Page 11 / 72 Scroll up to view Page 6 - 10
11
of
72
Add/Edit DHCP Reservation
This option lets you reserve IP addresses, and assign the same IP address to the
network device with the specified MAC address any time it requests an IP address. This
is almost the same as when a device has a static IP address except that the device must
still request an IP address from the router. The router will provide the device the same IP
address every time. DHCP Reservations are helpful for server computers on the local
network that are hosting applications such as Web and FTP. Servers on your network
should either use a static IP address or use this option.
Computer Name
You can assign a name for each computer that is given a reserved IP address. This may
help you keep track of which computers are assigned this way. Example:
Game Server
.
IP Address:
The LAN address that you want to reserve.
MAC Address
To input the MAC address of your system, enter it in manually or connect to the router's
Web-Management interface from the system and click the
Copy Your PC's MAC
Address
button.
A MAC address is usually located on a sticker on the bottom of a network device. The
MAC address is comprised of twelve digits. Each pair of hexadecimal digits are usually
separated by dashes or colons such as 00-0D-88-11-22-33 or 00:0D:88:11:22:33. If your
network device is a computer and the network card is already located inside the
computer, you can connect to the router from the computer and click the
Copy Your
PC's MAC Address
button to enter the MAC address.
As an alternative, you can locate a MAC address in a specific operating system by
following the steps below:
Windows 98
Windows Me
Go to the Start menu, select Run, type in
winipcfg
, and hit Enter. A
popup window will be displayed. Select the appropriate adapter from
the pull-down menu and you will see the Adapter Address. This is the
MAC address of the device.
Windows 2000
Windows XP
Go to your Start menu, select Programs, select Accessories, and
select Command Prompt. At the command prompt type
ipconfig /all
and hit Enter. The physical address displayed for the adapter
connecting to the router is the MAC address.
Mac OS X
Go to the Apple Menu, select System Preferences, select Network,
and select the Ethernet Adapter connecting to the router. Select the
Ethernet button and the Ethernet ID will be listed. This is the same as
the MAC address.
Enable
Specifies whether the entry will be active or inactive.
Page 12 / 72
12
of
72
Save/Update
Record the changes you have made into the following list.
Clear
Re-initialize this area of the screen, discarding any changes you have made.
DHCP Reservations List
This shows clients that you have specified to have reserved DHCP addresses. Click the
Enable checkbox at the left to directly activate or de-activate the entry. An entry can be
changed by clicking the Edit icon or can be deleted by clicking the Delete icon. When you
click the Edit icon, the item is highlighted, and the "Edit DHCP Reservation" section is
activated for editing.
WIRELESS (WI-FI)
The wireless section is used to configure the wireless settings for your router. Note that changes
made in this section may also need to be duplicated on wireless clients that you want to connect
to your wireless network.
To protect your privacy, use the wireless security mode to configure the wireless security
features. This device supports three wireless security modes including: WEP, WPA-Personal, and
WPA-Enterprise. WEP is the original wireless encryption standard. WPA provides a higher level
of security. WPA-Personal does not require an authentication server. The WPA-Enterprise option
does require a RADIUS authentication server.
Add Wireless Device with WPS (Wi-Fi Protected Setup) Wizard
This Wizard helps you add wireless devices to the wireless network using the Wi-Fi
Protected Setup protocol.
The wizard will prompt you to enter the PIN for the device, or ask you to press the
configuration button on the device. If the device supports Wi-Fi Protected Setup and has
a configuration button, you can add it to the network by pressing the configuration button
on the device and then the on the router within 60 seconds. The status LED on the router
will flash three times if the device has been successfully added to the network.
There are several ways to add a wireless device to your network. Access to the wireless
network is controlled by a “registrar”. A registrar only allows devices onto the wireless
network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button
on the device. The router acts as a registrar for the network, although other devices may
act as a registrar as well.
Enable Wireless
This option turns off and on the wireless connection feature of the router. When you set
this option, the following parameters are in effect.
Page 13 / 72
13
of
72
Require User Login
This option turns off and on the user login feature of the router. When you enable this
option a wireless user must enter a password to gain access to the the internet. It will
also limit internet access to only 32 simultaneous clients.
Wireless Network Name
When you are browsing for available wireless networks, this is the name that will appear
in the list (unless Visibility Status is set to Invisible, see below). This name is also referred
to as the SSID. For security purposes, it is highly recommended to change from the pre-
configured network name.
Enable Auto Channel Scan
If you select this option, the router automatically finds the channel with least interference
and uses that channel for wireless networking. If you disable this option, the router uses
the channel that you specify with the following
Wireless Channel
option.
Wireless Channel
A wireless network uses specific channels in the wireless spectrum to handle
communication between clients. Some channels in your area may have interference from
other electronic devices. Choose the clearest channel to help optimize the performance
and coverage of your wireless network.
802.11 Mode
If all of the wireless devices you want to connect with this router can connect in the same
transmission mode, you can improve performance slightly by choosing the appropriate
"Only" mode. If you have some devices that use a different transmission mode, choose
the appropriate "Mixed" mode.
Channel Width
The "Auto 20/40 MHz" option is usually best. The other options are available for special
circumstances.
Transmission Rate
By default the fastest possible transmission rate will be selected. You have the option of
selecting the speed if necessary.
Visibility Status
The Invisible option allows you to hide your wireless network. When this option is set to
Visible, your wireless network name is broadcast to anyone within the range of your
signal. If you're not using encryption then they could connect to your network. When
Invisible mode is enabled, you must enter the Wireless Network Name (SSID) on the
client manually to connect to the network.
Security Mode
Unless one of these encryption modes is selected, wireless transmissions to and from
your wireless network can be easily intercepted and interpreted by unauthorized users.
Page 14 / 72
14
of
72
WEP
A method of encrypting data for wireless communication intended to provide the same
level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain
access to a WEP network, you must know the key. The key is a string of characters that
you create. When using WEP, you must determine the level of encryption. The type of
encryption determines the key length. 128-bit encryption requires a longer key than 64-bit
encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange -
alphanumeric characters) format. ASCII format is provided so you can enter a string that
is easier to remember. The ASCII string is converted to HEX for use over the network.
Four keys can be defined so that you can change keys easily. A default key is selected
for use on the network.
Example:
64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid
string of 10 characters for 64-bit encryption.)
128-bit hexadecimal keys are exactly 26 characters in length.
(456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit
encryption.)
64-bit ASCII keys are up to 5 characters in length (DMODE is a valid string of 5
characters for 64-bit encryption.)
128-bit ASCII keys are up to 13 characters in length (2002HALOSWIN1 is a valid string
of 13 characters for 128-bit encryption.)
Note that, if you enter fewer characters in the WEP key than required, the remainder of
the key is automatically padded with zeros.
WPA-Personal and WPA-Enterprise
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security
standards published by the Wi-Fi Alliance. The
WPA Mode
further refines the variant that
the router should employ.
WPA Mode:
WPA is the older standard; select this option if the clients that will be used
with the router only support the older standard. WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard. With the "WPA2" option, the router tries WPA2
first, but falls back to WPA if the client only supports WPA. With the "WPA2 Only" option,
the router associates only with clients that also support WPA2 security.
Cipher Type:
The encryption algorithm used to secure the data communication. TKIP
(Temporal Key Integrity Protocol) provides per-packet key generation and is based on
WEP. AES (Advanced Encryption Standard) is a very secure block based encryption.
With the "TKIP and AES" option, the router negotiates the cipher type with the client, and
uses AES when available.
Group Key Update Interval:
The amount of time before the group key used for
broadcast and multicast data is changed.
Page 15 / 72
15
of
72
WPA-Personal
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key:
The key is entered as a pass-phrase of up to 63 alphanumeric
characters in ASCII (American Standard Code for Information Interchange) format at both
ends of the wireless connection. It cannot be shorter than eight characters, although for
proper security it needs to be of ample length and should not be a commonly known
phrase. This phrase is used to generate session keys that are unique for each wireless
client.
Example:
Wireless Networking technology enables ubiquitous communication
WPA-Enterprise
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients
should have established the necessary credentials before attempting to authenticate to
the Server through this Gateway. Furthermore, it may be necessary to configure the
RADIUS Server to allow this Gateway to authenticate users.
Authentication Timeout:
Amount of time before a client will be required to re-
authenticate.
RADIUS Server IP Address:
The IP address of the authentication server.
RADIUS Server Port:
The port number used to connect to the authentication server.
RADIUS Server Shared Secret:
A pass-phrase that must match with the authentication
server.
MAC Address Authentication:
If this is selected, the user must connect from the same
computer whenever logging into the wireless network.
Advanced:
Optional Backup RADIUS Server
This option enables configuration of an optional second RADIUS server. A second
RADIUS server can be used as backup for the primary RADIUS server. The second
RADIUS server is consulted only when the primary server is not available or not
responding. The fields
Second RADIUS Server IP Address
,
RADIUS Server Port
,
Second RADIUS server Shared Secret
,
Second MAC Address Authentication
provide the corresponding parameters for the second RADIUS Server.

Rate

4 / 5 based on 1 vote.

Popular Kyocera Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top