Page 101 / 178 Scroll up to view Page 96 - 100
Back to Top
Back to Contents Page
Page 102 / 178
Back to Contents Page
How to Configure the Router by the Control Utility: Dell™
TrueMobile™ 2300 Wireless Broadband Router User's Guide
My Network Overview
Wireless Settings
Network Access Control
Gaming
Remote Access
Administration
Diagnostics
Advanced Settings
My Network Overview
The information on this menu provides you a general overview of your network status. On the left side of the
screen, it displays the status of current connection to your router. The status will update when you click the
Refresh button. On the right side, you can see the basic facts about your router. These items are as below:
Operation Mode
Connection Type
Internet IP Address
WAN MAC Address
LAN IP Address
Netmask
Network Name (SSID)
WEP Functionality
Back to Top
Wireless Settings
Network Name and Channel are necessary for enabling a wireless network.
Network Name (SSID)
- a unique network name, also called SSID (Service Set Identifer). It is used to identify the
WLAN. When a mobile device tries to connect to the router, the user must know the router's SSID first.
Channel
- the radio channel over which a communication transmission occurs. The operating channel number depends
on the regulatory domain.
The Wireless Broadband Router provides advanced mechanism for wireless security. It ensures the confidentiality of data, and
also guards data against being modified. If you want to enable the security mechanism, check the
Enable Wireless Security
box. Select either
WEP
or
WPA
in
Network Authentication
.
WEP
Page 103 / 178
Wired Equivalent Privacy (WEP) encryption used in the 802.11 standard is to protect wireless communication from
eavesdropping. WEP provides a way of creating an encrypted key that is shared between a wireless client (such as a notebook
with a wireless PC card) and the router. This key encrypts data before it is transmitted. WEP can be implemented with 40(64)-
bit or 104(128)-bit key. Basically, the larger key length is relatively more secure for your data. For added security, change your
key often. When you change the key on one wireless device, remember that it must be changed for all wireless devices and
access points in the network.
Key Format
: It could be in ASCII or hexadecimal format. Hexadecimal digits include the numbers 0 to 9 and the letters
A to F. ASCII format allows you to enter any characters.
Key Length
: It could be either 40(64)-bit or 104(128)-bit key length. Some wireless network cards are only able to use
40(64)-bit encryption. If all your clients are able to communicate at 104(128)-bit choose 104(128)-bit. If any client is only
able to communicate at 40(64)-bit, choose 40(64)-bit.
Key1
,
Key2
,
Key3
, and
Key4
: Enter four different keys in the Key fields provided to store on the Wireless Broadband
Router. If you choose 40(64)-bit encryption, enter a 5-character (or 10 hexadecimal digits). For 104(128)-bit encryption,
enter a 13-character (or 26 hexadecimal digits) WEP key.
Default Key
: Select only one key out of the four provided in the Default Key applied for encryption drop-down list.
WPA
WPA is an upgrade to the WEP (Wired Equivalent Privacy) standard for securing your wireless network.
If you would like to secure your wireless network using WPA, you will need the following:
WPA enabled on your Dell TrueMobile 2300 Wireless Broadband Router
WPA support for your wireless clients. If you are using a Dell TrueMobile wireless client, you can check for the
availability of WPA enabled software update for your wireless client at
.
Enter the fields with the required parameters.
WPA Pre-shared Key
: WPA Pre-Shared Key (PSK) is a field where the password is entered. All wireless clients must
also use this password to gain access to the network. Note that the Key format must also match the setting for the
wireless clients.
Key Format
: Key Format is a box that lists 2 items:
Hexadecimal
Digits (numbers 0-9 and letters A-F only) and
ASCII
Characters (any letter, number, or symbol). Select the proper format for your key. If your wireless client(s) only support
one of the two formats, be sure to specify the correct one.
WPA Group Rekey Interval
: WPA Group Rekey Interval is used to specify the frequency of encryption key rotations.
The lower the number, the faster your encryption key will rotate, however, setting this number too low may cause your
wireless network to slow down.
WPA Encryption
: WPA Encryption has 2 choices:
TKIP
(Temporal Key Integrity Protocol) - it is the most commonly
used encryption method and
AES
(Advanced Encryption Standard) - it can be used if your wireless clients do not
support TKIP.
Click the
Factory Default Value
button to reset the wireless settings to its factory defaults.
Click the
Apply
button to save the settings.
Click the
Restore
button to restore to its previous settings.
Back to Top
Network Access Control
Buttons
Actions
Add
Click "Add" button to add an new entry in the list.
Page 104 / 178
Edit
Click on the record needs to be modified in the list and then click "Edit" button. Then, a
dialog box will appear for you to edit it.
Delete
If you want to delete the record from the list, click on the record you want to delete and
then click "Delete" button to remove it from the list.
Delete All
Click "Delete All" button to delete all the records in the list.
Restore
Click the "Restore" button to restore to the previous settings.
Parental Control
In the wake of increasing concern by parents about inappropriate content on the Internet, the router provides
parental control function to filter and block inappropriate website (such as sex and violence related sites). Parental
Control enables you to determine what website your children can and cannot access. It also allows you to specify
what time children can access the Internet.
Step-by-step to add an new entry
1. Check the
Enable Parental Control
box.
2. Click
Add
button. A pop-up
Parental Control
window will appear.
3. Enter the IP address of the computer you want to control (for example, your child's computer) in the
Host
IP
field.
4. Select
Allowed
or
Denied
from the
Internet Access
list.
5. Decide the time
Interval
. Check the radio button of
Permanent
if this rule always applies or specify a
period of time for Internet access control.
6. Select
allow
or
deny
for web access.
7. Specify which website is allowed / denied by entering its URL in the
Website URL
field.
8. Click the
OK
button to apply. Or click the
Cancel
button to exit without making any change.
9. Click the
Apply Parental Control Settings
button on the bottom of the screen to activate the new
settings.
MAC
This feature filters specific MAC (Media Access Control) addresses within the wireless local area network (WLAN)
from accessing the network.
Step-by-step to add an new entry
1. Check the
Enable MAC Access Control
box. The following
MAC Access Control Settings
window will
appear.
2. Click
Add
button. A pop-up
MAC Access Control: Add Entry
window will appear.
3. Enter the hexadecimal characters of the MAC address (for example, 00:11:22:33:44:55) that you want to
grant or deny the access in
Host MAC
box.
4. Select
Grant
or
Deny
from the
Operating Type
list. If you select Grant, the device with this MAC Address
is allowed to access the network, and the device with other MAC address will be filtered and denied to
access the network.
NOTE: The operating type for
ALL
records MUST be either Grant or Deny.
5. Click the
OK
button to apply. Or click the
Cancel
button to exit without making any change.
6. You can click on the selected record and click again on its
Host Name
to enter the desired name for this
record.
7. Click the
Apply MAC Control Settings
button on the bottom of the screen to activate the new settings.
Back to Top
Gaming
In some cases, the firewall feature of the router will cause a game not to function as intended. The settings listed
on the
Gaming
menu can solve these problems. This section will guide you how to configure the device for
gaming.
Your TrueMobile 2300 Router has an integrated Network Address Translation (NAT) firewall that rejects any
unsolicited data from the Internet to access the computer on your LAN. Basically, if you do not request data, the
Page 105 / 178
data will not be allowed by the firewall to pass. Applications like email and web browsing are unaffected by NAT
because in each case, you make this request to receive the email or web page. However, some applications
(such as Internet messaging and gaming applications) will not function correctly. It is because the requests for
data do not originate from your computer but from a device/computer out on the Internet, and the NAT firewall
blocks the data needed for those applications.
Port Forwarding Settings
You can configure on this
Gaming
menu to create a custom rule that defines a specific port and protocol for
unsolicited traffic to pass through to that computer. The ports for gaming and the protocol type (TCP, UDP, or
both) will depend on what gaming service you are using. Make sure you have the following ports setup as
described below.
Information:
Port Number
The port number identifies the protocol or service. Those from 0 through 1023 are the most
commonly used port numbers and have been agreed as the standardized ports for specific kind
of servers. For example, port 80 typically always indicates HTTP traffic. Those from 1024
through 49151 are used for many purposes, while those from 49152 through 65535 are
Dynamic/Private Ports (they are rarely used). You can check the status of current IP connections
by simply entering
netstat -a
on the command line (Click
Start
and then click
Run
. Type
cmd
,
and press Enter. On the command prompt, type
netstat -a
). It will display all connections and
listening ports.
1. Click
Add
button on the bottom the screen. A pop-up
Gaming: New Record
window will appear (as
shown below).
If you want to edit the gaming profile in the list, click on the profile you want to modify and then click Edit
button. Then, a pop-up Gaming: Edit Record window will appear for you to edit it.
If you want to delete the gaming profile from the list, click on the profile you want to delete and then click
Delete button to remove it from the list.
If you want to delete all the gaming profiles in the list, click Delete All button to remove all the entries in
the list.
2. Enter the desired name or description in the
Game Description
field.
3. Enter the IP address of the device (e.g. desktop PC) for gaming in the
Computer IP for gaming
field.
4. Select a transport layer protocol from the
Protocol Type
list. The options listed here are TCP
(Transmission Control Protocol), UDP (User Datagram Protocol), and both.
5. Enter the incoming port number in the
Incoming Port No.
field and the outgoing port number in the
Outgoing Port No.
(also called
Destination Port
) field. The information should be available from your
gaming service provider.
NOTE: The minimum port number is 0, and the maximum port number is 65535.
For example, if you want to play online game "Diablo II" (Battle.net) on your PC with the IP Address
192.168.2.3, enter
192.168.2.3
in the Host IP field. Select
Both
from the Protocol Type list. Then enter
4000
or
6112-6119
in the Incoming Port No. field and also in Outgoing Port No. (or called Destination Port
No.) field.
6. Select
Enable
or
Disable
the gaming from the
State
list.
7. Click the
OK
button to apply. Or click the
Cancel
button to exit without making any change.
DMZ
Some applications have problems to work behind a firewall. You can put the computer running this application
outside the firewall, either physically, or via the router's DMZ (demilitarized zone) feature.
Place the computer into the router's DMZ would let the router allow all data to pass through all ports of the router
to this computer. It disables the NAT firewall for that computer and leaves that computer vulnerable to attack, so it
is inherently less secure. It is recommended to do this only on the computer that has no important data.
1. Check the
Enable DMZ Host
box.
2. Type the IP address of the computer that you want to run the gaming application in the
DMZ IP Address
field.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top