Tenda Router 11N User Manual
Have a look at the manual Tenda Router 11N User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 4 Tenda manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
11N Wireless Broadband Router User Guide 46 Chapter 9 Routing Settings 9.1 Routing Table This page shows the router’s core routing table. The main duty for a router is to look for a best path for every data packet, and transfer this data packet to a destination station. In order to fulfill this function, many transferring paths, i.e. routing table, are saved in the router, for choosing when needed. 9.2 Static Routing This screen is used to set the router’s static routing. A static route is a pre-determined pathway that network information must travel to reach a specific host or network. Destination network IP address: The destination host or IP segment you visit. Subnet mask: Enter the subnet mask, generally it is 255.255.255.0 Gateway: The entry IP address of the next router. NOTE:
11N Wireless Broadband Router User Guide 47 1. The gateway must be at the same net segment with the router’s LAN IP. 2. If the destination IP address is one host’ address, then the subnet mask must be 255.255.255.255. 3. If the destination IP address is an IP segment, then it must match with the subnet mask. For example, if the destination IP is 10.0.0.0 then the subnet mask must be 255.0.0.0
11N Wireless Broadband Router User Guide 48 Chapter 10 System Tools 10.1 Time Settings This section is to configure the router’s system time. You can set it manually or obtain the GMT time from the Internet. Time zone: Select the time zone where you are operating the Router from the drop-down list. Customized time: Enter the time you wish to configure. NOTE: When the Router is powered off, the time settings will be lost. The router will obtain the GMT time automatically when you next time access the Internet. Only when you connect to the Internet and obtain the GMT time or set the time on this screen, can the time settings in other functions (e.g. security settings) take effect. 10.2 DDNS The DDNS (Dynamic Domain Name System) is supported in this Router. It is used to assign a fixed host and domain name to a dynamic Internet IP address. Every time you access the Internet, the dynamic domain name software installed on your host will tell the ISP’S host server its dynamic IP address by sending messages. And the server software is responsible for providing DNS service and implementing dynamic domain name resolution.
11N Wireless Broadband Router User Guide 49 Main features: 1. Mostly, your ISP provides a dynamic IP address and the DDNS is used to capture the changeable IP address and match to the fixed domain. Then users can have access to the Internet to communicate with others outside the network. 2. DDNS can help you to establish a virtual host in your home or company. DDNS: Click the radio button to enable or disable the DDNS service. Service provider: Select one from the drop-down list and click “Sign up” for registration. Username: Enter the username that you use to register from the DDNS provider Password: Enter the password that you use to register from the DDNS provider Domain name: Enter the effective registered domain name For example: Establish a Web server in the local host 192.168.0.10 and register in 3322.org as follows: Username Tenda Password 123456 Domain Name tenda.3322.org After mapping the port in the virtual server, and setting account information in DDNS server, you can then access the web page by entering http://tenda.3322.org in the address field. 10.3 Backup/Restore On this screen, you can back up the router’s current settings or restore previous settings.
11N Wireless Broadband Router User Guide 50 Backup Setting: Click the Backup button to back up the Router’s settings and select a path to save them. Click the “Save” button to save the configuration files. Restore Setting: Click the “Browse” button to select the backup files.
11N Wireless Broadband Router User Guide 51 Click the “Restore” button to restore previous settings. 10.4 Restore to Factory Default This screen allows you to restore all settings to the factory default values. Restore: Click this button to restore to default settings. Factory default settings: Password: NULL(the default password displays as null) IP address: 192.168.0.1 Subnet mask: 255.255.255.0 NOTE: After restoring to default settings, please restart the router to make the default settings effective. 10.5 Upgrade By upgrading the router’s software, you’ll get better software version and appreciated routing function. Before upgrading, download the Router’s software upgrade file from our website, www.tenda.cn.
11N Wireless Broadband Router User Guide 52 Browse: Click this button to select the upgrade file. Upgrade: Click this button to start the upgrading process. After the upgrade is completed, the router will reboot automatically. 10.6 Reboot the Router Reboot the router to make the configuration effective. The router will cut its WAN connection automatically after rebooting. Reboot the router: Click this button to reboot the router. 10.7 Password Change This section is to set a new password to better secure your router and network.
11N Wireless Broadband Router User Guide 53 Old password: Enter the old password. New password: Enter a new password. Confirm new password: Re-enter to confirm the new password. NOTE: The default password displays as null, users can log on the web-based utility without any authentication. To secure the router and your network, it is highly recommended that you change the initial password. 10.8 Syslog The section is to view the system log. You can view various conditions appearing after system start, and also check whether there’s an attack on the network. The log can record at most 150 entries. Refresh: Click this button to update the log. Clear: Click this button to clear the current shown log. 10.9 Log out After all settings are finished, please click’” Log out” to exit securely and completely.
11N Wireless Broadband Router User Guide 55 Appendix 1 Glossary Channel: An instance of medium use for the purpose of passing protocol data units (PDUs) that may be used simultaneously, in the same volume of space, with other instances of medium use(on other channels) by other instances of the same physical layer (PHY),with an acceptably low frame error ratio(FER) due to mutual interference. SSID: SSID (Service Set Identifier) is the network name shared by all devices in a wireless network. Your network’s SSID should be unique to your network and identical for all devices within the network. It is case-sensitive and must not exceed 20 characters (use any of the characters on the keyboard).Make sure this setting is the same for all devices in your wireless network. WPA/WPA2 Encryption: A security protocol for wireless networks that builds on the basic foundations of WEP. It secures wireless data transmission by using a key similar to WEP, but the added strength of WPA is that the key changes dynamically. The changing key makes it much more difficult for a hacker to learn the key and gain access to the network.WPA2 is the second generation of WPA security and provides a stronger encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some government users. 802,1x authentication Static WEP key is difficult to manage for when you change the key, you will have to inform all others, and if the key is disclosed in one of the places, the key can no longer provide security. Besides, there’s severe security loophole about static WEP encryption. The WEP key can be decrypted after one person receives a specific amount of data via wireless intercepting. 802,1x is initially used for wired Ethernet authentication access to prevent illegal users from accessing the network. Later, it is found that 802.1x can better solve the wireless network security problem. EAP-TLS of the 802.1x successfully achieves the two-way authentication between users and networks, i.e. can prevent illegal users from accessing the network and can also prevent users from accessing the illegal AP. 802.1x utilizes dynamic WEP encryption to protect the WEP key from being decrypted. To solve the publishing problem for digital certification, people make some changes to TLS authentication and TTLS and EAP come into exist, which enable you to access the network by using the traditional way of authentication: username and password.