Page 31 / 88 Scroll up to view Page 26 - 30
Billion 400G
Router
Chapter 4: Configuration
28
ESSID Broadcast:
ESSID
Broadcast
is
the
function
that
controls
the
Routes
transmission
of
its
ESSID. This
transmission
enables
wireless
clients
to
detect
the
presence
of
the
AP
when
they
search
for
AP’s
to connect
to.
The
default
setting
is
Enabled.
²
Disable:
If you do not want broadcast your ESSID. Any client uses “any” wireless setting cannot discover
the Access Point (AP) of your router.
²
Enable:
Any
client
using
the
“any”
setting
can
discover
the
Access
Point
(AP).
Regulation Domain:
There are seven Regulation Domains for you to choose from, including North America
(N.America), Europe, France, etc. The Channel ID will be different based on this setting.
Channel ID:
Select the wireless connection ID channel that you would like to use.
Use
the
Scan Channel
Usage
to
help
to
select
non-occupied
wireless
channel.
²
Scan
Channel
Usage:
Wireless
channel
scan
takes
up
to
14
seconds
to
survey
the
wireless channels
i
n
the
surrounding
area. The
result
will
show
which
of
the
wireless
channels
are
already being
used
, and
which
are
available
for
use.
Note:
Wireless performance may degrade if select ID channel is already being occupied by other AP(s).
TX PowerLevel:
This
function
enhances
the
wireless
transmitting
signal
strength.
Users
may
adjust
this
power
level
from
minimum
0
up
to
maximum
255.
Note:
Maximum
power
Level
is
not
necessarily
the
best
choice
in
all
cases.
Choose
the
most
suitable
level
for
your network
and
environment.
Connected:
Representing in
true
or
false
. That it is the connection status between the system and the build-in
wireless card.
AP MAC Address:
It is a unique hardware address of the Access Point.
AP Firmware Version:
The Access Point firmware version.
Wireless Distribution System (WDS)
This
is
a
wireless
access
point
mode
that
enables
wireless
linking
and
communication
with
other
access points.
It
is
easy
to
install
-
simply
define
the
peer
AP’s
MAC
address.The
WDS
system
gives
a
cost saving
and
flexible
method
of
extending
wireless
range,
since
no
extra
wireless
client
device
is
required to
bridge
between
two
access
points.
Using
WDS,
the
user
can
extend
an
existing
wired
or
wireless infrastructure
network
to
create
a
larger
network.
In addition, WDS enhances its link connection security in WEP mode, WEP key encryption must be the same for
both access points.
WDS Service:
The
default
setting
is
Disabled.
Check
Enable
radio
button
to
activate
this
function.
Peer
WDS
MAC
Address:
this
is
the
associated
AP’s
MAC
Address. It
is
important
that
your
peer’s
AP must
include
your
MAC
address
in
order
to
allow
the
AP’s
to
acknowledge
and
communicate
with
each other.
Note:
For
MAC
Address,
Semicolon
(
:
)
must
be
included.
Page 32 / 88
Billion 400G
Router
Chapter 4: Configuration
29
Wireless Security
You
can
disable
or
enable
WPA
or
WEP
for
protecting
your
wireless
network.
The
default
mode
of
wireless
security
is
Enabled.
And
the
default
security
mode
is
WPA.
WPA-PSK / WPA2-PSK / WEP
WPA Algorithms:
There are two types of the WPA-PSK, WPA-PSK and WPA2-PSK.
The WPA-PSK adapts the
TKIP (Temporal Key Integrity Protocol) encrypted algorithms, which incorporates Message Integrity Code (MIC) to
provide protection against hackers. The WPA2-PSK adapts CCMP (Cipher Block Chaining Message Authentication
Code Protocol) of the AES (Advanced Encryption Security) algorithms.
WPA Shared Key:
The
key
for
network
authentication.
The
input
format
is
in
character
style
and
key
size should
be
in
the
range
between
8
and
63
characters.
By
default,
your
Router
is
provided
with
a
unique Key.
This
key
is
also
given
on
a
label
on
the
underside
of
your
router.
Group Key Renewal:
The period of renewal time for changing the security key automatically between wireless
client and Access Point (AP). Default value is 3
600
seconds.
Page 33 / 88
Billion 400G
Router
Chapter 4: Configuration
30
WEP
WEP Authentication:
To prevent unauthorized wireless stations from accessing data transmitted over the network,
the router offers secure data encryption, known as WEP. If you require high security for transmissions, there are two
options to select from:
Open System,
Share key
.
WEP Encryption:
To prevent unauthorized wireless stations from accessing data transmitted over the network, the
router offers highly secure data encryption, known as WEP. If you require high security for transmissions, there are
two alternatives to select from:
WEP 64 and WEP 128
. WEP 128 will offer increased security over WEP 64.
Passphrase:
This
is
used
to
generate
WEP
keys
automatically
based
upon
the
input
string
and
a pre-defined
algorithm
in
WEP64
or
WEP128.
Default
Used
WEP
Key:
Select
the
encryption
key
ID;
please
refer
to
Key
(1~4)
below.
Key (1-4):
Enter
the
key
to
encrypt
wireless
data.
To
allow
encrypted
data
t
ransmission,
the
WEP Encryption
Key
values
on
all
wireless
stations
must
be
the
same
as
the
router.
There
are
four
keys
for your
selection.
The
input
format
is
in
HEX
style,
5
and
13
HEX
codes
are
required
for
WEP64
and WEP128
respectively,
the
separator
is
-“.
For
example,
using
WEP64,
11-22-33-44-55
is
a
valid
key, whilst
1122334455
is
invalid.
Page 34 / 88
Billion 400G
Router
Chapter 4: Configuration
31
Wireless Client / MAC Address Filter
The
MAC
Address
supports
up
to
16
wireless
network
machines
and
helps
you
to
manage
your
network control
to
accept
traffic
from
specific
authorized
machines
or
to
restrict
unwanted
machine(s)
from accessing
your
LAN.
There are no pre-define MAC Address filter rules; you can add the filter rules to meet your requirements.
Wireless Client Filter:
Default setting is set to
Disable
.
²
Allowed:
To
allow
a
specific
device
access
to
your
LAN,
insert
the
devices
MAC
Address
in the
space
provided,
or click
.
Make sure your computer’s MAC is listed.
²
Blocked:
To
prevent
unwanted
devices
from
accessing
the
LAN,
insert
the
MAC
Address
of an
unwanted
computer
into
the
space
provided,
or click
. Make sure your computer’s MAC is not
listed.
The
maximum
number
of
clients
is
16.
MAC
addresses
are
6
bytes
long;
they
are
presented
only
in hexadecimal
format. The
numbers
0
-
9
and
letters
a
-
f
are
acceptable.
MAC
addresses
are
6
bytes
long
Note:
Follow the MAC Address Format xx:xx:xx:xx:xx:xx. Semicolon ( : ) must be included.
Candidates:
T
his
function
automatically
detects
devices
connected
to
the
router
through
the
Wireless
AP.
Associated Wireless Clients
Associate Wireless Client displays a list of individual wireless device’s MAC Address that are currently connected to
the router.
You
can
easily
add
a
particular
client
to
the
Allow
or
Block
list
by
checking
the
box next
to
the
MAC address and selecting Add to insert to the client into the Wireless Client (MAC Address) Filter table.
Page 35 / 88
Billion 400G
Router
Chapter 4: Configuration
32
WPS
The WPS feature uses the Wi-Fi Alliance standard to allow easy set up of security-enabled Wi-Fi networks in the
home and small office environments. WPS supports two connection methods (via the routers Web GUI and through
the push button found on the rear panel) that will significantly reduce the number of steps required to set up the
network.
Port Setting
This section allows you to configure the settings for the router’s Ethernet ports to solve some of the compatibility
problems that may be encountered while connecting to the Internet, as well allowing users to tweak the performance
of their network.
Port
#
Connection
Type:
this
is
where
you
can
customize
the
connection
type
of
each
of
the routers
Ethernet
ports.
There
are
Six
options
to
choose
from:
Auto,
disable,
10M
half-duplex,
10M full-duplex,
100M
half-duplex,
100M
full-duplex
and
Disable.
Sometimes,
there
are
Ethernet
compatibility problems
with
legacy
Ethernet
devices,
and
you
can
configure
a
particular
Ethernet
port
to
one
of
the different
types
to
solve
compatibility
issues.
The
default
is
Auto
,
which
users
should
keep
unless
there are
specific
problems
with
computers
not
being
able
to
access
your
LAN.
IPv4 TOS priority Control (Advanced users):
TOS, Type of Services, is the 2
nd
octet of an IP packet. Bits 6-7 of
this octet are reserved and bit 0-5 are used to specify the priority of the packet.
This feature uses bits 0-5 to classify the packet’s priority. If the packet is high priority, it will flow first and will not be
constrained by the Rate Limit.
Therefore, when this feature is enabled, the router’s Ethernet switch will check the
2
nd
octet of each IP packet. If the value in the TOS field matches the checked values in the table (0 to 63), this
packet will be treated as high priority.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top