Home
User Manual ADN-4100v3
Contents
1. Description Y Local IP Start The started IP address of the local network The valid numbers of local IP addresses It works Local IP Num together with the Local IP Start to determine the range of the local IP addresses Remote IP Start The started IP address of the remote network The valid numbers of remote IP addresses It works Remote IP Num together with the Remote IP Start to determine the range of the remote IP addresses It is valid for both the local network and the remote Netmask network Tunnel s Used The number means which PPTP tunnel have be used S Tunnel s Availiable The number means how many PPTP are available 73 Clicks add the page as shown in the following figure appears ADD PPTP ACCOUNT Username Password The following table describes the parameters in this page Description Fiad Description modem to the PPTP modem to the PPTP 3 3 10 11 IPSec In the NETWORK TOOLS page click IPSEC The page as shown in the following figure appears Add delete IPSec tunnel connections in this page IPSEC TUNNEL MODE CONNECTIONS C Enable IPSEC tame RemoteGateway Local Addresses Remote Addresses Interface In this page you can add edit and delete the IPSec tunnel connections Select Enable IPSEC and click Add the page as shown in the following figure appears 74 Add delete IPSec tunnel connections in this page IPSEC TUNNEL MODE CONNECTIONS V Enable IP
2. Enter the name that identifies your configuration For example kids Current PC s MAC Enter the MAC address of the computer that connects Address to the device Enter the MAC address of another device that is Other MAC Address included in MAC filtering User Name Select the time of MAC filter from the drop down list Schedule You can select always or never If you select this check box you need to manually set Manual Schedule i a the time of MAC filtering Enter the use name and MAC address Select the corresponding time and days Then click Apply to add the MAC address to the BLOCK MAC ADDRESS table The page as shown in the following figure appears 50 BLOCK MAC ADDRESS This page adds a time of day restriction to a special LAN device connected to the router The Current PC s MAC Address automatically displays the MAC address of the LAN device where the browser is running To restrict another LAN device click the Other MAC Address button and enter the MAC address of the other LAN device To find out the MAC address of a Windows based PC open a command prompt window and type ipconfig all Mac Filtering Global Policy BLACK_LIST Allow all packets but DENY those matching any of specific rules listed WHITE_LIST Deny all packets but ALLOW those matching any of specific rules listed BLOCK MAC ADDRESS BLACKLIST O B OOZ ays 3 3 5 Filtering Options Choose Advanced g
3. cisccocccossasausssueguesvocsioccecesseceseaseeusevseseesecsocen 44 33 DM A a 47 3 3 4 Parental Control sicccssscscecoccwsscavessassoussvesssnosesveassscassenatescstnssess 47 33A ABIOCK WeDSIGG sitne aa ae 48 DIAZ MAC Fiter oie a 49 3 3 5 Flterme Options enoni A 51 Dedede Ns PFN a 52 3 3 5 2 Bridge PUN Orin Os isc cescsssdecssecsvccadcsecessasvseceseasecnssceccececers 54 3 3 6 OOS COMMBUT ALON soiccoscasdeessnussiucsedsdentocepeueescdebevveeceveeseccooeons 55 3 3 6 1 QoS Global Option ccccccccccccccsccccsccccscsccssseseseees 56 3 3 6 2 Queue Configuration cccsssssssccccccccccccccscceeees 56 3 3 6 3 Classification Configuration esscscssssssesececeeoceocosso 57 3 3 7 Firewall Settings sssssisssssscesisssscsisesrecsssesssesosissoosaedissssasis osdaoes 59 33S DNS E ASS 59 3 3 9 Dynami DNS soesto r 61 3 3 10 Network TOONS sisis csssuseccstiescacssadecdedessieosseebsedeccdecdacsdesecdecees 62 DO LOL Port Mappia sereo aeoe ae 64 3 3 10 2 IGMP PROXY iioi EEEN 65 3 3 10 3 IGMP Snooping essssssccssssssscsecccecoccccccssssssssscccceeeooooo 66 IALA UPnP naiai a sasessecsesseasezeonnes 66 D296 1035 ADSL Seu oS pic cescnsccecsissceirssetdesceesscuaaeeeseesssesstoaseconsens 67 33 100 SNM E piecsccncsccsd eas chasuiacetsadesssscstaeessssceussbencseusosvessoneune 68 DRAE E E E E 69 DiS LE a N E i E A E E E AA 69 3 9 10 9 Certificates sais sin e E 71 DiS LODO PP LY a suvesseuteveecsssecosedceseseats 72 D
4. 2012 If used outside of own premises general ltaly oo authorization is required o Russian Federation General authorization required for network and service supply not for spectrum This subsection does not apply for the geographical area within a radius of 20 km from the centre of Ny lesund Only for indoor applications English nll eutsch Eestikeeles Fran ais Latviski Q PLANET Networking amp Communication EC Declaration of Conformi Hereby PLANET Technology Corporation declares that this Wireless Access Point is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Spole nost PLANET Technology Corporation timto prohlasuie Ze tato Wireless Access Point i sme rnice 1999 5 EC PLANET Technology Corporation erkl rer herved at f lgende udstyr Wireless Access Point overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF Hiermit erkl rt PLANET Technology Corporation dass sich dieses Ger t Wireless Access Point in bereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999 5 EG befindet EMA K esolevaga kinnitab PLANET Technology Corporation et see Wireless Access Point vastab Euroopa N ukogu direktiivi 1999 5 EC pohinduetele ja muudele olulistele tingimustele ME THN NAPOYZA PLANET Technology Corporation AMANE OTT AYTO Wireless Acce
5. PLANET Networking amp Communication User s Manual 802 11n Wireless ADSL 2 2 Router www PLANET com Ew Copyright Copyright 2012 by PLANET Technology Corp All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in any form or by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of PLANET PLANET makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Further this company reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation to notify any person of such revision or changes All brand and product names mentioned in this manual are trademarks and or registered trademarks of their respective holders Federal Communication Commission Interference Statement This equipment has been
6. BLOCK WEBSITE table The page as shown in the following figure appears 48 BLOCK WEBSITE This page allows you to block websites If enabled the websites listed here will be denied access to clients trying to browse that website BLOCK WEBSITE ee S 6B a Add Est Delete 3 3 4 2 MAC Filter In the PARENTAL CONTROL page click MAC Filter The page as shown in the following figure appears BLOCK MAC ADDRESS This page adds a time of day restriction to a special LAN device connected to the router The Current PC s MAC Address automatically displays the MAC address of the LAN device where the browser is running To restrict another LAN device click the Other MAC Address button and enter the MAC address of the other LAN device To find out the MAC address of a Windows based PC open a command prompt window and type ipconfig all Mac Filtering Global Policy BLACK_LIST Allow all packets but DENY those matching any of specific rules listed WHITE_LIST Deny all packets but ALLOW those matching any of specific rules listed BLOCK MAC ADDRESS BLACKLIST Username MAC Schedule Click Add The page as shown in the following figure appears 49 ADD SCHEDULE RULE User Name Current PC s MACAddress Other MAC Address Schedule Allways View Available Schedules Manual Schedule The following table describes the parameters in this page Field Description
7. Log _ View Firewall Log In this page you can enable the log function You can set Mode to Local Remote or Both Local indicates to save the log in the local computer Remote indicates to send the log to the remote log server Both indicate to save the log in the local computer and the remote log server To log the events do as follows Step 1 Select Enable Log Step 2 Select a mode from the drop down list If you select Remote or Both enter the IP address and port number of the server Step 3 Click Apply to apply the settings Step 4 Click View System Log or View Firewall Log to view the detail information of the system log 93 3 4 6 Logout Choose Management gt Logout The page as shown in the following figure appears Logging out will close the browser Click Logout to log out of the configuration page 94 3 5 Status In the Status page you can view the system information and monitor the performance of the device 3 5 1 Device Information Choose Status gt Device Info The page as shown in the following figure appears DEVICE INFO This information reflects the current status of your WAN connection SYSTEM INFO Modem Name ADN 4100 Serial Number 00304fce945a Time and Date 2010 10 10 00 23 00 HardwareVersion ADN 4100 SoftwareVersion V1 7 Firmware Version V1 7 System Up Time 00 23 54 INTERNET INFO Internet Connection Status Y Internet Connection Status Wan servic
8. My S wian LINE LANI LANE LANI LANA POWIE GNC AA Y Fi a s i A 4 Sv RE S T Ri echt Power Alageen wm T I Pira T Phont Pirog Skel Figure 2 Connection diagram with a telephone set before the splitter BR Note When connection 2 is used the filter must be installed close to the telephone cable See Figure 2 Do not use a splitter to replace the filter Installing a telephone directly before the splitter may lead to failure of connection between the device and the central office failure of Internet access or slow connection speed If you need to add a telephone set before the splitter you must add a microfilter before the telephone set Do not connect several telephones before the splitter or connect several telephones with the microfilter 10 3 Web Configuration This chapter describes how to configure the device by using the Web based configuration utility 3 1 Accessing the Device The following describes how to access the device for the first time in detail Step 1 Open the Internet Explorer IE browser and enter http 192 168 1 1 in the address bar Step 2 The LOGIN page as shown in the following figure appears Input username and password UserName admin y Password In this page enter the user name and the password Then click login The user name and the password of the super user are admin and admin respectively The user name and the pass
9. NETWORK TOOLS page click ADSL The page as shown in the following figure appears ADSL SETTINGS This page is used to configure the ADSL settings of your ADSL router You need to disable DSL before you change the ADSL mode ADSL SETTINGS Enable DSL G Dmt Enabled CI G Lite Enabled CI T1 413 Enabled ADSL2 Enabled AnnexL Enabled ADSL2 Enabled CI AnnexM Enabled Capability Bitswap Enable CI SRA Enable Cl 1 bit Constellation Modulation Enable In this page you can select the ADSL modulation Normally you are recommended to keep the factory defaults The device supports the following modulation types GDmt G lite T1 413 ADSL2 AnnexL ADSL2 and AnnexM The device negotiates the modulation mode with the DSLAM Click Apply to save the settings 67 3 3 10 6 SNMP In the NETWORK TOOLS page click SNMP The page as shown in the following figure appears SHPIP CONFIGURA TION This page amp used to configure the SNMP protocol SNMP CONFIGURATION Gl Enable SWAMP Agent Read Community public Set Community private Trap Manager IP Trap Community public Trap Version vic In this page you can set the SNMP parameters The following table describes the parameters in this page Fed Description Select or deselect the check box to enable or disable SNMP agent Universal character to obtain the device information It Read Community is similar to the password The SNMP application entity can use it
10. Specification Product 4802 11n Wireless ADSL 2 2 4 Port Router Model ADN 4100A Hardware Compliant with ADSL Standard Full rate ANSI 11 413 Issue 2 Gdmt ITU G 992 1 Glite ITU G992 2 G hs Multimode ITU G994 1 Standard Capable of ADSL2 Standard Gdmt bis ITU G992 3 Capable of ADSL2 Standard G dmt bisplus ITU G 992 5 Reach Extended ADSL RE ADSL Support Annex A B M L RFC 2364 PPP over ATM LLC VCMUX RFC 2516 PPP over Ethernet LLC VCMUX RFC 1483 Ethernet over ATM Bridge or Router Protocol Mode RFC 1577 Classical IP over ATM RFC 2684 Bridged IP over ATM LLC VCMUX RFC 2684 Routed IP over ATM LLC VCMUX Support up to 8 PVCs ATM Forum UNI 3 1 4 0 PVC VC and LLC Multiplexing Integrated ATM AAL5 support UBR CBR VBR rt and VBR nrt 0 255 VPI plus 1 65535 VCI address range OAM F4 amp F5 Segment end to end loop back AIS and RDI OAM cells LAN 4 x Ethernet 10 100Mbps Auto Negotiation Auto MDI MDI X WLAN 2 x 802 11b g n Access Point with one 5dBi dipole antenna LED Indicators WR Link Data LAN 1 4 WLAN WPS Button _ WLAN Reset WPS Power AAL and ATM Support 102 Max Concurrent 2048 Sessions Wireless Standard EEE 802 11b g and 802 11n Wireless Frequency 2 4 to 2 4835GHz Industrial Scientific Medical Band America FCC 2 414 2 462GHz 11 Channels Wireless Channels Europe ETSI 2 412 2 472GHz 13 Channels Japan TELEC 2 412 2 484
11. appears 91 TEST THE CONNECTION TO YOUR LOCAL NETWORK FA PASS FA PASS Test ADSL Synchronization FATE Test ATM OAM F5 Segment Loopback FATE Test ATM OAM F5 End to end Loopback FAL Test ATM OAM F4 Segment Loopback FAN Test ATM OAM F4 End to end Loopback FAL 3 4 4 2 Ping Diagnostics In the Diagnosis page click Ping Diagnostics The page as shown in the following figure appears PING DIAGNOSTICS Run Ping diagnostics PING CONFIGURATION Host 192 168 1 1 Number of Packets Repreat 5 Timeout ms 1000 Packet Size 56 Ping Results 92 In this page you can test the IP address on the same segment connect status of the device Click Ping to run diagnostics 3 4 5 Log Configuration Choose Management gt Log Configuration The SYSTEM LOG page as shown in the following figure appears SYSTEM LOG If the log mode is enabled the system will begin to log all the selected events If the selected mode is Remote or Both events will be sent to the specified IP address and UDP port of the remote syslog server If the selected mode is Local or Both events will be recorded in the local memory Select the desired values and click Apply to configure the system log options Note This will not work correctly if modem time is not properly set Please set it in Setup Time and Date SYSTEM LOG CONFIGURATION Enable Log Apply View System
12. can view the host name IP address MAC address and expiration time of the IP address 3 5 4 IPv6 STATUS Choose Status gt IPv6 Status The page as shown in the following figure appears IPV6 STATUS In this section you can see the information for the IPv6 Connection IPV6 CONNECTION 97 In this section you can see the information for the IPv6 Connection Click Refresh to refresh the system IPv6 status shown in the page 3 5 5 Logs Choose Status gt Logs The page as shown in the following figure appears This page allows you to view system logs SYSTEM LOG This page displays the system log Click Refresh to refresh the system log shown in the box 3 5 6 Statistics Choose Status gt Statistics The page as shown in the following figure appears 98 This information reflects the current status of your DSL connection interface Received Bytes Pkts Errs Rx drop ADN 4101 66034626 879783 0 0 Service VPI VCI Protocol Received Bytes Pkts Errs Mode Type Line Coding Status Up Time Downstream SNR Margin 0 1dB Attenuation 0 1dB Output Power dBm Attainable Rate Kbps Rate Kbps D interleave depth Delay msec Data Counter HEC Errors OCD Errors LCD Errors CRC Errors FEC Errors Total ES Total Frames J 0 Clear Transmitted Bytes Pkts Errs Tx drop 7900049 34189 0 0 Transmitted Drops Bytes Pkts Errs Drops 0 0 Enable ACTIVATIN
13. cause harmful interference and 2 this Device must accept any interference received including interference that may cause undesired operation Federal Communication Commission FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled environment In order to avoid the possibility of exceeding the FCC radio frequency exposure limits human proximity to the antenna shall not be less than 20 cm 8 inches during normal operation R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 WEEE Regulation To avoid the potential effects on the environment and human health as a pd result of the presence of hazardous substances in electrical and electronic E equipment end users of electrical and electronic equipment should understand the meaning of the crossed out wheeled bin symbol Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately Safety This equipment is designed with the utmost care for the safety of those who install and use it However special
14. download via WEB SNMP v1 v2c MIB supported Support DHCP Server Client Relay Built in Diagnostic tool TR 069 Environment Specification 169 x 118 x 29 mm Wx D x H 12V DC 0 8A Operating temperature 0 50 Degree C Storage temperature 10 70 Degree C Humidity 10 95 non condensing 104
15. figure appears QOS GLOBAL CONFIGURATION Direction Uplink Lan gt Wan Downstream Wan gt Lan Enable Upstream Bandwidth 0 Kbps 0 means no limit bandwidth Scheduling Strategy SP Note Scheduling change would clear the queue configuration Enable DSCP Remark Enable 802 1P Remark C UPSTREAM QUEUE CONFIGURATION In this page you can configure the upstream bandwidth and downstream bandwidth of each interface The uplink rate and the downlink rate are limited according to the configured bandwidth You also can set the priority of the queue 56 The device supports the following four priority levels 1 2 3 4 Click Submit to save the settings 3 3 6 3 Classification Configuration In the QoS Configuration page click QoS Classification Configuration Click Add and the page as shown in the following figure appears QOS FLOW CLASSIFY CONFIG QOS FLOW CLASSIFY CONFIG Classify Type Upstream Flow Classify Downstream Flow Classify Enable C CLASSIFY CONDITIONS ao Ip Protocol Type IPv4 Input Interface LAN v Source MAC address Source MAC mask 802 1P NotMatch Source IPv4 address Source subnet mask Destination IPv4 address Destination subnet mask DSCP Check Not Match v Protocol Type NotMatch Source port range Destination port range CLASSIFY MATCH RESULT Classify Queue Unbound DSCP Mark Not Mark vi CO
16. host messages on behalf of hosts that the system discovered through standard IGMP interfaces The device serves as a proxy for its hosts after you enable the function 65 Select Enable IGMP Proxy and select the desired WAN and click Apply to save the settings 3 3 10 3 IGMP Snooping When IGMP snooping is enabled only hosts that belong to the group receive the multicast packets If a host is deleted from the group the host cannot receive the multicast packets any more In the NETWORK TOOLS page click IGMP Snooping The page as shown in the following figure appears Transmission of identical content such as multimedia from a source to a number of recipients IGMP SETUP C Enable IGMP Snooping Click Apply to save the settings 3 3 10 4 UPnP In the NETWORK TOOLS page click Upnp The page as shown in the following figure appears Universal Plug and Play UPnP supports peer to peer Plug and Play functionality for network devices UUPNP SETUP go Enable UPnP WAN Connection LAN Connection l b In this page you can enable universal plug and play UPnP and then the system serves as a daemon UPnP is widely applied in audio and video software It automatically searches devices in the network If you are concerned about UPnP security you can disable it Select the WAN and LAN interfaces at which you want to enable UPnP and click Apply to save the settings 3 3 10 5 ADSL Settings In the
17. into the corresponding IP address For example the domain name www example com packets second might be translated to 198 105 232 4 59 The DNS system is in fact its own network If one DNS server does not know how to translate a particular domain name it asks another one and so on until the correct IP address is returned Choose Advanced gt DNS The page as shown in the following figure appears DNS Click Apply button to save the new configuration DNS SERVER CONFIGURATION Wan Connection br_0_35_0_0 w Obtain DNS server address automatically Use the following DNS server addresses The following table describes the parameters in this page Fead Description Wan Connection connected from the drop down list If you select this radio button the device Obtain DNS server automatically obtains IP address of the DNS server address automatically from the ISP You need not manually enter the IP address of the server Use the following DNS server addresses Preferred DNS server Enter the IP address of the primary DNS server Enter the IP address of the secondary DNS server If Alternate DNS server the primary DNS server fails to work the device tries to connect the secondary DNS server If you select this radio button you need to manually enter the IP address of the server provided by the ISP Click Apply to save the settings 60 3 3 9 Dynamic DNS The de
18. may update your router settings using your saved files Settings File Name Browse Update Settings SYSTEM RESTORE DEFAULT SETTINGS Restore Router settings to the factory defaults Restore Default Setting In this page you can restart the device back up the current settings to a file update the backup file and restore the factory default settings The following table describes the buttons in this page 85 Button Description Restart the device Specify the path to back up the current configuration in Backup Setting a configuration file on your computer You can rename the configuration file Click Browse to select the configuration file of device Update Settings and click Update Settings to update the configuration of the device Restore Default Reset the device to default settings Setting Caution Do not turn off your device or press the Reset button when the procedure is in progress 3 4 2 Firmware Update Choose Management gt Firmware Update The page as shown in the following figure appears FIRMWARE UPDATE Step 1 Obtain an updated firmware image file from your ISP Step 2 Enter the path to the image file location in the box below or click the Browse button to locate the image file Step 3 Click the Update Firmware button once to upload the new image file NOTE The update process takes about 2 minutes to complete and your DSL Router will reboot Please DO NOT powe
19. tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution To assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This device complies with Part 15 of the FCC Rules Operation is subject to the Following two conditions 1 This device may not
20. the settings After the DHCP reservation information is saved the DHCP reservations list displays the information If the DHCP reservations list is not empty you can select one or more items and click Edit or Delete NUMBER OF DYNAMIC DHCP CLIENTS 1 Computer Name MAC Address IP Address Expire Time gj558d 00 11 2f 68 de 69 192 168 1 2 42844 The NUMBER OF DYNAMIC DHCP CLIENTS page displays the DHCP clients PCs or Laptops currently connected to the device and the detailed information of the connected computers 33 3 2 5 LAN IPv6 In this page you can configure the LAN IPv6 Choose Setup gt LAN IPv6 The IPv6 LAN setting page as shown in the following figure appears IPV6 LAN SETTINGS This page allows you to config IPv6 LAN Start Unique Local Prefix C Unique Local GlobalID 11 22 33 44 55 Auto get prefix from WAN Static LAN address config mode OsLaac DHCPVv6 The following table describes the parameters in this page Field Description Start Unique Local qu Check this enable the Prefix Unique Local Th fault is 11 22 33 44 A e default is 33 44 55 Auto get prefix from cts p Check this to enable the Auto get prefix from WAN Check this to enable the static prefix set Site Prefix Type the Prefix address on this item Site Prefix Length Means the network ID length the range is 16 64 bit You can select the SLAAC and DHCPv6 mode the describes as follow LAN address co
21. then click Apply to add the entry to the routing table A maximum 30 entries can be configured ROUTING STATIC ROUTE O Destpaton Subnet Mask Gateway eric This page displays the information of existing static routes Click Add and the page as shown in the following figure appears STATIC ROUTE ADD Destination Network Address Subnet Mask Use Gateway IP Address Use Interface pppoe_0 35 0 0 v The following table describes the parameters in this page Field Description Destination Network ii i The destination IP address of the device Address Subnet Mask The subnet mask of the destination IP address Use Gateway IP The gateway IP address of the device Address Select the interface of the static routing used by the Use Interface i l device from the drop down list 79 1 Note You can enter the gateway IP address of the device in the Use Gateway IP Address field or set the User Interface but cannot apply the two settings at the same time 3 3 11 2 Policy Route Choose Advanced gt Routing and click Policy Route Click Add and the page as shown in the following figure appears POLICY ROUTE Policy Route chose one Wanconnection and one Lanconnection then bind them POLICY ROUTE SETUP WAN INSTANCE AND LAN INSTANCE LAN Connection etherneti In this page you can select the interfaces on your device that use RIP of the protocol used If you enable RIP the devi
22. through a telephone cable Connect the input cable to the Line interface of the splitter The splitter has three interfaces Line Connect to a wall phone interface RJ 11 jack Modem Connect to the LINE interface of the device Phone Connect to a telephone set Step 2 Connect the LAN interface of the device to the network card of the PC through an Ethernet cable MDI MDIX i Note Use the twisted pair cable to connect the hub or switch Step 3 Insert one end of the power adapter to the wall outlet and connect the other end to the POWER interface of the device Connection 1 Figure 1 shows the connection of the device PC splitter and telephone set when no telephone set is placed before the splitter This type of connection is recommended vl i Iha i if HS if i h a IlL E g E r Bies r Aaa Fi pi T d S WPR LNE LANI LANE LANE LANA POWER ONG a b kn Di AT r Fa SS SS a 4 4 1 RT ne Spit ad RJ sake i _ Mimdom 4 i ip Phone 1 sri Adapicr i Y D F LLS Pheri ch vi Figure 1 Connection diagram without a telephone set before the splitter Connection 2 Figure 2 shows the connection of the device PC splitter and telephone set when a telephone set is placed before the splitter As illustrated in the following figure the splitter is installed close to the device r fi Fa i Far F LN FrN 1 i Fal i O i a f i 7 Li i i Fi ees Oe 1 A ort i eed
23. to any PCs or electronic products unless our customer engineer or your broadband provider instructs you to do this because any wrong connection may cause power or fire risk Do not place the device on an unstable surface or support 1 2 LEDs and interfaces Front Panel m LAN NO Oo a OO0O00O0000 a 4 PWR Link Data 3 2 1 WLAN WPS The following table describes the LEDs of the device Status Description ee The device is powered on and the initialization is normal Slow The power is off f F The device is self testing or self testing is failed No signal is d i o signal is detected Of O Blinks layer of the office layer of the office The Internet connection is normal in the routing mode for example PPP dial up is successful and no Internet data is being transmitted Internet data is being transmitted in the routing mode Internet connection fails after successful synchronization in the routing mode for example PPP dial up is failed The LAN connection is normal Data is being transmitted through the LAN LAN4 1 Green Blinks interface or the Internet data is being transmitted in the bridge mode The LAN connection is not established The WLAN connection has been activated Green Binke Data i being transmitted through the WLAN interface The WLAN connection is not activated Blinks WPS is activated and the device is waiting Green for negotiation with the clients WPS
24. AN and WLAN IPv6 ADN 4100A implements the new IP version for further compatibility of network environment Wireless Features Standards Compliant ADN 4100A complies with IEEE 802 11n radio with wireless technology capable of up to 300Mbps data rate Dipole Antenna with MIMO Technology ADN 4100A provides farther coverage less dead spaces and higher throughput with 2T2R MIMO technology Support IEEE 802 11b g and 802 11n Wireless Station The 802 1in standard provides for backward compatibility with the 802 11b and 802 11g standard so 802 11b 802 119 and 802 11n can be used simultaneously WEP Support WEP Wired Equivalent Privacy is included Key sizes of 64 Bit 7 and 128 Bit are supported WPS Push Button Control ADN 4100A supports WPS Wi Fi Protected Setup to easy connect wireless network without configuring the security WPA PSK Support WPA PSK_TKIP and WPA2 PSK_AES encryption are supported Wireless MAC Access Control The Wireless Access Control feature can check the MAC address hardware address of Wireless stations to ensure that only trusted Wireless Stations can access your LAN WDS ADN 4100A supports wireless distribution system it allows the wireless interconnection of access point in an IEEE 802 11 network 2 Hardware Installation Step 1 Connect the LINE interface of the device and the Modem interface of the splitter with a telephone cable Connect the phone set to the Phone interface of the splitter
25. DE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2 WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of security Security Mode None v Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC Wireless security is vital to your network to protect the wireless communication among wireless stations access points and the wired network This device 23 provides the following encryption modes None WEP Auto WPA or WPA2 WPA2 Only and WPA Only WEP If the Security Mode is set to WEP the page as shown in the following figure appears WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless clients and PC WIRELESS SECURITY MODE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2 WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of security Security Mode WEP v If you choose the WEP security option this device will ONLY operate in Legacy Wireless mode 802 11B G WEP is the wireless encryption standard To use it you must enter the s
26. Enter the correct the start and end time of the daylight saving Click Apply to save the settings 35 3 2 7 Logout Choose Setup gt Logout The page as shown in the following figure appears LOGOUT Logging out will close the browser Click Logout to log out of the configuration page 36 3 3 Advanced Configuration This section contains advanced features used for network management security and administrative tools to manage the device You can view the status and other information of the device to examine the performance and troubleshoot 3 3 1 Advanced Settings In the ADVANCED WIRELESS page click Advanced Settings The page as shown in the following figure appears ADVANCED SETTINGS These options are for users that wish to change the behaviour of their 802 119 wireless radio from the standard setting We does not recommend changing these settings from the factory default Incorrect settings may impair the performance of your wireless radio The default settings should provide the best wireless radio performance in most environments ADVANCED WIRELESS SETTINGS Transmission Rate Auto Multicast Rate Lower Transmit Power 100 Y Beacon Period 100 20 1024 Fragmentation Threshold 2345 256 2346 DTIM Interval 100 Preamble Type 1 255 The following table describes the parameters in this page Field Description ADVANCED WIRELESS SETTIN
27. G Upstream 0 0 0 0 0 Clear 510 The information helps technicians to identify whether the device is functioning properly The information does not affect the functions of the device 99 3 5 7 Route information Choose Status gt Route Info The page as shown in the following figure appears ROUTE INFO Flags U up reject G getway H host R reinstate D dynamic redirect M modified redirect Destination Gateway Subnet Mask Flags Metric Service Interface 192 168 1 0 0 0 0 0 255 255 255 0 U 0 0O bo The table displays destination routes commonly accessed by the network 3 5 8 Logout Choose Status gt Logout The page as shown in the following figure appears Logging out will close the browser Click Logout to log out of the configuration page 100 3 6 Help If you want to realize some information for each configuration you can click the hyperlink in the Help page HELP MENU Setup Advanced Management Status SETUP HELP Wizard Internet Setup e Wireless Local Network Time and Date ADVANCED HELP Advanced Wireless Port Forwarding e DMZ Parental Control Filtering Options Firewall Settings e DNS e DDNS Network Tools e Routing Schedules MANAGEMENT HELP e System Management e Firmware Update e Access Controls e Diagnosis e Log Configuration STATUS HELP Device Info Wireless Clients DHCP Clients Logs Statistics e Route Info 101 Appendix A
28. GHz 14 Channels Wireless Data 64 bit 128 bit WEP WPA PSK WPA2 PSK and WPS Encryption PBC 802 11n 40MHz 270 243 216 162 108 81 54 27Mbps 135 121 5 108 81 54 40 5 27 13 5Mbps Dynamic 802 11n 20MHZ 130 11 7 104 78 52 39 26 13Mbps 65 58 5 52 39 26 19 5 13 6 5Mbps Dynamic 802 119 54 48 36 24 18 12 9 6Mbps Dynamic 802 11b 11 5 5 2 1Mbps Dynamic Transmission Distance pene ae outdoor up to 300m it is limited to the environment 11b mode 17dBm Transmit Power 11g mode 14dBm 11n mode 14dBm 270M 68dBm 10 PER 130M 68dBm 10 PER 108M 68dBm 10 PER Receiver Sensitivity 54M 68dBm 10 PER 11M 85dBm 8 PER 6M 88dBm 10 PER 1M 90dBm 8 PER Protocols Features NAT supports PAT and multimedia applications NAT Static Routing and RIPv1 2 Transparent Bridging Dynamic Domain Name System DDNS SNTP DNS relay and IGMP proxy DMZ and Virtual Server Quality of Service QoS for Traffic Prioritization 103 PPTP IPSec VPN pass through 2 PPTP VPN Tunnel 8 IPSec VPN Tunnel PPP over PAP Password Authentication Protocol RFC1334 PPP over CHAP Challenge Authentication Protocol RFC1994 DoS Protection Access Control ACL Access Control IP MAC Application URL Filter Stateful Packet Inspection SPI Firewall Password protection for system management Web based configuration Embedded Telnet server for remote and management Firmware upgraded and configuration upload
29. GS Select the transmission rate of the wireless network from the drop down list Transmission Rate Select the multicast transmission rate of the wireless network from the drop down list You can select Lower Multicast Rate Fed Description o orhe o Select the power for data transmission from the Transmit Power drop down list You can select 100 80 60 40 or 20 By default the wireless beacon frame sends the data Beacon Period once every 100ms Its value range is 20 1024 RTS Threshold nae threshold of transmission radusi Its value range is 0 2347 and the default value is 2346 Fragmentation Its value range is 256 2346 and the default value is Threshold 2345 Data beacon proportion transmission quantity DTIM Interval indication Its value range is 1 255 and the default value is 100 Select the preamble code from the drop down list You Preamble Type can select long or short SSID Enable Wireless SSID ADN 4100 Visibility Status Visible Invisible User Isolation off v Disable WMM Advertise of Max Clients 16 1 32 Field iesecription Select or deselect the check box to enable or disable Enable Wireless the wireless function SSID Set the wireless network name that is SSID SSID is used to distinguish different wireless networks Select whether to hide the AP You can select Visible or Invisible If you select Invisible the AP
30. II PENI Select the authentication mode from the drop down list Authentication You can select Open or Share Key Click Apply to save the settings Auto WPA or WPA2 If the Security Mode is set to Auto WPA or WPA2 the page as shown in the following figure appears 25 WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless clients and PC WIRELESS SECURITY MODE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2 WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of security Security Mode Auto WPA or WPA2 WPA Encryption AES i WPA Use WPA or WPA2 mode to achieve a balance of strong security and best compatibility This mode uses WPA for legacy clients while maintaining higher security with stations that are WPA2 capable Also the strongest cipher that the client supports will be used For best security use WPA2 Only mode This mode uses AES CCMP cipher and legacy stations are not allowed access with WPA security For maximum compatibility use WPA Only This mode uses TKIP cipher Some gaming and legacy devices work only in this mode To achieve better wireless performance use WPA2 Only security mode or in other words AES ciph
31. INGS Set the time after which the system automatically exits Web Idle Time Out the configuration page Its value range is 5 30 minutes Click Apply to apply the settings 3 4 3 2 Services In the ACCESS CONTROLS page click Services The page as shown in the following figure appears SERVICES A Service Control List SCL enables or disables services from being used ACCESS CONTROL SERVICES Select WAN Connections br 0 35 0 0 0 0 0 0 0 0 0 0 0 0 0 69 _ T oo a 89 In this page you can enable or disable the services that are used by the remote host For example if telnet service is enabled at port 23 the remote host can access the device by telnet through port 23 Select the management services that you want to enable or disable at the LAN or WAN interface and click Apply to apply the settings Caution If you disable the HTTP service you cannot access the configuration page of the device any more 3 4 3 3 IP Address In the ACCESS CONTROLS page click IP Address The page as shown in the following figure appears IP ADDRESS The IP Address Access Control mode if enabled permits access to local management services from IP addresses contained in the Access Control List If the Access Control mode is disabled the system will not validate IP adresses for incoming packets The services are the system applications listed in the Service Control List Enter the IP address of the management s
32. ION Group Name Grouped Interfaces Available Interfaces ethernet1 ethernet4 wlan0 wlan0 vap0 wlan0 vap1 wlan0 vap2 To create a mapping group do as follows Step 1 Enter the group name Step 2 Select interfaces from the Available Interfaces list and click the lt arrow button to add them to the Grouped Interfaces list in this way you can create the required mapping of the ports The group name must be unique Step 3 Click Apply to save the settings 3 3 10 2 IGMP Proxy In the NETWORK TOOLS page click IGMP Proxy The page as shown in the following figure appears IGMP PROXY IGMP proxy enables the system to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP interfaces The system acts as a proxy for its hosts when you enable it by 1 Enabling IGMP proxy on a WAN interface upstream which connects to a router running IGMP 2 Enabling IGMP on a LAN interface downstream which connects to its hosts IGMP PROXY CONFIGURATION Enable IGMP Proxy WAN Connection Enable PassThrough C Enable FastLeaving General Query Interval 120 seconds General Query Response Interval 1 100 milliseconds Group Query Interval 125 seconds Group Query Response Interval 1 100 milliseconds Group Query Count 3 Last Member Query Interval 1 seconds Last Member Query Count 2 IGMP proxy enables the device to issue IGMP
33. IP settings that are connected to the device through the Ethernet port When the device is used for DHCP it becomes the default gateway for DHCP client connected to it If you change the IP address of the device you must also change the range of IP addresses in the pool used for DHCP on the LAN The IP 30 address pool can contain up to 253 IP addresses You can also make DHCP server just acting on the specific port by default those ports are selected If your DHCP server doesn t belong to the same segment with your pc but you need to assign IP address from DHCP server you must uncheck the Enable DHCP Server and selected the Enable DHCP Relay to set the DHCP Relay IP address And you can also set the preferred and alternate DNS server DHCP SETTINGS OPTIONAL Use this section to configure the DHCP Relay for your network Enable DHCP Relay Use this section to configure the built in DHCP Server to assign IP addresses to the computers on your network Vv Enable DHCP Server DHCP IP Address Range 192 168 1 2 to 192 168 1 254 DHCP IP Mask 255 255 255 0 DHCP Router IP 192 168 1 1 DHCP Lease Time 86400 seconds Use the following DNS server addresses F Enable DNS Use this section to configure the DHCP Server in lan port individual 7 LAN Port 7 LAN Port2 yy LAN Port3 iy LAN Port4 iy WLAN Porti iy WLAN Port2 iy WLAN Ports i7 WLAN Part4 Apply Cancel Click Apply to save the settin
34. Local i 52 p Field Description Enter the name that identifies your configuration Select LAN or the other connection from the drop down Interface list Select the In Out or Both from the drop down list Default action Select the Permit or Drop from the drop down list l Select the Local Forward or Both from the Default Chain drop down list After set the firewall info finish click Add Rule to add an IP filter rule The page as shown in the following figure appears RULE INFO pi Protocol is ICMP one of IcmpType to be selected 2 When Action is Reject one of RejectType to be selected 3 Only when Protocol is TCP may RejectType select tcp reset Enabled Protocol z Action Permit RejectType z IcmpType v origIPAddress T origMask origStartPort 0 origEndPort 0 destIPAddress destMask destStartPort 0 destEndPort 0 Apply Cancel Check the Enabled and specify at least one of the following criteria protocol source destination IP address subnet mask and source destination port Then click Apply to save the settings LT Note The settings apply only when the firewall is enabled 53 3 3 5 2 Bridge Filtering In the FILTERING OPTIONS page click Bridge Filtering The page as shown in the following figure appears BRIDGE FILTER Bridge Filtering is only effective on ATM PVCs configured in Bridge mode ALLOW means that all MAC layer frames will be ALLOWED except th
35. S LOMA TP SCC A 74 3 3 1 ROUDE soina a R tek cocoads a as 78 ISIL Statie ROUTO assesses re EE 79 SALL 2 Pobi Ron nn 80 3 3 11 3 Default Gateway sscsssssssssscccccecccccccsosssssscccceeceeoossso 1 DOM VE RIP S6ttih S ccsccecse cece edecisicsvccadesiecwssesseceseisecossceccecectes 1 Dis UZ Schedules sersa 82 DAL NA Deiana oeabedevateuseciouuenteccusesiass 83 De 5s A IOS OUU EE E A E E A 84 KA S ETLE 1 A E 85 JAL SyS ooe aeeie ENEEIER 85 3 4 2 Firmware Update ssseccecccecccccccscccccccccccseccococosecccscccecccecccoose 86 D425 ACCESS Contr obsesia 87 3 4 3 1 Account Password ecssesssssoocoescessssooocecessssocosssessssso 88 SA32 SerVICOS aessa aT Aru 89 34 33 IPAddress acir E 90 344A Did noses nE EE 91 3 4 4 1 WAN Diagnostics sececssssssssscecceccccococsssssssescecceceooooo 91 IV 34 4 2 Pine Dia SMOSUiCS cisneros 92 343 Lo COMMGUPATION sssr E 93 JAO NGOS OUU ersan a E 94 3 5 SSEAUUIS PE N T EES E E R E E E EE 95 3 5 1 Device Information cccccccccccccccccccccccccccccccccccccccccccccees 95 3 5 2 Wireless Clients eoscosessosecssoseososeoseosessoscosessessossosessessoseose 96 35 3 DHCP Cenis aan aA an TE OES 96 3 5 4 IPv6 STATUS ci resiccesictaceutescacenssewadnineieaveusoavecsusessaveunsovedouneaess 97 R A E A E EEEE AE E TE EEO S 98 KSO SASS a E 98 3 5 7 Route information cccccccccccccccccccccccccccccccccccccccccccccsces 100 DoD A IELO E AAEE E A E EE 100 3 6 He
36. S Mark NotMark Submit Refresh The following table describes the parameters in this page Field Description You can select Upstream Flow Classify or Classify T assity lype Downstream Flow Classify Select or deselect the check box to enable or disable 57 Fed Description Fa a QoS classification SPECIFY TRAFFIC CLASSIFICATION RULES Select the physical port of the packet from the Input Interface drop down list For example ethernet1 ethernet2 ethernet3 and ethernet4 Source MAC Address Enter the source MAC address of the packet Use mask 000000ffffff to mask the MAC address 00 Source MAC Mask SEn DE indicates not mapped and ff indicates mapped Select the 802 1p priority of the packet from the 8021P drop down list You can select Not match or a value in the range of 0 7 Note that this function is not supported at the moment Source IPv4 Address Enter the Source IP address of the packet Enter the Source subnet mask of the packet Destination IPv4 Enter the destination IP address of the packet Address Destination subnet E Enter the destination subnet mask of the packet mask Select the layer 2 protocol type from the drop down Ethernet Type oe j list For example IP protocol and IPX protocol You can use this feature to differentiate the complex DSCP check p data type from the drop down list Protocol Type Select the protocol on this column Source port range Enter the so
37. SEC Name Remote Gateway Local Addresses Remote Addresses Interface Add Edit Delete IPSEC SETTINGS IPSec Connection Name Tunnel Mode Remote IPSec Gateway Address 0 0 0 0 Tunnel access from local IP address Subnet IP Address for VPN 0 0 0 0 IP Subnetmask 255 255 255 0 Tunnel access from remote IP address Subnet IP Address for VPN 0 0 0 0 IP Subnetmask 255 255 255 0 Key Exchange Method Auto IKE Pre Shared Key key 75 IPSec Connection The connection name of the marker IPSec Name Tunnel Mode You can select ESP or AH Remote IPSec The IP or domain name of the Remote IPSec Gateway Address Gateway Tunnel access from You can select Subnet or Single Address local IP address If you select Single Address it allows only one PC from local to connect remote hosts with IPSEC mode You must enter the IP address of the PC in fourth item If you select subnet it allows more than one PC from local to connect remote hosts with IPSEC mode IP Address for VPN If you select Single Address it is the IP address of the PC If you choose Subnet it is the subnet address IP Subnetmask Enter the subnetmask for IP Tunnel access from You can select Subnet or Single Address remote IP address Be renee MENON You can select from the drop down list Auta IKE Auto lKE Pre Shared Key Enter t
38. Setup Internet Setup SETTING UP YOUR INTERNET There are two ways to set up your Internet connection You can use the Web based Internet Connection Setup Wizard or you can manually configure the connection Wireless Please make sure you have your ISP s connection settings first if you choose manual setup Local Network INTERNET CONNECTION WIZARD Time and Date You can use this wizard for assistance and quick connection of your new Router to the Internet You will be presented Logout with step by step instructions in order to get your Internet connection up and running Click the button below to begin Setup Wizard Note Before launching the wizard please ensure you have correctly followed the steps outlined in the Quick Installation Guide included with the router Step 2 Click Setup Wizard The page as shown in the following figure appears WELCOME TO SETUP WIZARD This wizard will guide you through a step by step process to configure your new router and connect to the Internet Step 1 Set Time and Date Step 2 Setup Internet Connection Step 3 Configure Wireless Network Step 4 Completed and Quit There are four steps to configure the device Click Next to continue 13 Step 3 Set the time and date Then click Next STEP 1 SET TIME AND DATE The Time Configurabon option alows you to configure update and maintain the correct time on the internal system cock Fram this section you
39. WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of security Security Mode WPA only Lz WPA Encryption TKIP AES WPA Use WPA or WPA2 mode to achieve a balance of strong security and best compatibility This mode uses WPA for legacy clients while maintaining higher security with stations that are WPA2 capable Also the strongest cipher that the client supports will be used For best security use WPA2 Only mode This mode uses AES CCMP cipher and legacy stations are not allowed access with WPA security For maximum compatibility use WPA Only This mode uses TKIP cipher Some gaming and legacy devices work only in this mode To achieve better wireless performance use WPA2 Only security mode or in other words AES cipher WPA PSK does not require an authentication server The WPA option requires an external RADIUS server WPA Mode WPA PSK x Group Key Update Interval 100 PRE SHARED KEY Pre Shared Key Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC Parameters in this page are similar to those in the page for Auto WPA or WPA2 Click Apply to save the settings 29 3 2 4 Local Network You can configure the LAN IP address according to the actual application The preset IP address is 192 168 1 1 You can use the default settings and DHCP service to manage the IP settings of the p
40. Wizard page you can click Back to review or modify the previous settings or click Cancel to exit the wizard 18 3 2 2 Internet Setup Choose Setup gt Internet Setup The page as shown in the following figure appears Choose Add Edit or Delete to configure WAN interfaces WAN SETUP VPI VCI VLANID ENCAP Service Name Protocol State Status Default Gateway Action In this page you can configure the WAN interface of the device Click Add and the page as shown in the following figure appears ATM PVC CONFIGURATION VPI VCI Service Category Peak Cell Rate CONNECTION TYPE Protocol Encapsulation Mode 802 1Q VLAN ID Protocol Type o 0 255 35 32 65535 UBR With PCR v 0 cells s ce Bridging 0 0 disable 1 4094 NETWORK ADDRESS TRANSLATION SETTINGS The following table describes the parameters in this page 19 Field Description ATM PVC CONFIGURATION Virtual Path Identifier VPI is the virtual path between two points in an ATM network Its value range is from O to 255 Virtual Channel Identifier VCI is the virtual channel between two points in an ATM network Its value range is from 32 to 65535 0 to 31 is reserved for local management of ATM traffic Select UBR with PCR UBR without PCR CBR Non Realtime VBR or Realtime VBR from the drop down list Set the maximum transmission rate of the cell in ATM Pea
41. ame key s into the router and the wireless stations For 64 bit keys you must enter 10 hex digits into each key box For 128 bit keys you must enter 26 hex digits into each key box A hex digit is either a number from 0 to 9 or a letter from A to F For the most secure use of WEP set the authentication type to Shared Key when WEP is enabled You may also enter any text string into a WEP key box in which case it will be converted into a hexadecimal key using the ASCII values of the characters A maximum of 5 text characters can be entered for 64 bit keys and a maximum of 13 characters for 128 bit keys WEP Key Length 64 bits 10 hex digits or 5 char Choose WEP Key ne WEP Keyi WEP Key2 WEP Key3 WEP Key4 Authentication Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC 24 The following table describes the parameters in this page Field Description You can select 64 bits or 128 bits from the drop down list f you select 64 bits you need to enter 10 hexadecimal numbers or 5 characters f you select 128 bits you need to enter 26 WEP Key Length hexadecimal numbers or 13 characters Select the WEP key from the drop down list Its value Choose WEP Key l y p range is 1 4 Set the 64 bit 128 bits key in the f t of H WEP Keys 1 4 et the its or its key in the format of Hex or ASC
42. attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment Energy Saving Note of the Device This power required device does not support Standby mode operation For energy saving please remove the power cable or push the power button to OFF position to disconnect the device from the power circuit Without removing power cable or Power off the device will still consuming power from the power source In the view of Saving the Energy and reduce the unnecessary power consuming it is strongly suggested to remove the power connection for the device if this device is not intended to be active Revision User s Manual for 802 11n Wireless ADSL 2 2 Router Model ADN 4100 Rev 1 0 March 2012 Part No EM ADN4100v3_v1 0 National restrictions This device is intended for home and office use in all EU countries and other countries following the EU directive 1999 5 EC without any limitation except for the countries mentioned below General authorization required for outdoor use Bulgaria None and public service Military Radiolocation use Refarming of the 2 4 GHz Outdoor use limited to 10 PNE SaS ee Ngo France mW e i r p within the band in recent years to allow 2454 2483 5 MHz current relaxed regulation Full implementation planned
43. can set the ime rone that you are n and set the NTP Metverk Time Protocol Server Daylight Saving can abo be conhqured to automaticaly adjust the time when needed TIME SETTING E Automatically synchronize with Internet time servers lst NTP time servers 192 1662 10 2nd NTP time server 192 168 2 100 TIME CONFIGURATION Time Zone GMT Greenetich Mean Teri Dublin Lisbon London Casablanca O Enable Daylight Saving Step 4 Configure the Internet connection Select the protocol and the encapsulation mode Set the VPI and the VCI If the Protocol is set to PPPoE or PPPOA the page as shown in the following figure appears STEP 2 SETUP INTERNET CONNECTION Please select your ISP Internet Service Provider from the list below Protocol PPPoE v Encapsulation Mode LLC v VPI 8 0 255 VCI 35 32 65535 PPPOE PPPOA Please enter your Username and Password as provided by your ISP Internet Service Provider Please enter the information exactly as shown taking note of upper and lower cases Click Next to continue Username Password Confirm Password You need to enter the user name and password for PPPoE or PPPoA dialup If the Protocol is set to Dynamic IP the page as shown in the following figure appears STEP 2 SETUP INTERNET CONNECTION Please select your ISP Internet Service Provider from the list below Protocol Dynamic IP En
44. capsulation Mode VPI 8 0 255 VCI 35 32 65535 If the Protocol is set to Static IP the page as shown in the following figure appears 15 STEP 2 SETUP INTERNET CONNECTION Please select your ISP Internet Service Provider from the list below Protocol Static IP Encapsulation Mode VPI 8 0 255 VCI 32 65535 STATIC IP You have selected Static IP Internet connection Please enter the appropriate information below as provided by your ISP The Auto PVC Scan feature will not work in all cases so please enter the VPI VCI numbers if provided by the ISP Click Next to continue IP Address Subnet Mask Default Gateway Primary DNS Server You need to enter the information of the IP address subnet mask and gateway If the Protocol is set to Bridge the page as shown in the following figure appears STEP 2 SETUP INTERNET CONNECTION Please select your ISP Internet Service Provider from the list below Protocol Bridge Encapsulation Mode LLC be VPI 8 0 255 VCI 35 32 65535 After setting click Next 16 Step 5 Configure the wireless network Enter the information and click Next STEP 3 CONFIGURE WIRELESS NETWORK Your wireless network is enabled by default You can simply uncheck it to disable it and click Next to skip configuration of wireless network Enable Your Wireless Network Your wireless network needs a
45. ccccccccccccccccccccccccces 2 1 3 System Requirements cccccsssssssssssccscccccccccccccccesssssssscees 4 1 4 FEA UTES naa aa aa 5 2 Hardware Installation esecsescoceseoccscscocoseococcscocoseococeseocoseseoseseocoseo 9 2 Web Confipurati i sosser er ete 11 3 1 Accessing the Device s 0ccccccccccsssssssesssssoveccccconcccscsssesecessssoes 11 3 2 General Configuration ccccccccrrccsssssssssssssssooccccccoosccccsessees 12 321 Ward ananena N T a t 12 De 22 Internet SetuP vscecccacssecescencnuaseuvesesssdsesosseassccanesasevsvecssteseoueteens 19 Ds tee WAPCIESS SetuP costes cacastocssusettesecesenCaces sive cesactocscceesteseeatentesteetes 21 3 2 3 1 Wireless Basics esessesecceseseoceseseoseseocosesecccseseoseseseoses 22 3 2 3 2 Wireless Sec rity c5seisscicevivecscsusecsdaacsuveducnseosseucceceeseesees 23 3 2 4 Local NetworK sessesesscsesccseseoccsescosesesecceseoscseseoccseseoseseseesese 30 I2 LAN IPVO oaa a aE aE A 34 3 20 ime and Date nana a a oe 35 PAT EE E A E E A E E E E A 36 3 3 Advanced Configuration ssssssccecccceccccsssssseseccceecccocossssssssee 37 3 3 1 Advanced Settings sscscccccceccccocssssscccceccecccecosossssssecceccceceeooso 37 Oo MAC Perine sine ieee 40 3 3 1 2 Sec rity Settings sss 5e2ssciceviveccssvsecsdacssey Gusadeaseeesceceesseswes 41 DONS WES SeUines oiis srera istir reo Tor rir nana 42 DLA WDS Senp S esiasio enio o eaae a aint 43 3 32 Port Forwardin
46. ce communicates with other devices using the routing information protocol RIP Click Apply to save the settings 80 3 3 11 3 Default Gateway Choose Advanced gt Routing and click Default Gateway The page as shown in the following figure appears DEFAULT GATEWAY If Enable Automatic Assigned Default Gateway checkbox is selected this router will accept the first received default gateway assignment from one of the PPPoA PPPoE or MER DHCP enabled PVC s If the checkbox is not selected enter the static default gateway OR a WAN interface Click Apply button to save it DEFAULT GATEWAY Enable Automatic Assigned Default Gateway Use Gateway IP Address Use Interface In this page you can select Enable Automatic Assigned Default Gateway or enter the information in the Use Gateway IP Address and Use Interface fields Click Apply to save the settings 3 3 11 4 RIP Settings Choose Advanced gt Routing and click RIP The page as shown in the following figure appears RIP CONFIGURATION To activate RIP for the device select the Enabled checkbox for Global RIP Mode To configure an individual interface select the desired RIP version and operation followed by placing a check in the Enabled checkbox for the interface Click the Apply button to save the configuration and to start or stop RIP based on the Global RIP Mode selected Enabled passive ee ee eee oon 81 In this page you can v
47. cess point or a wireless router to initiate the registration between a new device and an active 42 pe access point or a wireless router You can use one of the following there methods to use WPS authentication e Press the WPS button on the side panel for 3 seconds e In the WIRELESS WPS page click PBC It has the same function of the WPS button on the side panel This is an optional method on wireless clients LT Note You need a Registrar when using the PBC method in a special case in which the PIN is all zeros 3 3 1 4 WDS Settings In the ADVANCED WIRELESS page click WDS Settings The WIRELESS WDS page as shown in the following figure appears WDS SETTINGS Wireless repeater function can make the WLAN signal cover more area Fill the blanks and then Apply Enable wos O Wireless MAC of this router 00 30 4 23 45 67 REPEATER MAC ADDRESS 1 REPEATER MAC ADDRESS 2 REPEATER MAC ADDRESS 3 REPEATER MAC ADDRESS 4 The Wireless repeater function can make the WLAN signal cover more area Fill the blanks and then Apply 43 3 3 2 Port Forwarding This function is used to open ports in your device and re direct data through these ports to a single PC in your network WAN to LAN traffic It allows remote users to access services in your LAN such as FTP for file transfers or SMTP and POPS for e mail The device receives remote requests for these services at your public IP address It uses the specified TCP or UDP
48. e type Default Gateway Preferred DNS Server Alternate DNS Server Ipv6 link local addr IPv6 RA addr IPv6 DHCP Downstream Line Rate Kbps 2400 Upstream Line Rate Kbps 160 Enabled WAN Connections VPI VCI Service Name Protocol IGMP IP Address WIRELESS INFO select wireless ADN 4100 v Status Network Name SSID Visibility Security Mode LOCAL NETWORK INFO Enable ADN4100 Vise Base 00 30 4f ce 94 50 1924681 255 255 255 0 Enable MAC Address IP Address Subnet Mask DHCP Server The page displays the summary of the device status including the system information WAN connection information wireless information and local network information 3 5 2 Wireless Clients Choose Status gt Wireless Clients The page as shown in the following page appears WIRELESS CLIENTS This page shows authenticated wireless stations and their status WIRELESS AUTHENTICATED STATIONS o Mac Asso ated Ip Address Authorized SSID Interface The page displays authenticated wireless stations and their statuses 3 5 3 DHCP Clients Choose Status gt DHCP Clients The page as shown in the following page appears 96 DHCP CLIENTS This information reflects the current DHCP client of your modem DHCP LEASES Hostname MAC Address TP Address Expires in S5BE OOAL2f 68 de 69 192 168 12 42554 This page displays all client devices that obtain IP addresses from the device You
49. er WPA PSK does not require an authentication server The WPA option requires an external RADIUS server WPA Mode Auto WPA or WWPA2 PSK v Group Key Update Interval 100 PRE SHARED KEY Pre Shared Key Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC The following table describes the parameters in this page Field Description You can select Auto WPA or WPA2 PSK or Auto WPA or WPA2 Enterprise from the drop down list WPA Mode WPA Encryption You can select AES or TKIP AES from the drop down list Group Key Update Interval Pre Shared Key Set the pre shared key to identify the workstation Set the interval for updating the key If the WPA Mode is set to Auto WPA or WPA2 Enterprise the page as shown in the following figure appears 26 WPA Use WPA or WPA2 mode to achieve a balance of strong security and best compatibility This mode uses WPA for legacy clients while maintaining higher security with stations that are WPA2 capable Also the strongest cipher that the client supports will be used For best security use WPA2 Only mode This mode uses AES CCMP cipher and legacy stations are not allowed access with WPA security For maximum compatibility use WPA Only This mode uses TKIP cipher Some gaming and legacy devices work only in this mode To achieve better wireless performance use WPA2 Only security mode
50. eren r E S 101 Appendix A Specification ssssccscccccccccccececcccccccccecccccccccccccccsecsesee 102 1 Overview High Speed 802 11n Wireless Data Rate The PLANET 802 11n Wireless ADSL 2 2 Router with 2T2R MIMO antenna technology ADN 4100A provides office and residential users the ideal solution for sharing a high speed ADSL 2 2 broadband Internet connection and four 10 100Mbps Fast Ethernet backbone It can support downstream transmission rates of up to 24Mbps and upstream transmission rates of up to 3 5Mbps The product supports PPPoA RFC 2364 PPP over ATM Adaptation Layer 5 RFC 2684 encapsulation over ATM bridged or routed PPP over Ethernet RFC 2516 and IPoA RFC1483 to establish a connection with ISP Wireless Coverage Plus With built in IEEE 802 11b g n wireless network capability all computers and wireless enabled network devices can connect to ADN 4100A without additional cabling The ADN 4100A is equipped with external 5dBi hi gain antenna which provides stronger signal strength and excellent performance you can transfer file up to 300Mbps transfer data rate upload and download data rate so you don t need to worry if the size of your office or house is big Advanced Wireless Security To secure the wireless communication ADN 4100A supports most up to date encryption WEP and WPA PSK WPA2 PSK In order to simplify the security settings ADN 4100A supports WPS configuration with PBC PIN type Your w
51. ertificates page as shown in the following figure appears CERTIFICATES TRUSTED CA Trusted CA certificates are used by you to verify peers s certificates Trusted CA Click Trusted CA and the page as shown in the following figure appears TRUSTED CA CERTIFICATE AUTHORITY CERTIFICATES mame Subiect o o BA Note Before importing a certificate you must synchronize the system time with time server Otherwise the certificate fails to be imported Click Input Certificate to import a certificate The page as shown in the following figure appears 71 TRUSTED CA CERTIFICATES Enter certificate name and paste certificate content IMPORT CA CERTIFICATE Certificate Name Certificate lt Import CA certificate Here gt END CERTIFICATE 3 3 10 10 PPTP The Point to Point Tunneling Protocol PPTP is a method for implementing virtual private networks PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets In the NETWORK TOOLS page click PPTP the page as shown in the following figure appears 72 Allows you to transmit data in safety tunnel PPTP SETUP Enable PPTP Local IP Start 192 168 1 1 Local IP Num 20 Remote IP Start 192 168 1 100 Remote IP Num 20 Netmask 255 255 255 0 Apply Cancel PPTP ACCOUNT CONNECTION LISTT Tunnel s Used Tunnel s Availiable The following table describes the parameters in this page Field
52. gs 31 In the DHCP CLIENT CLASS LIST page you can set an IP address range for some specification device The page as shown in the following figure appears DHCP CLIENT CLASS LIST Client class Min Address Max Address DNS Address ADD DHCP CLIENT CLASS OPTIONAL Client Class Name Min IP Address Max IP Address DNS Address The following table describes the parameters in this page Field Description Y Client Class Name Enter the Client Class name Min IP Address The IP Address for minimum Max IP Address The IP Address for maximum DNS Address Enter the DNS Address with the client class In the LOCAL NETWORK page you can assign LAN IP addresses for specific computers according to their MAC addresses DHCP RESERVATIONS LIST Status Computer Name MAC Address TP Address Click Add to add static DHCP reservation The page as shown in the following figure appears 32 ADD DHCP RESERVATION OPTIONAL Enable C Computer Name IP Address MAC Address The following table describes the parameters in this page Field Description Enable Select the check box to reserve the IP address for the designated PC with the configured MAC address Enter the computer name It helps you to recognize the Computer Name PC with the MAC address For example Father s Laptop IP Address Enter the IP address of the computer MAC Address Enter the MAC address of the computer Click Apply to save
53. he pre shared key You can select from the drop down list Aqqressive Encryption Algorithm You can select from the drop down list Fed f Description 3DES AES 128 AES 192 AES 256 You can select from the drop down list Integrity Algorithm You can select from the drop down list 768bit v T68bit Diffie Hellman Group 1024bit Key Exchange 1536bit 204 6bit 30 F2bit A096 bit Key Life Time Enter the time of key life Use Interface Select the use interface This is a dynamic page The displays are different some options are shown and hidden when different types or connections are chosen In this page set the parameters such as the IPSec connection name tunnel mode and remote IPSec gateway address After finishing setting click Apply to save the settings TI 3 3 11 Routing Choose Advanced gt Routing The page as shown in the following page appears STATIC ROUTE Static Route Static Route POLICY ROUTE Policy Route Policy Route DEFAULT GATEWAY Default Gateway Default Gateway RIP SETTINGS RIP Settings RIP Settings This page contains the following function items Static Route Policy Router Default Gateway and RIP setting 78 3 3 11 1 Static Route Choose Advanced gt Routing and click Static Route The page as shown in the following figure appears STATIC ROUTE Enter the destination network address subnet mask gateway AND OR available WAN interface
54. hole wireless network can be secured Advanced Networking function for Specific Application Via the user friendly management interface ADN 4100A can be managed by workstations running standard web browsers Furthermore ADN 4100A provides DHCP server NAT Virtual Server DMZ Access Control IP Filter PPTP IPSec VPN DDNS and UPnP capability For further IP compatibility it supports IPv6 as well 1 1 Safety Precautions Refer to the following instructions to prevent the device from risks and damage caused by fire or electric power Use volume labels to mark the type of power Use the power adapter packed within the device package Pay attention to the power load of the outlet or prolonged lines An overburden power outlet or damaged lines and plugs may cause electric shock or fire accident Check the power cords regularly If you find any damage replace the power cords at once Proper space left for heat dissipation is necessary to avoid damage caused by overheating to the device The long and thin holes on the device are designed for heat dissipation to ensure that the device works normally Do not cover these heat dissipation holes Do not put this device close to a place where a heat source exits or high temperature occurs Avoid the device from direct sunshine Do not put this device close to a place where it is over damp or watery Do not spill any fluid on this device Do not connect this device
55. icates used with TR 069 Certificates NETWORK TOOLS PPTP PPTP NETWORK TOOLS IPSEC Allows you to configure ipsec This page contains the following function items Port Mapping IGMP Proxy IGMP Snooping UPnP ADSL SNMP TR 069 Certificates PPTP and IPSec 63 3 3 10 1 Port Mapping In the NETWORK TOOLS page click Port Mapping The page as shown in the following figure appears PORT MAPPING Port Mapping A maximum 5 entries can be configured Port Mapping supports multiple port to PVC and bridging groups Each group will perform as an independent network To support this feature you must create mapping groups with appropriate LAN and WAN interfaces using the Add button The Delete button will remove the grouping and add the ungrouped interfaces to the Default group PORT MAPPING SETUP Group Name lat ethemetlethemet2 ethemet3 ethemet land wan0 vap0 WanOapIy In this page you can bind the WAN interface and the LAN interface to the same group Click Add to add port mapping The page as shown in the following figure appears ADD PORT MAPPING To create a new mapping group 1 Enter the Group name and select interfaces from the available interface list and add it to the grouped interface list using the arrow buttons to create the required mapping of the ports The group name must be unique 2 Click Apply button to make the changes effective immediately PORT MAPPING CONFIGURAT
56. iew the interfaces on your device that use RIP and the version of the protocol used If you enable RIP the device communicates with other devices using the routing information protocol RIP Click Apply to save the settings 3 3 12 Schedules Choose Advanced gt Schedules The page as shown in the following figure appears SCHEDULES Schedule allows you to create scheduling rules to be applied for your firewall Maximum number of schedule rules 20 SCHEDULE RULES O Ruename sun Mon Tue Wed Thu miO Sa strtTme stop time Click Add to add a schedule rule The page as shown in the following figure appears ADD SCHEDULE RULE OAll Week Select Day s Cisun Cmon OTue wed Otu Ofi Csat All Day 24 hrs C Start Time hour minute 24 hour time End Time hour minute 24 hour time The following table describes the parameters in this page Description Set the name of the schedule You can select one more or all of the seven days in a me week Field Description If you select the check box the rule applies throughout All Day 24 hrs a Nn a momen the 24 hours of the day Start Time Set the start time of the firewall End Time Set the end time of the firewall Click Apply to save the settings 3 3 13 NAT Choose Advanced gt NAT The page as shown in the following figure appears NAT Traditional NAT would allow hosts within a private network to transparently access host
57. ing through access points that bridge network traffic to a wired LAN Choose Setup gt Wireless The WIRELESS SETTINGS page as shown in the following figure appears WIRELESS SETTINGS WIRELESS BASIC Configure your wireless basic settings WIRELESS SETTINGS WIRELESS SECURITY Configure your wireless security settings Wireless Security 21 3 2 3 1 Wireless Basics In the WIRELESS SETTINGS page click Wireless Basic The page as shown in the following figure appears WIRELESS BASIC Use this section to configure the wireless settings for your router Please note that changes made in this section will also need to be duplicated to your wireless clients and PC WIRELESS NETWORK SETTINGS Enable Wireless Enable MultiAP Isolation L Wireless Network Name SSID ADN 4100 Visibility Status Visible Invisible Channel Standard ETSI 1 13 v Control Sideband Upper Wireless Channel Auto Scan v 802 11 Mode 802 11b g n Band Width 40 M Please take note of your SSID as you will need to duplicate the same settings to your wireless devices and PC Apply In this page you can configure the parameters of wireless LAN clients that may connect to the device The following table describes the parameters in this page Description Select or deselect the check box to enable or disable the wireless function Select or deselect the check box to enable or disable multiAP isolatio
58. is hidden and the terminal cannot obtain the SSID through passive scanning 38 Visibility Status Select whether users of the AP can communicate with each other You can select Off or On from the drop down list On indicates that computers connected to the device cannot communicate with each other WMM Advertise Select whether to enable WMM Set the maximum number of clients that can be Max Clients connected to the AP at the same time Its value range is 1 32 User Isolation Enable Wireless Guest Network SSID WAP1 Visibility Status Visible Invisible User Isolation Disable WMM Advertise 16 Max Clients Enable Wireless Guest Network SSID VAP2 Visibility Status Visible Invisible User Isolation Disable WMM Advertise 16 Max Clients Enable Wireless Guest Network _ SSID VAP3 Visibility Status Visible Invisible User Isolation Disable WMM Advertise Max Clients 16 1 32 39 Fits scription Enable Wireless Select or deselect the check box to enable or disable Guest Network the wireless interface SSID Similar to the primary SSID it identifies a wireless AP These settings are applicable only for more technically advanced users who have sufficient knowledge about wireless LAN Do not change these settings unless you know the effect of changes on the device Click Apply to save the settings 3 3 1 1 MAC Filtering In the ADVANCED WIRELESS
59. is not activated Rear Panel i 4 r sy r Ss F aa i Fa i TI NS ff fh N A HO eo of OA A ANY w F ff wee RESET CC i d Na L NC i a WLAN LINE LAN i LAN LAND LAN POWER 0 If j w e i S A I T l 7 i i The following table describes the interfaces and buttons of the device RJ 11 interface for connecting the interface of the telephone set through the telephone cable LAN3 LAN4 computer or an Ethernet device adapter Restore to factory defaults To restore factory defaults RESET keep the device powered on push a paper clip into the hole to press the button for over 3 seconds and then release Press the button and hold it for 1 second to enable disable WLAN Press the button and hold it for 3 or more than 3 seconds to initialize WPS negotiation ON OFF Power switch power on or off the device WPS WLAN 1 3 System Requirements Recommended system requirements are as follows A 10Base T 100Base TX Ethernet card is installed on your PC Ahub or switch is available for connecting one Ethernet interface on the device and several PCs Operating system Windows 7 Vista XP 2008 server 2003 server 2000 ME 98SE Internet Explorer V6 0 or higher Netscape V4 0 or higher or Firefox 1 5 or higher 1 4 Features The device supports the following features Internet Access Features Shared Internet Access All users on the LAN can access
60. k Cell Rate nme transmission Sustainable Cell Set the minimum transmission rate of the cell in ATM Rate transmission Maximum Burst Set the maximum burst size of the cell in ATM Size transmission Select PPP over ATM PPPoA PPP over Ethernet Protocol PPPoE MAC Encryption Routing MER IP over ATM IPoA Bridging or PPTP from the drop down list Encapsulation Select LLC or VCMUX from the drop down list Usually Mode you can select LLC If you enter a value packets from the interface is tagged 802 1Q VLAN ID with the set 802 1q VLAN ID Its value range is 0 4094 while 0 indicates to disable this function Enable Proxy Arp Check this to enable proxy arp Protocol Type You can select the IPv4 IPv6 or IPv4 amp 6 NETWORK ADDRESS TRANSLATION SETTINGS Select or deselect the check box to enable or disable the Enable NAT NAT connection Select Symmetric Nat or Full cone Nat from the NAT Type ee j drop down list Enable WAN Select or deselect the check box to enable or disable the Service WAN connection 20 Service Category Field Description The name to identify the WAN connection You need not Service Name o modify it 3 2 3 Wireless Setup This section describes the wireless LAN and some basic configuration Wireless LANs can be as simple as two computers with wireless LAN cards communicating in a pear to pear network or as complex as a number of computers with wireless LAN cards communicat
61. l server is added PORT FORWARDING Port Forwarding allows you to direct incoming traffic from the WAN side identified by protocol and external port to the internal server with a private IP address on the LAN side The internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side A maximum of 80 entries can be configured Select the service name and enter the server IP address and click Apply to forward IP packets for this service to the specified server Note Modifying the Internal Port Start or Internal Port End is not recommended If the External Port Start or the External Port End changes the Internal Port Start or Internal Port End automatically changes accordingly PORT FORWARDING SETUP Add Edit Delete 46 3 3 3 DMZ Choose Advanced gt DMZ The page as shown in the following figure appears The DSL Router will forward IP packets from the WAN that do not belong to any of the applications configured in the Port Forwarding table to the DMZ host computer Enter the computer s IP address and click ApplyS to activate the DMZ host Clear the IP address field and click Apply to deactivate the DMZ host DMZ HOST WAN Connection pppoe_0_35 00 Enable DMZ DMZ Host IP Address In this page you can enable a DMZ host In this way access from Internet to the WAN IP address of the device is for
62. legacy clients while maintaining higher security with stations that are WPA2 capable Also the strongest cipher that the client supports will be used For best security use WPA2 Only mode This mode uses AES CCMP cipher and legacy stations are not allowed access with WPA security For maximum compatibility use WPA Only This mode uses TKIP cipher Some gaming and legacy devices work only in this mode To achieve better wireless performance use WPA2 Only security mode or in other words AES cipher WPA PSK does not require an authentication server The WPA option requires an external RADIUS server WPA Mode VVPA2 PSK Group Key Update Interval 100 PRE SHARED KEY Pre Shared Key Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC Apply Cancel Parameters in this page are similar to those in the page for Auto WPA or WPA2 Click Apply to save the settings WPA Only If the Security Mode is set to WPA only the page as shown in the following figure appears 28 WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless clients and PC WIRELESS SECURITY MODE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2
63. m the Field O Description drop down list You can select PPPoE IPv4 IPv6 AppleTalk IPX NetBEUI or IGMP Destination MAC Enter the destination MAC address to be mapped Address Source MAC Enter the source MAC address to be mapped Address Select the frame direction to be mapped from the Frame Direction drop down list The device supports frame direction from LAN to WAN and WAN to LAN Select the time that you want to apply the rule from the Time schedule drop down list You can select Always or Never Select the WAN interface to be mapped from the Wan interface l drop down list Click Apply to save the settings 3 3 6 QoS Configuration Choose Advanced gt QoS Configuration The page as shown in the following figure appears QOS GLOBAL OPTIONS Configure QoS Global Options Configure QoS Global Options QOS QUEUE CONFIGURATION Configure QoS Queue Configure QoS Queue QOS CLASSIFICATION CONFIGURATION Configure QoS Classification Configure QoS Classification 55 3 3 6 1 QoS Global Option In the QoS Configuration page click QoS Global Option The page as shown in the following figure appears QOS GLOBAL CONFIGURATION Enable Queuing Operation In this page you can select or deselect the check box to enable or disable the Queuing Operation 3 3 6 2 Queue Configuration In the QoS Configuration page click Qos Queue Configuration The page as shown in the following
64. n If this function is enabled clients of different SSIDs cannot access each other Enable Wireless Enable MultiAP Isolation Wireless Network Network name It can contain up to 32 characters It Name SSID can consist of letters numerals and or underlines Visible indicates that the device broadcasts the SSID Invisible indicates that the device does not broadcast the SSID Visibility Status Field Description You can select from the drop down list FCC 1 11 Ch Standard anne MANES ETS 1 13 JP 1 14 Control Sideband You can select Upper or Lower from the list Select the wireless channel used by the device from Wireless Channel the drop down list You can select Auto Scan or a value from CH1 CH13 Auto Scan is recommended Select the 802 11 mode of the device from the 802 11 Mode drop down list The device supports 802 11b 802 119 802 11n 802 11b g 802 11n g and 802 11b g n Band Width You can set the eee only in me 802 11n mode You can set the bandwidth of the device to 20M or 40M Click Apply to save the settings 3 2 3 2 Wireless Security In the WIRELESS SETTINGS page click Wireless Security The page as shown in the following figure appears WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless dients and PC WIRELESS SECURITY MO
65. name so it can be easily recognized by wireless clients For security purposes it is highly recommended to change the pre configured network name Wireless Network Name SSID ADN 4100 Select Visible to publish your wireless network and SSID can be found by wireless clients or select Invisible to hide your wireless network so that users need to manually enter SSID in order to connect to your wireless network Visibility Status Visible Invisible In order to protect your network from hackers and unauthorized users it is highly recommended you choose one of the following wireless network security settings Best None wep WPA PSK WPA2 PSK Security Mode None Select this option if you do not want to activate any security features Step 6 View the configuration information of the device To modify the information click Back To effect the configuration click Next STEP 4 COMPLETED AND RESTART Setup complete Click Back to review or modify settings If your Internet connection does not work you can try the Setup Wizard again with alternative settings or use Manual Setup instead if you have your Internet connection details as provided by your ISP SETUP SUMMARY Below is a detailed summary of your settings Please print this page out or write the information on a piece of paper so you can configure the correct settings on your wireless client adapters BA Note In each step of the
66. nfig SLAAC The PC will obtained the prefix but not mode obtained the DNS DHCPv6 The PC will obtained the prefix and DNS from DHCPv6 34 3 2 6 Time and Date Choose Setup gt Time and Date The TIME AND DATE page as shown in the following figure appears TIME AND DATE The Time Configuration option allows you to configure update and maintain the correct time on the internal system clock From this section you can set the time zone that you are in and set the NTP Network Time Protocol Server Daylight Saving can also be configured to automatically adjust the time when needed TIME SETTING 7 Automatically synchronize with Internet time servers 1st NTP time server 192 168 2 10 2nd NTP time server 192 168 2 100 TIME CONFIGURATION Current Local Time 2010 10 10 00 05 09 Time Zone GMT Greenwhich Mean Time Dublin Lisbon London Casablanca Enable Daylight Saving Year Mon Day Hour Min Sec Year Mon Day Hour Min Sec Cancel In the TIME AND DATE page you can configure update and maintain the time of the internal system clock You can set the time zone that you are in and the network time protocol NTP server You can also set daylight saving time to automatically adjust the time when needed Select Auto matically synchronize with Internet time servers Select the appropriate time server and the time zone from the corresponding drop down lists Select Enable Daylight Saving if necessary
67. or in other words AES cipher WPA PSK does not require an authentication server The WPA option requires an external RADIUS server WPA Mode Auto WPA or WPA2 Enterprise Group Key Update Interval 100 EAP 802 1X When WPA enterprise is enabled the router uses EAP 802 1x to authenticate clients via a remote RADIUS server RADIUS server IP Address 192 168 1 1 RADIUS server Port 2801 RADIUS server Shared Secret testradiuskey Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC You need to enter the IP address port shared key of the RADIUS server Click Apply to save the settings WPA2 Only If the Security Mode is set to WPA2 only the page as shown in the following figure appears 2 WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless clients and PC WIRELESS SECURITY MODE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2 WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of security Security Mode VPA2 only WPA Encryption AES WPA Use WPA or WPA2 mode to achieve a balance of strong security and best compatibility This mode uses WPA for
68. ose matching with any of the specified rules in the following table DENY means that all MAC layer frames will be DENIED except those matching with any of the specified rules in the following table Create a filter to identify the MAC layer frames by specifying at least one condition below If multiple conditions are specified all of them take effect Click Apply to save and activate the filter WARNING Changing from one global policy to another will cause all defined rules to be REMOVED AUTOMATICALLY You will need to create new rules for the new policy Bridge Filtering Global Policy ALLOW all packets but DENY those matching any of specific rules listed DENY all packets but ALLOW those matching any of specific rules listed Pepi DISPLAY LIST O ovaya protol DMAC O SMAC DR TME This page is used to configure bridge parameters In this page you can modify the settings or view the information of the bridge and its attached ports Click Add to add a bridge filter The page as shown in the following figure appears ADD BRIDGE FILTER Protocol Type Click to Select x Destination MAC Address XXEXXIXX XX XX XX Source MAC Address XXIXXIXXIXXIXX XX Frame Direction WAN gt LAN Time schedule View Available Schedules Wan interface select all interface The following table describes the parameters in this page Description Protocol Type Select the protocol type to be mapped fro
69. page click MAC Filtering The page as shown in the following figure appears MAC ADDRESS The MAC Address Access Control mode if enabled permits access to this route from host with MAC addresses contained in the Access Control List Enter the MAC address of the management station permitted to access this route and click Apply ACCESS CONTROL MAC ADDRESSES Enable Access Control Mode Add Delete Click Add and the page as shown in the following figure appears MAC ADDRESS MAC Address XXIXXIXXIXXIXXIXX Apply h Cancel The following table describes the parameters in this page 40 Fed escription Enter the MAC address of another device that is MAC A C Address included in MAC filtering Click Apply to save the settings 3 3 1 2 Security Settings In the ADVANCED WIRELESS page click Security Settings The page as shown in the following figure appears WIRELESS SECURITY Use this section to configure the wireless security settings for your router Please note that changes made on this section will also need to be duplicated to your wireless clients and PC WIRELESS SSID ADN 4100 WIRELESS SECURITY MODE To protect your privacy you can configure wireless security features This device supports three wireless security modes including WEP WPA and WPA2 WEP is the original wireless encryption standard WPA and WPA2 provides a higher level of securit
70. poration dat Wireless Access Point in overeerstemming is met de essenti le eisen en de andere relevante bepalingen van richtliin 1999 5 EG Niniejszym frma PLANET Technology Corporation cSvwiadcza ze Wireless Access Point spetinia wszystkie istotne wymogi i klauzule Zawarte w dokumencie Directive 1999 5 EC PLAHET Technology Corporation declara que este Wireless Access Point est conforme com os requisitos essenciais e outras disposi es da Directiva 1999 5 CE vyrobca PLANET Technology Corporation t mto deklaruje e t to Wireless Access Point je v s lade so z kladn mi po iadavkami a dal mi relevantnymi predpismi smernice 1999 5 EC PLANET Technology Corporation s tem potrjuje da je ta Wireless Access Point skladen az osnovnimi zahtevami in ustreznimi dolo ili Direktive 1999 5 C PLAHET Technology Corporation vakuuttaa t ten ett Wireless Access Point tyyppinen laite on direktiivin 1999 5 E oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen H rmed intygar PLANET Technology Corporation att denna Wireless Access Point st r i verensst mmelse med de v sentliga egenskapskrav och vriga relevanta best mmelser som framg r av direktiv 19995 EG CONTENT MOM CR VICI orcs caccs ke access cde see ksahcs aeaa S 1 1 1 Safety Precautions veccsvcsssccdecssscsdevascessecevessscessdeocceaccenscessccaceesves 2 1 2 LEDS and Inter facess cccccccccsccsccccccccc
71. protocol and port and redirects these requests to the server on your LAN with the specified LAN IP address Note that the specified private IP address must be within the available IP address range of the subnet where the device is in Choose Advanced gt Port Forwarding The page as shown in the following figure appears PORT FORWARDING Port Forwarding allows you to direct incoming traffic from the WAN side identified by protocol and external port to the internal server with a private IP address on the LAN side The internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side A maximum of 80 entries can be configured Select the service name and enter the server IP address and click Apply to forward IP packets for this service to the specified server Note Modifying the Internal Port Start or Internal Port End is not recommended If the External Port Start or the External Port End changes the Internal Port Start or Internal Port End automatically changes accordingly PORT FORWARDING SETUP ame comano oard OR Seeing Adar Rae ip Add Edit Delete 44 Click Add to add a virtual server See the following figure PORT FORWARDING SETUP Remaining number of entries that can be configured 32 WAN Connection s pppoe_0 35 0 0 v Server Name Select a Service lick to select v Custom Server Schedule View A
72. r individual users on the Internet This provides the most flexibility to run programs which could be incompatible in NAT environment Parental Control and Scheduling ADN 4100A provides parents to help protect their children and set restrictions while surfing Internet Universal Plug and Play UPnP UPnP allows automatic discovery and configuration of the Broadband Router UPnP is supported by Windows ME XP or later Dynamic DNS Support When used with the Virtual Servers feature ADN 4100A allows users to connect to Servers on your LAN using a Domain Name even if you have a dynamic IP address which changes every time you connect VPN Pass through Support PCs with VPN Virtual Private Networking software using PPTP L2TP and IPSec are transparently supported no configuration is required PPTP and IPSec VPN ADN 4100A supports PPTP and IPSec VPN tunneling The IPSec VPN has DES 3DES and AES encryption and SHA 1 MD5 authentication RIP Routing ADN 4100A supports RIPvi 2 routing protocol for routing capability Simple Network Management Protocol SNMP It is an easy way to remotely manage the router via SNMP LAN Features 4 Port Switch ADN 4100A incorporates a 4 Port 10 100BaseT switching hub making it easy to create or extend your LAN DHCP Server Support Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices upon request ADN 4100A can act as a DHCP Server for devices on your local L
73. r off your router before the update is complete FIRMWARE UPDATE Current Firmware Version V1 7 Current Firmware Date 2012 03 12 Select File Clear Config C Update Firmware 86 In this page you can upgrade the firmware of the device To update the firmware do as follows Step 1 Click Browse to select the file Step 2 Select Clear Config Step 3 Click Update Firmware to update the configuration file The device loads the file and reboots automatically Caution Do not turn off your device or press the Reset button when the procedure is in progress 3 4 3 Access Controls Choose Management gt Access Controls The ACCESS CONTROLS page as shown in the following figure appears ACCESS CONTROLS ACCOUNT PASSWORD Manage DSL Router user accounts Account Password ACCESS CONTROLS SERVICES A Service Control List SCL enables or disables services from being used Services ACCESS CONTROLS IP ADDRESS Permits access to local management services IP Address This page contains Account Password Services and IP Address 87 3 4 3 1 Account Password In the ACCESS CONTROLS page click Account Password The page as shown in the following figure appears ACCOUNT PASSWORD Access to your DSL Router is controlled through three user accounts admin support and user The user name support is used to allow an ISP technician to access your DSL Router for main
74. rivate network The IP address of the device is the base address used for DHCP To use the device for DHCP in your LAN the IP address pool used for DHCP must be compatible with the IP address of the device The IP address available in the DHCP IP address pool changes automatically if the IP address of the device changes You can also enable the secondary LAN IP address The primary and the secondary LAN IP addresses must be in different network segments Choose Setup gt Local Network The Local Network page as shown in the following figure appears LOCAL NETWORK This section allows you to configure the local network settings of your router Please note that this section is optional and you should not need to change any of the settings here to get your network up and running ROUTER SETTINGS Use this section to configure the local network settings of your router The Router IP Address that is configured here is the IP Address that you use to access the Web based management interface If you change the IP Address here you may need to adjust your PC s network settings to access the network again Router IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Domain Name planet com Oo Configure the second IP Address and Subnet Mask for LAN IP Address Subnet Mask By default Enable DHCP Server is selected for the LAN interface of the device DHCP service provides IP settings to workstations configured to automatically obtain
75. s in the external network in most cases In a traditional NAT sessions are uni directional outbound from the private network Sessions in the opposite direction may be allowed on an exceptional basis using static address maps for pre selected hosts NAT TABLES Name Internal IP Address External IP Address NAT SETTINGS Entry Name Internal IP Type Sin gle IP w Internal IP Address External IP Type Single IP External IP Address f Traditional NAT would allow hosts within a Internal network to transparently access hosts in the external network you can select Single IP or IP Range with the Internal and External IP type and enter the Internal and External IP address to decide witch Internal IP address transparently the specify External IP address 83 3 3 14 Logout Choose Advanced gt Logout The page as shown in the following figure appears Logging out will close the browser Click Logout to log out of the configuration page 84 3 4 Management 3 4 1 System Choose Management gt System Management The System page as shown in the following figure appears SYSTEM REBOOT Click the button below to reboot the router SYSTEM BACKUP SETTINGS Back up Router configurations You may save your router configurations to a file on your PC Note Please always save configuration file first before viewing it Backup Setting SYSTEM UPDATE SETTINGS Update Router settings You
76. ss Point 2YMMOPOONETA NPOE TNE OYZSIOAEIS AMAITHEEIS KA TIE AONTEE EXETIKEE AIATAZEIZ THE OAHTIAE 1998 VEK Por medio de la presente PLANET Technology Corporation declara que Wireless Access Point cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Par la pr sente PLANET Technology Corporation d clare que les appareils du Wireless Access Point sont conformes aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 CE Con la presente PLANET Technology Corporation dichiara che questo Wireless Access Point conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Ar o PLANET Technology Corporation apliecina ka ST Wireless Access Point atbilst Direkt vas 1999 5 EK pamatprasibam un citiem atbilsto iem noteikumiem iuo PLANET Technology Corporation skelbia kad Wireless Access Pointtenkina visus svarbiausius 1999 S5 EC direktyvos reikalavimus ir kitas svarbias nuostatas A gy t PLANET Technology Corporation kijelenti hogy ez a Wireless Access Point megfelel az 1999 5 EK ir nyelv alapk vetelm nyeinek s a kapcsol d rendelkez seknek Hawnhekk PLANET Technology Corporation jiddikjara li dan Wireless Access Point jikkonforma mal Ftigijiet essenzjali u ma provvedimenti ohrajn relevanti li hemm fid Dirrettiva 1999 5 EC Hierbij verklaart PLANET Technology or
77. sword 61 The following table describes the parameters in this page Field Description Select the DDNS provider from the drop down list You DDNS provider can select Planet DynDns org TZO or GnuDIP osname Enter the host name that you register with your DDNS Hostname l provider Select the interface that is used for DDNS service from Interface the drop down list The IP address of the interface corresponds to the host name Enter the user name of your DDNS account Enter the password of your DDNS account Click Apply to save the settings 3 3 10 Network Tools Choose Advanced gt Network Tools The NETWORK TOOLS page as shown in the following figure appears NETWORK TOOLS PORT MAPPING Port Mapping supports multiple port to PVC and bridging groups Each group will perform as an independent network NETWORK TOOLS IGMP PROXY Transmission of identical content such as multimedia from a source to a number of recipients IGMP Proxy NETWORK TOOLS IGMP SNOOPING Transmission of identical content such as multimedia from a source to a number of recipients IGMP Snooping NETWORK TOOLS UPNP Allows you to enable or disable UPnP 62 NETWORK TOOLS ADSL Allows you to configure advanced settings for ADSL NETWORK TOOLS SNMP Network Tools SNMP NETWORK TOOLS TR 069 Allows you to configure TR 069 protocol NETWORK TOOLS CERTIFICATES Allows you to manage certif
78. t Filtering Options The FILTERING OPTIONS page as shown in the following figure appears FILTERING OPTIONS IP FILTERING Uses IP address to implement filtering FILTERING OPTIONS BRIDGE FILTERING Uses MAC address to implement filtering Usefull only in bridge mode 51 3 3 5 1 IP Filtering In the Filtering Options page click IP Filtering The FIREWALL page as shown in the following figure appears IP FILTER The screen allows you to create a filter rule to identify incoming IP traffic by specifying a new filter name and at least one condition below All of the specified conditions in this filter rule must be satisfied for the rule to take effect Click Apply to save and activate the filter FIREWALL _ Add Filter Edit Filter Delete Filter Enabled Protocol Action RejectType IcmpType OrigIP Mask OrigPort DestIP Mask DestPort Bytes Pkts Add Rule Edit Rule Delete Rule Click Add to add an IP filter The page as shown in the following figure appears IP FILTER The screen allows you to create a filter rule to identify incoming IP traffic by specifying a new filter name and at least one condition below All of the specified conditions in this filter rule must be satisfied for the rule to take effect Click Apply to save and activate the filter FIREWALL FILTER INFO Name Interface LAN Type In v Default action Permit Default Chain
79. t User Name Connection Request Password In this page you can configure the TR 069 CPE The following table describes the parameters in this page Field Description ou can select Disabled or Enabled to disable or enable TRO69 Configuration l R 069 configuration You can select Disabled or Enabled to disable or enable notification Disabled indicates that the device does not pare automatically send requests to the TRO69 server Enabled indicates that the device automatically sends a request of connection to the TRO69 server The following function items are available only when Inform is set to Enabled The interval of sending a request of connection to the Inform Interval TRO69 server from the device ACS URL The path of the TRO69 server to which the device sends a request The user name that the devices uses to log in to the ACS User Name g TRO69 server The password that the devices uses to log in to the ACS Password poet g j g TRO69 server Select the check box to enable authentication of Connection Request connection request If you enable the function you Authentication need to enter the user name and password for authentication User Name the TRO69 progress of the device The password that the TRO69 server uses to access Password the TRO69 progress of the device Click Apply to save settings 70 3 3 10 9 Certificates In the NETWORK TOOLS page click Certificates The C
80. tation permitted to access the local management services and click Apply ACCESS CONTROL IP ADDRESSES C Enable Access Control Mode In this page you can configure the IP address in the access control list ACL If ACL is enabled only devices of the specified IP addresses can access the device Select Enable Access Control Mode to enable ACL Q Note If you enable ACL ensure that the IP address of the host is in the ACL list 90 Click Add The page as shown in the following figure appears IP ADDRESS IP Address Enter the IP address of the desired device in the IP Address field and click Apply to apply the settings 3 4 4 Diagnostics Choose Management gt Diagnosis The page as shown in the following figure appears WAN DIAGNOSTICS WAN Diagnostics PING DIAGNOSTICS Ping Diagnostics This page contains WAN Diagnostics and Ping Diagnostics 3 4 4 1 WAN Diagnostics In the Diagnosis page click WAN Diagnostics The page as shown in the following figure appears DIAGNOSTICS The DSL router can test your DSL connection The individual tests are listed below If a test displays a fail status click the Run Diagnostic Test button again to make sure the fail status is consistent WAN Connection br_0 35 0 0 v Run Diagnostic Tests In this page you can test the connection status of the device Click Run Diagnostic Test to run diagnostics The page as shown in the following figure
81. tenance and to run diagnostics This user name can not be used in local The user name user can access the DSL Router view configuration settings and statistics as well as update the router s firmware Use the fields below to enter up to 16 characters and click Apply to change or create passwords Note Password cannot contain a space ACCOUNT PASSWORD Username admin New Username admin Current Password New Password Confirm Password Passwords support 16 characters such as 0 9 a z A Z WEB IDLE TIME OUT SETTINGS Web Idle Time Out 29 5 30 minutes In this page you can change the password and set the time for automatic logout You are recommended to change the default password to ensure the security of your network Ensure that you remember the new password or write it down and keep it in a safe location for future reference If you forget the password you need to reset the device to the factory default settings In that case all configuration settings of the device are lost 88 The following table describes the parameters in this page Field O Description ACCOUNT PASSWORD Select a user name from the drop down list to access Username the device You can select admin user New Username Enter the new username Current Password Enter the password of the user New Password Enter the new password Confirm Password Enter the new password again for confirmation WEB IDLE TIME OUT SETT
82. the Internet through ADN 4100A using only a single external IP Address The local invalid IP Addresses are hidden from external sources This process is called NAT Network Address Translation Built in ADSL 2 2 Modem ADN 4100A provides ADSL 2 2 modem and supports all common ADSL connections PPPoE PPPoA and Direct Connection Support Various WAN connections are supported by ADN 4100A Multiple PVCs for Triple Play Service Data IPTV VoIP application Co work with data IPTV and IP telephony services protocol through specific PVCs at the same time Fixed or Dynamic IP Address On the Internet WAN port connection ADN 4100A supports both Dynamic IP Address IP Address is allocated on connection and Fixed IP Address Advanced Internet Functions QoS Quality of Service divides this capacity between the different applications and provides underplayed continuous data transfer where data packets with higher priority are given preference 5 Firewall Supports simple firewall with NAT technology and provides option for access control from Internet like Telnet FTP TFTP HTTP SNMP and ICMP services It also supports IP MAC Application URL filtering Port Forwarding Virtual Server This feature allows Internet users to access Internet servers on your LAN The required setup is quick and easy DMZ Support ADN 4100A can translate public IP addresses to private IP address to allow unrestricted 2 way communication with Servers o
83. to directly obtain the device information Enable SNMP Agent Universal character to modify the device configuration It is similar to the password The SNMP application Set Community l j i l Aj entity can use it to directly modify the device configuration Enter the address of the server that receives the trap Trap Manager IP message The field that is included in the trap message sent b Trap Community l P j J the device Select the trap version from the drop down list You can Trap Version select v1 or v2c 68 Click Apply to save the settings 3 3 10 7 TR 064 In the NETWORK TOOLS page click enable item to enable the TR 064 The page as shown in the following figure appears TRO64 CONFIGURATION This page is used to configure the TR064 protocol TRO64 CONFIGURATION g Enable TR064 Apply cance 3 3 10 8 TR 069 In the NETWORK TOOLS page click TR 069 The page as shown in the following figure appears TR 069 WAN Management Protocol TR 069 allows a Auto Configuration Server ACS to perform auto configuration provision collection and diagnostics to this device Select the desired values and click Apply to configure the TR 069 client options TR 069 CLIENT CONFIGURATION TRO69 Configuration Disabled Enabled Inform Disabled Enabled Inform Interval 86400 ACS URL ACS User Name ACS Password eeeee Connection Request Authentication Connection Reques
84. urce port range of the packet Destination port range Enter the destination port range of the packet CLASSIFY MATCH RESULT Specify the queue to which the packet belongs You Classify Queue ais i l j l j i can set the queue in the classification configuration DSCP Mark Attach the DSCP mark to the mapped packet Cos Mark Attach the 802 1p mark to the mapped packet Click Submit Apply to save the settings 58 3 3 7 Firewall Settings A denial of service DoS attack is one of the most common network attacks and is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service It usually leads to overload of system server or core dump of the system Choose Advanced gt Firewall Settings The page as shown in the following figure appears FIREWALL SETTINGS Click Apply button to make the changes effective immediately FIREWALL CONFIGURATION Enable Attack Prevent Icmp Echo Fraggle Echo Chargen IP Land Port Scan TCP Flags Set SYN FIN TCP Flags Set SYN RST TCP Flags Set FIN RST TCP Dos TTCP DoS Max Rate 50 Click Apply to save the settings 3 3 8 DNS Domain name system DNS is an Internet service that translates domain names into IP addresses Because domain names are alphabetic they are easier to remember The Internet however is actually based on IP addresses Each time you use a domain name a DNS service must translate the name
85. vailable Schedules Server IP Address 192 168 1 E ie sf BT N Please refer the description as below Field Description Select the WAN connection which you want the remote WAN Connection side via this connection to access in Select a Service Select the default service for the port forwarding If you can t find the service in the default service Custome Server column you can create a new service name by yourself Schedule Choose the schedule which you want to open the port Field Description forwarding feature You also can click View Available Schedules to select the schedule Enter an IP address in the Server IP Address field to Server IP Address appoint the corresponding PC to receive forwarded packets Enter the service service Internet application port number from the Internet that will be re directed to the above Server IP Address host in your LAN Select the port number protocol type TCP UDP This is the port number of the above Server IP Internal Port Address that the External Port number will be changed Start End to when the packet enters your LAN to the LAN Server Client IP The Remote IP means only this IP address can be Remote lp forward to the local side if leave this item blank then every remoter IP can be forwarding External Port Start End Click Apply to save the settings The page as shown in the following figure appears A virtua
86. vice supports dynamic domain name service DDNS The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains and allows access to a specified host from various locations on the Internet Click a hyperlinked URL in the form of hostname dyndns org and allow remote access to a host Many ISPs assign public IP addresses using DHCP so locating a specific host on the LAN using the standard DNS is difficult For example if you are running a public web server or VPN server on your LAN DDNS ensures that the host can be located from the Internet even if the public IP address changes DDNS requires that an account be set up with one of the supported DDNS service providers DyndDNS org or Dlinkddns com Choose Advanced gt Dynamic DNS The page as shown in the following page appears The Dynamic DNS feature allows you to host a server Web FTP Game Server etc using a domain name that you have purchased www xxx com with your dynamically assigned IP address Most broadband Internet Service Providers assign dynamic changing IP addresses Using a DDNS service provider your friends can enter your host name to connect to your game server no matter what your IP address is Click Add to add dynamic DNS The page as shown in the following figure appears ADD DYNAMIC DNS DDNS provider DynDNS org Hostname Interface pppoe_0_35_0_0 Username Pas
87. warded to the DMZ host and network server of the internal LAN is protected Click Apply to save the settings 3 3 4 Parental Control Choose Advanced gt Parental Control The PARENTAL CONTROL page as shown in the following figure appears PARENTAL CONTROL BLOCK WEBSITE Uses URL i e www yahoo com to implement filtering Block Website PARENTAL CONTROL MAC FILTER Uses MAC address to implement filtering MAC Filter 47 This page provides two useful tools for restricting Internet access Block Website allows you to quickly create a list of websites that you wish to prevent users from accessing MAC Filter allows you to control Internet access by clients or PCs connected to the device 3 3 4 1 Block Website In the PARENTAL CONTROL page click Block Website The page as shown in the following figure appears BLOCK WEBSITE This page allows you to block websites If enabled the websites listed here will be denied access to clients trying to browse that website BLOCK WEBSITE Add Edit Delete Click Add The page as shown in the following page appears ADD SCHEDULE RULE URL hittp Schedule Allways View Available Schedules Manual Schedule Enter the website in the URL field Select the time to block websites from the Schedule drop down list or select Manual Schedule and set the corresponding time and days Click Apply to add the website to the
88. word of the normal user are user and user respectively If the login information is incorrect the page as shown in the following figure appears 11 Bicrosoft Internet Explorer xX A Username or Password wrong Click OK to log in again 1 Note In the LAN you can use either of the following two levels of user accounts displayed in the user name password format to access the device admin admin and user user In the WAN you can use one of the following three levels of user accounts displayed in the user name password format to access the device admin admin user user and support support 3 2 General Configuration 3 2 1 Wizard Wizard helps you to fast and accurately configure Internet connection and other important parameters The following sections describe these various configuration parameters When subscribing to a broadband service be aware of the Internect connection mode The physical WAN device can be Ethernet DSL or both Technical information about properties of Internet connection is provided by your Internet service provider ISP For example your ISP should inform you whether you are connected to the Internet using a static or dynamic IP address and the protocol such as PPPoA or PPPoE that you use to communicate on the Internet 12 Step 1 Choose Setup gt Wizard The page as shown in the following figure appears e PLANET 802 11n ADSL 2 2 Router Networking amp Communication
89. y Security Mode None Please take note of your SSID and security Key as you will need to duplicate the same settings to your wireless devices and PC Select the desired SSID from the drop down list Select the encryption type from the Security Mode drop down list You can select None WEP AUTO WPA or WPA2 WPA Only or WPA2 Only For parameters of different encryption types see section 3 2 3 2 Wireless Security Click Apply to save the settings 41 3 3 1 3 WPS Settings In the ADVANCED WIRELESS page click WPS Setting The WIRELESS WPS page as shown in the following figure appears WIRELESS WPS WPS The condition of use WPS you can choose different auth mode in Security Setting page and broadcast the SSID The pin code will be saved when you press PIN button WPS Enabled SSID Select Mode Configuration State Push Button Input Station PIN ADN 4100 Enrollee i Configured v WPS Session Status O Note PBC Ensure that the network card supports the WPS function Fed Description Enabled The WPS service is enabled by default Select Mode Select Enrollee or Registrar from the drop down list Select Configured or Unconfigured from the drop down list Configured Means the WPS featuere Configuration State Input Station PIN already standby Otherwise the Unconfigured means not yet ready If you are using the PIN method you need a Registrar either an ac
Download Pdf Manuals
Related Search
Related Contents
「組立説明書」PDFファイル はこちら GBC CoilBind ColourCoils le SNITPECT-FO mode d`emploi xPortal3000 User Manual Exacompta 51764E ring binder Bedienungsanleitung Neodrives Akku Massive Wall light 16280/87/10 instructions générales d`utilisation et de montage pour les Copyright © All rights reserved.
Failed to retrieve file