User Guide
Page 6
... 104 Forgotten Password and Reset to Factory Defaults 104 Wireless Networking 105 Recovering from Corrupted Software 107 Frequently Asked Questions 108 A IP ADDRESSING The Internet Protocol Suite 109 Managing the Router over the Network 109 IP Addresses and Subnet Masks ... Obtain an IP Address and Subnet Mask? 111 DHCP Addressing 111 Static Addressing 111 Auto-IP Addressing 111 B TECHNICAL SPECIFICATIONS OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router 113 Standards 114 C SAFETY INFORMATION D END USER SOFTWARE LICENSE AGREEMENT E OBTAINING SUPPORT FOR YOUR PRODUCT Register Your Product...
... 104 Forgotten Password and Reset to Factory Defaults 104 Wireless Networking 105 Recovering from Corrupted Software 107 Frequently Asked Questions 108 A IP ADDRESSING The Internet Protocol Suite 109 Managing the Router over the Network 109 IP Addresses and Subnet Masks ... Obtain an IP Address and Subnet Mask? 111 DHCP Addressing 111 Static Addressing 111 Auto-IP Addressing 111 B TECHNICAL SPECIFICATIONS OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router 113 Standards 114 C SAFETY INFORMATION D END USER SOFTWARE LICENSE AGREEMENT E OBTAINING SUPPORT FOR YOUR PRODUCT Register Your Product...
User Guide
Page 46
...the SSID field. 44 CHAPTER 5: CONFIGURING THE ROUTER Configuration The Wireless Configuration Screen allows you to turn on/ turn off the wireless function, and set the computer's SSID to a specific network (for any existing wireless network. If you decide to use from the Wireless Mode drop-down menu. 3 Specify the ...you know the name of many wireless network adapters is that a computer's SSID can be used by your wireless network in your area, you can select a network. If there are then displayed in 11b mode only, 11g mode only, or mixed 11b and 11g from the Channel drop-down menu...
...the SSID field. 44 CHAPTER 5: CONFIGURING THE ROUTER Configuration The Wireless Configuration Screen allows you to turn on/ turn off the wireless function, and set the computer's SSID to a specific network (for any existing wireless network. If you decide to use from the Wireless Mode drop-down menu. 3 Specify the ...you know the name of many wireless network adapters is that a computer's SSID can be used by your wireless network in your area, you can select a network. If there are then displayed in 11b mode only, 11g mode only, or mixed 11b and 11g from the Channel drop-down menu...
User Guide
Page 61
... click Auto Search to /from your ISP. Bridge Mode If your ISP to the ISP. Compare with your ISP limits access to the Internet to specific computers, this means that traffic to automatically find out this mode is no fixed timing relationship between samples, but that still need a guaranteed QoS. Internet...
... click Auto Search to /from your ISP. Bridge Mode If your ISP to the ISP. Compare with your ISP limits access to the Internet to specific computers, this means that traffic to automatically find out this mode is no fixed timing relationship between samples, but that still need a guaranteed QoS. Internet...
User Guide
Page 67
Check with your ISP for your ISP provided you with specific DNS addresses to use a domain name, a DNS service must translate the name into the Router. Many ISPs do not have to enter a DNS address. Every time you are alphabetic, they're easier to 198.105.232.4. Figure 51 DNS ... that you do not require you to enter this screen. Because domain names are using a Static IP connection type, you may need to enter a specific DNS address and secondary DNS address for information on IP addresses. If you use , enter them into IP addresses. The Internet however, is really based...
Check with your ISP for your ISP provided you with specific DNS addresses to use a domain name, a DNS service must translate the name into the Router. Many ISPs do not have to enter a DNS address. Every time you are alphabetic, they're easier to 198.105.232.4. Figure 51 DNS ... that you do not require you to enter this screen. Because domain names are using a Static IP connection type, you may need to enter a specific DNS address and secondary DNS address for information on IP addresses. If you use , enter them into IP addresses. The Internet however, is really based...
User Guide
Page 69
... of the packet to the specific port is equipped with sources that the stated destination computer has previously requested the current communication. In addition to hacker attacks, but 3Com recommends that you desire from the Firewall level drop-down menu. 2 Click Apply. Your Router is requested. Turning off the firewall protection will protect your network...
... of the packet to the specific port is equipped with sources that the stated destination computer has previously requested the current communication. In addition to hacker attacks, but 3Com recommends that you desire from the Firewall level drop-down menu. 2 Click Apply. Your Router is requested. Turning off the firewall protection will protect your network...
User Guide
Page 73
...whether these ports are TCP or UDP. 3 Check the Enabled checkbox, then click Apply. Select your application is initialized) in the firewall for the application to work properly with the application vendor to determine which ports need to be opened up in the Trigger Port ... Applications drop-down menu, and click Copy To. Figure 56 Special Applications Screen A list of the Router. Click Apply to save the setting for specific applications to work properly. Firewall 71 Special Applications Special Applications let you choose specific ports to be open for that you specified.
...whether these ports are TCP or UDP. 3 Check the Enabled checkbox, then click Apply. Select your application is initialized) in the firewall for the application to work properly with the application vendor to determine which ports need to be opened up in the Trigger Port ... Applications drop-down menu, and click Copy To. Figure 56 Special Applications Screen A list of the Router. Click Apply to save the setting for specific applications to work properly. Firewall 71 Special Applications Special Applications let you choose specific ports to be open for that you specified.
User Guide
Page 74
...the Popular servers drop-down menu. 3 Specify the public port that will be seen by a firewall, machines from the drop-down menu. If the server that can manually add the virtual server...Then click Add, your internal network. If you need to configure the Virtual Server function for a specific application, you will be configured is not listed in the spaces provided for services such as a ...web server (port 80), FTP server (Port 21), or other applications through your Router to your selection will need to contact the application vendor to find out which the traffic will ...
...the Popular servers drop-down menu. 3 Specify the public port that will be seen by a firewall, machines from the drop-down menu. If the server that can manually add the virtual server...Then click Add, your internal network. If you need to configure the Virtual Server function for a specific application, you will be configured is not listed in the spaces provided for services such as a ...web server (port 80), FTP server (Port 21), or other applications through your Router to your selection will need to contact the application vendor to find out which the traffic will ...
User Guide
Page 76
note that all times should be configured to restrict access to Figure 60 will appear). 74 CHAPTER 5: CONFIGURING THE ROUTER Schedule Rule The Router can be in 24 hour format. 4 Click Apply. Figure 60 Add Schedule Rule Screen 2 Enter a name and comment for the schedule rule in the PC ...Privileges screen (see page 75). Figure 59 Schedule Rule Screen 1 Click Add Rule to add a schedule rule (a screen similar to the Internet, email or other network services at specific days and times. Define the time in this screen, and define the rules...
note that all times should be configured to restrict access to Figure 60 will appear). 74 CHAPTER 5: CONFIGURING THE ROUTER Schedule Rule The Router can be in 24 hour format. 4 Click Apply. Figure 60 Add Schedule Rule Screen 2 Enter a name and comment for the schedule rule in the PC ...Privileges screen (see page 75). Figure 59 Schedule Rule Screen 1 Click Add Rule to add a schedule rule (a screen similar to the Internet, email or other network services at specific days and times. Define the time in this screen, and define the rules...
User Guide
Page 77
...rule: 1 Check the Enable Filtering Function checkbox. 2 Click Add PC (a screen similar to the Internet, email or other network services at specific days and times. Restriction can define the traffic type permitted or not-permitted to the Internet. Figure 61 PC Privileges Screen To edit or... delete specific existing filtering rules, click on Edit or Delete for a single computer, a range of computers, or multiple computers. Figure 62 PC Privileges Add PC Screen Firewall 75 PC Privileges The Router can be set for the appropriate filtering rule.
...rule: 1 Check the Enable Filtering Function checkbox. 2 Click Add PC (a screen similar to the Internet, email or other network services at specific days and times. Restriction can define the traffic type permitted or not-permitted to the Internet. Figure 61 PC Privileges Screen To edit or... delete specific existing filtering rules, click on Edit or Delete for a single computer, a range of computers, or multiple computers. Figure 62 PC Privileges Add PC Screen Firewall 75 PC Privileges The Router can be set for the appropriate filtering rule.
User Guide
Page 81
... the Allow/Deny option. Server Control The Router can define the traffic type permitted or not-permitted to filter out the content that contains the specific subject matter. Restriction can define what content should be filtered out if the Allow option is used to the Internet. Firewall 79 4 If you are not sure...
... the Allow/Deny option. Server Control The Router can define the traffic type permitted or not-permitted to filter out the content that contains the specific subject matter. Restriction can define what content should be filtered out if the Allow option is used to the Internet. Firewall 79 4 If you are not sure...
User Guide
Page 86
... checkbox. Computer hackers use what is an Internet Draft proposed to IETF in a specific way to the Internet) than This issue may also occur. ■ IPSEC NAT-T Pass-through NAT Routers. Other problems may occur if the Windows XP-based Internet Connection Sharing host computer ...Ping Blocking - NAT-T (NAT Traversal) is known as it needs the firewall configured. Click Apply to the Internet Connection Sharing client). By pinging a specific IP address and receiving a response from the outside. The Router can determine that is larger than it will not respond to an Internet ...
... checkbox. Computer hackers use what is an Internet Draft proposed to IETF in a specific way to the Internet) than This issue may also occur. ■ IPSEC NAT-T Pass-through NAT Routers. Other problems may occur if the Windows XP-based Internet Connection Sharing host computer ...Ping Blocking - NAT-T (NAT Traversal) is known as it needs the firewall configured. Click Apply to the Internet Connection Sharing client). By pinging a specific IP address and receiving a response from the outside. The Router can determine that is larger than it will not respond to an Internet ...
User Guide
Page 87
This is dropped. To allow PCs from that specific subnet group to use this allows any Internet Host, this ...Administration Password. Advanced 85 the MTU size on the Internet. MSS clamping will be blocked by some firewalls. This feature allows you have set the MSS value low enough to use the remote administration. Four ...administration. ■ Select Enable administration from any computer to go through the firewall, enable MSS Clamping. However, this message may be able to manage the Router. ■ Select Enable administration from a whole Subnet Internet Host, and...
This is dropped. To allow PCs from that specific subnet group to use this allows any Internet Host, this ...Administration Password. Advanced 85 the MTU size on the Internet. MSS clamping will be blocked by some firewalls. This feature allows you have set the MSS value low enough to use the remote administration. Four ...administration. ■ Select Enable administration from any computer to go through the firewall, enable MSS Clamping. However, this message may be able to manage the Router. ■ Select Enable administration from a whole Subnet Internet Host, and...
User Guide
Page 112
...within the network. See Table 3 for an example about how a network with three computers and a Router might be different is '192.168.100.8'. In using the Router, you will be configured. The only value that will probably only encounter two types of '255....255.255.0'. Table 3 IP Addressing and Subnet Masking Device PC 1 PC 2 PC 3 Router IP Address 192.168.100.8 192.168.100.33 192.168.100.188 192.168.100.72 Subnet Mask 255.255.255...subnet mask structures. This type of this IP address. An example IP address is the specific host device number.
...within the network. See Table 3 for an example about how a network with three computers and a Router might be different is '192.168.100.8'. In using the Router, you will be configured. The only value that will probably only encounter two types of '255....255.255.0'. Table 3 IP Addressing and Subnet Masking Device PC 1 PC 2 PC 3 Router IP Address 192.168.100.8 192.168.100.33 192.168.100.188 192.168.100.72 Subnet Mask 255.255.255...subnet mask structures. This type of this IP address. An example IP address is the specific host device number.
User Guide
Page 115
... 5.5, 2, or 1 Mbps Maximum channels: 13 Range up to 304.8m (1000ft) Sensitivity: 1, 2, 5.5 Mbps: -85 dBm; 11 Mbps -82 dBm typical Modulation: CCK, BPSK, QPSK Encryption: 40/64 bit WEP, 128 bit WEP, WPA Maximum clients: 128 O/P Power 16dBm OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router Interfaces DSL connection LAN connection - B TECHNICAL SPECIFICATIONS This section lists the technical specifications for the OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router.
... 5.5, 2, or 1 Mbps Maximum channels: 13 Range up to 304.8m (1000ft) Sensitivity: 1, 2, 5.5 Mbps: -85 dBm; 11 Mbps -82 dBm typical Modulation: CCK, BPSK, QPSK Encryption: 40/64 bit WEP, 128 bit WEP, WPA Maximum clients: 128 O/P Power 16dBm OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router Interfaces DSL connection LAN connection - B TECHNICAL SPECIFICATIONS This section lists the technical specifications for the OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router.
User Guide
Page 116
114 APPENDIX B: TECHNICAL SPECIFICATIONS Operating Temperature 0 °C to 40 °C (32 °F to 105 °F) Power 8VA, 25 BThU/hr Humidity 0% to 90% (non-condensing) humidity Dimensions ■ Width = ... (8.7 in.) ■ Depth = 133 mm (5.2 in.) ■ Height = 38 mm (1.5 in.) Weight Approximately 550 g (1.1 lbs) Standards Functional: ISO 8802/3 IEEE 802.3 IEEE 802.11b, 802.11g Safety: EN 60950-1: 2001 UL 60950-1 IEC 60950-1: 2001 EMC: FCC Part15 B EN 55022 EN 55024 EN 61000 EN 301 489-1 ICES-003 Radio FCC...
114 APPENDIX B: TECHNICAL SPECIFICATIONS Operating Temperature 0 °C to 40 °C (32 °F to 105 °F) Power 8VA, 25 BThU/hr Humidity 0% to 90% (non-condensing) humidity Dimensions ■ Width = ... (8.7 in.) ■ Depth = 133 mm (5.2 in.) ■ Height = 38 mm (1.5 in.) Weight Approximately 550 g (1.1 lbs) Standards Functional: ISO 8802/3 IEEE 802.3 IEEE 802.11b, 802.11g Safety: EN 60950-1: 2001 UL 60950-1 IEC 60950-1: 2001 EMC: FCC Part15 B EN 55022 EN 55024 EN 61000 EN 301 489-1 ICES-003 Radio FCC...
User Guide
Page 117
OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router 115 System Requirements Operating Systems The Router will support the following cable types and maximum lengths: ■ Category 3 (Ethernet) or Category 5 (Fast Ethernet or Dual Speed Ethernet) Twisted Pair - shielded and unshielded cable types. ■ Maximum cable length of 100m (327.86 ft). Cable Specifications The Router supports the following Operating Systems: ■...
OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router 115 System Requirements Operating Systems The Router will support the following cable types and maximum lengths: ■ Category 3 (Ethernet) or Category 5 (Fast Ethernet or Dual Speed Ethernet) Twisted Pair - shielded and unshielded cable types. ■ Maximum cable length of 100m (327.86 ft). Cable Specifications The Router supports the following Operating Systems: ■...
User Guide
Page 131
...and environment. 802.11g The IEEE specification for 100 Mbps Fast Ethernet over Category 5 twisted-pair cable. It offers lower performance than infrastructure mode, which acts as a bridge between wireless clients and a ...each other wireless clients and which is the mode the router uses. (see also Infrastructure mode.) The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data rates....10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-TX The IEEE specification for wireless Ethernet which allows speeds of up to 54 Mbps. It is a...
...and environment. 802.11g The IEEE specification for 100 Mbps Fast Ethernet over Category 5 twisted-pair cable. It offers lower performance than infrastructure mode, which acts as a bridge between wireless clients and a ...each other wireless clients and which is the mode the router uses. (see also Infrastructure mode.) The standard provides for 6, 12, 24, 36, 48 and 54 Mbps data rates....10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-TX The IEEE specification for wireless Ethernet which allows speeds of up to 54 Mbps. It is a...
User Guide
Page 133
... wireless clients. ESSID Extended Service Set Identifier. Firewall Electronic protection that is designed to wireless data transmissions. A DSL modem uses your existing phone lines to transmit packets at the same time and, in typing "3com.com" into the Router and each of security to operate at 100 Mbps....34.45.8). Half Duplex A system that allows packets to transmitted and received, but not at high speeds. Ethernet A LAN specification developed jointly by the computers on your home network is a unique identifier for Domain Name System, which allows Internet host computers to...
... wireless clients. ESSID Extended Service Set Identifier. Firewall Electronic protection that is designed to wireless data transmissions. A DSL modem uses your existing phone lines to transmit packets at the same time and, in typing "3com.com" into the Router and each of security to operate at 100 Mbps....34.45.8). Half Duplex A system that allows packets to transmitted and received, but not at high speeds. Ethernet A LAN specification developed jointly by the computers on your home network is a unique identifier for Domain Name System, which allows Internet host computers to...
User Guide
Page 140
... to the licensed service, this device must accept any interference received, including interference that may cause undesired operation. 3Com OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router Model WL-552 INDUSTRY CANADA - Equipment (or its gain should be so chosen that the equivalent isotropically radiated .... Operation is subject to these or other users, the antenna type and its transmit antenna) that the Industry Canada technical specifications were met. L ' utilisation de ce dispositif est autorisee seulement aux conditions suivantes: (1) il ne doit pas produire de...
... to the licensed service, this device must accept any interference received, including interference that may cause undesired operation. 3Com OfficeConnect ADSL Wireless 54Mbps 11g Firewall Router Model WL-552 INDUSTRY CANADA - Equipment (or its gain should be so chosen that the equivalent isotropically radiated .... Operation is subject to these or other users, the antenna type and its transmit antenna) that the Industry Canada technical specifications were met. L ' utilisation de ce dispositif est autorisee seulement aux conditions suivantes: (1) il ne doit pas produire de...