Sitecom wireless 300n xr gigabit gaming router wl-308




















Console Gaming. WL Features. WAN ports:. WAN port s type:. Gigabit Ethernet RJ WAN port auto cross-over:. LAN ports:. LAN ports type:. LAN ports auto cross-over:. NAT routing:. Port forwarding:. Port triggering:. DHCP server:.

DHCP client:. Dynamic DNS client:. MAC Address clone:. Routing Protocols:. Maximum Wireless Speed:. WiFi standards supported:. Access point Wireless bridge PtP. Please log in.

July 15, April 5, October 30, All rights reserved. If you have an unusual network connection in which you are actually connected via xDSL but for which you configure either Static or DHCP in the WAN settings, setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize that it needs to shape traffic slightly differently in order to give the best performance.

Choosing xDSL or Other Frame Relay Network causes the measured uplink speed to be reported slightly lower than before on such connections, but gives much better results. Routing This section adds a new entry into the routing table. Enable: Place a check in this box to enable the routing table entry.

Name: Specify a name for the rule. Netmask: Specify the subnet mask for the IP address. Gateway: Specify the IP address of the gateway. Metric: Specify the number of routing hops.

The route metric is a value from 1 to 16 that indicates the cost of using this route. A value of 1 is the lowest cost, and 15 is the highest cost. A value of 16 indicates that the route is not reachable from this router. When trying to reach a particular destination, computers on your network will select the best route, ignoring unreachable routes.

Interface: Select the interface from the drop-down list. Click on the Save button to insert the entry into the Routing table. Unless you configure the router to the contrary, the NAT does not respond to unsolicited incoming requests on any port, thereby making your LAN invisible to Internet cyber attacks.

However, some network applications cannot run with a tight firewall. Those applications need to selectively open ports in the firewall to function correctly. The options on this page control several ways of opening the firewall to address the needs of specific types of applications.

SPI "stateful packet inspection" also known as "dynamic packet filtering" helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through that session conforms to the protocol. When the protocol is TCP, SPI checks that packet sequence numbers are within the valid range for the session, discarding those packets that do not have valid sequence numbers. Select one of the radio buttons. This is the least restrictive option, giving the best connectivity and allowing some applications P2P applications in particular to behave almost as if they are directly connected to the Internet.

Note: Some of these options can interact with other port restrictions. Endpoint Independent Filtering takes priority over inbound filters or schedules, so it is possible for an incoming session request related to an outgoing session to enter through a port in spite of an active inbound filter on that port.

However, packets will be rejected as expected when sent to blocked ports whether blocked by schedule or by inbound filter for which there are no active sessions. Port and Address Restricted Filtering ensures that inbound filters and schedules work precisely, but prevents some level of connectivity, and therefore might require the use of port triggers, virtual servers, or port forwarding to open the ports needed by the application.

Address Restricted Filtering gives a compromise position, which avoids problems when communicating with certain other types of NAT router symmetric NATs in particular but leaves inbound filters and scheduled access working as expected. This ensures best compatibility for internet communications. Under some circumstances it may be desirable to turn off this feature.

Enable anti-spoof checking: Place a check in this box to enable anti-spoof checking. Enabling this option can provide protection from certain kinds of "spoofing" attacks. However, enable this option with care. With some modems, the WAN connection may be lost when this option is enabled. In that case, it may be necessary to change the LAN subnet to something other than DMZ host is a demilitarized zone used to provide Internet services without sacrificing unauthorized access to its local private network.

This feature is useful because it enables certain applications most importantly a single VPN connection to a remote host without the need for an ALG. Note: This feature does not apply to the DMZ host if one is enabled. The DMZ host always handles these kinds of sessions. Enabling this option the default setting enables single VPN connections to a remote host. Some protocols and applications require special handling of the IP payload to make them work with network address translation NAT.

Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. This option may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try disabling this option. QuickTime and Real Player are some of the common applications using this protocol. This ALG may interfere with the operation of such devices. This allows the device to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic.

Such streams are frequently used by digital media players. This enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox Automatic: Place a check in this box for the device to automatically configure the classifiers. When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn't otherwise recognize, based on the behavior that the streams exhibit.

This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required.

WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. Priority: Select a priority from the drop-down list. The four priority message flows are: o BK: Background least urgent. Protocol: Select a protocol from the drop-down list.

Host 1 Port Range: Specify the port range for the rule. Host 2 Port Range: Specify the port range for the rule. In these cases, you can use Inbound Filters to limit that exposure by specifying the IP addresses of internet hosts that you trust to access your LAN through the ports that you have opened.

Inbound Filters can be used for limiting access to a server on your network to a system or group of systems. Name Specify a name for the inbound filter.

Action: Select Allow or Deny from the drop-down list. This will apply the inbound filter rule on the WAN interface. Click on the Save button to store the changes. The date and time of the device can be configured manually or by synchronizing with a time server. Note: If the device loses power for any reason, it will not be able to keep its clock running, and will not display the correct time once the device has been restarted.

Therefore, you must re-enter the correct date and time. Current Router Time: Displays the current time on the device. Time Zone: Select your time zone from the drop-down list. Enable Daylight Saving: Place a check in this box to enable daylight savings time.

Daylight Saving Offset: Select the offset from the drop-down list. Daylight Saving Date: Select the daylight savings date from the drop-down list. Select the starting and ending times for the change to and from daylight saving time. If you are using schedules or logs, this is the best way to ensure that the schedules and logs are kept accurate.

System Settings Click on the System link in the navigation menu. This page allows you to reboot the device using the current settings or restore all the settings to the factory defaults. Save To Local Hard Drive This option allows you to save the current configuration of the device into a file. Click on the Save Configuration button to begin.

Save the file on your local disk by using the Save or Save to Disk button in the dialog box. Click on the Browse button to select the file and then click on Restore Configuration from a File button.

The system then prompts you to reboot the device. Click on the OK button to continue. You will then see the Rebooting page. Please wait while the system is rebooting.

Note: Do no un-plug the device during this process as this may cause permanent damage. This option restores al configuration settings back to the settings that were in effect at the time when the device was shipped from the factory. Once the dialog box appears, click on the OK button to confirm the action.

Note: The current settings will be lost. Reboot The Device Click on the Reboot the Device button to reboot the device using its current settings. This page allows you to upgrade the firmware of the device in order to improve the functionality and performance. This page also displays the current firmware version and its release date. Connect the device to your PC using an Ethernet cable, as the firmware cannot be upgraded using the wireless interface.

Click on the Browse button to select the firmware and then click on the Upload button. Syslog Logs display a list of events that are triggered on the Ethernet and Wireless interface. Administrator Settings Admin Password You can change the password required to log into the broadband router's system web-based management.

Passwords can contain 0 to 12 alphanumeric characters, and are case sensitive. Username: Fill in the current username default: admin. Password: Enter your new password. Verify Password: Enter your new password again for verification purposes. Remote Management The remote management function allows you to configure the Broadband router from a remote site.

Inactivity Time Out: Time after which you will be automatically logged out of the web-interface. Remote Admin Port: The port number of the remote management web interface. Click Apply at the top of the screen to save the above configurations. These limits are designed to provide reasonable protection against harmful interference in a residential installation.

This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.

Operation is subject to the following two conditions: 1 This device may not cause harmful interference, and 2 this device must accept any interference received, including interference that may cause undesired operation.

This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Report abuse Libble takes abuse of its services very seriously. Product: Spam. Hateful or violent content For example, Anti-Semitic content, racist content, or material that could result in a violent physical act. Personal or private information For example, a credit card number, a personal identification number, or an unlisted home address.

Promotion of regulated goods and services. Forumrules To achieve meaningful questions, we apply the following rules: First, read the manual; Check if your question has been asked previously; Try to ask your question as clearly as possible; Did you already try to solve the problem?

Therefore, avoid filling in personal details. Register Register getting emails for Sitecom wireless n xr gigabit gaming router at: new questions and answers new manuals You will receive an email to register for one or both of the options.

The manual is 4,84 mb in size.



0コメント

  • 1000 / 1000