Corinex Communications Corp. assumes no responsibility or liability for any errors or inaccuracies that may appear in this document.

Size: px
Start display at page:

Download "Corinex Communications Corp. assumes no responsibility or liability for any errors or inaccuracies that may appear in this document."

Transcription

1

2 2

3 3

4 Copyright This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of the license. The content of this document is furnished for informational use only, it is subject to change without notice, and it does not represent a commitment on the part of Corinex Communications Corp. Corinex Communications Corp. assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. It is our policy to enhance our products as new technologies, hardware components, software and firmware become available; therefore, the information contained in this document is subject to change without notice. Some features, functions, and operations described in this document may not be included and sold in certain countries due to government regulations or marketing policies. The use of the product or its features described in this document may be restricted or regulated by law in some countries. If you are unsure which restrictions or regulations apply, you should consult your regional Corinex office or the authorized reseller. Published by: Corinex Communications Corp. World Trade Center Canada Place Vancouver, B.C. Canada V6C 3E2 Tel.: Fax: Corinex is a registered trademark of Corinex Communications Corp. Apple, MAC OS X are either registered trademarks or trademarks of Apple Computer, Inc. in the U.S.A. and/or other countries. Microsoft, MS-DOS, MS, Windows are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A. and/or other countries. All products or company names mentioned herein may be the trademarks of their respective owners. Copyright (c) by Corinex Communications Corp. NOTE: This equipment has been tested and found to comply with the limits for a Class B information technology equipment. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference, the end user is advised to take adequate measures. 4

5 End User License Agreement CORINEX COMMUNICATIONS CORPORATION This End User License Agreement ( EULA ) is a legal agreement between you and CORINEX COMMUNICATIONS CORPORATION ( CORINEX ) with regard to the copyrighted Software provided with this EULA. Use of any software and related documentation ( Software ) provided with a CORINEX hardware product, or made available by downloading or otherwise to you by CORINEX in whatever form or media, will constitute your acceptance of these terms, unless separate terms are provided by the software supplier, in which case certain additional or different terms may apply. If you do not agree with the terms of this EULA, do not download, install, copy or use the Software. 1. Licence Grant. CORINEX grants to you a personal, non-transferable and nonexclusive right to use the copy of the Software provided with this EULA. You agree you will not copy the Software except as necessary to use it on a single hardware product system. You agree that you may not copy the written materials accompanying the Software. Modifying, translating, renting, copying, transferring or assigning all or part of the Software, or any rights granted hereunder, to any other persons, and removing any proprietary notices, labels or marks from the Software is strictly prohibited. Furthermore, you hereby agree not to create derivative works based on the Software. You may permanently transfer all of your rights under this EULA, provided you retain no copies, you transfer all of the Software, and the recipient agrees to the terms of this EULA. If the Software is an upgrade, any transfer must include all prior versions of the Software. 2. Copyright. The Software is licensed, not sold. You acknowledge that no title to the intellectual property in the Software is transferred to you. You further acknowledge that title and full ownership rights to the Software will remain the exclusive property of Corinex Communications Corporation and/or its suppliers, and you will not acquire any rights to the Software, except as expressly set forth above. All copies of the Software will contain the same proprietary notices as contained in or on the Software. 3. Reverse Engineering. You agree that you will not attempt, and if you are a corporation, you will use your best efforts to prevent your employees and contractors from attempting to reverse compile, modify, translate or disassemble the Software in whole or in part. Any failure to comply with the above or any other terms and conditions contained herein will result in the automatic termination of this license and the reversion of the rights granted hereunder to CORINEX. 5

6 4. Disclaimer of Warranty. The Software is provided AS IS without warranty of any kind. CORINEX and its suppliers disclaim and make no express or implied warranties and specifically disclaim warranties of merchantability, fitness for a particular purpose and non-infringement of third-party rights. The entire risk as to the quality and performance of the Software is with you. Neither CORINEX nor its suppliers warrant that the functions contained in the Software will meet your requirements or that the operation of the Software will be uninterrupted or error-free. 5. Limitation of Liability. Corinex s entire liability and your exclusive remedy under this EULA shall not exceed the price paid for the Software, if any. In no event shall CORINEX or its suppliers be liable to you for any consequential, special, incidental or indirect damages of any kind arising out of the use or inability to use the software, even if CORINEX or its supplier has been advised of the possibility of such damages, or any claim by a third party. 6. Applicable Laws. This EULA will be governed by the laws of Canada, excluding its conflict of law provisions. 7. Export Laws. This EULA involves products and/or technical data that may be controlled under any applicable export control laws, and regulation, and may be subject to any approval required under such laws and regulations. 8. Precedence. Except as set out above, where separate terms are provided by the software supplier, then, subject to this EULA, those terms also apply and prevail, to the extent of any inconsistency with this EULA. 6

7 Content Copyright...4 End User License Agreement...5 Content Introduction Product Specification Installation Overview Corinex Wireless to Powerline Router G Configuration Powerline Setup through the Ethernet Interface using Corinex Setup Tool Setup of Router SNMP Powerline Agent on the OPM Management Station Setup of Router SNMP Powerline Agent on the OMH Software...83 Appendix A: Troubleshooting...86 Appendix B: Wireless Security...93 Appendix C: Glossary Appendix D: How to Ping your ISP s and Web addresses Appendix E: Finding the MAC address and IP address for your Ethernet Adapter

8 1. Introduction Congratulations to your choice of Corinex Wireless to Powerline Router G. The Router allows you to set up a home or small business network to share your high-speed Internet connection using either Ethernet cabling, Powerline or Wireless connection. 1.1 Powerline Routing Overview The Corinex Wireless to Powerline Router G provides a convenient Internet access and distribution capability for broadband service providers and users alike, using any incoming high speed signal, whether by A/DSL, cable, satellite or fiber optics as access and using the existing electrical wires as distribution media. This product enables multiple users in small to medium size offices and homes to share one broadband account and experience a high speed networking capability for data, voice, audio and video, without pulling new wires. The embedded Network Address Translation (NAT) feature enables the usage of a private set of IP addresses, which the Router translates into a single public IP address. The Router can also act as a DHCP server by automatically allocating a dynamic IP address to each piece of equipment, which connects by a communications port, like Ethernet, USB, b or g to the network. The Router has four LANs 10/100M, one WAN 10/100M Ethernet, one powerline port and one Wireless b/g port. The Router can act as the "bridge" between the access side of the network and its specific wire requirements and the distribution side of the network, which uses the existing electrical wires to move the signals to every electrical outlet and makes those signals available to wired or portable devices or uses the wireless type of connection also. The Corinex Wireless to Powerline Router G supports the Corinex Powerline and CableLAN product family, which include: Corinex Powerline Ethernet Adapter Corinex Powerline USB Adapter Corinex Powerline Ethernet Wall Mount Corinex Powerline Dual Ethernet Wall Mount Corinex CableLAN Adapter Corinex Powerline Router Corinex Wireless to Powerline Access Point The Router s connection to the electrical wires (powerline) is based upon the HomePlug 1.0 industry standard. This standard warrants a robust and reliable performance for all HomePlug certified devices connected to the network. The reliability is made possible by the use of the Orthogonal Frequency Division Multiplexing (OFDM) technology. This multi-carrier modulation scheme allows devices to dynamically "surf the channel" instantly shifting data from one carrier to another, looking for the least noise affected carrier to bring the signal to its destination. All Corinex Powerline and CableLAN products have been optimized for low-latency, high-reliability networking applications and use the HomePlug certified Powerline networking technology, which supports data rates up to 14 Mbps. 8

9 The Corinex Wireless to Powerline Router G also fully complies with the IEEE and 802.3u 10/100M standard and offers static and dynamic IP routing mode operation, NAT, DHCP, MAC and IP filtering functionality. The Router supports a wide range of communications protocols and works seamlessly with all major access technologies, including A/DSL and Cable modems with PPPoE (PPP over Ethernet), as well as "Direct Connection" type service. The Corinex Wireless to Powerline Router G has advanced firewalling features, which protect home/soho networks from unwanted access. The Corinex Wireless to Powerline Router G offers a convenient way to create a simple network through the existing power lines of a home or office with the additional ability to provide you with wireless access to your network. Corinex Wireless to Powerline Router G offers several levels of security, including with 64/128-bit WEP encryption and i (WPA /WPA-PSK) for the wireless pass-through and 56-bit DES encryption for the Powerline pass-through. Enhanced security management functions, such as Wireless/Wired 802.1x, and Embedded RADIUS Server, guarantee that your data always is secured. The high data rate enables high quality video or any high bandwidth service to wherever there is a power outlet. Using the web-based user interface (UI), the device is easily set up and maintained. All functions can be configured with the UI via web browsers. Corinex Wireless to Powerline Router G uses 56-bit DES encryption with key management for secured powerline communications applications. End user equipment, which uses Corinex adapters to connect to the network, can run on Windows 98/ME/2000/NT/XP, Linux and MAC operating systems and use the full range of the Router s networking features. 1.2 Corinex Wireless to Powerline Router G Features The Corinex Wireless to Powerline Router G contains an HTTP server with a web configurable SNMP Agent. This enables you to connect to it, and configure it, using your web browser. Every Corinex Powerline, CableLAN and Wireless product, no matter where it is located in the network, can be managed by the Corinex Open Powerline Management software or by using a web browser. Corinex offers a one-stop-shop experience and offers this for networking solutions in homes, apartments and condominiums, small to medium size offices, schools, hospitals, conference centers or shopping malls. For hotels, Corinex has developed a special management software called Corinex Open Management for Hotels Main Functions Supports g Wireless LAN Supports HomePlug 1.0 Powerline network Simultaneous operation on g wireless LAN and Powerline network Enhanced Security Management Functions: Port Filtering, MAC and IP Address Filtering, Wireless/Wired 802.1x, Embedded RADIUS Server Supports 64/128 bits WEP Key in Wireless g LAN Supports 56-bits DES Key for Powerline network 9

10 The Wireless 11g operation provides data rate at 6, 9, 12, 18, 24, 36, 48, 54Mbps with auto fallback at 11b data rate at 1, 2, 5.5, and 11Mbps. For g, supports 11 channels for North America, 13 for Europe (ETSI) and 14 for Japan Supports Wireless Distribution System (WDS) Wireless Bridge, Wireless Repeater Supports i WPA / TKIP, AES, PSK Easily Configurable through your networked PC s Web browser Administrators can block specific internal users Internet access with filtering and 802.1x TCP, UDP, ICMP, IGMP IEEE 802.1D (self learning transparent bridge) IEEE 802.1D Spanning Tree Protocol DDNS, DNS Proxy, DHCP Server/Client HTTP Server (Basic Realm Support) Transparent HTTP Proxy SNMP V1/V2c Agent Remote administration and remote upgrades available over the Internet Supports Universal Plug and Play (UPnP) Supports Traffic and Event Logging Support for NTP (Network Time Protocol) for Synchronizing with a Real-Time Server Hardware /100 Base-T g Wireless LAN HomePlug 1.0 Powerline network Security Password protected configuration or management sessions for web access Built-in HTTP Server for setup and easy remote management via any browser Wireless/Wired 802.1x 1.3 Package Content This Package Includes: Corinex Wireless to Powerline Router G Installation CD-ROM (including Corinex Wireless to Powerline Router G User Guide) Wireless antenna Power Cord 2 Ethernet cables (RJ-45) Quick Start Guide 10

11 As we do constant improvement of our products, it can happen that we have newer versions of software tools than those included on the Installation CD. If you want to check and/or download the latest versions of software for your Corinex product, just click the Enclosed CD Content: - Corinex Wireless to Powerline Router G Quick Start Guide - Corinex Wireless to Powerline Router G User Guide (this document) - Powerline Setup Tool for Windows, MAC OS X and Linux - Acrobat Reader 1.4 Requirements IBM Compatible PC or Macintosh computer (needed for initial configuration of the Router) AC 220/110 V power outlet Broadband Connection (DSL, Cable) or Internet device with 10/100 Ethernet connection Ethernet, Powerline and/or Wireless connection for each computer Windows 98/ME/2000/NT/XP, Mac OS X or Linux operating system for computers sharing the Internet connection Web browser supporting JavaScript for the Router management 2. Product Specification This section defines the hardware and software specifications 2.1 Hardware Features Hardware Parameters Memory type SDRAM: FLASH: 16MB SDRAM (4MB x 32 Bits) 2MB NOR-Flash (16Bits) Ethernet Interfaces LAN: 4 x 10/100 Mbps Ethernet Port (RJ-45) WAN: 1 x 10/100 Mbps Ethernet Port (RJ-45) Electrical Parameters One AC power connector for both Powerline networking and power supply 11

12 Input Voltage: Line Frequency: AC 100V~240V 60/50Hz (USA/Europe) Wireless Parameters Peak Gain of the Antenna g: 2.4 GHz => 2dBi Transmitted Power g: Typ. Normal Temp Range Receive Sensitivity g: -80 dbm -66 dbm Typical Environmental Parameters Operation Storage Operating Temperature: 0ºC to 40ºC (32ºF to 104ºF) Operating Humidity 10% to 85% Non-Condensing Storage Temp: -20ºC to 70ºC (-4ºF to 158ºF) Storage Humidity 5% to 90% Non-Condensing EMI/EMC FCC Part 15B, UL, CE (EMI, EMC, Safety) 2.2 Physical Details Fig.2.1 Corinex Wireless to Powerline Router G 12

13 Front Panel LED Definition: Fig.2.2 Corinex Wireless to Powerline Router G - front panel System Power: Green On: The Power LED illuminates when the Corinex Wireless to Powerline Router G is powered on WAN ACT: Green On: Link Blinking: receiving/transmitting data LAN LINK /ACT: Green On: Link Blinking: receiving/transmitting data Powerline ACT: Green: Blinking: receiving/transmitting data Off: No data transmitted to Powerline COL: Green: Blinking when collision is occurred on this port. WLAN (11G) ACT: Green: Steady on when link is ready Blinking: receiving/transmitting data through g WLAN interface Rear Panel Fig.2.3 Corinex Wireless to Powerline Router G rear panel 13

14 Reset Switch Push = reboot (Press the button no longer than 5 sec) Hold until all the LED have been lightened = Reboot & Restore to default settings LAN Ports For linking computers or other Ethernet devices, e.g. a hub/switch LAN: 4 x 10/100 Mbps Ethernet Port (RJ-45) WAN Port For linking to the Ethernet port of a cable/dsl modem WAN: 1 x 10/100 Mbps Ethernet Port (RJ-45) Antenna For connection to wireless devices based upon the b/g standard Power Inlet The device is equipped with power supply. It serves the both: powerline network connection and power supply. 2.3 Software Features General Features of the Corinex Wireless to Powerline Router G Feature Additional Information Protocol Support TCP/IP ICMP PPPoE (PAP / CHAP) PPTP (Microsoft PPTP Client) Static Routing Protocol Dynamic Routing Protocol (RIPv1 / RIPv2) Wireless Distribution System (WDS) Broadcom AfterBurner (125Mbps High Speed Mode) VPN tunnel passing support (PPTP, L2TP, IPsec) Power-line network 14 Mbps 56 bits DES Key Wired 802.1x (EAP-MD5) Wireless LAN (802.11g) SSID, Full Channels Support 64/128 bits WEP on g i WPA / AES, TKIP, PSK Wireless 802.1x WDS with WPA/PSK Broadcom AfterBurner (125Mbps High Speed Mode) Security Stateful Inspection (SPI) Firewall MAC & IP filtering 802.1Q Tagged VLAN 14

15 QoS 802.1P, TOS Wireless 802.1x (EAP-MD5, EAP-PEAP, EAP-LEAP, EAP-TLS, EAP-TTLS) Wired 802.1x (EAP-MD5) i WPA / AES, TKIP, PSK 56Bit DES Key for Powerline Management Embedded HTTP Daemon SNMP v1/v2c Agent Embedded RADIUS Server (EAP-MD5 only) Firmware upgrade through Web browser Zebra & RIPD Terminal (CISCO-like CLI) UPNP IGD 1.0 Other Features DHCP Server/Client Dynamic DNS client DNS Proxy Transparent HTTP Proxy NTP (Network Time Protocol) Syslog 2.4 Safety Labels Content of the Label on the Bottom of the Corinex Wireless to Powerline Router G The label shows the voltage and current values for your Router. It also shows both MAC Addresses (WAN & LAN) and serial number (SN), as well as the network Password required for remote Powerline password change as defined in the Corinex Open Powerline Management Software or Corinex Open Management for Hotels. 15

16 3. Installation Overview This part of the User Guide will assist you with your initial installation and configuration of your network and help you with settings, which you need to configure for your Internet connection to be shared through Ethernet, Powerline or Wireless media. Fig.3.1 Corinex Powerline Network Installation Example The next chapters will explain to you how to connect your Corinex Wireless to Powerline Router G in three easy steps. Step 1: Connecting the Router First you need to connect cables and connect the Router both to the power and to the Internet connection; and, optionally to your Ethernet connected computers. Step 2: Connecting the Computers Then you will need to connect the computers to the Router, in order to be able to configure the settings of the Router. These steps differ between Ethernet, Powerline and Wireless connection and also it differs between different sorts of operating systems and computers. Step 3: Configuring the Router The last step required is to configure your Corinex Wireless to Powerline Router G settings according to your Internet connection. 3.1 Step 1: Connecting the Router 16

17 In this Step, you will connect the Corinex Wireless to Powerline Router G to your Internet connection (cable or DSL modem) and to the computers in your home or business environment sharing the Internet connection. A. Connect your Internet connection (cable or DSL modem) to its proper connector the coaxial jack for cable, or the phone jack for DSL (follow the instructions from your cable or DSL modem s installation guide). B. Use the Ethernet cable that had been supplied as part of the shipment of your Corinex Wireless to Powerline Router G. Connect this Ethernet cable from the LAN or Ethernet port of the Internet connection (cable or DSL modem) to the WAN port of the Corinex Wireless to Powerline Router G. C. Use the Ethernet cable that had been used to connect your Internet connection (cable or DSL modem) to your computer. Connect this Ethernet cable to your computer s Ethernet adapter. Connect the other end of the cable to the LAN port on the back of the Corinex Wireless to Powerline Router G. Note: If your Computer s Ethernet adapter is not set up, please refer to the Ethernet adapter s user guide for more information. D. Connect the power cable to the Corinex Wireless to Powerline Router G, and then plug the power cable into a power outlet Turn on the Internet connection (cable or DSL modem). Then turn on the computer you wish to use to configure the Corinex Wireless to Powerline Router G. 3.2 Step 2: Configuring Computers The instructions in this chapter will help you to configure each of your computers to be able to communicate with the Corinex Wireless to Powerline Router G. This process differs between Ethernet, Powerline and Wireless connected computers, and also differs between different operating systems. If you have a Powerline connected computer proceed to A, if you have an Ethernet connected computer, proceed to B, and if you have Wireless connected computer proceed to C. A. Using the Powerline Connection Please refer to the Manual of your Powerline Adapter to establish a Powerline connection between the Corinex Wireless to Powerline Router G and the other Powerline Adapters. Use the default Powerline (NEK) password "HomePlug", as this is the factory default password setting for the Corinex Wireless to Powerline Router G. When you are using the Corinex Setup Tool to configure your powerline adapter, you can check, whether your Adapter has a powerline connection to the Corinex Powerline Router by searching in the last window of the Corinex Setup Tool for the MAC address 17

18 of the Router. You will find the MAC address of your Corinex Powerline Router on the label on the bottom of the Router s plastic cover (MAC PLC/SN). Proceed to B. Fig.3.2 Corinex Setup Tool B. Using the Ethernet Connection Next you will need to configure your TCP/IP settings so that your computer will obtain an IP (or TCP/IP) address automatically (called DHCP). Computers use IP addresses to communicate with each other across a network or the Internet. Find out which operating system your computer is running, such as Windows 95, 98, Millennium, 2000, XP, Linux or Macintosh OS or other operating system. Then follow the instructions for configuring the TCP/IP networking in the following section. Configuring Windows XP PCs 1. Click the Start button, open the Control Panel. From there, click the Network Connections icon and then the Network Connections window appears. 2. Select the Local Area Connection icon for the applicable adapter (Ethernet adapter or Powerline - usually the first adapter listed). Double-click the Local Area Connection. 18

19 Fig.3.3 Local Area Connection Status 3. The Local Area Connection Status screen will appear. Click the Properties button. 4. Select Internet Protocol (TCP/IP) and click the Properties button. Fig.3.4 Local Area Connection Properties 19

20 5. Select Obtain an IP address automatically and click the OK button. Click the OK button again (or the Close button if no settings were changed) to complete the computer configuration. Fig.3.5 Internet Protocol (TCP/IP) Properties 6. If you do not have DHCP server on the network or it is switched off, then select Use the following IP address. Set the IP address manually in the format X and mask of local TCP/IP settings. In the Default gateway box, set the gateway address. The default is

21 Fig.3.6 Internet Protocol (TCP/IP) Properties 7. Check the radio button for Use the following DNS server addresses. In the Preferred DNS server and Alternate DNS server boxes, type the IP addresses of DNS Server provided by your ISP. 8. Click OK button in the TCP/IP Properties window to complete the PC configuration, and click Close or the OK button to close the Network window. Configuring Windows 2000 PCs 1. Go to the network screen by clicking the Start button. Click Settings and then Control Panel. From there, double-click the Network and Dial-up Connections icon. 2. Select the Network and Dial-up Connections icon for the applicable Ethernet adapter (usually it is the first Local Area Connection listed). Do not choose a TCP/IP entry which name mentions DUN, PPPoE, VPN, or AOL. Double click the Local Area Connection. 3. The Local Area Connection Status screen will appear, as shown in Figure 3.7. Click the Properties button. 21

22 Fig.3.7 Local Area Connection Status 4. Select Internet Protocol (TCP/IP), as shown in Figure 3.8, and click the Properties button. Fig.3.8 Local Area Connection Properties 5. Obtain an IP address automatically, as shown in Figure 3.9, then click the OK button. 22

23 Fig.3.9 Internet Protocol (TCP/IP) Properties 6. If you do not have DHCP server on the network or it is switched off, then select Use the following IP address. Set the IP address manually in the format X and mask of local TCP/IP settings. In the Default gateway box, set the gateway address. The default is Fig.3.10 Internet Protocol (TCP/IP) Properties 7. Click OK button in the TCP/IP Properties window to complete the PC configuration, and click Close or the OK button to close the Network window. 23

24 Configuring Windows 98 and Millennium PCs 1. Go to the network screen by clicking the Start button. Click Settings and then Control Panel. From there, double-click the Network icon. 2. On the Configuration tab, select the TCP/IP line for the applicable Ethernet adapter, as shown in Figure Fig.3.11 Local Network Do not choose a TCP/IP entry that mention DUN, PPPoE, VPN, or AOL names. If the word TCP/IP appears by itself, select this line. (If there is no TCP/IP line listed, refer to Appendix D: Installing the TCP/IP Protocol or your Ethernet Adapter s User Guide to install TCP/IP now.) Click the Properties button.3. Click the IP Address tab and select Obtain an IP address automatically, as shown in Figure Click the IP Address tab and select Obtain an IP address automatically, as shown in Figure

25 Fig.3.12 Obtain the IP Address 4. If you do not have DHCP server on the network, then select Use the following IP address. Set the IP address manually in the format X and mask of local TCP/IP settings and click the OK button. Fig.3.13 Set the IP Address 25

26 5. Now click the Gateway tab. In the Default Gateway box, set the gateway address. The default is Fig.3.14 TCP/IP Properties Gateway 6. Click the OK button again. Windows may ask you for the original Windows installation disk or additional files. Supply them by pointing to the correct file location, e.g., D:\win98, D:\win9x, c:\windows\options\cabs, etc. (if "D" is the letter of your CD-ROM drive). 7. Windows may ask you to restart your PC. Click the Yes button. If Windows does not ask you to restart, restart your computer anyway. Configuring Linux PCs To access the Internet via the Corinex Wireless to Powerline Router G, it is only necessary to set the Corinex Wireless to Powerline Router G as the "Gateway". Setup differs between various Linux distributions, we are giving the Mandrake as an example, check your distribution, how to change IP settings. Note: Ensure that you are logged in as "root" before attempting any changes, or you will be asked for root login and password later during configuration. DHCP Client The procedure below may vary according to your version of Linux and X windows shell. 26

27 1. Start your X Windows Shell Fig.3.15 TCP/IP Configuring Linux 2. Select Control Center (Fig. 3.15). If you are not logged as root, the following screen will appear. Enter your root password. Fig.3.16 Entering root Password 3. The following screen (Fig. 3.17) will appear. Select Network & Internet. 27

28 Fig.3.17 Configuring Linux Control Center 4. In the following screen (Fig. 3.18) select DrakConnect (for setting up network & Internet connection). Fig.3.18 Configuring Linux Control Center 5. Select the Interface entry for your Network card. Normally, this will be called "eth0". 28

29 Fig.3.19 Configuring Linux Control Center Selecting Network card 6. Click the Wizard button then on next dialogue (Fig.3.20) click on the Next button. Fig.3.20 Network Configuration Wizard 7. Select LAN connection (Fig.3.21) and click on Next button. 29

30 Fig.3.21 Network Configuration Wizard Choosing the Connection Type 8. On the next screen select Automatic IP. Click on the Next buttons on all screens until you click Finish. Fixed IP Address Fig.3.22 Network Configuration Wizard Automatic IP selection By default, most Linux installations use a fixed IP Address. If you wish to continue using a fixed IP Address, make the following changes to your configuration. Set the IP address manually in the format X and Netmask

31 Set your Default Gateway to the IP Address of the Corinex Wireless to Powerline Router G. The default is Ensure your DNS (Name Server) settings are correct. Fig.3.23 Network Configuration Wizard Static IP address Configuring Macintosh clients With Macintosh computers, the procedure is as follows: 1. Open the Network Control Panel in System Preferences. Fig.3.24 System Preferences 2. Select Ethernet from the pop-up menu. 31

32 Fig.3.25 Network 3. Select Using DHCP from the TCP/IP tab, field Configure. The DHCP Client ID field can be left blank. Fig.3.26 Network TCP/IP Using DHCP 4. Close the Network panel, saving your settings. 32

33 Note: If using manually assigned IP addresses instead of DHCP, the required changes are: Set the IP address manually in the format X and Subnet Mask Set Router address field to the Corinex Wireless to Powerline Router G IP address. The default is Ensure your DNS settings are correct. Configuring other clients Fig.3.27 TCP/IP settings Manually For fixed IP Addresses: Ensure the Gateway field for your network port is set to the IP address of the Corinex Wireless to Powerline Router G Ensure your DNS (Name Server) settings are correct. For DHCP: Ensure the TCP/IP address settings of your Network port are set to DHCP or Automatic 33

34 C. Using the Wireless Connection You may need to reconfigure some wireless settings to ensure that all settings match between wireless devices based on g standard. Note: Different wireless settings will disable wireless network connections between wireless adapters. Default Wireless Interface Settings are: SSID: corinex Channel: 11 WEP: Disabled Note: WEP is disabled by default for an easier installation. For enhanced security purposes, it is recommended that you later (after successful configuration) enable WEP on all wireless devices. Find out which operating system is running your computer, like Windows 95, 98, Millennium, 2000, XP, Linux or Macintosh OS X or any other operating system. Then follow the instructions for configuring the TCP/IP networking for your system in the previous section. The settings of the TCP/IP level for each platform are similar to the procedure as described in the previous section Using the Ethernet Connection. 4. Corinex Wireless to Powerline Router G Configuration 4.1 Overview For your convenience, use the Corinex Wireless to Powerline Router G web-based utility to configure it. This chapter will explain all of the functions of this utility. The utility can be accessed via Microsoft Internet Explorer, Netscape Navigator, Opera or other web browsers to set up Ethernet, Wireless, or Powerline computer connections to the Corinex Wireless to Powerline Router G. This utility has a consistent design for all of its screens. It consists of screen selection tabs on the top part of screen and the display screen. NOTE: The appearance of the user interface screenshots displayed in the following part of this document may vary due to the firmware version currently available in your device. It is recommended that you check for the latest firmware version on the Corinex web site: 34

35 TABS SCREEN Fig. 4.1 TABS and SCREEN As you click on the selection tabs, different screens will be displayed. For a network setup, most users only have to use the following tabs of the utility: WAN - enter the settings provided by your ISP. Basic In this section the user can setup the Corinex Wireless to Powerline Router G the login settings. The default username is admin and password is admin, too. To protect the Corinex Wireless to Powerline Router G, change the password from its default. The Basic, LAN, WAN, Status, Filters, Routing, Wireless, Powerline, Security and Firmware tabs are available for setup of the Corinex Wireless to Powerline Router G. Each of these tabs groups have several similar settings, of which you can choose to access display screens. The display screen consists of one or more entry fields containing current values of the settings. By changing these values you can configure the device. Most of the screens have an Apply and Cancel button. The Apply button will enter the settings from the screen into the Corinex Wireless to Powerline Router G. The Cancel button will erase all provided changes. 35

36 4.2 Password Entry To access the web-based utility of the Router, launch Internet Explorer or other web browser, and enter the Router s default IP address, , in the Address field, as shown in Fig. 4.2 and press Enter. Enter this value in the following format Fig. 4.2 HTTP Address field Note: Make sure that the TCP/IP settings of your network interface are configured correctly! After this, a password requested page shown in Fig. 4.3 will appear (non-windows XP users will see a similar screen). Enter admin in the User Name field and enter admin in the Password field. Then click the OK button. 4.3 Basic Tabs Fig. 4.3 Login window The first screen that appears displays the Basic tab. This allows you to change the Corinex Wireless to Powerline Router G general settings. Change these settings as described here and click the Apply button to apply your changes or Cancel to cancel your changes. The Restore Default option will restore all of the settings in the Router to the factory default settings. To restore the factory default settings, click the Restore Default button. To restart or reboot the device, press the Reboot button. Restarting or rebooting the router will not delete any of your configuration settings. 36

37 Fig. 4.4 Basic settings window In the Router Username field you can change the management access password to the Router. For that you will need to enter both the current password in the Router 37

38 Password field. Default username and password from the factory is admin (password is case sensitive). You can also define the Router WAN Port address for the access to the Router from the WAN side. Router Mode Some applications may require the complete disabling of Network Address Translation (NAT) and switching the router to a Bridge mode. For enabling this mode, select it from the combo-box. We recommend to switch off the firewall as well. If you want to switch the router back to default mode and enable NAT, select the mode Router. Firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including Ping of Death (PoD) and Denial of Service (DoS) attacks. You can enable the Firewall feature by selecting from drop down menu. You prevent your network from being pinged, or detected, by other Internet users. The Firewall feature also reinforces your network security by hiding your network ports. You can turn the firewall function off if it is interfering with an application s function. Turning off the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you turn on the firewall whenever possible. This feature is enabled by default. You can enable/disable the Firewall in the Firewall Enable/Disable field. Time Zone Setting If required, you can setup the Time Zone. Change the time zone in which your network functions from this pull down menu. In the part NTP Servers you can choose the IP address of predefined time servers or you can type in the IP address of your own time server for receiving the time synchronization. SNMP Agent 38

39 Corinex SNMP v1/v2c Agent allows a SNMP management software (like the Corinex Open Powerline Management or Corinex Open Management for Hotels software) to retrieve reports from the networked device. These reports are based upon the defined objects in the Management Information Base (MIB). The agent queries, reports, and sets MIB variables based upon directions from the NMS or upon pre-set alarm conditions. Corinex SNMP v1/v2c will work with the most popular NMS solutions such as HP OpenView and SunNet Manager. Because the Corinex SNMP v1/v2c Agent is bilingual, it can communicate with an NMS that is running either SNMP Version 1 or Version 2c. You can set the SNMP Agent for the SNMP management software to Enabled in the SNMP v1/v2c Agent drop down menu. Then you can also change the Read-Only Community and Read-Write Community strings in the corresponding fields. Default values are public and netman, and we are recommending you to change them, as they are well known and enable others to configure your Router from other computers. You can also define the trap server IP address in the V2c Trape Receiver filed. HTTP Proxy settings Using a proxy server leads to reduced bandwidth usage and thus helps keeping the network-related costs lower. If you want to use Proxy server you must enter the required parameters in to the following fields. Transparent HTTP Proxy - You can Enable or Disable the HTTP Proxy by selecting from drop down menu. Remote HTTP Proxy Server Address - Enter the Remote HTTP Proxy Server IP address in this field. Remote HTTP Proxy Server Port Enter the number of the HTTP proxy server port DDNS Settings The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. To 39

40 use the service, you must first apply an account from several free Web servers such as or DDNS Service - You can Enable or Disable the DDNS Service by selecting from drop down menu. DDNS Username - Enter the User Name for your DDNS account DDNS Password - Enter the Password for your DDNS account. DDNS Service Provider - From this pull-down menu, enter the DDNS service with which you have membership. DDNS Desired Host Name/Domain Name Enter the DDNS URL address assigned by the DDNS service. DDNS Desired MX The DDNS server system also supports MX records. These can be used for pointing incoming mail to your domains (such as john.com) to the proper mail server. Note: The DESTINATION ADDRESS of an MX record MUST be a domain name and NOT simply an IP address. You can also Backup MX service by selecting true (for backup) or false (for no backup) option from the drop down menu. DDNS Sub-system - You can choose a subsystem name from dyndns, statdns, or custom. DDNS Wildcard Wildcard option (only for DynDNS.org) Some DDNS servers support the wildcard feature which allows the hostname, *.yourhost.dyndns.org, to be aliased to the same IP address as yourhost.dyndns.org. This feature is useful when there are multiple servers inside and you want users to be able to use things such as and still reach your hostname. 40

41 When using wildcard, you simply enter yourhost.dyndns.org in the DDNS Desired Host Name/Domain Name. Syslog IP Address You can set the Syslog IP Address to the LAN IP of the machine running the syslog daemon, or to broadcast the Logs to the LAN (x.x.x.255). UPnP Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers, access the network and connect to other devices as needed. UPnP devices can automatically discover the services from other registered UPnP devices on the network. You can Enable or Disable the UPnP (automatic device configuration) feature by selecting from drop down menu. The default setting for UPnP is disabled. If disabled, the router will not allow any device to automatically control the resources, such as port forwarding (mapping), of the router. Note: If you use applications such as multi-player gaming, peer-to-peer connections, real time communications such as instant messaging, or remote assistance (a feature in Windows XP), you should enable UPnP. In the Connection Logging field you can select appropriate setting from the drop down menu. The four options are offered: Disabled, Denied, Accepted or Both. Press the Apply button to put all changes in the Basic settings window into effect. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 41

42 4.4 LAN Tabs Select the LAN settings from the main tabs. The following screen will appear: Fig. 4.5 LAN settings window In this screen you can change the settings of your local area network. Router IP MAC Address shows the MAC Address of the LAN interface In the IP Address and Subnet Mask fields you can change the IP address of the LAN interface of your Router. The default value is , mask You see also the MAC Address of the LAN interface. 42

43 DHCP Server DHCP is Enabled by factory default. If you already have a DHCP server on your network, or you don t want a DHCP server, then select the Disable from drop down menu (no other DHCP features will be available). Using the DHCP Starting IP Address and DHCP Ending IP Address you can change the values of the IP addresses assigned to the DHCP clients. The DHCP address assignment can expire if the address is not used. This value can be defined in the DHCP Lease time field in seconds. Active DHCP Leases shows all active DHCP leases with each computer's name, IPaddress, Hardware address, and when its lease expires. Spanning Tree Corinex Wireless to Powerline Router G supports 802.1d Spanning Tree Protocol to prevent network loops. Select Enable to enable the Spanning Tree Daemon or Disable to disable the Spanning Tree Daemon from drop down menu. Static Routing Static Routes provide additional routing information to your router. Under normal circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as when you have multiple routers or use multiple IP subnets in your network. 43

44 To add or edit Static Routes: 1. Type the Destination IP Address of the final destination. 4. Type the IP Subnet Mask for this destination. If the destination is a single host, type Type the Gateway IP Address, which must be a router on the same LAN segment as the router. 6. Type a number between 1 and 15 as the Metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1. After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any errors message (Validating values...done and also Committing values...done), your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 44

45 4.5 WAN Tabs Select the WAN settings from the main tabs. The following screen will appear: Fig. 4.6 WAN settings window 45

46 In this screen you can change the WAN settings of your network. You can select the Connection type. You can use the Default Connection type or you can create the new connection by clicking on the New button. You are also able to delete some type of connections by selecting the connection which you want to remove by pressing the Delete button. You can also enter a short description of the connection in the Description field. Then select the Interface type from the drop down menu and choose the type of protocol that you want to use for WAN connection. The Corinex Wireless to Powerline Router G supports four WAN connection types: DHCP (Obtain IP address dynamically), Static, PPPoE, and PPTP. The setup will differ according to the type of your Internet connection. You can select a Protocol type from the drop down menu from DHCP, Static, PPPoE, PPTP, and Disabled. You can also select the Primary connection type. Follow the instructions for your connection type below. DHCP Select DHCP from the Protocol drop down menu. If your ISP gave you the Host Name, enter it into the Host Name field. Some ISPs require you to change your Routers MAC address into your previously connected Ethernet card. Click on MAC Address field and change it. Click on Apply button. 46

47 Static Select Static from the Protocol drop down menu. Enter the IP address, Subnet Mask and Gateway Address according to the information provided to you through your ISP. If your ISP provided you with specific DNS settings you need to change them by clicking Click here to enter your DNS Settings. Set the IP address of the WINS Servers to use for resolving NetBIOS names. Click on Apply button. PPPoE Select PPPoE from the Protocol drop down menu. Enter the PPPoE Username, PPPoE Password, and Service Name (Optional) according to the information provided to you through your ISP. Set the name of the PPPoE Service Name and PPPoE Access Concentrator, if required by your ISP. Determine whether the PPPoE link should be automatically disconnected if no traffic has been observed for the period specified by PPPoE Max Idle Time or not. Set the number of seconds to wait before disconnecting the PPPoE link if PPPoE Connect on Demand:is Enabled. Set whether the PPPoE link should be automatically restored if it is lost. This setting has no effect it PPPoE Connect on Demand is Enabled. Sets the maximum number of bytes that the PPPoE interface will receive in single Ethernet frame. The default value is Change the MTU only if your ISP specifically requires a different setting than Then enter the required size in the MTU field. 47

48 Click on Apply button. PPTP Select PPTP type of connection from the Protocol drop down menu. Enter the IP address to the PPTP Gateway Address, set the PPTP Username, and PPTP Password for authentication. Determine whether the PPTP link should be automatically disconnected if no traffic has been observed for the period by PPTP Max Idle Time or not. In the PPTP Max Idle Time input field, set the number of seconds to wait before disconnection the PPTP link if PPTP Connect on Demand is Enabled. In the PPTP Keep Alive drop down menu you can set whether the PPTP link should be automatically restored if it is lost. This setting has no effect if PPTP Connect on Demand is Enabled. If the PPTP Connect on Demand is Enabled, you can set the number of seconds to wait before disconnecting the PPTP link in the PPTP Redial Period input field. In the PPTP MRU input field, set the maximum number of bytes that the PPTP interface will receive in a single Ethernet frame. In the PPTP MTU input field, set the maximum number of bytes that the PPTP interface will transmit in a single Ethernet frame. 48

49 Click on Apply button. The Connection Status shows you the state of connection and the IP Address Expired In shows you the IP address lease info. Static Routing Static Routes provide additional routing information to your router. Under normal circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as when having multiple routers or using multiple IP subnets located in your network. To add or edit Static Routes: 1. Type the Destination IP Address of the final destination. 2. Type the IP Subnet Mask for this destination. If the destination is a single host, type Type the Gateway IP Address, which must be a router on the same LAN segment as the router. 4. Type a number between 1 and 15 as the Metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1. 49

50 After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the following screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any errors message (Validating values...done and also Committing values...done) your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 4.6 Status Tabs Select the Status settings from the main tabs. The following screen will appear: Fig. 4.7 Status window The System Up Time shows you the system up time since the Router last booted. The Connection Log gives you information about log of recent connection attempts. 50

51 4.7 Filters Tabs Select the Filters settings from the main tabs. The following screen will appear: Fig. 4.8 Filters settings window 51

52 This page allows you to configure LAN filters for the router. The LAN machines affected by the filters will not be able to communicate through the WAN but will be able to communicate with each other and with the router itself. In the LAN MAC Filter Mode field select whether client with the specified MAC address are allowed or denied access to the router and the WAN. If you want to disable this feature select Disable. To filter LAN users or packets from the LAN machines with the specified MAC addresses use the LAN MAC Filters option. The MAC address must be added in format XX:XX:XX:XX:XX:XX. In the LAN Client Filters part you can filter packets from IP address destined to certain port ranges during the specified time. You can set the range of IP address in the LAN IP Address Range field, then select the type of protocol (TCP or UDP) in the Protocol field, and set the Destination Port Range. In the following fields set the time period for which you want to configure the filtering. You can turn on the filtering by checking the Enabled check box. After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 52

53 4.8 Routing Tabs Select the Routing settings from the main tabs. The following screen will appear: Fig. 4.9 Routing settings window 53

54 This chapter describes how to configure RIP (Routing Information Protocol). One of the protocols used by a router to build and maintain a picture of the network is the Routing Information Protocol (RIP). Using RIP, routers periodically update one another and check for changes to add to the routing table. The Corinex Wireless to Powerline Router G router supports both the older RIPv1 and the newer RIPv2 protocols. Among other improvements, RIPv2 supports subnet and multicast protocols. RIP is not required for most home applications. If you want to use the Dynamic Routing RIP functionality, you must enable this feature by selecting Enabled from the drop down menu. In that case you must define the RIP Password and then choose the RIP Version. This controls the format and the broadcasting method of the RIP packets that the router sends. (It recognizes both formats when receiving.) By default, this is set for RIPv2. RIP-1 is universally supported. RIP-1 is probably adequate for most networks, unless you have an unusual network setup. RIP-2 carries more information. RIP-2 uses subnet broadcasting. Two RIP modes are offered in the RIP Mode field: Router with RIP on WAN interface Gateway with RIP on both WAN & LAN interfaces Port Forwarding Corinex Wireless to Powerline Router G creates a firewall between your internal network and the Internet. A firewall keeps unwanted traffic from the Internet away from your LAN computers. A tunnel can be created through your firewall so that the computers on the Internet can communicate to one of the computers on your LAN on a single port. This is handy for running web servers, game servers, ftp servers, or even video conferencing. This is called port forwarding. One of your computers could run a web server (port 80) while another computer could run an FTP server (port 23) - both on the same IP address. Port Forwards allows you to specify configuration for forwarding packets from the ports in the first range on the WAN side to the LAN connected devices with the specified IP and address and port range. You can turn on the port forwarding by checking the Enabled check box. 54

55 In this part or the Routing tab, you can configure the automatic forward connections. The Application Specific Port Forwards allows you to configure the Outbound and Inbound protocols and ports. In the Outbound Protocol box, select the protocol (UDP or TCP) for the outbound ports and enter the outbound port range in the Outbound Port Start and Outbound Port End boxes. In the Outbound port box, type the number of the outbound port. The outbound port should be specified as one number from 0 to To determine which port the program uses, consult the documentation for the program. In the Inbound Protocol box, select the protocol type (UDP or TCP) for the inbound ports. In the Inbound port(s) box, type the inbound port. The inbound port can be a single port or you can define up to two ranges of ports, which shall be defined in the Inbound Port Start/End or To Port Start/End fields. The inbound port should be specified as one number from 0 to You can turn on the filtering by checking the Enabled check box. DMZ A DMZ (DeMilitarized Zone) Host is a host without firewall protection. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, video conferencing, Internet telephony, and other special applications. This function is typically used to allow a web server, FTP server, etc. to be accessible to users on the Internet. You need to enter the local IP address in the DMZ IP Address field. This feature forwards all other incoming WAN packets to the LAN connected device with the specified IP address. Note: A DMZ is far easier to set up than port forwarding but exposes your entire computer to the Internet. Sometimes TCP/IP applications require very specialized IP configurations that are difficult to set up or are not supported by your router. In this case, placing your computer in the DMZ is the only way to get the application working. Placing 55

56 a computer in the DMZ should be considered temporary because your firewall is no longer able to provide any security to it. Port forwarding can sometimes be difficult to configure, but provides a relatively safe way of running a server from behind a firewall. Since only a single port (or small series of ports) is exposed to the Internet, the computer is easier to secure. Additionally, port forwarding allows you to run multiple kinds of servers from different computers on your LAN. After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 56

57 4.9 Wireless Tabs Select the Wireless settings from the main tabs. The following screen will appear: Fig Wireless settings window 57

58 In this screen, you can view and change the settings of the wireless interface on your Corinex Wireless to Powerline Router G. The first drop-down list allows you to select the Wireless Interface you want to configure. The default interface is names corinex followed by the MAC address of the wireless part of the router. Network SSID SSID is the name or identification of your wireless network. Only users who have the same SSID set in the wireless network card settings, can connect to your network. The SSID can be up to 32 characters long and is case sensitive. Network Type An access point can broadcast its SSID to all wireless clients nearby, so they have a chance to see the network and connect to it. However, this can lead to a security breach in case your wireless communication is not encrypted. If you don t want the access point to periodically broadcast its SSID to others, please set this field to Closed. Otherwise set it to Open. AP Isolation An access point can have multiple associated wireless clients. If you want to let the clients communicate with each other through the access point, set this field to Off. Otherwise, set it to On. Country The regulatory domains in certain countries don t allow to use all 14 channels for wireless communication. Please set this field according to your location for not violating local regulations. Radio This setting allows you to enable or disable the wireless part of your router. When disabled, the router acts like a standard Ethernet/Powerline router without any wireless features. Band This setting allows you to set the frequency band used for wireless communication. For the g standard the 2.4 GHz band is used. 58

59 Channel There are multiple channels (frequency carriers) which can be used for wireless communication. The channel availability may be limited according to regulations in your country. You can set this field to Auto which forces the access point to choose the first available channel for communication, or choose a channel manually to prevent any interference with other wireless networks in range. 54g TM mode The 54g TM mode is the maximum performance implementation of the g protocol, allowing data rates up to 54 Mbps and preserving the standard compliance at the same time. Set this to 54g Auto for the most compatibility with other wireless systems. In this mode, both b and g clients can connect to the access point. If your network consists only of 54g TM compliant clients, you can set 54g Performance for maximum performance. This will exclude all b clients from connecting to the access point. The third option 54g LRS (Limited Rate Support) can be used in case you experience any problems with connecting to the access point. The last option is b Only, which is used in situations where only b and no g devices are present. 54g Protection The standard provides a method to enable coexistence of g and b devices in the same network without interfering. This means the devices supporting different standards will not communicate at the same time. However, this reduces the network performance. If you have only g compliant or compatible devices in your network, you can set this field to Off which will improve performance. Otherwise set it to Auto. Rate Set the maximum transmit rate. The wireless device will be forced to communicate at the selected rate. Basic Rate Set You can set the basic rates to allow connection of wireless clients supporting all these data rates. You can choose from Default which means 1, 2, 5.5 or 11 Mbps in case of b mode or 6, 12 and 24 Mbps in g mode; All which enables all supported data rates (1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48 and 54 Mbps) or 1 & 2 Mbps to allow compatibility with older devices. 59

60 Multicast Rate This Multicast Rate option forces the multicast/broadcast transmission rate for the Corinex Wireless to Powerline Router G to a particular speed. You can choose the appropriate Rate from the drop down list in the Multicast Rate field. Fragmentation Threshold This setting specifies the maximum size for a packet before it is fragmented into multiple packets. The default setting is 2346 and should be lowered only if you encounter high data losses. However, setting this value very low may cause lower performance. RTS Threshold This value specifies the maximum size of a packet, sending of which won t inflict the negotiation (RTS/CTS) between the sending and the receiving stations about the transmission of the packet. If the size of the packet is larger than this threshold, the sending station sends a RTS (Right to Send) packet to the receiving station, and after it receives the CTS frame (Clear to Send), it will send the packet. This value is set to 2347 bytes by default. DTIM Interval This setting indicates the interval of the Delivery Traffic Indication Message. It is a countdown, telling the clients when they should listen for broadcast and multicast transmissions. Anytime the access points has broadcast or multicast data to transmit, it will inform all associated clients about the transmission, so that they can wake up to listen to the transmission. The default value is 3 milliseconds and can be set to the values from 0 to 255 milliseconds. 60

61 Beacon Interval This specifies the periodic interval at which the access point sends a beacon. The default value is 100 milliseconds and can be between 0 and milliseconds. Enable Express TM Technology The Express TM technology introduces frame-bursting techniques for improving performance of the wireless networks. This should always be enabled, as it improves performance in any environment, including homogenous b or g network, or combination of standards. Only if you experience problems, disable the Express TM. Enable AfterBurner Technology Afterburner technology is an enhancement for the 54g platform, Broadcom's maximum performance implementation of the IEEE g standard. If you turn On the AfterBurner Technology the Corinex Wireless to Powerline Router G provides up to 40 percent greater throughput than typical standard g without impacting the performance of neighboring wireless LANs. When you enable the AfterBurner Technology, it may happen that the following screen will appear. Click on the OK button to continue. WDS Operation Mode The wireless part of the Corinex Wireless to Powerline Router G can work in two modes. The Wireless Bridge mode allows WDS operation of the device. WDS (Wireless Distribution System) allows you to extend your network by connecting multiple access points (and their networks) together. None of the WDS enabled devices can act as an access point, this means it cannot provide connectivity to wireless clients. Selecting Wireless Bridge disables Access Point functionality. Only the Wireless Bridge Functionality will be available. 61

62 Selecting Wireless Repeater enables the Access Point and Bridge functionality. Wireless bridge functionality will be available and wireless stations will be able to associate to the Corinex Wireless to Powerline Router G. Bridge Restrict If Disabled, any wireless bridge can connect to your access point. If you enable this feature, only four wireless bridges listed by their MAC addresses in the Remote Bridges table, can connect to your access point. Remote Bridges In case you enabled the Bridge Restrict feature, in this table you can specify the four wireless bridges that are granted to connect to your access point. MAC Restrict Mode This function specifies whether the wireless clients listed in the table below can or cannot connect to the access point. By selecting the option Allow, only the specified clients can connect to your access point. If you select the option Deny, all clients other than the specified ones can connect. You can disable this filtering by selecting the option Disabled. MAC Addresses This feature allows or denies wireless access to clients with the specified MAC addresses. The MAC address format is XX:XX:XX:XX:XX:XX. Authenticated Stations In this part you can see the stations which authenticated to the Corinex Wireless to Powerline Router G device. After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. 62

63 Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button Powerline Tabs Select the Powerline settings from the main tabs. The following screen will appear: <TREBA NOVY OBRAZOK v 1.3.1beta2 pribudli nejake veci> The Corinex Wireless to Powerline Router G is configured to work seamlessly with other Corinex Powerline products right out of the box. All Powerline devices must use the same Powerline password if they should communicate together over Powerline. If the passwords are not the same, reconfigure the devices to ensure that all devices have the same passwords. Note: For Corinex Wireless to Powerline Router G, the default Network Encryption Key is "HomePlug". The 56-bit DES encryption is always enabled for Powerline data security as default. This part of the tab enables you to configure the Powerline settings. You can Enable or Disable the Powerline interface in the HomePlug Enabled field. In the Device ID field you can see the DEK (Default Encryption Key) of the adapter. The user can find the DEK number on the bottom side of each Powerline device. In the Network Password field, you can enter the powerline password for your Router. The password can be 4-24 characters long. The letters of the password are displayed as asterisks. As soon as you change anything in the password, the checkbox below the password field will indicate, that after clicking "Apply", the new password will be set. 63

64 In the Remote Powerline Device List you can see the information about the MAC Address and Data Rate as measurement with the powerline protocol for all adapters the Router can reach in the Powerline network. Press the Apply button to put all changes in the Powerline settings window into effect. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button. 64

65 4.11 Security Tabs Select the Security settings from the main tabs. The following screen will appear. Fig Security settings window 65

66 In this screen, you can configure all security features of your Corinex Wireless to Powerline Router G. The router can act either as RADIUS Server or RADIUS Client, connecting to another RADIUS server on the network. The embedded server allows client authorization using the EAP-MD5 protocol. You can specify which authentication method will be used for the both Ethernet and wireless part of your router. The following section of this manual will show you how to connect to a secure network or secure your own wired and wireless network. External RADIUS server In this section you can set the parameters of the authorization by an external RADIUS server. RADIUS Server IP Address Here you can enter the IP address of the remote RADIUS server. RADIUS Port Specifies the UDP port where the RADIUS server listens for client requests. By default it is set to 1812, but depends on the actual server. RADIUS Key Here you can enter the shared secret. The shared secret is a key by which the server and the clients recognize each other and is used for secure transmission of user passwords. Internal Embedded RADIUS Server In this section you can set the parameters for the internal RADIUS server. Embedded RADIUS Server You can either Disable or Enable the embedded RADIUS server. As you can see below this field, the Embedded RADIUS IP address of the server is by default, and the server listens on the UDP Embedded RADIUS Port RADIUS Key 66

67 Here you can enter the shared secret. The shared secret is a key by which the server and the clients recognize each other and is used for secure transmission of user passwords. Embedded RADIUS Username & Embedded RADIUS Password These two fields specify the authentication settings. Only clients, who provide this information to the server, are granted to connect. Wired Authentication Wired 802.1x Here you can either Disable or Enable authentication for users connecting through the Ethernet and Powerline interfaces of the router. Wired 802.1x RADIUS server For users connecting through Ethernet or Powerline, you can select whether to pass the authentication requests to an External RADIUS Server, or to the Embedded RADIUS Server. Wireless Authentication In this section, you can set the security settings for users connecting through the Wireless Interface. You can set which RADIUS server to use, network authentication method and enter passwords for authentication. Wireless Interface Here you can select which wireless interface you want to manage. By default the name of the interface is corinex followed by the MAC address of the wireless part of your router. Wireless 802.1x RADIUS server You can select whether to use the External RADIUS Server, or the Embedded RADIUS Server for authentication. Network Authentication The default is set to Open, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key authentication, the sender and recipient use a WEP key for authentication. Set the network 67

68 authentication method X and WPA require that valid RADIUS parameters are set. WPA-PSK requires a valid WPA Pre-Shared Key to be set. WPA Encryption WPA gives you three encryption methods, TKIP and AES or TKIP+AES, with dynamic encryption keys. Select the type of algorithm, TKIP, AES or TKIP+AES, enter a WPA Pre-Shared Key of 8-32 characters, and enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys. Set the Network Key Rotation Interval in seconds. Leave blank or set zero to disable the rotation. WEP Encryption WEP is a basic encryption method, not as secure as WPA. To use WEP, select a WEP key and a level of WEP encryption and either generate a WEP key through the Passphrase or enter the WEP key manually. The WEP Encryption field enables or disables WEP data encryption. Selecting Enabled enables WEP data encryption and requires that a valid network key is set and selected unless 802.1X is enabled. WEP Encryption Type You can select between 64 bit and 128 bit WEP type of encryption. WEP Passphrase 68

69 In this field enter the passphrase (up to 32 characters) and press the Generate keys button to automatically fill the keys. After pressing the Generate keys button the following alert window will appear. Note: Please follow the instructions displayed in the alert window to successfully set up WEP encryption on the wireless clients. Network Key 1 4 WEP network keys enable you to create an encryption scheme for wireless LAN transitions. Manually enter a set of values (do not leave the field blank). If you use 64-bit WEP encryption, then each key must consist of exactly 5 ASCII or 10 hexadecimal characters in length. If you use 128-bit WEP encryption, than each key must consist of exactly 13 ASCII or 26 hexadecimal characters in length. Valid hexadecimal characters are 0-9 and A-F. In the Current Network Key field you can select which network key is used for encryption outbound data and/or authenticating client. After you have entered the values in this screen, you can set them up by clicking on the Apply button. After you press the Apply button, the notification screen will appear. This screen notifies you of any errors that were detected while changing the router's settings. If all values were inserted correctly and you do not see any error messages (Validating values...done and also Committing values...done) your configuration has been updated. 69

70 Reboot the system to enable the new configuration or continue without restarting the device by pressing the Continue button Firmware Tabs Select the Firmware settings from the main tabs. The following screen will appear: Fig Firmware settings window Boot Loader Version info shows you the current version of the Boot Loader and the OS Version give you and information about the current version of the Firmware (OS) which has your Corinex Wireless to Powerline Router G. Firmware upgrade feature enables you to change/upgrade the Firmware (Router s internal software) through by the file found on the Corinex Support Web page or sent to you by the Corinex Technical Support. Click on the Choose button and select the firmware file in the following dialogue. Note: Be sure that you are entering the valid firmware file, because with entering the wrong file you will most probably destroy the internal Router firmware and it will be required to repair it in the factory. These repairs are not included in the warranty. Also be sure that you don t switch the computer or Router off in the time of the file transfer. It is also strongly recommended to save your settings into the file, as most upgrades will have the default factory settings. 70

71 Fig Choose file After selecting the firmware file, click the Open button and then (in the display screen) Upgrade button. Note: After successful firmware upgrade we recommend you to reset the Corinex Wireless to Powerline Router G to factory default settings. 71

72 5. Powerline Setup through the Ethernet Interface using Corinex Setup Tool If you want to change the password on the powerline interface without using web-based utility, you can change it using the Corinex Setup Tool. The computer running Corinex Setup Tool must be connected directly or through the hub to one of the Ethernet LAN ports of the Router (Figure 5.1). Because the LAN side of the Router is a switch, Powerline management messages come through to the Powerline port of the Router. Fig.5.1 Configuration of the Powerline port through the Ethernet Then by using the Corinex Setup Tool, you can discover the Powerline port of the Router, as it will appear in the first window of the Tool. Make sure, you are configuring the Powerline port of the Router, not any other adapter that Corinex Setup Tool may find in the network. 5.1 Installing the Setup Tool 1. Insert the installation CD. The CD should automatically start the installation process. If the installation program does not start automatically, start the application by selecting My Computer, usually found on the desktop or laptop start up screen. Navigate to the CD drive and double click on the drive. The Installation CD menu (Fig.5.2) will appear. Click on Install Setup Tool. Fig.5.2 Installation CD menu 72

73 Note: By clicking on Read Documentation you can read the manuals and additional documents included on the Installation CD. 2. The following welcome screen will be displayed. Click Next to continue. Fig.5.3 Setup Tool 3. The next screen will ask where the Setup Tool should be installed. Click Next to continue. Fig.5.4 Select Destination Directory 73

74 4. This screen will ask where Setup should place the program s shortcuts. Select the Start Menu Folder or simply click Next. Fig.5.5 Select Start Menu Folder 5. The following screen will appear to inform you that Setup is ready to begin installing the Setup Tool on your computer. Click Install. Fig.5.6 Ready to Install 74

75 After the installation is finished, the Setup Tool will start automatically. Refer to chapter 5.3 for further instructions. 5.2 Testing the Setup To verify that the connection is working correctly, use the standard Ping utility. In Windows, click on menu Start -> Run, then write the command ping IPADDRESS -t, where IPADDRESS is the IP address of the computer to which the Router is connected to, e.g. ping t (This command will be stopped by pressing keys CTRL+C). Ping the IP address of the computer to which the Router is connected. If this fails, there is a problem with the Ethernet network card or with the TCP/IP protocol. Repeat the same process with the other computers on the Powerline network. If all nodes can ping themselves, try pinging another Powerline device on the network. If this fails, there is a problem with connections on the Powerline. Try to check the connection to the AC outlet or use a different AC outlet. If the setup does not work, refer to the troubleshooting guide, but first, try unplugging the Powerline device and reboot the computer as this sometimes fixes the problem. 5.3 Running the Setup Tool The setup so far allows transmission of data encrypted with a universal key. To set your private and personal encryption keys for the network, run the Corinex Setup Tool provided on the CD. This prevents anyone from intercepting your transmitted data. The Setup Tool allows the user to setup a private and secure powerline network. Follow the steps of this guide on the screen and your secure network will be set up correctly. 1. Make sure that your Corinex Wireless to Powerline Router G is connected to the computer and start the Setup Tool from the Start menu by selecting the software folder and select Corinex Setup Tool. The following screen will appear. 75

76 Fig.5.6 Select Local Powerline Adapter 2. Detecting the device takes a few seconds. If there are more locally connected powerline devices, select the device you want to configure from the list. Click Next. 3. Now the following screen should be displayed. This is the screen where your network password is selected. Choose a password between 4 and 24 characters, the password is case sensitive so remember exactly how it was typed as it will be needed for the next device being set up. Type your password in the Network Encryption Key box and click Next. If you don t want to use encryption, uncheck the box Encrypt frames. Fig.5.7 Choose Network Encryption Key 76

77 4. Click Next again to program the Corinex Wireless to Powerline Router G with the new encryption key. This will take a few seconds. The next screen will look similar to the following screen. The white box will list the MAC addresses of all other installed powerline devices on the network that are programmed with your chosen network password. If no other devices have been programmed, the list will be empty. If you use also other than Corinex HomePlug certified devices in the network, these devices may be set at the default status. This default setting makes sure that HomePlug devices find each other in a network and connect and communicate automatically with each other. In order to generate your private and secure network, all HomePlug certified devices in the network must be set to the same network encryption key, either to the default key "HomePlug" or your own selection. Fig.5.7 Configured devices The adapter with the MAC address 00:50:C2:02:12:95 acts as local device in the network and identifies the devices shown under Device Address in the window as belonging to the network. The function and performance of the devices between the local device / adapter 00:50:C2:02:12:95 and the devices identified in the network is displayed in the window under Connection Quality. 5. All devices in your network must be programmed with the same network encryption key. Run this utility on all computers with a Powerline networking device attached. If you have a Powerline device that is not normally connected to a computer, it must first be connected to a computer and set up with a network encryption key. 77

78 6. Setup of Router SNMP Powerline Agent on the OPM Management Station Corinex Open Powerline Management (OPM) is a powerful and versatile network management software tool that allows the operators to configure, monitor and test all Powerline devices across their entire network. Corinex Open Powerline Management is based on SNMP (Simple Network Management Protocol) - a standard protocol for enhanced management and testing of communication devices. The management is independent from any hardware configuration and as a no-worry system, designed for future network expansion with support for HomePlug standard certified Powerline devices. The Corinex Open Powerline Management software answers a wide - ranging need of service providers, when they expand their services based upon the new Powerline devices in the network. Corinex Open Powerline Management offers easy to use and intuitive step-by-step navigation for an authorized user or network administrator and gives users easier implementation by installing Powerline Agents within a Powerline network. We suppose you have the OPM already installed, we refer you to the OPM User and Installation Guide. To add a Router s agent into the OPM running on the management station PC, you need to start the OPM wizard by clicking the Add button in the OPM main window (Fig. 6.1) to start the Add wizard. Fig.6.1 Corinex Open Management main window 78

79 Adding a Local Network After clicking on the Add button in the main window (Fig. 6.1), the wizard will appear and the administrator has to choose the option Add Local Network as shown in Fig 6.2 Fig. 6.2 Add Wizard - Option Add Local Network After the Next button click, choose a name for the Local Network (text field Name, for example "floor1" as shown in Fig. 6.3), than click the Finish button. Fig. 6.3 Adding a Local Network - choosing a name for a Local Network After clicking on the Finish button, a Local Network named "floor 1" will be created and you will be asked if you want to add a Powerline network. 79

80 Adding a Powerline Network Use the same wizard (Add button in the main window, fig 1) to define a new Powerline network. In the wizard window, click on the option Add Powerline Network (Fig 6.4). Fig. 6.4 Adding Powerline Network - Option Add Powerline Network Then choose a name for the Powerline Network (text field Name, for example "powerline 1" as shown in Fig. 6.5). The Local network list allows you to choose a Local Network (necessary, if there is more than one). A Completing dialogue will be displayed by the Next button click. Fig. 6.5 Adding Powerline Network - choosing a name for a Powerline Network After clicking on the Finish button in completing dialogue, you will be able to add a Powerline device. Also you can choose a Local and Powerline network (i.e. "floor 1" and "Powerline 1" as in Fig. 6.6). 80

81 Adding a Powerline Device To manage a Powerline Network, the network must contain a minimum of one Powerline device, a computer running OPM software and one networking Agent (running on a router or Computer). To add another powerline device, start the wizard by clicking the Add button in the main window (Fig. 6.1). Then choose the Powerline Device option (Fig. 6.6). Then choose Local and Powerline network where you want to assign device (i.e. "floor 1" and "Powerline 1" as in Fig. 6.6). Fig. 6.6 Adding a Powerline Device By clicking on the Next button you will be asked to fill more information into the Add Powerline device window. If you need to add a Powerline device that is not connected to the Powerline now, you need to click on the Enter MAC address manually check box and fill MAC address field with valid MAC address (e.g. "00:0B:C2:12:13:14"). This action will give the possibility to remember the Powerline devices for future reference and use in an associated network structure. Fig. 6.7 Adding a Powerline Device - choosing Local and Powerline networks 81

82 In the following window you have to fill Powerline agent's settings (Fig. 6.8). Default Powerline Agent configuration values will appear, assuming the Agent is running on a local PC. If the Powerline Agent is not running on a local PC, which can be a host to a Powerline Agent (in this case the Corinex Wireless to Powerline Router G), the name or IP address of that device should be written to the text field Address. The default IP address of the Corinex Wireless to Powerline Router G is The insertions for the fields: Port, Read and Write community must be in accordance with the naming of the Powerline Agent's settings and after inserting these names and number settings, you must click on the Finish button to continue. Fig. 6.8 Adding Powerline Device - Powerline Agent settings If the Agent's settings are correct, the Choose Powerline adapter dialog may appear if agent can access more than one powerline network. If this happened, choose the desired device from the accessible devices list and click on the OK button (Fig. 6.9) Fig. 6.9 Adding Powerline Device - Select device from list After clicking on wizard's Finish button (Fig. 6.8) or OK button in Choose Powerline device window (Fig. 6.9), the main window Tree view will contain new device (Fig. 6.10) as recognized by the network. In a few seconds (max. 25) the next devices, which are part of the same Powerline network, will appear. 82

83 Fig Adding Powerline Device finished This procedure has to be repeated until all devices in the network are registered, before the network can be managed effectively. 7. Setup of Router SNMP Powerline Agent on the OMH Software Corinex Open Management for Hotels is a powerful and versatile network management software tool that allows the operators to configure, monitor and test all Powerline or CableLAN devices across their entire network. Corinex Open Management for Hotels is based on SNMP (Simple Network Management Protocol) - a standard protocol for enhanced management and testing of communication devices. The management is independent from any hardware configuration and as a no-worry system, designed for future network expansion with support for HomePlug standard certified Powerline devices. The Corinex Open Management for Hotels software answers a wide - ranging need of service providers, when they expand their services based upon new Powerline or CableLAN devices in the network. We suppose you have the OMH software already installed, we refer you to the OMH User and Installation Guide. 83

84 To add a Router s agent into the OMH software running on the management station PC, you need to configure the SNMP Node. Configuration of the SNMP Node Fig.7.1 Corinex Open Management for Hotels main window When the user wants to add the new SNMP node, the Plug-ins->SNMP Node->Add option must be selected from the Main menu. The following window will appear as it is shown on Fig Fig. 7.2 Add SNMP Node Window 84

85 After choosing desired plug-in and clicking Ok button the following window will appear as shown on Fig Fig. 7.3 SNMP Agent Settings Window In Agent section you need to specify the IP address or name of the SNMP agent. Default SNMP Node configuration values will appear, assuming the Agent is running on a local PC or in Corinex device. If the user wants to use the SNMP Agent which is running on a Corinex Wireless to Powerline Router G device, the name or IP address of this device must be written in to the text field Agent Address. The default IP address of the Corinex Wireless to Powerline Router G is The insertions for the fields: Port, Read and Write community must be in accordance with the naming of the Agent s settings In Connection section you need to specify the Timeout and the number of Retries for the SNMP communication. In Node section you need to specify a unique name for the new SNMP node. Then, after inserting these names and number settings, you must click on the Add button after clicking on this button, the new SNMP node will be added as selected plug-in. 85

86 Fig. 7.4 Adding SNMP Node finished The main window Tree view will contain new device (Fig.7.4) as recognized by the network. This procedure has to be repeated until all devices in the network are registered, before the network can be managed effectively. Appendix A: Troubleshooting A.1 Troubleshooting Guide This section provides possible solutions to problems regarding the installation and operation of the Corinex Wireless to Powerline Router G. Read the description below to solve your problems. If you can not find an answer here, check the Corinex website at Computer networking can sometimes be "tricky" when many components must work together to function properly for the ultimate network system. The problems are usually easy to fix with the right tools. The following tools, available on your computer or the Corinex CD, will get you started. Setup Tool (from the Corinex Wireless to Powerline Router G Installation CD) 86

87 Ping (from the command prompt) ipconfig (WinNT/2000/XP), winipcfg (Win9x/Me) (from the command prompt) for PC If it just doesn t work Check that the Power LED on the Corinex Wireless to Powerline Router G if it is on, if not: Check the AC cord. Make sure the AC outlet is working by plugging something else into it. If this works, try another outlet. If this fails as well, try Check the Ethernet cables: The Corinex Wireless to Powerline Router G has a LEDs on the LAN part of the Ethernet side labeled LINK/ACT. If it is not on: Check if the device at the other end of the Ethernet cable is switched on. Try a different Ethernet cable. 3. Check that the devices exist on the network: Start the Setup Tool, click Next and see if all devices on your network are found. If all devices are listed, skip this section. If a device is missing: Make sure all computers have active current network slot. Make sure the Corinex Powerline Adapters are plugged straight into the power socket. Unplug all Corinex Powerline Adapters and plug them back in again, one by one. Run the Setup Tool again. The devices may be programmed with different passwords. Setup all devices with a new password as described in the previous chapter. 4. Check that TCP/IP detects the Corinex Wireless to Powerline Router G: From the command prompt, run ping and type the computer name or IP address of the computer you are working on [ping your computer name]. This should return 4 good packets. Now try to ping another computer on the network. If a timeout occurs: Go into the TCP/IP properties and check that the buttons for automatically obtaining IP addresses and gateway are checked. If not, make sure that both computers are on the same subnet. Run ipconfig /all from the command prompt on all computers to verify that all computers have valid IP addresses on the same subnet. The IP tables may be corrupted, reboot all computers and try again. If these tests work, you have basic connectivity and can use all network services. If this does not work, you may have a faulty device. Please contact your reseller or local distributor. I have got all that, it still doesn t work... 87

88 Make sure that your TCP/IP settings are set to automatically obtaining IP address and gateway address. If the DHCP server is not running on the network, than set the TCP/IP configuration manually as described in the chapter 3.2. Switch off all computers and unplug the Powerline devices, now plug your Powerline Adapter back into power socket before switching on your computer. This will ensure that the computer s IP address will be obtained from the Router. Now open the web browsers, if the Not Found page appears, try to check your LAN settings in the Internet Options of your web browser. It works but it is slow... A slow connection is almost always due to poor electrical connection. Make sure the device is plugged straight into the socket and not into a power splitter or extension cord. Try another outlet Wireless part The Link LED for Wireless status does not light up on the Access Point. When the Wireless port detects a WLAN connection, the Link LED will blinking. Check the Wireless adapter on your computer to see if connection and adapter work properly. Check the Wireless configuration of the Wireless adapter on your computer. See Chapter: Using the Wireless Connection. I am getting interference between my other 2.4GHz wireless devices and my wireless network. You can take several steps: Change the channel of the other 2.4GHz Wireless devices or the Access Point so that they can use different channels. Move wireless devices farther away from the Access Point space. I can not connect to other computers through the Wireless on my Powerline network or to the Internet. Make sure the IP address and TCP/IP protocol are set up correctly for all Wireless or Powerline networked computers. For more information on IP addresses, see Appendix C: IP Addressing. Make sure all devices are configured by using the Corinex Setup Tool. The network password must be the same for all devices in order to communicate with each other. See Chapter: Powerline Setup using Corinex Setup Tool. Check that the devices exist on the powerline network. Start the Setup Tool Program, click Next and see if all devices are found on your network. If all devices are listed, skip this section. If a device is missing: Make sure all computers have only one active network slot. Make sure the Corinex Powerline Adapters are plugged straight into the Powerline network through power cable. 88

89 Unplug all Corinex Powerline Adapters and plug them back in again, one by one. Then run the Setup Tool Program again. The devices might be programmed with different passwords. Set up all devices with a new password as described in the section Powerline Setup through the Ethernet Interface using Corinex Setup Tool. If you still have the trouble, you might contact the Corinex help desk by sending an e- mail to support@corinex.com. Make sure to inform as about the following items: - describing your problem - reporting the device types and manufacturing numbers of your network adapters - giving us a phone number under which you may be reached, inclusive a convenient time to call A.2 Frequently Asked Questions What is the maximum number of IP addresses that the Router will support? The Router will support up to 253 IP addresses. Where is the Router installed on the network? In a typical environment, the Router is installed between the cable/dsl modem and the LAN. Plug the Router into the cable/dsl modem s Ethernet port. Does the Router support IPX or AppleTalk? No. TCP/IP is the only protocol standard for the Internet and has become the global standard for communications. IPX, a NetWare communications protocol used only to route messages from one node to another, and AppleTalk, a communications protocol used on Apple and Macintosh networks, can be used for LAN to LAN connections, but those protocols cannot connect from the Internet to a LAN. Does the Internet connection of the Router support 100Mbps Ethernet? The Router s current hardware design supports up to 100Mbps Ethernet on WAN port however, the Internet connection speed will vary depending on the speed of your broadband connection. The Router also supports 100Mbps over the auto-sensing Fast Ethernet 10/100 switch on the LAN side of the Router. What is Network Address Translation and what is it used for? Network Address Translation (NAT) translates multiple IP addresses on the private LAN to one public address that is sent out to the Internet. This adds a level of security since the address of a PC connected to the private LAN is never transmitted on the Internet. Furthermore, NAT allows the Router to be used with low cost Internet accounts, such as DSL or cable modems, when only one TCP/IP address is provided by the ISP. The user may have many private addresses behind this single address provided by the ISP. Can multiple gamers on the LAN get on one game server and play simultaneously with just one public IP address? It depends on which network game or what kind of game server you are using. For example, Unreal Tournament supports multi-login with one public IP. How can I block corrupted FTP downloads? 89

90 If you are experiencing corrupted files when you download a file with your FTP client, try using another FTP program. If all else fails in the installation, what can I do? Reset the Router by holding down the reset button until the Power LED fully turns on and off (Press the button no longer than 5 sec). Reset your cable or DSL modem by powering the unit off and then on. Obtain and flash the latest firmware release that is readily available on the Corinex website, How will I be notified of new Router firmware upgrades? All Corinex firmware upgrades are posted on the Corinex website at where they can be downloaded for free. To upgrade the Router s firmware, use the Firmware tab of the Router s web-based utility. If the Router s Internet connection is working well, there is no need to download a newer firmware version, unless that version contains new features that you would like to use. Downloading a more current version of Router firmware will not enhance the quality or speed of your Internet connection, and may disrupt your current connection stability. Will the Router function in a Macintosh environment? Yes, but the Router s setup pages are accessible only through Internet Explorer 4.0 or Netscape Navigator 4.0 or higher for Macintosh. I am not able to get the web configuration screen for the Router. What can I do? You may have to remove the proxy settings on your Internet browser, e.g., Netscape Navigator or Internet Explorer. Or remove the dial-up settings on your browser. Check with your browser documentation, and make sure that your browser is set to connect directly and that any dial-up is disabled. For Internet Explorer, click Tools, Internet Options, and then the Connection tab. Make sure that Internet Explorer is set to Never dial a connection. For Netscape Navigator, click Edit, Preferences, Advanced, and Proxy. Make sure that Netscape Navigator is set to Direct connection to the Internet. Is the Router cross-platform compatible? Any platform that supports Ethernet and TCP/IP is compatible with the Router. Does the Router pass PPTP packets or actively route PPTP sessions? The Router allows PPTP packets to pass through. What are the advanced features of the Router? The Router s advanced features include Advanced Wireless settings, Filters, Port Forwarding, Routing and DDNS Can the Router act as my DHCP server? Yes. The Router has DHCP server software built-in. Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application s documentation to determine if it supports operation over a network. What is the IEEE g standard? It is one of the IEEE standards for wireless networks. The g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the g standard. The g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz. What IEEE b features are supported? The product supports the following IEEE b functions: CSMA/CA plus Acknowledge protocol 90

91 Multi-Channel Roaming Automatic Rate Selection RTS/CTS feature Fragmentation Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network. What is infrastructure mode? When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point. What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary opportunity to place convenient high-speed wireless capabilities in the hands of users around the globe. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). What is DSSS? Direct-Sequence Spread- Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. Would the information be intercepted while transmitting on air? Instant wireless products feature two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it generates security feature of scrambling. On the software side, instant wireless products offer the encryption function (WEP) to enhance security and access control. Users can set it up depending upon their needs. Can instant wireless products support file and printer sharing? Instant wireless products perform the same function as LAN products. Therefore, instant wireless products can work with NetWare, Windows NT/2000, or other LAN operating systems to support printer or file sharing. What is WEP? 91

92 WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 64-bit or 128- bit shared key algorithm, as described in the IEEE standard. What is a MAC Address? The Media Access Control (MAC) address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. Unlike IP addresses, which can change every time a computer logs onto the network, the MAC address of a device stays the same, making it a valuable identifier for the network. How do I reset the Router to default? Press and hold the Reset button on the back panel until all the LED has been lightened (for about ten seconds). This will reset the Router to its default settings. How do I resolve issues with signal loss? There is no way to know the exact range of your wireless network without testing. Every obstacle placed between the Router and a wireless PC will create signal loss. Lead glass, metal, concrete floors, water and walls will inhibit the signal and reduce range. Start with the Router and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment. You may also try using different channels, as this may eliminate interference affecting only one channel. I have excellent signal strength, but I cannot see my network. WEP is probably enabled on the Router, but not on your wireless adapter (or vice versa). Verify that the same WEP keys and levels (64 or 128) are being used on all nodes of your wireless network. How many channels/frequencies are available with the Router? There are fourteen available channels, ranging from 1 to 14. For g we support 11 channels for North America, 13 for Europe (ETSI) and 14 for Japan. Do the Corinex powerline products cause interference with other home networking or powerline products? No. The Corinex powerline products can co-exist with phone line and wireless networking technologies. How do the Instant Powerline products handle node addressing in the network? The Corinex Powerline products adhere to standard Ethernet addressing protocols using the destination and source of MAC addressing. How can your technology be beneficial in general? General benefits are inexpensiveness, fastness and reliably manageable installation. How can your technology be beneficial for me as Internet provider? Our technology lowers the costs, and adds manageability. How can your technology be beneficial for me as Internet user? Lower the cost, reach points where there is no other alternative. In which frequency band operates your Powerline technology? Our Powerline technology operates in 4-21 MHz spectrum using OFDM modulation. Can I manage Powerline devices remotely? Yes, you can manage all of our devices remotely by using Open Powerline Management software (OPM) or you can use the Corinex Open Management for Hotels. If your questions are not addressed here, refer to the Corinex website, 92

93 A.3 Corinex Authorized Powerline Partners Program We also advise you to visit our Corinex Authorized Powerline Partners Program web page (cappp.corinex.com), as you can find here valuable information about complex applications and installations, along with the partners in your area that provide installation services. Appendix B: Wireless Security A Brief Overview Whenever data - in the form of files, s, or messages - is transmitted over your wireless network, it is open to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just like signals from your cellular or cordless phone can be intercepted, signals from your wireless network can also be compromised. What are the risks inherent in wireless networking? Read on. What Are The Risks? Computer network hacking is nothing new. With the advent of wireless networking, hackers use methods both old and new to do everything from stealing your bandwidth to stealing your data. There are many ways this is done, some simple, some complex. As a wireless user, you should be aware of the many ways they do this. Every time a wireless transmission is broadcast, signals are sent out from your wireless PC or access point, but not always directly to its destination. The receiving PC or access point can hear the signal because it is within that radius. Just as with a cordless phone, cellular phone, or any kind of radio device, anyone else within that radius, who has their device set to the same channel or bandwidth can also receive those transmission. Wireless networks are easy to find. Hackers know that, in order to join a wireless network, your wireless PC will typically first listen for "beacon messages". These are identifying packets transmitted from the wireless network to announce its presence to wireless nodes looking to connect. These beacon frames are unencrypted and contain much of the network's information, such as the network's SSID (Service Set Identifier) and the IP address of the network PC or access point. The SSID is analogous to the network's name. With this information broadcast to anyone within range, hackers are often provided with just the information they need to access that network. One result of this, seen in many large cities and business districts, is called "Warchalking". This is the term used for hackers looking to access free bandwidth and free Internet access through your wireless network. The marks they chalk into the city streets are well documented in the Internet and communicate exactly where available wireless bandwidth is located for the taking. Even keeping your network settings, such as the SSID and the channel, secret won't prevent a hacker from listening for those beacon messages and stealing that 93

94 information. This is why most experts in wireless networking strongly recommend the use of WEP (Wired Equivalent Privacy). WEP encryption scrambles your wireless signals so they can only be recognized within your wireless network. But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker. There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as: 1. Passive Attacks 2. Jamming Attacks 3. Active Attacks 4. Dictionary-building or Table Attacks 5. Man-in-the-Middle Attacks Passive Attacks There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message conversations, s, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a "packet sniffer", software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security. Jamming Attacks Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions. Active Attacks Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your network so it's easier to hack in the next time. In an Active Attack, the hacker has gained access to all of your network settings (SSID, WEP keys, etc.) and is in your network. Once in your wireless network, the hacker has access to all open resources and transmitted data on the network. In addition, if the 94

95 wireless network's access point is connected to a switch, the hacker will also have access to data in the wired network. Further, spammers can use your Internet connection and your ISP's mail server to send tens of thousands of s from your network without your knowledge. Lastly, the hacker could make hacking into your network even easier by changing or removing safeguards such as MAC address filters and WEP encryption. He can even steal passwords and user names for the next time he wants to hack in. Dictionary-Building or Table Attacks Dictionary-building, or Table attacks, is a method of gaining network settings (SSID, WEP keys, etc.) by analyzing about a day's worth of network traffic, mostly in the case of business networks. Over time, the hacker can build up a table of network data and be able to decrypt all of your wireless transmissions. This type of attack is more effective with networks that transmit more data, such as businesses. Man-in-the-Middle Attacks A hacker doesn't need to log into your network as a user - he can appear as one of the network's own access points, setting himself up as the man-in-the-middle. To do this, the hacker simply needs to rig an access point with your network's settings and send out a stronger signal that your access point. In this way, some of your network's PCs may associate with this rogue access point, not knowing the difference, and may begin sending data through it and to this hacker. The trade-off for the convenience and flexibility wireless networking provides is the possibility of being hacked into through one of the methods described here. With wireless networks, even with WEP encryption, open to the persistent hacker, how can you protect your data? The following section will tell you how to do just that. B.1 Maximizing Wireless Security Security experts will all tell you the same thing: Nothing is guaranteed. No technology is secure by itself. An unfortunate axiom is that building the better mousetrap can often create a better mouse. This is why, in the examples below, your implementation and administration of network security measures is the key to maximizing wireless security. No preventative measure will guarantee network security but it will make it more difficult for someone to hack into your network. Often, hackers are looking for an easy target. Making your network less attractive to hackers, by making it harder for them to get in, will make them look elsewhere. How do you do this? Before discussing WEP and WPA, let's look at a few security measures often overlooked. 95

96 A. Common Sense Solutions 1) Network Content Now that you know the risks assumed when networking wirelessly, you should view wireless networks as you would the Internet. Don't host any systems or provide access to data on a wireless network that you wouldn't put on the Internet. 2) Network Layout When you first lay out your network, keep in mind where your wireless PCs are going to be located and try to position your access point(s) towards the center of that network radius. Remember that access points transmit indiscriminately in a radius; placing an access point at the edge of the physical network area reduces network performance and leaves an opening for any hacker smart enough to discover where the access point is transmitting. This is an invitation for a man-in-the-middle attack, as described in the previous section. To perform this type of attack, the hacker has to be physically close to your network. So, monitoring both your network and your property is important. Furthermore, if you are suspicious of unauthorized network traffic, most wireless products come with a log function, with which you can view activity on your network and verify if any unauthorized users have had access. 3) Network Devices With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. If they get into the hands of a hacker, so do all of your settings. So keep an eye on them. 4) Administrator passwords Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator's password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator's password regularly. 5) SSID There are a few things you can do to make your SSID more secure: a. Disable Broadcast b. Make it unique c. Change it often 96

97 Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers. So don't broadcast the SSID. A default SSID is set on your wireless devices by the factory. (The Corinex default SSID is "corinex".) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Changing your SSID regularly will force any hacker attempting to gain access to your wireless network to start looking for that new SSID. With these three steps in mind, please remember that while SSIDs are good for segmenting networks, they fall short with regards to security. Hackers can usually find them quite easily. 6) MAC addresses Enable MAC address filtering if your wireless products allow it. MAC address filtering will allow you to provide access to only those wireless nodes with certain MAC addresses. This makes it harder for a hacker using a random MAC address or spoofing (faking) a MAC address. 7) Firewalls Once a hacker has broken into your wireless network, if it is connected to your wired network, they'll have access to that, too. This means that the hacker has effectively used your wireless network as a backdoor through your firewall, which you've put in place to protect your network from just this kind of attack via the Internet. You can use the same firewall technology to protect your wired network from hackers coming in through your wireless network as you did for the Internet. Rather than connecting your access point to an unprotected switch, swap those out for a router with a built-in firewall. The router will show the access point coming in through its WAN port and its firewall will protect your network from any transmissions entering via your wireless network. PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date antiviral software. B. WEP Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker's job more difficult. WEP encryption implementation was not put in place with the standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is not completely secure. One piece of 97

98 information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address. Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary-building attack, the best prevention for these types of programs is by not using static settings, periodically changing WEP keys, SSID, etc. There are several ways that WEP can be maximized: a) Use the highest level of encryption possible b) Use multiple WEP keys c) Change your WEP key regularly Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will have a harder time breaking into your network. Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by using multiple WEP keys. Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your network, there would be nothing preventing someone access to the entire network, using just one static key. The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way, multiple keys reduce your liability. Finally, be sure to change your WEP key regularly, once a week or once a day. Using a "dynamic" WEP key, rather than one that is static, makes it even harder for a hacker to break into your network and steal your resources. WEP Encryption WEP encryption for the Corinex Wireless to Powerline Router G is configured through the Web-Utility's Security tab. Select WEP from the dropdown menu of Security Mode (Fig. 9.1). 98

99 Fig. 9.1 WEP Select WEP keys (1-4) will be used when the Router sends data. The user can also select the number of Current Network Key. Make sure the receiving device is using the same key. The WEP Key can be generated using your passphrase or you can enter it manually. If you wish to enter the WEP Key manually, type the key into the appropriate Key field on the left. The WEP key must consist of the letters "A" through "F" and the numbers "0" through "9" and should be 10 characters in length for 64-bit encryption or 26 characters in length for 128-bit encryption. All points in your wireless network must use the same WEP key to utilize WEP encryption. C. WPA Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP. WPA is accessed through the Web-Utility's Security Tab. Choose one of the following Security Modes from the drop-down menu. WPA Pre-Shared Key If you do not have a RADIUS server, Select the type of algorithm, TKIP, AES or TKIP+AES, enter a password in the Pre-Shared key field of 8-32 characters, and enter a 99

100 Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router how often it should change the encryption keys. WPA RADIUS WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) First, select the type of WPA algorithm, TKIP or AES. Enter the RADIUS server s IP Address and port number, along with a key shared between the Router and the server. Last, enter a Group Key Renewal period, which instructs the Router how often it should change the encryption keys. Fig. 9.2 WPA and Radius 100

101 Appendix C: Glossary 10BaseT - An Ethernet standard that uses twisted wire pairs. 100BaseTX - IEEE physical layer specification for 100 Mbps over two pairs of Category 5 UTP or STP wire. 1000BASE-T - A 100 Mbps technology based on the Ethernet/CD network access method. Provides half-duplex (CSMA/CD) and full-duplex 1000 Mbps Ethernet service over Category 5 links as defined by ANSI/TIA/EIA-568-A. Topology rules for 1000BASE- T are the same as those used for 100BASE-T. Category 5 link lengths are limited to 100 meters by the ANSI/TIA/EIA-568-A cabling standard. Only one CSMA/CD repeater will be allowed in a collision domain b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz g - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility with b devices. Access Point - Device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network. Adapter - Printed circuit board that plugs into a PC to add to capabilities or connectivity to a PC. In a networked environment, a network interface card (NIC) is the typical adapter that allows the PC or server to connect to the intranet and/or Internet. Asymmetrical Digital Subscriber Line (ASDL) - A new standard for transmitting at speeds up to 7 Mbps over a single copper pair. Auto-negotiate - To automatically determine the correct settings. The term is often used with communications and networking. For example, Ethernet 10/100 cards, hubs, and switches can determine the highest speed of the node they are connected to and adjust their transmission rate accordingly. Ad-hoc - A group of wireless devices communicating directly with each other (peer-topeer) without the use of an access point. Backbone The part of a network that connects most of the systems and networks together and handles the most data. Bandwidth 1. Measure of the information capacity of a transmission channel, in terms of how much data the facility can transmit in a fixed amount of time; expressed in bits per second (bps). 2. The difference between the highest and lowest frequencies of a band that can be passed by a transmission medium without undue distortion, such as the AM band 535 to 1705 kilohertz. Baseband - Transmission scheme in which the entire bandwidth, or data-carrying capacity, of a medium (such as a coaxial cable) is used to carry a single digital pulse, or signal, between multiple users. Because digital signals are not modulated, only one kind of data can be transmitted at a time. Contrast with broadband. Baud (Bite at Unit Density) - A measure of the speed of transmission of data; number of elements transmitted per second. 101

102 Beacon Interval - The frequency interval of the beacon, which is a packet broadcast by a router to synchronize a wireless network. Bit A binary digit. The value 0 or 1 used in the binary numbering system. Also, the smallest form of data. Boot To cause the computer to start executing instructions. Personal computers contain built-in instructions in a ROM chip that are automatically executed on startup. These instructions search for the operating system, load it, and pass control to it. Bridge/Router- A device that can provide the functions of a bridge, router, or both concurrently. Bridge/router can route one or more protocols, such as TCP/IP and/or XNS, and bridge all other traffic. Broadband - A data-transmission scheme in which multiple signals share the bandwidth of a medium. This allows the transmission of voice, data, and video signals over a single medium. Cable television uses broadband techniques to deliver dozens of channels over one cable. Broadcast Domain - Defines the set of all devices which will receive broadcast frames originating from any device within the set. Broadcast domains are normally bounded by routers. Browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web or PC. The word browser seems to have originated prior to the Web as a generic term for user interfaces that let you browse text files online. Buffer - A storage area used for handling data in transit. Buffers are often used to compensate for differences in processing speed between network devices. Byte - The fundamental unit that a computer uses in its operation. It is a group of adjacent binary digits, usually 8, often used to represent a single character. Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet. Once connected, cable modem users have a continuous connection to the Internet. Cable modems feature asymmetric transfer rates: around 36 Mbps downstream (from the Internet to the computer), and from 200 Kbps to 2 Mbps upstream (from the computer to the Internet). Caching 1. Speeds information processing by storing information from a transaction to use for later transactions. 2. Storing or buffering data in a temporary location, so that the information can be retrieved quickly by an application program. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) - A method of data transfer that is used to prevent data loss in a network. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) -A channel access mechanism wherein devices wishing to transmit first check the channel for a carrier. If no carrier is sensed for some period of time, devices can transmit. If two devices transmit simultaneously, a collision occurs and is detected by all colliding devices, which subsequently delays their retransmissions for some random length of time. CSMA/CD access is used by Ethernet /IEEE and HomePlug. CAT 3 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify categories (the singular is commonly referred to as CAT ) of twisted pair cabling systems (wires, junctions, and connectors) in terms of the data rates that they can sustain. CAT 3 cable has a maximum throughput of 16 Mbps and is usually utilized for 10BaseT networks. 102

103 CAT 5 - ANSI/EIA (American National Standards Institute/Electronic Industries Association) Standard 568 is one of several standards that specify categories (the singular is commonly referred to as CAT ) of twisted pair cabling systems (wires, junctions, and connectors) in terms of the data rates that they can sustain. CAT 5 cable has a maximum throughput of 100 Mbps and is usually utilized for 100BaseTX networks. CAT 5e - The additional cabling performance parameters of return loss and farend crosstalk (FEXT) specified for 1000BASE-T and not specified for 10BASE-T and 100BASE-TX are related to differences in the signaling implementation. 10BASE-T and 100BASE-TX signaling is unidirectional signals are transmitted in one direction on a single wire pair. In contrast, Gigabit Ethernet is bi-directional signals are transmitted simultaneously in both directions on the same wire pair; that is, both the transmit and receive pair occupy the same wire pair. CPU (Central Processing Unit) - The computing part of the computer. Also called the processor, it is made up of the control unit and ALU. Daisy Chain - Connected in series, one after the other. Transmitted signals go to the first device, then to the second, and so on. Database - A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated. Data Packet - One frame in a packet-switched message. Most data communications is based on dividing the transmitted message into packets. For example, an Ethernet packet can be from 64 to 1518 bytes in length. Default Gateway - The routing device used to forward all traffic that is not addressed to a station within the local subnet. Demodulation - Opposite of modulation; the process of retrieving data from a modulated carrier wave. DHCP (Dynamic Host Configuration Protocol) - A protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. Using the Internet s set of protocol (TCP/IP), each machine that can connect to the Internet needs a unique IP address. When an organization sets up its computer users with a connection to the Internet, an IP address must be assigned to each machine. Without DHCP, the IP address must be entered manually at each computer and, if computers move to another location in another part of the network, a new IP address must be entered. DHCP lets a network administrator supervise and distribute IP addresses from a central point and automatically sends a new IP address when a computer is plugged into a different place in the network. DHCP uses the concept of a lease or amount of time that a given IP address will be valid for a computer. The lease time can vary depending on how long a user is likely to require the Internet connection at a particular location. It s especially useful in education and other environments where users change frequently. Using very short leases, DHCP can dynamically reconfigure networks in which there are more computers than there are available IP addresses. DHCP supports static addresses for computers containing Web servers that need a permanent IP address. DMZ - (DeMilitarized Zone) allows one IP address (or computer) to be exposed to the Internet. Some applications require multiple TCP/IP ports to be open. It is recommended that you set your computer with a static IP address if you want to use DMZ Hosting. DNS - Domain Name System (DNS). The distributed name/address mechanism used in the Internet.. 103

104 Domain - A subnetwork comprised of a group of clients and servers under the control of one security database. Dividing LANs into domains improves performance and security. Download - To receive a file transmitted over a network. In a communications session, download means receive, and upload means transmit. DSL - (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines. Driver - A workstation or server software module that provides an interface between a network interface card and the upper-layer protocol software running in the computer; it is designed for a specific NIC, and is installed during the initial installation of a networkcompatible client or server operating system. DSSS (Direct-Sequence Spread-Spectrum) - DSSS generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. DTIM - (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless efficiency. Dynamic IP Address - An IP address that is automatically assigned to a client station in a TCP/IP network, typically by a DHCP server. Network devices that serve multiple users, such as servers and printers, are usually assigned static IP addresses. Dynamic Routing - The ability for a router to forward data via a different route based on the current conditions of the communications circuits. For example, it can adjust for overloaded traffic or failing lines and is much more flexible than static routing, which uses a fixed forwarding path. Encapsulation - The wrapping of data in a particular protocol header. For example, Ethernet data is wrapped in a specific Ethernet header before network transit. Encryption - Applying a specific algorithm to data in order to alter the data s appearance and prevent other devices from reading information. Decryption applies the algorithm in reverse to restore the data to its original form. Ethernet - A baseband LAN specification invented by Xerox Corporation and developed jointly by Xerox, Intel, and Digital Equipment Corporation. Ethernet networks operate at 10 Mbps using CSMA/CD to run over coaxial cable. Ethernet is similar to a series of standards produced by IEEE referred to as IEEE Fast Ethernet - A 100 Mbps technology based on the 10Base-T Ethernet CSMA/CD network access method. Firewall - A firewall is a set of related programs, located at a network gateway server, which protects the resources of a network from users from other networks. (The term also implies the security policy that is used with the programs.) An enterprise with an intranet that allows its workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data resources and for controlling what outside resources to which its own users have access. Basically, a firewall, working closely with a router, examines each network packet to determine whether to forward it toward its destination. Firmware - Programming that is inserted into programmable read-only memory, thus becoming a permanent part of a computing device. 104

105 Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet. FTP (File Transfer Protocol) 1. An IP application protocol for transferring files between network nodes. 2. An Internet protocol that allows a user on one host to transfer files to and from another host over a network. Full Duplex - The ability of a networking device to receive and transmit data simultaneously. Gateway - A system that interconnects networks. Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a time. Hardware - The physical aspect of computers, telecommunications, and other information technology devices. HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World Wide Web. IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking standards. Infrastructure - Currently installed computing and networking equipment. Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access point. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network. IPCONFIG - A utility that provides for querying, defining and managing IP addresses within a network. A commonly used utility, under Windows NT and 2000, for configuring networks with static IP addresses. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer. IRQ (Interrupt ReQuest) - hardware interrupt on a PC. There are 16 IRQ lines used to signal the CPU that a peripheral event has started or terminated. Except for PCI devices, two devices cannot use the same line. ISM band - Radio band used in wireless networking transmissions. ISP - An ISP (Internet service provider) is a company that provides individuals and companies access to the Internet and other related services such as website building and virtual hosting. LAN (Local Area Network) - The computers and networking products that make up the network in your home or office. Latency - The time delay between when the first bit of a packet is received and the last bit is forwarded. MAC Address - The MAC (Media Access Control) address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. Mbps (MegaBits Per Second) - One million bits per second; unit of measurement for data transmission. Multicasting - Sending data to a group of destinations at once. NAT - NAT (Network Address Translation) is the translation of an Internet Protocol address (IP address) used within one network to a different IP address known within 105

106 another network. One network is designated the inside network and the other is the outside. NetBEUI (NetBIOS Extended User Interface) - The transport layer for NetBIOS. NetBIOS and NetBEUI were originally part of a single protocol suite that was later separated. NetBIOS sessions can be transported over NetBEUI, TCP/IP, and SPX/IPX protocols. NetBIOS - The native networking protocol in DOS and Windows networks. Although originally combined with its transport layer protocol (NetBEUI), NetBIOS today provides a programming interface for applications at the session layer (layer 5). NetBIOS can ride over NetBEUI, its native transport, which is not routable, or over TCP/IP and IPX/SPX, which are routable protocols. NetBIOS computers are identified by a unique 15- character name, and Windows machines (NetBIOS machines) periodically broadcast their names over the network so that Network Neighborhood can catalog them. For TCP/IP networks, NetBIOS names are turned into IP addresses via manual configuration in an LMHOSTS file or a WINS server. There are two NetBIOS modes. The Datagram mode is the fastest mode, but does not guarantee delivery. It uses a selfcontained packet with send and receive name, usually limited to 512 bytes. If the recipient device is not listening for messages, the datagram is lost. The Session mode establishes a connection until broken. It guarantees delivery of messages up to 64KB long. Network - A system that transmits any combination of voice, video, and/or data between users. Network Mask - also known as the Subnet Mask. NIC (Network Interface Card) - A board installed in a computer system, usually a PC, to provide network communication capabilities to and from that computer system. Also called an adapter. Node - A network junction or connection point, typically a computer or work station. Notebook (PC) - A notebook computer is a battery-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, at temporary offices, and at meetings. A notebook computer, sometimes called a laptop computer, typically weighs less than five pounds and is three inches or less in thickness. OFDM (Orthogonal Frequency Division Multiplexing) - A type of modulation technology that separates the data stream into a number of lower-speed data streams, which are then transmitted in parallel. Used in a, g, and powerline networking. Packet - A unit of data sent over a network. Packet Filtering - Discarding unwanted network traffic based on its originating address or range of addresses or its type ( , file transfer, etc.) Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Corinex products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online. It is used to test and debug a network by sending out a packet and waiting for a response. Plug-and-Play - The ability of a computer system to configure expansion boards and other devices automatically without requiring the user to turn off the system during installation. 106

107 Port - A pathway into and out of the computer or a network device such as a switch or router. For example, the serial and parallel ports on a personal computer are external sockets for plugging in communications lines, modems, and printers. Port Mirroring - Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. A network administrator uses port mirroring as a diagnostic tool or debugging feature, especially when fending off an attack. It enables the administrator to keep close track of switch performance and alter it if necessary. Port mirroring can be managed locally or remotely. PPPoE (Point to Point Protocol over Ethernet) - A method used mostly by DSL providers for connecting personal computers to a broadband modem for Internet access. It is similar to how a dial-up connection works but at higher speeds and quicker access. PPTP (Point-to-Point Tunneling Protocol) - A protocol (set of communication rules) that allows corporations to extend their own corporate network through private tunnels over the public Internet. Effectively, a corporation uses a wide area network as a single large local area network. A company no longer needs to lease its own lines for widearea communication but can securely use the public networks. This kind of interconnection is known as a virtual private network (VPN). Preamble - Part of the wireless signal that synchronizes network traffic. Print Server - A hardware device that enables a printer to be located anywhere in the network. RIP (Routing Information Protocol) - A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route based on the smallest hop count between source and destination. RIP is a distance vector protocol that routinely broadcasts routing information to its neighboring routers and is known to waste bandwidth. AppleTalk, DECnet, TCP/IP, NetWare, and VINES all use incompatible versions of RIP. RJ-11 (Registered Jack-11) - A telephone connector that holds up to six wires. The RJ- 11 is the common connector used to plug a telephone into a wall. RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires. Router - A networking device that connects multiple networks together, such as a local network and the Internet. Roaming - The ability to take a wireless device from one access point's range to another without losing the connection. RTS (Request To Send) - A packet sent when a computer has data to transmit. The computer will wait for a CTS (Clear To Send) message before sending data. Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services. SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol. Software - Instructions for the computer. A series of instructions that performs a particular task is called a program. The two major categories of software are system software and application software. System software is made up of control programs such as the operating system and database management system (DBMS). Application software is any program that processes data for the user. A common misconception is that software is data. It is not. Software tells the hardware how to process the data. 107

108 SOHO (Small Office/Home Office) - Market segment of professionals who work at home or in small offices. Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission. SSID (Service Set IDentifier) - Your wireless network's name. Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path. Static routing cannot adjust to changing line conditions as can dynamic routing. Storage - The semi-permanent or permanent holding place for digital data. Subnet Mask - The method used for splitting IP networks into a series of subgroups, or subnets. The mask is a binary pattern that is matched up with the IP address to turn part of the host ID address field into a field for subnets. Swapping - Replacing one segment of a program in memory with another and restoring it back to the original when required. Switch - 1. Device that is the central point of connection for computers and other devices in a network, so data can be shared at full transmission speeds. 2. A device for making, breaking, or changing the connections in an electrical circuit. TCP (Transmission Control Protocol) - A method (protocol) used along with the Internet Protocol (Internet Protocol) to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. TCP/IP - Transmission Control Protocol/Internet Protocol (TCP/IP) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability. Throughput - The amount of data moved successfully from one place to another in a given time period. Topology - A network s topology is a logical characterization of how the devices on the network are connected and the distances between them. The most common network devices include hubs, switches, routers, and gateways. Most large networks contain several levels of interconnection, the most important of which include edge connections, backbone connections, and wide-area connections. TX Rate Transmission Rate. UDP (User Datagram Protocol) - A communications method (protocol) that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and, together with IP, is sometimes referred to as UDP/IP. Like the Transmission Control Protocol, UDP uses the Internet Protocol to actually get a data unit (called a datagram) from one computer to another. Unlike TCP, however, UDP does not provide the service of dividing a message into packets (datagrams) and 108

109 reassembling it at the other end. Specifically, UDP doesn't provide sequencing of the packets that the data arrives in. This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange (and therefore very little message reassembling to do) may prefer UDP to TCP. Upgrade - To replace existing software or firmware with a newer version. Upload - To send a file transmitted over a network. In a communications session, upload means transmit, and download means receive. URL (Uniform Resource Locator) - The address that defines the route to a file on the Web or any other Internet facility. URLs are typed into the browser to access Web pages, and URLs are embedded within the pages themselves to provide the hypertext links to other pages. UTP - Unshielded twisted pair is the most common kind of copper telephone wiring. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each signal on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable. VLAN (Virtual LAN) - A logical association that allows users to communicate as if they were physically connected to a single LAN, independent of the actual physical configuration of the network. Virtual Server - Multiple servers that appear as one server, or one system image, to the operating system or for network administration. VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet. WAN - A communications network that covers a wide geographic area, such as a state or country. WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit shared key algorithm, as described in the IEEE standard. WINIPCFG - Configuration utility based on the Win32 API for querying, defining, and managing IP addresses within a network. A commonly used utility for configuring networks with static IP addresses. WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with each other wirelessly. Workgroup - Two or more individuals that share files and databases. 109

110 Appendix D: How to Ping your ISP s and Web addresses Virtually all Internet addresses are configured with words or characters (e.g., etc.) However, recently these Internet addresses are assigned to IP addresses, which are the true addresses on the Internet. For example, is recently at the time of producing this manual. If you type this address into your web browser, you will end up at the Corinex home page every time. Some servers translate the URL to an IP address, so called DNS (Domain Name System) Servers. However, IP and web addresses can be long and hard to remember sometimes. From this reason, certain ISPs will shorten their server addresses to single words or codes on their users web browser or configurations. If your ISP s and web server addresses are configured with single words (www, , home, pop3, etc.) rather than entire Internet addresses or IP addresses, the Access Point may have problems by sending or receiving mail and by accessing the Internet. The solution is to determine the true web addresses behind your ISPs code words. You can determine the IP and web addresses of your ISP s servers by pinging them. Important: If you don t have your ISP s web and IP addresses, you must either get them from your ISP or follow these steps prior to connecting your Corinex Wireless to Powerline Access Point to your network. D.1 Step One: Pinging an IP Address The first step to determining your ISP s web and server address is to ping its IP address. 1. Power on the computer and the cable or DSL modem, and restore the network configuration set by your ISP if you have changed it. 2. Click Start, then Run, and type command. This will bring up the DOS window. 3. At DOS command prompt, type ping corinex.com (assuming that your desired IP address location is configured as corinex.com) and press Enter. As an example, the following data information on Figure 11.1., taken from a ping of Microsoft Network server, will be displayed. 110

111 Fig Pinging 4. Write down the IP address returned by the ping command. (In the example above: ) This IP address is the actual IP address of the mail server, or any other value you have pinged. D.2 Step Two: Pinging for a Web Address While the above-mentioned IP address could perform as your server address, it might not be permanent. IP addresses change very much often. Web addresses, however, usually don t. This is the reason, why you are likely to have fewer problems by configuring your system with web addresses rather than IP addresses. Follow the instructions below to find the web address assigned to the IP address you just pinged. 1. At the DOS command prompt, type ping -a , where is the IP address you just pinged. Information such as the following data will be displayed. Fig Pinging 111

112 2. Write down the web address returned by the ping command (In the example in Fig corinex.com is the web address). This web address is the web address assigned to the IP address you just pinged. While the IP address of mail could change conceivably, it is presumably that this web address will not. 3. Replace your ISP s abbreviated server address with this extended web address in the corresponding Internet application (web browser, application, etc.). Once you have replaced the brief server address with the true server address, the Access Point should have no problem accessing the Internet through this Internet application. Appendix E: Finding the MAC address and IP address for your Ethernet Adapter This section describes how to find the MAC address of your Ethernet adapter of your computer to do either MAC Filtering or MAC Address Cloning for the Router and ISP. You can also find the IP address of your computer s Wireless or Ethernet adapter. The IP address is used for filtering, forwarding, and DMZ. In this appendix follow the next steps to find the MAC address or IP address for your adapter of your Windows 95, 98, Me, NT, 2000, XP, Linux or Macintosh Computer. E.1 For Windows 95, 98, and ME: 1. Click Start and Run. In the Open field, enter winipcfg, as shown in Figure Then press the Enter key or the OK button. Fig Running winipcfg 112

113 2. When the IP Configuration window appears, select the Wireless or Ethernet adapter you are using to connect to the Corinex Wireless to Powerline Router G via a Ethernet, Wireless or through the Powerline, as shown in Fig Write down the Adapter Address as shown on your computer screen (see Figure 7.1). This is the MAC address for your Wireless or Ethernet adapter and will be shown as a series of numbers and letters. The MAC address/adapter Address is what you will use for MAC Address Cloning or MAC Filtering. This example shows the IP address of your Wireless adapter as Your computer may show something different. E.2 For Windows NT, 2000, and XP: The following steps show an alternative way of obtaining the MAC and IP address for your Wireless or Ethernet adapter. 1. Click Start and Run. In the Open field, enter cmd. Press Enter key or click the OK button. Fig Running ipconfig 2. In the command prompt, enter ipconfig /all. Then press Enter key. 3. Write down the Physical Address as shown on your computer screen (Figure 11.2); it is the MAC address for your Wireless or Ethernet adapter. This will appear as a series of letters and numbers. The MAC address/physical Address is what you will use for MAC Address Cloning or MAC Filtering. 113

114 The example in Figure 11.2 shows the IP address of your Wireless adapter as Your computer might show something different. Note: The MAC address is also called Physical Address. When entering the information using the Access Point s web-based utility, you will type the 12-digit MAC address in this format, XX:XX:XX:XX:XX:XX without the hyphens for MAC Filtering. When entering information for MAC Address Cloning, type the 12-digit MAC address. E.3 For Linux PC: From the Start Button on Desktop bar, choose Terminals->Xterm (or any other convenient terminal). Fig Starting Terminal Login as superuser by issuing su command, then press Enter. Provide the password, and press Enter. Enter ifconfig, press Enter. In the field Hwaddr is the requested MAC Address. 114

115 Fig Running ifconfig Login as superuser, by issuing su command, and then press Enter. Provide the password, and press Enter again. Enter iwconfig, and then press Enter. You can see the wireless port parameters. Fig Running iwconfig 115

116 E.4 For Macintosh OS X computer: 1. In Applications open Utilities. Fig Applications 2. In Utilities select Network Utility 116

117 Fig Utilities 3. Select the interface connected to the Corinex Wireless to Powerline Router G through the Ethernet or through the Wireless. In this section you can see the wireless connection type. Fig Network Utility 4. The field Hardware Address contains the MAC Address of selected interface. 117

Corinex Communications Corp. assumes no responsibility or liability for any errors or inaccuracies that may appear in this book.

Corinex Communications Corp. assumes no responsibility or liability for any errors or inaccuracies that may appear in this book. Copyright This Quick Start Guide, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of the license. The content of this manual

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

IP806GA/GB Wireless ADSL Router

IP806GA/GB Wireless ADSL Router IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features...

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

802.11N Wireless Broadband Router

802.11N Wireless Broadband Router 802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1

More information

AirCruiser G Wireless Router GN-BR01G

AirCruiser G Wireless Router GN-BR01G AirCruiser G Wireless Router GN-BR01G User s Guide i Contents Chapter 1 Introduction... 1 Overview...1 Features...1 Package Contents...2 AirCruiser G Wireless Router Rear Panel...2 AirCruiser G Wireless

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

AV CableLAN Adapter. User Guide

AV CableLAN Adapter. User Guide AV CableLAN Adapter AV CableLAN Adapter User Guide Copyright This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms

More information

Broadband Router. with 2 Phone Ports WIRED. Installation and Troubleshooting Guide RT31P2. A Division of Cisco Systems, Inc. Model No.

Broadband Router. with 2 Phone Ports WIRED. Installation and Troubleshooting Guide RT31P2. A Division of Cisco Systems, Inc. Model No. A Division of Cisco Systems, Inc. Broadband Router with 2 Phone Ports WIRED Installation and Troubleshooting Guide Model No. RT31P2 Copyright and Trademarks Specifications are subject to change without

More information

LevelOne Broadband Routers

LevelOne Broadband Routers LevelOne Broadband Routers FBR-1100TX FBR-1400TX FBR-1401TX FBR-1700TX User's Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your LevelOne Broadband Router... 1 Package Contents... 4

More information

RX3041. User's Manual

RX3041. User's Manual RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

User Manual DIR-615. Wireless Router with Built-in 4-port Switch

User Manual DIR-615. Wireless Router with Built-in 4-port Switch DIR-615 Wireless Router with Built-in 4-port Switch December 2011 Contents Chapter 1. Introduction...4 Contents and Audience...4 Conventions...4 Document Structure...4 Chapter 2. Overview...5 General Information...5

More information

Corinex is a registered trademark of Corinex Communications Corp.

Corinex is a registered trademark of Corinex Communications Corp. II ce en fcc III Copyright This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of the license. The content of

More information

Broadband Router DC 202

Broadband Router DC 202 Broadband Router DC 202 Full Manual Table of Contents DC-202 xdsl/cable Broadband router REQUIREMENTS...4 INTRODUCTION...4 DC-202 Features...4 Internet Access Features...4 Advanced Internet Functions...5

More information

IP806GA/GB Wireless ADSL Router

IP806GA/GB Wireless ADSL Router IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide DECLARATION OF CON FORMITY This device complies with Part 15 of the FCC Rules.

More information

CE APPROVED.4 INTRODUCTION.5 PACKAGE CONTENTS. 6 PRE - INSTALLATION CHECKLIST. 6 SYSTEM REQUIREMENTS. 6 FEATURES AND BENEFITS.11 SETUP WIZARD.

CE APPROVED.4 INTRODUCTION.5 PACKAGE CONTENTS. 6 PRE - INSTALLATION CHECKLIST. 6 SYSTEM REQUIREMENTS. 6 FEATURES AND BENEFITS.11 SETUP WIZARD. Web Edition Dec. 2002 Contents CE APPROVED...4 INTRODUCTION...5 PACKAGE CONTENTS... 6 PRE - INSTALLATION CHECKLIST... 6 SYSTEM REQUIREMENTS... 6 FEATURES AND BENEFITS... 7 4 - PORT CABLE/XDSL ROUTER...9

More information

2. The next screen will tell you to press the lighted Cisco logo on the Router. After you have pressed the logo, click the Next button to continue.

2. The next screen will tell you to press the lighted Cisco logo on the Router. After you have pressed the logo, click the Next button to continue. 2. The next screen will tell you to press the lighted Cisco logo on the Router. After you have pressed the logo, click the Next button to continue. To exit the Wireless Setup Wizard, click the Exit button.

More information

Corinex AV200 Powerline Ethernet Wall Mount

Corinex AV200 Powerline Ethernet Wall Mount Corinex AV200 Powerline Ethernet Wall Mount AV200 Powerline Wall Mount Quick Start Guide Copyright This document, as well as the software described in it, is furnished under license and may be used or

More information

A Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. User Guide WIRED RT41P2-AT. Model No.

A Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. User Guide WIRED RT41P2-AT. Model No. A Division of Cisco Systems, Inc. WIRED Broadband Router with 2 Phone Ports User Guide Model No. RT41P2-AT Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Content 1 OVERVIEW HARDWARE DESCRIPTION HARDWARE INSTALLATION PC CONFIGURATION GUIDE... 5 WEB-BASED MANAGEMENT GUIDE...

Content 1 OVERVIEW HARDWARE DESCRIPTION HARDWARE INSTALLATION PC CONFIGURATION GUIDE... 5 WEB-BASED MANAGEMENT GUIDE... Content 1 OVERVIEW...1 1.1FEATURES...1 1.2 PACKETCONTENTS...3 1.3 SYSTEM REQUIREMENTS... 1.4 FACTORY DEFAULTS...4 1.5 WARNINGS AND CAUTIONS...4 2 HARDWARE DESCRIPTION... 6 3 HARDWARE INSTALLATION...8 4

More information

Wireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps

Wireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps Wireless SOHO Router/Bridge ECB-1220R 2.4 GHz 802.11 b/g 54 Mbps ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement this crossover

More information

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0 DC-228 ADSL2+ Modem/Router -Annex A- User Manual Version: 1.0 TABLE OF CONTENTS 1 PACKAGE CONTENTS...3 2 PRODUCT LAYOUT...4 3 NETWORK + SYSTEM REQUIREMENTS...6 4 DC-228 PLACEMENT...6 5 SETUP LAN, WAN...7

More information

Broadband Router User s Manual. Broadband Router User s Manual

Broadband Router User s Manual. Broadband Router User s Manual Broadband Router User s Manual Table of Contents 1 Introduction... 1 1.1 Features... 1 1.2 Package Contents... 2 1.3 LEDs & Connectors of Broadband Router... 2 1.4 System Requirements... 2 1.5 Installation

More information

Downloaded from manuals search engine

Downloaded from   manuals search engine Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

802.11N Wireless ADSL Router

802.11N Wireless ADSL Router 802.11N Wireless ADSL Router Pre-N Wireless Access Point ADSL Modem NAT Router WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION...1 Wireless ADSL Router Features...1 Package

More information

Multi-Function Wireless Router. User's Guide. Wireless Access Point Broadband Internet Access. 4-Port Switching Hub

Multi-Function Wireless Router. User's Guide. Wireless Access Point Broadband Internet Access. 4-Port Switching Hub Multi-Function Wireless Router Wireless Access Point Broadband Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1 Package Contents...

More information

DSL/CABLE ROUTER with PRINT SERVER

DSL/CABLE ROUTER with PRINT SERVER USER S MANUAL DSL/CABLE ROUTER with PRINT SERVER MODEL No:SP888BP http://www.micronet.info 1 Content Table CHAPTER 0:INTRODUCTION... 4 FEATURES... 4 MINIMUM REQUIREMENTS... 4 PACKAGE CONTENT... 4 GET TO

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

IPS-390U Specification

IPS-390U Specification IPS-390U Specification 2.4GHz Wireless 802.11n(DRAFT) Giga Router Revision 1.0 Revision History Date Version Author Remark 10/08/2007 1.0 ipsilicon production 1 Features Compliant Work with Vista requirements

More information

MIMO Wireless Broadband Route r User s Manual 1

MIMO Wireless Broadband Route r User s Manual 1 MIMO Wireless Broadband Router User s Manual 1 Introduction...4 Features...4 Minimum Requirements...4 Package Content...4 Note...4 Get to know the Broadband Router...5 Back Panel...5 Front Panel...6 Setup

More information

Wireless Broadband Router

Wireless Broadband Router LW6005A-R2 Wireless Broadband Router Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

User Manual. Rev:

User Manual.   Rev: Default Login Details Login Address: www.mykasda.com Login Password: Set up by users Default Wi-Fi SSID: Kasda xxxx KW6516 (Printed on product label) Default Wi-Fi Password: 12345678 www.kasdanet.com Rev:

More information

IP819VGA g ADSL VoIP Gateway

IP819VGA g ADSL VoIP Gateway IP819VGA 802.11g ADSL VoIP Gateway 802.11g/802.11b Access Point ADSL Modem NAT Router VoIP Gateway User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 802.11g ADSL VoIP Gateway Features... 1 Package

More information

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter

More information

LevelOne. User's Guide. Broadband Router FBR-1402TX FBR-1403TX

LevelOne. User's Guide. Broadband Router FBR-1402TX FBR-1403TX LevelOne Broadband Router FBR-1402TX FBR-1403TX User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 LevelOne Broadband Router Features... 1 Package Contents... 3 Physical Details...4 CHAPTER 2 INSTALLATION...

More information

LKR Port Broadband Router. User's Manual. Revision C

LKR Port Broadband Router. User's Manual. Revision C LKR-604 4-Port Broadband Router User's Manual Revision C 1 Contents 1 Introduction... 4 1.1 Features... 4 1.2 Package Contents... 4 1.3 Finding Your Way Around... 5 1.3.1 Front Panel... 5 1.3.2 Rear Panel

More information

TZ 170 Quick Start Guide

TZ 170 Quick Start Guide COMPREHENSIVE INTERNET SECURITY S o n i c WALL Internet Security Ap p l i a n c e s TZ 170 Quick Start Guide Quick Start Installation Thank you for purchasing a SonicWALL Internet security appliance. The

More information

ADSL Modem. User Guide AM300. Model No. WIRED

ADSL Modem. User Guide AM300. Model No. WIRED WIRED User Guide Model No. AM300 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates

More information

Multi-Homing Broadband Router. User Manual

Multi-Homing Broadband Router. User Manual Multi-Homing Broadband Router User Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

User Manual DIR-615. Wireless N 300 Home Router

User Manual DIR-615. Wireless N 300 Home Router DIR-615 Wireless N 300 Home Router April 2013 Contents Chapter 1. Introduction...5 Contents and Audience...5 Conventions...5 Document Structure...5 Chapter 2. Overview...6 General Information...6 Specifications...7

More information

EVR b/g/n VPN Router PRODUCT DESCRIPTION

EVR b/g/n VPN Router PRODUCT DESCRIPTION 802.11b/g/n VPN Router 2.4GHz 300Mbps Gigabit 11N VPN PRODUCT DESCRIPTION is a 2T2R Wireless 11N Gigabit VPN Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. supports

More information

WT-2000R Turbo-G Broadband Router

WT-2000R Turbo-G Broadband Router WT-2000R Turbo-G Broadband Router Turbo-G Family The AirLive Turbo-G family provides 125Mbps wireless speed at the same cost as the Wireless-G devices. Unlike the Super-G mode that uses channel-binding

More information

Cable/DSL Gateway Router plus 4-port Switch

Cable/DSL Gateway Router plus 4-port Switch Cable/DSL Gateway Router plus 4-port Switch The revision date for this guide is April 26, 2002 Version 1.0 The information in this guide may change without notice. The manufacturer assumes no responsibility

More information

LevelOne User Manual WBR g Wireless ADSL2+ Router

LevelOne User Manual WBR g Wireless ADSL2+ Router LevelOne User Manual WBR-3600 11g Wireless ADSL2+ Router V1.0.1-0809 1 FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC Table of Contents CHAPTER 1 INTRODUCTION... 1 54Mbps 802.11g ADSL Firewall Modem Router Features... 2 Package Contents... 4 Physical Details... 5 CHAPTER 2 INSTALLATION... 7 Requirements... 7 Procedure...

More information

A Division of Cisco Systems, Inc. ADSL Modem. User Guide WIRED AM200. Model No.

A Division of Cisco Systems, Inc. ADSL Modem. User Guide WIRED AM200. Model No. A Division of Cisco Systems, Inc. WIRED User Guide Model No. AM200 Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco

More information

11g Wireless Broadband Router

11g Wireless Broadband Router LevelOne WBR-3408 User Manual 11g Wireless Broadband Router (Roteador banda-larga sem fio- Wireless G) Ver. 3.000 Safety FCC WARNING This equipment may generate or use radio frequency energy. Changes or

More information

Internet Broadband Router

Internet Broadband Router Internet Broadband Router XRT-401D/402D/104D User s Manual 1 Copyright Copyright (C) 2004 PLANET Technology Corp. All rights reserved. The products and programs described in this User s Manual are licensed

More information

LevelOne FBR-1405TX. User s Manual. 1-PORT BROADBAND ROUTER W/4 LAN Port

LevelOne FBR-1405TX. User s Manual. 1-PORT BROADBAND ROUTER W/4 LAN Port LevelOne FBR-1405TX 1-PORT BROADBAND ROUTER W/4 LAN Port User s Manual 1 Introduction... 4 Features... 4 Minimum Requirements...4 Package Content... 4 Note...4 Get to know the Broadband Router... 5 Back

More information

Wireless Network Video Recorder

Wireless Network Video Recorder LD2R/LD2R500 Wireless Network Video Recorder User Guide Version 1.0 PREFACE Thank you for purchasing the Wireless Network Video Recorder, an IP based device that installed on your network, which can be

More information

WL5041 Router User Manual

WL5041 Router User Manual TECOM WL5041 Router User Manual TECOM CO., LTD. March 2003 2003 by TECOM CO., LTD. All rights reserved. Printed in Taiwan Table of contents Package Contents--------------------------------------- 2 Installing

More information

GHz g. Wireless-G. User Guide. ADSL Gateway with 2 Phone Ports WIRELESS WAG54GP2 (EU/LA) Model No.

GHz g. Wireless-G. User Guide. ADSL Gateway with 2 Phone Ports WIRELESS WAG54GP2 (EU/LA) Model No. GHz 2.4 802.11g WIRELESS Wireless-G ADSL Gateway with 2 Phone Ports User Guide Model No. WAG54GP2 (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Gigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired

Gigaset Router / en / A31008-E105-B / cover_front_router.fm / s Be inspired s Be inspired Table of Contents Table of Contents Safety precautions........................... 3 The Gigaset Router........................... 3 Features and Benefits..................................................

More information

Notice according to GNU/GPL-Version 2

Notice according to GNU/GPL-Version 2 Copyright by Edimax Technology Co, LTD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer

More information

EVR b/g/n VPN Router

EVR b/g/n VPN Router EVR100 is a 2T2R Wireless 11N Gigabit VPN Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network with superior throughput and performance

More information

Broadband Router. User s Manual

Broadband Router. User s Manual Broadband Router User s Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel... 6 Setup Diagram...7

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Internet Broadband Router

Internet Broadband Router Internet Broadband Router XRT-401D User s Manual 1 Copyright Copyright (C) 2003 PLANET Technology Corp. All rights reserved. The products and programs described in this User s Manual are licensed products

More information

300M Wireless-N Broadband Router User Manual

300M Wireless-N Broadband Router User Manual 300M Wireless-N Broadband Router Model No.: ib-wrb314n User Manual Ver.: 1.0.0 Contents...Error! Bookmark not defined. Chapter 1 Product Overview... 3 Package Contents 3 Conventions....4 Panel Overview...

More information

A or G Wireless Router

A or G Wireless Router A or G Wireless Router 802.11a/802.11g/802.11b Wireless Access Point Broadband Internet Access 4-Port Switching Hub User's Guide DECLARATION OF CONFORMITY Per FCC Part 2 Section 2.1077(a) Responsible Party

More information

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter

More information

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658d Home Gateway V100R001 User Guide Issue 01 Date 2013-07-23 Part Number 202633 Huawei Technologies Co., Ltd. provides customers with comprehensive

More information

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at

PRODUCT OVERVIEW. Learn more about EnGenius Solutions at Dual Radio Multi-Function Repeater 2.4 GHz / 5 GHz 300Mbps 802.11a/b/g/n Multi Function PRODUCT OVERVIEW equips with two powerful independent RF interfaces which support 802.11a/b/g and 802.11b/g/n. With

More information

ESR1221N2 300N Wireless Router

ESR1221N2 300N Wireless Router ESR1221N2 is a 300Mbps AP Router offers user unprecedented network performance with economic circuit design. WMM support boosts streaming and multimedia intensive services. Multiple SSID provides advance

More information

ECB3500 Wireless Long Range Multi-function 7+1 AP

ECB3500 Wireless Long Range Multi-function 7+1 AP Package Contents - 1* Wireless Long range - multi-function 7+1 AP (ECB3500) - 1* 12V/1A Power Adapter - 1* CAT5 UTP Cable - 1* QIG - 1* CD (User s Manual) - 2* 5dBi 2.4GHz Dipole Antennas ECB3500 is a

More information

802.11b/g/n SOHO Router 2.4GHz 300Mbps 11N AP/Router

802.11b/g/n SOHO Router 2.4GHz 300Mbps 11N AP/Router 802.11b/g/n SOHO Router 2.4GHz 300Mbps 11N AP/Router ESR-9752 PRODUCT DESCRIPTION ESR-9752 is a 2T2R Wireless Single chip 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage

More information

User Manual. OT-1044ns

User Manual. OT-1044ns User Manual OT-1044ns CONTENTS Chapter 1 Introduction... 3 1.1 Features... 3 1.2 Environments... 3 1.3 System Requirement... 4 Chapter 2 Hardware Installation... 4 2.1 Led indicators... 4 2.2 Back Panel

More information

Linksys E2000 Advanced Wireless-N Router. User Guide

Linksys E2000 Advanced Wireless-N Router. User Guide User Guide Table of Contents Contents Chapter 1: Product Overview 1 Top....................................................... 1 Back...................................................... 1 Horizontal

More information

Conceptronic C100BRS4H Quick Installation Guide. Congratulations on the purchase of your Conceptronic 4-ports Broadband Router.

Conceptronic C100BRS4H Quick Installation Guide. Congratulations on the purchase of your Conceptronic 4-ports Broadband Router. Conceptronic C100BRS4H Quick Installation Guide Congratulations on the purchase of your Conceptronic 4-ports Broadband Router. The enclosed Hardware Installation Guide gives you a step-by-step explanation

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

GHz 2, g. Wireless-G. Router for Mobile Broadband WIRELESS. User Guide WRT54G3G-VN. Model No.

GHz 2, g. Wireless-G. Router for Mobile Broadband WIRELESS. User Guide WRT54G3G-VN. Model No. GHz 2,4 802.11g WIRELESS Wireless-G Router for Mobile Broadband User Guide Model No. WRT54G3G-VN Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark

More information

A Division of Cisco Systems, Inc. GHz Mbps. Wireless-G. User Guide. VPN Broadband Router WIRELESS WRV54G. Model No.

A Division of Cisco Systems, Inc. GHz Mbps. Wireless-G. User Guide. VPN Broadband Router WIRELESS WRV54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 54Mbps WIRELESS Wireless-G VPN Broadband Router User Guide Model No. WRV54G Copyright and Trademarks Specifications are subject to change without notice. Instant

More information

Wireless Broadband Router User Guide

Wireless Broadband Router User Guide Wireless Broadband Router User Guide The information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any

More information

HG658 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

HG658 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658 Home Gateway User Guide HUAWEI TECHNOLOGIES CO., LTD. HG658 Home Gateway V100R001 User Guide Issue 01 Date 2012-06-07 Part Number 202500 Huawei Technologies Co., Ltd. provides customers with comprehensive

More information

ECB3220. Wireless Long Range Multi-function Client Bridge PRODUCT DESCRIPTION. 2.4 GHz EIRP up to 1000mW

ECB3220. Wireless Long Range Multi-function Client Bridge PRODUCT DESCRIPTION. 2.4 GHz EIRP up to 1000mW Wireless Long Range Multi-function Client Bridge (Access Point/Client Bridge/Repeater/Client Router) 2.4 GHz EIRP up to 1000mW PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking

More information

GAN9.9T153A-B Product Specifications

GAN9.9T153A-B Product Specifications GAN9.9T153A-B Product All Rights Reserved. GAN9.9T153A-B Product Introduction The GAN9.9T153A-B is a high-performance wireless ADSL router, uplink rate up to 1 Mbps and downlink rate up to 24 Mbps. It

More information

Wireless-N Broadband AP / Router. User s Manual. Version 1.3

Wireless-N Broadband AP / Router. User s Manual. Version 1.3 Wireless-N Broadband AP / Router User s Manual Version 1.3 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital

More information

ECB GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

ECB GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ Wireless Long Range Multi-function 7+1 AP ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ EIRP up to 2000mW WDS Bridge/Client Router/AP Router ECB3500 is a powerful, enhanced,

More information

ECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW

ECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW WDS Bridge/Client /AP ECB3500 is a powerful, enhanced, enterprise level product supports 7 multi-functions to operate for every kind of working environment. It supports high transmit output power and high

More information

PRODUCT DESCRIPTION. Learn more about EnGenius Solutions at

PRODUCT DESCRIPTION. Learn more about EnGenius Solutions at Wireless Long Range Multi-function Client Bridge 2.4 GHz EIRP up to 400mW Access point Client Bridge Repeater Client Router PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking

More information

Ethernet (CAT5 UTP/Straight-Through) Cable. 5V DC Power Adapter

Ethernet (CAT5 UTP/Straight-Through) Cable. 5V DC Power Adapter 1 This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 6.2.3. Before You Begin Check Your Package Contents DI-824VUP+ 2.4GHz Wireless VPN Router and

More information

ESR b/g/n SOHO Router PRODUCT OVERVIEW. 2.4 GHz 150Mbps 11N Router/AP

ESR b/g/n SOHO Router PRODUCT OVERVIEW. 2.4 GHz 150Mbps 11N Router/AP 802.11b/g/n SOHO Router 2.4 GHz 150Mbps 11N Router/AP PRODUCT OVERVIEW is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices. supports home network

More information

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1

USER GUIDE. Wireless-G Broadband Router. Model No: WRT54G2 V1 USER GUIDE Wireless-G Broadband Router Model No: WRT54G2 V1 About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific

More information

WL556E Portable Wireless-N Repeater

WL556E Portable Wireless-N Repeater WL556E Portable Wireless-N Repeater Table of Contents About the Device...3 Minimum System Requirements...4 Package Contents...4 Device Overview...5 Front Panel...5 Bottom Panel...6 Configuring the Device...

More information

Longshine Technologie Europe GmbH

Longshine Technologie Europe GmbH Longshine Technologie Europe GmbH www.longshine.de TABLE OF CONTENTS COPYRIGHT...2 1. INTRODUCTION...3 PRODUCT OVERVIEW...3 COMPONENTS AND FEATURES...3 HARDWARE INSTALLATION...3 2. MFP SERVER INSTALLATION...5

More information

ESR b/g/n SOHO Router PRODUCT DESCRIPTION. 11N AP/Router 2.4GHz 300 Mbps Gigabit

ESR b/g/n SOHO Router PRODUCT DESCRIPTION. 11N AP/Router 2.4GHz 300 Mbps Gigabit ESR9850 802.11b/g/n SOHO Router 11N AP/Router 2.4GHz 300 Mbps Gigabit PRODUCT DESCRIPTION ESR9850 is a 2T2R Wireless 11N Gigabit Router that delivers up to 6x faster speeds and 3x extended coverage than

More information

802.11g Wireless High-power Broadband Router with passive PoE. User s Manual

802.11g Wireless High-power Broadband Router with passive PoE. User s Manual 802.11g Wireless High-power Broadband Router with passive PoE User s Manual Table of Contents CHAPTER 1: INTRODUCTION... 2 WIRELESS ROUTER FEATURES... 2 PACKAGE CONTENTS... 4 PHYSICAL DETAILS... 5 ABOUT

More information

3G-6408n User Manual

3G-6408n User Manual 3G-6408n User Manual 05-2012 / v1.0 COPYRIGHT Copyright Edimax Technology Co., Ltd. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Copyright and Trademarks. How to Use This User Guide

Copyright and Trademarks. How to Use This User Guide Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

More information

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel...

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter 1...

More information

Dual WAN VPN Firewall VPN 3000 User s Guide. Version 1.0 Date : 1 July 2005 Please check for the latest version

Dual WAN VPN Firewall VPN 3000 User s Guide. Version 1.0 Date : 1 July 2005 Please check  for the latest version Dual WAN VPN Firewall VPN 3000 User s Guide Version 1.0 Date : 1 July 2005 Please check www.basewall.com for the latest version Basewall 2005 TABLE OF CONTENTS 1: INTRODUCTION... 4 Internet Features...

More information

2.4GHz 108Mbps b/g/Super G MSSID, WDS

2.4GHz 108Mbps b/g/Super G MSSID, WDS Long Range Wireless Access Point / Client Bridge 2.4 108Mbps 802.11b/g/Super G MSSID, WDS EOC2611P EOC2611P is a long range outdoor wireless Access Point / Client Bridge that operates seamlessly in the

More information

TEW-211BRP. Wireless AP Router. User s Manual

TEW-211BRP. Wireless AP Router. User s Manual TEW-211BRP Wireless AP Router User s Manual Version 1.4 - Jan 2002 CONTENTS Introduction...3 Hardware Installation...5 General Wireless AP Router System Connection...6 Wireless AP Router Default Settings

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

KX/3G ADSL2+ ROUTER MAIN FEATURES

KX/3G ADSL2+ ROUTER MAIN FEATURES The KORTEX 3G/ADSL2+, a dual-wan 3G / ADSL2+ firewall router integrated with the 802.11g wireless access point and 4-port switch, is a cutting-edge networking product for SOHO and office users. Uniquely,

More information

TABLE OF CONTENTS COPYRIGHT INTRODUCTION...3 PRODUCT OVERVIEW...3 COMPONENTS AND FEATURES...3 HARDWARE INSTALLATION

TABLE OF CONTENTS COPYRIGHT INTRODUCTION...3 PRODUCT OVERVIEW...3 COMPONENTS AND FEATURES...3 HARDWARE INSTALLATION TABLE OF CONTENTS COPYRIGHT...2 1. INTRODUCTION...3 PRODUCT OVERVIEW...3 COMPONENTS AND FEATURES...3 HARDWARE INSTALLATION...3 2. MFP SERVER INSTALLATION...5 PREPARATION...5 CONFIGURATION SOLUTION TABLE...5

More information

RANGER SERIES. 150Mbps Wireless Green Broadband Router DG-BR4000NG. 150 Mbps V

RANGER SERIES. 150Mbps Wireless Green Broadband Router DG-BR4000NG. 150 Mbps V RANGER SERIES 150Mbps Wireless Green Broadband Router DG-BR4000NG N 150 Mbps V1.2 2011-12-15 FCC warning: This equipment has been tested and found to comply with the limits for a class B digital device,

More information