Hama 00062763 Wireless LAN Router, 54 Mbps Owner Manual

Hama 00062763 Wireless LAN Router, 54 Mbps Owner Manual
g Operating Instruction
Contents:
1. Connecting the Wireless LAN Router .........................................................................................................................Page 03
2. Configuring the operating system and computer......................................................................................................Page 04
3. Configuring the Wireless LAN Router .........................................................................................................................Page 05
3.1 Configuring the Internet Connection using the Wizard............................................................................................Page 05
3.2 Configuring the Wireless LAN ......................................................................................................................................Page 06
3.2.1 Basic Settings for Wireless Networks...............................................................................................................Page 06
3.2.1.1 Operation as an Access Point (AP) ........................................................................................................Page 07
3.2.1.2 Operation as Station Ad-Hoc...................................................................................................................Page 07
3.2.1.3 Operation as Infrastructure .....................................................................................................................Page 08
3.2.1.4 Operation as an AP Bridge Point to Point .............................................................................................Page 08
3.2.1.5 Operation as an AP Bridge Point to Multi-Point...................................................................................Page 09
3.2.1.6 Operation as an AP Bridge WDS ............................................................................................................Page 09
3.2.2 Setting the Encryption for AP, Station Ad-Hoc and Station Infrastructure..................................................Page 10
3.2.2.1 WEP Encryption .........................................................................................................................................Page 10
3.2.2.2 WPA/WPA2 encryption.............................................................................................................................Page 11
3.2.3 Setting the Encryption for AP Bridge-Point to Point, Point to Multi-Point and WDS ..................................Page 12
3.2.3.1 WEP Encryption .........................................................................................................................................Page 12
3.2.3.2 WPA/WPA2 Encryption.............................................................................................................................Page 13
3.3 Changing the Log-in Data..............................................................................................................................................Page 13
3.4 LAN Settings....................................................................................................................................................................Page 13
4. Tools............... ...................................................................................................................................................................Page 14
4.1 Configuration Tools ........................................................................................................................................................Page 14
4.2 Firmware Update ............................................................................................................................................................Page 15
4.3 Re-starting the Router ...................................................................................................................................................Page 15
5. Status Information ..........................................................................................................................................................Page 15
6. Support and Contact Information ................................................................................................................................Page 15
2
Packet contents:
1x Hama Wireless LAN Router 54 Mbps
1x 12V power supply
1x printed operating instructions
1x configuration cable
Remark concerning the positioning:
The connection quality depends strongly on the place or surroundings where you put up the WLAN device. Please ensure that the
device or its antennae are neither covered nor built in. We advise you against putting it up near metallic objects or other electric or
radiant devices. In case of reception fluctuations or connection interruptions we recommend you to move interference sources such
as DECT telephones, mobile phones, Bluetooth devices or other WLAN networks out of the way. If this is not possible, it may also be
helpful to change the cable.
System requirements:
• Operating system with TCP/IP protocol installed
• Java-capable web browser such as Mozilla Firefox or Microsoft Internet Explorer
Safety instructions:
Do not use the device in moist or extremely dusty areas, on radiators or in the vicinity of heat sources. This device is not designed for
use outdoors. Protect the device from pressure and impact. The device may not be opened or moved during operation. Do not operate
the device without a screwed-on antenna.
Caution!
Use the router with the enclosed power supply unit only. Using other power supply units can cause irreparable damage
to the product.
Note!
The “Connect as required” setting is recommended for volume or timed rates, so that the internet connection is disconnected automatically after the period set in the „Idle time” option. Connection costs may be high if permanently connected. Please also note that closing the browser does not automatically disconnect from the internet. Many programs
send queries to the internet or receive data from it without this being clearly visible. For the router, these queries are just
as valid as opening a browser, for example. If you want to ensure that there is no active connection to the internet, you
should switch off the device or disconnect it from the modem.
1. Connecting the Wireless LAN Router
1. Connect the computers and other network devices such as hubs/switches to sockets 1-4. Use a crossover or CAT5 patch cable
(max. 100m). The integrated switch automatically identifies the connection speed of 10 or 100Mbps, half/full duplex transfer
mode and the type of cable used.
2. Connect the Ethernet port of your modem to the WAN connection on the router. A 1:1 or crossover cable is required depending
on the modem. In most cases, the existing connection cable can be used.
3. Plug the power unit supplied into an empty socket and connect it to the router. Caution: Unsuitable power supply units can cause
damage!
Checking Installation
There are various status indicating LEDs on the top of the device:
LED
Condition
Status
Power
Illuminated
Power unit is connected and supplying electricity
Off
No power unit connected, device not being supplied with electricity
Flashing
Wireless LAN is activated / data is being sent
Off
Wireless LAN is deactivated
Illuminated
The WAN port has generated a correct network connection
Flashing
Data transfer via WAN port
Off
No connection
Illuminated
The corresponding LAN port has generated a correct network connection
Flashing
Data transfer via respective LAN port
Off
No connection
WLAN
WAN
LAN1-4
3
2. Configuring the operating system and computer
The TCP/IP protocol must be installed on all PCs that will be using the Internet. By default, the IP address 192.168.2.1 and an activated
DHCP server are configured for the router. This means that the connected PCs are automatically given appropriate addresses and
other settings. We recommend using these settings.
Proceed as follows to check the settings on your PC:
Start -> Settings -> Control panel -> Network connections
Select the connection (network adapter) via which your PC is connected
to the router, e.g. “LAN connection”. When you right-click the corresponding connection, a menu is displayed in which you select Properties.
Select the Internet Protocol (TCP/IP) entry in the list and click Properties.
Select Optain an IP address automatically and Optain DNS server
address automatically! Confirm by clicking OK, and again in the subsequent window.
Your PC is now configured such that the router assigns the IP address
automatically. You can then configure the router using the web browser.
The browser must be Java-capable and the Java function must be activated (e.g. Internet Explorer 6.0 or better, or Mozilla Firefox).
4
3. Configuring the Wireless LAN Router
To start the configuration process, open your browser and enter “http://192.168.2.1” as the address.
The login window is then displayed. By default, the user name is set to admin and the password is 1234. After entering these, click OK
to log on to the router.
You can configure the router via the integrated Setup Wizard or manually. After configuration using the Setup Wizard, the device is
set so that the connected computers can access the internet.
Note!
For security reasons, you must change your user name and password. The standard settings are identical for many
devices and can allow others to access the router configuration. See Page 13 for information.
The configuration surface gives you the possibility to change between the German and the English language. Choose the desired
language in the browser window at the top on the right. The language is altered immediately and can always be changed again.
3.1 Configuring the Internet Connection using the Setup Wizard
Please start the Setup Wizard after logging in by clicking Quick Setup.
Time Zone
For Set Time Zone choose the appropriate time zone, e.g. GMT sGreenwich Mean Time: Dublin,
Edinburgh, Lisbon, London for England. The remaining settings can be left as they are. Click => Next to
continue.
Broadband Type
Next, you are prompted to specify the WAN connection type. Your service provider will provide you with user-specific information.
There is a brief description of the various connection types on the overview page. Due to the widespread use of DSL via PPPoE, the
remainder of the description will refer to this type of connection.
For the PPPoE connection type, click PPPoE xDSL
IP Address Info
You must enter the access data for your
provider in the next window. See your
documents or contact the provider directly
for this information.
Please enter the following details:
User Name
Password
Service Name (this must not always be
entered)
5
In addition to the access data, you can make the following entries:
MTU stands for Maximal Transfer Unit and specifies the maximum packet size to be transferred. If you are not sure about this setting,
we recommend leaving the standard value set. Values between 512 and 1492 can be set.
The Connection Type entry sets the dial-in action of your router. You can then select either:
Continuous: The router is always connected to the internet. This connection type is recommended if you have a flat-rate with no time
limit, for example.
Connect on demand: With this connection type, the router does not dial in until it receives a request from a connected computer, e.g.
if you open the internet browser on a computer. The connection is maintained until the period set under Idle Time Out has passed
without activity.
Manual: If you choose the Manual connection type, you can make the connection by clicking Connect, and close it by clicking
Disconnect.
Note!
The “Connect as required” setting is recommended for volume or timed rates, so that the internet connection is disconnected automatically after the period set in the „idle time” option. Connection costs may be high if permanently connected.
Please also note that closing the browser does not automatically disconnect from the internet. Many programs send
queries to the internet or receive data from it without this being clearly visible. For the router, these queries are just as
valid as opening a browser, for example. If you want to ensure that there is no active connection to the internet, you should
switch off the device or disconnect it from the modem.
Idle Time Out: Enter the length of time you want to wait before internet connection is cut off when inactive. Values between 1 and
1000 can be set. Click OK to confirm your entries. You must then restart the router for the settings to take effect. Click Apply in the next
window to save the settings. The router takes approx. 30 seconds to restart. After the restart the router is configured so that you can
access the internet via the connected computers. You can also edit these settings manually, by clicking WAN in the menu on the left
and then selecting the corresponding connection type.
3.2 Configuring the Wireless LAN
Wireless LAN is deactivated by default for security reasons. To activate this function, from the start view which can be accessed
by clicking Home, select General Setup and then Wireless in the menu on the left. Note that activating Wireless LAN without also
setting encryption results in a security risk. Select Enable and then click Apply. Read Basic Settings for Wireless Networks for further
instructions!
3.2.1 Basic Settings for Wireless Networks (WLAN)
Select Basic Settings in the menu on the left.
The Mode setting allows you can select the task the router is to perform in the network.
Select the AP (3.2.1.1) access point function if the device is the only access point in your network or if no bridge level connection is to
be made to other access points.
Select the Station Ad-Hoc (3.2.1.2) if your router should work as client and not as access point in the network. In this operating mode,
a connection to other Ad-Hoc-Clients is possible. (Ad hoc signifies WLAN network without access point).
Select the Station Infrastructure (3.2.1.3) if your router should work as client and not as access point in the network. In this operating
mode, the router can be registered as client to another access point.
Select AP Bridge-Point to Point (3.2.1.4) if you want to connect this access point wirelessly to a second access point. In this mode,
clients cannot log-in via a wireless connection.
Select AP Bridge-Point to Multi-Point (3.2.1.5) if you want to connect this access point wirelessly to several other access points. In
this mode, clients cannot log-in via a wireless connection.
Select AP Bridge WDS (3.2.1.6), if you want to connect this access point to one or more other access points wirelessly and clients are
to be allowed to log in wirelessly.
Continue configuration as required.
6
3.2.1.1 Operation as an Access Point (AP)
Selecting this under Band allows you to specify
whether the device runs ion the 2.4 Ghz band in
accordance with the 802.11b (11Mbps), 802.11g
(54Mbps) standards or works in combination
with 802.11b and 802.11g. Then set the ESSID.
The ESSID can contain up to 32 characters and
must be identical for all devices in the network.
Channel Number allows you to select the
channel in which the data is to be transferred.
13 channels are available.
Example of an ESSID : “WLAN_Router_
54Mbps”
Click Apply to save your settings!
To set the encryption for your wireless network,
click Continue in the next window and then Security Settings in the menu on the left. Continue
reading on page 10 for instructions on setting
Wireless LAN encryption.
Click Apply in the next window if you want to
operate a wireless network without encryption.
The router is then restarted. The wireless network is available after you restart.
3.2.1.2 Operation as Station Ad-Hoc
Under Band, you can determine whether the
device works in 2.4 Ghz band according to
standard 802.11b (11Mbps), 802.11g (54Mbps) or
combined with 802.11b and 802.11g. Determine
the ESSID afterwards. The length of the ESSID
can amount to up to 32 signs and has to be
identical for all devices in the network. Under
channel number you determine the channel in
which the data are to be transferred. 13
channels are available. Enter the MAC address
with which your router should be visible in
the Ad-Hoc network into the field WLAN MAC
address. Click the button Clone MAC address
to create a MAC address.
Example for an ESSID: “WLAN_Router_
54Mbps”
Take over your settings by clicking the button
Apply!
Click the button Continue in the following
screen and then Security Settings in the menu
on the left side in order to set the encoding for
your wireless network. Page 10 will give you more information about the setting of the Wireless LAN encoding.
Click Apply in the next screen if you want to operate a wireless network without encoding. The router is then started anew. After the
new start, the wireless network is available.
7
3.2.1.3 Operation as Station Infrastructure
Under Band, you can determine whether the
device works in 2.4 Ghz band according to standard
802.11b (11Mbps), 802.11g (54Mbps) or combined
with 802.11b and 802.11g. Determine the ESSID
afterwards. The length of the ESSID can amount to
up to 32 signs and has to be identical for all devices
in the network. Enter the MAC address with which
your router should be visible in the network into the
field WLAN MAC address. Click the button Clone
MAC address to create a MAC address.
Example for an ESSID: “WLAN_Router_54Mbps”
Take over your settings by clicking the button
Apply!
Click the button Continue in the following screen
and then Security Settings in the menu on the left
side in order to set the encoding for your wireless
network. Page 10 will give you more information
about the setting of the Wireless LAN encoding.
Click Apply in the next screen if you want to
operate a wireless network without encoding. The
router is then started anew. After the new start, the wireless network is available.
3.2.1.4 Operation as an AP Bridge Point to Point
Selecting this under Band allows you to specify
whether the device runs ion the 2.4 Ghz band in
accordance with the 802.11b (11Mbps), 802.11g
(54Mbps) standards or works in combination with
802.11b and 802.11g. Channel Number allows you
to select the channel in which the data is to be
transferred. 13 channels are available. Enter the
address of the access point to which the bridge
connection is to be made in MAC address 1. To set
the encryption for your wireless network, click the
Set Security button.
Continue reading on page 12 for instructions on
setting Wireless LAN encryption.
Click Apply in the next window, and again in the
window after that if you want to operate a wireless
network without encryption. The router is then
restarted. The wireless network is available after
you restart.
8
3.2.1.5 Operation as an AP Bridge Point to Multi-Point
The difference to the AP Bridge Point to Point operation is that you can enter the MAC addresses of several
access points in this mode. Bridge connections can be
established to a maximum of 6 other access points. Selecting this under Band allows you to specify whether
the device runs ion the 2.4 Ghz band in accordance
with the 802.11b (11Mbps), 802.11g (54Mbps) standards
or works in combination with 802.11b and 802.11g.
Channel Number allows you to select the channel in
which the data is to be transferred. 13 channels are
available. Enter the addresses of the access points
to which the bridge connection is to be made in MAC
address 1 to MAC address 6. To set the encryption for
your wireless network, click the Set Security button.
Continue reading on page 12 for instructions on setting
Wireless LAN encryption.
Click Apply in the next window, and again in the
window after that if you want to operate a wireless network without encryption. The router is then restarted.
The wireless network is available after you restart.
3.2.1.6 Operation as an AP Bridge WDS
What is WDS? Wireless Distribution System is the name for wireless connections between multiple access points, and also allows
clients to log-in, which is not permitted by other bridge modes. The bandwidth of the network is halved for each additional access
point as the packets have to be sent twice.
This makes it a combination of the previous modes.
Selecting this under Band allows you to specify
whether the device runs ion the 2.4 Ghz band in accordance with the 802.11b (11Mbps), 802.11g (54Mbps)
standards or works in combination with 802.11b and
802.11g. The ESSID is required for the client network.
It acts as identification in the network and must therefore be identical for all users in the client network. The
ESSID can be up to 32 characters long.
Channel Number allows you to select the channel in which the data is to be transferred. 13 channels are available. Enter the addresses of the access points to which the bridge connection is to be made in MAC address 1 to MAC address 6. To set the encryption for
your wireless network, click the Set Security button.
Continue reading on page 12 for instructions on setting Wireless LAN encryption.
Click Apply in the next window, and again in the window after that if you want to operate a wireless network without encryption. The
router is then restarted. The wireless network is available after you restart.
9
3.2.2 Setting the Encryption for AP, Station Ad-Hoc and Station Infrastructure
First, it is important to understand a range of terms. The next section will explain the main terms used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined based on a certain characteristic.
This can be done by fingerprint, password or any other proof of authorisation.
Encryption: Encryption is a process in which plain text is transformed into a coded text via an encryption process (algorithm). One or
more codes can be used for this. It must also be mentioned that each individual encryption process offers one or more authentication
options.
The following encryption types are available for this mode:
•
•
64 Bit and 128 Bit WEP encryption
WPA and WPA2 encryption
You can make the settings under Wireless/Security Settings in the menu on the left for the AP, Station Ad-Hoc and Station Infrastructure mode.
Encryption is deactivated by default. However, for security reasons, we
recommend that you always use encryption.
3.2.2.1 WEP encryption
Wired Equivalent Privacy (WEP) is a standard encryption algorithm for WLAN. It both controls the access to the network and guarantees the integrity of the data. This method is considered vulnerable due to a range of weaknesses.
First select whether you want to use 64 bit or
128 bit encryption. 128 bit encryption offers
greater security. Then select either Hex
(characters from 0-9 and a-f) or ASCII (any character) for the Key Format. This also determines
the length of the key.
Default Tx Key allows you to select one of
four preset keys. Select Key 1, for example,
and enter your key of choice with the required
length.
Examples:
64 bit Hex (10 characters) = 231074a6ef
64 bit ASCII (5 characters) = j31n.
128 bit Hex (26 characters) = 231074a6b9773ce
43f91a5bef3
128 bit ASCII (13 characters) = urlaub2006.+0
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The wireless network with encryption is available after you restart.
10
3.2.2.2 WPA/WPA2 Encryption
Wi-Fi Protected Access (WPA) is an encryption method for WLAN. WPA contains the WEP architecture, but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity Protocol (TKIP), and also offers pre-shared keys (PSK) or
extensible authentication protocol (EAP) for user authentication. However, a radius server is required for this. WPA2 is a development
of WPA and uses a different encryption algorithm, advanced encryption standard (AES).
WPA offers two types of authentication, either pre-shared key or authentication via special authentication protocols, which are
generally variations of EAP (Extensible Authentication Protocol). An authentication server (RADIUS server) is used for the latter
authentication method, which is rarely used for private applications. Your administrator can give you the information you require to
configure this authentication method.
WPA pre-shared-key (recommended for most users)
First select whether you want to
use WPA with TKIP encryption
algorithm, WPA2 with AES encryption algorithm or the WPA Mixed
mode. The mixed mode allows
clients using WPA or WPA2 to access the access point. The mixture
is very practical as presently few
XP clients are WPA2 compatible. If
the mixed mode is switched off, the
AP only allows WPA2 clients, and
the large number of WPA (TKIP)
devices cannot connect.
Then you must select the key
format (Pre-shared Key Format).
Select either Pass phrase for a key
with a length of at least 8 and max.
63 characters, whereby letters
(A-Z), numbers and punctuation
marks can be used, or Hex for a
64 character key, in which only
numbers from 0-9 and letters from
a-f can be used.
The next step is entering a key,
called a pre-shared-key (PSK). All
clients which are to access the
access point must know this character string.
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The wireless network with encryption is available after you restart.
WPA RADIUS (requires a special authentication server)
First select whether you want to use WPA with TKIP encryption algorithm, WPA2 with AES encryption algorithm or the WPA Mixed
mode. The mixed mode allows clients using WPA or WPA2 to access the access point. The mixture is very practical as presently few
XP clients are WPA2 compatible.
Select WPA2 (AES) only. The AP only allows WPA2 clients, and the large number of WPA (TKIP) devices cannot connect.
Next enter the RADIUS server IP address. The RADIUS Server Port is preset to 1812. Enter the password for the RADIUS Server.
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The wireless network with encryption is available after you restart.
11
3.2.3 Setting the Encryption for Bridge-Point to Point, Bridge Point to Multi-Point and Bridge WDS
First, it is important to understand a range of terms. The next section will explain the main terms used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined based on a certain characteristic.
This can be done by fingerprint, password or any other proof of authorisation.
Encryption: Encryption is a process in which plain text is transformed into a coded text via an encryption process (algorithm). One or more
codes can be used for this. It must also be mentioned that each individual encryption process offers one or more authentication options.
The following encryption types are available for the various modes:
•
•
64 Bit and 128 Bit WEP encryption
WPA (TKIP) and WPA2 (AES) encryption
Click the Set Security button to make the settings for the Bridge-Point to Point, Bridge-Point to Multi-Point and Bridge WDS modes
after setting the mode. For the Bridge WDS mode, encryption must be set for the access point under Wireless/Security Settings
in the menu on the left. This is the only encryption available for WDS.
For WDS, the encryption must be adjusted before, in the menu on the left, under Wireless/Security Settings.
You can choose either WEP encryption with 64 Bit and 128 Bit, WPA with TKIP encryption algorithm and WPA2 with AES encryption algorithm.
3.2.3.1 WEP Encryption
Wired Equivalent Privacy (WEP) is a standard encryption algorithm for WLAN. It both controls the access to the network and guarantees the integrity of the data. This method is considered vulnerable due to a range of weaknesses.
First select whether you want to use
64 bit or 128 bit encryption. 128 bit
encryption offers greater security. Then
select either Hex (characters from 0-9
and a-f) or ASCII (any character) for
the Key Format. This also determines
the length of the key.
Default Tx Key allows you to select one
of four preset keys. Select Key 1, for
example, and enter your key of choice
with the equired length.
Examples:
64 bit Hex (10 characters) = 231074a6ef
64 bit ASCII (5 characters) = j31n.
128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3
128 bit ASCII (13 characters) = urlaub2006.+0
Click Apply to save your settings. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The wireless network with encryption is available after you restart.
12
3.2.3.2 WPA/WPA2 Encryption
Wi-Fi Protected Access (WPA) is an encryption method for WLAN. WPA contains the WEP architecture,
but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity
Protocol (TKIP), and also offers pre-shared keys (PSK) or extensible authentication protocol (EAP) for user authentication. However,
a radius server is required for this. WPA2 is a development of WPA and uses a different encryption algorithm, advanced encryption
standard (AES).
Select WPA Pre-shared Key under Encryption. Then, under WPA Unicast Cipher Suite, select WPA (TKIP) or WPA (AES).
Then you must select the Pre-shared
Key Format. Select either Pass phrase
for a key with a length of at least 8 and
max. 63 characters, whereby letters (A-Z),
numbers and punctuation marks can be
used, or Hex for a 64 character key, in
which only numbers from 0-9 and
letters from a-f can be used. The next
step is entering a key, called a preshared-key (PSK). All clients which are
to access the access point must know
this character string.
Click Apply to save your settings. You
must then restart the router for the
settings to take effect. To do so, click
Apply in the next window. The wireless
network with encryption is available
after you restart.
3.3 Changing the Log-in Data
From the start view which can be accessed by clicking Home, select General Setup and then System => Password Settings in the
menu on the left.
This page allows you to enter a new password for the router. To assign a new password, you must first enter the current password in
the Current Password field. Enter the new password in the New Password field and again in the Confirmed Password field to confirm
that it was typed correctly. Click Apply to confirm your
entries. You must then restart the router for the settings to take effect. To do so, click Apply in the next
window. The new password applies after restarting.
3.4 LAN Settings
From the start view which can be accessed by clicking Home, select General Setup and then LAN in the menu on the left.
This allows you to change the standard LAN settings of the router.
LAN IP: The router is preset to the IP address 192.168.2.1. If you want to use a different address for the router, you can change it in this
entry field. The
corresponding Subnet Mask is entered in the field directly below this.
13
DHCP Server:
The integrated DHCP server allows IP
addresses to be assigned to connected clients
automatically. Select Disabled if you assign
the IP addresses manually in your network,
and therefore do not need a DHCP server.
Select Enabled if you want to use the DHCP
server the Lease Time setting specifies how
long the assigned IP address is to apply for
the client.
The IP address range from which the DHCP
server can assign IP address to the clients
is restricted by the Start-IP Address and the
End-IP Address. The table below allows you to
permanently assign a certain MAC address to
an IP address from the valid range. When the
client logs in on the router, it is always given
this IP address. To do so, select Enable Static
DHCP Lease and enter the MAC address and
the IP address in the empty fields of the table
at the bottom.. The entry is saved in the table
when you click Add.
Click Apply to confirm your entries. You must
then restart the router for the settings to take effect. To do so, click Apply in the next window.
Warning! The new LAN configuration is valid after restarting. Therefore, you have to use the new IP address to open the web
interface in the browser.
4. Tools
The Hama Wireless LAN router provides you with various tools to help you configure and use the device.
4.1 Configuration Tools
From the start view which can be accessed by
clicking Home, select Tools in the menu at the
top right, and then Configuration Tools
in the menu on the left.
This page allows you to save all configuration
options of the router. Click Save to do so.
Then select the target folder. You should also
set a file name which allows you to identify
the file clearly. Click Save after your selection. The settings are now saved. If you want
to restore the saved settings at a later time,
click rowse and then select the configuration
file required. Click Upload to load the file.
The router takes a few seconds to load the
file and then to restart. The selected LAN
configuration is valid after restarting.
To reset the router to the default settings,
click Reset (Restore to Factory Default). Click
OK at the next prompt. All settings are reset
to the default settings.
14
4.2 Firmware Update
From the start view which can be accessed by clicking Home, select Tools in the menu at the top right, and then Firmware Upgrade in
the menu on the left. To do so, click Next in the next window.
Click Browse to select the new firmware file in the next window. Click Apply after you select the file The new firmware is loaded and
the router is restarted.
Warning! Earlier settings are lost when new firmware is loaded.
4.3 Re-starting the Router
From the start view which can be accessed by clicking Home, select Tools in the menu at the top right and then Reset in the menu on
the left.
The router is restarted when you click Apply in this window and confirm the subsequent prompt by clicking OK. Settings you have
made are not lost.
5. Status Information
From the start view which can be accessed by clicking Home, select Status in the menu at the top right.
The menu on the left contains various sub-menus via which you can view detailed information, such as Internet Connection, Device
Status or Active DHCP Clients. The Statistics menu item also provides a packet counter.
6. Support and Contact Information
If products are defective:
Please contact your dealer or Hama Product Consulting if you have any product claims.
Internet / World Wide Web:
Product support, new drivers or product information can be found at www.hama.com
Support Hotline – Hama Product Consulting:
Tel. +49 (0) 9091 / 502-115
Fax +49 (0) 9091 / 502-272
E-mail: [email protected]
Note:
This product may only be used in Germany, Austria, Switzerland, France, England, Belgium, Spain, Holland, Denmark, Hungary,
Poland, Sweden, Luxemburg, Ireland, Greece, the Czech Republic, Slovakia and Finland.
See www.hama.com for the declaration of conformity with R&TTE Directive 99/5/EC.
!
15
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement