Dsl-2640t installation guide
Post by tingu » Mon Jul 23, am. Post by thechief » Mon Jul 23, am. Post by tingu » Mon Jul 23, pm. RouterTech The independent technical support site for all things networking! Skip to content. Quick links. Logout Register. Even if you have a wireless router, only post here if you have a question about issues with the wireless functionality of it. Questions about wireless access points, cards, hot-spots etc. I wanted to connect T in Bridge or repeater mode wirelessly.
After a lot of searching, following is the configuration that worked. The problem is that it works only when Network Authentication is set to "None" under Wireless Security on primary router.
Changing Network Authentication on my secondary router does not have any effect on wireless connection. I hope experts here would be able to solve my problem here. For a single port, just enter the same number in both spaces. Type a number for the Port Map in the space provided. Click the Apply button to create the new rule. The new rule will appear listed in the table of custom port forwarding rules. In order to use these advanced features it is necessary to have IP addresses available for configuration.
In the example above, available addresses range from 1. Any addresses added will appear in the list of Static Addresses available for advanced configuration.
To delete an IP address from the list of Static Addresses, click the Delete box for the address or addresses you want to eliminate and click on the Apply button. Click the Reserve box for the address or addresses you want to reserve and click the Apply button. Name: Edit community Name. Trap Community: Insert Trap Community name. Configure the filter rules as desired and click the Apply button to create the rule.
The newly created rule appears listed in the Outbound Filter List at the bottom of the window. The table below describes the various parameters that are configured for the filter rules. Filters window To modify any previously created filter rule, click on the note pad icon in the right hand column of the Filter List for the set you want to configure. Adjust the settings as desired and click the Apply button to put the new settings into effect.
First determine the direction of the traffic you want the rule to filter. Any new Inbound Filter rules created will appear in the list. Note The Service Filtering feature of the Firewall may interfere with ules configured in the Filters window.
For example, FTP packets are not allowed through from the external network by default. See the Firewall section below for details. The parameters described in the table below are used to set up filter rules. Any filter rule configured in the menu will appear in the Filters List with the new settings.
The Router must save the new settings and reboot before the new rules are applied. Where the Destination IP address resides also depends on if you are configuring an Inbound or Outbound filter rule. Select to Allow or Deny transport of the data packets according to the criteria defined in the rule. Packets that are allowed are routed to their destination; packets that are denied are blocked. This may be done for security or to improve network efficiency. The rules are configured for individual devices based on MAC address.
Filter rules can be set up for source, destination or both. You can set up filter rules and disable the entire set of rules without loosing the rules that have been configured.
To remove a bridge filter from the table in the bottom half of the window, click the corresponding trashcan icon. Remember to save the configuration changes. This is used to specify that all packets destined for a particular network or subnet use a predetermined gateway. Click Apply to enter the new static route in the table below. The route becomes active immediately upon creation. To add a static route to a specific destination IP on the WAN, click the Connection radio button and choose a connection from the pull-down menu, then enter a Destination IP address and Netmask.
The route becomes active immediately upon creation To remove a static route from the table in the bottom half of the window, choose to Delete it from the table and click the Apply button. Therefore it is advisable that other security precautions be enabled to protect the other computers and devices on the LAN. For example, if you want to use video conferencing and still use a firewall, you can use the DMZ IP address function. In this case, you must have a PC or server through which video conferencing will take place.
It will be necessary to save the settings and reboot the Router before the DMZ is activated. The user may also use this field to block certain websites by entering a keyword into the URL Address field.
This feature may be beneficial to parents wanting to stop their kids from accessing certain websites or for companies who want their employees to stop surfing the Internet on company time. Domain Blocking Domain blocking is a method of denying computers on the LAN access to specific domains on the Internet. Configured Domain blocking entries will be displayed in the Blocked Domains List at the bottom of the screen. To remove a Blocked Domain entry in the list, click on the entry and click the Delete button.
There are two general types of protection DoS, Port Scan that can be enabled on the Router, as well as filtering for specific packet types sometimes used by hackers. You can choose to enable or disable protection against a customized basket of attack and scan types. To use DoS Protection or Port Scan Protection, select the State Enabled radio button for the protection type and click in the selection boxes for the various types of protection listed under each.
Examples include: attempts to "flood" a network, thereby preventing legitimate network traffic, attempts to disrupt connections between two machines, thereby preventing access to a service, attempts to prevent a particular individual from accessing a service, or, attempts to disrupt service to a specific system or person.
Port scan protection is designed to block attempts to discover vulnerable ports or services that might be exploited in an attack from the WAN. Check the category you want to block to enable filtering of that type of packet.
When you have selected the desired Firewall policies, click the Apply button to enforce the policies. Remember to save any configuration changes.
The direction configuration refers to the RIP request. Select In to allow RIP requests from other devices. Select Both to share routing tables in both directions. You may also choose to instruct the Router to connect each time you want to access the WAN or the Internet. You can configure an idle time in minutes to disconnect the PPP connection after a period of inactivity.
If you use the Manual option, you must return to this menu and click the Disconnect button to terminate the PPP session. This configuration works with all ADSL implementations. If you have been given instructions to change the Modulation method used, select the desired option from the Modulation Type drop-down menu and click the Apply button.
This window can be used as an alternative to configure the same settings found on the WAN Settings window in the Home directory. Configure the appropriate settings and click the Apply button to put the new settings into effect. IGMP is used to manage multicasting streaming radio for example is a multicast , most users will not need to enable this. If unsure, check with the service provider. This will open the following window. Then select the PVC to associate with the corresponding port and choose a priority for this combination.
Click Apply to set the configuration. Then select the PVC to associate with the corresponding action and choose a maximum bandwidth and classification for this combination. Then select the classification type using the Classified by pull-down menu.
Each choice will open the corresponding windows, shown following. Selecting ToS will display the following window. QoS Configuration window IP QoS for Application On this window, you can select the mechanism by which the four priority queues are emptied by assigning a weight, in percentage terms, to each priority queue, and then assigning a packet type that can be associated with an application type.
From this pointer, you can then specify a Value in hexadecimal and a Mask in hexadecimal for the router to match when examining packets crossing the specified priority queue.
It is recommended that you not enter a QoS scheme of this type unless you fully understand Offsets, pointers, masks, and IP headers or you are instructed to do so by your ISP. Click the appropriate radio button to view the menu for any of these Wireless Management menus.
The MAC address will appear listed below. All changes must be saved and the Router restarted for the Access List to be in effect. The Associated Stations list can also be used to block access of any MAC address currently associated with the Acess Point see next section. To deny access to any associated stations click the radio button for the MAC address you want to ban in the Ban Station column. Click Apply to add the banned station to the Access List Denied list.
The change must be saved and the Router restarted before the banned station appears in the list of Denied stations on the Access List. Up to 4 SSIDs may be used. To add security settings to an existing secondary SSID, click the Modify radio button for that SSID and configure the security the same as configured in the general Wireless Settings menu see page 28 for more information. WDS facilitates roaming between different access points and connectivity to the Ethernet and Internet.
WDS is also used to connect two distant Ethernet LAN groups that may be be difficult or impractical to connect to each other with cable. The access point can perform different functions in the WDS depending on the mode that is chosen. To use WDS, first select the WDS Mode the access point will use from the pull-down menu, and configure the available parameters for the selected mode.
See the table below for a description of the different modes and parameters used to configure the access point. Use the table below as a guide to how each mode functions in the WDS. No wireless clients can associate with an access point in bridge mode. In bridge mode, the access point has the option of acting as a Root click the Activate as Root box to enable. As the Root access point, there cannot be a wireless Uplink through the AP.
Only wireless Downlinks may be designated. To designate a Downlink, enable up to 4 downlinks Downlink 1 — 4 and type the MAC address of the AP used for downlink in the space provided. In repeater mode the access point can communicate with other access points and wireless clients.
Note that repeater mode will limit the amount of throughput of wireless clients to the Ethernet. As with bridge mode, repeater mode allows the AP to function as the Root. Crude Mode is recommended for wireless LANs using multiple vendors wireless chip solutions. If wireless stations are using TI chips, use Bridge or Repeater modes. Configuring these settings may increase the performance of your router but if you are not familiar with networking devices and protocols, this section should be left at its default settings.
Below is a list of the functions associated with the Access Point feature of the router. Click Apply when you have completed your changes. Wireless Performance menu See the table below for a description of Wireless Performance menu parameters. You may set the Beacon Interval range between microseconds per beacon sent. The default is The default setting is 3.
When this is enabled, the SSID willl be hidden from roaming devices. Allows the user to adjust the transmit power of the router. A high transmit power allows a greater area range of accessibility to the router. When multiple overlapping access points are present, it may be desirable to reduce transmition power. A lower level will send packets more frequently which may consume a great amount of the available bandwidth.
A high threshold will allow the router to recover from interference or collisions which is more prevalent in a network with high traffic or high electromagnetic interference.
The default setting is The fragmentation threshold will determine if packets are to be fragmented. Packets over the byte limit will be fragmented before transmission. The access point can be forced to operate in g mode or b mode to associate with exclusively When User Isolation is enabled, peer-to-peer communication is disabled. This prevents unicasts from one wirless station to another in the same BSS. The Administrator Settings window is the first item in the Tools directory.
This window is used to change the system password used to access the web manager, to save or load Router configuration settings and to restore default settings. The functions in this and the other Tools windows are described below. Select the password level being changed, click the Modify admin password option to change Admistrator level password or Modify user password option to change the user level password.
Click the Apply button to activate the new password. This will not change the port used by computers to access the Internet. In each case, the procedure to enable remote management of the Router is the same. Finally, click the Apply button to activate remote management from the chosen IP address. Be sure to save the new setting. Time menu To configure system time on the Router, select the method used to maintain time. Click the Apply button to set the system time.
Log message receivers that are added appear listed in the Select a logging destination pull-down menu. These may be used at any time for other types of log messages.
To remove a log message receiver from the list, select it and click on the Remove button. Click the Apply button when you have configured the log message receivers. Remember to save the settings to non-volatile memory. To save the current configuration settings to your computer, click the System button in the Tools directory to display the System Settings window. You will be prompted to select a location on your computer to put the file.
The file type is. To load a previously saved configuration file, click the Browse button and locate the file on your computer. Confirm that you want to load the file when prompted and the process is completed automatically. The Router will reboot and begin operating with the configuration settings that have just been loaded. You will be prompted to confirm your decision to reset the Router. The Router will reboot with the factory default settings including IP settings Note Use the Firmware Upgrade window to load the latest firmware for the device.
Note that the device configuration settings may return to the factory default settings, so make sure you save the configuration settings with the System Settings window described above. Firmware Upgrade menu To upgrade firmware, type in the name and path of the file or click on the Browse button to search for the file.
Click the Apply button to begin copying the file. The file will load and restart the Router automatically. Type the IP address you want to check in the space provided and click the Ping button. Read the Ping test result in the space immediately below. This is disabled by default. If you are unsure, please check with your ISP. A Ping test may be done through the local or external interface to test connectivity to known IP addresses.
The diagnostics feature executes a series of test of your system software and hardware connections. Use this window when working with your ISP to troubleshoot problems. Use the navigation buttons to view or scroll log pages. You may also save a simple text file containing the log to your computer. Click the Save Log button and follow the prompts to save the file.
View Log window Click Clear Log to delete the current log information. Select the interface for which you want to view packet statistics and the information will appear below. Traffic Statistics window Click Refresh to view traffic information. Below is an illustrated example of how to configure a Windows XP system to automatically obtain IP settings from the Router. Once the protocol has been installed you can configure the system to receive IP settings from the Router.
Note If you are using this Router to provide Internet access for more than one computer, you can use these instructions later to change the IP settings for the other computers. However, you cannot use the same IP address since every computer must have its own IP address that is unique on the local network.
From the Start menu on your desktop, go to Control Panel. From the Start menu, go to Control Panel. Click Network Connections. Right-click on the Local Area Connection icon and select the Properties option from the pull-down menu.
Click on the Properties button. Click Properties. Double-click the Network and Dial-up Connections icon. The Local Area Connection Properties dialog box displays with a list of currently installed network components.
You may be prompted to install files from your Windows installation CD or other media. Follow the instructions to install the files. If prompted, click OK to restart your computer with the new settings. Double-click OK to confirm and save your changes, and then close the Control Panel. Double-click the Network icon. The Network dialog box displays with a list of currently installed network components.
The Select Network Component Type dialog box displays. Select Protocol, and then click Add. The Select Network Protocol dialog box displays. Open the Control Panel window, and then click the Network icon. Click the Obtain an IP address automatically option.
Double-click OK to confirm and save your changes. You will be prompted to restart Windows. Click Yes. In the Network and Dial-up Connections window, right-click the Network icon, and then select Properties. The Network Properties dialog box displays with a list of currently installed network components.
Select Microsoft in the Manufacturers box. You may be prompted to install files from your Windows Me installation CD or other media. Double-click OK twice to confirm and save your changes, and then close the Control Panel.
Windows NT 4. In the Control Panel window, double-click the Network icon. In the Network dialog box, click the Protocols tab.
The Protocols tab displays a list of currently installed network protocols. Click Yes to continue, and then click OK if prompted to restart your computer. Configure Windows NT 4. Open the Control Panel window, and then double-click the Network icon. Click OK twice to confirm and save your changes, and then close the Control Panel. These devices are commonly referred to as microfilters or low pass filters. The two basic styles of low pass filters commonly used are described below.
In-Line Filter In line low pass filters are used for each telephone or telephone device answering machines, Faxes etc. These devices are attached to the telephone cable between the telephone and wall jack.
Filters that install behind the wall plate hidden from view are also available. Make sure you have all the necessary information before you configure the WAN connection.
Most user will only need to change some or all of Most users will only need to enter a User Name and Password. Choose the Connection Type from the pull-down menu located under the User Name and Password entry fields. This defines both the connection protocol and encapsulation method used for your ADSL service. If have not been provided specific information for the Connection Type setting, leave the default setting.
User names and passwords are case-sensitive, so enter this information exactly as given to you by your ISP. This may not be available to all ADSL accounts. Many users will find it convenient to use the default settings together with DHCP service to manage the IP settings for their private network. You will need to supply the IP addres, Subnet mask and Defualt gateway use The Dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, allowing access to a specified host from various locations on the Internet.
To save the system configuration settings, click the Tools tab. You will be presented first with the Administrator Settings window. Up to eight PVCs to eight separate destinations can be created and operated simultaneously utilizing the same bandwidth. Additional PVC connections can be added for various purposes. Select the new PVC to configure from the pull-down menu. These include the more advanced features used for network management and security as well as administrative tools to manage the Router, view statistics and other information used to examine performance and for troubleshooting.
When enabled, it allows other devices that support UPnP to dynamically join a network, obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. The pre-configured rules include those listed in the table here: Category Available Rules Games: Alien vs. Select the User category and click the Add button located below the Available Rules list. This will change the window to look like the window below.
In order to use these advanced features it is necessary to have IP addresses available for configuration. Any filter rule configured in the menu will appear in the Filters List with the new settings. The Router must save the new settings and reboot before the new rules are applied. This may be done for security or to improve network efficiency. The rules are configured for individual devices based on MAC address.
Filter rules can be set up for source, destination or both. This is used to specify that all packets destined for a particular network or subnet use a predetermined gateway. Parental Control menu There are two general types of protection DoS, Port Scan that can be enabled on the Router, as well as filtering for specific packet types sometimes used by hackers. Examples include: attempts to "flood" a network, thereby preventing legitimate network traffic, attempts to disrupt connections between two machines, thereby preventing access to a service, attempts to prevent a particular individual from accessing a service, or, attempts to disrupt service to a specific system or person.
You may also choose to instruct the Router to connect each time you want to access the WAN or the Internet. This configuration works with all ADSL implementations. If you have been given instructions to change the Modulation method used, select the desired option from the Modulation Type drop-down menu and click the Apply button. This will open the following window.
Then select the PVC to associate with the corresponding action and choose a maximum bandwidth and classification for this combination. Selecting ToS will display the following window. QoS Configuration window IP QoS for Application On this window, you can select the mechanism by which the four priority queues are emptied by assigning a weight, in percentage terms, to each priority queue, and then assigning a packet type that can be associated with an application type.
Click the appropriate radio button to view the menu for any of these Wireless Management menus. Up to 4 SSIDs may be used. WDS facilitates roaming between different access points and connectivity to the Ethernet and Internet. No wireless clients can associate with an access point in bridge mode.
0コメント