Introduction The WL-350 is a draft 802.11n compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with 802.11g and 802.11b devices. It is not only a Wireless Access Point, which lets you connect to the network without wires.
Features & Benefits Features Benefits High Speed Data Rate Up to Capable of handling heavy data payloads such as MPEG video 300Mbps streaming Concurrent Dualband Connect your client devices via the (2.4GHz and 5GHz) 2.4GHz band, while streaming media on the clean 5GHz band. IEEE 802.11n draft Compliant Fully interoperable with IEEE and backward compatible with...
Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials; in case of return, the device must be shipped in its original package. One WL-350 Wireless Media Router One 12V/1.25A Power Adapter UTP Cable One CD-ROM with User’s Manual...
Product Layout Item Label Description LAN Ports Use an Ethernet cable to connect each port to a (yellow) computer on your Local Area Network (LAN). WAN Port (blue) Use an Ethernet cable to connect this port to your WAN router/modem. DC Connector Use the power cable and connect the adapter to the power socket on the wall, and the DC inlet into the...
Back label The backlabel describes the IP address, login details, SSID, security code and WPS button functionality. Button Description WPS BUTTON Press 0-5 seconds for 2.4 GHz WPS mode Press 5-10 seconds for 5 GHz WPS mode Press 10 seconds to reset the router Press 15 Seconds to reset the router to factory defaults.
LED Definition From left to right. Port Description Power (Blue) Shows the device is turned on. USB (Blue) Shows an USB device is connected. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band. WiFi 2.4 GHz (Blue) Shows WiFi activity on the 2.4 GHz band.
System Requirements The following are the minimum system requirements in order configure the device: PC/Notebook Operating System – Microsoft Windows XP/2000/Vista/Seven 1 Free Ethernet port Wi-Fi card/USB dongle (802.11 b/g/n) – optional External xDSL (ADSL) or Cable modem with an Ethernet port (RJ-45) PC with a web-browser (Internet Explorer, Safari, Firefox, Opera) Ethernet compatible CAT5 cables...
1 Understanding the Hardware Hardware Installation You can place the WL-350 on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven.
IP Address Configuration This device can be configured as a Bridge/Router or Access Point. The default IP address of the device is 192.168.0.1. In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook. 1.
2 Internet Connection Wizard This device offers a quick and simple configuration through the use of a wizard. This chapter describes how to use the wizard to configure the internet settings. Please refer to Chapter 6 in order to configure the more advanced features of the device.
Page 14
Select your country from the Country list. Select your internet provider. Click Next. Depending on the chosen provider, you may need to enter your user name and password, MAC address or hostname in the following window. After you have entered the correct information, click Next. Click APPLY to complete the configuration.
3 Wi-Fi Protected Setup Wizard Wi-Fi Protected Setup is a feature that locks the wireless security settings and prevents the settings from being changed by any new external registrar using its PIN. Devices can still be added to the wireless network using Wi-Fi Protected Setup.
Add a Wireless Device Click on Basic -> Wireless and click on the Add Wireless Device Wizard button. The wireless wizard will inform you that there are two major steps in the process. Select the configuration method for your wireless network Connect your wireless device Click on the Next button to continue.
60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. Access to the wireless network is controlled by a registrar. A registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button on the device.
Page 18
If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the one the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network.
4 Advanced Web Configuration Logging In Open a web browser and type in the IP address (default: http://192.168.0.1), the web-browser will display the login page. Fill in the username and password. The default credentials are shown below: Username: admin Password: admin After logging in you will see the graphical user interface (GUI) of the device.
4.1 Home Device All of your Internet and network connection details are displayed on this page. The firmware version is also displayed here. Wireless Click on the Wireless link in the navigation menu. The wireless section allows you to view the wireless clients that are connected to the device. MAC Address: The Ethernet ID (MAC address) of the wireless client.
Page 21
Mode: The transmission standard being used by the client. Values are 11a, 11b, 11g, or 11n for 802.11a, 802.11b, 802.11g, or 802.11n respectively. Rate: The actual transmission rate of the client in megabits per second. Signal: This is a relative measure of signal quality. The value is expressed as a percentage of theoretical best quality.
Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
Stats Click on the Statistics link in the navigation menu. This page displays the transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. Click on the Refresh button to refresh the statistics.
DHCP Click on the DHCP link in the navigation menu. This page displays the routing details configured for your router. Local: The IP address and, where appropriate, port number of the local application. NAT: The port number of the LAN-side application as viewed by the WAN-side application.
Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
4.2 BASIC Network This device can be configured as a Router or a Bridge. Select Router mode if the WAN port is connected to the Internet. Select Bridge if the device is connected to a local network downstream from another router. Bridge Mode In this mode, the device functions as a bridge between the network on its WAN port and the devices on its LAN port and those connected to it wirelessly.
Page 27
Router Mode In this mode, the device functions as a NAT router and is connected to the Internet. Select the Router Mode radio button. WAN Port Mode: Select the Router Mode radio button. Router IP Address: Specify the IP address of this device. Subnet Mask: Specify the subnet mask for the IP address.
Wireless These options allow you to enable/disable the wireless interface, switch between the 11n, 11b/g and 11b radio band and channel frequency. The “Wireless Settings 1” tab contains the settings for the 2.4GHz interface, and the “Wireless Settings 2” tab contains the settings for the 5GHz interface. Enable Wireless: Place a check in this box to enable the wireless interface.
Page 29
appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode. Wireless Channel: Select a channel from the drop-down list. The channels available are based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients.
Page 30
WEP Key Length: Select a 64-bit or 128-bit WEP key length from the drop- down list. WEP Key 1-4: You may enter four different WEP keys. Default WEP Key: You may use up to four different keys for four different networks.
Page 31
WPA Mode: Select the Auto WPA / WPA2 from the drop-down list. Cipher Type: Select TKIP and AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP.
Page 32
Cipher Type: Select TKIP or AES as the cipher suite. The encryption algorithm used to secure the data communication. TKIP. Use TKIP only. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES. Use AES only. AES (Advanced Encryption Standard) is a very secure block based encryption.
The device offers several types of WAN connections in order to connect to the Internet. Static IP Address Dynamic IP Address PPPoE PPTP Select the type of Internet Connection from the drop-down list. Static IP Address Configuration The WAN interface can be configured as Static IP address. In this type of connection, your ISP provides you with a dedicated IP address (which does not change as DHCP).
Page 34
Subnet Mask: Specify the subnet mask for this IP address, which is assigned by your ISP. Default Gateway: Specify the IP address of the default gateway, which is assigned by your ISP. Primary / Secondary DNS Address: Specify the primary and secondary IP address, which is assigned by your ISP.
Page 35
Dynamic IP Address (DHCP) Configuration The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. This is also known as Dynamic IP. Select the Dynamic IP (DHCP) from the My Internet Connection drop-down list.
Page 36
devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection.
Page 37
PPPoE (Point-to-Point Protocol over Ethernet) The WAN interface can be configured as PPPoE. This type of connection is usually used for a DSL service and requires a username and password to connect. Select the PPPoE from the My Internet Connection drop-down list. Address Mode: PPPoE can be used with a dynamic or static IP address.
Page 38
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection.
Page 39
PPTP (Point-to-Point Tunneling Protocol) The WAN interface can be configured as PPTP. PPTP (Point to Point Tunneling Protocol) uses a virtual private network to connect to your ISP. This method of connection is primarily used in Europe. This method of connection requires you to enter a username and password (provided by your ISP) to gain access to the Internet.
Page 40
Manual: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Maximum Idle Time: Specify the time after which the router will automatically disconnect the current session when no data-traffic has been detected for the set period of time.
Advanced Wireless This page allows you to configure the fragmentation threshold, RTS threshold, beacon period, transmit power, DTIM interval, wireless isolation, WMM and WDS (wireless distribution system). Transmit Power: You may control the output power of the device by selecting a value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network.
Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks. Specify a value between 256 and 65535. The default value is 2346. DTIM Interval: A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
Page 43
WAN Port Speed: You may select a WAN port speed from the drop-down list. It is recommended that you select Auto. Enable Multicast Streams: Place a check in this box to enable multicast streams. The router uses the IGMP protocol to support efficient multicasting - - transmission of identical content, such as multimedia, from a source to a number of recipients.
4.3 Firewall Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or game servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and LAN port.
Special Application An application rule is used to open single or multiple ports on your router when the router senses data sent to the Internet on a trigger port or port range. An application rule applies to all computers on your internal network. Enable: Place a check in this box to enable the special application rule.
Port Forwarding Multiple connections are required by some applications, such as internet games, video conferencing, Internet telephony, and others. These applications have difficulties working through NAT (Network Address Translation). This section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network.
Access Control The Access Control section allows you to control access in and out of devices on your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications such as peer-to-peer utilities or games.
Page 48
Specify a policy name and then click on the Next button to continue. Select a schedule from the drop-down list: Always or Never, or you may define a new schedule. Click on the Next button to continue. Select a machine to which the policy applies. Address Type: Select the IP address or MAC address radio button.
Website Filter This is a type of parental control feature used to restrict certain websites form being accessed through your network. These filters can be used for securing and restricting your network. Website/URL/Domain: Specify the web address that you would like to filter.
Schedules Click on the Schedules link in the navigation menu. Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon- Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
4.4 Advanced Settings Dynamic DNS The Dynamic DNS feature allows you to host a server (Web, FTP, Game Server, etc.) using a domain name that you have purchased with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses.
StreamEngine The StreamEngine feature helps improve the network performance by prioritizing applications. Enable Traffic Shaping: Place a check in the box to enable traffic shaping. When this option is enabled, the router restricts the flow of outbound traffic so as not to exceed the WAN uplink bandwidth. Automatic Uplink Speed.
Connection Type: By default, the router automatically determines whether the underlying connection is an xDSL/Frame-relay network or some other connection type (such as cable modem or Ethernet), and it displays the result as Detected xDSL or Frame Relay Network. If you have an unusual network connection in which you are actually connected via xDSL but for which you configure either Static or DHCP in the WAN settings, setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize...
MAC Address Filter This feature is used to restrict certain MAC address from accessing the Internet. These filters can be used for securing and restricting your network. Configure MAC Filtering: Select one of the options from the drop-down list. Turn MAC Filtering OFF: When "OFF" is selected, MAC addresses are not used to control network access.
Firewall Settings The device provides a tight firewall by virtue of the way NAT works. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks.
Page 56
Port And Address Restricted The NAT does not forward any incoming connection requests with the same port address as an already establish connection. Note: Some of these options can interact with other port restrictions. Endpoint Independent Filtering takes priority over inbound filters or schedules, so it is possible for an incoming session request related to an...
Page 57
or ICMP initiates a session to the Internet, the router's NAT can track such a session, even though it does not recognize the protocol. This feature is useful because it enables certain applications (most importantly a single VPN connection to a remote host) without the need for an ALG. Note: This feature does not apply to the DMZ host (if one is enabled).
Page 58
of your corporate network whether your VPN client supports NAT traversal. RTSP: Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Windows/MSN Messenger: Supports use on LAN computers of Microsoft Windows Messenger (the Internet messaging client that ships with Microsoft Windows) and MSN Messenger.
WISH WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable WISH: Place a check in this box to enable the WISH feature. HTTP: Place a check in this box to add HTTP as a classifier.
Page 60
Enable: Place a check in this box to enable the WISH rule. A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used.
Inbound Filter When you use the Virtual Server, Port Forwarding, or Remote Administration features to open specific ports to traffic from the Internet, you could be increasing the exposure of your LAN to cyber attacks from the Internet. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.
Bandwidth Using this page, it’s possible to perform a variety of network tests between the router and other LAN devices. Choose the Test Type, select a computer (or enter it’s MAC address), and click the Start-button to start bandwidth testing.
Page 63
Disk This page shows information regarding the attached storage devices. File system type, total space on the device, and available space is shown in the table. Click the “Safely remove” button, to safely remove the USB disk. Note: Only FAT12, FAT16, and FAT32 drives are supported. For information regarding partitioning and formatting of a drive, see the manual of your operating system.
Page 64
Share On this page, the sharing mode can be changed. Choose to share all folders with all users, or to restrict the sharing of folders. When Sharing-mode is set to “restrict”, shares can be added and changed.
Users You can add new users and configure user rights for the storage device. Password: Enter a password for the selected user. Share Name: Select a shared folder. The Shared folders can be configured on the “Share” tab. Access: Select “Read Only” to allow the user to read files in the selected share.
4.5 Toolbox Time Configuration Click on the Time link in the navigation menu. This feature allows you to configure, update, and maintain the correct time on the device’s internal system clock as well as configure the time zone. The date and time of the device can be configured manually or by synchronizing with a time server.
you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate. NTP Server Used: Specify the NTP server or select one from the drop-down list. Set the Date and Time: Select a date and time from the drop-down list or do to use computer’s time and date click on the Copy Your Computer’s Time Settings button.
Load From Local Hard Drive This option allows you to restore a backup configuration from a file to the device. Click on the Browse button to select the file and then click on Restore Configuration from a File button. The system then prompts you to reboot the device. Click on the OK button to continue.
Restore To Factory Default Click on the Restore all Settings to Factory Defaults button. This option restores all configuration settings back to the settings that were in effect at the time when the device was shipped from the factory. Once the dialog box appears, click on the OK button to confirm the action. Note: The current settings will be lost.
Page 70
Please wait while the system is rebooting. Note: Do no unplug the device during this process as this may cause permanent damage.
Firmware Click on the Firmware link in the navigation menu. This page allows you to upgrade the firmware of the device in order to improve the functionality and performance. This page also displays the current firmware version and its release date.
Enable Logging to a Syslog Server: Place a check in this box to enable Syslog logging. Syslog Server IP Address: Specify the IP address of the Syslog server. Click on the Apply button once you have modified the settings. Administrator Settings Admin Password You can change the password required to log into the broadband router's system web-based management.
System Name Gateway Name: Name of your router. Remote Management The remote management function allows you to configure the Broadband router from a remote site. Inactivity Time Out: Time after which you will be automatically logged out of the web-interface. HTTPS Server: Enable HTTPS connection for the web-interface.
Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Need help?
Do you have a question about the WL-350 and is the answer not in the manual?
Questions and answers