Telkom 5102g manual
If you are using a The installer will now test whether you have the. Net framework installed. If not, you will be prompted to install it. Page 8 4. When you have successfully completed the previous step, the wizard will be installed on your hard drive. See figure below, and perform the action now. The easy install wizard will open on your screen. See figures below Please note the supplementary information block to the right edge of the form.
Connect the ADSL line a Connect one of the included telephone cables between the Telkom wall-socket and one of the sockets on top of the integrated power and surge unit C. Page 11 F. Page 12 Quick Start Guide d Important Note: Make sure that you do not connect any micro filters between the Telkom wall socket used for the router and the router itself.
Refer to the overview sketch, from indicator C to indicator D. The following is the Quick Start step, please follow according to the instruction step by step. Enter the VPI assigned to you.
This field may already be configured. Enter the VCI assigned to you. Select UBR for applications that are non-time sensitive, such as e-mail. Select VBR for burst traffic and bandwidth sharing with other applications.
This is the maximum rate at which the sender can send cells. Choices vary depending on what you select in the Mode field. Password: Enter the password associated with the user name above. Multiplex: Select the method of multiplexing used by your ISP. Connection: The schedule rule s have priority over your Connection settings.
Always on: Select Always on Connection when you want your connection up all the time. IP Subnet Mask: The default is User can change it. Type the subnet Refer to the NAT chapter for more details. Select None to disable it.
User can change it to other such as Type the subnet mask assigned to you by your ISP if given. If set to disabled, the DHCP server will be disabled. When DHCP is used, the following items need to be set.
Lease Time: The current lease time of client. This section introduces the wireless LAN and some basic configurations. Wireless LANs can be as simple as two computers with wireless LAN cards communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN cards communicating through access points which bridge network traffic to the wired LAN. Access to your Telkom G via Wireless Once your Telkom G router is properly connected, you will need to input the default pre-shared key, on a sticker on the back of your Telkom G router, into the setup on your client wireless device Wireless devices connecting to the Telkom ADSL router via wireless.
Step 3: Input the details of your Telkom G router. If you do not have any wireless, both For security propose, change the default wlan-ap to a unique ID name.
It is case sensitive and must not excess 32 characters. Make sure your wireless clients have exactly the SSID as the device, in order to get connected to your network.
Select a channel from the drop-down list box. If you require high security for transmissions, there are two alternatives to select from: bit WEP and bit WEP. The default type of wireless is disabled and to allow all wireless computers to communicate with the access points without any data encryption Advanced Setting Beacon interval: The Beacon Interval value indicates the frequency interval of the beacon.
Enter a value between 20 and A beacon is a packet broadcast by the Router to synchronize the wireless network. Fragmentation Threshold: The threshold number of bytes for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter a value between and If you do not know or have both 11g and 11b devices in your network, then keep the default in mixed mode.
From the drop-down manual, you can select If you have only 11b card, then select You need to know the MAC address of the The screen appears as shown.
Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the router. Select Allow Association to permit access to the router, MAC addresses not listed will be denied access to the router. Key 1 to Key 4: Enter the key to encrypt wireless data. To allow encrypted data transmission, the WEP Encryption Key values on all wireless stations must be the same as the router. There are four keys for your selection.
You must configure all four keys, but only one key can be activated at any one time. The default key is key 1. Pre-Shared key: The key for network authentication.
The input format is in character style and key size should be in the range between 8 and 64 characters. Step 4: Change the Pre-Shared key accordingly. Router reset will change it to defaults. Note: you cannot connect to the wireless G router without configuring your wireless clients with this pre-shared key as well.
Gateway IP: IP address of the gateway or existing interface that this route uses. Metric: It represents the cost of transmission for routing purposes. The number need not be precise, but it must be between 1 and Use: Counter for access times. Edit: Edit the route; this icon is not shown for system default route.
Drop: Drop the route; this icon is not shown for system default route. ADD Route. MetricIt represents the cost of transmission for routing purposes. Set Yes, it is kept private and is not included in RIP broadcasts. Set No, the remote node will be propagated to other hosts through RIP broadcasts.
There are eight groups of PVC can be defined and used. Disabled: As set in default setting, it disables the DMZ function. Enabled: It activates your DMZ function. Select the Apply button to apply your changes. Some ports have numbers that are pre-assigned to them by the IANA the Internet Assigned Numbers Authority , and these are referred to as well-known ports.
Servers follow the well-known port assignments so clients can locate them. If you wish to run a server on your network that can be accessed from the WAN i.
You will also need to use port forwarding if you want to host an online game server. The reason for this is that when using NAT, your publicly accessible IP address will be used by and point to your router, which then needs to deliver all traffic to the private IP addresses used by your PCs. Rule Index: Choose the rule number. Start Port Number: Enter a port number in this field. End Port Number: Enter a port number in this field. Note that port numbers do not change for the One-to-one NAT mapping type.
This is equivalent to Many to One i. Server: This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world. If your rule is for all local IP addresses, then enter 0.
Enter 0. Using port forwarding does have security implications, as outside users will be able to connect to PCs on your network. For this reason you are advised to use specific Virtual Server entries just for the ports your application requires, instead of using DMZ. If the DHCP server option is enabled, you have to be very careful in assigning the IP addresses of the virtual servers in order to avoid conflicts. The easiest way of configuring Virtual Servers is to manually assign static IP address to each virtual server PC, with an address that does not fall into the range of IP addresses that are to be issued by the DHCP server.
You can configure the virtual server IP address manually, but it must still be in the same subnet as the router. But in some areas, multimode cannot detect the ADSL line code well. You can configure the router for remote Telnet access or upload and download router firmware and configuration files using FTP.
To use this feature, your computer must have an FTP client. Type an IP address to restrict access to a client with a matching IP address. Interface: Select the access interface. The default IP 0. It is recommended that this option be configured by an advanced user.
IP Filter Listing : Item number. Active: Whether the connection is currently active. Set Community: Type the Set Community, which is the password for incoming Set requests from the management station. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings, removing the need for the user to control advanced configuration of their device.
Both the users Operating System and the relevant application must support UPnP in addition to the router. Windows does not support UPnP. This is especially useful for hosting servers via your ADSL connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.
E-mail Address: Type your e-mail address. Username: Type your user name. Page 30 Once your Telkom G router is properly connected, you will need to input the default pre-shared key, on a sticker on the back of your Telkom G router, into the setup on your client wireless device Wireless devices connecting to the Telkom ADSL router via wireless.
Click, Add… Page 32 Step 3: Input the details of your Telkom G router. Page 34 devices to configure this screen. The screen appears as shown. Step 4: Change the Pre-Shared key accordingly. Router reset will change it to defaults Each Telkom G is shipped by default with a unique WPA pre-shared key for wireless security.
Gateway IP: IP address of the gateway or existing interface that this route uses. Metric: It represents the cost of transmission for routing purposes. The number need not be precise, but it must be between 1 and Page 37 forwarded.
Page 39 The reason for this is that when using NAT, your publicly accessible IP address will be used by and point to your router, which then needs to deliver all traffic to the private IP addresses used by your PCs. Page 40 Rule Index: Choose the rule number.
Note that port numbers do not change for the One-to-one NAT mapping type. This is equivalent to Many to One i. Enter 0. Page Access Management You can configure the router for remote Telnet access or upload and download router firmware and configuration files using FTP. To use this feature, your computer must have an FTP client. Type an IP address to restrict access to a client with a matching IP address. Set Community: Type the Set Community, which is the password for incoming Set requests from the management station.
Page Maintenance E-mail Address: Type your e-mail address. Username: Type your user name. Password: Type the password assigned to you. You can change the default password to ensure that someone cannot adjust your settings without your permission.
Page 49 To upgrade the firmware of the Telkom ADSL G, you should download or copy the firmware from the web to your pc, in order for you to upload it to the routers interface. Page 50 New Firmware Location: Type in the location of the file you want to upload in this field or click Browse to find it. Browse: Click Browse Remember that you must decompress compressed.
0コメント