Sitecom WLR-4100 User Manual

Sitecom WLR-4100 User Manual

Wi-fi routers x4 n300

Advertisement

WLR-4100
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WLR-4100 and is the answer not in the manual?

Questions and answers

Summary of Contents for Sitecom WLR-4100

  • Page 1 WLR-4100 User Manual...
  • Page 2: Table Of Contents

    Addendum C: Declaration of Conformity ..............53 Revision 1.0 © Sitecom Europe BV 2012 Note: All the information contained in this manual was correct at the time of publication. However, as our engineers are always updating and improving the product, your device‟s software may have a slightly different appearance or modified functionality than presented in this manual.
  • Page 3: Introduction

    With Sitecom Cloud Security, Sitecom goes one step further and ensures that you can surf the Internet even more safely, not only on your PC, but on all the devices in your home which you use to access the Internet.
  • Page 4: Key Features

    Protect your home against cybercrime Sitecom Cloud Security while browsing. * Theoretical wireless signal rate based on IEEE standard of 802.11a, b, g, n chipset used. Actual throughput may vary. Network conditions and environmental factors lower...
  • Page 5: Package Contents

    Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped back in its original package. The WLR-4100 WiFi Router X4 N300 A 110V~240V to 12V 1A Switching Power Adapter A Quick Install Guide...
  • Page 6: Cautions

    Cautions This router‟s design and manufacturer has your safety in mind. In order to safely and effectively use this router, please read the following before usage. Usage Cautions The user should not modify this router. The environmental temperature should be within +5 ~ +35 degrees Celsius.
  • Page 7: Product Layout

    Product Layout Port Description Power connector Connect the 12V DC adapter to this port LAN (Yellow) Connect your PCs or network devices to these ports WAN (Blue) Connect your ADSL/Cable modem to this port Backlabel and Network Details Folder The Network Details Folder describes the IP address, login details, network name, security code and OPS button functionality.
  • Page 8 LED Definition As shown from the top to the bottom. Port Description OPS (White) Shows OPS activity. Power (Red) Shows the device is turned on. 2.4GHz (Blue) Shows 2.4GHz WiFi activity. WAN (Blue) Shows the WAN cable is connected. LAN (Blue) Shows the cable is connected.
  • Page 9: Network + System Requirements

    Network + System Requirements To begin using the router, make sure you meet the following as minimum requirements: PC/Notebook. Operating System – Microsoft Windows XP/VISTA/7 or Mac OSX 1 Free Ethernet port. WiFi card/USB dongle (802.11 a/b/g/n) – optional. External xDSL (ADSL) or Cable modem with an Ethernet port (RJ-45). PC with a Web-Browser (Internet Explorer, Safari, Firefox, Opera) Ethernet compatible CAT5e cables.
  • Page 10: Setup Your Router

    Setup your Router You can place the router on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your router in the center of your home (or your office) in a location that is away from any potential source of interference, such as a metal wall or microwave oven.
  • Page 11: Setup Your Computer

    Click on the icon for wireless connectivity. This is usually located in the System Tray, next to the clock. Select the Sitecom network. The correct network name can be found on the sticker on bottom of the router, or in the Network Details Folder.
  • Page 12 Click on the icon for wireless connectivity. This is usually located in the System Tray, next to the clock. Select the Sitecom network. The correct network name can be found on the sticker on bottom of the router, or in the Network Details Folder.
  • Page 13 Click on the icon for wireless connectivity. This is usually located in the System Tray, next to the clock. Select the Sitecom network. The correct network name can be found on the sticker on bottom of the router, or in the Network Details Folder.
  • Page 14: Login To Your Router

    Login to your Router LOGIN procedure • OPEN your browser (e.g. Internet Explorer). • Type http://192.168.0.1 in the address bar and press [Enter] • Type user name and password. The default username is admin, the password can be found on the back label on the bottom of your router. •...
  • Page 15: Configure Your Internet Connection

    Configure your Internet connection From the menu, select “Internet Settings”. Depending on the chosen setting, you may need to enter your user name and password, MAC address or hostname in the following window. After you have entered the correct information, click Apply.
  • Page 16: Configure Your Router

    Configure your Router Status The System status section allows you to monitor the current status of your router, the UP time, hardware information and serial number as well as firmware version information is displayed here. DHCP Server The DHCP Server tab gives you the opportunity to change the IP settings of the router. Click Apply at the bottom of this screen to save any changes.
  • Page 17: Device Status

    • IP address 192.168.0.1: It is the router‟s LAN IP address (Your LAN clients default gateway IP address). • IP Subnet Mask 255.255.255.0: Specify a Subnet Mask for your LAN segment. • 802.1d Spanning Tree: Disabled by default. If the 802.1d Spanning Tree function is enabled, this router will use the spanning tree protocol to prevent network loops.
  • Page 18: Internet Status

    Internet Status This page displays whether the WAN port is connected to a Cable/DSL connection. It also displays the router‟s WAN IP address, Subnet Mask, and ISP Gateway as well as MAC address, the Primary DNS. Press Renew button to renew your WAN IP address. DHCP Client Status This page shows all DHCP clients (LAN PCs) currently connected to your network.
  • Page 19 View the operation log of the router. This page shows the current system log of the router. It displays any event that occurred during or after system start up. At the bottom of the page, the system log can be saved <Save> to a local file for further processing or the system log can be cleared <Clear>...
  • Page 20 Statistics Shows the counters of packets sent and received on WAN, LAN & WLAN.
  • Page 21: Wireless Settings

    Wireless Settings You can set parameters that are used for the wireless stations to connect to this router. The parameters include Mode, ESSID, Channel Number and Associated Client. Wireless Function Enable or Disable Wireless function here. Click Apply and wait for module to be ready & loaded.
  • Page 22 • Channel: The channel used by the wireless LAN. All devices in the same wireless LAN should use the same channel. Advanced Settings This tab allows you to set the advanced wireless options. The options included are Authentication Type, Fragment Threshold, RTS Threshold, Beacon Interval, and Preamble Type.
  • Page 23 • Channel Bandwidth: This is the range of frequencies that will be used. • Preamble Type: The “Long Preamble” can provide better wireless LAN compatibility while the “Short Preamble” can provide better wireless LAN performance. • Broadcast ESSID: If you enabled “Broadcast ESSID”, every wireless station located within the coverage of this access point can discover this access point easily.
  • Page 24 Enable 802.1x Authentication IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates users by IEEE 802.1x, but it does not encrypt the data during communication When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to encrypt data.
  • Page 25 64-bit WEP: input 10-digits Hex values (in the "A-F", "a-f" and "0-9" range) or 5-digit ASCII character as the encryption keys. 128-bit WEP: input 26-digit Hex values (in the "A-F", "a-f" and "0-9" range) or 13-digit ASCII characters as the encryption keys. Click Apply at the bottom of the screen to save the above configuration.
  • Page 26 This wireless router supports MAC Address Control, which prevents unauthorized clients from accessing your wireless network. • Enable wireless access control: Enables the wireless access control function • Adding an address into the list: Enter the "MAC Address" and "Comment" of the wireless station to be added and then click "Add".
  • Page 27 wireless client or in the utility of the wireless client to start the WPS mode, and switch the wireless router to WPS mode. You can simply push the WPS button of the wireless router, or click the „Start to Process‟ button in the web configuration interface. If you want to use the PIN code, you have to know the PIN code of the wireless client and switch it to WPS mode, then fill-in the PIN code of the wireless client through the web configuration interface of the wireless router.
  • Page 28: Firewall Settings

    Firewall Settings The router provides extensive firewall protection by restricting connection parameters, thus limiting the risk of hacker attacks, and defending against a wide array of common Internet attacks. However, for applications that require unrestricted access to the Internet, you can configure a specific client/server as a Demilitarized Zone (DMZ). Note: To enable the Firewall settings select Enable and click Apply If you have a client PC that cannot run an Internet application (e.g.
  • Page 29 Enable DMZ: Enable/disable DMZ Public IP Address: The IP address of the WAN port or any other Public IP addresses given to you by your ISP Client PC IP Address: Fill-in the IP address of a particular host in your LAN that will receive all the packets originally going to the WAN port/Public IP address above.
  • Page 30 Ping of Death: Protection from Ping of Death attacks Discard Ping From WAN: The router‟s WAN port will not respond to any Ping requests Port Scan: Protects the router from Port Scans. Sync Flood: Protects the router from Sync Flood attack. Click Apply at the bottom of the screen to save the above configuration.
  • Page 31: Url Block

    Remove PC: If you want to remove some PC from the "MAC Filtering Table", select the PC you want to remove in the table and then click "Delete Selected". If you want to remove all PCs from the table, just click the "Delete All" button. If you want to clear the selection and re-select again, just click “Reset”.
  • Page 32: Advanced Settings

    Advanced Settings Network Address Translation (NAT) allows multiple users at your local site to access the Internet through a single Public IP Address or multiple Public IP Addresses. NAT provides Firewall protection from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Public IP Addresses for key services such as Websites and FTP.
  • Page 33: Virtual Server

    Enable Port Forwarding: Enable Port Forwarding Local IP: This is the private IP of the server behind the NAT firewall. Type: This is the protocol type to be forwarded. You can choose to forward “TCP” or “UDP” packets only, or select “both” to forward both “TCP” and “UDP” packets. Port Range: The range of ports to be forward to the private IP.
  • Page 34: Special Applications

    Type: Select the port number protocol type (TCP, UDP or both). If you are unsure, then leave it to the default “both” setting. Public Port Enter the service (service/Internet application) port number from the Internet that will be re- directed to the above Private IP address host in your LAN Comment: The description of this setting.
  • Page 35 Popular applications: This section lists the more popular applications that require multiple connections. Select an application from the Popular Applications selection. Once you have selected an application, select a location (1-10) in the Copy to selection box and then click the Copy to button. This will automatically list the Public Ports required for this popular application in the location (1-10) you specified.
  • Page 36 for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth. This can let you have a better experience in using critical real time services like Internet phone, video conference …etc.
  • Page 37: Toolbox Settings

    Your Sitecom device comes with a 6 month free Sitecom cloud security subscription. Activating Sitecom Cloud Security After you have set up your Sitecom device for internet access, open the web browser and enter http://www.sitecomcloudsecurity.com in the address bar.
  • Page 38 You will be asked for a username and password. These can be found on the backlabel on the bottom of your Sitecom router or modem. If the login succeeded you can click on „Settings‟ to change your security options.
  • Page 39 Or click „License‟ to renew your subscription. Disabling Sitecom Cloud Security If you wish to disable to Sitecom cloud security at any time, open the webpage of your Sitecom product and log in with the supplied credentials (these can be found on the back...
  • Page 40: Time Zone

    Go to Toolbox and select “Sitecom Cloud Security”. Click the “Disable” radio button and click „Apply’ for the settings to take effect. Password You can change the password required to log into the router's system web-based management. Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive.
  • Page 41: Remote Management

    Set Time Zone: Select the time zone of the country you are currently in. The router will set its time based on your selection. Time Server Address: You can set an NTP server address. Enable Daylight Savings: The router can also take Daylight savings into account.
  • Page 42: Firmware Upgrade

    Click Apply at the bottom of the screen to save the above configuration. Firmware Upgrade Enable automatic firmware update: When enabled the router will periodically check if a new firmware is available. If a new firmware is detected the router will give a notification.
  • Page 43 Use the "Backup" tool to save the current configuration to a file named "config.bin" on your PC. You can then use the "Restore" tool to restore the saved configuration to the router. Alternatively, you can use the "Restore to Factory Defaults" tool to force the router to perform a power reset and restore the original factory settings.
  • Page 44: Addendum A: Gnu/Gpl Leaflet

    Addendum A: GNU/GPL Leaflet Licensing Information Parts of the firmware of the WLR-4100 WiFi Router X4 N300 are subject to the GNU general public license. This product includes third-party software licensed under the terms of the GNU General Public License.. You can modify or redistribute this free software under the terms of the GNU General Public License.
  • Page 45: Addendum B: Gnu/Gpl

    Addendum B: GNU/GPL Version 3, 29 June 2007 Copyright © 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works.
  • Page 46: Terms And Conditions

    TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”.
  • Page 47 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work.
  • Page 48 works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software...
  • Page 49 User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
  • Page 50 and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
  • Page 51 patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.
  • Page 52: End Of Terms And Conditions

    15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 53: Addendum C: Declaration Of Conformity

    Addendum C: Declaration of Conformity...

Table of Contents