Conceptronic 150N Wireless LAN Broadband Router User’s Manual Version: 3.0
6 Chapter II: System and network setup 2-1. Build network connection Please follow the following instruction to build the network connection betwee
7 2-2-1. Windows XP IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control pane
8 2-2-2. Windows Vista IP address setup: A. Click „Start‟ button (it should be located at lower-left corner of your computer), then click control p
9 2-2-3. Router IP address lookup After the IP address setup is complete, please click „Start‟ -> „Run‟ at the bottom-lower corner of your desk
10 Input „ipconfig‟, then press „Enter‟ key. Please check the IP address followed by „Default Gateway‟ (In this example, the IP address of router is
11 When the user name and password are correct the wireless router will show the main page with the status of the wireless router: On the main page,
12 Chapter III: Configuration - Home 3-1. Home - Wizard You can setup the wireless router through the built-in Wizard. This Wizard will help you con
13 E. For system management purpose, a correct time setting is critical to have accurate time stamps on the system logs. Set an appropriate Time Zo
14 H. When your provider requires a Dynamic IP connection, select the “Dynamic IP” option. Some providers require a specific Hostname for their connec
15 J. When your provider requires a PPTP connection, select the “PPTP” option. Enter the requested information: Server IP PPTP Account PPTP
Contents Chapter I: Introduction 1-1. Product Features 1-2. Safety information 1-3. Package contents 1-4. Familiar with your new wireless broa
16 You can secure your Wireless Connection with encryption. By default, the wireless router is secured with WPA-PSK/WPA2-PSK Mixed Mode encryption. Th
17 P. When all Wireless settings are made, click “Next” to continue. Q. The Setup Wizard is now complete. If you want to apply your settings, click
18 3-2. Home - WAN In this screen, select one mode of your Internet connection you use. If you are not clear, press the “Detect” button or contact y
19 3-2-2. Dynamic IP (Via DHCP) If your connection mode is Dynamic IP, it means your IP address keeps changing every time you connect. You do not ne
20 3-2-4. L2TP L2TP Server IP : Enter the Server IP provided by your ISP. User Name : Enter L2TP username. Password : Enter L2TP password. MTU
21 3-2-5. PPTP PPTP Server IP : Enter the Server IP provided by your ISP. User Name : Enter PPTP username provided by your ISP. Password : Enter
22 3-3. Home - WAN Advanced In the “WAN Advanced” page, you will find 3 sections: WAN Medium WAN MAC Address Clone WAN Connection Mode
23 3-3-1. WAN Medium In most cases, ISP provides wired WAN access (ADSL MODEM, Cable MODEM, etc.) and you only need to insert the line into the Route
24 3-3-3. WAN Connection Mode After you have selected the ISP connection type in “WAN” and you want to modify the related settings, here you can modi
25 3-4. Home - LAN LAN Settings are for the basic TCP/IP parameters of LAN ports. MAC Address : The Router‟s physical MAC address as seen o
Chapter IV: Configuration – Wireless 4-1. Wireless - Basic 4-2. Wireless - Security 4-2-1. WEP 4-2-2. WPA-PSK (Personal) 4-2-3. WPA2-PSK (Person
26 3-5. Home - DNS Settings DNS is short for Domain Name System (or Service), an Internet service that translate domain names into IP addresses whic
27 3-6. Home - DHCP Server A DHCP (Dynamic Host Control Protocol) is to assign an IP address to the computers on the LAN/private network. When you e
28 Chapter IV: Configuration - Wireless 4-1. Wireless - Basic Enable Wireless : Check to enable the Router‟s wireless features; uncheck to disable
29 MBSSID AP Isolation : One access control feature based on wireless MAC address. When this feature is enabled, wireless clients connect
30 4-2. Wireless - Security It is used to configure the AP network‟s security setting. Here presents the encryption methods, including WEP, WPA-pers
31 4-2-2. WPA-PSK (Personal) WPA (Wi-Fi Protected Access), a Wi-Fi standard, is a more recent wireless encryption scheme, designed to improve the se
32 4-2-3. WPA2-PSK (Personal) WPA2 (Wi-Fi Protected Access version 2) provides higher security than WEP (Wireless Equivalent Privacy) and WPA (Wi-Fi
33 4-2-4. Mixed WPA-PSK / WPA2-PSK (Personal) Mixed WPA-PSK / WPA2-PSK (Personal) combines the WPA-Personal and WPA-2 Personal security levels. Clie
34 4-2-5. WPA (Enterprise) This security mode is used when a RADIUS server is connected to the device. SSID Choice : Select the SSID (main S
35 4-2-6. WPA2 (Enterprise) This security mode is based on Radius authentication server and WPA2 encryption method. WPA2 is used when a RADIUS serve
Chapter VI: Configuration – Tools 6-1. Tools - Admin 6-2. Tools - Time Settings 6-3. Tools - Backup / Restore 6-4. Tools - Upgrade 6-5. Tools -
36 4-2-7. Mixed WPA / WPA2 (Enterprise) This security mode combines WPA and WPA2 (Enterprise) and is used when a RADIUS server is connected to the d
37 4-2-8. 802.1x This security mode is used when a RADIUS server is connected to the device. 802.1x, a kind of Port-based authentication protocol, i
38 4-3. Wireless - Advanced This section is to configure the advanced wireless setting of the Router, including the Radio Preamble, 802.11g/n Rate,
39 4-4. Wireless - WPS WPS (Wi-Fi Protected Setting) can be easy and quick to establish the connection between the wireless network clients and the
40 WPS Encrypt Type : The encryption type used by WPS, generally AES/TKIP. WPS key : The effective key generated by AP automatically. AP PIN(KEY)
41 4-6. Wireless - Access Control To secure your wireless LAN, the wireless access control is actually based on the MAC address management to allow
42 Chapter V: Configuration - Advanced 5-1. Advanced - Single Port Forwarding Note: In the picture above, you will see an example of some port forw
43 Delete/Enable : Click to check it for corresponding operation. Well-Known Service Port : Select the well-known services as DNS, FTP from the drop
44 5-2. Advanced - Port Range Forwarding Note: In the picture above, you will see an example of some port forwarding rules. This section deals wit
45 5-3. Advanced - ALG Service In the context of computer networking, an ALG or application layer gateway consists of a security component that augm
1 Chapter I: Introduction Thank you for purchasing the Conceptronic C150BRS4 Wireless Broadband Router! The Conceptronic C150BRS4 utilizes advanced
46 5-4. Advanced - DMZ The DMZ function is to allow one computer in LAN to be exposed to the Internet for a special-purpose service as Internet gami
47 5-5. Advanced - UPNP It supports latest Universal Plug and Play. This function goes into effect on Windows XP or Windows ME or this function woul
48 5-6. Advanced - MAC Filters In order to manage the computers in LAN better, you could control the computer‟s access to Internet by MAC Address Fi
49 5-7. Advanced - URL Filters In order to control the computer to have access to websites, you can use URL filtering to allow the computer to have
50 5-8. Advanced - Client Filters To benefit your further management to the computers in the LAN, you can control some ports access to Internet by d
51 5-9. Advanced - DDNS The DDNS (Dynamic Domain Name System) is supported in this Router. It is to assign a fixed host and domain name to a dynamic
52 5-10. Advanced - Prevent Network Attack This section is to protect the internal network from exotic attack such as SYN Flooding attack, Smurf att
53 5-12. Advanced - Traffic Control Traffic control is used to limit communication speed in the LAN and WAN. Up to 20 entries can be supported with
54 5-13. Advanced - URL Monitor This feature is used to record user‟s Internet activity, so in terms of this feature, the administrator can check ou
55 5-14. Advanced - Static Routing This page is used to configure the Router‟s static routing. Destination LAN IP : The address of the remote host
2 1-1. Product Features Includes router, wireless access point, four-port switch and firewall in one Provides up to 150Mbps uploading and do
56 Chapter VI: Configuration - Tools 6-1. Tools - Admin The “Admin” page exists of 3 sections: Administrator password section Local Web Manag
57 Local Web Management section: Local web management, the alternative to remote web management, is to allow the network administrator to manage the R
58 6-2. Tools - Time Settings This section is to select the time zone for your location. If you turn off the Router, the settings for time disappear
59 6-3. Tools - Backup / Restore The device provides backup/restore settings, so you need set a directory to keep these parameters. Backup Setting:
60 6-5. Tools - Restore to Factory This button is to reset all settings to the default values. It means the Router will lose all the settings you ha
61 Chapter VII: Configuration - Status 7-1. Status - DHCP Client The Static IP assignment is to add a specifically static IP address to the assigned
62 7-2. Status - Wireless Client This page shows wireless client‟s connection status, including MAC address, Channel bandwidth, etc. MAC Address
63 7-4. Status - Routing Table The main duty for a router is to look for a best path for every data frame, and transfer this data frame to a destina
64 Chapter VIII: Appendix 8-1. Troubleshooting If you found the router is working improperly or stop responding to you, don‟t panic! Before you con
65 I can‟t locate my router by my wireless client a. „Broadcast ESSID‟ set to off? b. All two antennas are properly secured. c. Are you too far from
3 1-2. Safety information In order to keep the safety of users and your properties, please follow the following safety instructions: This router
66 8-2. Glossary Default Gateway (Router): Every non-router IP device needs to configure a default gateway‟s IP address. When the device sends out a
67 Port: Network Clients (LAN PC) uses port numbers to distinguish one network application/protocol over another. Below you will find a list of some c
68 8-3. License Agreement Licensing Information This Conceptronic product C150BRS4 includes copyrighted third-party software licensed under t
69 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. Temple Place, Suite 330, Boston, MA 021
70 GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work
71 These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be re
72 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to c
73 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions wi
74 How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, th
75 GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fift
4 1-4. Familiar with your new wireless broadband router 1-4-1. Front panel Nr Description Status Status Explanation A SYS LED OFF The d
76 To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by
77 GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any soft
78 c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in
79 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms
80 a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work
81 a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be
82 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original
83 BSD LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions
5 1-4-2. Back panel Nr Description Explanation A Power connection Connect the power supply to the router B WAN port Connect your b
Comentários a estes Manuais