Bipac 7300nx setup


















When the Network and Sharing Center window pops up, select and click on Change adapter settings on the left window panel. Select the Local Area Connection, and right click the icon to select Properties.

Then click OK to exit the setting. Click on Network. Then click on Network and Sharing Center at the top bar. When the Network and Sharing Center window pops up, select and click on Manage network connections on the left window pane.

In the Control Panel, double-click on Network Connections 2. Double-click Local Area Connection. Click OK to finish the configuration. In the Control Panel, double-click on Network and choose the Configuration tab.

Select the Obtain an IP address automatically radio button. Then select the DNS Configuration tab. In the Control Panel, double-click on Network and choose the Protocols tab. Start IP Address: The default values are shown below. Gather the information as illustrated in the following table and keep it for reference. To configure this device, you must have IE 5. After this, you can surf Internet right away. Follow the Easy Sign-On configuration wizard and it will guide you to complete the basic network configuration.

Click continue. Show Auto scan result - Protocol information. Wait for the device to be configured. Save Configuration. Web Configuration Open your web browser, enter the IP address of your router, which by default is System Up-Time: Records system up-time.

Connection: The current connection status. Gateway: The IP address of the default gateway. It is case sensitive and must not excess 32 characters. Make sure your wireless clients have exactly the ESSID as the device, in order to get connected to your network. The default mode of wireless security is Disable. For more information , turn to wireless security for help.

Username: Enter the username provided by your ISP. You can input up to alphanumeric characters case sensitive. Password: Enter the password provided by your ISP. You can input up to alphanumeric characters case sensitive Service Name: This item is for identification purposes. If it is required, your ISP provides you the information. Maximum input is 15 alphanumeric characters. Select the one provided by your ISP Auth. Protocol: Default is Auto.

Leave this at 0. The size of the largest datagram excluding media-specific headers that IP will attempt to send through the interface. For detail, please turn to ADSL profile. If you are uncertain what services are available to you, and then please select Automatic. The service provider is able to attach anything to an APN to create a data connection, requirements for APNs varies between different service providers.

Most service providers have an internet portal which they use to connect to a DHCP Server, thus giving you access to the internet i. Authentication Protocol: Default is Auto. A PIN code is a numeric value used in certain systems as a password to gain access, and authenticate. Default setting is Disable.

In this case, if you want to join this wireless network, enter the exactly ESSID manually and some security settings. America , Europe, France, etc. The Channel ID will be different based on this setting. As long as the passwords match, a client will be granted access to a WLAN. If you want to use wireless, you can select Enable. For security propose, change to a unique ID name which is already built into the router wireless interface.

It is case sensitive and must not exceed 32 characters. Make sure your wireless clients have exactly the ESSID as the device in order to connect to your network. The input format is in character style and key size should be in the range between 8 and 63 characters. This process is done automatically. Default value is Thus, any clients using the wireless setting to search for available or specific router on the network will not be able to discover the router whose Hide ESSID function is set to enabled.

The default setting is disabled. The input format is in character style and the key size should be in the range between 8 and 63 characters. Note: Wireless performance may degrade if the selected channel ID is already being occupied by other AP s. If you do not have any wireless, select Disable. WEP Authentication: To prevent an unauthorized wireless station from accessing the data transmitted over the network, the router offers a secure data encryption, known as WEP. There are 3 options to select from: Open System, Shared key or both.

Key : Enter the key to encrypt wireless data. To allow encrypted data transmission, the WEP Encryption Key values on all wireless stations must be the same as the router. There are four keys for your selection. Click Apply to confirm the settings. Host Name lets you change the router name. Current time: Set the current time. See the Time Zone section for more information. Hardware Version: Device version. Software Version: Firmware version. Click the link, the following will appear.

Upstream: Upstream rate. Downstream: Downstream rate. Line Attenuation Upstream : This is attenuation of signal in upstream. Line Attenuation Downstream : This is attenuation of signal in downstream. Refresh: Press this button to get the latest statistics. Click Status to go to 3G configuration page. Signal Strength: The signal strength bar indicates current 3G signal strength. Network Name: The network name that the device is connected to. Card Name: The name of the 3G card.

Card Firmware: The current firmware for the 3G card. See the Firewall section of this manual for more information on this feature. Interface: The interface name on the router that this IP address connects to. Register Information: Register time information. You can trace historical information with this function. Please see the Firewall section of this manual for more details on how to enable Firewall logging. Name: the description of this application.

Internal Port: the internal service port. IP Address: the internal host IP address. Click Continue to go to next step. Or select Manually to go to step 4.

Step 3: wait when the ADSL is scanning. Also you can Abort to manually setting and go to next step 4. Step 4: type the username and password provided by your ISP. Click Continue to go on. Step 5: wait while the device is configured. Step 6: WAN connection configuration is successful. Step 7: Click Next to Wireless to do wireless configuration. For detail, please turn to WLAN in this manual for help. Step 8: wait while saving configuration to Flash.

Step 9: success. Protocol: The current ATM protocol in the device Click on the Continue button and wait for your connection to be connected. If connection is successful the following image will be shown.

Each IP address entered in the fields must be in the appropriate IP form, which is four IP octets separated by a dot x. The Router will not accept the IP address if it is not in this format. Netmask: Type the subnet mask assigned to you by your ISP if given. Service Name: Enter a name for this connection. The size of the largest datagram excluding media-specific headers an IP attempts to send through the interface. Click on the Continue button and wait for your connection to be connected.

TEL No. Username: The username provided by your service provider. These functions are described in the following sections. Users usually only have one subnet in their LAN. The default IP address for the router is Netmask: The default subnet mask on this router. It helps to connect two or more local networks to the ISP or remote node. In this case, an internal router is not required. Netmask: Specify a subnet mask on this virtual interface.

Press Add to apply and the corresponding information will be listed below. Click Edit radio button, then the item you want to reedit will be displayed above just as showed below. Time Schedule: A self-defined time period. You may specify a time schedule for your 65 Here we provide two groups of Time Schedule setting. You can flexibly set the time you want the wireless connection works. If you select Always On in group1, then the group2 is disabled. While if you select any other item from the group1 drop-down menu, the group2 will be activated.

Select the timeslot you want, then the wireless will work according to the time of the two time schedule settings. That is to say you can flexibly set the time the wireless works. For example, if you select TimeSlot1 in group1, then the group2 is activated, you can select a timeslot from the drop-down menu, then the wireless connection will perform according to the two timeslots you have set.

For setup and detail, refer to Time Schedule section. Mode: The default setting is If you do not know or have both 11g and 11n devices in your network, then keep the default in mixed mode.

From the drop-down manual, you can select If you have only 11b card, then select If you have only 11n card, then select The higher the bandwidth the better the performance will be. Note: This parameter appears only when you select one of the item as the following graph Tx Power Level: It is function that enhances the wireless transmitting signal strength. User may adjust this power level from minimum 0 up to maximum Note: The Power Level maybe different in each access network user premises environment and choose the most suitable level for your network.

It is not allowed to configure via WCN. It can be configured via WCN. Enable: Check to activate WMM feature. Disable: Check to deactivate WMM feature. Wireless Distribution System WDS It is a wireless access point mode that enables wireless link and communication with other access point.

WDS takes advantages of cost saving and flexibility which no extra wireless client device is required to bridge between two access points and extending an existing wired or wireless infrastructure network to create a larger network.

Default value is seconds. Security Mode: You can choose the type of security mode you want to apply from the drop-down menu. The Default algorithm is AES. WEP Authentication: To prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers secure data encryption, known as WEP.

This feature greatly simplifies the steps needed to create a Wi-Fi network for a residential or an office setting. Ralink Utility. Then press the PIN button located on the middle left of the page to run the scan. Then press Start. Set the Config Mode as Registrar. Now to make sure that the setup is correctly done, cross check to see if the SSID and the security setting of the registrar setting match with the parameters found on both Wireless Configuration and Wireless Security Configuration page.

The parameters on both Wireless Configuration and Wireless Security Configuration page are as follows:. PBC Method: 1. Set the Config Mode as Enrollee. When the PBC button is pushed, a wireless communication will be established between your router and the PC.

Access the Wireless configuration of the web GUI. These details are sent to the DHCP client i. Click Apply to enable this function. Fixed Host: click Fixed Host link to enter, the following will appear.

Click Add to add the item, and the corresponding message will be listed below. Use this function only if advised to do so by your network administrator or ISP. When enabled, the following parameters will be available. Backup Port: 3G. Click make it as a backup. Connectivity Decision: Enter the value for the times when probing failed to switch backup port. Failover Probe Cycle: Set the time duration for the Failover Probe Cycle to determine when the router will switch to the backup connection backup port once the main connection main port fails.

Failback Probe Cycle: Set the time duration for the Failback Probe Cycle to determine when the router will switch back to the main connection main port from the backup connection backup port once the main connection communicates again. Detect Rule either one : 1. ADSL Down 2. It means to disable the ping fail detection. The host must be an IP address. Click Apply to confirm the change. Description: A user-definable name for this connection. In this mode, you must set Idle Timeout value at same time.

Idle Timeout: Auto-disconnect the broadband firewall gateway when there is no activity on the line for a predetermined period of time. The minimum value is 10 minutes. You must fill the MAC address specified by your service provider when this information is required.

The default setting is set to disable. It provides access control and billing functionality in a manner similar to dial-up services using PPP. Description: User-definable name for the connection. Encapsulation method: Select the encapsulation format, the default is LLC. Select the The size of the largest datagram excluding media-specific headers that the IP attempts to send through the interface.

Description: Your description of this connection. Select the one provided by your ISP. Keep Alive: Set Enable to keep the router on line and prevent to be disconnected by the ISP when they think there is no activity on the line. Netmask: The default is User can change it to other such as You can input up to Line Speed: Set the downstream and upstream of your connection in kilobytes per second.

The connection speed is used by QoS settings. Leave it as Disabled if you do not wish to change the MAC address of your router. If you are uncertain what services are available to you, then please select Automatic. It may provide by your mobile service provider. The username and password are case sensitive.

Keep Alive: Check Enable to allow the router to send message out every 30sec to prevent the connection being dropped by ISP. Connection on Demand: If you want to establish a 3G session only when there is a packet requesting access to the Internet. The idle timeout value is not allowed to be set under 10 seconds. Default is seconds. Choose your local time zone, click Enable and click the Apply button.

After a successful connection to the Internet, the router retrieves the correct local time from the SNTP server you have specified. If you prefer to specify an SNTP server other than those in the drop-down list, simply enter its IP address as shown above. Think of your router as a dedicated computer, and the firmware as the software it runs.

Over time this software may be improved and modified. Your router allows you to upgrade the software it runs to take advantage of these changes.

Clicking on Browse allows you to select the new firmware image file you have downloaded to your PC. Once the correct file is selected, click Upgrade to update the firmware in your router. New Firmware Image: Type in the location of the file you wish to upload in this field or click Browse… to locate it.

Browse…: Click Browse… to find the file with the. Remember that you must decompress compressed. Upgrade: Click upgrade to begin the upload process. This process may take up to three minutes. DO NOT power down the router or interrupt the firmware upgrade while it is still in process. Improper operation may damage the router. Please see section 2. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mistakes.

Press Backup to select where on your local PC to save the settings file. You may also change the name of the file when saving if you wish to keep multiple backups. Press Browse… to select a file from your PC to restore. Settings files saved to your PC should not be manually edited in any way. Select the settings files you wish to use, and press Restore to load those settings into the router. If you wish to restart the router using the factory default settings for example, after a firmware upgrade or if you have saved an incorrect configuration , select Factory Default Settings to reset to factory default settings.

You can set up multiple user accounts, each with their own password. Once you have clicked Edit on the account you want to edit, the information of the account will be displayed above. Just go ahead and change the password.

These options are the same when creating a user account, with the exception that once created you cannot change the username. Password: Enter the password of your email account. Username: Enter the name for the account. Password: Set the password for the account. Login: This option specifies the maximum number of users both anonymous and non-anonymous that are allowed to be using the FTP server simultaneously.

Samba Access: If you enable this function, this account has the access authority to Samba Server. Service Name: enter the name for this Samba service. Home Directory: the home directory for the account. Add: Click this button to add a new account and it will appear at the bottom table. In the above example, we add a user named test.

And the user is granted with authority of FTP and Samba server access. Use Samba server, please enable first. In the listing, all the folders in the USB device will be shown. For example, in the following diagram, you will Folder home and ytt. Directory Name Enter the directory name which you wish to create in the Directory Name field. Enter directory name in the directory name field and choose partition path which the directory will located.

Are you sure to deleter data? Workgroup: Enter the workgroup name in this field which should be same as workgroup name for PCs.

In Network Neighborhood, you will find this Samba server name. Click Apply to confirm the configuration. In User Management section, set the authority for the user. Default setting is set to disable. Anonymous Login: Enable or disable Anonymous Login. Anonymous Permit: Enable or disable Anonymous Permit. Users: This option specifies the maximum number of user accounts. Stay Timeout: Enter the Stay timeout value.

Auto-disconnect when there is no activity for a predetermined period of time. The default value is seconds. Click Apply to save the configuration. Firewall: Prevents access from outside your network. This natural firewall is on when the NAT function is enabled. When using Virtual Servers port mapping your PCs are exposed to the ports specified opened in your firewall packet filter settings.

Firewall Security and Policy General Settings : Inbound direction of Packet Filter rules prevent unauthorized computers or applications accessing your local network from the Internet.

Intrusion Detection: Enable Intrusion Detection to detect, prevent, and log malicious attacks. This configuration program allows you to set up to 6 different filter rules for different users based on their IP addresses or their network Port number.

As long as one of the rules is satisfied, the specified action will be taken. Rule Name: Users-define description to identify this entry. The maximum name length is 32 characters, and then can choose application that they want from listbox. Input the range you want to filter out. If you leave empty or 0. Select TCP if you wish to search for the connection-based application service on the remote server using the port number.

Or select UDP if you want to search for the connectionless application service on the remote server using the port number. Action: If a packet matches this filter rule, Forward allows the packets to pass or Drop disallow the packets to pass this packet. It is recommended that this option be configured by an advanced user.

Direction: Determine whether the rule is for outgoing packets or for incoming packets. Time Schedule: It is self-defined time period. You may specify a time schedule for your prioritization policy. Add: Click this button to add a new packet filter rule and the added rule will appear at the bottom table. Edit: Check the Rule No. Delete: Check the Rule No. Reorder: Be aware that packet filtering parameters appear in priority order i.

Click Add to add the item configured and the corresponding information will be listed below just as the following. The easiest and safest way is that the filtered IP address is assigned to a specific PC that is not allowed to access an outside resource such as the Internet.

You configure the filtered IP address manually for this PC, but it stays in the same subnet with the router. There are no pre-defined MAC address filter rules; you can add the filter rules to meet your requirements. The format of MAC address could be: xx:xx:xx:xx:xx:xx or xx-xx-xx-xx-xx-xx. This feature is disabled by default. Check Allow or Block to activate the filter. Time Schedule: A self defined time period.

For Add, Edit, Delete, see the Packet filter. The router automatically detects and blocks a DoS Denial of Service attack if a user enables this function. This kind of attack is not to access confidential data on the network; instead, it aims to disrupt specific equipment or the entire network. If this happens, users will have trouble accessing the network resources. Intrusion Detection: Check Enable if you wish to detect intruders accessing your computer without permission. Log: Check Log if you wish to generate logs when the filer rule is applied to the Intrusion Detection.

There are no pre-defined URL filter rules; you can add filter rules to meet your requirements. When enabled, your specified keywords list is checked to see if any keywords are present in URLs accessed to determine if the connection attempt should be blocked. Domains Filtering: Checks the domain name in URLs accessed against your list of domains to block or allow.

The checking procedure is: 1. Check the domain in the URL to determine if it is in the trusted list. If yes, the connection attempt is sent to the remote web server. If not, it is checked with the forbidden list. If present, the connection attempt is dropped. If the packet matches neither of the above, it is sent to the remote web server. For example to block traffic to www. QoS: Keeping Your Net Connection Fast and Responsive Configurable by internal IP address, external IP address, protocol, and port, the Quality of Service QoS gives you full control over which types of outgoing data traffic should be given priority by the router, ensuring bandwidth-consumption data like gaming packets, latency-sensitive application like voice, or even mission critical files, move through the router at lightning speed, even under heavy load.

You can throttle the speed at which different types of outgoing data pass through the router. In addition, you can simply change the priority of different types of upload data and let the router sort out the actual speeds. This page will show the brief information for policies you have added or edited. This page will also display the total available Non-assigned bandwidth, in percentage, can be assigned. Application: A name that identifies an existing policy. Direction: The traffic flow direction to be controlled by the QoS policy.

You can assign the priority for the application or you can limit the rate your application used. Protocol: The Protocol will be controlled. For other protocols, at least one value shall be given. Note: To be sure the router s in the backbones network have the capability in executing and checking the DSCP through-out the QoS network.

It also is the maximal rate for this policy. When you choose Limited, type the Ratio proportion. If you choose Prioritization for the rule, you parameter Priority would be available, you can set the priority for this rule.

Ratio: Assign the data ratio for this policy to be controlled. For 0. Priority: Specify the priority for the bandwidth. You can specify which application can External Ports: The Application port values for remote machines you want to control.

Time Schedule: Scheduling your prioritization policy. Data Always rate. Data rate. VoIP application Voice is latency-sensitive application. In TCP and UDP networks a port is a bit number used to identify which application program usually a server incoming connections should be delivered to.

Servers follow the well-known port assignments so clients can locate them. If you wish to run a server on your network that can be accessed from the WAN i. You also need to use port forwarding if you wish to host an online game server. The reason is that when using NAT, your publicly accessible IP address is used by and points to your router, which needs to deliver all traffic to the private IP addresses used by your PCs.

Port numbers range from 0 to , but only port numbers 0 to are reserved for privileged services and are The registered ports are numbered from through The remaining ports, referred to as dynamic ports, or private ports, are numbered from through Application: Select the service you wish to configure Protocol: Automatic when you choose Application from listbox or select a protocol type which you want.

Internal IP Address: Enter the IP address of a specific internal server to which requests from the specified port is forwarded. Add: Click to add a new virtual server rule. Click again and the next figure appears. When your router needs to allow outside users to access internal servers, e. You can set up a local server with a specific port number for the service to use, e.

When an incoming access request to the router for a specified port is received, it is forwarded to the corresponding internal server. If the port is not listed as a predefined application, you need to add it manually.

In addition to specifying the port number used, you also need to specify the protocol used. The protocol is determined by the particular application. Using port mapping does have security implications, since outside users are able to connect to PCs on your network.

If the DHCP server option is enabled, you have to be very careful in assigning the IP addresses of the virtual servers in order to avoid conflicts. You can configure the virtual server IP address manually, but it must still be in the same subnet as the router.

In each time profile, you may schedule specific day s i. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. Refer to Time Zone for details. You router time should correspond with your local time. If the time is not set correctly, your Time Schedule will not function properly.

Name: A user-define description to identify this time portfolio. Day in a week: The default is set from Sunday through Saturday. You may specify the days for the schedule to be applied. Start Time: The default is set at AM. You may specify the start time of the schedule.

End Time: The default is set at PM. You may specify the end time of the schedule. Select the Apply button to apply your changes. Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff.

Destination: The destination subnet IP address. Netmask: Subnet mask of the destination IP addresses based on above destination. Gateway: The gateway IP address to which packets are forwarded. Interface: Select the interface through which packets are forwarded.

Cost: Represents the cost of transmission for routing purposes. The number need not be precise, but it must be between 0 and Click Add to confirm the settings.

This is especially useful for hosting servers via your ADSL connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.

The fields following are activated and required. Domain Name, Username and Password: Enter your registered domain name and your username and password for this service.

In addition to updating periodically as per your settings, the router will perform an update when your dynamic IP address changes. If the period is 0, the router will check the DNS server every 5 min. The default value is the standard HTTP port, You may specify an alternative if, for example, you are running a web server on a PC within your LAN.

The router only allows User A access from the IP address After minutes, the device automatically logs out User A. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings, removing the need for the user to control advanced configuration of their device.

Windows does not support UPnP. It is highly recommended you use this port value. If this value conflicts with other ports already in use you may wish to change the port. Step 1: Click Start and Control Panel. Click Details.



0コメント

  • 1000 / 1000