Page 36 / 155 Scroll up to view Page 31 - 35
VoIP/(802.11g) ADSL2+ (VPN) Firewall Router
Chapter 4: Configuration
35
TX PowerLevel:
It is function that enhances the wireless transmitting signal strength.
User may
adjust this power level from minimum 0 up to maximum 255.
Note:
The Power Level maybe different in each access network user premises environment and choose the most
suitable level for your network.
Connected:
Representing in
true
or
false
. That it is the connection status between the system and the
build-in wireless card.
AP MAC Address:
It is a unique hardware address of the Access Point.
AP Firmware Version:
The Access Point firmware version.
Wireless Distribution System (WDS)
It is a wireless access point mode that enables wireless link and communication with other access point.
It is easy to be installed simply define peer’s MAC address of the connected AP.
WDS takes advantages
of cost saving and flexibility which no extra wireless client device is required to bridge between two
access points and extending an existing wired or wireless infrastructure network to create a larger
network.
In addition, WDS enhances its link connection security in WEP mode, WEP key encryption must be the
same for both access points.
WDS Service:
The default setting is
Disabled.
Check
Enable
radio button to activate this function.
Peer WDS MAC Address:
It is the associated AP’s MAC Address.
It is important that your peer’s AP
must include your MAC address in order to acknowledge and communicate with each other.
Note:
For MAC Address, Semicolon ( : ) must be included.
Page 37 / 155
VoIP/(802.11g) ADSL2+ (VPN) Firewall Router
Chapter 4: Configuration
36
Wireless Security (Wireless Router only)
You can disable or enable with WPA or WEP for protecting wireless network.
The default mode of wireless security is
disabled
.
WPA-PSK (TKIP) / WPA-PSK (AES) Pre-Shared Key
WPA Algorithms:
There are two types of the WPA-PSK, WPA1 and WPA2.
The WPA1 adapts the TKIP
(Temporal Key Integrity Protocol) encrypted algorithms which incorporates Message Integrity Code (MIC)
to provide protection against hackers. The WPA2 adapts CCMP (Cipher Block Chaining Message
Authentication Code Protocol) of the AES (Advanced Encryption Security) algorithms.
WPA Shared Key:
The key for
network authentication. The input format is in character style and key size
should be in the range between 8 and 63 characters.
Group Key Renewal:
The period of renewal time for changing the security key automatically between
wireless client and Access Point (AP).
Default value is
3600
seconds.
Idle Timeout:
The default idle timeout is
3600
seconds.
A Timeout value base on the case of no data
traffic is send or received. If Router detects no traffic in the wireless, it will start timing the clock and drop
the session as it reaches to the defined timeout value. New session will be re-established after the old
session.
Page 38 / 155
VoIP/(802.11g) ADSL2+ (VPN) Firewall Router
Chapter 4: Configuration
37
WEP
WEP Encryption:
To prevent unauthorized wireless stations from accessing data transmitted over the
network, the router offers highly secure data encryption, known as WEP. If you require high security for
transmissions, there are two alternatives to select from:
WEP 64 and WEP 128
. WEP 128 will offer
increased security over WEP 64.
Passphrase:
This is used to generate WEP keys automatically based upon the input string and a
pre-defined algorithm in WEP64 or WEP128.
Default Used WEP Key:
Select the encryption key ID;
please refer to
Key (1~4)
below.
Key (1-4):
Enter the key to encrypt wireless data. To allow encrypted data transmission, the WEP
Encryption Key values on all wireless stations must be the same as the router. There are four keys for
your selection. The input format is in HEX style, 5 and 13 HEX codes are required for WEP64 and
WEP128 respectively, the separator is “-“. For example, using WEP64, 11-22-33-44-55 is a valid key,
whilst 1122334455 is invalid.
Page 39 / 155
VoIP/(802.11g) ADSL2+ (VPN) Firewall Router
Chapter 4: Configuration
38
Wireless Client / MAC Address Filter
(Wireless Router only)
The MAC Address supports up to 16 wireless network machines and helps you to manage your network
control to accept traffic from specific authorized machines or to restrict unwanted machine(s) to access
your LAN.
There are no pre-define MAC Address filter rules; you can add the filter rules to meet your requirements.
Wireless Client Filter:
Default setting is set to
Disable
.
~
Allowed:
To authorize specific device accessing your LAN by insert the MAC Address in the
space provided or click
.
Make sure your PC’s MAC is listed.
~
Blocked:
To prevent unwanted device accessing the LAN by insert the MAC Address in the
space provided or click
. Make sure your PC’s MAC is not listed.
The maximum client is 16.
The MAC addresses are 6 bytes long; they are presented only in
hexadecimal characters.
The number
0
-
9
and letters
a
-
f
are acceptable.
The maximum client is 16.
The MAC addresses are 6 bytes long; they are presented only in
hexadecimal characters.
The number
0
-
9
and letters
a
-
f
are acceptable.
Note:
Follow the MAC Address Format xx:xx:xx:xx:xx:xx.
Semicolon ( : ) must be included.
Candidates:
it automatically detects devices connected to the router through the Wireless. .
Associated Wireless Clients
Associate Wireless Client displays a list of individual wireless device’s MAC Address that currently
connects to the router.
You can easily by checking the box next to the MAC address to be blocked or allowed. Then,
Add
to
insert to the Wireless Client (MAC Address) Filter table.
The maximum Wireless client is 16.
Page 40 / 155
VoIP/(802.11g) ADSL2+ (VPN) Firewall Router
Chapter 4: Configuration
39
Port Setting
This section allows you to configure the settings for the router’s Ethernet ports to solve some of the
compatibility problems that may be encountered while connecting to the Internet, as well allowing users to
tweak the performance of their network.
Port # Connection Type:
There are Six options to choose from: Auto, disable, 10M half-duplex, 10M
full-duplex, 100M half-duplex, 100M full-duplex and Disable. Sometimes, there are Ethernet compatibility
problems with legacy Ethernet devices, and you can configure different types to solve compatibility issues.
The default is
Auto
, which users should keep unless there are specific problems with PCs not being able
to access your LAN.
IPv4 TOS priority Control (Advanced users):
TOS, Type of Services, is the 2
nd
octet of an IP packet.
Bits 6-7 of this octet are reserved and bit 0-5 are used to specify the priority of the packet.
This feature uses bits 0-5 to classify the packet’s priority. If the packet is high priority, it will flow first and
will not be constrained by the Rate Limit.
Therefore, when this feature is enabled, the router’s Ethernet
switch will check the 2
nd
octet of each IP packet. If the value in the TOS field matches the checked values
in the table (0 to 63), this packet will be treated as high priority.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top