Home > Tenda > Router > Tenda Router 11N User Manual

Tenda Router 11N User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Tenda Router 11N User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 4 Tenda manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							                      11N Wireless Broadband Router User Guide 
     46 
     
    Chapter 9 Routing Settings 
    9.1 Routing Table 
    This page shows the router’s core routing table. 
     The  main  duty  for  a  router  is  to  look  for  a  best  path  for  every  data packet,  and  transfer 
    this data packet to a destination station. In order to fulfill this function, many transferring 
    paths, i.e. routing table, are saved in the router, for choosing when needed. 
     
    9.2 Static Routing 
    This screen is used to set the router’s static routing. 
    A static route is a pre-determined pathway that network information must travel to reach 
    a specific host or network. 
      Destination network IP address: The destination host or IP segment you visit. 
     Subnet mask: Enter the subnet mask, generally it is 255.255.255.0 
     Gateway: The entry IP address of the next router. 
     
    NOTE:   
    						
    							                      11N Wireless Broadband Router User Guide 
     47 
    1. The gateway must be at the same net segment with the router’s LAN IP. 
    2. If the  destination  IP  address  is  one  host’  address,  then  the  subnet  mask  must  be 
    255.255.255.255. 
    3. If the  destination  IP  address  is  an  IP  segment,  then  it  must  match  with  the  subnet 
    mask.  For  example,  if  the  destination  IP  is  10.0.0.0  then  the  subnet  mask  must  be 
    255.0.0.0 
      
    						
    							                      11N Wireless Broadband Router User Guide 
     48 
     
    Chapter 10 System Tools 
    10.1 Time Settings 
    This section is to configure the router’s system time. You can set it manually or obtain the 
    GMT time from the Internet. 
      Time zone: Select  the time  zone where  you  are  operating  the  Router from  the 
    drop-down list. 
     Customized time: Enter the time you wish to configure. 
    NOTE: 
    When  the  Router  is  powered  off,  the time settings will  be  lost. The  router  will  obtain  the 
    GMT time automatically when you next time access the Internet. Only when you connect 
    to  the  Internet  and  obtain  the GMT time  or  set  the  time  on  this screen,  can the  time 
    settings in other functions (e.g. security settings) take effect. 
     
    10.2 DDNS 
    The  DDNS  (Dynamic  Domain  Name  System)  is  supported  in  this  Router.  It  is used to 
    assign a fixed host and domain name to a dynamic Internet IP address. Every time you 
    access  the  Internet,  the dynamic  domain  name  software  installed on  your  host  will  tell 
    the  ISP’S  host  server  its  dynamic  IP  address  by  sending  messages.  And  the  server 
    software is  responsible  for  providing  DNS  service  and  implementing dynamic  domain 
    name resolution.   
    						
    							                      11N Wireless Broadband Router User Guide 
     49 
      Main features:  
    1.  Mostly,  your ISP provides a dynamic  IP  address and  the DDNS  is  used  to 
    capture  the  changeable  IP  address and match to the  fixed  domain.  Then  users 
    can have access to the Internet to communicate with others outside the network.  
    2. DDNS can help you to establish a virtual host in your home or company. 
     DDNS: Click the radio button to enable or disable the DDNS service. 
     Service provider: Select  one  from  the  drop-down list and click “Sign  up”  for 
    registration.  
     Username: Enter the username that you use to register from the DDNS provider  
     Password: Enter the password that you use to register from the DDNS provider  
     Domain name: Enter the effective registered domain name 
    For example: 
    Establish  a  Web  server in  the  local  host  192.168.0.10 and  register  in  3322.org  as 
    follows: 
    Username Tenda 
    Password 123456 
    Domain Name tenda.3322.org 
    After  mapping the  port in  the  virtual  server, and setting  account  information  in  DDNS 
    server, you  can  then  access  the  web  page by entering http://tenda.3322.org in  the 
    address field. 
     
    10.3 Backup/Restore  
    On this screen, you can back up the router’s current settings or restore previous settings.  
    						
    							                      11N Wireless Broadband Router User Guide 
     50 
     
     Backup Setting: 
    Click the Backup button to back up the Router’s settings and select a path to save 
    them. 
     Click the “Save” button to save the configuration files. 
     Restore Setting: 
    Click the “Browse” button to select the backup files. 
      
    						
    							                      11N Wireless Broadband Router User Guide 
     51 
    Click the “Restore” button to restore previous settings. 
     
     
    10.4 Restore to Factory Default  
    This screen allows you to restore all settings to the factory default values.  
      Restore: Click this button to restore to default settings.  
     Factory default settings: 
    Password: NULL(the default password displays as null) 
    IP address: 192.168.0.1 
    Subnet mask: 255.255.255.0 
    NOTE:  
    After  restoring  to  default  settings,  please  restart  the router  to  make  the default  settings 
    effective. 
     
    10.5 Upgrade  
    By  upgrading  the  router’s software,  you’ll  get better software version  and  appreciated 
    routing function. Before upgrading, download the Router’s software upgrade file from our 
    website, www.tenda.cn. 
       
    						
    							                      11N Wireless Broadband Router User Guide 
     52 
     
     Browse: Click this button to select the upgrade file. 
     Upgrade: Click  this  button  to  start  the  upgrading  process.  After the  upgrade  is 
    completed, the router will reboot automatically.  
     
    10.6 Reboot the Router 
    Reboot  the router to make  the configuration effective.  The  router  will cut its  WAN 
    connection automatically after rebooting. 
      Reboot the router: Click this button to reboot the router. 
     
    10.7 Password Change 
    This section is to set a new password to better secure your router and network.  
    						
    							                      11N Wireless Broadband Router User Guide 
     53 
      Old password: Enter the old password. 
     New password: Enter a new password. 
     Confirm new password: Re-enter to confirm the new password.  
    NOTE:  
    The default password displays as null, users can log on the web-based utility without any 
    authentication. To secure the router and your network, it is highly recommended that you 
    change the initial password.  
    10.8 Syslog 
    The  section  is  to  view  the  system  log. You  can view various conditions appearing after 
    system  start,  and  also  check  whether there’s  an attack  on the  network. The log  can 
    record at most 150 entries. 
      Refresh: Click this button to update the log. 
     Clear: Click this button to clear the current shown log. 
    10.9 Log out  
    After all settings are finished, please click’” Log out” to exit securely and completely.    
    						
    							                      11N Wireless Broadband Router User Guide 
     54 
      
    						
    							                      11N Wireless Broadband Router User Guide 
     55 
    Appendix 1 Glossary 
    Channel:       
    An  instance  of  medium  use  for  the  purpose  of  passing  protocol  data  units  (PDUs)  that 
    may  be  used  simultaneously,  in  the  same  volume  of  space,  with  other  instances  of 
    medium  use(on  other  channels)  by  other  instances  of  the  same  physical  layer 
    (PHY),with an acceptably low frame error ratio(FER) due to mutual interference. 
    SSID:             
    SSID  (Service  Set  Identifier) is  the  network  name  shared  by  all  devices  in  a  wireless 
    network.  Your  network’s  SSID  should  be  unique  to  your  network  and  identical  for  all 
    devices within the network. It is case-sensitive and must not exceed 20 characters (use 
    any of the characters on the keyboard).Make sure this setting is the same for all devices 
    in your wireless network. 
    WPA/WPA2 Encryption:  
    A security protocol for wireless networks that builds on the basic foundations of WEP. It 
    secures  wireless  data  transmission  by  using  a  key  similar  to  WEP,  but  the  added 
    strength  of WPA  is that the key  changes  dynamically.  The changing key makes  it  much 
    more  difficult for a  hacker  to  learn the  key  and  gain  access  to the network.WPA2  is the 
    second  generation  of  WPA  security  and  provides  a  stronger  encryption  mechanism 
    through  Advanced  Encryption  Standard  (AES),  which  is  a  requirement  for  some 
    government users. 
    802,1x authentication  
    Static  WEP  key  is  difficult  to  manage  for  when  you  change  the  key,  you  will  have  to 
    inform  all  others, and  if the key  is  disclosed  in  one  of the places, the key  can  no  longer 
    provide security. Besides, there’s severe security loophole about static WEP encryption. 
    The WEP key can be decrypted after one person receives a specific amount of data via 
    wireless intercepting. 802,1x is initially used for wired Ethernet authentication access to 
    prevent illegal users from accessing the network. Later, it is found that 802.1x can better 
    solve  the  wireless  network  security  problem.  EAP-TLS  of  the  802.1x  successfully 
    achieves  the  two-way  authentication  between  users  and  networks,  i.e.  can  prevent 
    illegal users from accessing the network and can also prevent users from accessing the 
    illegal  AP.  802.1x  utilizes  dynamic  WEP  encryption  to  protect  the  WEP  key  from  being 
    decrypted.  To  solve  the  publishing  problem  for  digital  certification,  people  make  some 
    changes to TLS authentication and TTLS and EAP come into exist, which enable you to 
    access  the  network  by using  the  traditional  way  of  authentication:  username  and 
    password. 
      
    						
    All Tenda manuals Comments (0)

    Related Manuals for Tenda Router 11N User Manual