The WAN (Wide Area Network) section is where you configure your Internet Connection type. There are several connection types to choose from: Static IP, DHCP, PPPoE, PPTP, L2TP, and BigPond. If you are unsure of your connection method, please contact your Internet Service Provider. Note: If using the PPPoE option, you will need to ensure that any PPPoE client software on your computers is removed or disabled.
Host Name: Some ISP's may check your computer's Host Name. The Host Name identifies your system to the ISP's server. This way they know your computer is eligible to receive an IP address. In other words, they know that you are paying for their service.
Enable BigPond: Check this option to connect to the internet through Telstra BigPond Cable Broadband in Australia. Telstra BigPond provides the values for BigPond Server, BigPond User Id, and BigPond Password.
Service Name: Some ISP's may require that you enter a Service Name. Only enter a Service Name if your ISP requires one.
Reconnect Mode: Typically PPPoE connections are not always on. The TRENDware router allows you to set the reconnection mode. The settings are:
Maximum Idle Time: Time interval the machine can be idle before the PPPoE connection is disconnected. The Maximum Idle Time value is only used for the "On demand" connection mode.
Reconnect Mode: Typically PPTP connections are not always on. The TRENDware router allows you to set the reconnection mode. The settings are:
Maximum Idle Time: Time interval the machine can be idle before the PPTP connection is disconnected. The Maximum Idle Time value is only used for the "On demand" connection mode.
Reconnect Mode: Typically L2TP connections are not always on. The TRENDware router allows you to set the reconnection mode. The settings are:
Maximum Idle Time: Time interval the machine can be idle before the L2TP connection is disconnected. The Maximum Idle Time value is only used for the "On demand" connection mode.
These options apply to all WAN modes.
Use These DNS Servers: This option should be enabled if your ISP requires you to enter the DNS Server information. You will then be able to enter a primary and secondary DNS server.
Use the default MTU: If this option is checked (the default case), the router selects the usual MTU settings for the type of WAN interface in use. If this option is unchecked, the router uses the value of the MTU option (which follows).
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the largest packet size (in bytes) that the router will send to the WAN. If LAN devices send larger packets, the router will break them into smaller packets. Ideally, you should set this to match the MTU of the connection to your ISP. Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the router's MTU is set too high, packets will be fragmented downstream. If the router's MTU is set too low, the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections. In either case, network performance can suffer.
WAN Port Speed: Normally, this is set to "auto". If you have trouble connecting to the WAN, try the other settings.
Respond to WAN Ping: If you leave this option unchecked, you are causing the public WAN IP address of the router not to respond to ping commands. Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid.
ping
WAN Ping Inbound Filter: Select a filter that controls access as needed for WAN pings. If you do not see the filter you need in the list of filters, go to the Advanced -> Inbound Filter screen and create a new filter.
MAC Cloning Enabled: Some ISP's may check your computer's MAC address. Each networking device has it's own unique MAC address defined by the hardware manufacturer. Some ISP's record the MAC address of the network adapter in the computer or router used to initially connect to their service. The ISP will then only grant Internet access to requests from a computer or router with this particular MAC address. Your new TRENDware router has a different MAC address than the computer or router that initially connected to the ISP. To resolve this problem, the TRENDware router has a special feature that allows you to clone (that is, replace the router's MAC address with) another MAC address.
MAC Address: If you have enabled MAC Cloning, you can either type in an alternate MAC address (for example, the MAC address of the router initially connected to the ISP) or copy the MAC address of a PC. To copy the MAC address of the computer that initially connected to the ISP, connect to the TRENDware router using that computer and click the Clone Your PC's MAC Address button. The WAN port will then use the MAC address of the network adapter in your computer.
These are the settings of the LAN (Local Area Network) interface for the router. The router's local network (LAN) settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface. It is recommended that you use the default settings if you do not have an existing network.
IP Address. The IP address of your router on the local area network. Your local area network settings are based on the address assigned here. For example, 192.168.0.1.
Subnet Mask. The subnet mask of your router on the local area network.
RIP Announcement. Used with multiple routers to broadcast routing information.
Router Metric. The metric or cost of the routes advertised in RIP announcements.
DHCP stands for Dynamic Host Configuration Protocol. The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network (LAN).
The computers (and other devices) connected to your LAN also need to have their TCP/IP configuration set to "DHCP" or "Obtain an IP address automatically".
When you set Enable DHCP Server, the following options are displayed.
It is possible for a computer or device that is manually configured to have an address that does reside within this range. In this case the address should be reserved (see Static DHCP Client below), so that the DHCP Server knows that this specific address can only be used by a specific computer or device.
Your TRENDware router, by default, has a static IP address of 192.168.0.1. This means that addresses 192.168.0.2 to 192.168.0.254 (from 2 to 254) can be made available for allocation by the DHCP Server.
In this section you can see what LAN devices are currently leasing IP addresses.
Revoke: The Revoke option is available for the situation in which the lease table becomes full or nearly full, you need to recover space in the table for new entries, and you know that some of the currently allocated leases are no longer needed. Clicking Revoke cancels the lease for a specific LAN device and frees an entry in the lease table. Do this only if the device no longer needs the leased IP address, because, for example, it has been removed from the network.
Revoke
This option lets you reserve IP addresses, and assign the same IP address to the network device with the specified MAC address any time it requests an IP address. This is almost the same as if a device has a static IP address except that it must still request an IP address from the TRENDware router. The TRENDware router will provide the device the same IP address every time. Static DHCP is helpful for server computers on the local network that are hosting applications such as Web and FTP. Servers on your network should either use a static IP address or use this option.
MAC Address: To input the MAC address of your system, enter it in manually or connect to the TRENDware router's Web-Management interface from the system and click the Copy Your PC's MAC Address button.
A MAC address is usually located on a sticker on the bottom of a network device. The MAC address is comprised of twelve digits. Each pair of hexadecimal digits are usually separated by dashes or colons such as 00-0D-88-11-22-33 or 00:0D:88:11:22:33. If your network device is a computer and the network card is already located inside the computer, you can connect to the TRENDware router from the computer and click the Copy Your PC's MAC Address button to enter the MAC address.
As an alternative, you can locate a MAC address in a specific operating system by following the steps below:
winipcfg
ipconfig /all
Computer Name: You can assign a name for each computer that is given a static IP address. This may help you keep track of which computers are assigned this way.
The wireless section is used to configure the wireless settings for your TRENDware router. Please note that changes made on this section may also need to be duplicated on your Wireless Client.
To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard. WPA provides a higher level of security. WPA-Personal does not require an authentication server. The WPA-Enterprise option does require a RADIUS authentication server.
Super G without Turbo: Performance enhancing features such as Packet Bursting, FastFrames, and Compression.
Super G with Static Turbo: This mode is not backwards compatible with non-Turbo (legacy) devices. This mode should only be enabled when all devices on the wireless network are Static Turbo enabled.
Super G with Dynamic Turbo: This mode is backwards compatible with non-Turbo (legacy) devices. This mode should be enabled when some devices on the wireless network are not Turbo enabled but support other Super G features mentioned above.
A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network.
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the router should employ.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the router only support the older standard. WPA2 is the newer implementation of the stronger IEEE 802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only with clients that also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and AES" option, the router negotiates the cipher type with the client, and uses AES when available.
Group Key Update Interval: The amount of time before the group key used for broadcast and multicast data is changed.
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII (American Standard Code for Information Interchange) format at both ends of the wireless connection. It cannot be shorter than eight characters, although for proper security it needs to be of ample length and should not be a commonly known phrase. This phrase is used to generate session keys that are unique for each wireless client.
Wireless Networking technology enables ubiquitous communication
This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users.
Authentication Timeout: Amount of time before a client will be required to re-authenticate.
RADIUS Server IP Address: The IP address of the authentication server.
RADIUS Server Port: The port number used to connect to the authentication server.
RADIUS Server Shared Secret: A pass-phrase that must match with the authentication server.
MAC Address Authentication: If this is selected, the user must connect from the same computer whenever logging into the wireless network.
Advanced: