Page 81 / 97 Scroll up to view Page 76 - 80
11N Broadband Wireless Router
.
77
4.
OK:
Click to activate your settings.
Note:
1.
To access the device via port 8080, enter "http://x.x.x.x:8080" where
"x.x.x.x" represents the the device's Internet IP address and 8080 is the
remote admin port. Assuming the device's Internet IP address is
220.135.211.56, then, simply replace the "x.x.x.x" with "220.135.211.56"
2.
Leaving the IP address field at "0.0.0.0" makes the device remotely
accessible to all the PCs on Internet or other external networks; populating
it with a specific IP address, say, 218.88.93.33, makes the device only
remotely accessible to the PC at the specified IP address
.
6.6 Time
This page is used to set the router’s system time. You can choose to set the time
manually or get the GMT time from the Internet and the system will
automatically connect to NTP server to synchronize the time.
Note:
Configured time and date info will be lost when the device gets disconnected
from power supply. However, it will be updated automatically when the device
reconnects to Internet. To activate time-based features (e.g. firewall), the time
and date info shall be set correctly first, either manually or automatically.
6.7 Login Password
This section allows you to change login password for accessing device’s
Page 82 / 97
11N Broadband Wireless Router
.
78
Web-based interface for better security.
1.
New Password:
Enter a new password, say, 12345 (Note that the
password can only be alphanumeric).
2.
Confirm New Password
: Re-enter the new password for confirmation.
3.
OK:
Click to activate your settings.
Note:
For security purpose, it is highly recommended that you change Device's default
login password.
6.8 Firmware Upgrade
Firmware upgrade is released periodically to improve the functionality of your
device and also to add new features. If you run into a problem with a specific
feature of the device, log on to our website (www.tendacn.com) to download the
latest firmware to update your device.
Page 83 / 97
11N Broadband Wireless Router
.
79
1.
Browse:
Click to locate and select the firmware.
2.
Upgrade (or Update):
Click to update firmware. Device will restart
automatically when update completes.
Note:
1. Before you upgrade the firmware, making sure you are having a correct
firmware. A wrong firmware may damage the device.
2. Do NOT upgrade the firmware wirelessly or disconnect device from power
supply while firmware update is in process. Note that you need to update the
device's firmware via a wired connection.
Page 84 / 97
11N Broadband Wireless Router
.
80
Appendix 1 Glossary
Channel
A communication channel, also known as channel, refers either to a physical
transmission medium such as a wire or to a logical connection over a
multiplexed medium such as a radio channel. It is used to transfer an information
signal, such as a digital bit stream, from one or more transmitters to one or more
receivers. If there is only one AP in the range, select any channel you like. The
default is
Auto
.
If there are several APs coexisting in the same area, it is advisable that you select
a different channel for each AP to operate on, minimizing the interference
between neighboring APs. For example, if 3 American- standard APs coexist in
one area, you can set their channels respectively to 1, 6 and 11 to avoid mutual
interference.
SSID
Service set identifier (SSID) is used to identify a particular 802.11 wireless LAN.
It is the name of a specific wireless network. To let your wireless network
adapter roam among different APs, you
must set all APs’ SSID to the same
name.
WPA/WPA2
The WPA protocol implements the majority of the IEEE 802.11i standard. It
enhances data encryption through the Temporal Key Integrity Protocol (TKIP)
which is a 128-bit per-packet key, meaning that it dynamically generates a new
key for each packet. WPA also includes a message integrity check feature to
prevent data packets from being hampered with. Only authorized network users
can access the wireless network. The later WPA2 protocol features compliance
with the full IEEE 802.11i standard and uses Advanced Encryption Standard
(AES) in addition to TKIP encryption protocol to guarantee better security than
that provided by WEP or WPA. Currently, WPA is supported by Windows XP
SP1.
IEEE 802.1X Authentication
IEEE 802.1X Authentication is an IEEE Standard for port-based Network
Access Control (PNAC). It is part of the IEEE 802.1 group of networking
protocols. It provides an authentication mechanism to devices wishing to attach
Page 85 / 97
11N Broadband Wireless Router
.
81
to a LAN or WLAN.IEEE 802.1X defines the encapsulation of EAP over LAN
or EAPOL. 802.1X authentication involves three parties: a supplicant, an
authenticator, and an authentication server. The supplicant is a client device
(such as a laptop) that wishes to attach to the LAN/WLAN - though the term
'supplicant' is also used interchangeably to refer to the software running on the
client that provides credentials to the authenticator. The authenticator is a
network device, such as an Ethernet switch or wireless access point; and the
authentication server is typically a host running software supporting the
RADIUS and EAP protocols. The authenticator acts like a security guard to a
protected network. The supplicant (i.e. client device) is not allowed access
through the authenticator to the protected side of the network until the
supplicant’s identity has been validated and authorized.
With 802.1X port-based
authentication, the supplicant provides credentials, such as user name / password
or digital certificate, to the authenticator, and the authenticator forwards the
credentials to the authentication server for verification. If the authentication
server determines the credentials are valid, the supplicant (client device) is
allowed to access resources located on the protected side of the network.
PPPOE
The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for
encapsulating PPP frames inside Ethernet frames. Integrated PPP protocol
implements
authentication,
encryption,
and
compression
functions
that
traditional Ethernet cannot provide and can also be used in the cable modem and
digital subscriber line (DSL) and Ethernet that provide access service to the
users. Essentially, it is a protocol that allows to establish a point-to-point tunnel
between two Ethernet interfaces within an Ethernet broadcast domain.
DNS
The Domain Name System (DNS) is a hierarchical distributed naming system
for computers, services, or any resource connected to the Internet or a private
network. It associates various information with domain names assigned to each
of the participating entities. A Domain Name Service resolves queries for these
names into IP addresses for the purpose of locating computer services and
devices worldwide. An often-used analogy to explain the Domain Name System
is that it serves as the phone book for the Internet by translating human-friendly
computer hostnames into IP addresses.

Rate

3.5 / 5 based on 2 votes.

Popular Tenda Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top