The Router automatically runs a ping test, and the results are displayed in the Diagnostics screen. To rename a networked device, locate the device in the My Network column, then click Rename This Device. This chapter explains how to create a wireless network using the Wireless Broadband Router, including accessing and configuring wireless security options.
The Wireless Broadband Router provides the user with wireless connectivity over the Both operate in the 2. This information is displayed on a sticker located on the bottom of the Router. The Router integrates multiple layers of security. These include the IEEE The SSID must be identical for all devices on the wireless network. It is case-sensitive and cannot exceed 32 characters. Make sure the SSID is the same for all devices to be connected to the wireless network.
Displays the channel to which the wireless connection is currently set. All devices on the wireless network must be on the same channel to function correctly.
Displays what kind of security is active on the wireless connection, and the security encryption key. Displays the types of wireless device that can join the network. Options include Each character must be a letter from A - F or a number from 0 - 9. Write down the wireless settings displayed on the screen.
Click Apply to save the settings. Note: The Advanced Security Settings should be configured by experienced technical users only. This section is used to configure different types of wireless security. Select the type of wireless security to apply to the wireless network by clicking the appropriate radio button, then configure the security settings in the subsequent screens.
Select the appropriate network authentication level from the dropdown list. Click Apply to save changes. If This server must be physically connected to the Router.
Click Apply at the bottom of the screen to save changes. Repeat steps 3 and 4 to add more devices to the list. When finished listing devices, click Apply. This option allows the user to select the wireless communication standard compatible with the devices to be connected on the wireless network from the drop- down list.
Displays the time during which the rule is active. Beacons are transmitted by the Router to help identify wireless networks. If beacons are transmitted too infrequently, networks may become hard to reach; if too frequently, they become a resource waste.
Enter the desired beacon interval value in milliseconds in this text box. A DTIM is a countdown mechanism for the Router, informing wireless network clients of the next window for listening to broadcast and multicast messages.
Setting the correct fragmentation threshold can increase the reliability of frame transmissions on the wireless network. Enter the fragmentation threshold in this text box. If the computer has wireless capabilities and is running Windows XP, it will automatically recognize this and create a wireless connection. If running another operating system, see the documentation that came with the wireless adapter being used.
Click Network Connections in the Control Panel. Double-click the wireless connection icon. Click the connection once to mark it, then click Connect at the bottom of the screen. An icon appears in the notification area, announcing the successful initiation of the wireless connection. Test the connection by disabling all other connections in the Network Connections window and browsing the Internet. However, any other user with a wireless-equipped device can also access the wireless network.
This section assumes the Router is set up with WPA security. Enter the pre-shared key in both text boxes and click Connect. Test the connection by disabling all other connections in the Network Connections window and surfing the Internet.
If the login window shown in step 3 does not appear and the connection attempt fails, configure the connection manually using the following procedure:. Click the connection to highlight it, then click Properties. When attempting to connect to the wireless network, the login window appears, pre-populated with the pre-shared key. Press Connect to connect.
Since the network is now secured, only users who know the pre-shared key will be able to connect. The WPA security protocol is similar to securing network access using a password. Caution: The settings covered in this chapter should be configured by experienced network technicians only. To select a connection, click on its name. The rest of this chapter describes the different network connections available on the Router, as well as the connection types that can be created.
Note: When a network is disabled, its formerly underlying devices will not be able to get the DHCP address from the network interface to which they were connected. Welcome to ManualMachine. We have sent a verification link to to complete your registration. Log In Sign Up. Forgot password? Enter your email address and check your inbox. Please check your email for further instructions. Enter a new password. Wireless Broadband Router. All other names are properties of their respective owners. Introduction 1 Thank you for purchasing the Wireless Broadband Router.
Power Switch The Power switch powers the Router on and off. Connecting the Cables Note: If a different router was being used, disconnect it. Turn the Router on.
Windows 1. Windows NT 1. Macintosh OS X 1. Click Assist me. Linux 1. Configuring the Router 1. The Router is now configured.
Ethernet 1. Wireless 1. Coaxial 1. Power up the set top box. Using My Network Various settings can be accessed for a particular device, as follows. Access Device For devices that can be accessed such as Internet cameras and networked hard drives , locate it in the My Network column, then click Access Devices to use the device over the network.
Depending on the protocol selected, additional options appear in the screen. Click Test Connectivity. Creating a Wireless 4 Network This chapter explains how to create a wireless network using the Wireless Broadband Router, including accessing and configuring wireless security options. Overview The Wireless Broadband Router provides the user with wireless connectivity over the Channel Displays the channel to which the wireless connection is currently set.
Security Enabled Displays what kind of security is active on the wireless connection, and the security encryption key. Wireless Mode Displays the types of wireless device that can join the network. Level 1 Wireless Security This section is used to configure different types of wireless security. To set up wireless MAC authentication: 1. When should this rule occur?
Beacon Interval Beacons are transmitted by the Router to help identify wireless networks. Fragmentation Threshold Setting the correct fragmentation threshold can increase the reliability of frame transmissions on the wireless network.
Configuring a Wireless Windows XP Client If the computer has wireless capabilities and is running Windows XP, it will automatically recognize this and create a wireless connection. If the login window shown in step 3 does not appear and the connection attempt fails, configure the connection manually using the following procedure: 1.
Select Wireless Networks. Click OK, then OK again. Click Advanced to expand the screen and display all connection entries. Access Device For devices that can be accessed such as Internet cameras and networked hard drives , locate it in the My Network column, then click Access Devices to use the device over the network.
Click Test Connectivity. Click Go. The Router runs a ping test, and the results are displayed in the Diagnostics screen. Page Creating A Wireless Network Creating a Wireless Network This chapter explains how to create a wireless network using the Wireless Broadband Router, including accessing and configuring wireless security options. Overview The Wireless Broadband Router provides the user with wireless connectivity over the To deactivate, click in the check box to make the check mark disappear.
Actiontec recommends not changing the default values in this sec- tion unless the user is familiar with these networking concepts. Status Displays the status of the wireless connection. Maximum Transmission Unit specifies the largest packet size per- mitted for Internet transmission.
This setting controls what size data packet the low level protocol issues to an packet. Click OK to save changes. Actiontec recommends leaving this option deactivated. Double-click the wireless connection icon. Click Network Connections in the Control Panel. Click the connection once to mark it, then click Connect at the bottom of the screen. Page 42 Chapter 4 Creating a Wireless Network 2. Select Wireless Networks. Click the connection to highlight it, then click Properties.
Click OK, then OK again. When attempting to connect to the wireless network, the login window appears, pre-populated with the pre-shared key. The rest of this chapter describes the dif- ferent network connections available on the Router, as well as the connection types that can be created.
Actiontec recommends not changing the default values in this section unless familiar with networking concepts. Status Displays the connection status of the network. No IP Address Select this option if the connection will have no address. This is useful if the connection operates under a bridge. This protocol provides path redundancy while preventing undesir- able loops in the network. The subnet mask determines which portion of a destination address is the net- LAN IP work portion, and which portion is the host portion.
Enter the vendor class identifier provided by DHCP the manufacturer of the product , range, and priority level in the appropriate text boxes. Actiontec does NOT recommend activating this feature. General The top part of the Configure Ethernet screen displays general communication parameters. Status Displays the connection status of the Ethernet switch. General The top part of the Configure Coax screen displays general communication parameters.
Actiontec recommends not changing the default values in this sec- tion unless familiar with networking concepts. Status Displays the status of the coax connection. Page 56 Password Enter the Coax Link password in this text box. General The top part of the screen displays general communication parameters. In this way, one device and its traffic can be given higher priority over another device.
Page 62 Chapter 5 Using Network Connections 3. If Privacy is activated, all devices connected via coaxial cable must use the same password. Actiontec recommends leaving the Privacy option deactivated. Password Enter the Coax Link password here. Status Displays the connection status of the connection. Displays when the rule is active. Connection Type Displays the type of connection. CHAP Select the authentication protocols the Router may use when negotiating with a server in this section.
Page 72 Chapter 5 Using Network Connections For each compression algorithm BSD and Deflate , select one of the following from the drop-down list: Reject Selecting this option rejects connections with peers that use the com- pression algorithm. If Reject is activated, throughput may diminish. Allow Selecting this option allows connections with peers that use the com- pression algorithm.
If Advanced is selected, additional options appear, as listed below. These features allow users to connect their computers to the Internet and be protected from the security threats. The firewall regulates the flow of data between the local network and the Internet. Both incoming and outgoing data are inspected and then either accepted allowed to pass through the Router or rejected barred from passing through the Router according to a flexible and configurable set of rules.
Page 77 Actiontec Wireless Broadband Router User Manual Note that is it is the origin of the request, not subsequent responses to this request, which determines whether a session can be established or not. The Router features three pre-defined security levels: Minimum, Typical, and Maximum. Note that over ec and some -based services make legiti- mate use of fragments. Select Access Control from the left side of any Security screen.
Page Port Forwarding Actiontec Wireless Broadband Router User Manual Port Forwarding In its default state, the Router blocks all external users from connecting to or communicating with the network, making it safe from hackers who may try to intrude on the network and damage it.
However, the network can be exposed to Actiontec recommends selecting All Broadband Devices. By setting port triggering rules, inbound traffic is allowed to arrive at a specific network host using ports different than those used for the outbound traffic. The outbound traffic triggers which ports inbound traffic is directed.
Click Add. Specify the port triggering entries by clicking New Trigger Ports and New Opened Ports and entering the protocol and protocol number in the suc- ceeding screens.
For example, to set up port triggering for the scenario laid Select the Telnet port to be used by clicking in the appropriate check box, then click OK. Restrictions can also be applied to a com- prehensive, automatically updated table of sites to which access is not recommend- ed.
If the rule will only be active at certain times, select Specify Schedule and click Add. Click OK, and OK again. Repeat these steps to add more static addresses from the network. Each set of rules comprises three subsets: initial rules, network devices rules, and final rules. These subsets determine the sequence by which the rules will be applied.
Following is a description of the set ordering for inbound and outbound packets. To add an advanced filtering rule, define the following rule parameters: Matching To apply a firewall rule, a match must be made between addresses or ranges and ports. By classifying and categoriz- ing online content, it is possible to create numerous Internet access policies and easily apply them to networked computers.
The Surf Control subscription site will then be displayed in a new browser window. Follow the instructions on the website and subscribe or enroll for a free trial. A verification E-mail will be sent. Click on the link in the verification E-mail. Page Chapter 7 Parental Controls 2. Click Filtering Policy from the list on the left side of the screen.
If an error occurs consulting the provider, the user can decide whether to block or allow access to all sites. Click Parental Control in the Home screen. Some changes to settings within this section could adversely affect the operation of the Router and the local network, and should be made with caution.
Click Restart in the Advanced screen. Click OK to restart the Router. This may take up to one minute. This feature pings echo an address and displays the results, such as the number of ICMP packets transmitted and received, round trip time, and success status. To diagnose network connectivity: 1. All networkable devices have a address. When replacing another network device with the Router, the installation process can be simplified by copying the address of the existing computer to the Router.
Actiontec MegaControl Panel Use this section to configure the following: Automatic Refresh of System Monitoring Web Pages Click in this check box to activate the automatic refresh of system monitoring web pages. Enable Logging Click in this check box to activate system logging. Security Log Buffer Size Enter the size of the security log buffer in this text box. Enable Logging Clicking in this check box activates automatic detection.
PPP Timeout Enter the amount of time in seconds before the Router stops attempting to establish a broadband connection. Click Universal Plug and Play in the Advanced screen.
Page Firmware Upgrade Chapter 8 Using Advanced Settings Firmware Upgrade The Router offers a built-in mechanism for upgrading its firmware without losing custom configurations and settings.
0コメント