Sitecom WL-351 User Manual

Sitecom WL-351 User Manual

Wireless gigabit router 300n
Hide thumbs Also See for WL-351:

Advertisement

Wireless Gigabit Router 300N X3
Wireless Gigabit Router 300N X2
WL-351
WL-368
(802.11bgn)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WL-351 and is the answer not in the manual?

Questions and answers

Summary of Contents for Sitecom WL-351

  • Page 1 WL-351 Wireless Gigabit Router 300N X3 WL-368 Wireless Gigabit Router 300N X2 (802.11bgn)
  • Page 2: Table Of Contents

    4NETWORK + SYSTEM REQUIREMENTS ..................8 5WL-351/368 PLACEMENT ......................... 8 6SETUP LAN, WAN ..........................9 7PC NETWORK ADAPTER SETUP ....................10 8BRING UP THE WL-351/368 ......................14 9 INITIAL SETUP WL-351/368 ......................14 10 CONFIGURATION WIZARD ......................23 11 WIRELESS SETTINGS ........................25 12 FIREWALL SETTINGS ........................
  • Page 3 Introduction Congratulations on your purchase of the WL-351/368 Wireless Gigabit Router 300N. The WL-351/368 is compliant with 802.11n and up to 6 times faster than standard 802.11g based routers while still being compatible with 802.11g & 802.11b gadgets. The WL-351/368 is not only a Wireless Access Point, but also doubles as a 4-port full-duplex Gigabit switch that connects your wired-Ethernet devices together at 10/100/1000 Mbps speeds.
  • Page 4: 1Key Features

    1 Key Features Features Advantages Incredible Data Rate up to Heavy data payloads such as 300Mbps* MPEG video streaming IEEE 802.11n Compliant and Fully Interoperable with IEEE backward compatible with 802.11b/ 802.11b / IEEE802.11g compliant devices with legacy protection Four 10/100/1000 Mbps gigabit Scalability, extend your network.
  • Page 5: 2Package Contents

    Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped back in its original package. 1. The WL-351/368 Router 2. A 220V~240V Power Adapter 3. A Quick Install Guide 4.
  • Page 6: 3Product Layout

    3 Product Layout Port Description Power connector Connect the 12V DC adapter to this port LAN (Yellow) Connect your PC’s or network devices to this port WAN (Blue) Connect your ADSL/Cable modem to this port...
  • Page 7 Backlabel The backlabel describes the IP address, login details, SSID, security code and WPS button functionality. Button Description Press 2 seconds for WPS mode WPS BUTTON Press 10 seconds to reset the router Press 15 Seconds to reset the router to factory defaults.
  • Page 8: 4Network + System Requirements

    Ethernet compatible CAT5 cables. 5 WL-351/368 Placement You can place the WL-351/368 on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven.
  • Page 9: 6Setup Lan, Wan

    6 Setup LAN, WAN WAN connection: LAN connection:...
  • Page 10: 7Pc Network Adapter Setup

    7 PC Network Adapter setup Windows XP Enter [Start Menu]  select [Control panel]  select [Network]. Select [Local Area Connection]) icon=>select [properties]...
  • Page 11 Select [Internet Protocol (TCP/IP)] =>Click [Properties]. Select the [General] tab. a. The WL-351/368 supports [DHCP] function, please select both [Obtain address automatically] [Obtain server address automatically].
  • Page 12 Windows Vista Enter [Start Menu]  select [Control panel]  select [View network status and tasks] -> select [Manage network connections]. Select [Local Area Connection]) icon=>select [properties]...
  • Page 13 Select [Internet Protocol Version 4 (TCP/IPv4)] =>Click [Properties]. Select the [General] tab. The WL-351/368 supports [DHCP] function, please select both [Obtain an IP address automatically] and [Obtain DNS server address automatically].
  • Page 14: 8Bring Up The Wl-351/368

    8 Bring up the WL-351/368 Connect the supplied power-adapter to the power inlet port and connect it to a wall outlet. The WL-351/368 automatically enters the self-test phase. During self-test phase, the Power LED will be lit continuously to indicate that this product is in normal operation.
  • Page 15 3. Type user name and password (default is admin/admin). Click OK. 5. You will see the home page of the WL-351/368. The System status section allows you to monitor the current status of your router the UP time, hardware information, serial number as well as firmware version...
  • Page 16: Lan Settings

    LAN settings The LAN tab gives you the opportunity to change the IP settings of the WL- 351/368. Click <Apply> at the bottom of this screen to save any changes. IP address 192.168.0.1. It is the router’s LAN IP address (Your LAN clients default gateway IP address).
  • Page 17 Lease Time Forever. In the Lease Time setting you can specify the time period that the DHCP lends an IP address to your LAN clients. The DHCP will change your LAN client’s IP address when this time threshold period is reached. IP Address Pool You can select a particular IP address range for your DHCP server to issue IP addresses to your LAN Clients.
  • Page 18: Device Status

    Device Status View the Broadband router’s current configuration settings. Device Status displays the configuration settings you’ve configured in the Wizard / Basic Settings / Wireless Settings section.
  • Page 19: Internet Status

    Internet Status This page displays whether the WAN port is connected to a Cable/DSL connection. It also displays the router’s WAN IP address, Subnet Mask, and ISP Gateway as well as MAC address, the Primary DNS. Press Renew button to renew your WAN IP address.
  • Page 20: Dhcp Client Status

    DHCP Client Status DHCP This page shows all DHCP clients (LAN PCs) currently connected to your network. The table shows the assigned IP address, MAC address and expiration time for each DHCP leased client. Use the Refresh button to update the available information.
  • Page 21 WL-351/368 Log View the operation log of the WL-351/368. This page shows the current system log of the Broadband router. It displays any event occurred after system start up. At the bottom of the page, the system log can be saved <Save> to a local file for further processing or the system log can be cleared <Clear>...
  • Page 22 WL-351/368 Statistics Shows the counters of packets sent and received on WAN, LAN & WLAN.
  • Page 23: Configuration Wizard

    Configuration Wizard Click Wizard to configure the router. The Setup wizard will now be displayed; check that the modem is connected and click Next. Select your country from the Country list. Select your internet provider. Click Next. Depending on the chosen provider, you may need to enter your user name and password, MAC address or hostname in the following window.
  • Page 24 Click APPLY to complete the configuration.
  • Page 25: Wireless Settings

    Wireless Settings You can set parameters that are used for the wireless stations to connect to this router. The parameters include Mode, ESSID, Channel Number and Associated Client. Wireless Function Enable or Disable Wireless function here. Click Apply and wait for module to be ready &...
  • Page 26: Basic Settings

    Basic Settings Mode Allows you to set AP or WDS mode. Band Allows you to set the AP fixed at 802.11b or 802.11g mode. You can also select B+G mode to allow 80211b and 802.11g clients at the same time. Enable SSID # Allows you to enable up to four SSIDs for this router.
  • Page 27 Advanced Settings This tab allows you to set the advanced wireless options. The options included are Authentication Type, Fragment Threshold, RTS Threshold, Beacon Interval, and Preamble Type. You should not change these parameters unless you know what effect the changes will have on the router. Authentication Type There are two authentication types: "Open System"...
  • Page 28 Beacon Interval is the interval of time that this wireless router broadcasts a beacon. A Beacon is used to synchronize the wireless network. Data Rate The “Data Rate” is the rate that this access point uses to transmit data packets. The access point will use the highest possible selected transmission rate to transmit the data packets.
  • Page 29 Security This Access Point provides complete wireless LAN security functions, included are WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function, and are setup with the same security key.
  • Page 30 Disable When you choose to disable encryption, it is very insecure to operate the WL- 351/368. Enable 802.1x Auth IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server.
  • Page 31 When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by yourself and enter it. You can enter four WEP keys and select one of them as a default key. Then the router can receive any packets encrypted by one of the four keys.
  • Page 32 WPA Pre-shared Key Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless stations and encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. So the encryption key is not easy to be cracked by hackers. This is the best security available.
  • Page 33 This wireless router supports Address Control, which prevents unauthorized clients from accessing your wireless network. Enable wireless access control Enables the wireless access control function Adding an address into the list Enter the "MAC Address" and "Comment" of the wireless station to be added and then click "Add". The wireless station will now be added into the "Current Access Control List"...
  • Page 34 Wi-Fi Protected Setup (WPS) is the simplest way to establish a connection between the wireless clients and the wireless router. You don’t have to select the encryption mode and fill in a long encryption passphrase every time when you try to setup a wireless connection. You only need to press a button on both wireless client and wireless router, and WPS will do the rest for you.
  • Page 35 WPS Current Status If the wireless security (encryption) function of this wireless router is properly set, you’ll see a ‘Configured’ message here. Otherwise, you’ll see ‘UnConfigured’. Self Pin Code This is the WPS PIN code of the wireless router. You may need this information when connecting to other WPS-enabled wireless devices.
  • Page 36: Firewall Settings

    Firewall Settings The Broadband router provides extensive firewall protection by restricting connection parameters, thus limiting the risk of hacker attacks, and defending against a wide array of common Internet attacks. However, for applications that require unrestricted access to the Internet, you can configure a specific client/server as a Demilitarized Zone (DMZ).
  • Page 37 If you have a client PC that cannot run an Internet application (e.g. Games) properly from behind the NAT firewall, then you can open up the firewall restrictions to unrestricted two-way Internet access by defining a DMZ Host. The DMZ function allows you to re-direct all packets going to your WAN port IP address to a particular IP address in your LAN.
  • Page 38 Denial of Service (DoS) The Broadband router's firewall can block common hacker attacks, including Denial of Service, Ping of Death, Port Scan and Sync Flood. If Internet attacks occur the router can log the events. Ping of Death Protections from Ping of Death attack Discard Ping From WAN The router’s WAN port will not respond to any Ping requests Port Scan Protects the router from Port Scans.
  • Page 39 Access You can restrict users from accessing certain Internet applications/services (e.g. Internet websites, email, FTP etc.), Access Control allows users to define the traffic type permitted in your LAN. You can control which PC client can have access to these services. Deny If you select “Deny”...
  • Page 40 Filter client PC by MAC Check “Enable MAC Filtering” to enable MAC Filtering. Add PC Fill in “Client PC MAC Address” and “Comment” of the PC that is allowed to access the Internet, and then click “Add”. If you find any typo before adding it and want to retype again, just click "Reset"...
  • Page 41: Url Block

    URL block You can block access to some Web sites from particular PCs by entering a full URL address or just keywords of the Web site. Enable URL Blocking Enable/disable URL Blocking Add URL Keyword Fill in “URL/Keyword” and then click “Add”. You can enter the full URL address or the keyword of the web site you want to block.
  • Page 42: Advanced Settings

    Advanced Settings Network Address Translation (NAT) allows multiple users at your local site to access the Internet through a single Public IP Address or multiple Public IP Addresses. NAT provides Firewall protection from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Public IP Addresses for key services such as Websites and FTP.
  • Page 43: Port Forwarding

    Port Forwarding Port Forwarding allows you to re-direct a particular range of service port numbers (from the Internet/WAN Port) to a particular LAN IP address. It helps you to host servers behind the router NAT firewall. Enable Port Forwarding Enable Port Forwarding Private IP This is the private IP of the server behind the NAT firewall.
  • Page 44 Remove Port Forwarding If you want to remove a Port Forwarding setting from the "Current Port Forwarding Table", select the Port Forwarding setting that you want to remove in the table and then click "Delete Selected". If you want to remove all Port Forwarding settings from the table, just click "Delete All"...
  • Page 45: Virtual Server

    Virtual Server Use the Virtual Server function when you want different servers/clients in your LAN to handle different service/Internet application type (e.g. Email, FTP, Web server etc.) from the Internet. Computers use numbers called port numbers to recognize a particular service/Internet application type. The Virtual Server allows you to re-direct a particular service port number (from the Internet/WAN Port) to a particular LAN private IP address and its service port number.
  • Page 46 Add Virtual Server Fill in the "Private IP", "Private Port", "Type", “Public Port” and "Comment" of the setting to be added and then click "Add". Then this Virtual Server setting will be added into the "Current Virtual Server Table" below. Remove Virtual Server If you want to remove Virtual Server settings from the "Current Virtual Server Table", select the Virtual Server settings you want to remove in the table and then click "Delete Selected".
  • Page 47: Special Applications

    Special Applications Some applications require multiple connections, such as Internet games, video Conferencing, Internet telephony and others. In this section you can configure the router to support multiple connections for these types of applications. Enable Trigger Port Enable the Special Application function. Trigger Port This is the out going (Outbound) range of port numbers for this particular application.
  • Page 48 Applications selection. Once you have selected an application, select a location (1-10) in the Copy to selection box and then click the Copy to button. This will automatically list the Public Ports required for this popular application in the location (1-10) you specified. Add Special Application Fill in the "Trigger Port", "Trigger Type”, “Public Port”, "Public Type", "Public Port"...
  • Page 49 You can select applications that need “Application Layer Gateway” support. Enable select enable “Application Layer Gateway”, then the router will let the selected application correctly pass through the NAT gateway.
  • Page 50 UPNP With UPnP, all PCs in you Intranet will discover this router automatically, so you don’t have to configure your PC and it can easily access the Internet through this router. UPnP Feature You can enable or Disable the UPnP feature here. After you enable the UPnP feature, all client systems that support UPnP, like Windows XP, can discover this router automatically and access the Internet through this router without having to configure anything.
  • Page 51 QoS can let you classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth.
  • Page 52 Edit a QoS rule Select the rule you want to edit and click “Edit”, then enter the detail form of the QoS rule. Click “Apply” after editing the form and the rule will be saved. Adjust QoS rule priority You can select the rule and click “Move Up” to make its priority higher.
  • Page 53: Toolbox Settings

    TOOLBOX Settings Password change options You can change the password required to log into the broadband router's system web-based management. By default, the password is: admin. Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive. Current Password Fill in the current password to allow changing to a new password.
  • Page 54: Time Zone

    Time Zone The Time Zone allows your router to base its time on the settings configured here, which will affect functions such as Log entries and Firewall settings. Set Time Zone Select the time zone of the country you are currently in. The router will set its time based on your selection.
  • Page 55: Remote Management

    Remote Management The remote management function allows you to designate a host in the Internet the ability to configure the Broadband router from a remote site. Enter the designated host IP Address in the Host IP Address field. Host Address This is the IP address of the host in the Internet that will have management/configuration access to the Broadband router from a remote site.
  • Page 56: Firmware Upgrade

    Firmware Upgrade This page allows you to upgrade the router’s firmware. Firmware Upgrade This tool allows you to upgrade the Broadband router’s system firmware. To upgrade the firmware of your Broadband router, you need to download the firmware file to your local hard disk, and enter that file name and path in the appropriate field on this page.
  • Page 57: Backup Settings

    Backup Settings The Backup screen allows you to save (Backup) the router’s current configuration settings. When you save the configuration setting (Backup) you can re-load the saved configuration into the router through the Restore selection. If extreme problems occur you can use the Restore to Factory Defaults selection, this will set all configurations to its original default settings (e.g.
  • Page 58 Reset You can reset the router’s system should any problem exist. The reset function essentially re-boots your router’s system.
  • Page 59 DDNS DDNS allows you to map the static domain name to a dynamic IP address. You must get an account, password and your static domain name from the DDNS service providers. This router supports DynDNS, TZO and other common DDNS service providers. Enable/Disable Enable or disable the DDNS function of this router Provider Select a DDNS service provider Domain name Fill in your static domain name that uses DDNS...
  • Page 60: Availability Of Source Code

    Parts of the firmware of the WL-351/368 Wireless Broadband router are subject to the general public license. Appendix A: Licensing Information This product includes third-party software licensed under the terms of the GNU General Public License.. You can modify or redistribute this free software under the terms of the GNU General Public License.
  • Page 61 you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
  • Page 62 licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
  • Page 63 software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This manual is also suitable for:

Wl-368

Table of Contents