Abocom WR5205 User Manual

Manual is about: 802.11n Router with USB2.0 Port

Summary of WR5205

  • Page 1

    802.11n router with usb2.0 port user’s manual.

  • Page 2: Interference Statement

    Federal communication commission interference statement this equipment has been tested and found to comply with the limits for a class b digital device, pursuant to part 15 of the fcc rules. These limits are designed to provide reasonable protection against harmful interference in a residential inst...

  • Page 3

    Table of content chapter 1: introduction..............................................................................1 features.........................................................................................................................................1 physical details....................

  • Page 4: Chapter 1:

    1 chapter 1: introduction the 802.11n router with usb2.0 port is a draft 802.11n/b/g compliant wireless broadband router with 4-port fast ethernet switch. 802.11n router with usb2.0 port with latest draft 802.11n technology that delivers up to 150mbps wireless, provides multi-functional capabilities...

  • Page 5: Rear Panel

    2 off power off wps blinking wps is enabled to make a connection off wlan function off on wlan link / active wlan green blinking wlan traffic transmitting on wan link / active off wan function off wan green blinking wan traffic transmitting off lan function off on lan link / active lan 1~4 green bli...

  • Page 6: Side Panel

    3 side panel usb 2.0 port insert the usb 3.5g card that provided by your isp(internet service provider) here..

  • Page 7: Chapter 2: About

    4 chapter 2: about operation modes please go to the wireless> wds to set up the wds function (lazy, bridge or repeater) of the wireless router. Gateway mode the wireless connection will be set up from a point-to-point local lan into a point-to-multipoint wan. This device connects all the stations (p...

  • Page 8: Repeater (Wds+Ap) Mode

    5 wireless distribution system uses wireless media to communicate with other aps, like the ethernet does. To do this, you must set these aps in the same channel and wireless mac address to each other aps that you want to communicate with. Repeater (wds+ap) mode if set to repeater mode, a device conn...

  • Page 9: Chapter 3:

    6 chapter 3: configuration hardware connection 1. Connect one end of the ethernet cable to the lan port of the wireless router, another end to your pc or notebook. 2. There are two ways to connect to internet (only one way can be selected): ¾ connect ethernet cable one end to the wan port of the wir...

  • Page 10

    7 4. After connected successfully, the following screen will show up. Simply enter the username “admin” and password “password” to login..

  • Page 11: If You Cannot Connect...

    8 if you cannot connect... If the wireless router does not respond, check the following: • the wireless router is properly installed, lan connection is ok, and it is powered on. You can test the connection by using the "ping" command: • open the ms-dos window or command prompt window. • enter the co...

  • Page 12: Common Connection Types

    9 common connection types the internet connection type according to the isp (internet service provider) that you selected. Cable modems type details isp data required dynamic ip address your ip address is allocated automatically, when you connect to you isp. Usually, none. However, some isp's may re...

  • Page 13: Setup Wizard

    10 setup wizard step 1- wan connect detection this page is used to detect the wan connection of network. User can select auto detect form the pull-down menu and click start auto detect button, the system will detect whether there is wan connection or not. If user wants to set up the wan detection ma...

  • Page 14

    11 if the static ip be selected, user have to set up the ip address, subnet mask and default gateway according to the isp that provided the related information. Ip address: enter the wan ip address provided by your isp here. Subnet mask: enter the subnet mask here. Default gateway: enter the default...

  • Page 15: Step 3- Lan

    12 step 3- lan this step can set up local area network of the wireless router, such as ip address, subnet mask, dhcp type, dhcp ip addresses range, dhcp subnet mask and dhcp lease time. Ip address shows the ip address of the wireless router (default ip address is 192.168.1.1.) subnet mask the subnet...

  • Page 16: Step 4- Network Mode

    13 lease time the lease time of the distribute ip addresses. Default settings are 86400 seconds. Step 4- network mode this step can set up wireless network mode, network name and channel. Network mode select 11b/g mixed mode, 11b only, 11g only, or 11b/g/n mixed mode from the pull-down menu. (defaul...

  • Page 17

    14 default key: select the default key key1~4. Wep key 1~4: enter the key in the selected key field. Only valid when using wep encryption algorithm. The key must match with the ap’s key. There are several formats to enter the keys. Z hexadecimal (wep 64 bits): 10 hex characters (0~9, a~f). Z hexadec...

  • Page 18: Internet

    15 internet lan interface setup ip address shows the ip address of the wireless router (default ip address is 192.168.1.1) subnet mask the subnet mask of the wireless router (default subnet mask is 255.255.255.0.) mac address shows the mac address of this wireless router. Dhcp type disable: select t...

  • Page 19

    16 connected clients. Server: select to enable this wireless router to distribute ip addresses (dhcp server) to connected clients. And the following field will be activated for you to enter the starting ip address. Start ip address the starting address of this local ip network address pool. The pool...

  • Page 20: Internet Service Setup

    17 internet service setup wan connection type select the wan connection type static (fixed ip), dhcp (auto config), pppoe(adsl), or 3g (dial). Default setting is dhcp (auto config) enabled. Dhcp (auto config) if the dhcp(auto config) be selected, the pc will obtain the ip address automatically. Host...

  • Page 21

    18 here. Primary dns server: enter the dns server ip address(es) that provided by your isp, or you can specify your own preferred dns server ip address(es). Secondary dns server: secondary dns server is optional. You can enter another dns server’s ip address as a backup. Pppoe (adsl) if the pppoe (a...

  • Page 22: Dhcp Clients

    19 mac clone your isp may require a particular mac address in order for you to connect to the internet. This mac address is the pc’s mac address that your isp had originally connected your internet connection to. Type in or click fill my mac to replace the wan mac address with the mac address of tha...

  • Page 23

    20 destination the network address of the destination lan segment. When a packet with destination ip address that matches to this field, it will route to the device set in the route gateway field. Range select host or net from the pull-down menu. Gateway enter the gateway ip address in the field. In...

  • Page 24: Vpn Pass-Through

    21 vpn pass-through vpn passthrough configurations including: l2tp, ipsec, and pptp passthrough. L2tp passthrough l2tp, layer two tunneling protocol (l2tp). Use the l2tp with vpn that user can access the personal network via internet. Select enabled or disabled from the pull-down menu. Ipsec passthr...

  • Page 25: Wireless

    22 wireless basic.

  • Page 26

    23 radio on/off click radio on/off button to turn on/off the radio function. Network mode select 11b/g mixed, 11b only, 11g only, or 11b/g/n mixed mode from the pull-down menu. (default is 11b/g/n mixed mode.) network name (ssid) a ssid is referred to a network name because essentially it is a name ...

  • Page 27: Advanced

    24 advanced advanced wireless bg protection mode select the protection mode form the pull-down list, auto, on and off. Beacon interval beacon interval is the amount of time between beacon transmissions. Before a station enters power save mode, the station needs the beacon interval to.

  • Page 28

    25 know when to wake up to receive the beacon. Range 20-999. (default beacon interval is 100.) data beacon rate (dtim) range from 1 to 255. (default data beacon rate is 1.) fragment threshold fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless n...

  • Page 29

    26 ap which must support the dls function. Direct link setup allows direct sta-to-sta frame transfer within a bss (basic service set). This is designed for consumer use, where sta-to-sta transfer is more commonly used. Select disable or enable this function. (default setting is disable.) wmm paramet...

  • Page 30: Security

    27 security wireless security/encryption settings select choice select ssid to set up the security form the pull-down list. Security mode there are eleven type of authentication modes including disable, open, shared, wep auto, wpa, wpa-psk, wpa2, wpa2-psk, wpa-psk/ wpa2-psk, wpa1/wpa2 and 802.1x. Th...

  • Page 31

    28 default key: select the default key. Wep key 1~4: enter the key in the selected key field. Only valid when using wep encryption algorithm. The key must match with the ap’s key. There are several formats to enter the keys. Z hexadecimal (wep 64 bits): 10 hex characters (0~9, a~f). Z hexadecimal (w...

  • Page 32

    29 wpa algorithms: select the type of algorithm, tkip or aes for wpa, and tkip, aes or tkip aes for wpa2, wpa1/wpa2. Key renewal interval: enter the renewal security time (seconds) in the column. Default is 3600 seconds. Set 0 to disable re-key. Radius server: radius is an authentication, authorizat...

  • Page 33

    30 wpa algorithms: select the type of algorithm, tkip or aes for wp-psk, and tkip, aes or tkip aes for wpa2-psk, wpa1 psk wpa2 psk. Pass phrase: enter the pass phrase 8~63 ascii or 64 hex characters in the column. Key renewal interval: enter the renewal security time (seconds) in the column. Default...

  • Page 34: Wds

    31 wds to use wds function: 1. The aps must support wds function. (to set wds must use the same wireless product (the same model will be better); due to different wireless products might support different wds settings. Thus, it is suggested that to use the same wireless products that support wds fun...

  • Page 35

    32 step 2: enter wireless mac address to each other(according to the wds mode that user selected). Lazy mode if lazy mode be selected, it is unnecessary to set up wireless mac here, just go to set up wireless mac address on the other wireless ap then wds function will be active. Phy mode: select cck...

  • Page 36

    33 encrypt key: enter the corresponding encryption keys in the field. Select the type of open, shared, wep auto authentication,for wep encryption. Z hexadecimal (wep 64 bits): 10 hex characters (0~9, a~f). Z hexadecimal (wep 128 bits): 26 hex characters (0~9, a~f). Z ascii (wep 64 bits): 5 ascii cha...

  • Page 37

    34 z hexadecimal (wep 128 bits): 26 hex characters (0~9, a~f). Z ascii (wep 64 bits): 5 ascii characters (case-sensitive). Z ascii (wep 128 bits): 13 ascii characters (case-sensitive). Select the type wpa, wpa-psk, wpa2, wpa2-psk, wpa-psk/ wpa2-psk, wpa/wpa2 authentication, for tkip or aes encryptio...

  • Page 38: Wps

    35 if users select tkip or aes encryption, please enter the password in the encryption key column that must be filled with characters longer than 8 and less than 64 lengths to set up the security. Ap1~ap4 mac address: enter wireless mac of each other to make the wds connection. Wps.

  • Page 39

    36 wps config wps select enable then click apply to use wps (wi-fi protected setup) function, then push physical wps button on wireless router to make a wps connection. Default setting is disable. Wps summary wps current status after enabling the wps function, if there is connection the status will ...

  • Page 40: Station List

    37 station list here shows the station information that connected with the wireless router..

  • Page 41: Firewall

    38 firewall dmz settings dmz settings dmz settings if the dmz host function is enabled, it means that you set up dmz host at a particular computer to be exposed to the internet so that some applications/software, especially internet / online game can have two-way connections. Select enable or disabl...

  • Page 42: System Firewall Settings

    39 system firewall settings remote management remote management (via wan) select deny or allow form the pull-down list to enable or disable the remote client to control the wireless router via wan. Default setting is deny. Ping form wan filter ping form wan filter select disable or enable from the p...

  • Page 43: Url Filtering Settings

    40 url filtering settings basic settings webs url filtering select disable or enable from the pull-down menu. Default setting is disable. Add a url filter url enter the ip address or url to restrict the improper content access. Current webs url filters url here shows the url information that added i...

  • Page 44: Mac Filtering

    41 mac filtering basic settings mac filtering select enable or disable from the pull-down list. Default setting is disable. Mac filter settings mac address enter the client mac address that user would like to disconnect. Current mac rules in system mac address here shows the mac address that added i...

  • Page 45: Ip Filtering

    42 ip filtering basic settings ip filtering select enable or disable from the pull-down list. Default setting is disable. Ip filter settings dest ip address enter the local server’s ip address. Source ip address enter the source ip address. Current ip filtering rules in system dest ip address source...

  • Page 46: Virtual Server

    43 virtual server virtual server settings virtual server settings select enable or disable from the pull-down menu. Ip address enter the local server’s ip address. Port range for tcp and udp services enter the beginning of the range of port numbers used by the service. If the service uses a single p...

  • Page 47: Csrf

    44 csrf csrf settings csrf settings cross-site request forgery, also known as a one-click attack or session riding and abbreviated as csrf or xsrf, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. Select enable or disable ...

  • Page 48: Administration

    45 administration management.

  • Page 49: Upload Firmware

    46 administrator settings account key in a new login user name in the blank field. Password maximum input is 36 alphanumeric characters (case-sensitive.) ntp settings current time click sync with host button to synchronize the time with the server. Time zone select the time zone area that you locate...

  • Page 50: Settings Management

    47 settings management export settings export click the export button to save the current device settings to located computer. Import settings import settings click the browse… button, find and open the settings file (the browser will display to correct file path), then click the import settings but...

  • Page 51: Statistics

    48 statistics this page shows all system memory, wan/lan, all interfaces statistics. System log here shows the system log file information. Click refresh button to update system log file, or click clear button to review the log file..

  • Page 52: Reboot

    49 reboot click the reboot button to restart the wireless router..

  • Page 53: Chapter 4:

    50 chapter 4: pc configuration overview for each pc, the following may need to be configured: • tcp/ip network settings • internet access configuration • wireless configuration windows clients • this section describes how to configure windows clients for internet access via the wireless router. • th...

  • Page 54

    51 3. Select the tcp/ip protocol for your network card. 4. Click on the properties button. You should then see a screen like the following. 5. Ensure your tcp/ip settings are correct, as described below. Using dhcp • to use dhcp, select the radio button obtain an ip address automatically. This is th...

  • Page 55

    52 • if the dns server fields are empty, select use the following dns server addresses, and enters the dns address or addresses provided by your isp, then click ok. Checking tcp/ip settings - windows xp 1. Select control panel - network connection. 2. Right click the local area connection and choose...

  • Page 56: Internet Access

    53 using dhcp • to use dhcp, select the radio button obtain an ip address automatically. This is the default windows setting. Using this is recommended. By default, the wireless router will act as a dhcp server. • restart your pc to ensure it obtains an ip address from the wireless router. Using a f...

  • Page 57: Accessing Aol

    54 accessing aol to access aol (america on line) through the wireless router, the aol for windows software must be configured to use tcp/ip network access, rather than a dial-up connection. The configuration process is as follows: 1. Start the aol for windows communication software. Ensure that it i...

  • Page 58: Other Unix Systems

    55 • or, restart your system. Other unix systems to access the internet via the wireless router: • ensure the "gateway" field for your network card is set to the ip address of the wireless router. • ensure your dns (name server) settings are correct. Wireless station configuration • this section app...

  • Page 59: Appendix A:

    56 appendix a: troubleshooting overview this chapter covers some common problems that may be encountered while using the wireless router and some possible solutions to them. If you follow the suggested steps and the wireless router still does not function properly, contact your dealer for further ad...

  • Page 60: Wireless Access

    57 • if the wireless router is configured correctly, check your internet connection (dsl/cable modem etc) to see that it is working correctly. Problem 2: some applications do not run properly when using the wireless router. Solution 2: the wireless router processes the data passing through it, so it...

  • Page 61

    58 • rf shielding your environment may tend to block transmission between the wireless stations. This will mean high access speed is only possible when close to the wireless router..

  • Page 62: Appendix B:

    Appendix b: about wireless lans bss bss a group of wireless stations and a single access point, all using the same id (ssid), form a basic service set (bss). Using the same ssid is essential. Devices with different ssids are unable to communicate with each other. Channels the wireless channel sets t...

  • Page 63: Wpa/wpa2

    60 wpa/wpa2 wpa/wpa2 (wi-fi protected access) is more secure than wep. It uses a “shared key” which allows the encryption keys to be regenerated at a specified interval. There are several encryption options: tkip, aes, tkip-aes and additional setup for radius is required in this method. The most imp...

  • Page 64

    61 wpa-psk wpa2-psk securities is enabled on the wireless router. To make a connection, each station must use the same algorithms and pass phrase as the wireless router. Wpa wpa2 wpa wpa2 802.1x radius server: radius is an authentication, authorization and accounting client-server protocol. The clie...