EdimaxメーカーAR-7284WNBの使用説明書/サービス説明書
ページ先へ移動 of 97
.
ii English Copyright © by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into a.
iii Notice according to GNU/GPL-V ersion 2 This product includes software that is subject to the GNU/GPL-Version 2. You find t he text of the license on the product cd/dvd. The program is free software and distributed without any warranty of the author.
i Contents 1 Introduction ......................................................................................... 1 1.1 Package List ....................................................................... 2 1.2 Safety Caut ions .....................
ii 3.3.5 Filtering Op tions ....................................................... 47 3.3.6 QoS Configur ation ................................................... 52 3.3.7 Firewall Se ttings ...................................................... 56 3.
1 1 Introduction The AR-7284WnA supports Annex A mode. It provides four 10/100 base-T Ethernet ports for user . The device provi des high-speed ADSL2+ broadband connection to the Internet or Intranet for high-end users, such as net bars and o ffice users.
2 1.1 Package List 1 x AR-7284WnA or AR-7284WnB 1 x external splitter 1 x power adapter 2 x telephone cables (RJ-1 1) 1 x Ethernet cable (RJ-45) 1 x Quick Installation Guide(QIG) 1 x CD (Multi-langu a.
3 1.2 Safety Cautions Follow the following instructions to prevent the device from risks and damage caused by fire or electric power: Use volume labels to mark the type of power . Only use the power adapter packed within the device package. Pay attention to the power l oad of the electric outlet or power extension cord.
4 1.3 LEDs and Interfaces Front Panel Figure 1 Front panel The following table describes the LEDs of the device. LED Colo r Statu s Description Green Off The power is off. On The power is on and the initialization is normal. Red On The device is initiating.
5 LED Colo r Statu s Description mode, DSL connection is not present, or the power is off. On Connected to network. Red On Network connection failed. WPS Green On The WPS indicator will light for 5 minutes after the WPS service is registered successfully .
6 Rear Panel Figure 2 Rear panel The following table describes the interface of the de vice. Interface/Button Description Line RJ-1 1 interface that connects to the telephone set through the telephone cabl e. WPS/Reset Press the button for 3 seconds to enab le WPS.
7 Internet Explorer V5.0 or higher , Netscape V4.0 or highe r , or Firefox 1.5 or higher 1.5 Features The device supports the following features: V arious line modes External PPPoE dial-up access Inte.
8 2 Hardware Installation 2.1 Connecting the ADSL Router Step 1 Connect the ‘Line’ port of the device and the ‘Modem’ port of the ADSL splitter with a telephone cable. Connect the phone to the ‘Phone’ port of the splitter through a telephone cable.
9 Figure 3 Connection diagram ( without telephone sets before the split ter) Connection type 2: Figure 4 disp lays the application diagram for the connection of the devic e, PC, splitter and telephone sets when a telephone set is placed before the splitter .
10 Installing a telephone before the splitter may cause connection problem between the device and the central office, or failure of Internet access, or slow connection speed. If you really need to add a telephone set before the s plitter , you must add a microfilter before a telephone set.
11 Step 5 The dialog will instruct you to choose driver from specific location..
12 3 About the Web Configurator This chapter describes how to configure the device by the Web-based configuration utility . 3.1 Access the Device Follow the following instructions to access the device for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.
13 If you successfully logged in as the super user , the web page as shown in the following figure appears. 3.2 Setup 3.2.1 Wiz ar d Wizard enables fast and accurate configuration of Internet connection and other important parameters. The followin g sections describe these c onfiguration parameters.
14 Step 1 Choose Setup > Wiz ard . The page shown in the following figure appears. Step 2 Click Setup Wizard . The p age shown in the following figure appears.
15 Step 4 Set the time and date..
16 Step 5 Configure the Internet connection. Select the country and ISP . Se t the VPI and VCI. If you failed to find the country and ISP from the drop-down lists, select Others . Click Next . If the Protocol you selected is PPPoE or PPPoA, the page shown in either of the two following figures appears.
17 Set the user name and password here,which is provided by your ISP . If the Protocol is Dyna mic IP , the page shown in the following figure appears.
18 Configure the wireless network. Enter the information and click Next ..
19 If the Protocol is Bridge , the page shown in the following figure appears..
20 If the Protocol is Stati c IP , the page shown in the following figure appears..
21 Enter the IP Address , Subnet Mask , Default Gatew ay , and Primary DNS Server . Click Next . The page shown in the following page appears. Figure 5.
22 Step 6 Configure the wireless netwo rk. Enter the information and click Next . Step 7 When the settings are complete, click Apply to apply the settings. Note: In each step of the Wizard page, you can click Back to review or modify settings in previous page.
23 3.2.2 Internet Setup Choose Setup > Internet Setup . The page shown in the following figure appears. In this page, you can co nfigure the W AN interface of the device.
24 Click Apply . The page shown in the following figure appears..
25 3.2.3 Wireless Setup This section describes the wireless LAN and some basic configuration. Wireless LANs can be as simple as two computers with wireless LAN cards communic ating in a pear-to-pear network or as complex as a number of computers with wireless LAN cards communicating through access point which bridges network traffic to wired LAN.
26 3.2.3.1 Wireless Basics In the Wireless Setup page, click Wireless Basics . The page shown in the following figure appears. In this p age, you can configure the parameters that wi reless LAN clients can used to connect to this device. Click Apply to save the settings.
27 3.2.3.2 Wireless Security In the Wireless Setup page, click W ireless Security . The page shown in the following figure appears. Wireless security is vital to your network to protect the wireless communication among wireless stations, access point s and wired network.
28 3.2.4 Local Network Y ou can configure the LAN IP address according to actual requirements. The preset IP address is 192.168.1.1. Y ou can use the default settings and DHCP service to manage the IP settings for the private network. The IP address of the device is the base address used for DH CP .
29 the pool used for DHCP . The IP address pool can contain up to 253 IP addresses. Click Apply to save the settings. In the Local Network page, you can assign IP addresses on the LAN to specific individual computers based on their MAC addresses. Click Add to add st atic DHCP addresses (optional).
30 The NUMBER OF DYNAMIC DHCP CLIENTS page shows the current DHCP clients (PC or Laptop) connected to the device and the detailed info rmation of the connected computer(s). 3.2.5 T ime and Date Choose Setup > Time and Date . The p age shown in the following figure appears.
31 Select the specific time serv er and the time zone from the corresponding item in drop-down lists. Select Enable Daylight Saving if necessary . Click Apply to save the settings. 3.2.6 Logout Choose Setup > Logout . The page shown in the following figure appears.
32 your wireless performan ce. The default settings provide the best wireless radio performance in most of environments..
33 3.3.1.1 Advanced Settings Select Advance Settings. The page shown in the following figure appears. These settings are only for technically advanced users who have sufficient knowledge about wireless LAN. Do not change these settings unless you know the effect of changes on the device.
34 Click Apply to save the settings. 3.3.1.2 MAC Filtering Select MAC Filtering . The page shown in the follo wing figure appears..
35 Click Add . The page shown in the following figure appears. Click Apply to save the settings..
36 3.3.1.3 Security Settings Select Security Settings . The page shown in the following figure appears. Select the SSID that you wa nt to configure from the drop-down list. Select the encryption type from the Security Mode drop-down list.Y ou can select None , WEP , AUTO (WP A or WP A2) , WP A Only , or WP A2 Only .
37 If you select AUT O (WP A or WP A2) , WP A Only , or WP A2 Only , the page shown in the following figure appears..
38 Click Apply to save the settings..
39 3.3.1.4 WPS Settings Select WPS Settings . The page shown in the following figure appears. WPS Authentication: The WPS service is enabled by default. There are three setting methods you can use in the Wi-Fi Protected Setup. In order to use wps authentication, you can select one method from three methods.
40 3.3.2 Port Forwarding This function is used to open ports on your device and redirect data from those ports to a single PC on your network (W AN-to-LAN traffic). It allows remote users to access services on your LAN, such as FTP for file transfers or SMTP and POP3 for e-mail.
41 Select a service for a preset application, or enter a name in the Custom Server field. Enter an IP a ddress in the Server IP A ddress field, to appoint the corresponding PC to receive forwarded packets. The Ports show the ports that you want to open on the device.
42 3.3.3 DMZ Since some applications are not compatible with NA T , the device supports the use of a DMZ IP address for a single host on the LAN. This IP address is not protected by NA T and it is visible to agents on the Internet with the correct type of software.
43 This page provides two useful tools for restricting the Internet access. Block Websites allows you to quickly create a list of all websites that you wish to stop users from accessing. Block MAC Address allows you to control when clients or PCs connected to the device are allowed to access the Internet.
44 3.3.4.1 Block Website In the Parent al Control p age, click Block Website . The p age shown in the following figure appears. Click Add . The p age shown in the following page appears. Enter the website in the URL field. Select the Schedule from drop-down list, or select Manual Schedule and select the corresponding time and days.
45 Click Submit to add the website to the BLOCK WEBSITE Ta b l e . The p age shown in the following figure appears. 3.3.4.2 Block MAC Address In the Parent al Control page, click Block MAC Address . The page shown in the following figure appears. b Click Add .
46 Enter the user name and MAC address and select the corresponding time and days. Click Submit to add the MAC address to the BLOCK MAC ADDRESS T able .
47 3.3.5 Filtering Options Choose AD V ANCED > Filtering Options . The Filtering Options page shown in the following figure appears. 3.3.5.1 Inbound IP Filtering By default, all incoming IP traf fi c that does not originate from the internal network is blo cked when the firewall is enabled.
48 Click Add to add an inbound IP filter . The page shown in the following figure appears..
49 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. Note: The settings only apply when the firewall is enabled.
50 In the Filtering Options p age, click Outbound IP Filtering . The page shown in the following figure appears. Click Add to add an outbound IP filter .
51 Enter the Filter Name and specify at least one of the following criteria: protocol, s ource/destination IP address, subnet mask, and source/destination port. Click Apply to save the settings. 3.3.5.3 Bridge Filtering In the Filtering Options page, click Bridge Filtering .
52 Click Apply to save the settings. 3.3.6 QoS Configuration Choose ADV ANCED > QOS Config . The QoS Configuration page shown in the following figure appears.
53 3.3.6.1 QoS Interface In the QoS Configuration page, click QoS Interface Config . The page shown in the following figure appears. In this p age, you can configure bandwidth control. Click Edit , the p age shown in the following figure appears. After configuration, click Apply to make configurations take effect.
54 3.3.6.2 QoS Queue Configuration In the QoS Configuration page, click QoS Queue Config . The page shown in the following figure appears. In this p age, you can configure the priority of queue. Click Add , the page shown in the following figure appears.
55 Click Add , the page shown in the following figure appears..
56 After configurati on is done, click Apply to make the configuration take ef fect. 3.3.7 Firewall Settings A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to preven t legitimate users from using that service.
57 from accessing a service The attackers attempt to disrupt service to a specific system or person. Port scan protection is designed to block attempts to discover vulnerable ports or services that might be exploited in an attack from the W AN. Choose ADV ANCED > Firewall Settings .
58 the name into the corresponding IP address. For example, the domain name www .example.com might be translated to 198.105.232.4. The DNS system is, in fact, it s own network. If one DNS server does not know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
59 3.3.9 Dynamic DNS The device supports dynamic domain name service (DDNS). The dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, and allows access to a specified host from various locations on the Internet.
60 DDNS provider : Select one of the DDNS service provider from the down-list. Available service providers include DynDns.org and dlinkddns.com. Host Name : Enter the host name that you registered with your DDNS service provider . Username : Enter the user name for your DDNS account.
61.
62 3.3.10.1 Port Mapping Choose AD V ANCED > Netw ork T ools and click Port Mapping . The page shown in the following figure appears. In this page, you can bind the W AN in terface and the LAN interface to the same group. Click Add to add a new port mapping.
63 The procedure for creating a mapping gro up is listed as follows: Step 1 Enter the group name. Step 2 Select interfaces from the A vailable Interface list and click the <- arrow button to add them to the grouped interface list, in order to create the required mapping of the ports.
64 3.3.10.2 IGMP Proxy Choose ADV ANCED > Network T ools and click IGMP Proxy . The page shown in the following figure appears. IGMP proxy enables the syst em to issue IGMP host messages on behalf of hosts t hat the system discovered through standard IGMP interfaces.
65 After configuration, click Apply to save the settings. 3.3.10.4 UPnP Choose ADV ANCED > Network T ools and click UPnP . The page shown in the following figure appears.
66 In this page, you can confi gure universal plug and play (UPnP). The system acts as a daemon af ter you enable UPnP . UPnP is used for popular audio / video software. It allows automatic discovery of your devi ce in the network. If you are concerned about UPnP security , you can disable it.
67 The AR-7284WnA supports Annex A mode, so the AnnexB is not enabled. Click Apply to save the settings..
68 3.3.10.6 SNMP Choose ADV ANCED > Network T ools and click SNMP . The page shown in the following figure appears. In this page, you can set SNMP p arameters. Read Community : The network administrator must use this password to read the information of this device.
69 3.3.10.7 TR069 Choose ADV ANCED > Network T ools and click TR-069 . The page shown in the following figure appears. In this page, you can configure the TR069 CPE.
70 3.3.10.8 Certificates Choose ADV ANCED > Network T ools and click Certificates . The Certificates page shown in the following figure appears. In the Certificates page, click T rusted CA . The page shown in the following figure appears. Click In put Certificate , the page shown in the following figure appears.
71 Click Apply to save the settings..
72 3.3.11 Routing Choose AD V ANCED > Routing . The page shown in the following page appears. 3.3.11.1 St atic Route Choose ADV ANCED > Routing and click S t atic Route . The page shown in the following figure appears. This page is used to configure the routing informat ion.
73 Click Add to add a static route. The page shown in the following figure appears. Destination Network Address : The destination network address. Subnet Mask : The subnet mask of the destination network. Use Gateway IP Address : The gateway IP address of the destination network.
74 Click Apply t o save the settings. 3.3.11.2 Default Gatew ay Choose ADV ANCED > Routing and click Default Gatewa y . The page shown in the following figure appears.
75 3.3.11.3 RIP Settings Choose ADV ANCED > Routing and click RIP Settings . The page shown in the following figure appears. This page is used to select the interfaces on yo ur device that use RIP and the version of the prot ocol being used.
76 3.3.12 Schedules Choose ADV ANCED > Schedules . The page shown in the following figure appears. Click Add to add schedule rule. The page shown in the following figure appears.
77 3.4 Management 3.4.1 System Choose Management > System Management . The System page shown in the following figure appears. In this page, you can reboot device, back up the current settings to a file, restore the settings from the file saved previously , and restore the factory default settings.
78 Backup Setting : Save the settings to the local hard drive. Select a location on your computer to back up the file. Y ou can name the conf iguration file. Up date Setting : Click Browse to select the configuration file of device and click Update Settings to begin restoring the device configuration.
79 Step 2 Click Update Firm w are to copy the file. The device loads the file and reboots automatically . Notice : Do not turn off your device or press the reset button while this procedure is in progress. 3.4.3 Access Controls Choose Management > Acce ss Controls .
80 3.4.3.1 Account Password In the Access Controls page, click Account Password . The page shown in the following figure appears. In this p age, you can change the password of the user and set time for automatic logout. Y ou should change the default password to secure your network.
81 Click Apply to save the settings. 3.4.3.2 Services In the Access Controls page, click Services . The page shown in the following figure appears. In this page, you can enable or disable the serv ices that are opened to remote host. For exampl e, if telnet service is enabled, the remote host can ac cess the device by telnet through port 23.
82 3.4.3.3 IP Address In the Access Controls page, click IP Address . The p age shown in the following figure appears. In this page, you can confi gure the IP address used with access control list (ACL). If ACL is enabled, only devices with the specified IP addresses can access the device.
83 3.4.4 Diagnostics Choose Management > Diagnostic . The page shown in the following figure appears. In this p age, you can test the device. Click Run Diagnostics T est to run diagnostics. 3.4.5 Log Configuration Choose Management > Log Configuration .
84 This page displays event log dat a in the chronological manner . Y ou can read the event log from the local host or send it to a syslog server . Available event severity levels are as follows: Emergency , Alert, Critical, Error , W arning, Notice, Informational and Debugging.
85 The page displays the summary of the device status. It includes the information of firm ware version, upstream rate, downstream rate, uptime and Internet configuration (both wireless and Ethernet statuses).
86 3.5.2 Wireless Client s Choose Statu s > Wireless Client s . The page shown in the following page appears. The page displays authenticated wireless stations and their statuses. 3.5.3 DHCP Clients Choose St atu s > DHCP Client s . The page shown in the following page appears.
87 3.5.4 Logs Choose Statu s > Logs . The page shown in the following figure appears. Click Refresh to refresh the system log shown in the table..
88 3.5.5 S t atistics Choose Stat us > St atistics . The page shown in the following figure appears. This page displays the statis tics of the network and data transfer . This information helps technicians to identify if the device is functioning properly .
89 3.5.6 Route Info Choose Statu s > Route Info . The page shown in the following figure appears. The table shows a list of destination routes commonly accessed by the network.
90 F F e e d d e e r r a a l l C C o o m m m m u u n n i i c c a a t t i i o o n n C C o o m m m m i i s s s s i i o o n n I I n n t t e e r r f f e e r r e e n n c c e e S S t t a a t t e e m m e e n n t t This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules.
91 Federal Communications Commission (FCC) Radiation Exposure St atement This equipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person’s body (excluding extremities of hands, wrist and feet) during wireless modes of operation.
92 EFT A member states: Iceland, Liechtenstein, Norway , and Switzerland. EU Countries not intended for use None A declaration of conformity is available on www .
デバイスEdimax AR-7284WNBの購入後に(又は購入する前であっても)重要なポイントは、説明書をよく読むことです。その単純な理由はいくつかあります:
Edimax AR-7284WNBをまだ購入していないなら、この製品の基本情報を理解する良い機会です。まずは上にある説明書の最初のページをご覧ください。そこにはEdimax AR-7284WNBの技術情報の概要が記載されているはずです。デバイスがあなたのニーズを満たすかどうかは、ここで確認しましょう。Edimax AR-7284WNBの取扱説明書の次のページをよく読むことにより、製品の全機能やその取り扱いに関する情報を知ることができます。Edimax AR-7284WNBで得られた情報は、きっとあなたの購入の決断を手助けしてくれることでしょう。
Edimax AR-7284WNBを既にお持ちだが、まだ読んでいない場合は、上記の理由によりそれを行うべきです。そうすることにより機能を適切に使用しているか、又はEdimax AR-7284WNBの不適切な取り扱いによりその寿命を短くする危険を犯していないかどうかを知ることができます。
ですが、ユーザガイドが果たす重要な役割の一つは、Edimax AR-7284WNBに関する問題の解決を支援することです。そこにはほとんどの場合、トラブルシューティング、すなわちEdimax AR-7284WNBデバイスで最もよく起こりうる故障・不良とそれらの対処法についてのアドバイスを見つけることができるはずです。たとえ問題を解決できなかった場合でも、説明書にはカスタマー・サービスセンター又は最寄りのサービスセンターへの問い合わせ先等、次の対処法についての指示があるはずです。