Edimax Router AR-7265WnA User Manual
Have a look at the manual Edimax Router AR-7265WnA User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
33 5.2.3. Wireless z Access Point Settings Parameter Description Access Point Activated or deactivated the wireless function of the router. When it is activated, the router will be an access point for other wireless clients to connect wirelessly. Channel It is the radio channel used by the wireless LAN. All devices in the same wireless LAN should use the same channel. Please select the country you are located and designate a channel that the router will use. If you want to let the router automatically find an available channel with the highest signal strength, please select “Auto”. The
34 auto-selective channel will be shown in the “Current Channel” field. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the router is “default”. Beacon Interval The interval of time that this wireless router broadcast a beacon. Beacon is used to synchronize the wireless network. The range for the beacon period is between 20 and 1000 with a typical value of 100 (milliseconds). RTS/CTS Threshold When the packet size is smaller than the RTS threshold, the wireless router will not use the RTS/CTS mechanism to send this packet. The range is from 1500 to 2347. Fragmentation Threshold Fragment Threshold specifies the maximum size of packet during the fragmentation of data to be transmitted. If you set this value too low, it will result in bad performance. Enter a value from 256 to 2346. DTIM Determines the interval the Access Point will send its broadcast traffic. The range is from 1 to 255 and the default value is 3 beacons. 802.11b/g/n 802.11 b – This router will only work in 802.11b mode. If there are only 802.11b wireless clients in the network, you can set the router to this mode. 802.11 g – This router will only work in 802.11g mode. If there are only 802.11g wireless clients in the network, you can set the router to this mode. 802.11 b+g+n – This router will support 802.11b, 802.11g and 802.11n communications simultaneously. It is
35 Channel Bandwidth recommended to set this mode. 20MHz or 20/40MHz Auto. z Multiple SSIDs Settings Parameter Description SSID Index This router can support multiple SSIDs. By default, this function is disabled. You can only set a set of SSID. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the router is “default”. Broadcast SSID Select “Yes” to make the SSID to be visible so wireless clients can scan the router within the network. Select “No” if you want to hide the SSID of the router. Wireless clients have to set the same SSID of the router in order to access the network. Authentication Type To prevent unauthorized wireless clients from accessing the router, this router supports WEP, WPA-PSK and WPA2-PSK authentication type. If the router has enabled the authentication, all the wireless clients’ settings have to be consistent with the router for building the connection.
36 z WEP/WPA-PSK/WPA2-PSK Parameter Description WEP-64Bits WEP is less level of security than WPA. WEP supports 64-bit and 128-bit key lengths to encrypt the wireless data. The longer key length will provide higher security. When “WEP-64Bits” is selected, you have to enter exactly 5 ASCII characters (“a-z” and “0-9”) or 10 hexadecimal digits (0-9, a-f) for each Key (1-4). WEP-128Bits When “WEP-128Bits” is selected, you have to enter exactly 13 ASCII characters (“a-z” and “0-9”) or 26 hexadecimal digits (0-9, a-f) for each Key (1-4). Parameter Description WPA-PSK WPA-PSK is suitable for home and small business. It uses TKIP or AES for data encryption. When “WPA-PSK” is selected, please select the encryption method and enter 8-63 characters as the “Pre-Shared Key”. WPA2-PSK WPA2-PSK is also for home and small business. It uses TKIP or AES for data encryption. WPA2-PSK offers the highest level of security. When “WPA2-PSK” is selected, please select the encryption method and enter 8-63 characters as the “Pre-Shared Key”.
37 z Wireless MAC Address Filter Parameter Description Active This router can prevent the wireless clients from accessing the wireless network by checking the MAC Address of the clients. If you enable this function, please set the MAC Address of the wireless clients that you want to filter. Action Allow Association – Only allow the wireless clients with the MAC Address you have specified can access to the router. Deny Association – The wireless clients with the MAC Address you have specified will be denied accessing to the router. Mac Address #1-8 Please enter the MAC Address of the wireless clients for the filtering control.
38 5.3. Advanced Setup 5.3.1. Firewall Parameter Description Firewall When you enable the firewall function, it will protect you from following attacks of WAN side: z SYN flooding attack z Ping of Death z Teardrop z Land attack SPI If you enable SPI, all traffics initiated from WAN site will be blocked including DMZ, Virtual Server, etc.
39 5.3.2. Routing z Routing Table List You can see the current routing table of the router here. If you want to add another routing rule, please click “ADD ROUTE”. Parameter Description Dest IP Show the IP Address of the destination LAN. Mask Show the Subnet Mask of the destination LAN. If it shows “8” that means the Subnet Mask is “255.0.0.0”; “16” means the Subnet Mask is “255.255.0.0”; “24” means the Subnet Mask is “255.255.255.0”. Parameter Description Gateway IP The next stop gateway of the path toward the destination LAN. This is the IP of the neighbor router that this router should communicate with on the path to the destination LAN. Metric The number of hops (routers) to pass through to reach the destination LAN. It must be between 1 and 15. Device Show the interface that go to the next hop (router), such as LAN port.
40 Use The counter for access time. Edit Edit the route, this icon is not shown for system default route. Drop Drop the route, this icon is not shown for system default route. z Add Route If you have another router with a LAN-to-LAN connection, you may need to create a static routing on the router that is the gateway to Internet. Parameter Description Destination IP Address Enter the IP Address of the destination LAN. IP Subnet Mask Enter the Subnet Mask address of the destination LAN. Gateway IP Address This is the gateway IP Address where packets are sent. Enter the gateway IP Address and select the channel (PVC) you want to configure. Metric The number of hops (routers) to pass through to reach the destination LAN. It must be between 1 and 15.
41 Announced in RIP Select “Yes”, this routing path will be propagated to other hosts through RIP broadcasts. Select “No”, this routing path will be kept private and it is not included in RIP broadcasts. 5.3.3. NAT 5.3.3.1. NAT Network Address Translation (NAT) allows multiple users at your local site to access the Internet through a single Public IP Address or multiple Public IP Addresses. NAT provides Firewall protection from hacker attacks and has the flexibility to allow you to map Private IP Addresses to Public IP Addresses for key services such as Websites and FTP. Parameter Description Virtual Circuit VPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier define a virtual circuit. Please select the channel (PVC) you want to configure. NAT Status The activated or deactivated status for the NAT function will be shown here.
42 Number of IPs Select “Single” if you only have a public IP Address. Select “Multiple” if you have multiple IP Addresses. 5.3.3.2. DMZ The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP Address as the DMZ Host, all incoming packets will be checked by the firewall and NAT algorithms then passed to the DMZ Host. For example, if you have a local client PC that cannot run an Internet application (e.g. Games) properly from behind the NAT firewall, then you can open the client up to unrestricted two-way Internet access by defining a DMZ Host. Parameter Description DMZ setting for Show the DMZ setting is for single or multiple IP Addresses. DMZ Enable or disable the DMZ function. DMZ Host IP Address Enter a static IP Address to the DMZ Host. This IP Address will be exposed to the Internet. 5.3.3.3. Virtual Server Use the Virtual Server function when you want different servers/clients in your LAN to handle different service/Internet application type (e.g. Email, FTP, Web