User Guide
Page 9
... The advantages of the Router include: ■ Shared Internet connection for both wired and wireless computers ■ High speed 802.11g wireless networking ■ No need for a dedicated, "always on your retailer. Firewall protection against Internet hacker ... filter Package Contents The Router kit includes the following items: ■ One OfficeConnect Wireless 54Mbps/108Mbps 11g cable/DSL Router ■ One power adapter for use , Web-based setup and configuration ■ Provides centralization of these items are missing or damaged, please contact your network ■ Security -
... The advantages of the Router include: ■ Shared Internet connection for both wired and wireless computers ■ High speed 802.11g wireless networking ■ No need for a dedicated, "always on your retailer. Firewall protection against Internet hacker ... filter Package Contents The Router kit includes the following items: ■ One OfficeConnect Wireless 54Mbps/108Mbps 11g cable/DSL Router ■ One power adapter for use , Web-based setup and configuration ■ Provides centralization of these items are missing or damaged, please contact your network ■ Security -
User Guide
Page 16
...Router with another stackable OfficeConnect unit. 20 CHAPTER 2: HARDWARE INSTALLATION When positioning your Router, ensure: ■ It is out of direct sunlight and away from sources of heat. ■ Cabling is away from moving around the unit and through the vents in the side of the case is not restricted. 3Com...in .) clearance. Wall Mounting There are stacking your Router. When wall mounting the unit, ensure that can be used for details on your desk or when stacking with the Router. You will need two suitable screws to secure. When in line, gently push the unit on ...
...Router with another stackable OfficeConnect unit. 20 CHAPTER 2: HARDWARE INSTALLATION When positioning your Router, ensure: ■ It is out of direct sunlight and away from sources of heat. ■ Cabling is away from moving around the unit and through the vents in the side of the case is not restricted. 3Com...in .) clearance. Wall Mounting There are stacking your Router. When wall mounting the unit, ensure that can be used for details on your desk or when stacking with the Router. You will need two suitable screws to secure. When in line, gently push the unit on ...
User Guide
Page 41
The default URL is http://192.168.1.1 but if you click on a topic from wireless computers, configures WPA or WEP encryption, and provides facilities for improving the security of the Router's firewall features: Virtual Servers, Special Applications, PCs Privileges, URL Filtering, Content Filtering and SPI options ■ System Tools - Main Menu At the left...
The default URL is http://192.168.1.1 but if you click on a topic from wireless computers, configures WPA or WEP encryption, and provides facilities for improving the security of the Router's firewall features: Virtual Servers, Special Applications, PCs Privileges, URL Filtering, Content Filtering and SPI options ■ System Tools - Main Menu At the left...
User Guide
Page 42
... status and activity logs of tabs (see Figure 29 for further assistance and guidance relating to monitor and configure the Router's advanced features, including RIP, DDNS and Security. ■ Status and Logs - Welcome Screen The Welcome section allows you to view the Notice board and to the...page may also provide sub-sections which provides access to provide 3Com with feedback on the required tab. To access a sub-section, simply click on your Password. You can also gain access to change your Router. allows you to the context-sensitive online help system and allows...
... status and activity logs of tabs (see Figure 29 for further assistance and guidance relating to monitor and configure the Router's advanced features, including RIP, DDNS and Security. ■ Status and Logs - Welcome Screen The Welcome section allows you to view the Notice board and to the...page may also provide sub-sections which provides access to provide 3Com with feedback on the required tab. To access a sub-section, simply click on your Password. You can also gain access to change your Router. allows you to the context-sensitive online help system and allows...
User Guide
Page 46
To improve the security of your wireless network, 3 Com recommends that you: 1.Change the SSID from its default value 2.Enable Encryption 3.Enable Connection Control 50 CHAPTER 5: ROUTER CONFIGURATION Wireless Settings The Wireless Settings menu provides options described in the following sections.
To improve the security of your wireless network, 3 Com recommends that you: 1.Change the SSID from its default value 2.Enable Encryption 3.Enable Connection Control 50 CHAPTER 5: ROUTER CONFIGURATION Wireless Settings The Wireless Settings menu provides options described in the following sections.
User Guide
Page 48
... Name/SSID of your wireless network, whick reduces the security of your Router as it once you will not list the Router SSID unless this feature after you want to use to connect, provided that they are supplied with the SSID. 3Com recommends that the PC is...THe clients will accept any wireless client to name your wireless LAN. SSID If required, enter a name that you to see your Wireless network. By default the Router uses the name "3Com". 3Com recommends that you have set up the Router and wireless clients. 52 CHAPTER 5: ROUTER CONFIGURATION Service Area Name/SSID ...
... Name/SSID of your wireless network, whick reduces the security of your Router as it once you will not list the Router SSID unless this feature after you want to use to connect, provided that they are supplied with the SSID. 3Com recommends that the PC is...THe clients will accept any wireless client to name your wireless LAN. SSID If required, enter a name that you to see your Wireless network. By default the Router uses the name "3Com". 3Com recommends that you have set up the Router and wireless clients. 52 CHAPTER 5: ROUTER CONFIGURATION Service Area Name/SSID ...
User Guide
Page 49
...connections or through your connections to remember that with encryption disabled, anyone with a Wireless PC can configure wireless security such as the last step. You can eavesdrop on your network. 3Com recommends that you get the network working with user configurable fixed keys. WPA ...simplify setting up wireless networks, it as WEP or WPA encryption on the Router, you use WPA with keys that you must reconfigure your wireless clients support WPA All of security, provided by the Router secure data transmitted through wireless communications between the Router and its ...
...connections or through your connections to remember that with encryption disabled, anyone with a Wireless PC can configure wireless security such as the last step. You can eavesdrop on your network. 3Com recommends that you get the network working with user configurable fixed keys. WPA ...simplify setting up wireless networks, it as WEP or WPA encryption on the Router, you use WPA with keys that you must reconfigure your wireless clients support WPA All of security, provided by the Router secure data transmitted through wireless communications between the Router and its ...
User Guide
Page 50
If you . WEP Key1-4:Manaually assign a passphrase for each key. Click Save to be the active key. Encryption: Choose from the Security Mode. TX Key:Select a key to save the setting If you selected 64 bits encryption, enter 10 HEX characters (0-F) for each key. 54 CHAPTER 5: ROUTER CONFIGURATION WEP To enable WEP, select WEP from 64 bits or 128 bits Passphrase:You can enter a passphrase and click on the Generate button and the router will automatically generate four WEP keys for you selected 128 bits encrtpyion,enter 26 HEX characters (0-F) for each key.
If you . WEP Key1-4:Manaually assign a passphrase for each key. Click Save to be the active key. Encryption: Choose from the Security Mode. TX Key:Select a key to save the setting If you selected 64 bits encryption, enter 10 HEX characters (0-F) for each key. 54 CHAPTER 5: ROUTER CONFIGURATION WEP To enable WEP, select WEP from 64 bits or 128 bits Passphrase:You can enter a passphrase and click on the Generate button and the router will automatically generate four WEP keys for you selected 128 bits encrtpyion,enter 26 HEX characters (0-F) for each key.
User Guide
Page 51
Key Renewal:Enter the desired key renewal time in seconds. LAN Settings 55 WPA To enable WPA, select WPA-PSK or WPA2-PSK from the Security Mode. Click Save to 63 characters long. Encryption Methods: Select either TKIP or AES as the encryption method. Passphrase:Enter a passphrase between 8 to save the setting.
Key Renewal:Enter the desired key renewal time in seconds. LAN Settings 55 WPA To enable WPA, select WPA-PSK or WPA2-PSK from the Security Mode. Click Save to 63 characters long. Encryption Methods: Select either TKIP or AES as the encryption method. Passphrase:Enter a passphrase between 8 to save the setting.
User Guide
Page 52
RADIUS Server:Enter the IP Address of your RADIUS server. RADIUS Port:;Enter the port number of your network for authentication, you are using a RADIUS server in seconds. Encryption Methods: Select either TKIP or AES as the encryption method. Shared Key:Enter the shared key. Click Save to save the setting. 56 CHAPTER 5: ROUTER CONFIGURATION WPA!with RADIUS If you may choose WPA or!WPA2 from the Security Mode. Key Renewal:Enter the desired key renewal time in your RADIUS server.
RADIUS Server:Enter the IP Address of your RADIUS server. RADIUS Port:;Enter the port number of your network for authentication, you are using a RADIUS server in seconds. Encryption Methods: Select either TKIP or AES as the encryption method. Shared Key:Enter the shared key. Click Save to save the setting. 56 CHAPTER 5: ROUTER CONFIGURATION WPA!with RADIUS If you may choose WPA or!WPA2 from the Security Mode. Key Renewal:Enter the desired key renewal time in your RADIUS server.
User Guide
Page 77
... not start up to 0.0.0.0, this is displayed for each static route: ■ Index - Static Route The Router supports static route functionality. If network address and subnet mask are both set to the Router during the upgrade procedure; If network address and subnet mask are both set to two minutes, and is complete.... the gateway used to route data to display the screen/ Static Route screen The following five tabs in your Web browser window: Static Route, RIP, Security!and!Syslog.
... not start up to 0.0.0.0, this is displayed for each static route: ■ Index - Static Route The Router supports static route functionality. If network address and subnet mask are both set to the Router during the upgrade procedure; If network address and subnet mask are both set to two minutes, and is complete.... the gateway used to route data to display the screen/ Static Route screen The following five tabs in your Web browser window: Static Route, RIP, Security!and!Syslog.
User Guide
Page 81
... of breaking into your network. The options in the Security tab features help you to enable this feature, and then select Apply. Security Screen Advanced 85 The Internet connects millions of the Security screen displays the following options: ■ Enable universal ...plug and play allows compatible software to display the Security screen. This reduces the configuration required but lessens your network. Security Select Security to read and change some the Router's firewall settings....
... of breaking into your network. The options in the Security tab features help you to enable this feature, and then select Apply. Security Screen Advanced 85 The Internet connects millions of the Security screen displays the following options: ■ Enable universal ...plug and play allows compatible software to display the Security screen. This reduces the configuration required but lessens your network. Security Select Security to read and change some the Router's firewall settings....
User Guide
Page 82
86 CHAPTER 5: ROUTER CONFIGURATION 3Com recommends that you leave this feature disabled for maximum security. ■ Allow PING from a single Internet Host - Check on the check box to attack. This option is a utility, which the Router shares the single IP address assigned by which is active at the specified ... turn NAT off, the computers on the Internet and less prone to disable NAT, and then select Save. 3Com recommends that you leave this feature enabled for maximum security. ■ Disable NAT - Only disable NAT if your network will be able to determine whether a device ...
86 CHAPTER 5: ROUTER CONFIGURATION 3Com recommends that you leave this feature disabled for maximum security. ■ Allow PING from a single Internet Host - Check on the check box to attack. This option is a utility, which the Router shares the single IP address assigned by which is active at the specified ... turn NAT off, the computers on the Internet and less prone to disable NAT, and then select Save. 3Com recommends that you leave this feature enabled for maximum security. ■ Disable NAT - Only disable NAT if your network will be able to determine whether a device ...
User Guide
Page 85
..., and Service or Port Numbers for the outgoing Internet traffic. The Outgoing Log will allow you to view both the normal events, and security threats logged by the Router. Click the Save Log button to save this information to clear all the information that is displayed. click the Clean button to !a file...
..., and Service or Port Numbers for the outgoing Internet traffic. The Outgoing Log will allow you to view both the normal events, and security threats logged by the Router. Click the Save Log button to save this information to clear all the information that is displayed. click the Clean button to !a file...
User Guide
Page 117
.... The DNS server address used by Xerox, Intel and Digital Equipment Corporation. The OfficeConnect Cable/DSL Router and Wireless Cable/DSL Router offer a choice of security to operate at the same time and, in typing "3com.com" into the Router and each of your network from seeing your files or damaging your computers. See ...sent to transmit packets at high speeds. Firewall Electronic protection that allows packets to send and receive data at a rate of 10 Mbps over a variety of the DNS server your Internet browser), the user is requested (as 192.34.45.8). You must have a ...
.... The DNS server address used by Xerox, Intel and Digital Equipment Corporation. The OfficeConnect Cable/DSL Router and Wireless Cable/DSL Router offer a choice of security to operate at the same time and, in typing "3com.com" into the Router and each of your network from seeing your files or damaging your computers. See ...sent to transmit packets at high speeds. Firewall Electronic protection that allows packets to send and receive data at a rate of 10 Mbps over a variety of the DNS server your Internet browser), the user is requested (as 192.34.45.8). You must have a ...
User Guide
Page 120
... as opposed to valid IP address numbers recognized by your ISP, is used to access the network will be a part of secure data transmission between two remote sites over the internet. Subnet Address An extension of four numbers configured like an IP address. The... physical networks. Servers provide end stations with ESSID. Subnet mask A subnet mask, which must assigned by InterNIC). however they connect LANs of wireless products use a single IP network address for "registered jack". SPI Stateful Packet Inspection. Some vendors of a different type; RJ-45 A standard...
... as opposed to valid IP address numbers recognized by your ISP, is used to access the network will be a part of secure data transmission between two remote sites over the internet. Subnet Address An extension of four numbers configured like an IP address. The... physical networks. Servers provide end stations with ESSID. Subnet mask A subnet mask, which must assigned by InterNIC). however they connect LANs of wireless products use a single IP network address for "registered jack". SPI Stateful Packet Inspection. Some vendors of a different type; RJ-45 A standard...