Tenda Wireless N300 Router, User Guide
Tenda Wireless N300 Router, User Guide
Tenda Wireless N300 Router, User Guide
Contents
COPYRIGHT STATEMENT ..............................................................................................1
CHAPTER 1 PRODUCT OVERVIEW ....................................................................................1
1 PACKAGE CONTENTS.............................................................................................................1
2 LEDS AND PORTS ..................................................................................................................1
CHAPTER 2 INSTALLATION AND QUICK SETUP GUIDE ..............................................3
1 PHYSICAL INSTALLATION ......................................................................................................3
1.1 Preparation .................................................................... 3
1.2 Physical installation ............................................................... 4
SECURITY.........................................................................................................................65
5.1 URL Filter ..................................................................... 65
5.2 MAC Filter .................................................................... 67
5.3 Client Filter .................................................................. 69
6 TOOLS .................................................................................................................................72
6.1 Reboot ........................................................................ 72
6.2 Restore to Factory Default Settings .................................................. 72
6.3 Backup/Restore ................................................................. 73
6.4 Syslog ........................................................................ 74
6.5 Remote Web Management ......................................................... 75
6.6 Time .......................................................................... 76
6.7 Login Password ................................................................. 76
6.8 Firmware Upgrade ............................................................... 77
Front Panel
1.
Blinking
Description
LAN port connected correctly
LAN port is transferring data
WAN port connected correctly
WAN port is transferring data
Wireless is enabled
Transferring data
Indicates system is functioning properly
Indicates a proper connection to the power
supply
Device is performing WPS authentication on
a client device
Back Panel
2.
Description
W309R
PC
Ethernet Cable
Broadband Service
Internet Connection
Setup
3.
2. Connect one of the LAN ports on the Device to the NIC port on your PC
using an Ethernet cable.
4.
3. Connect the Ethernet cable from Internet side to the WAN port on the device.
If it is connected to the telephone line, please link the telephone line to the
MODEM and connect the MODEM to the WAN port on the device.
5.
3. Enter admin in the password field on the appearing login window and then
click OK.
4. Now you may access the devices home page for quickly setting up Internet
connection and wireless security.
DHCP
Select DHCP (Dynamic IP) if you can access Internet as soon as your computer
directly connects to an Internet-enabled ADSL/Cable modem; configure a
security key (8-63 characters) to secure your wireless network and then click
OK.
PPPoE
Select PPPoE (Point to Point Protocol over Ethernet) if you used to connect to
the Internet using a broadband connection that requires a username and a
password. Enter the user name and password provided by your ISP; configure a
security key to secure your wireless network and then click OK.
7.
Note:
1. DHCP is the default Internet connection type;
2. If you are not sure about your PPPoE username and password, contact your
Internet service provider (ISP) for help. For other Internet connection types,
please go to section 1.2: Internet Connection Setup.
8.
9.
3.
refreshing the page five times. And if it still displays "Connecting" try steps
below:
1). Contact your ISP for assistance if you are using the DHCP connection type.
2). Read the connection diagnostic info on WAN status.
10
.
Note:
Below diagnostic info will be displayed on particular occasions for your
reference:
1). You have connected to Internet successfully.
2). You might have entered a wrong user name and/or a wrong password. Please
contact your ISP for the correct user name and password and enter them
again.
3). Ethernet cable is not connected or not properly connected to the WAN port
on the device. Please reconnect it properly.
4). No response is received from your ISP. Please verify that you can access
Internet when you directly connect your PC to an Internet-enabled modem. If
not, contact your local ISP for help.
11
.
WIN7 Operation
1. If you are using Windows 7 OS, do as follows:
1) Click Start and select Control Panel.
12
.
3)
13
.
4)
5)
14
.
6)
Select the wireless network you wish to connect and click Connect.
7)
15
.
8) You can access Internet via the device when "Connected" appears next to
the wireless network name you selected.
16
.
Windows XP Operation
17
.
2)
18
.
4) Select the desired wireless network, click Connect, enter the security key
and then click OK.
5)
You can access Internet via the device when "Connected" appears next to
the wireless network name you selected.
19
.
20
.
PPPoE
Select PPPoE (Point to Point Protocol over Ethernet) if you used to connect to
the Internet using a broadband connection that requires a username and a
password and enter the user name and password provided by your ISP.
Static IP
Select Static IP if your ISP provides all the needed info. You will need to enter
the provided IP address, subnet mask, gateway address, and DNS address(es) in
corresponding fields.
21
.
1.
2.
3.
4.
5.
6.
7.
8.
Click Advanced.
Click Internet Connection Setup.
Internet connection Type: Select Static IP.
IP Address: Enter the IP address provided by your ISP. Consult your ISP if
you are not clear.Consult your ISP if you are not clear.
Subnet mask: Enter the subnet mask provided by your ISP.
Gateway: Enter the WAN Gateway provided by your ISP.
DNS Server: Enter the DNS address provided by your ISP.
OK: Click it to save all your settings.
DHCP
Select DHCP (Dynamic IP) if you can access Internet as soon as your computer
directly connects to an Internet-enabled ADSL/Cable modem.
22
.
1.
2.
3.
PPTP
Select PPTP (Point-to-Point-Tunneling Protocol) if your ISP uses a PPTP
connection. The PPTP allows you to connect a router to a VPN server.
For example
A corporate branch and headquarter can use this connection type to implement
mutual and secure access to each others resources.
23
.
a)
b)
c)
d)
e)
f)
g)
h)
i)
24
.
L2TP
Select L2TP (Layer 2 Tunneling Protocol) if your ISP uses an L2TP connection.
The L2TP connects your router to a L2TP server.
For Example
A corporate branch and headquarter can use this connection type to implement
mutual and secure access to each others resources.
a)
b)
c)
d)
e)
f)
g)
h)
i)
1.
2.
3.
IP Address: Enter the IP address provided by your ISP. Consult your ISP if
you are not clear.
Subnet mask: Enter the subnet mask provided by your ISP.
Gateway: Enter the WAN Gateway provided by your ISP. Consult your ISP
if you are not clear.
Note:
PPPOE, PPTP and L2TP cannot be used simultaneously!
For PPTP and L2TP Internet connections, only Static IP or Dynamic IP is
available.
Note that PPTP and L2TP may not be available on some products.
1.
2.
3.
4.
5.
6.
7.
8.
9.
PPPoE User Name: Enter the User Name provided by your ISP.
PPPoE Password: Enter the password provided by your ISP.
MTU: Maximum Transmission Unit. DO NOT change it from the factory
default value unless necessary.
Service Name: Description of PPPoE connection. Leave blank unless
otherwise required.
Server Name: Description of server. Leave blank unless otherwise
required.
Address Mode: Select "Dynamic" if you dont get any IP info from your
ISP, otherwise select "Static". Consult your ISP if you are not clear.
IP Address: Enter the IP address provided by your ISP. Consult your ISP
if you are not clear.
Subnet mask: Enter the subnet mask provided by your ISP.
27
.
1.
2.
3.
28
.
29
.
1.
3. Alternate DNS ServerEnter the other DNS address if your ISP provides
such addresses (optional).
31
.
1.
2.
3.
4.
Note:
If the IP address you have reserved for your PC is currently used by another
client, then you will not be able to obtain a new IP address from the device's
DHCP server, instead, you must manually specify a different IP address for your
PC to access Internet.
2 Wireless Settings
2.1 Wireless Basic Settings
If you want to create a WLAN for sharing Internet connection, simply click
Wireless-> Wireless Basic Settings. Change the SSID, you can name it
whatever you like. For example, select 2437MHz (channel 6) and leave other
32
.
1.
SSID: This is the public name of your wireless network. The default is
Note
You can also select other security modes as you need.
WPS
Wi-Fi Protected Setup makes it easy for home users who know little of wireless
security to establish a home network, as well as to add new devices to an
existing network without entering long passphrases or configuring complicated
settings. Simply enter a PIN code or press the software PBC button or hardware
WPS button (if any) and a secure wireless connection is established.
Operation Instructions:
34
.
PIN: On the wireless security page, enable WPS, select PIN and enter the
8-digit PIN code from network adapter; then, within 2 minutes, enable
WPS/PIN on the client device;
35
.
Note
1.
With WPS successfully enabled, the WPS LED on the router keeps
blinking for about 2 minutes, and during this time, you can enable WPS on a
wireless adapter; if the adapter successfully joins the wireless network, the WPS
LED will display a solid light. Repeat steps above if you want to add more
wireless adapters to the router.
2.
Reset OOB: Clicking this button will reset SSID to factory default and
disable security mode.
3.
Existing wireless settings will still be maintained by default after a
successful WPS connection. Namely security settings and SSID on the router
will still be the same. If you want to generate a random wireless key via WPS,
click Reset OOB and then follow WPS setup instructions above.
36
.
Note:
To use the WPS security, the wireless client must be also WPS-capable.
2.
Before you press the hardware WPS button on the device for WPS/PBC
connection, making sure the WPS feature has been enabled on the device.
1.
WISP Mode
If your router acquires Internet access from a wireless Access Point, please
select WISP mode. Specific steps are as follows:
1.
Click Wireless>Wireless Extender, select WISP mode and click Open
Scan.
37
.
2.
Click Open Scan, select the AP you wish to connect, such as Tenda-000248,
and click OK.
38
.
View and note down the wireless security settings: security mode, cipher
type, security key.
39
.
5.
40
.
41
.
Note
1.
2.
3.
42
.
2.
43
.
View and note down the wireless security settings: security mode, cipher
type, security key, etc., which should be in accordance with the upper
device.
4.
44
.
45
.
For example:
As seen in the figure above, PC1 and PC2 access Internet via a wireless
connection to Router 1. While PC3 and PC4 are too far to directly connect to
Router 1 for Internet access. Now you can use the WDS bridge feature to let
PC3 and PC4 access Internet.
Before you get started:
1. View and note down the wireless security settings: security mode, cipher type,
security key, etc. on Router 1; Click Status>LAN Settings and check the IP
address.
46
.
settings.
47
.
settings.
Server.
5.Set the LAN IP address of Router 2 to a different address yet on the same net
segment as Router 1.
As shown below:
48
.
Router 1:
LAN IP: 192.168.0.1;
Subnet Mask: 255.255.255.0;
Router 2:
LAN IP192.168.0.10;
Subnet Mask: 255.255.255.0;
Then do as follows:
1. Configure Router 2:
1) Wireless Working Mode: Select WDS Bridge Mode.
2) Click Open Scan to search for Router 1.
49
.
4) Verify that the SSID, channel, and AP MAC address on the page match those
of the added wireless network. If not, manually correct them.
5) Close Scan and click OK to save your settings.
6) Go to Wireless Security page and set the wireless security settings exactly as
they are on the link partner (Router 1).
50
.
2. Configure Router 1:
1.
2.
52
.
3.
53
.
Note:
The bandwidth here refers to the channel bandwidth instead of wireless
connection rate.
54
.
3 Bandwidth Control
3.1 Bandwidth Control
Use this section to manage bandwidth allocation to devices on your LAN. If
there are multiple PCs behind your router competing for limited bandwidth
resource, then you can use this feature to specify a reasonable amount of
bandwidth for each such PC, so that no one will be over stuffed or starved to
death.
1.
1.
Enable Traffic Statistics: Check/uncheck the box to enable/disable the
Traffic Statistics feature. To see at a glance how much traffic each device in your
56
.
network is using, enable this option. However usually, disabling it may boost
your network performance. This option is disabled by default. However, once
enabled the page refreshes every five minutes.
2.
OK: Click to activate corresponding settings.
IP Address: Displays IP addresses of PCs connected to the device.
Uplink Rate: Displays the upload speed (KByte/s) of a corresponding PC.
Downlink Rate: Displays the download speed (KByte/s) of a corresponding PC.
Sent Message: Displays the number of packets sent by a corresponding PC via
the device since Statistics is enabled.
Sent Bytes: Displays the number of Bytes sent by a corresponding PC via the
device since Statistics is enabled. The unit is MByte.
Received Message: Displays the number of packets received by a corresponding
PC via the device since Statistics is enabled.
Received Bytes: Displays the number of Bytes received by a corresponding PC
via the device since Statistics is enabled. The unit is MByte.
57
.
Special Applications
4.1 Port Range Forwarding
Port range forwarding is useful for web servers, ftp servers, e-mail servers,
gaming and other specialized Internet applications. When you enable port
forwarding, the communication requests from the Internet to your routers WAN
port will be forwarded to the specified LAN IP address. As seen in the figure
above, to let PC3 access service ports on PC1, you must first configure port
forwarding settings on the router to which PC1 is uplinked.
58
.
1.
59
.
For example: You want to share some large files with your friends who are not
in your LAN; however it is not convenient to transfer such large files across
network. Then, you can set up your own PC as a FTP server and use the Port
(Range) Forwarding feature to let your friends access these files. Assuming that
the static IP address of the FTP server (Namely, your PC) is 192.168.0.10, you
want your friends to access this FTP server through default port of 21 using the
TCP protocol, then do as follows:
1.
Start/End Port: Enter 21 in both Start Port and End Port fields.
2.
LAN IP: Enter 192.168.0.10
3.
Protocol: Select TCP.
4.
Enable: Check to enable current settings.
5.
OK: Click to activate your settings.
Note: If you include port 80 on this section, you must set the port for remote
60
.
DMZ Host IP Address: The IP Address of the device for which the routers
firewall will be disabled. Be sure to statically set the IP Address of that device
for this function to be consistent.
Enable: Check/uncheck to enable/disable the DMZ host feature.
OK: Click to enable your settings.
Note:
Once enabled, the DMZ host loses protection from device's firewall and
becomes vulnerable to attacks.
4.3 DDNS
Dynamic DNS or DDNS is a term used for the updating in real time of Internet
Domain Name System (DNS) name servers. Dynamic DNS or DDNS is a term
used for the updating in real time of Internet Domain Name System (DNS) name
servers. We use a numeric IP address allocated by Internet Service Provider (ISP)
to connect to Internet; the address may either be stable ("static"), or may change
61
.
from one session on the Internet to the next ("dynamic"). However, a numeric
address is inconvenient to remember; an address which changes unpredictably
makes connection impossible. The DDNS provider allocates a static host name
to the user; whenever the user is allocated a new IP address this is
communicated to the DDNS provider by software running on a computer or
network device at that address; the provider distributes the association between
the host name and the address to the Internet's DNS servers so that they may
resolve DNS queries. Thus, uninterrupted access to devices and services whose
numeric IP address may change is maintained. (You need to have an account
with one of the Service Providers in the drop-down menu first.)
4.4 UPNP
The Universal Plug and Play (UPnP) feature allows network devices, such as
computers from Internet, to access resources on local host or devices as needed.
UPnP-enabled devices can be discovered automatically by the UPnP service
application on the LAN. This feature is enabled by default. No settings are
required.
63
.
1.
2.
3.
4.
Note:
Gateway must be on the same IP net segment as device's LAN/WAN IP
address.
2. Subnet Mask must be entered 255.255.255.255 if destination IP address is a
host.
3. Subnet Mask must be entered accordingly if destination IP address
represents an IP network segment. It must correspond to the specified IP
address. For example, for IP address of 10.0.0.0, you may enter a subnet
mask of 255.0.0.0.
1.
64
.
The principal task for a router is to look for an optimal transfer path for each
data packet passing through it, and transfer it to the specified destination. To
complete this work, the router stores and maintains related data of various
transfer paths, i.e. establishing a routing table, for future route selection.
Security
5.1 URL Filter
To better control LAN PCs, you can use the URL filter functionality to allow or
disallow such PCs to access certain websites within a specified time range.
65
.
2. Access Policy: Select an access policy number, say, 1, from the drop-down
list.
3. Policy Name: Briefly describe the current rule, say, baidu, (It can only consist
of numbers, letters, or underscore).
4. Start IP/End IP: Enter the same IP address or 2 different IP addresses in both
boxes to specify a single PC or a range of PCs for the current rule to apply to.
5. URL Character String: Enter the domain name you wish to filter out, say,
baidu.
6. Time: Specify a time period for a current rule to take effect. If the field is set
to 0:00-0:00, the rule will be applied 24hrs/day.
7. Day(s): Select a day or several days for a current rule to take effect. If
Sun-Sat is selected, the rule will apply 7days/week.
8. Enable: Check/uncheck to enable/disable the feature.
9. OK: Click to activate your settings.
Example:
If you want to disallow all computers on your LAN to access youtube.com from
800 to 1800 during working days: Monday- Friday, then do as follows:
66
.
67
.
3. Policy Name: Briefly describe the current rule (It can only consist of
numbers, letters, or underscore).
For Example:
To allow a PC at the MAC address of 00:E4:A5:44:35:69 to access Internet from
Monday to Friday.
a)
b)
c)
d)
e)
f)
g)
h)
5.3
Client Filter
This section allows you to set the times specific clients can or cannot access the
Internet via the devices assigned IP addresses and service port.
Forbid Only: Only PCs listed as Forbidden will be forbidden from accessing
specified services; others are not restricted;
Permit Only: Only PCs listed as permitted will be permitted to access specified
services; others will be forbidden.
69
.
70
.
list.
Policy Name: Briefly describe the current rule, say, 123.
Start IP: Enter 100.
End IP: Enter 120.
Port: Enter 1-65535 to forbid all Internet services and applications.
Type (or Protocol): Select Both.
Time: Select 0 for all fields to apply the rule 24hrs/day.
Day(s): Select Sun-Sat to apply the rule 7days/week.
Enable: Check the Enable box.
OK: Click to activate your settings.
71
.
6 Tools
6.1 Reboot
Reboot the device to activate your settings. WAN connection will be
disconnected during reboot.
6.3 Backup/Restore
Backup: Once you have configured the device the way you want it, you can
save these settings to a configuration file on your local hard drive that can later
be imported to your device in case that the device is restored to factory default
settings. To do so, follow below instructions:
1.Click the Backup button and specify a directory to save settings on your local
hardware.
6.4 Syslog
Here you can view the history of the devices actions. After 150 entries, the
earliest logs will clear automatically.
74
.
1.
2.
3.
4.
1.
2.
"x.x.x.x" represents the the device's Internet IP address and 8080 is the
remote admin port. Assuming the device's Internet IP address is
220.135.211.56, then, simply replace the "x.x.x.x" with "220.135.211.56"
(namely, http://220.135.211.56:8080).
Leaving the IP address field at "0.0.0.0" makes the device remotely
accessible to all the PCs on Internet or other external networks; populating
it with a specific IP address, say, 218.88.93.33, makes the device only
remotely accessible to the PC at the specified IP address.
6.6 Time
This page is used to set the routers system time. You can choose to set the time
manually or get the GMT time from the Internet and the system will
automatically connect to NTP server to synchronize the time.
Note:
Configured time and date info will be lost when the device gets disconnected
from power supply. However, it will be updated automatically when the device
reconnects to Internet. To activate time-based features (e.g. firewall), the time
and date info shall be set correctly first, either manually or automatically.
76
.
1.
2.
3.
New Password: Enter a new password, say, 12345 (Note that the
password can only be alphanumeric).
Confirm New Password: Re-enter the new password for confirmation.
OK: Click to activate your settings.
Note:
For security purpose, it is highly recommended that you change Device's default
login password.
77
.
1.
2.
Note:
1. Before you upgrade the firmware, making sure you are having a correct
firmware. A wrong firmware may damage the device.
2. Do NOT upgrade the firmware wirelessly or disconnect device from power
supply while firmware update is in process. Note that you need to update the
device's firmware via a wired connection.
78
.
Appendix 1 Glossary
Channel
A communication channel, also known as channel, refers either to a physical
transmission medium such as a wire or to a logical connection over a
multiplexed medium such as a radio channel. It is used to transfer an information
signal, such as a digital bit stream, from one or more transmitters to one or more
receivers. If there is only one AP in the range, select any channel you like. The
default is Auto.
If there are several APs coexisting in the same area, it is advisable that you select
a different channel for each AP to operate on, minimizing the interference
between neighboring APs. For example, if 3 American- standard APs coexist in
one area, you can set their channels respectively to 1, 6 and 11 to avoid mutual
interference.
SSID
Service set identifier (SSID) is used to identify a particular 802.11 wireless LAN.
It is the name of a specific wireless network. To let your wireless network
adapter roam among different APs, you must set all APs SSID to the same
name.
WPA/WPA2
The WPA protocol implements the majority of the IEEE 802.11i standard. It
enhances data encryption through the Temporal Key Integrity Protocol (TKIP)
which is a 128-bit per-packet key, meaning that it dynamically generates a new
key for each packet. WPA also includes a message integrity check feature to
prevent data packets from being hampered with. Only authorized network users
can access the wireless network. The later WPA2 protocol features compliance
with the full IEEE 802.11i standard and uses Advanced Encryption Standard
(AES) in addition to TKIP encryption protocol to guarantee better security than
that provided by WEP or WPA. Currently, WPA is supported by Windows XP
SP1.
IEEE 802.1X Authentication
IEEE 802.1X Authentication is an IEEE Standard for port-based Network
Access Control (PNAC). It is part of the IEEE 802.1 group of networking
protocols. It provides an authentication mechanism to devices wishing to attach
79
.
WDS
A wireless distribution system (WDS) is a system enabling the wireless
interconnection of access points in an IEEE 802.11 network. It allows a wireless
network to be expanded using multiple access points without the traditional
requirement for a wired backbone to link them. All base stations in a wireless
distribution system must be configured to use the same radio channel, method of
encryption (none, WEP, or WPA) and the same encryption keys. They may be
configured to different service set identifiers. WDS also requires every base
station to be configured to forward to others in the system. WDS may also be
considered a repeater mode because it appears to bridge and accept wireless
clients at the same time (unlike traditional bridging).WDS may be incompatible
between different products (even occasionally from the same vendor) since it is
not certified by the Wi-Fi Alliance. WDS may provide two modes of wireless
AP-to-AP connectivity:
Wireless bridging, in which WDS APs communicate only with each other and
don't allow wireless clients or stations (STA) to access them.
Wireless repeating, in which APs communicate with each other and with
wireless STAs.
DMZ
In computer security, a DMZ (sometimes referred to as a perimeter networking)
is a physical or logical subnetwork that contains and exposes an organization's
external-facing services to a larger untrusted network, usually the Internet. The
purpose of a DMZ is to add an additional layer of security to an organization's
local area network (LAN); an external attacker only has access to equipment in
the DMZ, rather than any other part of the network. Hosts in the DMZ have
limited connectivity to specific hosts in the internal network, although
communication with other hosts in the DMZ and to the external network is
allowed. This allows hosts in the DMZ to provide services to both the internal
and external network, while an intervening firewall controls the traffic between
the DMZ servers and the internal network clients. Any services such as Web
servers, Mail servers, FTP servers and VoIP servers, etc. that are being provided
to users on the external network can be placed in the DMZ.
81
.
Configure PC2:
Click Start> Run on PC3, input cmd on the appearing window and then click
OK.
82
.
1.
83
.
84
.
Input ping 192.168.0.1 and press Enter. If you get a screen as seen below, you
have successfully implemented WDS.
Note:
WDS feature can only be implemented between 2 WDS-capable wireless
devices. Plus, SSID, channel, security settings and security key must be
exactly the same on both such devices.
2. To ensure a proper wireless connection, do not change any settings on the
two devices after WDS is successfully implemented.
1.
85
.
Appendix 3 FAQs
This section provides solutions to problems that may occur during installation
and operation of the device. Read the following if you are running into problems.
If your problem is not covered here, please feel free to go to www.tendacn.com
to find a solution or email your problems to: support@tenda.com.cn or
support02@tenda.com.cn. We will be more than happy to help you out as soon
as possible.
1. Q: I entered the devices LAN IP address in the web browser but cannot
access the utility. What should I do?
a.Check whether device is functioning correctly. The SYS LED should blink a
few seconds after device is powered up. If it does not light up, then some
internal faults may have occurred.
b.Verify physical connectivity by checking whether a corresponding ports link
LED lights up. If not, try a different cable. Note that an illuminated light does
NOT ALWAYS indicate successful connectivity.
c. Run the "ping 192.168.0.1" command. If you get replies from 192.168.0.1,
open your browser and verify that Proxy server is disabled. In case that ping
fails, press and hold the "RESET" button on your device for 7 seconds to restore
factory default settings, and then run "ping192.168.0.1" again.
d. Contact our technical support for help if the problem still exists after you tried
all the above.
86
.
87
.
88
.
2.
89
.
3.
Click "Wireless Networks", select the item under "Preferred networks" and
then click the Remove button.
90
.
2.
91
.
92
.
93
.