Manuel d'utilisation / d'entretien du produit ESR9855G du fabricant EnGenius Technologies
Aller à la page of 126
User ’ s Manual ESR9855 G Wireless 300N Gigabit Gaming Router Gigabit & S treamEngine Support.
2 2.
3 3 T able of Co ntent s 1. INTRODUCT ION ....................... ................. ..................... ...................... ............... ..................... ...................... ............... ..................... ............... ... 7 1.
4 4 5.1.2.1. Wireless Sec urity Leve l: BEST ( WPA2) ............................................................................................................................................................. 36 5.1.2.2. Wireless Sec urity Leve l: BETTER ( W PA) .
5 5 6.4.2.3. Restore T o Factory D efault ................................................................................................................................................................................ 91 6.4.2.4. Reboot the d evice .
6 6 W ............................................................................................................................................................................................................ ............................ 123 X .....
7 7 1. Introduc tion The EnGeniu s ESR9855 G Multimedia Enhanced Wireles s 300N Gaming Rout er is a 802.1 1n compli ant device that deliver s up to 6x faster sp eeds tha n 802.1 1g w hile st aying b ackward comp atib le with 80 2.1 1g and 802.1 1b dev ices.
8 8 Supports DNS/ DDNS Lets us ers assign a fixed h ost and domain name to a dynamic Internet IP address. Supports NA T (Network Address Transla tion)/NAPT Shares single Internet ac count and provides.
9 9 1.2. Package Co ntents Open the pa ckage c arefully , and make sure that n one of the items listed below are missin g. Do not discar d the pac king mater ials, in case of r eturn; t he unit must be shipped in its or iginal pack age. ESR9855G Multi media E nhanc ed Wireless 30 0N Ga ming Rout er x 1 Power A dapter x 1 3dBi 2.
10 10 1.4. Wireless SOHO Ro uter Desc ription Rear Panel Power Swi tch LAN Ports WA N / Intern et Port DC-Jack.
1 1 1 1 Front Panel W PS button LED panel Antenna Antenna connector.
12 12 Part s Description LAN Ports (1 – 4) Use an Ethernet cable to connect each port to a computer on y our Local Area Network (LAN). WAN Port Use an Ethernet cable to connect this port to your WAN rou ter . Antenna Connector Interface for the antennas.
13 13 c) The abil ity to access rea l-ti me inform ation Doctors/ nurses, point-of- sale employees, and warehouse workers can access real-tim e i nfor mation while dealing with patients, serv ing custom ers and process ing in formati on.
14 14 1.7. Network Co nfigura tion To better understand how the wireless LAN products w ork together to cre ate a wireless netw ork, it might be helpful to depi ct a few of the possi ble w ireless LAN PC card ne twork con figurations. The w ireless LAN produ cts can be configured as: a) Ad-hoc (or peer-to-peer ) for dep artme ntal or SOHO LAN s.
15 15 b) Infrastruc ture Mode The infras tructure mode requires the use of an access point (AP). In this mode, all wirel ess commun ication between two computers has to be via t he AP. It doesn’t matte r if the AP is stand-alone or wired to an Ethernet network.
16 16 2. Underst andin g the Har dware 2.1. Hardware Installat ion 1. Place the unit in a n appr opriate locat ion after con duct ing a site survey . 2. Plug one end of t he Ethe rnet cable into t he LA N port of the dev ice and anothe r end int o your PC/Not ebook.
17 17 2.2. IP Ad dress Con figuration This device can be configur ed as a Bridge/ Router or Access Point. The default IP addres s of the device i s 192.168.1.1 In or der to log into this d evice, y ou must first co nfigure the TCP/I P sett ings of y our PC/ Noteb ook.
18 18 2. Select Internet Proto col (TCP/IP) and then c lick on the Prop erties button. This will allow y ou to configure the TCP/IP settings of your PC/N oteboo k. Select O btain an IP addr ess a utomatic ally radio b utton. 3. Click on t he OK b utton t o close t his window , and o nce again to close L AN pro perties wi ndow.
19 19 3. Logging In To configure the device throug h the web-browser, enter the IP address of the device (default: 192.168 .1.1 ) into the address bar of the web- browser an d pres s Enter . Make sure that the device and your computers are configured on the same subnet.
20 20 4. Internet Settings This device offers a quick and simple configur ation through the use of wizards. T his chapter describes how to use the wizard to configure the W AN, LAN, and wireless settings. Please refer to Chapter 6 in order to configure th e m ore advanced features of the device.
21 21 4.1. Internet Co nnecti on Ty pe Select y our Int ernet serv ice WAN type This dev ice supp orts sev eral ty pes of Inter net / W AN connect ions: o DHCP Connectio n (Dynamic IP address) – Choose this conne ction type if your ISP provides you the IP address.
22 22 4.1.1. DHCP Conne ction (Dy namic IP A ddress) The WAN interface can be configured as a DHCP Client in which the ISP provides the IP address to the device. This is also known as Dynamic IP. Host Na me : this i s option al if y ou need to spec ify the ho st name for this ro uter .
23 23 4.1.2. PPPoE (Po int-to-P oint Pro tocol ov er Ethernet) The W AN interface can be conf igured as PPPo E. Thi s t ype o f c onnectio n is usually use d f or a DSL serv ice an d req uires a username and pass word to conn ect. Addre ss Mode : PPPo E can be used with a dynamic or static IP address.
24 24 o Automatic C onnect: choos e this op tion i f you w ant the dev ice to au tomat ically conn ect. o Manual Conn ect: choose t his option if you w ant the dev ice to con nection o n d emand. Maximum Idle Time : specify t he maxi mum idle time (disconn ect when device is idled over t he specifie d period.
25 25 4.1.3. PPTP (Point -to-Poin t Tunne ling Prot ocol) The W AN interface can be configured as PPTP. PPTP (Point to Point Tunneling Protocol) uses a virtual private networ k to connect to your ISP. This m etho d of connect ion is pri marily used in Europe.
26 26 PPTP Server I P A ddress : I f the PPTP S erve r’s IP a ddress is differen t from t he def ault gate way, then y ou may spec ify it here. User Nam e : Spe cify t he user na me wh ich is prov ided by y our ISP. Pass word: Spe cify t he passw ord whic h is prov ided by y our ISP, and then v erify it once again in the n ext field.
27 27 4.1.4. Static IP A ddress Conf iguration The W AN inter face can be configur ed as Stat ic IP addres s. In this type of conne ction, your ISP prov ides you with a dedicated IP address (which does not change as DHC P). IP A ddress: Sp ecify t he IP addr ess for this dev ice, w hich is ass igned by y our ISP.
28 28 4.2. Other Inte rnet Set tings IMPORTAN T NOTICE 4.2.1. RIP (Routing Infor mation P rotocol) Allows RIP to accept updates from this con nection. Note that priv ate routing information is never sent to this con nection. Internet Settings Page contains various settin gs related to W AN / Int ernet service.
29 29 4.2.2. DNS Setting s Most of the ISP does not require user to specify DNS settings. In cas e where DNS needed to be speci fied you can change the setting in this section. 4.2.3. MTU Setting s Most of the ISP does not require user to specify MTU settings.
30 30 4.2.4. WA N Ping If you enable this featu re, the W AN port of your router will respond to ping request s from the Internet th at are sent to the WA N IP Address. Enable W AN Ping Respond: checking the box. Y ou can specify the Inbound Filter a nd choose w hether to Allow A ll or Deny A l l .
31 31 4.2.6. MAC C loning MAC Address: specify the MAC address . Click on [Clone Y our PC’ s MA C address] button to enter the MAC address of your PC/l aptop automatically .
32 32 5. Wireless S etu p Wizard This wiz ard will gu ide you in the configur ation of the w ireless net work set tings such as t he SSI D and security ( WEP/WPA). .Please re fer to Chapter 6 in order to con figure the more advance d featur es of t he device 5.
33 33 The wizar d will inf orm y ou that there ar e two options: aut o and manual. 5.1.1. Au tomatic Net work Setup If you select the A uto option, then the device will au tomatica lly configur e the SSID and secur ity mode. Click on t he Next button t o cont inue.
34 34 The wiz ard has automatically configur ed the SSID and security mode for the devi ce. Cl ick on the Save button to co mplete the setup. 5.1.2. Manual Ne twork S etup If you select the Manual option, t hen you will be re quired to spe cify t he SSID and select the ap propr iate net work secur ity.
35 35 Click on t he Next button t o cont inue. Specify the W ire less Netw ork Name (SSID) for the dev ice. The SSID is a unique named shared a mongst all the points of the wireless network. The SSID must be identic al on all points of the wireless netw ork and cannot exce ed 32 character s.
36 36 This step require s that you con figure t he securit y feat ures bas ed on y our nee ds. The follow ing optio ns ar e availabl e. o BEST – Select thi s option if you r wire less adapter s .
37 37 Select the BEST r adio b utton w hich supp orts WPA2 encr yption. Then clic k on t he Next but ton. Enter a sec urity password betw een 2 an d 20 ch aracter s then cl ick on the Next button. The setup is co mplete. C lick on t he Sav e button and t hen reboot t he devic e.
38 38 5.1.2.2. Wireless Security Level: BETTER (WPA) Select the BETT ER radi o button which sup ports W PA encry ption. Then clic k on the Next but ton. Enter a sec urity password betw een 2 an d 20 ch aracter s then cl ick on the Next button.
39 39 The setup is co mplete. C lick on t he Sav e button and t hen reboot t he devic e. 5.1.2.3. Wireless Security Level: GOOD (WE P 64/128-bi t) Select the GOOD radio b utt on which su pports W EP encry ption. T hen clic k on the Next butt on.
40 40 The setup is co mplete. C lick on t he Sav e button and t hen reboot t he devic e. 5.1.2.4. Wireless Security Level: None (Secu rity Disabled) Select the NON E radio bu tton if you do not want to activ ate any security features. Then c lick on the Next button.
41 41 The setup is co mplete. C lick on t he Sav e button and t hen reboot t he devic e..
42 42 6. Manual We b Config uratio n 6.1. Logg ing In To configure the device throug h the web-browser, enter the IP address of the Bridge (default: 192.168 .1.1 ) into the address bar of the web- browser an d pres s Enter . Make sure that the device and your computer s are configured on the same subnet.
43 43 6.2. Basic Click on t he Basic link o n the nav igation dro p-down menu. 6.2.1. Internet Settings Refer to Chapters 4 in ord er to use the w izard. The ot her options are d escribe d below. 6.2.2. Wizard Wireless Refer to Chapters 5 in ord er to use the w izard.
44 44 6.2.3. Network Settings This device can b e configured at a Router or a Bri dge . Select R out er mode if the WAN port is conne cted to the Inter net. Select Bridge if t he devic e is co nnected to a loc al netw ork dow nstrea m from an other router .
45 45 6.2.3.2. Router Mode In this m ode, the d evice function s as a NAT r outer a nd is conne cted t o the I nternet. Select t he Rout er Mode radio but ton.
46 46 RIP (Routing Informat ion Protocol) RIP enables the rout er to sha re rout ing infor mation with ot her router s and host s on th e LAN. Enable RIP : Enable RIP if the LAN has multiple routers or if the LAN has other hosts that liste n for RI P messages, such as auto-IP devices or the Windows X P RIP Liste ner Serv ice.
47 47 subnet that has conflict ing IP addresses. Enter the p assw ord twice for verificat ion. Leave b oth p assword field s empty if RIP p assw ords are not us ed. A ccept RIP Updates : The "Accept R IP Updat es" option co ntrols whet her the router updates its rout ing tab les when it rece ives RIP messages f ro m other LAN devices.
48 48 DHCP Server Settings DHCP stan ds for Dyna mic Host Configur ation Prot ocol. Th e DH CP secti on is w here y ou configur e the b uilt-in DH CP Serv er to assign IP address es to t he computer s and other dev ices on your local are a ne twork (L AN).
49 49 Enable DHCP Server: O nce y our rout er is pro perly config ured and this opt ion is en abled, t he DHCP S erver will manage the IP addresses and ot her net work con figurati on infor mation for computer s and other devices con necte d to y our Loca l Area Networ k.
50 50 Primar y WINS Serv er IP addr ess: Configure t he IP address of the preferre d WINS s erver . W INS Serv ers store informat ion re garding networ k hosts, al lowing h osts to 'register' themse lves as w ell as d iscover o ther available h osts, e.
51 51 A dd/Edit DHCP Reservation This opti on lets you rese rve I P addresse s, and assign the sa me IP addr ess to t he net work dev ice w ith the spec ified M AC ad dress a ny time it requests an IP address.
52 52 colons su ch as 0 0-0D-88- 11-22-3 3 or 00: 0D:88:11: 22:33. If your networ k device i s a co mputer and the networ k card is already located inside the c omputer , you can con nect t o the r outer fr om the co mputer and c lick t he Copy Y our PC's MAC Address but ton to enter t he MAC addre ss.
53 53 6.2.4. Wireless Settings These opt ions a llow y ou to enab le/disa ble the wireless inter face, switch bet ween the 11 n, 11b/g and 11 b radio b and and chann el frequ ency Enable Wireles s: C heck t his box t o enable t he wir eless inter face.
54 54 wireless net wor k uses sp ecific c hannel s in the w ireless spectrum t o hand le com municati on betwee n clie nts. So me chann els in your ar ea may hav e inter ference from ot her ele ctronic dev ices. C hoose t he clearest channe l to he lp opt imize the perfor mance and cover age of y our wire less net wor k.
55 55 6.2.4.1. W ireless Security Mode To protect your privacy this mode supports several types of wireless security: W EP WPA, W PA2, and W PA-Mix ed. W EP is the original wireless en cry ption stan dard. W PA prov ides a hig her lev el of secur ity .
56 56 6.2.4.2. W EP (Wired Equiv alent Priv acy) Select the WEP radio butt on if your wire less netw ork uses WEP encryption. W E P is an acronym f or Wired Equivalent Privacy, and is a secur ity pr otocol that prov ides the s ame lev el of secur ity for wireless n etwor ks as for a wired networ k.
57 57 6.2.4.3. W PA Personal (Wi-Fi Protected A ccess) Select the WPA -Personal radio butt on if y our wirele ss networ k uses WPA enc rypt ion. W PA ( W i-Fi Prote cted Acc ess) w as design ed to improve upon the security features of W EP (W ir ed Equiva lent P rivacy ).
58 58 6.2.4.4. W PA Enterprise (Wi-Fi Protected A ccess & 802.1x) Select the W PA-Enter pris e radio button if your wireless network uses WP A encry ption. W PA (Wi-Fi Protected Access) was designed to improv e upon the security features of W E P (W ir ed Equivalent Privacy ).
59 59 WPA Mode : Se lect the WPA / W PA2 from t he dro p-down l ist. Cipher Type : S elect TKI P or AE S as the cipher suite. The encrypt ion algor ithm used to secure th e dat a commu nication. TKIP. Use TKIP only. TKIP (Tempor al Key Integrity Protocol) provides per-packet key generation and i s based on W EP.
60 60 6.3. Adv anced Click on t he A dvanced link on the navigat ion drop- down menu. The con figuration steps for each option ar e descr ibed bel ow..
61 61 6.3.1. Adv anced Wireles s By clicking on Advanced tab, you w ill be able to access Advanced W irel ess p age. If you are not familiar w ith Advanced Wireless settings, ple ase refer to help be fore changing these settings.
62 62 Beaco n Period: Beacons are packe ts sent by a wireless router to synchronize wireless devices. S pecify a Beacon Period value bet w een 20 and 1000. The default v alue is set to 100 milliseconds. V alues t hat a re not a multiple o f 4, are forced to a multiple of 4.
63 63 6.3.2. Virtual Serv er The Virtual Server opti on gives Internet users access to services on your LAN. This featur e is useful for hosting online servic es such as FTP, W eb, or ga me server s. For each Vi rtua l Server, you define a publ ic port on y our router for red irection to an inter nal LAN IP A ddres s and LAN p ort.
64 64 Inboun d Filter : Select an inbound filter f rom the drop-down list. If an inbound filter does not exist, you may create it from Advan ced > Inbound Filter sect ion. Click on t he Save button to insert the entr y into the Virt ual Ser ver list.
65 65 6.3.3. Special A pplicatio ns An app lication rule is used to open single or multiple ports on your router when the router senses data sent to the Intern et on a trigger port or port range. An a pplicat ion rule a pplies to all co mputer s on yo ur interna l netw ork.
66 66 6.3.4. Port For warding Multiple connecti ons are required by some applications, such as i ntern et games, video conferen cing, Internet telephony , and oth ers. These applicatio ns have difficulties working throu gh NA T (Networ k Addres s Trans lation).
67 67 6.3.5. StreamEn gine The Stre amEng ine featur e helps improv e the net wor k performan ce by prioritiz ing appl icatio ns. Enable Traffi c Shaping : Check this box to enable t raffic sha ping. W hen this option is enabled, the r outer restricts the flow o f outbound traffic s o as not to excee d the W AN upl ink bandwi dth.
68 68 Man ual Uplink Speed : Specify an uplink spee d or select it f rom the drop-dow n list. If Automatic Uplink S peed is disa bled, this option allows y ou to set the upl ink spee d manu ally . Uplink speed is the sp eed at w hich dat a ca n be tr ansferre d fro m the rout er to y our I SP .
69 69 Dy namic Fragmentati on : Chec k this box to enab le t his option. This opti on shoul d be en abled whe n y ou have a slow I nternet upl ink. It helps to reduce the impact that large l ow priority n etwor k packet s can have on more urgent ones by breaking the large pac kets i nto several s maller p ackets.
70 70 6.3.6. Routing This secti on adds a new e ntry into the routing tabl e. Enable : Chec k this bo x to enab le the r outing t able e ntry. Name : Speci fy a na me for t he rule. Desti nation IP : Spec ify t he destinat ion IP addr ess.
71 71 6.3.7. A ccess Control The Access C ontrol section allows you to control access in and out of dev ices on your network. Use this feature as Parental Contro ls to only grant access to approved sites, limit web access based on time or dates, and/or block acc ess from appl ications such as peer-to-peer utilities or games.
72 72 Click on t he Next button t o cont inue. Specify a policy name an d t hen clic k on the Next butt on to cont inue..
73 73 Select a s chedu le from t he drop- down list: A lways or Never , or y ou may def ine a new schedu le. Cl ick on the Next button t o cont inue. Select a machine to which the po licy appl ies. A ddress Ty pe : Select the IP address or M AC addre ss radi o button.
74 74 Select a f iltering method: Log W eb A ccess O nly : Select this ra dio but in ord er to log w eb acc ess. Block A ll Access : Se lect t his radio but in order to bl ock all w eb access. Block Some A ccess : Select this r adio but in order to block some we b acce ss.
75 75 6.3.8. Web Filter This is a ty pe of parenta l control f eatur e u sed t o restrict certain web sites from being acce ssed through your netw ork. These fil t ers can be used for s ecuring and re stricting your n etwork. Website/ URL/Do main : S pecify the web address that you w ould like to filter.
76 76 6.3.9. MAC A ddress Filt er This feature i s used to restr ict certai n MAC address from acce ssing the Internet. These filters can be used for securi ng and restric ting you r networ k. Confi gure MAC Fil tering : Select o ne of t he options from t he drop-d own l ist.
77 77 6.3.10. Firewall The device provides a tight firewall by virtue of the way NAT wor ks. U nless you configure the router to the contrary, the NA T does not respond to unsolicited incom ing requests on any port, thereby making your LAN invisible to Internet cyber attacks.
78 78 TCP / UDP NA T Endpoint Filtering opti ons cont rol how the router's NAT manages inco ming conn ection req uests to ports that are already being use d.
79 79 Enable anti-spoof checking : Check this box to enable anti-spo of chec king. E nabl ing this option can prov ide protect ion f rom certain kinds of "spoo fing" attac ks. Howev er, pl ease be no ted that for some modems, the W AN conne ction may be lost when this optio n is enabled.
80 80 A pplication Lay er Gateway (A LG) Configuration: Check appropr iate feature boxe s to enable them. . Some prot ocols and applicatio ns requir e special hand ling of the IP pay load to ma ke them wor k with netwo rk addre ss transla tion (NAT).
81 81 6.3.11. Inboun d Filter When you use the Virtual Server, Port Forwarding, or Remote Administrat ion features to open specific ports to traffic from the Inter net, you could be increasi ng the exposur e of your LA N to cyber attacks from the Inte rnet.
82 82 6.3.12. WISH WISH is shor t for W ire les s Intelligent Stream Handl ing, a techno logy developed to enhance your experience of using a wirel ess network by prioritiz ing the tra ffic of di fferent applicat ions. Enable WISH : Check th is box to ena ble the W ISH fe ature.
83 83 A utomatic : C heck this box f or the device to automatica lly configure the classif iers. When enabled, this option causes the router to automati cally att empt to prioritize traffic streams that i t doesn't otherwise recogn ize, based on the behavior that the streams exhibit.
84 84 6.3.13. Wi-Fi Protec ted S etup Wi-Fi Protected Setup is a feature that loc ks the wireless se curity settin gs and prevents th e settings from being c hanged by any new external registrar using its PIN. Devices ca n stil l be adde d to t he wireless netw ork using W i-Fi Prot ected Setup.
85 85 6.3.14. Adv anced Net work (UPNP, WA N Ping…) In this sect ion y ou can co nfigure the UPN P, W AN P ing, WAN port sp eed, mu lticast s tream s, and P PPoE pass-thr ough set tings.
86 86 Enable Multicast Str eams : Check this box to enable multicast streams. The router uses the IGMP protoco l to support effic ient multicasti ng -- transmissi on of identical content, such as multimedia, from a source to a number of recipients.
87 87 6.4. Tools Click on the Tools on the navigation drop-down menu. You will then see seven options: Time, System, Firmwar e, SysLog, Dyna mic DNS, Sys tem Chec k, and Sch edules.
88 88 6.4.1. Time Zone Setting Click on the Time in the nav igation menu. This feature allows you to configure, update, and maintain the correct time on the device’ s internal syst em clock as well as configure the tim e zone. The date and time of the device can be configured m anua lly or by synchroniz ing with a t ime serv er.
89 89 Enable Day light Saving : Check this b ox to enable daylight savings t ime. Day light Sav ing Of fset : Se lect the offset fro m the drop-dow n list. Day light Savi ng Date : S elect the day light sav ings date from the dr op-down li st.
90 90 6.4.2.1. Save To Local Hard Drive This opti on allows y ou to save t he current configura tion o f the dev ice into a file. Click on t he Sav e Conf iguratio n button t o begin. Save the file on y our loca l disk by using the Sav e or Sav e to Disk butt on in th e dialog b ox.
91 91 Please wa it while the sy stem is r ebootin g. Note : Do n ot un- plug the dev ice during t his proc ess as this may cause p erma nent da mage. 6.4.2.3. Restore To Facto ry Default Click on t he Restor e all Settings to Fact ory Defau lts butt on.
92 92 6.4.2.4. Reboo t the dev ice Click on the R ebo ot the Device button to reboot the device using its current settings. Once the dialog box appears, click on the OK button t o confirm t he act ion. Once the dialog bo x app ears, click on t he OK butto n to confir m the act ion.
93 93 6.4.3. Firmware Upgrade Click on the Firmware link in the navigation men u. This page allows you to upgrade the firmware of the device in order to improve the functional ity and perfor mance. Th is page also d isplay s the cur rent firmwar e version and its releas e date.
94 94 6.4.4. System L ogs Logs display a list of events that are triggered on the Ethernet and W ireles s interface. This log can be referred when an unknown error occurs o n the sy stem or w hen a re.
95 95 6.4.5. Dyn amic DNS The Dynamic DNS featur e allows you to host a serv er (W eb, FTP, Game Serv er, etc.) using a domain name that you have purchased with your dy namically assig ned IP addr ess. Most broadband Int ernet Service Pro viders ass ign dyna mic (chang ing) IP addres ses.
96 96 6.4.6. System C heck Click on t he Sy stem Ch eck lin k in the navigat ion menu. This pa ge all ows y ou to ping a host na me or I P address. Host Na me or IP addre ss : Spec ify the host name or IP addres s and t hen cl ick on t he Ping button.
97 97 6.4.7. Schedu les Click on the Schedules link in the navigation menu. Sched ules can be created for use with enforcing rules. For example, if you want to restrict w eb acce ss to M on-Fri fr om 3p m to 8pm, you coul d create a sched ule sele cting M on, Tu e, Wed, Thu, and Fri and en ter a S tart Time of 3pm an d End T ime of 8 pm.
98 98 6.5. Status Click on the Status on the navigatio n drop-down menu. You will then see six options: W ireless, Logs, Statisti cs, WISH Sessions, Routing, an d Int ernet Se ssions.
99 99 6.5.1. Wireless Status Click on t he Wirel ess in t he nav igation menu. The wirele ss sect ion al lows you to v iew the w ireless clie nts tha t are conne cted t o the dev ice. MAC A ddress : The Eth ernet ID ( MAC addr ess) o f the w ireless c lient.
100 100 6.5.2. Logs Statu s Click on the Logs in the nav igation menu. The router automatical ly logs (recor ds) events of possi ble interest in its internal memory . If there is not enough intern al memory for all events, logs of older events are deleted, but logs of the latest e vents are retained.
101 101 6.5.3. Statistics Click on the St atistics link in the nav igation drop-d own men u. This pag e displays the trans mitted and received pac ket stati stics of the wire d (LAN & WAN) and wireles s interfac e. Cli ck on the Refres h button to refr esh th e statistic s.
102 102 6.5.4. WISH Sess ion Sta tus Click on the WI SH Sessions in the navigation dr op-do wn menu. The W ISH Sess ions page display s full details of act ive l ocal wirele ss sessions through your router when W ISH has been enabled.
103 103 CL : Closed -- The connection i s no longer active but the session is being tracked in case there are any retransmitted packets still pending. Priori ty : The priority given to pac kets sent wireless ly over this con versatio n by the WISH logic.
104 104 6.5.5. Routing This funct ion show s curre nt r outing tab le.
105 105 6.5.6. Internet Sess ion S tatus Click on t he Inter net Se ssions in the navigati on drop-down menu. The Internet Sessions page displays full details of active Internet sessions throug h your router.
106 106 300 se conds - UDP co nnect ions. 240 seconds - Reset or closed T CP co nnect ions. The connec tion does not close i nst antly so that lingering packets can pass or the connectio n can b e re-esta blishe d. 7800 s econds - Estab lished or closin g TCP connec tions.
107 107 6.5.7. Firewall This page displays the full details a bout f irew all holes in your router -- p orts tha t a ccept unsolicited messag es f rom the WA N.
108 108 Appendi x A – Glossary.
8 802.1 1 A family of specifications for wireless l ocal area networks ( W LA Ns) developed by a wor king group of the Institute of Electrical and Electronics Engineers (IEEE). A Access Control List ACL. This is a database o f network devices that are allowed to access resources on the network.
ESR9855G Wireless N Gaming Router 1 10 Application layer 7th Layer of the OSI model. Provides services to applications to ensure that they can communicate properly with other applic ations on a network. ASCII American S tandard Code for Information Interchange.
ESR9855G Wireless N Gaming Router 1 1 1 Bottleneck A time dur ing processes when something causes the process to slowdown or stop all together Broadband A wide band o f frequencies available for trans.
ESR9855G Wireless N Gaming Router 1 12 Dat a-Link layer The second layer of the OSI model. Controls the movement of data on the physical link of a network DB-25 A 25 ping m ale connector for attaching.
ESR9855G Wireless N Gaming Router 1 13 Domain Name System: T ransl ates Domain Names to IP addresses Domain name A nam e that is associated with an IP address Download T o s end a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line.
ESR9855G Wireless N Gaming Router 1 14 A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to b.
ESR9855G Wireless N Gaming Router 1 15 Data cannot be transmitted and received at the same time Hashing T ransforming a string of characters into a shorter string with a predefined length Hexadecimal .
ESR9855G Wireless N Gaming Router 1 16 A system of worldwide networks which use TCP/IP to allo w for resources to be accessed from computers around the world Internet Explorer A World W ide W eb brows.
ESR9855G Wireless N Gaming Router 1 17 Kilobits per second Kbyte Kilobyte L L2TP Layer 2 T unneling Protocol LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network.
ESR9855G Wireless N Gaming Router 1 18 Management Information Base is a set of objects that can be managed by using SNMP Modem A dev ice that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines.
ESR9855G Wireless N Gaming Router 1 19 O OFDM Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.1 1a and 802.1 1g OSI Open Systems Interconnection is the ref erence m.
ESR9855G Wireless N Gaming Router 120 PPTP Point-to-Point T unneling Protocol is used for creating VPN tunnels over the Interne t between two networks Preamble Used to synchronize communication timing.
ESR9855G Wireless N Gaming Router 121 S Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is gener.
ESR9855G Wireless N Gaming Router 122 Determines what portion of an IP address designates the Network and which part desig nates the Host Syslog System Logger -- a distributed logging interface for collecting in one place the logs from different sources.
ESR9855G Wireless N Gaming Router 123 Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded T wisted Pai.
ESR9855G Wireless N Gaming Router 124 W ired Equ ivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wide A rea Netw ork The larger network t.
ESR9855G Wireless N Gaming Router 125.
ESR9855G Wireless N Gaming Router 126 Appendi x C – FCC Interf erence State ment Federal Communication Commission Interference St atement This equipment has been t est ed a nd found to comply with th e limits for a Class B digital device, pursuant to Part 15 of t he FCC Rules.
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté EnGenius Technologies ESR9855G c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du EnGenius Technologies ESR9855G - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation EnGenius Technologies ESR9855G, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le EnGenius Technologies ESR9855G va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le EnGenius Technologies ESR9855G, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du EnGenius Technologies ESR9855G.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le EnGenius Technologies ESR9855G. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei EnGenius Technologies ESR9855G ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.