Introduction 1.1. Device Configuration 1.1.1. Factory Settings 1.1.2. Initial Operation Configuration via the Settings 2.1. Preparation 2.2. Settings 2.3. Settings Structure 2.3.1. Setup 2.3.1.1. Basic Configuration 2.3.1.2. Dynamic DNS (DynDNS or DDNS) 2.3.1.3. MAC Address Cloning 2.3.1.4. Advanced Routing 2.3.1.5. Networking 2.3.1.6.
Page 3
2.3.8.6. SysInfo Use Cases 3.1. Access Point 3.1.1. Access Point with NAT / DHCP 3.1.1. Access Point attached to a network / Internet gateway 3.2. Wireless Client 3.3. Wireless Client Bridge 3.4. FTP Server 3.4.1. Examples 3.4.2. Logging into the FTP server 3.4.3.
WZR-300HP: BUFFALO + last 6 digits of MAC address WZR-600DHP: For 2.4 GHz BUFFALO + last 6 digits of MAC address + "_G" For 5 GHz BUFFALO + last 6 digits of MAC address + "_A" In the default settings, the encryption system is set to WPA2-PSK/WPA- PSK (TKIP + AES), and the 8-digit unique product number is set as the encryption key.
Configuration via the Settings The router contains an integrated web server that provides an easy to use Settings. It allows configuration, administration, and status checking in a simple but effective way. The Settings was successfully tested on the following browsers: - Internet Explorer 7.x and newer versions - Firefox 2.x and newer versions - Safari 2.x and newer versions...
2.3.1. Setup 2.3.1.1. Basic Configuration Setup Information The SSID, wireless passphrase, IP address, username, and password that were set for the AirStation are displayed. Clicking Run Initial Setup Wizard opens the "Setup Assistant" screen. Follow the on-screen instructions to make the initial settings for the AirStation.
Network Setup Network setup configures the router’s basic settings to match the local network. By default these settings are valid for all of the network ports except the WAN port because they are all attached to the default bridge. If ports are disassociated from the bridge they will have different settings.
Static Routing The Static Routing section lets you add static routes. The input parameters are equivalent to the parameters of the Linux command “route”. 2.3.1.5. Networking The Networking section allows detailed network configuration. VLAN Tagging Use this option to configure VLAN tagging. Bridging By default, one bridge (br0) is defined and active.
Page 10
Modus Description WLAN Access Point mode (default) Client WLAN Client mode Client-Bridge Client-Bridge mode allows connecting to another wireless LAN access point and establishing a network bridge with that access point Adhoc Adhoc operating mode, required for building mesh networks WDS Station WDS Station is the client in a WDS-AP <->...
Wireless Channel (AP only) Set the desired wireless channel, or let the router choose a free channel automatically. If the router is in classic WDS (MAC address- based) mode, then the wireless channel must be selected manually. Wireless Network Name (SSID) The name of the wireless network the radio transmits or connects to (depending on the wireless mode).
2.3.2.3. AOSS/WPS AOSS (AirStation One-touch Secure Setup) is Buffalo’s system to automatically connect wireless clients to an access point. Just press the button on the AirStation, then press the button for the wireless client (which might be in its software). AOSS will connect the wireless devices automatically.
Start AOSS Negotiation To initiate AOSS, either click the AOSS button in the GUI or hold down the AOSS button on the front of the router for 3 seconds. Security Modes You may choose which security modes are offered in the AOSS negotiation process.
2.3.3. Services 2.3.3.1. Services The services section allows the configuration of basic service settings. Telnet and SSH can be configured this way. Remote access options are configured in the Administration section. Available DHCP Server Description Domains Standard LAN / WLAN Rflow / MACupd Description Interface Options...
PPTP When defining the PPTP server’s IP range, avoid overlap with the range of IP addresses handed out by DHCP if DHCP is enabled. The IP range is defined using the following syntax: xxx.xxx.xxx.<start-ip>-<end-ip> for example 192.168.1.20-30 Enter client login data follows: <username>...
Be careful enabling anonymous login. If anonymous login is enabled, everyone accessing your network has permission to read and write data. 2.3.3.7. Hotspot Most hotspot software requires a server to store user settings and login information. Note that Sputnik is a commercial hotspot service that requires an agreement with Sputnik for usage.
2.3.6.2. Port Range Forwarding Port range forwarding works similarly to port forwarding. Unlike port forwarding, instead of a single port, a range of ports is forwarded to the same range of ports at the internal target IP address. 2.3.6.3. Port Triggering Port triggering is a kind of port range forwarding where outgoing traffic on specific ports enables previously defined port forwards for the activating device.
2.3.7.2. Keepalive Keepalive lets you configure monitoring options that automatically reboot the router if a service malfunction causes it to fail to respond. 2.3.7.3. Commands Entering Linux commands is one of the most powerful ways to access the router’s functionality. This enables you to access services and configure options that are not accessible via the Settings.
2.3.8.3. Here you can find LAN-related information like active clients and DHCP clients. 2.3.8.4. Wireless The wireless LAN status screen displays the current wireless LAN interface configuration, wireless LAN clients (in AP modes), and access points (in client modes). If there’s more than one wireless LAN interface, you can switch between them via the interface pull-down menu.
Use Cases The following use cases relate to the most commonly used router configurations. The related router configuration is explained step by step. 3.1. Access Point Access Point (AP, sometimes also called “Infrastructure Mode”) is the mode where the router is also the central wireless hub that connects to the LAN and provides access to wireless devices.
• Configure Wireless Mode to AP. • Set your desired wireless mode in Wireless Network Mode. Note that mixed modes will lead to reduced performance because of maintaining compatibility. • Enter a name for your wireless network into Wireless Network Name (SSID).
3.2. Wireless Client The router can be also used as a wireless LAN client. This can be useful if you want to connect devices to your wireless LAN that do not have a wireless LAN interface. In this configuration, the wireless LAN interface acts as a wireless client.
Wireless -> Wireless Security • Configure the security mode to match the security settings of the access point you want to connect to. • Click Apply Settings. After the router reboots, confirm that it has connected to the access point. If there is a DHCP server available on the access point side, and the router is configured to request an IP address, then it should receive an IP address for its WAN-side interface.
Wireless -> Basic Settings • Configure Wireless Mode to Client Bridge. • Set Wireless Network Mode to match the access point you want to connect to. • Enter the network name (SSID) of the AP you want to connect to. •...
Page 25
・Make the settings in the ProFTPD section, and click Apply Settings. Setting example: ProFTPD Enable Server Port Files Directory /mnt Allow Write Enable User Password List buffalo 12345678 Anonymous Login Disable (Read-only) Separate the username (example: buffalo) and password (example: 12345678) with a space. - 24 -...
3.4.2. Logging into the FTP server ・Open a command prompt window. ・Enter ftp 192.168.11.1 to access the FTP server. ・Enter the username, and press the Enter key. ・Enter the password, and press the Enter key. ・When the login is successful, ftp> appears on the screen. ・To logout, enter the bye command.
delete Deletes a file on delete the remote computer test1.jpg mdelete Deletes multiple mdelete files on the remote test1.jpg computer test2.jpg test3.jpg rename Renames a file on rename the remote computer test1.jpg new1.jpg help Displays the Help help for FTP commands Exits FTP GPL Statement The firmware that is used in this product includes software that is...
These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have.
Page 29
recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2.
Page 30
a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the...
Page 31
You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.