Ibm 802.11g Wireless Broadband Router WRT-410 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Hardware Ibm 802.11g Wireless Broadband Router WRT-410. IBM 802.11g Wireless Broadband Router WRT-410 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - User’s Manual

802.11g Wireless Broadband Router WRT-410 User’s Manual

Strany 2 - FCC Caution:

- 5 - Chapter 3 Configure through Web Browser Web configuration provides a user-friendly graphical user interface (web pages) to manage your WRT-410.

Strany 3

- 6 - This page enables you to set LAN and DHCP properties, such as the host name, IP address, subnet mask, and domain name. LAN and DHCP profiles ar

Strany 4 - TABLE OF CONTENTS

- 7 - MAC Address: If required by your ISP, type the MAC address for the WRT-410 WAN interface in this field. You can also copy the MAC address of y

Strany 5

- 8 - When using PPTP, enter the following information in the fields (some information are provided by your ISP): IP Address: Type the IP address wh

Strany 6 - Chapter 1 Introduction

- 9 - Administrator: Type the password the Administrator will use to login to the system. The password must be typed again for confirmation. User: U

Strany 7 - 1.4 Specification

- 10 - 3.1.5 Dynamic DNS You can configure WRT-410 to use DDNS service if you already have a registered DDNS account. DDNS: You can enable or disabl

Strany 8 - 1.5 Wireless Performance

- 11 - Enable/Disable: Enable or disable wireless LAN via the WRT-410. SSID: Type an SSID in the field. The SSID of any wireless device must match th

Strany 9 - 2.2 LED Indicators

- 12 - Lifetime: Select proper time interval from the drop-down list. Once the lifetime expires, the Encryption key will be renewed by RADIUS server

Strany 10 - 3.1 Main

- 13 - Beacon Interval: Type the beacon interval in the field. You can specify a value from 20 to 1000. The default beacon interval is 100. RTS Thre

Strany 11 - 3.1.2 WAN

- 14 - Firmware Version: Displays the latest build of the WRT-410 firmware interface. After upgrading the firmware in Tools -> Firmware, check t

Strany 12

Copyright Copyright 2003 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, s

Strany 13 - 3.1.3 Password

- 15 - First Page: View the first page of the log message list. Last Page: View the last page of the log message list. Previous Page: View the page

Strany 14 - 3.1.4 Time

- 16 - SMTP Server: Type the SMTP server address for the email that the log will be sent to in the next field. Send to: Type an email address for th

Strany 15 - 3.2 Wireless

- 17 - Click “Reset” to erase all statistics and begin logging statistics again. Utilization: Separates packet transmission statistics into send and

Strany 16 - 3.2.2 Authentication

- 18 - Network Address: Type the static IP address your network uses to access the Internet. Your ISP or network administrator provides you with thi

Strany 17 - 3.2.3 Advanced

- 19 - NAT: Select the option to enable or disable NAT. Transmit: Select the option to set the desired transmit parameters. Disabled, RIP 1 or RIP 2

Strany 18 - 3.3 Status

- 20 - 3.5 Access 3.5.1 Filters This screen enables you to allow and deny user access based upon the filters you set. If MAC Filters is selected, the

Strany 19 - 3.3.2 Log

- 21 - The following screen appears once you select IP Filters. It enables you to define a minimum and maximum IP address range filter; all IP addre

Strany 20 - 3.3.3 Log Settings

- 22 - Select Domain Blocking, and the following screen appear. Domain Blocking: There are three options in this field. Select the proper setting a

Strany 21 - 3.3.4 Statistic

- 23 - Note: When selecting items in the table at the bottom, click anywhere in the item. The line is selected, and the fields automatically load the

Strany 22 - 3.4 Routing

- 24 - Public Port: Type the port number on the WAN that will be used to provide access to the virtual server. LAN Server: Type the LAN IP address th

Strany 23 - 3.4.2 Dynamic

Federal Communication Commission (FCC) Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled

Strany 24 - 3.4.3 Routing Table

- 25 - 3.5.4 DMZ This screen enables you to create a DMZ for those computers that cannot access Internet applications properly through the WRT-410 an

Strany 25 - 3.5 Access

- 26 - Enable: Click to enable or disable the firewall rule profile. Name: Type a descriptive name for the firewall rule profile. Action: Select whe

Strany 26

- 27 - Enabled/Disabled: Click to enable or disable SNMP. By default is disabled. System Name: Displays the name given to the WRT-410. System Locati

Strany 27

- 28 - Enable: Click to enable or disable HTTP access for remote management. Remote IP Range: Type the range of IP addresses that can be used for rem

Strany 28 - 3.5.2 Virtual Server

- 29 - Save Settings: Click to save the current configuration as a profile that you can load when necessary. Load Settings: Click “Browse” and go to

Strany 29 - 3.5.3 Special AP

- 30 - 3.8 Wizard The setup wizard enables you to configure the WRT-410 quickly and conveniently. Click “Wizard” button, the window below will app

Strany 30 - 3.5.5 Firewall Rule

- 31 - Chapter 4 802.1X Authentication Setup 4.1 802.1X Infrastructure An 802.1X Infrastructure is composed of three major components: Authenticator,

Strany 31 - 3.6 Management

- 32 - 6. The client validates the digital certificate, and replies its own digital certificate to the RADIUS server. 7. The RADIUS server validat

Strany 32 - 3.6.2 Remote Management

- 33 - 6. Enter the information that you want for your Certificate Service, and click “Next” to continue. 7. Go to Start > Program > Administ

Strany 33 - 3.7 Tools

- 34 - 11. Go to Start > Program > Administrative Tools > Active Directory Users and Computers. 12. Right-click on domain, and select ”P

Strany 34 - 3.7.4 Ping Test

TABLE OF CONTENTS CHAPTER 1 INTRODUCTION...1 1.1 PACKA

Strany 35 - 3.8 Wizard

- 35 - 14. Go to “Computer Configuration” > “Security Settings” > “Public Key Policies” 15. Right-click “Automatic Certificate Request Settin

Strany 36 - 4.1 802.1X Infrastructure

- 36 - 17. The Automatic Certificate Request Setup Wizard will guide you through the Automatic Certificate Request setup, simply click “Next” through

Strany 37 - 4.2 RADIUS Server Setup

- 37 - Setting Internet Authentication Service 24. Go to Start > Program > Administrative Tools > Internet Authentication Service. 25.

Strany 38

- 38 - 28. In the Internet Authentication Service, right-click “Remote Access Policies” 29. Select “New Remote Access Policy”. 30. Select “Day-An

Strany 39

- 39 - 31. Unless you want to specify the active duration for 802.1X authentication, click “OK” to accept for having 802.1x authentication enabled a

Strany 40

- 40 - 33. Click “Edit Profile”. For TLS Authentication Setup (Steps 34 ~ 35) 34. Select “Authentication” Tab. 35. Enable “Extensible Authenticat

Strany 41 - Certificate

- 41 - For MD5 Authentication Setup (Steps 36 ~ 37) 36. Select “Authentication” Tab. 37. Enable “Extensible Authentication Protocol”. Select “MD5-

Strany 42

- 42 - 38. Select “Internet Authentication Service (Local)”, click on “Action” from top panel. Then click “Register Service in Active Directory”. 39

Strany 43

- 43 - 42. Go to “Computer Configuration” > “Windows Settings” > “Security Settings” > “Account Policies” > “Password Policies”. Double

Strany 44

- 44 - 43. Click “Define this policy setting”, select “Enabled”, and click “OK” to continue. 44. Go to Start > Program > Administrative Tools

Strany 45 - 33. Click “Edit Profile”

3.5.5 Firewall Rule...25 3.6 MANAGEMENT ...

Strany 46

- 45 - 48. Go to the “Dial-in” tab, and check “Allow access” option for Remote Access Permission and “No Call-back” for Callback Options. Then click

Strany 47

- 46 - 4.3 Authenticator Setup 1. For EAP-MD5 Authentication, WEP key must be set previously. Go to Wireless>Authentication. Enable WEP key, and e

Strany 48

- 47 - 6. Enter the IP address, Port number, and Shared Secret Key used by the Secondary Radius Server. 7. Click “Apply”. The 802.1x settings will t

Strany 49

- 48 - 5. Click “Properties” of one available wireless network, which you want to associate with. 6. Select “Data encryption (WEP enabled)” option,

Strany 50

- 49 - 7. Enter the network key in “Network key” text box. The string must be the same as the first set of WEP key which you set to WRT-410. 8. Clic

Strany 51 - 4.3 Authenticator Setup

- 50 - 12. Click “OK”. 13. When wireless client has associated with WRT-410, a user authentication notice appears in system tray. Click on the notice

Strany 52 - 4.4 Wireless Client Setup

- 51 - CA server. Furthermore, you must have a valid account/password to access the server. 1. Active web browser, enter “http://192.168.1.10/certsr

Strany 53

- 52 - 5. Click “Submit >” to continue. 6. The Certificate Service is now processing the certificate request.

Strany 54

- 53 - 7. The certificate is issued by the server, click “Install this certificate” to download and store the certificate to your local computer.

Strany 55 - 4.4.2 EAP-TLS Authentication

- 54 - 2. Right-click on the Wireless Network Connection which using WL-3555. 3. Click “Properties” to open up the Properties setting window. 4. Cli

Strany 56

- 1 - Chapter 1 Introduction Thank you for purchasing WRT-410. This device features the latest innovation wireless technology making the wireless net

Strany 57

- 55 - 6. Select “The key is provided for me automatically” option. 7. Click “OK”.

Strany 58

- 56 - 8. Click “Authentication” tab 9. Select “Enable network access control using IEEE 802.1X” option to enable 802.1x authentication. 10. Select

Strany 59

- 57 - 13. Select the certificate that was issued by the server (in our demonstration: WirelessCA), and click “OK” to continue. 14. Make sure this

Strany 60 - 7. Click “OK”

- 58 - Chapter 5 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the Wireles

Strany 61

- 59 - This new products use the ACX100 chip from Texas Instruments. In addition to meeting the existing standard, the chip also supports a new modul

Strany 62

- 60 - DNS DNS stands for Domain Name System. DNS converts machine names to the IP addresses that all machines on the net have. It translates from na

Strany 63 - Chapter 5 Troubleshooting

- 61 - IP IP (Internet Protocol) is the protocol in the TCP/IP communications protocol suite that contains a network address and allows messages to b

Strany 64 - 5.2 Glossary

- 62 - PING Ping (Packet INternet Groper) is a utility used to find out if a particular IP address is present online, and is usually used by networks

Strany 65

- 63 - with an incoming IP address to determine whether to accept or reject the packet. SYSLOG SERVER A SysLog server monitors incoming Syslog messag

Strany 66

- 64 - WLAN. WAN WAN (Wide Area Network) is a communications network that covers a wide geographic area such as a country (contrasted with a LAN, whi

Strany 67

- 2 - 1.4 Specification Standards IEEE 802.11b, IEEE 802.11g Signal Type DSSS (Direct Sequence Spread Spectrum) Modulation BPSK / QPSK / CCK /

Strany 68

- 3 - 1.5 Wireless Performance The following information will help you utilizing the wireless performance, and operating coverage of WRT-410. 1. Site

Strany 69

- 4 - Chapter 2 Hardware Installation Before you proceed with the installation, it is necessary that you have enough information about the WRT-410.

Komentáře k této Příručce

Žádné komentáře