Home > Edimax > Router > Edimax Router BR-6215NRg User Manual

Edimax Router BR-6215NRg User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Edimax Router BR-6215NRg User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Edimax manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    30  
    2.4.2 Advanced Settings 
    You can set advanced wireless LAN parameters of this router. The parameters include Authentication Type, Fragment 
    Threshold, RTS Threshold, Beacon Interval, preamble Type …… You should not change these parameters unless you 
    know what effect the changes will have on this router. 
     
    Parameters   Description 
    Fragment Threshold Fragment Threshold specifies the maximum size of packet during the fragmentation of 
    data to be transmitted. If you set this value too low, it will result in bad performance. 
    RTS Threshold When the packet size is smaller the RTS threshold, the wireless router will not use the 
    RTS/CTS mechanism to send this packet. 
    Beacon Interval The interval of time that this wireless router broadcast a beacon. Beacon is used to 
    synchronize the wireless network. 
    DTIM Period The DTIM period you specify here indicates how often the clients served by this access 
    point should check for buffered data still on the AP awaiting pickup. 
    Data Rate The “Data Rate” is the rate this access point uses to transmit data packets. The access 
    point will use the highest possible selected transmission rate to transmit the data packets.
    Preamble Type The “Long Preamble” can provide better wireless LAN compatibility while the “Short 
    Preamble” can provide better wireless LAN performance. 
    Broadcast ESSID If you enable “Broadcast ESSID”, every wireless station located within the coverage of 
    this access point can discover this access point easily. If you are building a public 
    wireless network, enabling this feature is recommended. Disabling “Broadcast ESSID” 
    can provide better security. 
    IAPP If you enable “IAPP”, it will allow wireless station roaming between IAPP enabled access 
    points within the same wireless LAN. 
    CTS Protect It is recommended to enable the protection mechanism. This mechanism can decrease 
    the rate of data collision between 802.11b and 802.11g wireless stations. When the 
    protection mode is enabled, the throughput of the AP will be a little lower due to many of 
    frame traffic should be transmitted. 
    Tx Power You can adjust the wireless transmit power here. By reduce the tx power can let the 
    wireless signal only cover your working area.  
    						
    							 
    31  
    Turbo Mode  By enable the turbo mode can enhance the throughput up to 35Mbps. 
    WMM WMM stands for Wi-Fi Multimedia. It is a standard created to define quality of service 
    (QoS) in Wi-Fi networks. This adds prioritized capabilities to Wi-Fi networks and 
    optimizes their performance when multiple concurring applications, each with different 
    latency and throughput requirements, compete for network resources. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router. 
     
     
     
    2.4.3 Security 
    This Router provides complete wireless LAN security functions, include WEP, IEEE 802.11x, IEEE 802.11x with WEP, 
    WPA with pre-shared key and WPA with RADIUS. With these security functions, you can prevent your wireless LAN from 
    illegal access. Please make sure your wireless stations use the same security function. 
     
    2.4.3.1 WEP only 
    When you select 64-bit or128-bit WEP key, you have to enter WEP keys to encrypt data. You can generate the key by 
    yourself and enter it. You can enter four WEP keys and select one of them as default key. Then the router can receive 
    any packets encrypted by one of the four keys 
     
    Parameters   Default Description 
    Key Length  
    64-bit You can select the WEP key length for encryption, 64-bit or 128-bit. 
    Larger WEP key length will provide higher level of security, but the 
    throughput will be lower. 
    Key Format  
     
    - You may to select ASCII Characters (alphanumeric format) or 
    Hexadecimal Digits (in the A-F, a-f and 0-9 range) to be the WEP 
    Key. 
    For example: ASCII Characters: guest 
    Hexadecimal Digits: 12345abcde 
    Default Key Key 1  Select one of the four keys to encrypt your data. Only the key you select 
    it in the Default key will take effect. 
    Key 1 - Key 4  
    - The WEP keys are used to encrypt data transmitted in the wireless 
    network. Fill the text box by following the rules: 64-bit WEP: input 10-
    digit Hex values (in the A-F, a-f and 0-9 range) or 5-digit ASCII  
    						
    							 
    32  
    character as the encryption keys. 
    128-bit WEP: input 26-digit Hex values (in the A-F, a-f and 0-9 
    range) or 13-digit ASCII characters as the encryption keys. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place) 
      
    						
    							 
    33  
    2.4.3.2 802.1x only 
    IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before 
    accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates user by 
    IEEE 802.1x, but it does not encryption the data during communication. 
     
    Parameters   Description 
    RADIUS Server IP 
    address The IP address of external RADIUS server. 
    RADIUS Server Port  The service port of the external RADIUS server. 
    RADIUS Server Password  The password used by external RADIUS server. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place) 
     
    2.4.3.3 802.1x WEP Static key 
    IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before 
    accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode also uses WEP to encrypt 
    the data during communication.  
    						
    							 
    34  
     
    For the WEP settings please refer to section 2.4.3.1 “WEP only”. For the 802.1x settings, please refer to section 2.4.3.2 
    “802.1x only”. 
      
    						
    							 
    35  
    2.4.3.4 WPA Pre-shared key 
    Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a pre-shared key to authenticate wireless 
    stations and encrypt data during communication. It uses TKIP or CCMP (AES) to change the encryption key frequently. 
    So the encryption key is not easy to be broken by hackers. This can improve security very much. 
     
    Parameters   Description 
    WPA(TKIP)  TKIP can change the encryption key frequently to enhance the wireless LAN security. 
    WPA2(AES) This use CCMP protocol to change encryption key frequently. AES can provide high level 
    encryption to enhance the wireless LAN security. 
    WPA2 Mixed  This will use TKIP or AES based on the other communication peer automatically. 
    Pre-shared Key 
    Format You may select to select Passphrase (alphanumeric format) or Hexadecimal Digits (in the “A-
    F”, “a-f” and “0-9” range) to be the Pre-shared Key. For example:  
    Passphrase: iamguest 
    Hexadecimal Digits: 12345abcde 
    Pre-shared Key The Pre-shared key is used to authenticate and encrypt data transmitted in the wireless 
    network. Fill the text box by following the rules below.  Hex WEP: input 64-digit Hex values (in 
    the “A-F”, “a-f” and “0-9” range) or at least 8 character pass phrase as the pre-shared keys. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place) 
     
    2.4.3.5 WPA Radius 
    Wi-Fi Protected Access (WPA) is an advanced security standard. You can use an external RADIUS server to 
    authenticate wireless stations and provide the session key to encrypt data during communication. It uses TKIP or CCMP 
    (AES) to change the encryption key frequently. This can improve security very much.  
    						
    							 
    36  
     
     
     
     
    Parameters   Description 
    WPA(TKIP)  TKIP can change the encryption key frequently to enhance the wireless LAN security. 
    WPA2(AES) This use CCMP protocol to change encryption key frequently. AES can provide high level 
    encryption to enhance the wireless LAN security. 
    WPA2 Mixed  This will use TKIP or AES based on the other communication peer automatically. 
    RADIUS Server IP 
    address The IP address of external RADIUS server. 
    RADIUS Server Port  The service port of the external RADIUS server. 
    RADIUS Server 
    Password The password used by external RADIUS server. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place) 
     
    2.4.4 Access Control 
    This wireless router provides MAC Address Control, which prevents the unauthorized MAC Addresses from accessing 
    your wireless network.  
    						
    							 
    37  
     
    Parameters   Description 
    Enable wireless access 
    control Enable wireless access control 
    Add MAC address into the 
    list Fill in the MAC Address and Comment of the wireless station to be added and then click 
    Add. Then this wireless station will be added into the Current Access Control List below. 
    If you find any issues before adding it and want to retype again. Just click Clear and both 
    MAC Address and Comment fields will be cleared. 
    Remove MAC address 
    from list If you want to remove some MAC address from the Current Access Control List , select 
    the MAC addresses you want to remove in the list and then click Delete Selected. If you 
    want remove all MAC addresses from the table, just click Delete All button. Click Reset 
    will clear your current selections. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place) 
     
    2.5 QoS 
    The QoS can let you classify Internet application traffic by source/destination IP address and port number. You can 
    assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority 
    will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth. 
    This can let you have a better experience in using critical real time services like Internet phone, video conference …etc. 
    All the applications not specified by you are classified as rule name “Others”. The rule with smaller priority number has 
    higher priority; the rule with larger priority number has lower priority. You can adjust the priority of the rules by moving 
    them up or down.  
     
    Note: If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the 
    WAN port, the other applications will not get any bandwidth.  
    						
    							 
    38  
     
    Parameters   Description 
    Enable/Disable QoS You can check “Enable QoS” to enable QoS function for the WAN port. You also can 
    uncheck “Enable QoS” to disable QoS function for the WAN port. 
    Total Download 
    Bandwidth Here you can set maximum download bandwidth for all the users of the router sharing. 
    Total Upload Bandwidth  Here you can set the maximum upload bandwidth for all the users of the router sharing. 
    Add a QoS rule into the 
    table Click “Add” then you will enter a form of the QoS rule. Click “Apply” after filling out the form 
    and the rule will be added into the table. 
    Remove QoS rules from 
    table If you want to remove some QoS rules from the table, select the QoS rules you want to 
    remove in the table and then click Delete Selected. If you want remove all QoS rules from 
    the table, just click Delete All button. Click Reset will clear your current selections. 
    Edit a QoS rule Select the rule you want to edit and click “Edit”, then you will enter the detail form of the 
    QoS rule. Click “Apply” after editing the form and the rule will be saved. 
    Adjust QoS rule priority You can select the rule and click “Move Up” to make its priority higher. You also can select 
    the rule and click “Move Down” to make its priority lower. 
     
    Edit QoS Rule: 
    You can assign packet classification criteria by its local IP range, remote IP range, traffic type, protocol, local port range 
    and remote port range parameters. The parameters that you leave as blank will be ignored. The priority of this rule will be 
    applied to packets that match classification criteria of this rule. You can limit bandwidth consumed by packets that match 
    this rule or guarantee bandwidth required by packets that match this rule.  
    						
    							 
    39  
     
     
     
     
     
    Parameters   Description 
    Rule Name  The name of this rule. 
    Bandwidth You can assign the download or upload bandwidth by the unit of Kbps (1024 bit per 
    second). You can limit the maximum bandwidth consumed by this rule by selecting 
    “Maximum”. You also can reserve enough bandwidth for this rule by selecting “Guarantee”.
    Local IP Address Enter the local IP address range of the packets that this rule will apply to. If you assign 
    192.168.2.3 – 192.168.2.5, it means 3 IP addresses: 192.168.2.3, 192.168.2.4 and 
    192.168.2.5 
    Local Port Range Enter the local port range of the packets that this rule will apply to. You can assign a single 
    port number here or assign a range of port numbers by assigning the first port number and 
    the last port number of the range. The two numbers are separated by a dash “-“, for 
    example “101-150” means from port number 100 to port number 150 – the range of 50 port 
    numbers. 
    Remote IP Address Enter the remote IP address range of the packets that this rule will apply to. If you assign 
    192.168.2.3 – 192.168.2.5, it means 3 IP addresses: 192.168.2.3, 192.168.2.4 and 
    192.168.2.5 
    Remote Port Range Enter the remote port range of the packets that this rule will apply to. You can assign a 
    single port number here or assign a range of port numbers by assigning the first port 
    number and the last port number of the range. The two numbers are separated by a dash 
    “-“, for example “101-150” means from port number 100 to port number 150 – the range of 
    50 port numbers. 
    Traffic Type Select the traffic type of the packets that this rule will apply to. We list some popular 
    applications here to ease the configuration. You also can get the same result by using 
    other parameters, for example source or destination port number, if you are familiar with 
    the application protocol. 
    Protocol  Select the protocol type of the packets that this rule will apply to. 
    Apply  Apply and exit the form. 
    Reset  Clear the content of this form. 
     
    Click  at the bottom of the screen to save the above configurations. You can now configure other advance 
    sections or start using the router (with the advance settings in place)  
    						
    All Edimax manuals Comments (0)

    Related Manuals for Edimax Router BR-6215NRg User Manual