address Specifies the MAC address to block or allow traffic from DIP Specifies the destination IP address to b
3. pppoe_user Keep Alive Ka inet wc dns op User Name Sets the PPPOE user name for the WAN port Password Sets a PPPoE password for the WAN port Verify Password Prompts you to re enter your chosen password Operation Mode Enables and configures the keep alive time and configures the on demand idle time 3 secure ssid 1 title SSID NAME ll uide Ir Disable x Disable Done wireless back Security Setup Network Name SSID SSID Service Set Identification must be assigned to all 8 wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled WEP AUTO WPA PSK WPA2 PSK WPA Auto PSK WPA WPA2 WPA Auto 802 1X Default Disabled SETTINGS STATIC FIXED IP 1 Select Static Fixed IP if your Internet service provider ISP to be permanent address on the Internet A Static IP address is a number in the form of a dotted quad Cable Dynamic IP DHCP Static Fixed IP Cable Dynamic IP DHCP PPPoE ADSL i PPTP L2TP me Static Fixed IP vl 192 168 3 1 255 255 255 0 IP Address Sets the static IP address Subnet Mask Sets the static IP subnet mask Default 255 255 255 0 Default Gateway The IP address of a router that is used when the requested destination IP address is not on the local su
4. 23 MAG IP PORT FILTERING sseccicsscvvssscsasonvessesverasaeevotsceswovssentevevesesiovsadcenvovsonss 23 VIRTUAL SERVER SETTINGS ccccccsccsssssssssssssseeeeeesecseeeeesssesesssauesssesseaaaass 24 p 25 uisiz i 26 CONTENT ziisitc m 27 NETWORK GETTINGS 28 lp 28 T 31 doces aa Cid nU Ufa o E US REUS 32 WIRELESS SETTINGS aus esssuas ketaptisknrtuci rms ted Sa URS bep dS EROR ON aaaeaii 33 BA TO n 33 T een 34 INTRODUCTION The N2 is a 2x2 MIMO IEEE 802 11b g n wireless outdoor AP CPE which support data rates up to 300Mbps It is rain and splash proof when install in upright position N2 also integrated 14dBi patch antenna and passive PoE for simplify installation HARDWARE DESCRIPTION Below are N2 hardware descriptions D POE LAN 2 PoE WAN in Rouer mode PoE LAN in Bridge Mode 3 Reset L Mount Option Pole Mount Holders LED Indicator HARDWARE INSTALLATION How to open the sliding door Unlatch the weatherproof Slide the weatherproof sliding sliding door from the rear of door downwards by griping the base to open onto the indented surface of the weatherproof sliding door
5. and the rear Howto close the sliding door Align the base with the Slide the weatherproof weatherproof sliding door sliding door upwards until it clicks into place How to tie the strap on the pole Mounting and Radio forward Diagram Standard Pole Mount Option Adjust Antenna L Mount Option Wall Mount INITIAL CONFIGURATION The N2 outdoor 2 4GHz AP CPE offers a user friendly web based management interface for the configuration of all the unit s features Any PC directly attached to the unit can access the management interface using a web browser such as Internet Explorer version 6 0 or above CONNECTING TO THE LOGIN PAGE It is recommended to make initial configuration changes by connecting a PC directly to the N2 s LAN port The N2 has a default IP address of 192 168 2 1 and a subnet mask of 255 255 255 0 You must set your PC IP address to be on the same subnet as the N2 that is the PC and N2 addresses must both start 192 168 2 x To access the N2 s management GUI interface follow these steps 1 Use your web browser to connect to the management interface using the default IP address of 192 168 2 1 2 Log into the interface by entering the default username admin and password admin then click OK STATUS PAGE After logging in to the web interface the Status page displays The Home page top menu bar shows the Status Easy Setup Advanced and Language Address O
6. be sure to define at least one static WEP key for user authentication or data encryption Also be sure that the WEP shared keys are the same for each client in the wireless network SSID NAME ll uide a WEP AUTO gt FI SC WEP AUTO Allows wireless clients to connect to the network using Open WEP uses WEP for encryption only or Shared WEP uses WEP for authentication and encryption Encrypt Type Selects WEP for data encryption OPEN mode only Security Key Index Selects the WEP key number to use for authentication or data encryption If wireless clients have all four WEP keys configured to the same values you can change the encryption key to any of the settings without having to update the client keys 34 WEP Keys Sets WEP key values The user must first select ASCII or hexadecimal keys Each WEP key has an index number Enter key values that match the key type and length settings Enter 5 alphanumeric characters or 10 hexadecimal digits for 64 bit keys or enter 13 alphanumeric characters or 26 hexadecimal digits for 128 bit keys Default Hex no preset value Note If WEP authentication is selected for WDS communication you will then only have one set of encryption for the entire channel WPA amp WPA2 Wi Fi Protected Access WPA was introduced as an interim solution for the vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes
7. feature you want to use However when experiencing problems caused by the Router rather than the configuration you can try to upgrade the firmware 2 When you upgrade the Router s firmware you may lose its current configurations so before upgrading the firmware please write down some of your customized settings to avoid losing important settings 3 Do not turn off the Router or press the Reset button while the firmware is being upgraded otherwise the Router may be damaged 19 4 The Router will reboot after the upgrading has been finished Adminstrator Settings Firmware Upgrade EE Li einn Load Factory Defaults Reboot System Export Settings Click the Export Button to download current router configuration to your PC Import Settings Click the Import Button to browse for the configuration file that is currently saved on your PC Click Import to overwrite all current configurations with the one in the configuration file Adminstrator Settings Firmware Upgrade Configuration Load Factory Defaults Load Default Load Factory Defaults If you have problems with N2 which might be a result from changing some settings but you are unsure what settings exactly you can restore the factory defaults by click the Load Default Button Adminstrator Settings Firmware Upgrade Configuration Load Factory Defaults Reboot System Reboot Now Reboot System If you want to reboot the N2 cl
8. or Hexadecimal format Range 8763 ASCII characters or exactly 64 Hexadecimal digits 39
9. IP DHCP DHCP Mode inet wc dns op OPERATION MODE CLIENT BRIDGE In the Client Bridge mode your N2 will behave just the same as Wireless adapter With Client Bridges the WLAN and the LAN are on the same subnet Consequently NAT is no longer used and services that are running on the original network Operation Mode Setup DE Client Bridge Please select an Operation Mode Nex AP Router AP Bridge Client Router 2 Press Site Survey button and look for available wireless network then click on the 16 SSID that you attempt to connect to it MikroTik B is the SSID that we are going to connect in this example Press Next button when finished prof currently Pofile List Infarstrature iy Site Survey Ea Disabled Le basic ack timeout settings O basic miles 1 1 basic km 35 dBm prof currently Pofile List 5 MEL WPA Personal Es Infrastructure a2z wPa2 Personal WPA2 Personal EN Infrastructure 3 Now it shows the Profile Name SSID BSSID and encryption type received from your target network and press Next button to finish the wizard prof currently Pofile List SSID Network Type prof profile setup ET oc MARRE basic ack timeout settings O basic miles 1 1 basic km 35 E aam 17 ADVANCED SETUP In the Advanced Manual Bar it includes all the settings such as firmware upgrade LAN WAN and wireless settings
10. Q0 CU CA 60 B8 AD dress 102 168 2 1 LAN Netmask 255 255 255 0 dress QU CU CA 60 B8 AC re Version V2 1 2012 03 23 15 55 System Time Mon 09 Apr 2012 20 39 12 on Mode AP Router mode EASY SETUP The Easy Setup is designed to help you to configure the basic settings required to get the N2 up and running There are only a few basic steps you need to set up the N2 to get the connection Click on Easy Setup to bring up the wizard Please select an Operation Mode v Please select an Operation Mode Nex AP Router AP Bridge Client Router Client Bridge OPERATION MODE AP ROUTER In AP Router mode your N2 unit is turned to a wireless router and wireless interface will become the LAN side if your PC is connected to the PoE port the management IP will change to the LAN IP 192 168 2 1 The remote management will be automatically turned on to allow you managing the device from the PoE LAN port Please select an Operation Mode Please select an Operation Mode AP Router AP Bridge Client Router Client Bridge SETTINGS PPPoE ADSL 1 Select PPPoE to be assigned automatically from an Internet service provider ISP through a DSL modem using Point to Point Protocol over Ethernet Wide Area Network WAN Settings Cable Dynamic IP DHCP v Static Fixed IP DHCP Mode Cable Dynamic IP DHCP M PPTP L2TP inet wc dns op Wide Area Network WAN Settings PPPoE ADSL PPPoE Mode
11. SID NAME lll Hide Disable x Done wireless back Network Name SSID SSID Service Set Identification must be assigned to all wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled WEP AUTO WPA PSK WPA2 PSK WPA Auto PSK WPA WPA2 WPA Auto 802 1X Default Disabled 13 OPERATION AP BRIDGE 1 In this mode bridge your N2 to another Access Point Please select an Operation Mode Nex AP Router AP Bridge Client Bridge SSID NAME ll Hide Done wireless back Network Name SSID SSID Service Set Identification must be assigned to all wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled Open Shared WEP AUTO WPA PSK WPA2 PSK WPA PSK WPA2 PSK WPA WPA2 WPA1 WPA2 802 1X Default Disabled OPERATION MODE CLIENT ROUTER In the Client Router mode is also known as WISP The 2 wireless side is connected to the remote AP Base Station as in Client Infrastructure mode Between the wireless and LAN is the IP sharing router function This is used to share Client Router connection The WAN is on the wireless side Client Router Please select an Operation Mode Nex AP Router AP Bridge Client Router Cli
12. Sec Connection Type Use drop down menu to select from Road Warrior Tunnel Host to Host Tunnel Subnet to Subnet Tunnel Host to Host Transport Pass trough Drop or Reject Default setting is Road Warrior Tunnel IPSec Authentication Use drop down menu to select from SHA 1 or MDS Default setting is SHA1 SA Connection Life Time Specify how often each SA should be rekeyed measured in hour Local IP address Subnet Gateway Local end point IP address Subnet and Gateway IP address IPSec Operation Mode Use drop down menu to select from Add Route Start Manual or Ignore Default setting is Add IKE Key Retry Specify maximum retry limits for negotiate key to Internet Key Exchange Peer IP address Subnet Gateway Remote end point IP address Subnet and Gateway IP address 30 L2TP Static IP x Keep Alive Server IP Sets the L2TP server IP Address Default 21 server User Name Sets the L2TP user name for the WAN port Password Sets a L2TP password for the WAN port Address Mode Sets a L2TP network mode Default Dynamic IP Operation Mode Enables and configures the keep alive time o Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addr
13. ally changing data encryption keys and redistributing them to all connected clients RADIUS Server Configures RADIUS server settings IP Address Specifies the IP address of the RADIUS server Port The User Datagram Protocol UDP port number used by the RADIUS server for authentication messages Range 1024 65535 Default 1812 Shared Secret A shared text string used to encrypt messages between the access point and the RADIUS server Be sure that the same text string is specified on the RADIUS server Do not use blank spaces in the string Maximum length 20 characters WPA PSK amp WPA2 PSK Wi Fi Protected Access WPA was introduced as an interim solution for the vulnerability of WEP pending the adoption of a more robust wireless security standard WPA2 includes the complete wireless security standard but also offers backward compatibility with WPA For small home or office networks WPA and WPA2 provide a simple personal operating mode that uses just a pre shared key for network access The WPA Pre Shared Key WPA PSK mode uses a common password phrase for user authentication that is manually entered on the access point and all wireless clients Data encryption keys are automatically generated by the access point and distributed to all clients connected to the network SSID NAME lll Hide al TKIP CCMP AES Auto 2S WPA PSK Clients using WPA with a Pre shared Key are accepted fo
14. bnet Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server 9 secure ssid 1 title SSID_NAME lll Hide ce W Disable Le Disable Done wireless back Security Setup Network Name SSID SSID Service Set Identification must be assigned to all wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled WEP AUTO WPA PSK WPA2 PSK WPA Auto PSK WPA WPA2 WPA Auto 802 1X Default Disabled SETTINGS CABLE DYNAMIC IP DHCP 1 Select Cable Dynamic IP DHCP if your Internet service provider ISP use a DHCP service to assign your Router an IP address when connecting to the Internet Wide Area Network WAN Settings Cable Dynamic IP DHCP Static Fixed IP DHCP Mode lM PPPoE ADSL PPTP L2TP inet wc dns op Wide Area Network WAN Settings Cable Dynamic IP DHCP Le DHCP Mode DHCP inet wc dns op The host name that you selected from the DHCP service provider 3 10 secure ssid 1 title SSID_NAME M H
15. can include spaces or Hexadecimal format Range 8763 ASCII characters or exactly 64 Hexadecimal digits Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients IEEE 802 1X AND RADIUS IEEE 802 1X is a standard framework for network access control that uses a central RADIUS server for user authentication This control feature prevents unauthorized access to the network by requiring an 802 1X client application to submit user credentials for authentication The 802 1X standard uses the Extensible Authentication Protocol EAP to pass user credentials either digital certificates user names and passwords or other from the client to the RADIUS server Client authentication is then verified on the RADIUS server before the client can access the network Remote Authentication Dial in User Service RADIUS is an authentication protocol that uses software running on a central server to control access to RADIUS aware devices on the network An authentication server contains a database of user credentials for each user that requires network access The WPA and WPA2 enterprise security modes use 802 1X as the method of user authentication IEEE 802 1X can also be enabled on its own as a security mode for 37 user authentication When 802 1X is used a RADIUS server must be configured and be available on the connected wired network SSID Security Setting
16. ctional network services for data sharing communication and entrainment Default setting is Disabled 21 Time Zone Settings DDNS Settings UPNP Settings SNMP Settings SSH Settings Disable public rivate SNMP Settings Managing devices on IP networks Default setting is Disabled Time Zone Settings DDNS Settings UPNP Settings SNMP Settings SSH Settings m SSH Settings Secure Shell Enable your N2 unit to access secure shell SSH based network device Default setting is Disabled OPERATION MODE The Operation Mode content four modes AP Bridge AP Router Client Router and Client Bridge Advanced AP Router AP Router AP Bridge Client Router Client Bridge Bridge The wired Ethernet and wireless are bridged together Once the mode is selected all WAN related functions will be disabled AP Router The WAN port is used to connect with ADSL Cable modem and the wireless is used for your private WLAN The NAT is existed between the 2 RJ45 ports and all wireless clients share the same public IP address through the WAN port to ISP The default IP configuration for WAN port is DHCP client Client Router The N2 will behave just the same as the client mode for wireless function However router functions are added between the wireless WAN side and the Ethernet LAN side Therefore the WSIP subscriber can share the WISP connection without the extra router Client Bridge
17. cts between methods of broadcasting the WPS beacon to network clients wanting to join the network WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AESCCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware Auto Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Key Renewal Interval Sets the time period for automatically changing data encryption keys and redistributing them to all connected clients Pass Phrase The WPA Preshared Key can be input as an ASCII string an easy to remember form of letters and numbers that can include spaces
18. econdary DNS Server The IP address of the Secondary Domain Name Server 3 SSID NAME lll Hide Done wireless back Network Name SSID SSID Service Set Identification must be assigned to all wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled WEP AUTO WPA PSK WPA2 PSK WPA Auto PSK WPA WPA2 WPA Auto 802 1X Default Disabled SETTINGS L2TP 1 Select L2TP if you are using PPTP service to gain connection to the Internet Cable Dynamic IP DHCP Static Fixed IP Cable Dynamic IP DHCP PPPoE ADSL PPTP L2TP 2 12 Server IP Sets the L2TP server IP Address Default 21 server User Name Sets the L2TP user name for the WAN port Password Sets a L2TP password for the WAN port Address Mode Sets a L2TP network mode Default Dynamic IP Operation Mode Enables and configures the keep alive time 6 o o Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server 3 S
19. ent Bridge 2 Press Site Survey button and look for available wireless network then click on the SSID that you attempt to connect to it MikroTik_B is the SSID that we are going to connect in this example Press Next button when finished 14 prof currently Pofile List WEN Disabled basic ack timeout settings basic distance QS FEN basic miles 1 1 basic km dBm wireless back prof currently Pofile List prof wireless site survey x im MikroTik_ Bl 00 C0 CA 5F 40 C2 11 Mb s 8 94 89 dBm EN WPA1 Personall TKIP CCMP Infrastructure ENT 21 00 C0 CA 60 4B E2 54 Mb s 50 94 76 dBm EN WPA2 Personal CCMP Infrastructure EC Laservideo B0 48 7A B5 01 C4 54 Mb sll 0 94 95 dBm WPA2 Personal CCMPl infrastructure Select Rescan Close 3 Now it shows the Profile Name SSID BSSID and encryption type received from your target network and press Next button to continue 15 prof currently prof profile setup ENEN MikroTik B IEEE Infarstrature M SSID 1 ikroTik_B End 00 C0 CA 5F 40 C2 NARE VPA PSK Le Auto TKIP CCMP Pass Phrase basic ack timeout settings basic distance basic miles 1 1 basic km basic acktimeout wireless back 4 Finally you need to tell the system about IP address received from WAN DHCP Hostname and DNS Server then press Next button to finish the wizard Wide Area Network WAN Settings Cable Dynamic
20. eractive games or video conferencing may not function properly behind the firewall By specifying a Demilitarized Zone DMZ host the PC s TCP ports are completely exposed to the Internet allowing open two way communication The host PC should be assigned a static IP address which is mapped to its MAC address and this must be configured as the DMZ IP address BEEN Enable DMZ Settings Sets the DMZ status Default Disable DMZ IP Address Specifies an IP address on the local network allowed unblocked access to the WAN 25 FIREWALL Firewall functions which will help to protect your network and computer You can utilized firmware functions to protect your network from hackers and malicious intruders Remote Management Port piel Translation Disable Remote Management via WAN allow or deny to manage the router from anywhere on the Internet Remote Management Port The port that you will use to address the management from the Internet For example if you specify port 2020 then to access the N2 from Internet you would use a URL of the form http XXX XXX Xxx xxx 2020 Ping from WAN Filter When Allow the N2 does not respond to ping packets received on the WAN port SPI Firewall SIP firewall help to keep track of the state of network connections such as TCP streams UDP communication traveling across it It is programmed to distinguish legitimate packets for dif
21. esses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server LAN In this section the LAN settings are configured based on the IP Address and Subnet Mask The IP address is also used to access this Web based management interface It is recommended to use the default settings if you do not have an existing network 00 C0 CA 60 B8 AC 192 168 2 1 255 255 255 0 DHCP Server v 192 168 2 100 192 168 2 199 One day Le zT 31 Address The IP address of N2 on the local area network Default 192 168 2 1 Subnet Mask The subnet mask of N2 on the local area network DHCP Server The DHCP Server is to assign private IP address to the N2 in your local area network LAN The default LAN IP address is 192 168 2 1 changing IP address will also change the DHCP server s IP subnet ADVANCED ROUTING In this section allow to configure routing feature in the N2 IN Disable Destination The IP address of packets that can be routed Type Defines the type of destination Host Signal IP address Net Portion of Network Netmask Displays the subnetwork associated with the destination Gateway Defines the packets destination next hop Interface Select interface to which a static routing subnet is to be applied Comment Help identify the routing RIP Enable or d
22. ferent types of connections Only packets matching a known active connection will be allowed by the firewall others will be rejected Network Address Translation NAT is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device 26 CONTENT FILTERING The N2 provides a variety of options for blocking Internet access based on content URL and host name Webs Host Filter Settings Http s i i O Web URL Filter Settings By filtering inbound Uniform Resource Locators URLs the risk of compromising the network can be reduced URLs are commonly used to point to websites By specifying a URL or a keyword contained in a URL traffic from that site may be blocked Current URL Filters Displays current URL filter Adda URL Filter Adds a URL filter to the settings Delete a URL Filter Deletes a URL filter entry from the list Web Host Filter Settings Allows Internet content access to be restricted based on web address keywords and web domains A domain name is the name of a particular web site For example for the address www HOST com the domain name is HOST com Enter the Keyword then click Add Current Host Filters Displays current Host filter Adda Host Filter Enters the keyword for a host filtering Delete a Host Filter Deletes a Host filter entry from the list Webs URL Filter Setti
23. her based on received protocol port number This technique can allow an external user to reach a port on a private IP address inside a LAN from the outside through a NAT enabled router Ini Enable Le Apply Virtual Server Selects between enabling or disabling port forwarding the virtual server Default Disable IP Address Specifies the IP address of a server on the local network to allow external access Private Port The protocol port number on the local server Public Port The protocol port number on the router s WAN interface Protocol Specifies the protocol to forward either TCP UDP or TCP amp UDP 24 Comment Enter a useful comment to help identify the port forwarding service on the network Current Virtual Servers in System The Current Port Forwarding Table displays the entries that are allowed to forward packets through the N2 s firewall gt The table entry number Address The IP address of a server on the local network to allow external access gt Port Mapping displays the port mapping for the server gt Protocol Displays the protocol used for forwarding this port gt Comment Displays a useful comment to identify the nature of the port to be forwarded DMZ DMZ is to specified host PC on the local network to access the Internet without any firewall protection Some Internet applications such as int
24. ick the Reboot Now Button 20 ADVANCED SETTINGS The Advanced Settings section is provided for configuration of Time Zone DDNS UPnP SNMP and SSH Time Zone Settings DDNS Settings UPNP Settings SNMP Settings SSH Settings PC Sync with host GMT 12 00 International Date Line Duc EN Time Zone Settings The Time Zone Settings allows you to configure update and maintain the correct time on the N2 s internal system clock SNTP Server Enter the address of an SNTP server to receive time updates SNTP synchronization minutes Specify the interval between SNTP server updates Time Zone Settings DDNS Settings UPNP Settings SNMP Settings SSH Settings Dyndns org freedns afraid org www zoneedit com ip y Cancel DDNS Settings DDNS lets you assign a fixed host and domain name to dynamic Internet IP address It is useful when you are hosting your own website FTP server or other server behind the N2 Before using this feature you need to sign up for DDNS service at www dyndns org a DDNS service provider User Name Sets the DDNS user name for the connection Password Sets a DDNS password for the connection HostName The host name that you selected from the DDNS service provider Time Zone Settings DDNS Settings UPNP Settings SNMP Settings SSH Settings UPNP Settings UPnP permits network devices to discover other network device s preference and establish fun
25. ide ce B 2 Disable Le Disable Done wireless back Security Setup Network Name SSID SSID Service Set Identification must be assigned to all wireless devices in your network Considering your wireless network security Security Mode Select the security method and then configure the required parameters Options Disabled WEP AUTO WPA PSK WPA2 PSK WPA Auto PSK WPA WPA2 WPA Auto 802 1X Default Disabled SETTINGS PPTP 1 Select PPTP if you are using PPTP service to gain connection to the Internet Wide Area Network WAN Settings Cable Dynamic IP DHCP Static Fixed IP DHCP Mode N PPPoE ADSL PPTP L2TP inet wc dns op Wide Area Network WAN Settings PPTP Mode oe Keep Alive Mode Redial Pe 60 Ce inet wc dns op Server IP Sets the PPTP server IP Address Default pptp server User Name Sets the PPTP user name for the WAN port Password Sets a PPTP password for the WAN port Address Mode Sets a PPTP network mode Default Dynamic IP o Operation Mode Enables and configures the keep alive time 11 Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank S
26. isable the RIP Routing Information Protocol for the WAN or LAN interface 9999 32 WIRELESS SETTINGS BASIC Access Point Le coron Set country Code O ZZZ CEN mites km SSID NAME lil uide Disable Le apoy Wireless On Off Enables or Disable the radio Default Turn On Wireless Mode There are 4 wireless mode those are Access Point WDS Access Point WDS Repeater and WDS Client Note If WEP authentication is selected for WDS communication you will then only have one set of encryption for the entire channel Network Name SSID The name of the wireless network service provided by the N2 Clients that want to connect to the network must set their SSID to the same as that of N2 Multiple SSID One additional VAP interface supported on the device Frequency Channel The radio channel that the N2 uses to communicate with wireless clients Network Mode Defines the radio operating mode 33 SECURITY SSID NAME M Hide Disable w Disable WPA2 PSK WPA AUTO WPA AUTO PSK 802 1x WIRED EQUIVALENT PRIVACY WEP WEP provides a basic level of security preventing unauthorized access to the network and encrypting data transmitted between wireless clients and an access point WEP uses static shared keys fixed length hexadecimal or alphanumeric strings that are manually distributed to all clients that want to use the network When you select to use WEP
27. lock or allow traffic from SIP Specifies the source IP address to block or allow traffic from Protocol Specifies the destination port type TCP UDP or ICMP 9999 Destination Port Range Specifies the range of destination port to block traffic from the specified LAN IP address from reaching Source Port Range Specifies the range of source port to block traffic from the specified LAN IP address from reaching Action Specifies if traffic should be accepted or dropped Default Accept Comment Enter a useful comment to help identify the filtering rules Current Filtering rules The Current Filter Table displays the configured IP addresses and ports that are permitted or denied access to and from 23 No The table entry number MAC Address Displays a MAC address to filter Destination IP Address DIP Displays the destination IP address Source IP Address SIP Displays the source IP address Protocol Displays the protocol type Destination Port Range DPR Displays the destination port range Source Port Range SPR Displays the source port range Action Displays if the specified traffic is accepted or dropped Y ON ON ON ON Vv ON WV Comment Displays a useful comment to identify the filter rules VIRTUAL SERVER SETTINGS Virtual Server sometimes referred to as Port Forwarding is the act of forwarding traffic from one network node to anot
28. ngs BAVC USS SEC dc UCET E 27 NETWORK SETTINGS WAN In this section there are several connection types to choose from Static IP DHCP PPPoE PPTP and L2TP If you are unsure of your connection method please contact your Internet Service Provider CABLE DYNAMIC IP DHCP Cable Dynamic IP DHCP v DHCP 73 r3 Hostname Specifies the host name of the DHCP client Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server PPPoE ADSL PPPoE ADSL Keep Alive iy 773 CED User Name Sets the user name for the WAN port Password Sets a PPPoE password for the WAN port Verify Password Prompts you to re enter your chosen password o Operation Mode Enables and configures the keep alive time and configures the on demand idle time 28 STATIC IP FIXED IP Static Fixed IP 192 168 3 1 255 255 255 0 te IP Address Sets the static IP address Subnet Mask Sets the static IP subnet mask Default 255 255 255 0 Default Gateway The IP address of a router that is used when the req
29. r authentication WPA2 PSK Clients using WPA2 with a Pre shared Key are accepted for authentication WPA Auto PSK Clients using WPA or WPA2 with a Preshared 36 Key are accepted for authentication The default data encryption type is TKIP AES WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AESCCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to WPA2 compliant hardware 4 Auto Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Pass Phrase The WPA Preshared Key can be input as an ASCII string an easy to remember form of letters and numbers that
30. s SSID NAME lll Hide DSL RADIUS Server Configures RADIUS server settings IP Address Specifies the IP address of the RADIUS server Port The User Datagram Protocol UDP port number used by the RADIUS server for authentication messages Range 1024 65535 Default 1812 Shared Secret A shared text string used to encrypt messages between the access point and the RADIUS server Be sure that the same text string is specified on the RADIUS server Do not use blank spaces in the string Maximum length 20 characters Wi Fi PROTECTED SETUP WPS Wi Fi Protected Setup WPS is designed to ease installation and activation of security features in wireless networks WPS has two basic modes of operation Push button Configuration PBC and Personal Identification Number PIN The WPS PIN setup is optional to the PBC setup and provides more security The WPS button on the Wireless Router can be pressed at any time to allow a single device to easily join the network The WPS Settings page includes configuration options for setting WPS device PIN codes and activating the virtual WPS button SSID I Security Settings E Hide WPS Summary ID SSID NAME ll E WPA PSK ZE TKIP CCMP AES Auto 60 WPS SSID The service set identifier for the unit AP PIN Displays the PIN Code for the Wireless Router WPS Name WPS name for connecting to the device 38 Security Mode Sele
31. that change the RF behaviors It is important to read through this section before attempting to make changes Management Advanced Settings Operation Mode System Log Pj A antent Filtering Network Settings WAN LAN VLAN DHCP Static Leases Advanced Routing Wireless Settmgs Basic Advanced 18 MANAGEMENT The Management section is provided for configuration of administrative needs such as language type user name Password firmware upgrade export and import settings load factory defaults and reboots system Adminstrator Settings Firmware Upgrade Configuration Load Factory Defaults Reboot System admin Password The new password must not exceed 32 characters in length and must not include any spaces Enter the new password a second time to confirm it Adminstrator Settings Firmware Upgrade Configuration Load Factory Defaults Reboot System V2 2 2012 04 02 13 31 PEs eS EFR Software Version This displays the current firmware version To upgrade the Router s firmware follow these instructions below 1 Download a more recent firmware upgrade file from our website 2 Type the path and file name of the update file into the File field Or click the Browse button to locate the update file 3 Click the Upgrade button Note 1 New firmware versions are posted at our website and can be downloaded for free There is no need to upgrade the firmware unless the new firmware has a new
32. the complete wireless security standard but also offers backward compatibility with WPA SSID NAME ll uide Ir WPA v TKIP CCMP AES Auto WPA Clients using WPA for authentication WPA2 Clients using WPA2 for authentication WPA Auto Clients using WPA or WPA2 for authentication WPA Algorithms Selects the data encryption type to use Default is determined by the Security Mode selected TKIP Uses Temporal Key Integrity Protocol TKIP keys for encryption WPA specifies TKIP as the data encryption method to replace WEP TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys 4 AES Uses Advanced Encryption Standard AES keys for encryption WPA2 uses AES Counter Mode encryption with Cipher Block Chaining Message Authentication Code CBC MAC for message integrity The AES Counter Mode CBCMAC Protocol AESCCMP provides extremely robust data confidentiality using a 128 bit key Use of AES CCMP encryption is specified as a standard requirement for WPA2 Before implementing WPA2 in the network be sure client devices are upgraded to 35 WPA2 compliant hardware 4 Auto Uses either TKIP or AES keys for encryption WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID In mixed mode the unicast encryption type TKIP or AES is negotiated for each client Key Renewal Interval Sets the time period for automatic
33. uested destination IP address is not on the local subnet Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text field blank Secondary DNS Server The IP address of the Secondary Domain Name Server PPTP pptp server pptp user Static IP Keep Alive Ka Server IP Sets the PPTP server IP Address Default pptp server User Name Sets the PPTP user name for the WAN port Password Sets a PPTP password for the WAN port Address Mode Sets a PPTP network mode Default Dynamic IP Operation Mode Enables and configures the keep alive time o Primary DNS Server The IP address of the Primary Domain Name Server A DNS maps numerical IP addresses to domain names and can be used to identify network hosts by familiar names instead of the IP addresses To specify a DNS server type the IP addresses in the text field provided Otherwise leave the text 29 field blank Secondary DNS Server The IP address of the Secondary Domain Name Server IPSec to Pv4 F a 3 x A 1 accCONN EN E oN c Verify the desire settings and use scroll down for more options IP
Download Pdf Manuals
Related Search
Related Contents
CG RID u&m 06 Mode d`emploi OPAC en ligne Tasco 119223C Digital Camera User Manual Page 1 Page 2 Page 3 4, 要求事項 人潮市には、 ガス交離能を有する ーこの説明書と保証書をよくお読みのうえ丶 正しくご使用くだ さい) その後 www .mitsubishi-motors.pt Samsung WA70B71 Manuel de l'utilisateur Ficha técnica pro-level SillaCocheBebe.com Copyright © All rights reserved.
Failed to retrieve file