Buffalo AirStation NFINITI HighPower WZR-600DHP User Manual

Router and access point professional firmware
Hide thumbs Also See for AirStation NFINITI HighPower WZR-600DHP:

Advertisement

Quick Links

User Manual for Professional Firmware
AirStation NFINITI HighPower Router and AccessPoint
WHR-300HP
AirStation NFINITI HighPower Router and AccessPoint
WZR-300HP
AirStation NFINITI HighPower Router and AccessPoint
WZR-600DHP
www.buffaloamericas.com
35012748-03
2016.05

Advertisement

Table of Contents
loading

Summary of Contents for Buffalo AirStation NFINITI HighPower WZR-600DHP

  • Page 1 User Manual for Professional Firmware AirStation NFINITI HighPower Router and AccessPoint WHR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-300HP AirStation NFINITI HighPower Router and AccessPoint WZR-600DHP www.buffaloamericas.com 35012748-03 2016.05...
  • Page 2: Table Of Contents

    Introduction 1.1. Device Configuration 1.1.1. Factory Settings 1.1.2. Initial Operation Configuration via the Settings 2.1. Preparation 2.2. Settings 2.3. Settings Structure 2.3.1. Setup 2.3.1.1. Basic Configuration 2.3.1.2. Dynamic DNS (DynDNS or DDNS) 2.3.1.3. MAC Address Cloning 2.3.1.4. Advanced Routing 2.3.1.5. Networking 2.3.1.6.
  • Page 3 2.3.8.6. SysInfo Use Cases 3.1. Access Point 3.1.1. Access Point with NAT / DHCP 3.1.1. Access Point attached to a network / Internet gateway 3.2. Wireless Client 3.3. Wireless Client Bridge 3.4. FTP Server 3.4.1. Examples 3.4.2. Logging into the FTP server 3.4.3.
  • Page 4: Introduction

    WZR-300HP: BUFFALO + last 6 digits of MAC address WZR-600DHP: For 2.4 GHz BUFFALO + last 6 digits of MAC address + "_G" For 5 GHz BUFFALO + last 6 digits of MAC address + "_A" In the default settings, the encryption system is set to WPA2-PSK/WPA- PSK (TKIP + AES), and the 8-digit unique product number is set as the encryption key.
  • Page 5: Configuration Via The Settings

    Configuration via the Settings The router contains an integrated web server that provides an easy to use Settings. It allows configuration, administration, and status checking in a simple but effective way. The Settings was successfully tested on the following browsers: - Internet Explorer 7.x and newer versions - Firefox 2.x and newer versions - Safari 2.x and newer versions...
  • Page 6: Settings Structure

    2.3. Settings Structure - 5 -...
  • Page 7: Setup

    2.3.1. Setup 2.3.1.1. Basic Configuration Setup Information The SSID, wireless passphrase, IP address, username, and password that were set for the AirStation are displayed. Clicking Run Initial Setup Wizard opens the "Setup Assistant" screen. Follow the on-screen instructions to make the initial settings for the AirStation.
  • Page 8: Dynamic Dns (Dyndns Or Ddns)

    Network Setup Network setup configures the router’s basic settings to match the local network. By default these settings are valid for all of the network ports except the WAN port because they are all attached to the default bridge. If ports are disassociated from the bridge they will have different settings.
  • Page 9: Networking

    Static Routing The Static Routing section lets you add static routes. The input parameters are equivalent to the parameters of the Linux command “route”. 2.3.1.5. Networking The Networking section allows detailed network configuration. VLAN Tagging Use this option to configure VLAN tagging. Bridging By default, one bridge (br0) is defined and active.
  • Page 10 Modus Description WLAN Access Point mode (default) Client WLAN Client mode Client-Bridge Client-Bridge mode allows connecting to another wireless LAN access point and establishing a network bridge with that access point Adhoc Adhoc operating mode, required for building mesh networks WDS Station WDS Station is the client in a WDS-AP <->...
  • Page 11: Wireless Security

    Wireless Channel (AP only) Set the desired wireless channel, or let the router choose a free channel automatically. If the router is in classic WDS (MAC address- based) mode, then the wireless channel must be selected manually. Wireless Network Name (SSID) The name of the wireless network the radio transmits or connects to (depending on the wireless mode).
  • Page 12: Aoss/Wps

    2.3.2.3. AOSS/WPS AOSS (AirStation One-touch Secure Setup) is Buffalo’s system to automatically connect wireless clients to an access point. Just press the button on the AirStation, then press the button for the wireless client (which might be in its software). AOSS will connect the wireless devices automatically.
  • Page 13: Mac Filter

    Start AOSS Negotiation To initiate AOSS, either click the AOSS button in the GUI or hold down the AOSS button on the front of the router for 3 seconds. Security Modes You may choose which security modes are offered in the AOSS negotiation process.
  • Page 14: Services

    2.3.3. Services 2.3.3.1. Services The services section allows the configuration of basic service settings. Telnet and SSH can be configured this way. Remote access options are configured in the Administration section. Available DHCP Server Description Domains Standard LAN / WLAN Rflow / MACupd Description Interface Options...
  • Page 15: Usb (Wzr Series Only)

    PPTP When defining the PPTP server’s IP range, avoid overlap with the range of IP addresses handed out by DHCP if DHCP is enabled. The IP range is defined using the following syntax: xxx.xxx.xxx.<start-ip>-<end-ip> for example 192.168.1.20-30 Enter client login data follows: <username>...
  • Page 16: Hotspot

    Be careful enabling anonymous login. If anonymous login is enabled, everyone accessing your network has permission to read and write data. 2.3.3.7. Hotspot Most hotspot software requires a server to store user settings and login information. Note that Sputnik is a commercial hotspot service that requires an agreement with Sputnik for usage.
  • Page 17: Port Range Forwarding

    2.3.6.2. Port Range Forwarding Port range forwarding works similarly to port forwarding. Unlike port forwarding, instead of a single port, a range of ports is forwarded to the same range of ports at the internal target IP address. 2.3.6.3. Port Triggering Port triggering is a kind of port range forwarding where outgoing traffic on specific ports enables previously defined port forwards for the activating device.
  • Page 18: Keepalive

    2.3.7.2. Keepalive Keepalive lets you configure monitoring options that automatically reboot the router if a service malfunction causes it to fail to respond. 2.3.7.3. Commands Entering Linux commands is one of the most powerful ways to access the router’s functionality. This enables you to access services and configure options that are not accessible via the Settings.
  • Page 19: Lan

    2.3.8.3. Here you can find LAN-related information like active clients and DHCP clients. 2.3.8.4. Wireless The wireless LAN status screen displays the current wireless LAN interface configuration, wireless LAN clients (in AP modes), and access points (in client modes). If there’s more than one wireless LAN interface, you can switch between them via the interface pull-down menu.
  • Page 20: Use Cases

    Use Cases The following use cases relate to the most commonly used router configurations. The related router configuration is explained step by step. 3.1. Access Point Access Point (AP, sometimes also called “Infrastructure Mode”) is the mode where the router is also the central wireless hub that connects to the LAN and provides access to wireless devices.
  • Page 21: Access Point Attached To A Network / Internet Gateway

    • Configure Wireless Mode to AP. • Set your desired wireless mode in Wireless Network Mode. Note that mixed modes will lead to reduced performance because of maintaining compatibility. • Enter a name for your wireless network into Wireless Network Name (SSID).
  • Page 22: Wireless Client

    3.2. Wireless Client The router can be also used as a wireless LAN client. This can be useful if you want to connect devices to your wireless LAN that do not have a wireless LAN interface. In this configuration, the wireless LAN interface acts as a wireless client.
  • Page 23: Wireless Client Bridge

    Wireless -> Wireless Security • Configure the security mode to match the security settings of the access point you want to connect to. • Click Apply Settings. After the router reboots, confirm that it has connected to the access point. If there is a DHCP server available on the access point side, and the router is configured to request an IP address, then it should receive an IP address for its WAN-side interface.
  • Page 24: Ftp Server

    Wireless -> Basic Settings • Configure Wireless Mode to Client Bridge. • Set Wireless Network Mode to match the access point you want to connect to. • Enter the network name (SSID) of the AP you want to connect to. •...
  • Page 25 ・Make the settings in the ProFTPD section, and click Apply Settings. Setting example: ProFTPD Enable Server Port Files Directory /mnt Allow Write Enable User Password List buffalo 12345678 Anonymous Login Disable (Read-only) Separate the username (example: buffalo) and password (example: 12345678) with a space. - 24 -...
  • Page 26: Logging Into The Ftp Server

    3.4.2. Logging into the FTP server ・Open a command prompt window. ・Enter ftp 192.168.11.1 to access the FTP server. ・Enter the username, and press the Enter key. ・Enter the password, and press the Enter key. ・When the login is successful, ftp> appears on the screen. ・To logout, enter the bye command.
  • Page 27: Gpl Statement

    delete Deletes a file on delete the remote computer test1.jpg mdelete Deletes multiple mdelete files on the remote test1.jpg computer test2.jpg test3.jpg rename Renames a file on rename the remote computer test1.jpg new1.jpg help Displays the Help help for FTP commands Exits FTP GPL Statement The firmware that is used in this product includes software that is...
  • Page 28: Gnu General Public License - Terms And Conditions Or Copying

    These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have.
  • Page 29 recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2.
  • Page 30 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the...
  • Page 31 You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 32: Warranty

    10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.

Table of Contents