527747
49
Verklein
Vergroot
Pagina terug
1/59
Pagina verder
WL-347/WL-348
Wireless Broadband
modem/router
(ADSL2+, 802.11B/G/N draft 2.0)
2
User Manual
Version: 1.0
3
T
ABLE OF
C
ONTENTS
1
KEY FEATURES ...................................................................................................................... 5
2
PACKAGE CONTENTS......................................................................................................... 6
3
PRODUCT LAYOUT .............................................................................................................. 7
4
NETWORK + SYSTEM REQUIREMENTS ................................................................... 9
5
WL-347/WL-348 PLACEMENT...................................................................................... 9
6
SETUP LAN, WAN............................................................................................................... 10
7
PC NETWORK ADAPTER SETUP (WINDOWS XP) .............................................11
8
BRINGING UP THE WL-347/WL-348 ..................................................................... 13
9
INITIAL SETUP WL-347/WL-348 ............................................................................ 13
10
CONFIGURATION WIZARD...................................................................................... 22
11
WIRELESS SETTINGS ................................................................................................. 24
12
FIREWALL SETTINGS ................................................................................................. 35
13
ADVANCED SETTINGS................................................................................................ 41
14
TOOLBOX SETTINGS ................................................................................................... 53
4
Introduction
Congratulations on your purchase of the WL-347/WL-348 Wireless Network
Broadband modem/Router. The WL-347/WL-348 is compliant with draft
802.11n v 2.0 and up to 6 times faster than standard 802.11g based routers
while still being compatible with 802.11g & 802.11b gadgets. The WL-
347/WL-348 is not only a Modem or Wireless Access Point, but also doubles
as a 4-port full-duplex Switch that connects your wired-Ethernet devices
together at.
At 300 Mbps wireless transmission rate, the Access Point built into the
Modem/Router uses advanced MIMO (Multi-Input, Multi-Output) technology to
transmit multiple steams of data in a single wireless channel, giving you
seamless access to multimedia content. Robust RF signal travels farther,
eliminates dead spots and extends network range. For data protection and
privacy, the WL-347/WL-348 encodes all wireless transmissions with WEP,
WPA, and WPA2 encryption.
With an inbuilt DHCP Server & powerful SPI firewall the WL-347/WL-348
protects your computers against intruders and most known Internet attacks
but provides safe VPN pass-through. With the incredible speed and QoS
function of 802.11n(draft2.0), the WL-347/WL-348 is ideal for media-centric
applications like streaming video, gaming, and VoIP telephony to run multiple
media-intense data streams through the network at the same time, with no
degradation in performance.
5
1 Key Features
Features Advantages
Incredible Data Rate up to
300Mbps**
Heavy data payloads such as MPEG
video streaming
IEEE 802.11n draft 2.0 Compliant
and backward compatible with
802.11b/g
Fully Interoperable with IEEE
802.11b / IEEE802.11g compliant
devices with legacy protection
Four 10/100 Mbps Fast Switch Ports
(Auto-Crossover)
Scalability, extend your network.
Firewall supports Virtual Server
Mapping, DMZ, IP Filter, ICMP
Blocking, SPI
Avoids the attacks of Hackers or
Viruses from Internet
Support 802.1x authenticator,
802.11i (WPA/WPA2, AES), VPN
pass-through
Provide mutual authentication (Client
and dynamic encryption keys to
enhance security
Integrated modem (Annex A) Fully compatible with the fastest
ADSL2+ connections up-to-date.
** Theoretical wireless signal rate based on IEEE standard of 802.11a, b, g, n chipset
used. Actual throughput may vary. Network conditions and environmental factors
lower actual throughput rate. All specifications are subject to change without notice.
6
2 Package Contents
Open the package carefully, and make sure that none of the items listed
below are missing. Do not discard the packing materials, in case of return;
the unit must be shipped back in its original package.
1. WL-347/WL-348 modem/router
2. 220V ~ 240V Power Adapter
3. Quick Install Guide
4. CD (User’s Manual)
5. Warranty card
6. UTP cable
7
3 Product Layout
Port Description
ADSL Connect your telephone/ADSL cable this port
LAN
Connect the cable from your PC’s or network
devices to this port
Power connector Blinks on traffic for specific LAN PORT
Reset button
Power connector
LAN / computer connections
Modem connection
8
Front panel
The front panel describes the corresponding LED indications and port
functionality.
LED Description
POWER Lights up when powered ON. Blinks
on TEST/RESET
Wan Lights up when an ADSL cable is
connected.
Online Lights up when internet connection is
UP.
WLAN Lights up in Blue when WLAN is
enabled. Blinks on traffic
WPS Blinks when WPS mode is on
Lan1 - Lan4 When a lan cable is connected the
corresponding light lights up.
9
4 Network + System Requirements
To begin using the WL-347/WL-348, make sure you meet the following
as minimum requirements:
PC/Notebook.
Operating System – Microsoft Windows XP/2000/VISTA
1 Free Ethernet port.
Wi-Fi card/USB dongle (802.11 b/g/n) – optional.
Annex A, ADSL internet connection.
PC with a Web-Browser (Internet Explorer, Safari, Firefox, Opera)
Ethernet compatible CAT5 cables.
5 WL-347/WL-348 Placement
You can place the WL-347/WL-348 on a desk or other flat surface, or
you can mount it on a wall. For optimal performance, place your
Wireless Broadband Modem/Router in the center of your office (or your
home) in a location that is away from any potential source of
interference, such as a metal wall or microwave oven. This location
must be close to a power connection and the ADSL/phone line should
not be over 2 meters long.
10
6 Setup LAN, WAN
LAN / computer connections
Modem connection
11
7 PC Network Adapter setup
(
Windows XP
)
Enter [Start Menu] select [Control panel] select [Network].
Select [Local Area Connection]) icon=>select [properties]
12
Select [Internet Protocol (TCP/IP)] =>Click [Properties].
Select the [General] tab.
a. WL-347/WL-348 supports [DHCP] function, please select both [Obtain
an IP address automatically] and [Obtain DNS server address
automatically].
13
8 Bringing up the WL-347/WL-348
Connect the supplied power-adapter to the power inlet port and connect it to
a wall outlet. The WL-347/WL-348 automatically enters the self-test phase.
During self-test phase, the Power LED will blink briefly, and then will be lit
continuously to indicate that this product is in normal operation.
9 Initial Setup WL-347/WL-348
LOGIN procedure
2. OPEN your browser (e.g. Internet Explorer).
3.
Type http://192.168.0.1 in address bar and press [Enter]
14
4. Type user name and password (default is admin/admin).
4. Click OK.
5. You will see the home page of the WL-347/WL-348.
The System status section allows you to monitor the current status of your
router: the UP time, hardware information, serial number as well as firmware
version information is displayed here.
15
LAN settings
The LAN tab gives you the opportunity to change the IP settings of the WL-
347/WL-348.
Click <Apply> at the bottom of this screen to save any changes.
IP address 192.168.0.1. It is the router’s LAN IP address (Your LAN clients
default gateway IP address).
IP Subnet Mask 255.255.255.0 Specify a Subnet Mask for your LAN segment.
802.1d Spanning Tree is Disabled by default. If the 802.1d Spanning Tree
function is enabled, this router will use the spanning tree protocol to prevent
network loops.
DHCP Server Enabled by default. You can enable or disable the DHCP server.
When DHCP is disabled no ip-addresses are assigned to clients and you have to
use static ip-addresses. When DHCP server is enabled your computers will be
assigned an ip-address automatically until the lease time expires.
16
Lease Time Forever. In the Lease Time setting you can specify the time period
that the DHCP lends an IP address to your LAN clients. The DHCP will change
your LAN client’s IP address when this time threshold period is reached.
IP Address Pool You can select a particular IP address range for your DHCP
server to issue IP addresses to your LAN Clients.
Note: default IP range 192.168.0.100

192.168.0.199. If you want
your PC(s) to have a static/fixed IP address, then you’ll have to choose
an IP address outside this IP address Pool
Domain Name You can specify a Domain Name for your LAN. Or just keep the
default (SitecomWLxxx).
17
Device Status
View the Broadband modem/router’s current configuration settings. Device
Status displays the configuration settings you’ve configured in the Wizard /
Basic Settings / Wireless Settings section.
18
Internet Status
This page displays whether the ADSL port is connected to an ADSL service
provider. It also displays the router’s WAN IP address, Subnet Mask, and ISP
Gateway as well as MAC address, the Primary DNS. Press Renew button to
renew your WAN IP address.
19
ADSL Status
This page shows the current operation mode, status of your ADSL connection, the
data rate and the quality of your ADSL link.
Operation mode allows manual selection of the ADSL mode.
20
DHCP Client Status
DHCP This page shows all DHCP clients (LAN PCs) currently connected to your
network. The table shows the assigned IP address, MAC address and expiration
time for each DHCP leased client.
Use the Refresh button to update the available information.
21
WL-347/WL-348 Log
View the operation log of the WL-347/WL-348. This page shows the current
system log of the Broadband modem/router. It displays any event occurred after
system start up. At the bottom of the page, the system log can be saved
<Save> to a local file for further processing or the system log can be cleared
<Clear> or it can be refreshed <Refresh> to get the most updated information.
When the system is powered down, the system log will disappear if not saved to
a local file.
22
10 Configuration Wizard
Click Wizard to configure the modem. The Setup wizard will now be displayed;
check that the adsl line is connected and click Next.
Select your country from the Country list. Select your internet provider. Click
Next.
23
Depending on the chosen provider, you may need to enter your user name
and password or hostname in the following window. After you have entered
the correct information, click Next.
Click APPLY to complete the configuration.
24
11 Wireless Settings
You can set parameters that are used for the wireless stations to connect to
this router. The parameters include Mode, ESSID, Channel Number and
Associated Client.
Wireless Function
Enable or Disable Wireless function here. Click Apply and wait for module to
be ready & loaded.
25
Basic Settings
Band Allows you to set the AP fixed at 802.11b or 802.11g mode. You can
also select B+G+N mode to allow 802.11b, 802.11g and 802.11n clients at
the same time.
ESSID This is the name of the wireless signal which is broadcasted. All the
devices in the same wireless LAN should have the same ESSID.
Channel Number The channel used by the wireless LAN. All devices in the
same wireless LAN should use the same channel.
Channel bandwidth
20/40 MHz Allows automatic detection of the operation
bandwidth between 20 and 40 MHz.
Extension channel This is the optional channel for use. Setting the
Bandwidth to 20/40 MHz allows you to use this extension channel as the
secondary channel for doubling the bandwidth of your wireless network.
26
Advanced Settings
This tab allows you to set the advanced wireless options. The options included
are Authentication Type, Fragment Threshold, RTS Threshold, Beacon
Interval, and Preamble Type. You should not change these parameters unless
you know what effect the changes will have on the router.
Fragment Threshold "Fragment Threshold" specifies the maximum size
of a packet during the fragmentation of data to be transmitted. If you set
this value too low, it will result in bad performance.
RTS Threshold When the packet size is smaller then the RTS threshold,
the wireless router will not use the RTS/CTS mechanism to send this
packet.
Beacon Interval is the interval of time that this wireless router
broadcasts a beacon. A Beacon is used to synchronize the wireless
network.
DTIM period
is a countdown mechanism for WLAN Access Points
changing this value will affect your wireless performance and may improve
stability.
27
Preamble Type The “Long Preamble” can provide better wireless LAN
compatibility while the Short Preamble” can provide better wireless LAN
performance.
Broadcast ESSID If you enabled “Broadcast ESSID”, every wireless
station located within the coverage of this access point can discover this
access point easily. If you are building a public wireless network, enabling
this feature is recommended. Disabling “Broadcast ESSID” can provide
better security.
Transmit burst mode if enabled wireless throughput is enhanced, this
may affect compatibility.
802.11g: It is recommended to enable the protection mechanism. This
mechanism can decrease the rate of data collision between 802.11b and
802.11g wireless stations. When the protection mode is enabled, the
throughput of the AP will be a little lower due to a lot of frame-network
that is transmitted.
WMM Wi-Fi Multi Media if enabled supports QoS for experiencing better
audio, video and voice in applications.
28
Security
This Access Point provides complete wireless LAN security functions, included
are WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key
and WPA with RADIUS. With these security functions, you can prevent your
wireless LAN from illegal access. Please make sure your wireless stations use
the same security function, and are setup with the same security key.
Disable
When you choose to disable encryption, it is very insecure to operate the WL-
347/WL-348.
29
WEP
When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to
encrypt data. You can generate the key by yourself and enter it. You can
enter four WEP keys and select one of them as a default key. Then the router
can receive any packets encrypted by one of the four keys.
Key Length You can select the WEP key length for encryption, 64-bit or 128-
bit. The larger the key will be the higher level of security is used, but the
throughput will be lower.
Key Format You may select ASCII Characters (alphanumeric format) or
Hexadecimal Digits (in the "A-F", "a-f" and "0-9" range) to be the WEP Key.
Key1 - Key4 The WEP keys are used to encrypt data transmitted in the
wireless network. Use the following rules to setup a WEP key on the device.
64-bit WEP: input 10-digits Hex values (in the "A-F", "a-f" and "0-9" range) or
5-digit ASCII character as the encryption keys. 128-bit WEP: input 26-digit
Hex values (in the "A-F", "a-f" and "0-9" range) or 13-digit ASCII characters
as the encryption keys.
30
Click <Apply> at the bottom of the screen to save the above configurations.
You can now configure other sections by choosing Continue, or choose Apply
to apply the settings and reboot the device.
WPA Pre-shared Key
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use
a pre-shared key to authenticate wireless stations and encrypt data during
communication. It uses TKIP or CCMP (AES) to change the encryption key
frequently. So the encryption key is not easy to be cracked by hackers. This is
the best security available.
31
WPA-Radius
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use
an external RADIUS server to authenticate wireless stations and provide the
session key to encrypt data during communication. It uses TKIP or CCMP
(AES) to change the encryption key frequently. Press Apply button when you
are done.
32
ACL
This wireless router supports MAC Address Control, which prevents
unauthorized clients from accessing your wireless network.
Enable wireless access control Enables the wireless access control function
Adding an address into the list Enter the "MAC Address” of the wireless
station to be added and then click "Apply". The wireless station will now be
added. If you are having any difficulties filling in the fields, just clear the MAC
Address.
33
WPS
Wi-Fi Protected Setup (WPS) is the simplest way to establish a connection
between the wireless clients and the wireless router. You don’t have to select
the encryption mode and fill in a long encryption passphrase every time when
you try to setup a wireless connection. You only need to press a button on
both wireless client and wireless router, and WPS will do the rest for you.
The wireless router supports two types of WPS: WPS via Push Button and
WPS via PIN code. If you want to use the Push Button, you have to push a
specific button on the wireless client or in the utility of the wireless client to
start the WPS mode, and switch the wireless router to WPS mode. You can
simply push the WPS button of the wireless router, or click the ‘Start to
Process’ button in the web configuration interface. If you want to use the PIN
code, you have to know the PIN code of the wireless client and switch it to
WPS mode, then fill-in the PIN code of the wireless client through the web
configuration interface of the wireless router.
WPS Check the box to enable WPS function and uncheck it to disable the
WPS function.
34
WPS Current Status If the wireless security (encryption) function of this
wireless router is properly set, you’ll see a Configured’ message here.
Otherwise, you’ll see ‘UnConfigured’.
Self Pin Code This is the WPS PIN code of the wireless router. You may need
this information when connecting to other WPS-enabled wireless devices.
SSID This is the network broadcast name (SSID) of the router.
Authentication Mode It shows the active authentication mode for the
wireless connection.
Passphrase Key It shows the passphrase key that is randomly generated by
the wireless router during the WPS process. You may need this information
when using a device which doesn’t support WPS.
WPS via Push Button Press the button to start the WPS process. The router
will wait for the WPS request from the wireless devices within 2 minutes.
WPS via PIN You can fill-in the PIN code of the wireless device and press the
button to start the WPS process. The router will wait for the WPS request
from the wireless device within 2 minutes.
35
12 Firewall Settings
The Broadband router provides extensive firewall protection by restricting
connection parameters, thus limiting the risk of hacker attacks, and defending
against a wide array of common Internet attacks. However, for applications that
require unrestricted access to the Internet, you can configure a specific
client/server as a Demilitarized Zone (DMZ).
Note: To enable the Firewall settings select Enable and click
Apply.
36
DMZ
If you have a client PC that cannot run an Internet application (e.g. Games)
properly from behind the NAT firewall, then you can open up the firewall
restrictions to unrestricted two-way Internet access by defining a DMZ Host.
The DMZ function allows you to re-direct all packets going to your WAN port
IP address to a particular IP address in your LAN. The difference between the
virtual server and the DMZ function is that the virtual server re-directs a
particular service/Internet application (e.g. FTP, websites) to a particular LAN
client/server, whereas DMZ re-directs all packets (regardless of services)
going to your WAN IP address to a particular LAN client/server.
Enable DMZ Enable/disable DMZ
Public IP Address The IP address of the WAN port or any other Public IP
addresses given to you by your ISP
Client PC IP Address Fill in the IP address of a particular host in your LAN
that will receive all the packets originally going to the WAN port/Public IP
address above.
Click <Apply> at the bottom of the screen to save the above configurations.
37
Denial of Service (DoS)
The Broadband router's firewall can block common hacker attacks, including
Denial of Service, Ping of Death, Port Scan and Sync Flood. If Internet attacks
occur the router can log the events.
SPI and Anti-Dos firewall protection blocks basic hacker attacks (DOS,
Sync flood, port scan)
RIP defect
Discard Ping to WAN interface The router’s WAN port will not respond to
any Ping requests
Stateful packet inspection allows the user to manually determine which
packets should be scanned.
When hackers attempt to enter your network, we can alert you by e-
Mail Enter your email address. Specify your SMTP and POP3 servers, user
name and password.
Connection Policy Enter the appropriate values for TCP/UDP sessions as
described in the following table.
38
Access
You can restrict users from accessing certain Internet applications/services
(e.g. Internet websites, email, FTP etc.). Access Control allows users to define
the traffic type permitted in your LAN. You can control which PC client can
have access to these services.
Deny If you select “Deny” then all clients will be allowed to access Internet
accept for the clients in the list below.
Allow If you select “Allow” then all clients will be denied to access Internet
accept for the PCs in the list below.
Filter client PCs by IP Fill in “IP Filtering Table” to filter PC clients by IP.
Add PC You can click Add PC to add an access control rule for users by IP
addresses.
Remove PC If you want to remove some PCs from the "IP Filtering Table",
select the PC you want to remove in the table and then click “Delete
Selected". If you want to remove all PCs from the table, just click the "Delete
All" button.
39
Filter client PC by MAC Check “Enable MAC Filtering” to enable MAC
Filtering.
Add PC Fill in “Client PC MAC Address” and Comment” of the PC that is
allowed to access the Internet, and then click “Add”. If you find any typo
before adding it and want to retype again, just click "Reset" and the fields will
be cleared.
Remove PC If you want to remove some PC from the "MAC Filtering Table",
select the PC you want to remove in the table and then click "Delete
Selected". If you want to remove all PCs from the table, just click the "Delete
All" button. If you want to clear the selection and re-select again, just click
“Reset”.
Click <Apply> at the bottom of the screen to save the above configuration.
40
URL block
You can block access to some Web sites from particular PCs by entering a full
URL address or just keywords of the Web site.
Enable URL Blocking Enable/disable URL Blocking
Add URL Keyword Fill in “URL/Keyword” and then click “Add”. You can enter
the full URL address or the keyword of the web site you want to block.
Remove URL Keyword If you want to remove some URL keywords from the
"Current URL Blocking Table", select the URL keyword you want to remove in
the table and then click "Delete Selected". If you want remove all URL
keywords from the table, just click "Delete All" button. If you want to clear
the selection and re-select again, just click “Reset”.
Click <Apply> at the bottom of the screen to save the above configurations
41
13 Advanced Settings
Network Address Translation (NAT) allows multiple users at your local site to
access the Internet through a single Public IP Address or multiple Public IP
Addresses. NAT provides Firewall protection from hacker attacks and has the
flexibility to allow you to map Private IP Addresses to Public IP Addresses for
key services such as Websites and FTP. Select Disable to disable the NAT
function.
42
Virtual server
Use the Virtual Server function when you want different servers/clients in
your LAN to handle different service/Internet application type (e.g. Email,
FTP, Web server etc.) from the Internet. Computers use numbers called port
numbers to recognize a particular service/Internet application type. The
Virtual Server allows you to re-direct a particular service port number (from
the Internet/WAN Port) to a particular LAN private IP address and its service
port number.
Enable Virtual Server Enable Virtual Server.
Private IP This is the LAN client/host IP address that the Public Port number
packet will be sent to.
Private Port This is the port number (of the above Private IP host) that the
below Public Port number will be changed to when the packet enters your
LAN (to the LAN Server/Client IP)
Type Select the port number protocol type (TCP, UDP or both). If you are
unsure, then leave it to the default “both” setting. Public Port Enter the
43
service (service/Internet application) port number from the Internet that will
be re-directed to the above Private IP address host in your LAN
Comment The description of this setting.
Add Virtual Server Fill in the "Private IP", "Private Port", "Type", “Public
Port” and "Comment" of the setting to be added and then click "Add". Then
this Virtual Server setting will be added into the "Current Virtual Server Table"
below.
Remove Virtual Server If you want to remove Virtual Server settings from
the "Current Virtual Server Table", select the Virtual Server settings you want
to remove in the table and then click "Delete Selected". If you want to
remove all Virtual Server settings from the table, just click the "Delete All"
button. Click "Reset" will clear your current selections.
Click <Apply> at the bottom of the screen to save the above configurations.
44
Special application
Some applications require multiple connections, such as Internet games,
video Conferencing, Internet telephony and others. In this section you can
configure the router to support multiple connections for these types of
applications.
Enable Trigger Port Enable the Special Application function.
Trigger Port This is the out going (Outbound) range of port numbers for this
particular application.
Trigger Type Select whether the outbound port protocol is “TCP”, “UDP” or
both.
Public Port Enter the In-coming (Inbound) port or port range for this type of
application (e.g. 2300-2400, 47624)
Public Type Select the Inbound port protocol type: “TCP”, “UDP” or both
Comment The description of this setting.
45
Popular applications This section lists the more popular applications that
require multiple connections. Select an application from the Popular
Applications selection. Once you have selected an application, select a
location (1-10) in the Copy to selection box and then click the Copy to button.
This will automatically list the Public Ports required for this popular application
in the location (1-10) you specified.
Add Special Application Fill in the "Trigger Port", "Trigger Type”, Public
Port”, "Public Type", "Public Port" and "Comment" of the setting to be added
and then click "Add". The Special Application setting will be added into the
"Current Trigger-Port Table" below. If you happen to make a mistake, just
click "Clear" and the fields will be cleared.
Remove If you want to remove Special Application settings from the "Current
Trigger-Port Table", select the Special Application settings you want to
remove in the table and then click "Delete Selected". If you want remove all
Special Application settings from the table, just click the "Delete All" button.
Click "Reset" will clear your current selections.
46
UPNP
With UPnP, all PCs in you Intranet will discover this router automatically. So,
you don’t have to configure your PC and it can easily access the Internet
through this router.
UPnP Feature You can enable or Disable the UPnP feature here. After you
enable the UPnP feature, all client systems that support UPnP, like Windows
XP, can discover this router automatically and access the Internet through
this router without having to configure anything. The NAT Traversal function
provided by UPnP can let applications that support UPnP connect to the
internet without having to configure the virtual server sections.
47
QoS
QoS can let you classify Internet application traffic by source/destination IP
address and port number. You can assign priority for each type of application
and reserve bandwidth for it. The packets of applications with higher priority
will always go first. Lower priority applications will get bandwidth after higher
priority applications get enough bandwidth. This can let you have a better
experience in using critical real time services like Internet phone, video
conference …etc. All the applications not specified by you are classified as rule
name “Others”. The rule with a smaller priority number has a higher priority;
the rule with a larger priority number has a lower priority. You can adjust the
priority of the rules by moving them up or down.
Enable/Disable QoS You can check “Enable QoS” to enable QoS
functionality for the WAN port.
Traffic mapping Click Add traffic class” then enter a form of the QoS rule.
Click “Apply” after filling out the form the rule will be added into the table.
48
Edit a QoS rule Select the rule you want to edit and click “Edit”, then enter
the detail form of the QoS rule. Click Applyafter editing the form and the
rule will be saved.
Adjust QoS rule priority You can select the rule and click “Move Up” to
make its priority higher. You also can select the rule and click “Move Down” to
make its priority lower.
49
Routing
These screens define routing related parameters, including static routes and
RIP (Routing Information Protocol) parameters.
Routing Table Flags Indicates the route status:
C = Direct connection on the same subnet.
S = Static route.
R = RIP (Routing Information Protocol) assigned route.
I = ICMP (Internet Control Message Protocol) Redirect route.
Static Route Click Add to add a new static route to the list, or check the box of
an already entered route and click Modify. Clicking Delete will remove an entry
from the list.
RIP mode Globally enables or disables RIP.
Auto summary If Auto summary is disabled then RIP packets will include sub-
network information from all sub-networks connected to the router. If enabled,
this sub-network information will be summarized to one piece of information
covering all sub-networks.
Table of current Interface
RIP parameter Interface The WAN interface to be configured.
Operation Mode
Disable: RIP disabled on this interface.
49

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Sitecom WL-585 - 348 bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Sitecom WL-585 - 348 in de taal/talen: Engels als bijlage per email.

De handleiding is 3,48 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info