Instruction/ maintenance manual of the product 8800 AlphaShield
Go to page of 81
U ser Ma nu a l.
Version 1.0 T able of Contents 1. INTRODUCTION 5 2. CONTENTS 6 3. SYSTEM REQUIREMENTS 7 4. FEATURES 8 5. HARDWARE GUIDELINES 10 5.1 Connections 10 5.2 LEDs 11 6. LOGIN 12 7. SETUP 13 7.1 Quick Start 13 7.2 WAN 23 7.3 LAN 28 31 7.4 DHCP 29 7.5 Wireless 8.
T able of Contents 8.13 Schedules 50 9. TOOLS 51 9.1 Admin 51 9.2 Time 53 9.3 Print Server Setup 54 9.4 Syslog 54 9.5 E-mail 55 9.6 System 56 9.7 Firmware 57 9.8 Dynamic DNS 58 10. STA TUS 59 10.1 Device Info 59 10.2 Wireless 61 10.3 Routing 61 10.4 Print Serve Status 62 10.
T able of Contents 13.5 Copyright 78 13.6 Trademark 78 13.7 Patents 78 13.8 Restrictions 78 13.9 Liability Limitations 78 13.10 Customer Remedies 79 13.11 Notice of Change of Terms and Conditions 79 13.12 Replacement Components and Specifications 79 14.
1. INTRODUCTION: Congratulations on your purchase of the Alpha Secure Wireless Router 8800, and thank you for choosing AlphaShield for your networking and security needs.
2. CONTENTS: 1. Alpha Secure Wireless Router 8800 2. Cat5 Ethernet Cable 3. Power Adapter (6.8V , 2.5A) 4. Quick Installation Guide 5. CD-ROM with Manual 6.
3. SYSTEM REQUIREMENTS: 1. External xDSL or Cable Modem with Ethernet Ports. 2. PC or MAC with following minimum requirements: ? 1.25 Ghz processor ? 256MB Memory ? CD-ROM Drive ? Ethernet Adapter 10/100/1000 with TCP/IP Protocol Inst alled ® ? Windows XP/2000/Vista/ME or Mac® OS X v10.
4.FEA TURES: Hardware Interface Features: Router/Switch Hardware: ? Dedicated 250 MIPS High Speed core Network Processor ? Dedicated High Speed Multi-port Gigabit Switch & Co-Processor ? 5 x 10/10.
AlphaShield Firewall: ? AlphaGAP Logical Disconnection and Re-connection ? Full Stateful Packet Inspection (SPI) ? AlphaGAP Scheduler ? IP-Stealth technology ? Configurable DMZ Option ? Inclusion, Exc.
5. 5.1 Connections: 1. All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can either use a straight-through or a crossover Ethernet cable. 2. 5 Auto MDI/MDIX LAN ports automatically sense the cable type when connecting to Ethernet-enabled computers for both WAN and LAN.
5.2 LEDs: 5 LOCAL NETWORK LEDs: The connection to an Ethernet-enabled computer on ports 1-5 is indicated by a solid light. When data is being transmitted, this LED will flash. 1 POWER LED: A solid light indicates a proper connection to the power supply .
6. LOGIN: The Configuration Interface can be accessed from your Web browser. Type http://192.168.0.1 in the address window and press Enter . The Login screen will appear. ? Select a User Name . ? By default, there is no password. Simply leave this window blank ? Click Log In to proceed.
7. SETUP: 7.1 Quick Start: The Wizard screen contains two wizards: ? Internet Connection Setup ? Wireless Setup Version 1.0 Page 13 Alpha Secure Wireless Router 8800 GIGABIT.
a) Launch Internet Connection Setup Wizard: The following Web-based Setup Wizard will help you connect your new Alpha Router to the Internet. This Setup Wizard will guide you in a step-by-step manner to get your Internet connection up and running.
Step 2: Select Y our Time Zone Select your local time zone from the pull-down menu. ? T o continue click Next Step 3: Configure Y our Internet Connection From the pulldown menu, choose your Internet Service Provider (ISP).
Step 3: Configure Y our Internet Connection DHCP CONNECTION (Dynamic IP Address) A MAC Address is a unique hardware address for devices on a Local Area Network. Enter the MAC Address of the computer that was originally connected to your broadband modem.
Step 3: Configure Y our Internet Connection At the Set Username and Password Connection (PPTP) Enter: ? PPTP IP Address ? PPTP Subnet Mask ? PPTP Gateway IP Address ? PPTP Server IP Address ? Your Username ? Your Password .
At the Set Static IP Address Connection Enter: ? IP address ? Subnet Mask ? Gateway Address ? Primary and Secondary DNS Address es ? T o continue click Next Setup Complete ? Click Connect . This will save your settings and reboot the router Version 1.
b) Launch Wireless Security Setup Wizard: The next step is to set up your wireless network. This Wizard will help you set it up and make it secure. Some changes made using this Setup Wizard may requir.
Step 1: Name Y our Wireless Network ? Choose a Name for your Wireless Network ? Do not choose the default name for security reasons ? T o continue click Next . Step 2: Secure Y our Wireless Network ? Choose a security option to protect your network from unauthorized users.
Step 3: Set you Wireless Security Password ? Select a Security Password between 2 and 20 characters ? T o continue click Next Setup Complete! The setup Page will give you a detailed summary of the settings, based on what you have selected in the previous steps.
Version 1.0 Page 22 Alpha Secure Wireless Router 8800 GIGABIT This screen will only appear if you selected BETTER security This screen will only appear if you selected GOOD security This screen will o.
7.2 WAN: The WAN section will help you choose one of 6 connection types: St atic IP , DHCP , PPPoE, PPTP , L2TP , and BigPond. If you are using the PPPoE option, you will need to remove or disable any PPPoE client software on your computers. If you have any questions about your connection, please contact your Internet Service Provider (ISP).
DHCP WAN Mode: ? Enter a Host Name to identify your system to the ISP's server PPPoE WAN Mode: ? Enter the Username and Password you use to gain access to the Internet. ? T o verify your Password , re-enter it below ? Enter a Service Name (If your ISP requires it).
PPTP WAN Mode: ? Enter the PPTP IP Address provided by your ISP . ? Enter the PPTP Subnet Mask provided by your ISP . ? Enter the PPTP Gateway IP Address provided by your ISP . ? Enter the PPTP Server IP Address you are connecting to, also provided by your ISP .
L2TP WAN Mode: Enter: ? The L2TP IP Address provided by your ISP . ? The L2TP Subnet Mask provided by your ISP . ? The L2TP Gateway IP Address provided by your ISP . ? The L2TP Server IP Address provided by your ISP . ? Enter the Username and Password you use to gain access to the Internet.
DNS And Advanced Settings: These Options may be used on all WAN Modes: ? If you have the DNS servers provided to you by the ISP , please select the Use these DNS Servers ? Please enter the Primary DNS.
7.3 LAN Settings: ? IP Address: Enter the IP address of the router on the local area network. The local network settings are based on the address assigned here. ? Subnet Mask: Use the of your router on the local area network. ? RIP Announcement is u sed with multiple routers to broadcast routing information.
7.4 DHCP: Use this section to configure the built-in DHCP Server to assign IP addresses to the computers on your network. DHCP Settings: T o connect to the LAN and Internet the DHCP Server function will assign your network devices the necessary information and you do not have to manually configure each device on your network with IP settings.
Number of Dynamic DHCP Clients: ? This is used to automatically assign IP addresses from a predetermined pool of addresses to computers or devices that request them. It shows the number of clients that are receiving an IP address from the router and LAN devices those are leasing IP addresses.
7.5 Wireless: Use this section to configure your wireless settings . Y our Alpha Router supports three wireless security modes including: WEP , WPA-Personal, and WPA-Enterprise. WEP is the original wireless encryption standard; WP A provides a higher level of security; and WPA-Personal does not require an authentication server.
? Super G Mode : Super G Turbo Modes must use channel 6 for transmission and 802.1 1 Mode must be set to 802.11g. ? Super G without Turbo: Performance enhancing features such as Packet Bursting, Fast Frames, and Compression. ? Super G with Static T urbo: Mode is not backwards compatible with non-Turbo (legacy) devices.
Wireless Security Mode: WEP ? WEP is the Wireless Encryption Standard. T o use it you must enter the same key(s) into the router and the wireless stations. For 64 bit keys you must enter 10 hex digits into each key box. For 128 bit keys you must enter 26 hex digits into each key box.
WPA-Personal: ? WPA requires stations to use high-grade encryption and authentication. WDS will not function with WPA security. Select the WPA Mode from drop-down list: ? Cipher Type is entered as a pass-phrase and used to generate session keys that are unique for each wireless client.
WPA-Enterprise: The RADIUS server works with WPA-Enterprise to authenticate wireless clients. The Server may need to be configured in order to do so. The necessary credentials should have been established by wireless clients before attempting to authenticate to the Server through the Gateway ? Select the pre-shared key Cipher Type .
8. ADV ANCED: Advanced Options allows you to configure a number of advanced features including ports, application priority , Internet access, filters, and advanced wireless settings.
8.2 Special Applications: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a 'trigger' port or port range. Special Applications rules apply to all computers on your internal network.
Add/Edit Special Applications Rule: The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a "trigger" port or port range. Special Applications Rules apply to all computers on your internal network.
8.3 Gaming: The Gaming option is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network. This feature allows you to enter ports in various formats including, Port Ranges (100-50), Individual Ports (80, 68, 888), or Mixed (1020-5000, 689).
® 8.4 StreamEngine Network Optimization: ® This next section will help you configure the StreamEngine Network Optimization. ® StreamEngine T echnology improves your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web.
8.5 Routing: Add/Edit Route: The Routing option allows you to define fixed routes to defined destinations: ? Destination IP: Enter the Destination IP Address that the p ackets will be attempting to access.
8.6 Access Control: The Access Control option allows you to control access in and out of your network. Use this feature to grant access only to approved sites, limit web access based on time or dates, and/or block Internet access for applications like P2P utilities or games.
Step 1: Choose Policy Name: ? Policy Name. Typically , this would be a system name or user name such as "John's Computer." ? Click Next to continue. Step 2: Select Schedule: ? Select the Schedule of times when you want the policy to apply.
Step 4: Select Filtering Method: ? Apply Web Filter: With this option is enabled, the specified system will only have access to the Web sites listed in the Web filter section. ? Log Internet Access: When this option is enabled, all of the Web sites visited by the specified machine will be logged.
8.7 Web Filter: The Web Filter options allows you to set-up a list of allowed Web sites that can be used by multiple users. When Web Filter is enabled, all other Web sites not listed on this page will be blocked. T o use this feature, you must also select the "Apply Web Filter" checkbox in the Access Control section.
8.8 MAC Address Filters: The MAC (Media Access Controller) Address filter option is used to control network access based on the MAC Address of the network adapter . A MAC address is a unique ID assigned by the manufacturer of the network adapter. This feature can be configured to ALLOW or DENY network/Internet access.
8.9 Firewall: The DMZ (Demilitarized Zone) option provides you with an option to set a single computer on your network outside of the router. If you have a computer that cannot run Internet applications successfully from behind the router, then you may place the computer into the DMZ for unrestricted Internet access.
8.11 Inbound Filters: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters may be used for limiting access to a server on your network to a system or group of systems.
8.12 Advanced Wireless: Advanced Wireless Settings: ? The default setting of the Fragmentation Threshold should remain 3200. Setting the Fragmentation value too low may result in poor performance. If you may slightly adjust your Fragmentation value somewhere in the between the recommended range of 256 to 3200.
8.13 Schedules: The Schedule configuration option is used to manage schedule rules for various firewall and parental control features. Add/Edit Schedule Rule: ? Enter the Schedule Name. ? T o select the Day(s) Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week.
9 TOOLS: 9.1 Admin: The Admin option is used to set a password for access to the W eb-based management. By default there is no password configured. It is highly recommended that you create a password to keep your new router secure.
USB File Sharing: ? Select Enable Remote Access to USB files to allow the Remote User to access the USB files. ? Select the port that you want the Remote User e.
9.2 Time: The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set your local time zone and set the Time Server . Daylight Saving Settings can also be configured to automatically adjust the time when needed.
9.3 Print Server Setup: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. From this page you can select which printing protocols to enable. T o use the shared printer from this computer, follow the setup instructions found at the AlphaShield website .
9.5 Email: The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Email Settings: ? From Email address: Enter the address that will appear as the sender when you receive a log file or firmware upgrade notification via email.
9.6 System: The System Settings section allows you to reboot the device or restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings including any rules that you've created. System Commands: ? T o restart the router click on Reboot the Device .
9.7 Firmware: The Firmware Upgrade section can be used to update to the latest firmware code to improve functionality and performance. T o check for the latest firmware, click the Check Online Now for Latest Firmware Version button.
9.8 Dynamic DNS: Dynamic DNS allows you to host a server (Web, FTP , Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses.
10. ST A TUS: The Status items are mainly informational. 10.1 Device Info: General: ? Time option displays the time and date that the router is set to. ? Firmware Version option displays the currently loaded firmware version. WAN: ? Connection Type shows t he Internet connection type that is being used.
LAN: ? MAC Address displayed for your local area network. ? IP Address displays the router on your local area network. ? Subnet Mask displays the router on your local area network. ? DHCP Server i ndicates if the router is acting as a DHCP server on the local area network.
10.2 Wireless: Use this option to view the wireless clients that are connected to your wireless router. Number Of Wireless Clients This display includes the number of clients that are connected to the router, the MAC address of each system connecting wirelessly, and the IP address of Each system connecting wirelessly.
10.4 Print Server Status: Y our AlphaShield Router includes an integrated print server that allows a printer to be shared between multiple computers on your network. This page displays status information about the print server and any attached printer.
10.6 Statistics: Network Traffic St ats: Traffic St atistics: Displays packets passing through your router. Refresh Statistics: Updates the screen with the latest router statistics. Clear Statistics: Clears all of the values on the screen. LAN Statistics: ? Sent shows the number of packets transmitted to the local area network.
Wireless Statistics: ? Sent shows the number of packets sent to the wireless network. ? Received shows the number of packets received from the Wireless Network. ? TX Packets Dropped shows the amount of transmit packets dropped. ? Errors shows the number of errors relating to packets to/ from the Wireless Network.
10.9 Switch Forwarding: This page displays the full details of Ethernet switching in your router. Version 1.0 Page 65 Alpha Secure Wireless Router 8800 GIGABIT.
1 1. GLOSSARY : ® Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP . Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP .
Broadcast – Transmitting data in all directions at once Browser – A program that allows you to access resources on the web and provides them to you graphically Cable modem – A device that allows.
DNS – Domain Name System. Translates Domain Names to IP addresses DOCSIS – Data Over Cable Service Interface Specifications . The standard interface for cable modems Domain name – A name that is.
Graphical user interface – GUI H.323 – A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half-duplex – Data cannot be transmit.
IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol V ersion 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – .
NAT – Network Address T ranslation allows many private IP addresses to connect to the Internet, or another network, through one IP address NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol.
Rendezvous – Apple’s version of UPnP , which allows for devices on a network to discover each other and be connected without the need to configure any settings Repeater – Retransmits the signal .
UDP – User Datagram Protocol UNC – Universal Naming Convention allows for shares on computers to be identified without having to know what storage device it’s on Unicast – Communication betwee.
12. TECHNICAL SPECIFICA TIONS: Internal Dual Processing Dedicated 250 MHz High Speed Network Processor Ip3023 Dedicated High Speed Multi-Port Gigabit Switch & Co-Processor Sp arX-5 Hardware Interf.
Advanced Firewall Features Network Address T ranslation (NAT) Up to 254 Addresses Stateful Packet Inspection (SPI) AlphaGAP Logical Disconnect (Automatic and Manual) MAC Filtering (Exclusion and Inclu.
13. SUPPORT : 13.1 100% Unhackable or Money Back Guarantee: If the original purchaser can prove that he or she was hacked while using a properly installed Alpha Router, with AlphaGAP T echnology enabled, AlphaShield Inc.
13.3 Service and Repairs: In case the Alpha Router device is found to be defective, the Manufacturer will be obligated only to replace or repair the defective product provided that the following is determined: ? The product has not been altered or repaired without the written consent of the Manufacturer.
13.5 Copyright: Information in this User Manual and all AlphaShield Inc.'s literature, including URLs and other Internet Website references, is subject to change without notice. The entire risk of the use or the results of the use of this document, with its terms and conditions, remains with the user .
13.10 Customer Remedies: Any liability of AlphaShield Inc., with respect to software or hardware or the performance thereof or defects therein, under any warranty , negligence, strict liability or other theory, will be limited exclusively to product replacement or , if replacement is inadequate as a remedy or, in AlphaShield Inc.
14. IMPORT ANT NOTICES: 14.1 FCC Statement: ? Reorient or relocate the receiving antenna. ? Increase the separation between the equipment and receiver. ? Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
14.4 IC Statement: Operation is subject to the following two conditions: 1) This device may not cause interference and; 2) This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 7dBi.
An important point after buying a device AlphaShield 8800 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought AlphaShield 8800 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data AlphaShield 8800 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, AlphaShield 8800 you will learn all the available features of the product, as well as information on its operation. The information that you get AlphaShield 8800 will certainly help you make a decision on the purchase.
If you already are a holder of AlphaShield 8800, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime AlphaShield 8800.
However, one of the most important roles played by the user manual is to help in solving problems with AlphaShield 8800. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device AlphaShield 8800 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center