advertisement
KPN Mobile Internet
Router 850
User Manual
Safety Precautions
Read the safety precautions carefully to ensure the correct and safe use of your wireless device.
For detailed information, see chapter 14 “Safety Information.”
Do not switch on your device when the device use is prohibited or when the device use may cause interference or danger
Do not use your device while driving.
Follow the rules or regulations in hospitals and health care facilities.
Switch off your device near medical apparatus.
Switch off your device in an aircraft. The device may cause interference to control signals of the aircraft.
Switch off your device near high-precision electronic devices.
The device may affect the performance of these devices.
Do not attempt to disassemble your device or its accessories.
Only qualified personnel are allowed to service or repair the device.
Do not place your device or its accessories in containers with strong electromagnetic field.
Do not place magnetic storage media near your device.
Radiation from the device may erase the information stored on them.
Do not put your device in a high¬temperature place or use it in a place with flammable gas such as a gas station
Keep your device and its accessories away from children.
Do not allow children to use your device without guidance
Use approved accessories only to avoid explosion.
Observe the laws or regulations on device use. Respect others’ privacy and legal rights when using your device.
Table of Contents
Introduction
1. Using the Configuration page of the Mobile Internet Router 850
Login to the Management Page
Management Page overview
Operation functions
Gateway-status
Using the wizard Quick Setup
Connection to the internet
Validate the PIN-code
View the configuration-information of the MIR850
2. Quick Setup of your Mobile Internet Router 850 (MIR850)
Configure the PPP-profile settings
Configuring PPP Dial-up Settings
Configuring WLAN Settings
Configuring the WLAN Encryption
Validating Quick Setup
3. Configure WLAN on your computer
The wireless configuration
Configuration Requirements
Configuring the Wireless Network
Configure the PC-network
Configure the Network Connection
Disabling Proxy Settings
4. Description of the Advanced Settings
5. System Management
Changing the Password
Upgrading the device
Restoring the Factory Defaults
Restarting the Device
Viewing the Version Information
6. SIM / USIM setting configuration
Enabling or Disabling the PIN Code
De-block a (U)SIM that is blocked
Changing the PIN Code
Auto Validating PIN Code
4
21
1
1
20
0
0
0
0
0
16
16
16
16
17
17
18
19
7
10
11
11
9
10
9
9
8
8
12
1
1
1
14
15
7. Mobile Network Settings
Setting the Preferred Mode and Band
Configuring the Mode for Searching Network
8. Dial-up settings
Configuring the PPP Settings
Managing the Profile List
Description of the Interface
Creating a Profile
Changing a Profile
Deleting a Profile
9. DHCP settings
10. WLAN (WiFi) settings
Enabling or Disabling the WLAN
WLAN Basic Settings
WLAN Advanced Settings
Configuring the MAC Filter
WLAN Bridge
11. Security settings
Firewall-switch
LAN MAC filter
LAN IP filter
Adding an IP Address
Changing an IP Address
Deleting an IP Address
Validating an IP Filter
Virtual server
Adding a Virtual Server
Changing a Virtual Server
Deleting a Virtual Server
Validating a Virtual Server
DMZ-Settings
UPnP-Settings
Remote Management
12. Example of a Standard Network with your MIR850
25
6
6
7
7
7
7
23
4
28
29
9
9
1
1
33
5
5
6
6
6
6
4
5
5
5
4
4
4
37
5
13. Trouble-shooting
What to do if a PC in the LAN cannot access the Internet?
What to do if a PC in the WLAN cannot access the WLAN?
What to do if I forgot the IP address of the LAN interface?
What to do if bridging between two devices is unsuccessful?
When the signal strength is normal, what to do if the downloading rate is low?
14. Safety Information
Interference
Medical Device
Area with Inflammables and Explosives
Traffic Security
Safety of Children
Environment Protection
WEEE Approval
RoHS Approval
Laws and Regulations bservance
Care and Maintenance
Emergency Call
Specific Absorption Rate (SAR)
Body Worn Operation
Regulatory Information
15. Abbreviations
4
4
4
4
4
41
41
4
4
4
4
4
41
41
41
44
38
8
8
8
8
8
6
Introduction
The KPN Mobile Internet Router 850 (MIR850) is a technically very advanced Internet Router (Gateway) with which you can work on the Internet being fully mobile, everywhere within coverage of a Mobile cellular network.
In the MIR850 you have to put a (U)SIM card, and after that it will connect to the mobile network of the network provider from which you obtained the SIM-card. In The Netherlands that is probably the mobile network of KPN
Four wired users can connect at the same time via a network cable, and even more users can register to the
MIR850 device over WiFi. All can then work at the same time.
Depending on the place the MIR850 is positioned, and the availability and coverage of the mobile network in that area, theoretically the following Internet-speeds can be reached.
Note: Not (yet) every mobile network operator supports the maximum speeds. Contact your mobile network operator for more details
Important Note: The speeds in the table below are maximum speeds that can be reached by the MIR850 device in total. That means if more then 1 persons are connected and working at the same time (for example
Browsing the Internet or sending/receiving Email), that these users will share this speed, and each separate user will experience a lower speed!
Network type
GPRS
EDGE
UMTS
HSDPA
HSUPA
Max. download
(theoretical)
Max. download
(practical)
54 kbps
6 kbps
84 kbps
50 kbps
00 kbps
70 kbps
7, Mbps
7, Mbps
6 Mbps
6 Mbps
Max. upload
(theoretical)
54 kbps
6 kbps
84 kbps
84 kbps
Mbps
Max. upload
(practical)
50 kbps
00 kbps
70 kbps
70 kbps
1,5 Mbps
Next to Internet-access, a normal analogue telephone can be connected to the Phone-port of the MIR850. Via this phone, normal voice calls can be made and received.
7
1. Using the Configuration page of the Mobile Internet Router 850
The supported features and real outlook are depending on the actual product. The pictures in this manual are for illustration purposes only. See the actual product and/or consult your shop for more details.
Login to the Management Page
1. Connect your computer via a network-cable to the Mobile Internet Router 850 (MIR850)
. Start the Internet browser and enter the address http://19.168.1.1
in the address bar.
. Select a user type, enter the password , and then click Login .
• Admin : This user type is authorized to view and change the configurations. The default password is admin .
• User: This user type is authorized to view only the basic status information. The default password is user .
8
To avoid a configuration conflict, only one user is allowed to log in to the management page at a time.
Management Page overview
Operation functions
The following table shows the main operations in the management page.
Item
Basic status
Quick Setup
Connection
Advanced settings
Security
Logout
Description
Displays the parameter configuration status of the device.
Quickly configures the device.
Displays the network connection status and connects to the network.
Configures the advanced settings.
Configures the security settings. (Optional)
Log out of the management page.
Gateway-status
The following table shows the status information of the device.
Item
SIM/USIM
Internet
HSDPA/UMTS
SIG
Beschrijving
The SIM-kaart is valid and verified.
The SIM-kaart is not (yet) present or verified.
The PPP-connection is established.
The PPP-connection is not
(yet) established.
There is a connection to
HSDPA/UMTS-network.
The HSDPA/UMTS-network is not (yet) available.
If the MIR850 is registered with another network-mode, the corresponding network connection status is displayed.
The signal strength from weak to strong is shown as follows:
9
Using the wizard Quick Setup
The Quick Setup will help you configure the most important settings in your MIR850.
If you use the management page of the MIR850 for the First time, you will be redirected to this Quick Setup automatically.
Connection to the internet
Open the page “Connection Status”
• Click on “Connection” to open the status page.
10
Make a connection to the Internet
1. If the PIN of your SIM is activated, you will be prompted to enter the PIN-code.
. If PPP-connection is set to Automatic of Request , refresh the page to view the connection status
. If the PPP-connection is set to Manual , click on “ Connect ” to make a connection to the Internet
and “ Disconnect ” to disconnect from the Internet
4. Wait for some minutes. If the page reports that the connection has been established, you
can open the Web-browser and type the address of the website to visit, to start browsing.
Validate the PIN-code
1. Enter the right PIN-code and click “OK”.
• The PIN-code of a new (U)SIM-card is default set to 0000.
• If you enter the PIN wrong times in a row the PIN will be blocked and you will need the PUK-code to unblock it.
• If the PIN verification fails, you cannot use the MIR850.
• If the selection “ Store PIN-code ” is activated, automatic validation is activated.
• If automatic validation of the PIN is activated, the PIN is stored in the MIR850, and will be validated automatically every time the MIR850 starts up again.
• After the PIN has been verified successfully, enter “ Continue ” to enter the connection page.
View the configuration-information of the MIR850
On the configuration page, you can view the current parameter configuration information and the network connection status. Under “Network connection status” you will find the items WAN , LAN and WLAN .
1.Click Basic Status .
Click Advanced on the right part of the page to view the advanced status.
Click Refresh to view the current status on the advanced status page.
11
. Quick Setup of your Mobile
Internet Router 850 (MIR850):
Important: All relevant connection settings to for direct use of your MIR850 are already pre-configured in your MIR850 by KPN before you bought it. With these settings the MIR850 automatically makes a connection to the mobile network (of KPN) and to the Internet.
You can use the quick setup wizard to configure and maintain the basic parameters of the device.
Click Quick Setup to access the welcome page. Click Next to configure the PPP profile settings.
Configure the PPP-profile settings
• Profile Name : Enter a profile name when the text box is empty.
• Dial-up Number/PPP User Name/PPP Password : Enter these three parameters provided by the internet service provider (ISP). The dial-up number is used to initiate the network call; the PPP user name and PPP password is used to obtain the service authorization provided by the ISP.
• APN/IP Address : Select the mode for obtaining the access point name (APN) and IP address. If the Mobile
Network Operator provides the relevant parameters, select Static and enter their values. Otherwise, select
Dynamic and the device automatically obtains them.
1
The already pre-configured settings from KPN are:
Profile Name
Dial-up Number
PPP User Name
PPP Password
APN (Static)
IP-Address
KPN Internet
*99#
<empty>, not used
<empty>, not used fastinternet
Dynamic
Configuring PPP Dial-up Settings
PPP Connection : Select the dial-up access mode.
• Auto : The device automatically connects to the Internet and does not disconnect when no data is transmitted.
• On Demand : The device automatically connects to the Internet when data transmission exists. When the duration of no data transmission exceeds the maximum idle time, the device disconnects the Internet connection.
• Manual : The device connects to the Internet after you click Connect on the connection page. For details, see
“Accessing the Internet.”
• PPP Authentication : This service is provided by your ISP. For details, consult your ISP
Configuring WLAN Settings
(Name) SSID: Enter a name for your wireless local area network (WLAN).
The service set identifier (SSID) is used to identify a WLAN. A PC and the wireless device can perform normal data communication only when they have the same SSID’s. To ensure the WLAN security, do not use the default SSID. You can enter a character string as the SSID, such as MyHome .
Note: Out-of the box, already an SSID is pre-configured by KPN: “KPN MIR850 xxxx”, where xxxx is a unique number.
1
SSID Broadcast: Enable or disable the SSID broadcast.
• Enabled : The device broadcasts the SSID of the WLAN and users can easily access the WLAN. In this case, unauthorized users can also access the WLAN because the SSID is broadcasted.
• Disabled : The device does not broadcast the SSID of the WLAN. Before accessing the WLAN, a user must
obtain the SSID of the WLAN. In this case, the WLAN security is improved.
For the convenience of users accessing the WLAN, you can select Enabled for SSID Broadcast when you configure the WLAN setting. After the setting, you can select Disable to improve the WLAN security.
Configuring the WLAN Encryption
To access the WLAN, you must set the wireless security key on your PC to be the same as that of the wireless device.
Note: Out-of the box, already WPA-encryption is pre-configured by KPN, with a randomly generated WPA-key.
This WAP-key is printed on a separate label on the bottom of the MIR850 device.
No Encryption
For the convenience of users accessing the WLAN, you can select NO ENCRYPTION for the Encryption mode when you set up a WLAN. It is not recommended to select this option in daily use.
WPA-PSK/WPA2-PSK
• WPA-PSK : It is a 56-bit data encryption method that can automatically change the key.
• WPA-PSK : It is a more secure version of WPA-PSK and it supports the IEEE 80.11 standard.
• WPA Encryption Algorithm: TKIP, AES, TKIP+AES.
• WPA Pre-Shared Key : You can enter a 64-character hexadecimal value or 8-6-character ASCII value as the key. The ASCII value contains all characters that can be entered through the PC keyboard, and the hexadecimal value contains numbers of 0-9 and characters of A-F. For example, you can enter the
ASCII value of 14abcde as the key.
• Network Key Rotation Interval : It is used to set how long a network key is dynamically changed. By default,
it is 0. To disable this function, you can set the value to 0 or null .
14
WEP
Wireless Equivalent Privacy (WEP) is a 64-bit or 18-bit data encryption method. The 18-bit
WEP encryption provides higher security level.
Network key 1 : You can enter 5 ASCII characters or 10-character hexadecimal numeral to form a 64-bit key.
You can also enter 1 ASCII characters or 6-character hexadecimal numeral to form a 18-bit key.
Validating Quick Setup
The last page of the wizard displays all the settings you have configured.
• To accept the settings, click Finish .
• To change the settings, click Back .
• To quit the settings, click Cancel .
15
. Configure WLAN on your computer
Configuring WLAN (WiFi) on a WLAN 80.11b/g compatible computer is standard. The screenshots below are examples of how it looks with Windows XP. This takes the Windows XP operating system (OS) as an example to describe how to configure your computer. For other OS’s, the configurations may be different and you need to configure them as required.
The wireless configuration
The wireless configuration allows your PC to connect to the device through the wireless network.
If you need only the Ethernet to connect your PC, you can skip this part.
Configuration Requirements
• To set up wireless network connection, your PC must be configured with the WLAN adapter that supports the IEEE 80.11 b/g protocol.
• If the encryption function is enabled, you need to ensure that all PCs connecting to the device use the same key as that of the device.
• For the use of WLAN adapter, refer to the WLAN adapter user guide provided by the manufacturer.
• For the encryption configurations, see “Configuring the WLAN Encryption Mode.”
• For SSID parameters configuration, see “Configuring WLAN Settings.”
Configuring the Wireless Network
1. Choose Start > Control Panel > Network Connections > Wireless Network Connection .
. Click Show Wireless Networks to display the wireless network connection list.
. Select the network connection that the SSID is the same as that of the device, and then click Connect .
16
4. If the encryption parameter is set for the device, the Wireless Network Connection dialog box is displayed and requires the network key and confirmation. The value you entered must be the same as the WPA
Pre-Shared Key or Network Key of the device..
5. Wait for a while after you enter the correct network key. The wireless connection icon displays in the status area in the lower right corner of the screen. Then, your PC can automatically connect to the device.
Configure the PC-network
De recommended configuration settings for use with the MIR850 are:
• Assign IP-address automatically.
• Disable use of a Proxy Server for the LAN .
Configure the Network Connection
1. Choose My Network Places > Properties > Local Area Connection .
. Right-click the Local Area Connection icon and select Properties .
17
. In the Local Area Connection Properties dialog box, select Internet Protoco l (TCP/IP) in the This connection uses the following items list box, and then click Properties .
4. In the Internet Protocol (TCP/IP) Properties dialog box, select Obtain an IP address automatically and Obtain DNS server address automatically , and then click OK .
Disabling Proxy Settings
1. Start the Internet browser, and then choose Tools > Internet Options .
. Select the Connections tab, and then click LAN Settings .
. In the LAN Settings dialog box, deselect Use a proxy server for your LAN .
18
4. Description of the
Advanced Settings
Click Advanced Settings , you can configure both the basic attributes and advanced parameters of the device, and also perform routine maintenance and management to the device.
The following table shows the functions of the shortcut icons..
Click to access the System page.
Click to access the SIM/UIM Settings page.
Click to access the Mobile Network Settings page.
Click to access the Dial-up Settings page.
Click to access the DHCP Settings page.
Click to access the WLAN Settings page
19
5. System Management
Click to access the System page.
Changing the Password
You can change the login password to prevent unauthorized users from logging in to the management page.
1. Click
.
. Enter the current password, and then enter the new password and confirm it.
. Click Modify .
Upgrading the device
1. Click .
. Enter the path or click Browse to select the software image file to be updated.
. Click Upgrade .
Note:
• After the system is upgraded, the system automatically restarts. The whole process takes two to three minutes
• The software programs for upgrading must come from the official website of Huawei or the official website of the Mobile Network Operator.
• Upgrading the software does not change the configuration of the client.
Restoring the Factory Defaults
If you need to reconstruct the network or you forget the changes of some parameters, you can choose to restore factory defaults and reconfigure the device.
Click to access the Restore Defaults page, and then click Restore .
After this operation, all configurations are restored to the defaults.
Restarting the Device
1. Click to access the Reboot page.
. Click Reboot .
Viewing the Version Information
Click to access the Version page. You can view the hardware version, software version, and the release time.
0
6. SIM / USIM setting configuration
Click to access the SIM/UIM Settings page. When the device works in the ROM-SIM mode, the page is not available.
• If you enter a wrong PIN-code times in a row, the SIM will be blocked. You then need
the appropriate PUK-code to de-block the SIM.
• The PIN-code can be 4 to 8 numbers. Alphabetical characters are not allowed.
Enabling or Disabling the PIN Code
1. Click om het venster voor PIN-codebeheer te openen.
. Select Enable/Disable in the PIN Code Operation list box.
. Enter the correct PIN code.
4. Click Apply .
De-block a (U)SIM that is blocked
If the (U)SIM is blocked (because of too many false PIN attempts), you can de-block it by entering the right PUKcode, and after that setup a new PIN.
• If you do not have the PUK of your SIM (any more), consult your Mobile Network Operator.
Sor safety reasons you will then need a new USIM.
• If you enter a wrong PUK-code 10 times in a row, the SIM will be blocked forever. Also the you will need a new SIM. Consult your Mobile Network Operator for this.
1. Enter the right PUK-code
. Enter the new PIN, and confirm this.
. Click on “ Apply ” to save the information.
1
Changing the PIN Code
When the PIN code protection is enabled, you can reset the PIN code.
1. Click .
. Select Modify in the PIN Code Operation list box.
. Enter the current PIN code.
4. Enter the new PIN code and confirm it.
5. Click Apply .
Auto Validating PIN Code
You can enable or disable the auto validate PIN code function.
1. Click .
. Select Enable/Disable in the Auto Validate option button.
. Enter the current PIN code.
4. Click Apply .
7. Mobile Network Settings
Click to access the Mobile Network Settings page.
Setting the Preferred Mode and Band
1. Click .
. Select the preference of connection mode in the Preferred Mode list box.
Network Mode
HSPA/UMTS (G) preferred
EDGE/GPRS (G) preferred
Description
This option is selected by default, and is in all cases the preferred selection: If an HSPA an/or UMTS (G) network is available, the MIR850 will automatically register to this. This will in all cases guarantee the highest speeds available. If the HSPA/UMTS coverage is not present (any more), the MIR850 will automatically switch back to EDGE/GPRS, and again back to HSPA/UMTS when it’s available again, all without breaking the connection to the Internet.
This option is not preferred. The MIR850 will first register to slower G networks, which gives lower speeds. It will only switch to high speed HSPA/UMTS networks when the device drives out of G coverage. But this situation will (almost) never happen.
Only HSPA/UMTS (G) With this selection, the MIR850 will ONLY register to high-speed
HSPA/UMTS (G) networks. This gives high speeds and throughput, but if you drive out of G coverage, the MIR850 will not switch back any more to a slower EDGE/GPRS (G) network. In that case, the connection to the Internet will be broken.
Only EDGE/GPRS (G) This option is not preferred. The MIR850 will only register to slower G networks, which gives lower speeds. In this selection, it will never register to high speed HSPA/UMTS networks.
• If the carrier provides only the G service and the preferred mode is configured as G only, you cannot access the Internet.
• If the carrier provides only the G service and the preferred mode is configured as G only, you cannot access the Internet.
• If the carrier provides neither the G nor G service, you cannot access the Internet regardless of the preferred mode.
1. Select the band to search the network in the Band list box.
. Click Apply .
Configuring the Mode for Searching Network
1. Click .
. Select the mode for searching the network.
• Auto : The device automatically searches the network and registers with it.
• Manual : You need to manually search the network and register with it.
. Click Apply .
4. In Manual mode, select the searched network and click Log on .
4
8. Dial-up Settings
Click to access the Dial-up Settings page.
Important: All relevant connection settings to for direct use of your MIR850 are already pre-configured in your MIR850 by KPN before you bought it. With these settings the MIR850 automatically makes a connection to the mobile network (of KPN) and to the Internet.
The already pre-configured settings from KPN are:
Profile Name
Dial-up Number
PPP User Name
PPP Password
APN (Static)
IP-Address
KPN Internet
*99#
<empty>, not used
<empty>, not used fastinternet
Dynamic
5
Configuring the PPP Settings
1. Click to access the PPP Settings page.
. Enter the correct parameters.
• Profile List : Select a profile from the established dial-up connection list. If the drop-down list is
empty, you need to create a profile list.
• PPP Connection : Select the dial-up connection mode.
Connection mode
Auto
On Demand
Manual
Description
The device automatically connects to the Internet and does not disconnect when no data is transmitted.
The device automatically connects to the Internet when data transmission exists. When the duration of no data transmission exceeds the maximum idle time, the device disconnects the
Internet connection.
The device connects to the Internet after you click Connect on the connection page. For details, see
“Accessing the Internet.”.
• PPP Authentication : The service is provided by your ISP. For details, consult your ISP.
• PPP Max Idle Time : The duration of the PPP connection is in idle. In On Demand mode, if no data is transmitted in this duration, the PPP connection automatically disconnects.
• PPP MTU : It is the maximum transmission unit (MTU) of the PPP connection. It is used to set the maximum number of bytes encapsulated in a single data frame.
• PPP Max Dial Time : Set the maximum waiting time when connecting to the Internet.
Managing the Profile List
Click to access the Profile Settings page.
6
Description of the Interface
Parameter
Profile list
Profile Name
Dial-up Number/
PPP User Name/
PPP Password
APN/IP Address:
Description
Contains the names of all created profiles.
Enter a profile name when the text box is empty.
Enter these three parameters provided by the internet service provider (ISP). The dial-up number is used to initiate the network call; the PPP user name and PPP password is used to obtain the service authorization provided by the ISP.
Select the mode for obtaining the access point name (APN) and
IP address. If the carrier provides the relevant parameters, select
Static and enter their values. Otherwise, select Dynamic and the device automatically obtains them..
Creating a Profile
1. Enter the profile information in the text box according to the prompts.
. Click Save .
Changing a Profile
1. Select a profile to be changed in the Profile List drop-down list. Relevant information is displayed in the corresponding text box.
. Enter the profile information.
. Click Save .
Deleting a Profile
1. Select a profile to be deleted in the Profile List drop-down list.
. Click Delete .
7
9. DHCP Settings
Click to access the DHCP Settings page, you can set the mode for assigning IP addresses in a LAN. DHCP automatically assigns IP addresses to the network devices. If you are using the DHCP server, you need to do the configurations on the PC connecting with the device. For details, see “Configuring the Network Connection”.
• IP Address : The default IP address of the device is 19.168.1.1
.
• Subnet Mask : The combination of the subnet mask and IP address enables the flexible sub netting.
By default, the subnet mask is 55.55.55.0.
• DHCP Server : It is used to assign IP addresses dynamically. If the DHCP server is Enabled , it can
automatically assign IP addresses for PCs. It is recommended to select Enabled for the DHCP server.
• Start IP Address/End IP Address : It is used to define the IP address range that the host can use during the IP address assignment. For example, in the network segment 19.168.1.0/4, the default IP address of the device is 19.168.1.1. The host IP address can range from 19.168.1. to 19.168.1.54.
The minimum range is a single IP address.
• DHCP Lease Time : The DHCP server automatically assigns an IP address to each device connected to the
network. When the leased time expires, the DHCP server checks whether the device is connected to the network. If the device is disconnected from the network, the server assigns the IP address to another device.
Thus, the IP address is not wasted.
• The Start IP Address must be smaller than or equal to the End IP Address .
• If the DHCP Server is Enabled , the configurations of Start IP Address , End IP address ,
and DHCP Lease Time are valid; otherwise, you cannot configure them..
8
10. WLAN (WiFi) settings
Click to access the WLAN Settings page.
Enabling or Disabling the WLAN
1. Click to access the WLAN Enable page.
. Select Enable/Disable to enable or disable the WLAN.
1. Click Apply .
WLAN Basic Settings
Click to access the WLAN Basic Settings page.
Selecting Interface IDs
Wireless Interface : It refers to the SSID and MAC address, and is used to identify the wireless device.
SSID
• Entering a name (SSID) for your WLAN.
• Enabling or Disabling the SSID Broadcast .
Enabling or Disabling the AP Isolation
• On : The terminals (PCs) connecting to the device through the WLAN cannot communicate with each other.
• Off : The terminals (PCs) connecting to the device through the WLAN can communicate with each other.
Selecting a Country
Country: It is used to identify the country. Different countries have different standards on channel usage.
Selecting a WLAN Channel
Channel: It refers to the channel that the device works with. If you do not know which channel to select, select Auto and the device can automatically search for the channel.
Configuring the 802.11 Mode
There are four available modes, as shown in the following table.
9
Modes
54g Auto
54g Performance
54g LRS
80.11b Only
54g Only
Description
The WLAN has the best compatibility in this mode.
The WLAN has the best performance in this mode.
If the device has difficulties in communicating with devices conforming to the IEEE 80.11b standards, select this mode.
The device can only work in the low performance 80.11b standard network mode.
The device can only work in the low performance 80.11g standard network mode.
Configuring the Transmission Rate
1. Select Auto , the device automatically searches the transmission rate.
. Click Apply to submit the setting.
0
WLAN Advanced Settings
Click to access the WLAN Advanced Settings page.
A security key can protect your WLAN from illegal data attacking. The security key of your wireless device must be consistent with that of the PC.
Configuring the 802.11 Authentication
• Open: Open system authentication. A user accessing the WLAN can choose WEP , WPA-PSK , or
WPA-PSK key to pass the authentication or choose No encryption to skip the authentication.
• Shared: Shared key authentication. It can use only WEP . The user accessing the WLAN must use the WEP to authenticate.
Configuring the Encryption Mode
There are four encryption modes: No Encryption, WPAPSK, WPA-PSK, and WEP. For details, refer to
“Configuring the WLAN Encryption Mode.”.
Configuring the MAC Filter
Click to access the WLAN MAC Filter page. You can control and manage the clients accessing the WLAN, and improve the WLAN security performance.
MAC Restrict Mode
The following table shows the MAC address filter modes:
Parameter
Disabled
Allow
Deny
Description
The MAC address filter function is disabled.
The clients with addresses in the MAC Address list are allowed to connect with the device through the WLAN.
The clients with addresses in the MAC Address list are not allowed to connect with the device through the WLAN.
MAC Addresses
Enter MAC addresses in the list. The device can perform the access control over the clients whose MAC addresses are in the list.
1
WLAN Bridge
Click to access the WLAN Bridg e page.
• Preamble Type: It has two options: Long and Short . In the case that the client (PC) supports the
Short type, the WLAN can have a better performance if it is Short .
• MAX Associations Limit : It refers to the maximum number of connections. It is used to set the maximum number of concurrent WLAN users on the device.
• Mode : It refers to the WLAN accessing mode. The device can work in two modes, as shown in the following table. The default value is Access Point .
Mode
Wireless Bridge
Access Point
Description
It is used to connect two or more access points.
The access points meeting the IEEE 80.11b/g standard or the wireless terminals can connect the wireless device.
• Bridge Restriction : It refers to the limitation to the peer MAC addresses. When it is Disabled , the device can access all the remote bridges; when it is Enabled , the device can only access the remote bridges that the addresses are in the address list.
• Bridges : It refers to the physical address of the remote peer bridge. The device supports the point-to- multipoint (PTM) bridge mode.
• Peer MAC Address : It refers to the physical address list of the remote peer bridges.
• Link Status : Up shows the successful connection and Down shows the failed connection.
11. Security settings
Click Security , you can configure the advanced security settings.
Firewall Switch
Your device has a true firewall that controls the incoming and outgoing data flow and protects your computer from illegal intrusion.
1. Click .
. Select the Enable the firewall (main switch of the firewall) check box to enable the firewall.
• Only when the Enable the firewall check box is selected, the other functions such as the IP address filter function, the MAC address filter function, and the WAN port ping function are available.
• When the Enable LAN MAC address filter check box is selected, the default filter rules are available.
. Select other options as required, and then click Apply .
LAN MAC Filter
Your device supports MAC filtering based on a list of either denied or allowed computers. A common method to restrict network access is to specify the Media Access Control (MAC) address.
To locate the MAC address in the Windows OS, choose Start > Run , and then enter cmd .
The command window is displayed, enter ipconfig / all , and then press Enter .
The MAC address is displayed as the Physical Address .
1. Click .
. Select MAC Filter Mode .
Parameter
Disabled
Allow
Deny
Description
The MAC address filter function is disabled.
HThe clients with addresses in the MAC Address list are allowed to connect with the device through the WLAN.
The clients with addresses in the MAC Address list are not allowed to connect with the device through the WLAN.
. Enter the MAC addresses of the clients and click Apply .
LAN IP Filter
You can configure the device to block specific IP address so that they cannot be accessed from computers in the local network.
Click to access the LAN IP Filter page.
Adding an IP Address
1. Select the protocol and status.
. Enter the IP address and corresponding port to be blocked from accessing the LAN.
. Click Ok .
Changing an IP Address
1. Click in the Modification column. The corresponding IP address filter is displayed.
. Change the contents as required.
. Click Ok .
Deleting an IP Address
Click in the Modification column.
The corresponding IP address filter is deleted.
4
Validating an IP Filter
1. Add a new IP address or select a record in the IP address filter table.
. Select On for Status .
. Click Ok .
4. Click Apply .
Virtual Server
Your device supports the virtual server to enable external computers to access WWW, FTP, or other services provided by the LAN.
Clic to access the Virtual Server page.
Adding a Virtual Server
1. Select the protocol and status.
. Enter values in the following text boxes:
• Name : Enter a name to the service provided by the LAN.
• WAN Port : Enter the WAN port of the LAN in which the computer provides services.
• IP Address : Specify a computer in the LAN to provide services.
• LAN Port : Enter the LAN port of the computer that provides servicesd.
. Click Ok .
You can also add a virtual server in the following way:
1. Select a port from the Common Port list. The Protocol, Status, Name, WAN Port, and LAN
Port will be set as the default values. If required, you can change them.
. Enter the IP Address.
. Click Ok .
Changing a Virtual Server
1. Click in the Modification column. The relevant virtual server is displayed.
. Change the contents as required.
. Click Ok .
Deleting a Virtual Server
Click in the Modification column. The corresponding virtual server is deleted.
5
Validating a Virtual Server
1. Add a virtual server or select a record in the virtual server table.
. Select On for Status .
. Click Ok .
4. Click Apply .
DMZ Settings
If your PC cannot run network applications through the device, you can set the computer to access the
Internet unlimitedly by configuring the IP address of the computer in the demilitarized zone (DMZ).
However, the DMZ computer is not protected by the firewall. It is vulnerable to attack and may also put other computers in the home network at risk.
1. Click .
. Select Enabled /Disabled for DMZ Status to enable or disable the DMZ service.
. Enter the local IP address of the computer that is specified as a DMZ host.
4. Click Apply .
Only one computer can be specified as a DMZ host at a time.
UPnP Settings
The Universal Plug and Play (UPnP) service allows other network users to control your device’ s network features to realize the intelligent interconnection..
1. Click .
. Select Enabled/Disabled for UPnP Status to enable or disable the UPnP service
. Click Apply .
Remote Management
The remote web management allows the access and control of the device either from the home network or from the Internet. When you are on a trip, you can maintain your device through the remote web management service. It also allows your ISP to help you solve the device problems from a remote location.
1. Click .
. Select Enabled /Disabled for Remote Status to enable or disable the service.
. Enter the IP address that can access and control your device.
4. Click Apply .
6
1. Example of a Standard
Network with your MIR850
You can create a small LAN with the 4 ethernet interfaces on your MIR850 and the WLAN interface
The MIR850 also supports external Hub’s, ethernet-switches and routers. If you want to create a LAN with multiple PC’s, you can extend the number of ethernet-connections with a standard hub or ethernet-switch.
In the drawing below, an example is given of your MIR850 in a small LAN, with multiple PC’s in a SOHO environment:
7
1. Troubleshooting
What to do if a PC in the LAN cannot access the Internet?
1. If the power indicator is off, you need to check whether the power adapter is normally connected.
. If the signal strength indicator is off, you need to check whether the area is covered by the network.
. If the area is covered by the network, you need to check whether the network mode is correct.
For information about network mode, see “Mobile Network Settings”.
4. If the indicator of the Ethernet interfaces blinks, the corresponding Ethernet interface is normally connected. If the indicator is off, you need to check and ensure that the related Ethernet connection is normal.
5. You must configure the correct PPP user name and PPP password when you access the Internet through the device. Check whether they are correct, and see “Configuring PPP Profile Settings” for details.
6. If the DHCP service is disabled and the PC obtains the IP address dynamically, the PC also cannot access the
Internet. You can change the mode to manually assign an IP address. See “Configuring the Network Connection”.
7. Check whether the driver of the network adapter is correctly installed.
8. If the preceding methods cannot solve the problem, please consult you service provider..
What to do if a PC in the WLAN cannot access the WLAN?
1. If interferences or shields near the device exist, you can adjust the position of the device.
When the signal strength is strong, you can move to the next step.
. Check and record the following data on the network adapter of your PC: SSID, WEP type, and key.
. Check and record the following data on the device: SSID, WEP type, and key.
4. Compare the recorded data, the SSID on the network adapter should be ANY or be the same
as that on the device. The WEP type and key on the network adapter and device should be the
same. Otherwise, you need to change the data on the network adapter.
What to do if I forgot the IP address of the LAN interface?
If you forgot the IP address of the LAN interface, you can enter http://e.home and log in to the management page when the PC obtains the IP address automatically.
What to do if bridging between two devices is unsuccessful?
1. Make sure that the two devices work on the same channel. For details, see “Selecting a WLAN Channel”.
. Make sure that the MAC address of one device is in the peer MAC address list of the other device.
For details, see “WLAN Bridge”.
When the signal strength is normal, what to do if the downloading rate is low?
In this case, you need to set the value in the registry as follows:
1. Choose Start > Run .
Enter regedit in the Open text box and then click OK .
8
. Select parameters in the following directory: \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip .
4. Choose Edit > New > DWORD Value .
5. Rename New Value #1 to TcpWindowSize .
6. Right-click TcpWindowSize and then select Modify .
9
7. Select Decimal and enter 6555 in the Value data text box, and then click OK .
8. For the DWORD Value of DefaultRcvWindow , do the same operations as that of TcpWindowSize
40
14. Safety Information
Read the safety information carefully to ensure the correct and safe use of your wireless device.
Interference
• Do not use your wireless device if using the device is prohibited or when it cause danger or interference
with electric devices.
Medical Device
• Do not use your wireless device and follow the rules and regulations set forth by the hospitals and health care facilities.
• Some wireless devices may affect the performance of the hearing aids. For any such problems, consult your service provider.
• If you are using an electronic medical device, consult the doctor or device manufacturer to confirm whether the radio wave affects the operation of this device.
Area with Inflammables and Explosives
To prevent explosions and fires in areas that are stored with inflammable and explosive devices, do not use your wireless device and observe the rules. Areas stored with inflammables and explosives include but are not limited to the following:
• Gas station
• Fuel depot (such as the bunk below the deck of a ship)
• Container/Vehicle for storing or transporting fuels or chemical products
• Area where the air contains chemical substances and particles (such as granule, dust, or metal powder)
• Area indicated with the “Explosives” sign
• Area indicated with the “Power off bi-direction wireless equipment” sign
• Area where you are generally suggested to stop the engine of a vehicle.
Traffic Security
• Observe local laws and regulations while using the wireless device. To prevent accidents, do not use your wireless device while driving.
• RF signals may affect electronic systems of motor vehicles. For more information, consult the vehicle manufacturer.
• In a motor vehicle, do not place the wireless device over the air bag or in the air bag deployment area.
Otherwise, the wireless device may hurt you owing to the strong force when the air bag inflates.
• Observe the rules and regulations of airline companies. When boarding, switch off your wireless device.
Otherwise, the radio signal of the wireless device may interfere with the plane control signals.
41
Safety of Children
Do not allow children to use the wireless device without guidance. Small and sharp components of the wireless device may cause danger to children or cause suffocation if children swallow the components.
Environment Protection
Observe the local regulations regarding the disposal of your packaging materials, used wireless device and accessories, and promote their recycling.
WEEE Approval
The wireless device is in compliance with the essential requirements and other relevant provisions of the Waste Electrical and Electronic Equipment Directive 00/96/EC (WEEE Directive).
RoHS Approval
The wireless device is in compliance with the restriction of the use of certain hazardous substances in electrical and electronic equipment Directive 00/95/EC (RoHS Directive).
Laws and Regulations bservance
Observe laws and regulations when using your wireless device. Respect the privacy and legal rights of the others.
Care and Maintenance
It is normal that your wireless device gets hot when you use or charge it. Before you clean or maintain the wireless device, stop all applications and disconnect the wireless device from your PC.
• Use your wireless device and accessories with care and in clean environment.
Keep the wireless device from a fire or a lit cigarette.
• Protect your wireless device and accessories from water and vapor and keep them dry.
• Do not drop, throw or bend your wireless device.
• Clean your wireless device with a piece of damp and soft antistatic cloth.
Do not use any chemical agents (such as alcohol and benzene), chemical detergent, or powder to clean it.
• Do not leave your wireless device and accessories in a place with a considerably low or high temperature.
• Use only accessories of the wireless device approved by the manufacture.
Contact the authorized service center for any abnormity of the wireless device or accessories.
• Do not dismantle the wireless device or accessories. Otherwise, the wireless device and accessories are not covered by the warranty.
4
Emergency Call
This wireless device functions through receiving and transmitting radio signals. Therefore, the connection cannot be guaranteed in all conditions. In an emergency, you should not rely solely on the wireless device for essential communications.
Specific Absorption Rate (SAR)
Your wireless device is a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves recommended by international guidelines. These guidelines were developed by the independent scientific organization ICNIRP and include safety margins designed to assure the protection of all persons, regardless of age and health. The guidelines use a unit of measurement known as the
Specific Absorption Rate, or SAR. The SAR limit for wireless devices is .0 W/kg and the highest SAR value for this device when tested complied with this limit.
Body Worn Operation
Important safety information regarding radiofrequency radiation (RF) exposure. To ensure compliance with
RF exposure guidelines the device must be used with a minimum of 1.5 cm separation from the body.
Failure to observe these instructions could result in your RF exposure exceeding the relevant guideline limits.
Regulatory Information
The following approvals and notices apply in specific regions as noted.
CE Approval (European Union) The wireless device is approved to be used in the member states of the EU.
The wireless device is in compliance with the essential requirements and other relevant provisions of the
Radio and Telecommunications Terminal Equipment Directive 1999/5/EC (R&TTE Directive).
Federal Communications Commission Notice (United States) : Before a wireless device model is available for sale to the public, it must be tested and certified to the FCC that it does not exceed the limit established by the government-adopted requirement for safe exposure.
The SAR limit adopted by the USA and Canada is 1.6 watts/kilogram (W/kg) averaged over one gram of tissue. The highest SAR value reported to the FCC for this device type was compliant with this limit.
FCC Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and () this device must accept any interference received, including interference that may cause undesired operation.
* This device should be installed and operated with a minimum distance of 0 cm between the radiator and your body when using it via USB cable
4
D
DHCP
DNS
DL
E
EDGE
G
GSM
GPRS
GGSN
H
HSPA
HSDPA
HSUPA
HLR
I
IP
ICMP
L
LAN
LED
LTP
M
MIR 850
MSC
15. Abbreviations
G The Third Generation of Mobile communication
A
AC
ARP
AP
APN
C
CDMA
Alternating Current
Address Resolution Protocol
Access Point
Access Point Name
Code Division Multiple Access
Dynamic Host Configuration Protocol
Domain Name Server
Downlink (Download)
Enhanced Data rates for GSM Evolution
Global System for Mobile communications
General Packet Radio Service
Gateway GPRS Support Node
High Speed Packet Access
High Speed Downlink Packet Access
High Speed Uplink Packet Access
Home Location Register
Internet Protocol
Internet Control Message Protocol
Local Area Network
Light Emitting Diode
Layer Tunneling Protocol
Mobile Internet Router 850
Mobile Switching Center
44
N
NAT
P
PCS
PSTN
POTS
PPTP
R
RTT
S
SOHO
SCP
SGSN
SDRAM
T
TKIP
U
UMTS
UL
V
VLR
VPN
W
WAN
WEP
WLAN
WPA
WPA
WCDMA
WI-FI
Network Address Translation
Personal Communication Systems
Public Switched Telephone Network
Plain Old Telephone Service
Point to Point Tunneling Protocol
Radio Transmission Technology
Small Office Home Office
Service Control Point
Serving GPRS Support Node
Synchronous Dynamic Random Access Memory
Temporal Key Integrity Protocol
Universal Mobile Telecommunications System
Uplink (Upload)
Visitor Location Register
Virtual Private Network
Wide Area Network
Wired Equivalent Privacy
Wireless Local Area Network
Wi-Fi Protected Access
Wi-Fi Protected Access version
Wideband CDMA
Wireless Fidelity
45
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project