Page 26 / 50 Scroll up to view Page 21 - 25
Velocity Series User Guide
YML803X
±6
www.netcomm.com.au
Enable 802.1x Authentication
IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless
LAN. The authentication is processed by a RADIUS server. This mode only authenticates users by IEEE 802.1x, but it does not encrypt the
data during communication.
WEP Encryption
When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by yourself and enter it.
You can enter four WEP keys and select one of them as a default key. Then the router can receive any packets encrypted by one of the four
keys.
Authentication Type: There are two authentication types: “Open System” and “Shared Key”. When you select “Open System”, wireless
stations can associate with this wireless router without WEP encryption. When you select “Shared Key”, you should also setup a WEP key
in the “Encryption” page. After this has been done, make sure the wireless clients that you want to connect to the device are also setup
with the same encryption key.
Key Length: You can select the WEP key length for encryption, 64-bit or 128-bit. The larger the key will be the higher level of security is
used, but the throughput will be lower.
Key Type: You may select ASCII Characters (alphanumeric format) or Hexadecimal Digits (in the “A-F”, “a-f” and “0-9” range) to be the WEP
Key.
Key1 - Key4: The WEP keys are used to encrypt data transmitted in the wireless network. Use the following rules to setup a WEP key on
the device. 64-bit WEP: input 10-digits Hex values (in the “A-F”, “a-f” and “0-9” range) or 5-digit ASCII character as the encryption keys.
128-bit WEP: input 26-digit Hex values (in the “A-F”, “a-f” and “0-9” range) or 13-digit ASCII characters as the encryption keys.
Click <Apply> at the bottom of the screen to save the above configurations. You can now configure other sections by choosing Continue,
or choose Apply to apply the settings and reboot the device.
WPA Pre-Shared Key Encryption
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless stations and
encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. So the encryption key is not easy
to be cracked by hackers. This is the best security available.
Page 27 / 50
YML803X
Velocity User Guide
803X
Velocity User Guide
X
Velocity User Guide
Velocity User Guide
www.netcomm.com.au
±7
NetComm Velocity
TM
Series - Wireless N150/N300 Router
WPA-Radius Encryption
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use an external RADIUS server to authenticate wireless stations
and provide the session key to encrypt data during communication.
It uses TKIP or CCMP (AES) to change the encryption key frequently. Press <Apply> button when you are done.
MAC Address Filtering
This wireless router supports MAC Address Control, which prevents unauthorized clients from accessing your wireless network.
Enable wireless access control: Enable the wireless access control function
Adding an address into the list
Enter the “MAC Address” and “Comment” of the wireless station to be added and then click <Add>. The wireless station will now be added
into the “Current Access Control List” below. If you are having any difficulties filling in the fields, just click “Clear” and both “MAC Address”
and “Comment” fields will be cleared.
Remove an address from the list
If you want to remove a MAC address from the “Current Access Control List “, select the MAC address that you want to remove in the
list and then click “Delete Selected”. If you want to remove all the MAC addresses from the list, just click the <Delete All> button. Click
<Reset> will clear your current selections.
Click <Apply> at the bottom of the screen to save the above configurations.
Page 28 / 50
Velocity Series User Guide
YML803X
±8
www.netcomm.com.au
Wi-Fi Protected Setup (WPS)
WPS is the simplest way to establish a connection between wireless clients and the wireless router. You don’t have to select the encryption
mode and fill in a passphrase. You only need to press a button on both wireless client and wireless router, and the WPS will do the rest for you.
The wireless router supports two types of WPS. WPS via Push Button –
you have to push a specific button on the wireless client or in your
wireless client utility to start the WPS mode, and switch the wireless router to WPS mode. You can simply click the ‘Start to Process’ button in
the web configuration interface. WPS via PIN code – you have to know the PIN code of the wireless client and switch it to WPS mode, then input
the wireless client PIN to the wireless router web interface.
WPS: Check the box to enable WPS function and uncheck it to disable the WPS function.
WPS Current Status: If the wireless security (encryption) function of this wireless router is properly set, you’ll see a ‘Configured’ message
here. Otherwise, you’ll see ‘UnConfigured’.
Self Pin Code: This is the WPS PIN code of the wireless router. You may need this information when connecting to other WPS-enabled
wireless devices.
SSID: This is the network broadcast name (SSID) of the router.
Authentication Mode: It shows the active authentication mode for the wireless connection.
Passphrase Key: It shows the passphrase key that is randomly generated by the wireless router during the WPS process. You may need
this information when using a device which doesn’t support WPS.
Interface: If the device is set to repeater mode, you can choose “Client” interface to connect with other AP by using WPS, otherwise you
may choose “AP” interface to do WPS with other clients.
WPS via Push Button: Press the button to start the WPS process. The router will wait for the WPS request from the wireless devices within
± minutes.
WPS via PIN: You can fill-in the PIN code of the wireless device and press the button to start the WPS process. The router will wait for the
WPS request from the wireless device within 2 minutes.
Client List
This WLAN Client Table shows the Wireless client associate to this Wireless Router.
Page 29 / 50
YML803X
Velocity User Guide
803X
Velocity User Guide
X
Velocity User Guide
Velocity User Guide
www.netcomm.com.au
±9
NetComm Velocity
TM
Series - Wireless N150/N300 Router
Firewall Settings
The Broadband router provides extensive firewall protection by restricting connection parameters, thus limiting the risk of hacker attacks, and
defending against a wide array of common Internet attacks. However, for applications that require unrestricted access to the Internet, you can
configure a specific client/server as a Demilitarized Zone (DMZ).
Note: To enable the Firewall settings select Enable and click Apply
Demilitarized Zone (DMZ)
If you have a client PC that cannot run an Internet application (e.g. Games) properly from behind the NAT firewall, then you can open up the
firewall restrictions to unrestricted two-way Internet access by defining a DMZ Host. The DMZ function allows you to re-direct all packets
going to your WAN port IP address to a particular IP address in your LAN. The difference between the virtual server and the DMZ function is
that the virtual server re-directs a particular service/Internet application (e.g. FTP, websites) to a particular LAN client/server, whereas DMZ
re-directs all packets (regardless of services) going to your WAN IP address to a particular LAN client/server.
Enable DMZ: Enable/disable DMZ
LAN IP Address: Fill-in the IP address of a particular host in your LAN Network that will receive all the packets originally going to the WAN
port/Public IP address above.
Click <Apply> at the bottom of the screen to save the above configurations.
Denial of Service (DoS)
The Broadband router’s firewall can block common hacker attacks, including Denial of Service, Ping of Death, Port Scan and Sync Flood. If
Internet attacks occur the router can log the events.
Ping of Death:
Protections from Ping of Death attack.
Discard Ping From WAN: The router’s WAN port will not respond to any Ping requests
Port Scan: Protects the router from Port Scans.
Sync Flood: Protects the router from Sync Flood attack.
Page 30 / 50
Velocity Series User Guide
YML803X
30
www.netcomm.com.au
MAC Filter
If you want to restrict users from accessing certain Internet applications / services (e.g. Internet websites, email, FTP etc.), and then this is
the place to set that configuration. Access Control allows users to define the traffic type permitted in your LAN. You can control which PC
client can have access to these services.
Enable MAC Filtering: Check to enable or disable MAC Filtering.
Deny: If you select “Deny” then all clients will be allowed to access Internet except for the clients in the list below.
Allow: If you select “Allow” then all clients will be denied to access Internet except for the PCs in the list below.
Add PC MAC Address
Fill in “LAN MAC Address” and <Description> of the PC that is allowed to access the Internet, and then click <Add>. If you find any typo
before adding it and want to retype again, just click <Reset> and the fields will be cleared.
Remove PC MAC Address
If you want to remove some PC from the “MAC Filtering Table”, select the PC you want to remove in the table and then click <Delete
Selected>. If you want to remove all PCs from the table, just click the <Delete All> button. If you want to clear the selection and re-select
again, just click <Reset>.
Click <Apply> at the bottom of the screen to save the above configurations.
IP Filter
Enable IP Filtering: Check to enable or disable IP Filtering.
Deny: If you select “Deny” then all clients will be allowed to access Internet except for the clients in the list below.
Allow: If you select “Allow” then all clients will be denied to access Internet except for the PCs in the list below.
Add PC IP Address
You can click <Add> PC to add an access control rule for users by an IP address or IP address range.
Remove PC IP Address
If you want to remove some PC IP from the <IP Filtering Table>, select the PC you want to remove in the table and then click <Delete
Selected>. If you want to remove all PCs from the table, just click the <Delete All> button.
Click <Apply> at the bottom of the screen to save the above configurations.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top