Sitecom WL-350 Full Manual

Sitecom WL-350 Full Manual

Wireless media router
Hide thumbs Also See for WL-350:

Advertisement

Quick Links

Wireless Media Router
WL-350
Full Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WL-350 and is the answer not in the manual?

Questions and answers

Summary of Contents for Sitecom WL-350

  • Page 1 Wireless Media Router WL-350 Full Manual...
  • Page 2: Table Of Contents

    WL-350 Wireless Media Router Full Manual INTRODUCTION.................... 4 & B ..................5 EATURES ENEFITS ..................6 ACKAGE ONTENTS ..................6 AFETY UIDELINES ..................7 RODUCT AYOUT ..................8 ACK LABEL ..................9 YSTEM EQUIREMENTS UNDERSTANDING THE HARDWARE............11 ................. 11 ARDWARE NSTALLATION IP A ................12...
  • Page 3 WL-350 Wireless Media Router Full Manual Time Configuration .................. 66 System Settings ..................67 Firmware....................71 Syslog....................71 Administrator Settings ................72 APPENDIX A FCC INTERFERENCE STATEMENT ..........74...
  • Page 4: Introduction

    Introduction The WL-350 is a draft 802.11n compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with 802.11g and 802.11b devices. It is not only a Wireless Access Point, which lets you connect to the network without wires.
  • Page 5: Features & Benefits

    Features & Benefits Features Benefits High Speed Data Rate Up to Capable of handling heavy data payloads such as MPEG video 300Mbps streaming Concurrent Dualband Connect your client devices via the (2.4GHz and 5GHz) 2.4GHz band, while streaming media on the clean 5GHz band. IEEE 802.11n draft Compliant Fully interoperable with IEEE and backward compatible with...
  • Page 6: Package Contents

    Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials; in case of return, the device must be shipped in its original package. One WL-350 Wireless Media Router One 12V/1.25A Power Adapter UTP Cable One CD-ROM with User’s Manual...
  • Page 7: Product Layout

    Product Layout Item Label Description LAN Ports Use an Ethernet cable to connect each port to a (yellow) computer on your Local Area Network (LAN). WAN Port (blue) Use an Ethernet cable to connect this port to your WAN router/modem. DC Connector Use the power cable and connect the adapter to the power socket on the wall, and the DC inlet into the...
  • Page 8: Back Label

    Back label The backlabel describes the IP address, login details, SSID, security code and WPS button functionality. Button Description WPS BUTTON Press 0-5 seconds for 2.4 GHz WPS mode Press 5-10 seconds for 5 GHz WPS mode Press 10 seconds to reset the router Press 15 Seconds to reset the router to factory defaults.
  • Page 9: Led Definition

    LED Definition From left to right. Port Description Power (Blue) Shows the device is turned on. USB (Blue) Shows an USB device is connected. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band.
  • Page 10: System Requirements

    System Requirements The following are the minimum system requirements in order configure the device: PC/Notebook Operating System – Microsoft Windows XP/2000/Vista/Seven 1 Free Ethernet port Wi-Fi card/USB dongle (802.11 b/g/n) – optional External xDSL (ADSL) or Cable modem with an Ethernet port (RJ-45) PC with a web-browser (Internet Explorer, Safari, Firefox, Opera) Ethernet compatible CAT5 cables...
  • Page 11: Understanding The Hardware

    1 Understanding the Hardware Hardware Installation You can place the WL-350 on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven.
  • Page 12: Ip Address Configuration

    IP Address Configuration This device can be configured as a Bridge/Router or Access Point. The default IP address of the device is 192.168.0.1. In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook. 1.
  • Page 13: Internet Connection Wizard

    2 Internet Connection Wizard This device offers a quick and simple configuration through the use of a wizard. This chapter describes how to use the wizard to configure the internet settings. Please refer to Chapter 6 in order to configure the more advanced features of the device.
  • Page 14 Select your country from the Country list. Select your internet provider. Click Next. Depending on the chosen provider, you may need to enter your user name and password, MAC address or hostname in the following window. After you have entered the correct information, click Next. Click APPLY to complete the configuration.
  • Page 15: Wi-Fi Protected Setup Wizard

    3 Wi-Fi Protected Setup Wizard Wi-Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
  • Page 16: Add A Wireless Device

    Add a Wireless Device Click on Basic -> Wireless and click on the Add Wireless Device Wizard button. The wireless wizard will inform you that there are two major steps in the process. Select the configuration method for your wireless network Connect your wireless device Click on the Next button to continue.
  • Page 17: Using The Pin

    60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. Access to the wireless network is controlled by a registrar. A registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button on the device.
  • Page 18 If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the one the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network.
  • Page 19: Advanced Web Configuration

    4 Advanced Web Configuration Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page. Fill in the username and password. The default credentials are shown below: Username: admin Password: admin After logging in you will see the graphical user interface (GUI) of the device.
  • Page 20: Home

    4.1 Home Device All of your Internet and network connection details are displayed on this page. The firmware version is also displayed here. Wireless Click on the Wireless link in the navigation menu. The wireless section allows you to view the wireless clients that are connected to the device. MAC Address: The Ethernet ID (MAC address) of the wireless client.
  • Page 21 Mode: The transmission standard being used by the client. Values are 11a, 11b, 11g, or 11n for 802.11a, 802.11b, 802.11g, or 802.11n respectively. Rate: The actual transmission rate of the client in megabits per second. Signal: This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality.
  • Page 22: Logs

    Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
  • Page 23: Stats

    Stats Click on the Statistics link in the navigation menu. This page displays the transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. Click on the Refresh button to refresh the statistics.
  • Page 24: Dhcp

    DHCP Click on the DHCP link in the navigation menu. This page displays the routing details configured for your router. Local: The IP address and, where appropriate, port number of the local application. NAT: The port number of the LAN-side application as viewed by the WAN-side application.
  • Page 25: Firewall

    Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
  • Page 26: Basic

    4.2 BASIC Network This device can be configured as a Router or a Bridge. Select Router mode if the WAN port is connected to the Internet. Select Bridge if the device is connected to a local network downstream from another router. Bridge Mode In this mode, the device functions as a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly.
  • Page 27 Router Mode In this mode, the device functions as a NAT router and is connected to the Internet. Select the Router Mode radio button. WAN Port Mode: Select the Router Mode radio button. Router IP Address: Specify the IP address of this device. Subnet Mask: Specify the subnet mask for the IP address.
  • Page 28: Wireless

    Wireless These options allow you to enable/disable the wireless interface, switch between the 11n, 11b/g and 11b radio band and channel frequency. The “Wireless Settings 1” tab contains the settings for the 2.4GHz interface, and the “Wireless Settings 2” tab contains the settings for the 5GHz interface. Enable Wireless: Place a check in this box to enable the wireless interface.
  • Page 29 appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode. Wireless Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients.
  • Page 30 WEP Key Length: Select a 64-bit or 128-bit WEP key length from the drop- down list. WEP Key 1-4: You may enter four different WEP keys. Default WEP Key: You may use up to four different keys for four different networks.
  • Page 31 WPA Mode: Select the Auto WPA / WPA2 from the drop-down list. Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP.
  • Page 32 Cipher Type: Select TKIP or AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption.
  • Page 33: Wan

    The device offers several types of WAN connections in order to connect to the Internet. Static IP Address Dynamic IP Address PPPoE PPTP Select the type of Internet Connection from the drop-down list. Static IP Address Configuration The WAN interface can be configured as Static IP address. In this type of connection, your ISP provides you with a dedicated IP address (which does not change as DHCP).
  • Page 34 Subnet Mask: Specify the subnet mask for this IP address, which is assigned by your ISP. Default Gateway: Specify the IP address of the default gateway, which is assigned by your ISP. Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP.
  • Page 35 Dynamic IP Address (DHCP) Configuration The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. This is also known as Dynamic IP. Select the Dynamic IP (DHCP) from the My Internet Connection drop-down list.
  • Page 36 devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection.
  • Page 37 PPPoE (Point-to-Point Protocol over Ethernet) The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect. Select the PPPoE from the My Internet Connection drop-down list. Address Mode: PPPoE can be used with a dynamic or static IP address.
  • Page 38 MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection.
  • Page 39 PPTP (Point-to-Point Tunneling Protocol) The WAN interface can be configured as PPTP. PPTP (Point to Point Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection is primarily used in Europe. This method of connection requires you to enter a username and password (provided by your ISP) to gain access to the Internet.
  • Page 40 Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Specify the time after which the router will automatically disconnect the current session when no data-traffic has been detected for the set period of time.
  • Page 41: Advanced Wireless

    Advanced Wireless This page allows you to configure the fragmentation threshold, RTS threshold, beacon period, transmit power, DTIM interval, wireless isolation, WMM and WDS (wireless distribution system). Transmit Power: You may control the output power of the device by selecting a value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network.
  • Page 42: Advanced Network

    Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 65535. The default value is 2346. DTIM Interval: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
  • Page 43 WAN Port Speed: You may select a WAN port speed from the drop-down list. It is recommended that you select Auto. Enable Multicast Streams: Place a check in this box to enable multicast streams. The router uses the IGMP protocol to support efficient multicasting - - transmission of identical content, such as multimedia, from a source to a number of recipients.
  • Page 44: Firewall

    4.3 Firewall Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and LAN port.
  • Page 45: Special Application

    Special Application An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a trigger port or port range. An application rule applies to all computers on your internal network. Enable: Place a check in this box to enable the special application rule.
  • Page 46: Port Forwarding

    Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
  • Page 47: Access Control

    Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games.
  • Page 48 Specify a policy name and then click on the Next button to continue. Select a schedule from the drop-down list: Always or Never, or you may define a new schedule. Click on the Next button to continue. Select a machine to which the policy applies. Address Type: Select the IP address or MAC address radio button.
  • Page 49: Website Filter

    Website Filter This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. Website/URL/Domain: Specify the web address that you would like to filter.
  • Page 50: Schedules

    Schedules Click on the Schedules link in the navigation menu. Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon- Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
  • Page 51: Advanced Settings

    4.4 Advanced Settings Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses.
  • Page 52: Streamengine

    StreamEngine The StreamEngine feature helps improve the network performance by prioritizing applications. Enable Traffic Shaping: Place a check in the box to enable traffic shaping. When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed.
  • Page 53: Routing

    Connection Type: By default, the router automatically determines whether the underlying connection is an xDSL/Frame-relay network or some other connection type (such as cable modem or Ethernet), and it displays the result as Detected xDSL or Frame Relay Network. If you have an unusual network connection in which you are actually connected via xDSL but for which you configure either Static or DHCP in the WAN settings, setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize...
  • Page 54: Mac Address Filter

    MAC Address Filter This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. Configure MAC Filtering: Select one of the options from the drop-down list. Turn MAC Filtering OFF: When "OFF" is selected, MAC addresses are not used to control network access.
  • Page 55: Firewall Settings

    Firewall Settings The device provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks.
  • Page 56 Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection. Note: Some of these options can interact with other port restrictions. Endpoint Independent Filtering takes priority over inbound filters or schedules, so it is possible for an incoming session request related to an...
  • Page 57 or ICMP initiates a session to the Internet, the router's NAT can track such a session, even though it does not recognize the protocol. This feature is useful because it enables certain applications (most importantly a single VPN connection to a remote host) without the need for an ALG. Note: This feature does not apply to the DMZ host (if one is enabled).
  • Page 58 of your corporate network whether your VPN client supports NAT traversal. RTSP: Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger: Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger.
  • Page 59: Wish

    WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable WISH: Place a check in this box to enable the WISH feature. HTTP: Place a check in this box to add HTTP as a classifier.
  • Page 60 Enable: Place a check in this box to enable the WISH rule. A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used.
  • Page 61: Inbound Filter

    Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
  • Page 62: Bandwidth

    Bandwidth Using this page, it’s possible to perform a variety of network tests between the router and other LAN devices. Choose the Test Type, select a computer (or enter it’s MAC address), and click the Start-button to start bandwidth testing.
  • Page 63 Disk This page shows information regarding the attached storage devices. File system type, total space on the device, and available space is shown in the table. Click the “Safely remove” button, to safely remove the USB disk. Note: Only FAT12, FAT16, and FAT32 drives are supported. For information regarding partitioning and formatting of a drive, see the manual of your operating system.
  • Page 64 Share On this page, the sharing mode can be changed. Choose to share all folders with all users, or to restrict the sharing of folders. When Sharing-mode is set to “restrict”, shares can be added and changed.
  • Page 65: Users

    Users You can add new users and configure user rights for the storage device. Password: Enter a password for the selected user. Share Name: Select a shared folder. The Shared folders can be configured on the “Share” tab. Access: Select “Read Only” to allow the user to read files in the selected share.
  • Page 66: Toolbox

    4.5 Toolbox Time Configuration Click on the Time link in the navigation menu. This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server.
  • Page 67: System Settings

    you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate. NTP Server Used: Specify the NTP server or select one from the drop-down list. Set the Date and Time: Select a date and time from the drop-down list or do to use computer’s time and date click on the Copy Your Computer’s Time Settings button.
  • Page 68: Load From Local Hard Drive

    Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the device. Click on the Browse button to select the file and then click on Restore Configuration from a File button. The system then prompts you to reboot the device. Click on the OK button to continue.
  • Page 69: Restore To Factory Default

    Restore To Factory Default Click on the Restore all Settings to Factory Defaults button. This option restores all configuration settings back to the settings that were in effect at the time when the device was shipped from the factory. Once the dialog box appears, click on the OK button to confirm the action. Note: The current settings will be lost.
  • Page 70 Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
  • Page 71: Firmware

    Firmware Click on the Firmware link in the navigation menu. This page allows you to upgrade the firmware of the device in order to improve the functionality and performance. This page also displays the current firmware version and its release date.
  • Page 72: Administrator Settings

    Enable Logging to a Syslog Server: Place a check in this box to enable Syslog logging. Syslog Server IP Address: Specify the IP address of the Syslog server. Click on the Apply button once you have modified the settings. Administrator Settings Admin Password You can change the password required to log into the broadband router's system web-based management.
  • Page 73: System Name

    System Name Gateway Name: Name of your router. Remote Management The remote management function allows you to configure the Broadband router from a remote site. Inactivity Time Out: Time after which you will be automatically logged out of the web-interface. HTTPS Server: Enable HTTPS connection for the web-interface.
  • Page 74: Appendix A Fcc Interference Statement

    Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.

This manual is also suitable for:

Wl-309

Table of Contents