Edimax Router AR-7084A User Manual
Here you can view all the pages of manual Edimax Router AR-7084A User Manual. The Edimax manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 41
33 SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the router is “default”. Beacon Interval The interval of time that this wireless router broadcast a beacon. Beacon is used to synchronize the wireless network. The range for the beacon period is between 20 and 1000 with a typical value of 100 (milliseconds). RTS/CTS Threshold When the packet size is...
Page 42
34 z Multiple SSIDs Settings Parameter Description SSID Index This router can support multiple SSIDs. By default, this function is disabled. You can only set a set of SSID. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the router is “default”. Broadcast SSID Select “Yes” to make the SSID to be visible so wireless clients can scan the router within...
Page 43
35 WEP-128Bits When “WEP-128Bits” is selected, you have to enter exactly 13 ASCII characters (“a-z” and “0-9”) or 26 hexadecimal digits (0-9, a-f) for each Key (1-4). Parameter Description WPA-PSK WPA-PSK is suitable for home and small business. It uses TKIP or AES for data encryption. When “WPA-PSK” is selected, please select the encryption method and enter 8-63 characters as the “Pre-Shared Key”. WPA2-PSK WPA2-PSK is also for home and small business. It uses TKIP or AES for...
Page 44
36 Address you have specified will be denied accessing to the router. Mac Address #1-8 Please enter the MAC Address of the wireless clients for the filtering control. 5.3. Advanced Setup 5.3.1. Firewall Parameter Description Firewall When you enable the firewall function, it will protect you from following attacks of WAN side: z SYN flooding attack z Ping of Death z Teardrop z Land attack SPI If you enable SPI, all traffics initiated from WAN site will be blocked including...
Page 45
37 5.3.2. Routing z Routing Table List You can see the current routing table of the router here. If you want to add another routing rule, please click “ADD ROUTE”. Parameter Description Dest IP Show the IP Address of the destination LAN. Mask Show the Subnet Mask of the destination LAN. If it shows “8” that means the Subnet Mask is “255.0.0.0”; “16” means the Subnet Mask is “255.255.0.0”; “24” means the Subnet Mask is “255.255.255.0”. Parameter Description Gateway IP The next...
Page 46
38 Use The counter for access time. Edit Edit the route, this icon is not shown for system default route. Drop Drop the route, this icon is not shown for system default route. z Add Route If you have another router with a LAN-to-LAN connection, you may need to create a static routing on the router that is the gateway to Internet. Parameter Description Destination IP Address Enter the IP Address of the destination LAN. IP Subnet Mask Enter the Subnet Mask address of the...
Page 47
39 Announced in RIP Select “Yes”, this routing path will be propagated to other hosts through RIP broadcasts. Select “No”, this routing path will be kept private and it is not included in RIP broadcasts. 5.3.3. NAT 5.3.3.1. NAT Network Address Translation (NAT) allows multiple users at your local site to access the Internet through a single Public IP Address or multiple Public IP Addresses. NAT provides Firewall protection from hacker attacks and has the flexibility to allow you to...
Page 48
40 Number of IPs Select “Single” if you only have a public IP Address. Select “Multiple” if you have multiple IP Addresses. 5.3.3.2. DMZ The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP Address as the DMZ Host, all incoming packets will be checked by the firewall and NAT algorithms then passed to the DMZ Host. For example, if you have a local client PC that cannot run an Internet application (e.g. Games) properly from behind the NAT firewall,...
Page 49
41 server etc.) from the Internet. Computers use numbers called port numbers to recognize a particular service/Internet application type. The Virtual Server allows you to re-direct a particular service port number (from the Internet/WAN) to a particular LAN private IP Address and its service port number. Parameter Description Virtual Server for Show the Virtual Server setting is for single or multiple IP Addresses. Rule Index Choose the rule number. Application Select the application...
Page 50
42 End Port Number Enter the end port number. Local IP Address It is recommended to enter a static IP Address for the server here. If the server’s IP Address is obtained from DHCP Server, the IP Address may be changed dynamically and will cause problem on this feature. Please assign a static IP Address to the server and make sure that the IP Address is not in the range of IP Addresses that the DHCP Server will assign. 5.3.4. ADSL Parameter Description ADSL Mode The default...