Edimax Router BR-6215NRg User Manual
Have a look at the manual Edimax Router BR-6215NRg User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
30 2.4.2 Advanced Settings You can set advanced wireless LAN parameters of this router. The parameters include Authentication Type, Fragment Threshold, RTS Threshold, Beacon Interval, preamble Type …… You should not change these parameters unless you know what effect the changes will have on this router. Parameters Description Fragment Threshold Fragment Threshold specifies the maximum size of packet during the fragmentation of data to be transmitted. If you set this value too low, it will result in bad performance. RTS Threshold When the packet size is smaller the RTS threshold, the wireless router will not use the RTS/CTS mechanism to send this packet. Beacon Interval The interval of time that this wireless router broadcast a beacon. Beacon is used to synchronize the wireless network. DTIM Period The DTIM period you specify here indicates how often the clients served by this access point should check for buffered data still on the AP awaiting pickup. Data Rate The “Data Rate” is the rate this access point uses to transmit data packets. The access point will use the highest possible selected transmission rate to transmit the data packets. Preamble Type The “Long Preamble” can provide better wireless LAN compatibility while the “Short Preamble” can provide better wireless LAN performance. Broadcast ESSID If you enable “Broadcast ESSID”, every wireless station located within the coverage of this access point can discover this access point easily. If you are building a public wireless network, enabling this feature is recommended. Disabling “Broadcast ESSID” can provide better security. IAPP If you enable “IAPP”, it will allow wireless station roaming between IAPP enabled access points within the same wireless LAN. CTS Protect It is recommended to enable the protection mechanism. This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the AP will be a little lower due to many of frame traffic should be transmitted. Tx Power You can adjust the wireless transmit power here. By reduce the tx power can let the wireless signal only cover your working area.
31 Turbo Mode By enable the turbo mode can enhance the throughput up to 35Mbps. WMM WMM stands for Wi-Fi Multimedia. It is a standard created to define quality of service (QoS) in Wi-Fi networks. This adds prioritized capabilities to Wi-Fi networks and optimizes their performance when multiple concurring applications, each with different latency and throughput requirements, compete for network resources. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router. 2.4.3 Security This Router provides complete wireless LAN security functions, include WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from illegal access. Please make sure your wireless stations use the same security function. 2.4.3.1 WEP only When you select 64-bit or128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by yourself and enter it. You can enter four WEP keys and select one of them as default key. Then the router can receive any packets encrypted by one of the four keys Parameters Default Description Key Length 64-bit You can select the WEP key length for encryption, 64-bit or 128-bit. Larger WEP key length will provide higher level of security, but the throughput will be lower. Key Format - You may to select ASCII Characters (alphanumeric format) or Hexadecimal Digits (in the A-F, a-f and 0-9 range) to be the WEP Key. For example: ASCII Characters: guest Hexadecimal Digits: 12345abcde Default Key Key 1 Select one of the four keys to encrypt your data. Only the key you select it in the Default key will take effect. Key 1 - Key 4 - The WEP keys are used to encrypt data transmitted in the wireless network. Fill the text box by following the rules: 64-bit WEP: input 10- digit Hex values (in the A-F, a-f and 0-9 range) or 5-digit ASCII
32 character as the encryption keys. 128-bit WEP: input 26-digit Hex values (in the A-F, a-f and 0-9 range) or 13-digit ASCII characters as the encryption keys. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place)
33 2.4.3.2 802.1x only IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates user by IEEE 802.1x, but it does not encryption the data during communication. Parameters Description RADIUS Server IP address The IP address of external RADIUS server. RADIUS Server Port The service port of the external RADIUS server. RADIUS Server Password The password used by external RADIUS server. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place) 2.4.3.3 802.1x WEP Static key IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode also uses WEP to encrypt the data during communication.
34 For the WEP settings please refer to section 2.4.3.1 “WEP only”. For the 802.1x settings, please refer to section 2.4.3.2 “802.1x only”.
35 2.4.3.4 WPA Pre-shared key Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless stations and encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. So the encryption key is not easy to be broken by hackers. This can improve security very much. Parameters Description WPA(TKIP) TKIP can change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) This use CCMP protocol to change encryption key frequently. AES can provide high level encryption to enhance the wireless LAN security. WPA2 Mixed This will use TKIP or AES based on the other communication peer automatically. Pre-shared Key Format You may select to select Passphrase (alphanumeric format) or Hexadecimal Digits (in the “A- F”, “a-f” and “0-9” range) to be the Pre-shared Key. For example: Passphrase: iamguest Hexadecimal Digits: 12345abcde Pre-shared Key The Pre-shared key is used to authenticate and encrypt data transmitted in the wireless network. Fill the text box by following the rules below. Hex WEP: input 64-digit Hex values (in the “A-F”, “a-f” and “0-9” range) or at least 8 character pass phrase as the pre-shared keys. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place) 2.4.3.5 WPA Radius Wi-Fi Protected Access (WPA) is an advanced security standard. You can use an external RADIUS server to authenticate wireless stations and provide the session key to encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. This can improve security very much.
36 Parameters Description WPA(TKIP) TKIP can change the encryption key frequently to enhance the wireless LAN security. WPA2(AES) This use CCMP protocol to change encryption key frequently. AES can provide high level encryption to enhance the wireless LAN security. WPA2 Mixed This will use TKIP or AES based on the other communication peer automatically. RADIUS Server IP address The IP address of external RADIUS server. RADIUS Server Port The service port of the external RADIUS server. RADIUS Server Password The password used by external RADIUS server. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place) 2.4.4 Access Control This wireless router provides MAC Address Control, which prevents the unauthorized MAC Addresses from accessing your wireless network.
37 Parameters Description Enable wireless access control Enable wireless access control Add MAC address into the list Fill in the MAC Address and Comment of the wireless station to be added and then click Add. Then this wireless station will be added into the Current Access Control List below. If you find any issues before adding it and want to retype again. Just click Clear and both MAC Address and Comment fields will be cleared. Remove MAC address from list If you want to remove some MAC address from the Current Access Control List , select the MAC addresses you want to remove in the list and then click Delete Selected. If you want remove all MAC addresses from the table, just click Delete All button. Click Reset will clear your current selections. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place) 2.5 QoS The QoS can let you classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth. This can let you have a better experience in using critical real time services like Internet phone, video conference …etc. All the applications not specified by you are classified as rule name “Others”. The rule with smaller priority number has higher priority; the rule with larger priority number has lower priority. You can adjust the priority of the rules by moving them up or down. Note: If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the WAN port, the other applications will not get any bandwidth.
38 Parameters Description Enable/Disable QoS You can check “Enable QoS” to enable QoS function for the WAN port. You also can uncheck “Enable QoS” to disable QoS function for the WAN port. Total Download Bandwidth Here you can set maximum download bandwidth for all the users of the router sharing. Total Upload Bandwidth Here you can set the maximum upload bandwidth for all the users of the router sharing. Add a QoS rule into the table Click “Add” then you will enter a form of the QoS rule. Click “Apply” after filling out the form and the rule will be added into the table. Remove QoS rules from table If you want to remove some QoS rules from the table, select the QoS rules you want to remove in the table and then click Delete Selected. If you want remove all QoS rules from the table, just click Delete All button. Click Reset will clear your current selections. Edit a QoS rule Select the rule you want to edit and click “Edit”, then you will enter the detail form of the QoS rule. Click “Apply” after editing the form and the rule will be saved. Adjust QoS rule priority You can select the rule and click “Move Up” to make its priority higher. You also can select the rule and click “Move Down” to make its priority lower. Edit QoS Rule: You can assign packet classification criteria by its local IP range, remote IP range, traffic type, protocol, local port range and remote port range parameters. The parameters that you leave as blank will be ignored. The priority of this rule will be applied to packets that match classification criteria of this rule. You can limit bandwidth consumed by packets that match this rule or guarantee bandwidth required by packets that match this rule.
39 Parameters Description Rule Name The name of this rule. Bandwidth You can assign the download or upload bandwidth by the unit of Kbps (1024 bit per second). You can limit the maximum bandwidth consumed by this rule by selecting “Maximum”. You also can reserve enough bandwidth for this rule by selecting “Guarantee”. Local IP Address Enter the local IP address range of the packets that this rule will apply to. If you assign 192.168.2.3 – 192.168.2.5, it means 3 IP addresses: 192.168.2.3, 192.168.2.4 and 192.168.2.5 Local Port Range Enter the local port range of the packets that this rule will apply to. You can assign a single port number here or assign a range of port numbers by assigning the first port number and the last port number of the range. The two numbers are separated by a dash “-“, for example “101-150” means from port number 100 to port number 150 – the range of 50 port numbers. Remote IP Address Enter the remote IP address range of the packets that this rule will apply to. If you assign 192.168.2.3 – 192.168.2.5, it means 3 IP addresses: 192.168.2.3, 192.168.2.4 and 192.168.2.5 Remote Port Range Enter the remote port range of the packets that this rule will apply to. You can assign a single port number here or assign a range of port numbers by assigning the first port number and the last port number of the range. The two numbers are separated by a dash “-“, for example “101-150” means from port number 100 to port number 150 – the range of 50 port numbers. Traffic Type Select the traffic type of the packets that this rule will apply to. We list some popular applications here to ease the configuration. You also can get the same result by using other parameters, for example source or destination port number, if you are familiar with the application protocol. Protocol Select the protocol type of the packets that this rule will apply to. Apply Apply and exit the form. Reset Clear the content of this form. Click at the bottom of the screen to save the above configurations. You can now configure other advance sections or start using the router (with the advance settings in place)