1. Connecting the Wireless LAN Router
L Wireless LAN Router MiMo 300 Express Operating Instructions
Contents:
1. Connecting the Wireless LAN Router ......................................................................................................... Page 03
2. Configuring the operating system and computer...................................................................................... Page 03
3. Configuring the Wireless LAN Router ......................................................................................................... Page 05
3.1 Configuring the Internet Connection using the Wizard............................................................................ Page 05
3.2 Configuring the Wireless LAN ...................................................................................................................... Page 06
3.2.1 Basic Settings for Wireless Networks............................................................................................... Page 06
3.2.1.1 Operation as an Access Point (AP) ........................................................................................ Page 07
3.2.1.2 Operation as an AP Bridge Point to Point ............................................................................. Page 08
3.2.1.3 Operation as an AP Bridge Point to Multi-Point................................................................... Page 08
3.2.1.4 Operation as an AP Bridge WDS ............................................................................................ Page 09
3.2.2 Setting the Encryption for AP .............................................................................................................. Page 09
3.2.2.1 WEP Encryption ......................................................................................................................... Page 10
3.2.2.2 WPA/WPA2 encryption............................................................................................................. Page 10
3.2.3 Setting the Encryption for AP Bridge-Point to Point, Point to Multi-Point and WDS .................. Page 11
3.2.3.1 WEP Encryption ......................................................................................................................... Page 12
3.2.3.2 WPA/WPA2 Encryption............................................................................................................. Page 13
3.3 Changing the Log-in Data.............................................................................................................................. Page 13
3.4 LAN Settings.................................................................................................................................................... Page 13
4. Tools............... ................................................................................................................................................... Page 14
4.1 Configuration Tools ........................................................................................................................................ Page 14
4.2 Firmware Update ............................................................................................................................................ Page 15
4.3 Re-starting the Router ................................................................................................................................... Page 15
5. Status Information .......................................................................................................................................... Page 15
6. Support and Contact Information ................................................................................................................ Page 15
Packet contents:
1x Hama Wireless LAN Router MiMo 300 Express
1x 12V power supply
1x printed operating instructions
System requirements:
• Operating system with TCP/IP protocol installed
• Java-capable web browser such as Mozilla Firefox or Microsoft Internet Explorer
Safety instructions:
Do not use the device in moist or extremely dusty areas, on radiators or in the vicinity of heat sources. This
device is not designed for use outdoors. Protect the device from pressure and impact. The device may not be
opened or moved during operation.
Caution!
2
Use the router with the enclosed power supply unit only. Using other power supply units
can cause irreparable damage to the product.
Note!
The “Connect as required” setting is recommended for volume or timed rates, so that the
internet connection is disconnected automatically after the period set in the „Idle time”
option. Connection costs may be high if permanently connected. Please also note that
closing the browser does not automatically disconnect from the internet. Many programs
send queries to the internet or receive data from it without this being clearly visible. For the
router, these queries are just as valid as opening a browser, for example. If you want to
ensure that there is no active connection to the internet, you should switch off the device or
disconnect it from the modem.
1. Connecting the Wireless LAN Router
1.
2.
3.
Connect the computers and other network devices such as hubs/switches to sockets 1-4.
Use a crossover or CAT5 patch cable (max. 100m). The integrated switch automatically
identifies the connection speed of 10 or 100Mbps, half/full duplex transfer mode and the type of
cable used.
Connect the Ethernet port of your modem to the WAN connection on the router. A 1:1 or crossover
cable is required depending on the modem. In most cases, the existing connection cable can be
used.
Plug the power unit supplied into an empty socket and connect it to the router. Caution:
Unsuitable power supply units can cause damage!
Checking Installation
There are various status indicating LEDs on the top of the device:
LED
Condition
Status
Power
Illuminated
Power unit is connected and supplying electricity
Off
No power unit connected, device not being supplied with electricity
Flashing
Wireless LAN is activated / data is being sent
Off
Wireless LAN is deactivated
WLAN
WAN
LAN1-4
Illuminated
The WAN port has generated a correct network connection
Flashing
Data transfer via WAN port
Off
No connection
Illuminated
The corresponding LAN port has generated a correct network connection
Flashing
Data transfer via respective LAN port
Off
No connection
2. Configuring the operating system and computer
The TCP/IP protocol must be installed on all PCs that will be using the Internet. By default, the
IP address 192.168.2.1 and an activated DHCP server are configured for the router. This means that the
connected PCs are automatically given appropriate addresses and other settings. We recommend using
these settings.
Proceed as follows to check the settings on your PC:
Start -> Settings -> Control panel -> Network connections
3
Select the connection (network adapter) via which your PC is connected to the router, e.g. “LAN
connection”. When you right-click the corresponding connection, a menu is displayed in which you select
Properties.
Select the Internet Protocol (TCP/IP) entry in the list
and click Properties.
Select Optain an IP address automatically and Optain
DNS server address automatically! Confirm by clicking
OK, and again in the subsequent window.
Your PC is now configured such that the router assigns the
IP address automatically. You can then configure the
router using the web browser.
The browser must be Java-capable and the Java function
must be activated (e.g. Internet Explorer 6.0 or better, or
Mozilla Firefox).
4
3. Configuring the Wireless LAN Router
To start the configuration process, open your browser and enter “http://192.168.2.1” as the address.
The login window is then displayed. By default, the user name is set to admin and the password is 1234. After
entering these, click OK to log on to the router.
You can configure the router via the integrated Setup Wizard or manually. After configuration using the Setup
Wizard, the device is set so that the connected computers can access the internet.
Note!
For security reasons, you must change your user name and password. The standard
settings are identical for many devices and can allow others to access the router
configuration. See Page 13 for information.
3.1 Configuring the Internet Connection using the Setup Wizard
Please start the Setup Wizard after logging in by clicking Quick Setup.
Time Zone
For Set Time Zone choose the appropriate time zone, e.g. GMT sGreenwich Mean Time: Dublin,
Edinburgh, Lisbon, London for England. The remaining settings can be left as they are. Click => Next to
continue.
Broadband Type
Next, you are prompted to specify the WAN connection type. Your service provider will provide you with
user-specific information. There is a brief description of the various connection types on the overview page.
Due to the widespread use of DSL via PPPoE, the remainder of the description will refer to this type of
connection.
For the PPPoE connection type, click PPPoE xDSL
IP Address Info
You must enter the access data for
your provider in the next window. See
your documents or contact the
provider directly for this information.
5
Please enter the following details:
User Name
Password
Service Name (this must not always be entered)
In addition to the access data, you can make the following entries:
MTU stands for Maximal Transfer Unit and specifies the maximum packet size to be transferred. If you are not
sure about this setting, we recommend leaving the standard value set. Values between 512 and 1492 can be
set.
The Connection Type entry sets the dial-in action of your router. You can then select either:
Continuous: The router is always connected to the internet. This connection type is recommended if you have
a flat-rate with no time limit, for example.
Connect on demand: With this connection type, the router does not dial in until it receives a request from a
connected computer, e.g. if you open the internet browser on a computer. The connection is maintained until
the period set under Idle Time Out has passed without activity.
Manual: If you choose the Manual connection type, you can make the connection by clicking Connect, and
close it by clicking Disconnect.
Note!
The “Connect as required” setting is recommended for volume or timed rates, so that the
internet connection is disconnected automatically after the period set in the „idle time”
option. Connection costs may be high if permanently connected. Please also note that
closing the browser does not automatically disconnect from the internet. Many programs
send queries to the internet or receive data from it without this being clearly visible. For the
router, these queries are just as valid as opening a browser, for example. If you want to
ensure that there is no active connection to the internet, you should switch off the device or
disconnect it from the modem.
Idle Time Out: Enter the length of time you want to wait before internet connection is cut off when inactive.
Values between 1 and 1000 can be set.
Click OK to confirm your entries. You must then restart the router for the settings to take effect. Click Apply
in the next window to save the settings. The router takes approx. 30 seconds to restart. After the restart the
router is configured so that you can access the internet via the connected computers. You can also edit these
settings manually, by clicking WAN in the menu on the left and then selecting the corresponding connection
type.
3.2 Configuring the Wireless LAN
Wireless LAN is deactivated by default for security reasons. To activate this function, from the start view
which can be accessed by clicking Home, select General Setup and then Wireless in the menu on the left.
Note that activating Wireless LAN without also setting encryption results in a security risk. Select Enable and
then click Apply. Read Basic Settings for Wireless Networks for further instructions!
3.2.1 Basic Settings for Wireless Networks (WLAN)
Select Basic Settings in the menu on the left.
The Mode setting allows you can select the task the router is to perform in the network.
Select the AP (3.2.1.1) access point function if the device is the only access point in your network or if no
bridge level connection is to be made to other access points.
6
Select AP Bridge-Point to Point (3.2.1.2) if you want to connect this access point wirelessly to a second
access point. In this mode, clients cannot log-in via a wireless connection.
Select AP Bridge-Point to Multi-Point (3.2.1.3) if you want to connect this access point wirelessly to several
other access points. In this mode, clients cannot log-in via a wireless connection.
Select AP Bridge WDS (3.2.1.4), if you want to connect this access point to one or more other access points
wirelessly and clients are to be allowed to log in wirelessly.
Continue configuration as required.
3.2.1.1 Operation as an Access Point (AP)
Selecting this under Band allows you
to specify whether the device runs
ion the 2.4 Ghz band in accordance
with the 802.11b (11Mbps), 802.11g
(54Mbps) standards or works in
combination with 802.11b and 802.11g.
Then set the ESSID. The ESSID can
contain up to 32 characters and must
be identical for all devices in the
network. Channel Number allows you
to select the channel in which the
data is to be transferred. 13 channels
are available.
Example of an ESSID : “WLAN_Router_54Mbps”
Click Apply to save your settings!
To set the encryption for your wireless network, click Continue in the next window and then Security Settings
in the menu on the left. Continue reading on page 09 for instructions on setting Wireless LAN encryption.
Click Apply in the next window if you want to operate a wireless network without encryption.
The router is then restarted. The wireless network is available after you restart.
7
3.2.1.2 Operation as an AP Bridge Point to Point
Selecting this under Band allows you
to specify whether the device runs ion
the 2.4 Ghz band in accordance with
the 802.11b (11Mbps), 802.11g
(54Mbps) standards or works in
combination with 802.11b and 802.11g.
Channel Number allows you to select
the channel in which the data is to be
transferred. 13 channels are available.
Enter the address of the access point
to which the bridge connection is to be
made in MAC address 1. To set the
encryption for your wireless network,
click the Set Security button.
Continue reading on page 11 for instructions on setting Wireless LAN encryption.
Click Apply in the next window, and again in the window after that if you want to operate a wireless network
without encryption. The router is then restarted. The wireless network is available after you restart.
3.2.1.3 Operation as an AP Bridge Point to Multi-Point
The difference to the AP Bridge Point to
Point operation is that you can enter the
MAC addresses of several access points in
this mode. Bridge connections can be
established to a maximum of 6 other access
points. Selecting this under Band allows
you to specify whether the device runs ion
the 2.4 Ghz band in accordance with the
802.11b (11Mbps), 802.11g (54Mbps)
standards or works in combination with
802.11b and 802.11g. Channel Number allows
you to select the channel in which the data
is to be transferred. 13 channels are
available. Enter the addresses of the
access points to which the bridge
connection is to be made in MAC address
1 to MAC address 6.
To set the encryption for your wireless network, click the Set Security button.
Continue reading on page 11 for instructions on setting Wireless LAN encryption.
Click Apply in the next window, and again in the window after that if you want to operate a wireless network
without encryption. The router is then restarted. The wireless network is available after you restart.
8
3.2.1.4 Operation as an AP Bridge WDS
What is WDS? Wireless Distribution System is the name for wireless connections between multiple access
points, and also allows clients to log-in, which is not permitted by other bridge modes. The bandwidth of the
network is halved for each additional access point as the packets have to be sent twice.
This makes it a combination of the
previous modes.
Selecting this under Band allows you to
specify whether the device runs ion the
2.4 Ghz band in accordance with the 802.11b
(11Mbps), 802.11g (54Mbps) standards or
works in combination with 802.11b and
802.11g. The ESSID is required for the client
network. It acts as identification in the
network and must therefore be identical for
all users in the client network. The ESSID
can be up to 32 characters long.
Channel Number allows you to select the channel in which the data is to be transferred. 13 channels are
available. Enter the addresses of the access points to which the bridge connection is to be made in MAC
address 1 to MAC address 6. To set the encryption for your wireless network, click the Set Security button.
Continue reading on page 11 for instructions on setting Wireless LAN encryption.
Click Apply in the next window, and again in the window after that if you want to operate a wireless network
without encryption. The router is then restarted. The wireless network is available after you restart.
3.2.2 Setting the Encryption for AP
First, it is important to understand a range of terms. The next section will explain the main terms used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined based on a
certain characteristic. This can be done by fingerprint, password or any other proof of authorisation.
Encryption: Encryption is a process in which plain text is transformed into a coded text via an encryption
process (algorithm). One or more codes can be used for this. It must also be mentioned that each individual
encryption process offers one or more authentication options.
The following encryption types are available for this mode:
•
•
64 Bit and 128 Bit WEP encryption
WPA and WPA2 encryption
9
You can make the settings under Wireless/Security Settings in the menu on the left for the AP mode.
Encryption is deactivated by default. However, for security reasons, we
recommend that you always use encryption.
3.2.2.1 WEP encryption
Wired Equivalent Privacy (WEP) is a standard encryption algorithm for WLAN. It both controls the access to
the network and guarantees the integrity of the data. This method is considered vulnerable due to a range of
weaknesses.
First select whether you want to use
64 bit or 128 bit encryption. 128 bit
encryption offers greater security.
Then select either Hex (characters
from 0-9 and a-f) or ASCII (any
character) for the Key Format. This
also determines the length of the key.
Default Tx Key allows you to select
one of four preset keys. Select Key 1,
for example, and enter your key of
choice with the required length.
Examples:
64 bit Hex (10 characters) = 231074a6ef
64 bit ASCII (5 characters) = j31n.
128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3
128 bit ASCII (13 characters) = urlaub2006.+0
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click
Apply in the next window. The wireless network with encryption is available after you restart.
3.2.2.2 WPA/WPA2 Encryption
Wi-Fi Protected Access (WPA) is an encryption method for WLAN. WPA contains the WEP architecture,
but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity
Protocol (TKIP), and also offers pre-shared keys (PSK) or extensible authentication protocol (EAP) for
user authentication. However, a radius server is required for this. WPA2 is a development of WPA and
uses a different encryption algorithm, advanced encryption standard (AES).
WPA offers two types of authentication, either pre-shared key or authentication via special authentication
protocols, which are generally variations of EAP (Extensible Authentication Protocol). An authentication
server (RADIUS server) is used for the latter authentication method, which is rarely used for private
applications. Your administrator can give you the information you require to configure this authentication
method.
10
WPA pre-shared-key (recommended for most users)
First select whether you want to use
WPA with TKIP encryption algorithm,
WPA2 with AES encryption algorithm
or the WPA Mixed mode. The mixed
mode allows clients using WPA or
WPA2 to access the access point.
The mixture is very practical as p
resently few XP clients are WPA2
compatible. If the mixed mode is
switched off, the AP only allows WPA2
clients, and the large number of WPA
(TKIP) devices cannot connect.
Then you must select the key format
(Pre-shared Key Format). Select either
Pass phrase for a key with a length of
at least 8 and max. 63 characters,
whereby letters (A-Z), numbers and punctuation marks can be used, or Hex for a 64 character key, in which
only numbers from 0-9 and letters from a-f can be used.
The next step is entering a key, called a pre-shared-key (PSK). All clients which are to access the access
point must know this character string.
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click
Apply in the next window. The wireless network with encryption is available after you restart.
WPA RADIUS (requires a special authentication server)
First select whether you want to use WPA with TKIP encryption algorithm, WPA2 with AES encryption
algorithm or the WPA Mixed mode. The mixed mode allows clients using WPA or WPA2 to access the access
point. The mixture is very practical as presently few XP clients are WPA2 compatible.
Select WPA2 (AES) only. The AP only allows WPA2 clients, and the large number of WPA (TKIP) devices
cannot connect.
Next enter the RADIUS server IP address. The RADIUS Server Port is preset to 1812. Enter the password for
the RADIUS Server.
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click
Apply in the next window. The wireless network with encryption is available after you restart.
3.2.3 Setting the Encryption for Bridge-Point to Point, Bridge Point to Multi-Point and Bridge WDS
First, it is important to understand a range of terms. The next section will explain the main terms
used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined
based on a certain characteristic. This can be done by fingerprint, password or any other proof of
authorisation.
11
Encryption: Encryption is a process in which plain text is transformed into a coded text via an encryption
process (algorithm). One or more codes can be used for this. It must also be mentioned that each individual
encryption process offers one or more authentication options.
The following encryption types are available for the various modes:
•
•
64 Bit and 128 Bit WEP encryption
WPA (TKIP) and WPA2 (AES) encryption
Click the Set Security button to make the settings for the Bridge-Point to Point, Bridge-Point to
Multi-Point and Bridge WDS modes after setting the mode.
For the Bridge WDS mode, encryption must be set for the access point under Wireless/Security Settings
in the menu on the left. This is the only encryption available for WDS.
You can choose either WEP encryption with 64 Bit and 128 Bit, WPA with TKIP encryption algorithm and
WPA2 with AES encryption algorithm.
3.2.3.1 WEP Encryption
Wired Equivalent Privacy (WEP) is a standard encryption algorithm for WLAN. It both controls the access to
the network and guarantees the integrity of the data. This method is considered vulnerable due to a range of
weaknesses.
First select whether you want to use
64 bit or 128 bit encryption. 128 bit
encryption offers greater security.
Then select either Hex (characters
from 0-9 and a-f) or ASCII (any
character) for the Key Format. This
also determines the length of the
key.
Default Tx Key allows you to select
one of four preset keys. Select Key 1,
for example, and enter your key of
choice with the required length.
Examples:
64 bit Hex (10 characters) = 231074a6ef
64 bit ASCII (5 characters) = j31n.
128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3
128 bit ASCII (13 characters) = urlaub2006.+0
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click
Apply in the next window. The wireless network with encryption is available after you restart.
12
3.2.3.2 WPA/WPA2 Encryption
Wi-Fi Protected Access (WPA) is an encryption method for WLAN. WPA contains the WEP architecture,
but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity
Protocol (TKIP), and also offers pre-shared keys (PSK) or extensible authentication protocol (EAP) for user
authentication. However, a radius server is required for this. WPA2 is a development of WPA and uses a
different encryption algorithm, advanced encryption standard (AES).
Select WPA Pre-shared Key under
Encryption. Then, under WPA
Unicast Cipher Suite, select WPA
(TKIP) or WPA (AES).
Then you must select the Pre-shared
Key Format. Select either Pass phrase
for a key with a length of at least 8 and
max. 63 characters, whereby letters (A-Z),
numbers and punctuation marks can be
used, or Hex for a 64 character key, in
which only numbers from 0-9 and
letters from a-f can be used.
The next step is entering a key, called
a pre-shared-key (PSK). All clients
which are to access the access point
must know this character string.
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click
Apply in the next window. The wireless network with encryption is available after you restart.
3.3 Changing the Log-in Data
From the start view which can be accessed by clicking Home, select General Setup and then System =>
Password Settings in the menu on the left.
This page allows you to enter a new password for the router. To assign a new password, you must first enter
the current password in the Current Password field. Enter the new password in the New Password field and
again in the Confirmed Password field to confirm that it was typed correctly. Click Apply to confirm your
entries. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The new password applies after restarting.
3.4 LAN Settings
From the start view which can be accessed by clicking Home, select General Setup and then LAN in the menu
on the left.
This allows you to change the standard LAN settings of the router.
13
LAN IP: The router is preset to the
IP address 192.168.2.1. If you want to
use a different address for the router,
you can change it in this entry field.
The corresponding Subnet Mask is
entered in the field directly below this.
DHCP Server:
The integrated DHCP server allows
IP addresses to be assigned to
connected clients automatically.
Select Disabled if you assign the
IP addresses manually in your
network, and therefore do not need a
DHCP server. Select Enabled if you
want to use the DHCP server the
Lease Time setting specifies how
long the assigned IP address is to apply for the client.
The IP address range from which the DHCP server can assign IP address to the clients is restricted by the
Start-IP Address and the End-IP Address. The table below allows you to permanently assign a certain MAC
address to an IP address from the valid range. When the client logs in on the router, it is always given this
IP address. To do so, select Enable Static DHCP Lease and enter the MAC address and the IP address in the
empty fields of the table at the bottom.. The entry is saved in the table when you click Add.
Click Apply to confirm your entries. You must then restart the router for the settings to take effect. To do so,
click Apply in the next window.
Warning!
The new LAN configuration is valid after restarting. Therefore, you have to use the new
IP address to open the web interface in the browser.
4. Tools
The Hama Wireless LAN router provides you with various tools to help you configure and use the device.
4.1 Configuration Tools
From the start view which can be accessed
by clicking Home, select Tools in the menu
at the top right, and then Configuration Tools
in the menu on the left.
This page allows you to save all
configuration options of the router. Click
Save to do so. Then select the target
folder. You should also set a file name
which allows you to identify the file
clearly. Click Save after your selection.
The settings are now saved. If you want
14
to restore the saved settings at a later time, click Browse and then select the configuration file required. Click
Upload to load the file. The router takes a few seconds to load the file and then to restart. The selected LAN
configuration is valid after restarting. To reset the router to the default settings, click Reset (Restore to Factory
Default). Click OK at the next prompt. All settings are reset to the default settings.
4.2 Firmware Update
From the start view which can be accessed by clicking Home, select Tools in the menu at the top right, and
then Firmware Upgrade in the menu on the left. To do so, click Next in the next window.
Click Browse to select the new firmware file in the next window. Click Apply after you select the file The new
firmware is loaded and the router is restarted.
Warning!
Earlier settings are lost when new firmware is loaded.
4.3 Re-starting the Router
From the start view which can be accessed by clicking Home, select Tools in the menu at the top right and
then Reset in the menu on the left.
The router is restarted when you click Apply in this window and confirm the subsequent prompt by clicking
OK. Settings you have made are not lost.
5. Status Information
From the start view which can be accessed by clicking Home, select Status in the menu at the top right.
The menu on the left contains various sub-menus via which you can view detailed information, such as
Internet Connection, Device Status or Active DHCP Clients. The Statistics menu item also provides a packet
counter.
6. Support and Contact Information
If products are defective:
Please contact your dealer or Hama Product Consulting if you have any product claims.
Internet / World Wide Web:
Product support, new drivers or product information can be found at www.hama.com
Support Hotline – Hama Product Consulting:
Tel. +49 (0) 9091 / 502-115
Fax +49 (0) 9091 / 502-272
E-mail: [email protected]
Note:
This product may only be used in Germany, Austria, Switzerland, France, England, Belgium, Spain, Holland,
Denmark, Hungary, Poland, Sweden, Luxemburg, Ireland, Greece, the Czech Republic, Slovakia and Finland.
See www.hama.com for the declaration of conformity with R&TTE Directive 99/5/EC.
15
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement