Page 21 / 65 Scroll up to view Page 16 - 20
Router Setup
20
Advanced Routing
NAT Setup
The Network Address Translation (NAT) service is a standard that allows
multiple computers on a private network to share a single IP address.
RIP
The
Routing Information Protocol (RIP)
helps the Router dynamically
adapt to changes of network connections by communicating information
about which networks each Router can reach and how far away those
networks are.
Static Routing
This section allows you to define fixed routes to defined destinations.
Route Entry:
To set up a static route, select a number from the
drop-down list.
Page 22 / 65
Router Setup
21
Enter Route Name:
Enter a name for the route here.
Destination LAN IP:
Enter the Destination IP address that will be
assigned to a specific network or host.
Subnet Mask:
Enter the subnet mask associated with the Destination IP.
Gateway:
This is the IP address of the gateway device that allows for
contact between the Router and the remote network or host.
Interface:
This interface tells you whether the Destination IP Address is
on the LAN & Wireless (Ethernet and wireless networks) or the WAN
(Internet).
Show Routing Table:
Click
Show Routing Table
to open a screen
displaying how data is routed through your local network. Click
Refresh
to update the information.
VPN Passthrough
A
Virtual Private Network (VPN)
is a type of secured private network
connection, built upon publicly-accessible infrastructure such as the
Internet. They usually provide connectivity to various devices behind a
gateway or firewall.
IPSec Passthrough
IP Security (IPSec) provides authentication and encryption. Since it is
mainly a Layer 3 technology, it can secure all data on the network. To
allow IPSec tunnels to pass through the Router, click
Enabled
.
PPTP Passthrough
Point-to-Point Tunneling Protocol (PPTP) allows you to establish a
connection to an enterprise network. To allow PPTP tunnels to pass
through the Router, click
Enabled
.
L2TP Passthrough
Layer 2 Tunneling Protocol (L2TP) is an extension of the Point-to-Point
Tunneling Protocol and is also used to establish virtual private networks.
To allow L2TP tunnels to pass through the Router, click
Enabled
.
Page 23 / 65
WiFi Setup
22
WiFi Setup
Basic WiFi Network
Basic WiFi Setting
Network Mode:
From this drop-down menu, you can select the wireless
standards running on your network. If you have 802.11g, 802.11b,
802.11n devices in your network, keep the default setting, Mixed. If you
have only 802.11g devices, select
Wireless-G Only
. If you have only
802.11b devices, select
Wireless-B Only
. If you do not want to use any
WiFi network, select
Disabled
.
Network Name (SSID):
Network Name is used for identifying the
Wireless LAN (WLAN).
Standard Channel:
The radio channel number. The permissible
channels depend on the Regulatory Domain.
SSID Broadcast:
Disable this function will let your SSID setting not be
exposed to view in the air. For security purposes, you may choose to hide
your network’s SSID by selecting
Disable
from the drop-down list. This
will prevent computers scanning for the presence of wireless networks to
detect your network name.
Page 24 / 65
WiFi Setup
23
WiFi Security
WiFi Security Setting
Router provides several different levels of security to protect your WiFi
network. Select a level in the Security Mode drop-down menu.
WEP
The Router supports two WEP (Wired Equivalent Privacy) standards:
64-bit and 128-bit. Select a standard from the drop-down list. The 64-bits
encryption requires 10 hexadecimal digits (letters a-f and numbers 0-9
are valid). The 128-bits encryption requires 26 hexadecimal digits (letters
a-f and numbers 0-9 are valid).You can set up to four different keys.
Passphrase:
Strings of hexadecimal characters are not easy to
remember. This conversion utility converts a simple word or phrase into
hex, so that you can easily remember and regenerate the pass-phrase.
TX Key:
You can specify which key you want to use for the WiFi network.
WPA, or WiFi Protected Access, is a WiFi standard that was designed to
improve the security features of WEP. WPA uses two encryption methods,
TKIP and AES, with dynamic keys.
Page 25 / 65
WiFi Setup
24
WPA-Personal
Encryption:
Choose
TKIP
or
AES
from the drop down list. (AES is a
stronger encryption method than TKIP.)
Passphrase:
Enter a passphrase between 8-63 characters.
Key Renewal:
Enter a key renewal value to tell the Router how often it
should change the encryption keys. The value must be between
60-99999.
WPA2-Personal
WPA2 is a more advanced, more secure version of WPA.
Encryption:
Choose
AES
, or
WPA-TKIP
, or
WPA2-AES
from the drop
down list.
Passphrase:
Enter a passphrase between 8-63 characters.
Key Renewal:
Enter a key renewal value to tell the Router how often it
should change the encryption keys. The value must be between
60-99999.

Rate

4.5 / 5 based on 2 votes.

Popular Bandluxe Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top