Page 2 Preface This manual provides information related to the installation and operation of this device. The individual reading this manual is presumed to have a basic understanding of telecommunications terminology and concepts. If you find the product to be inoperable or malfunctioning, please contact technical support for immediate service by email at INT-support comtrend. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.

Author:Nigul Maujas
Language:English (Spanish)
Published (Last):10 December 2011
PDF File Size:2.78 Mb
ePub File Size:11.56 Mb
Price:Free* [*Free Regsitration Required]

The options shown here allow you to configure security features of the wireless LAN interface. The WPS method configures security settings automatically see 6. If the SSID does not match, that client will not be granted access. Network Authentication This option specifies whether a network key is used for authentication to the wireless network. If network authentication is set to Open, then no authentication is provided.

Despite this, the identity of the client is still verified. Each authentication type has its own settings. For example, selecting WEP Encryption will also be enabled as shown below. The settings for WPA authentication are shown below. WEP Encryption This option specifies whether data sent over the network is encrypted. The same network key is used for data encryption and network authentication. Four network keys can be defined although only one can be used at any one time.

Use the Current Network Key list box to select the appropriate network key. Security options include authentication and encryption services based on the wired equivalent privacy WEP algorithm. WEP is a set of security services used to protect When data encryption is enabled, secret shared encryption keys are generated and used by the source station and the destination station to alter frame bits, thus avoiding disclosure to eavesdroppers.

Under shared key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the This drop-down list box will display when WEP Encryption is enabled. The key strength is proportional to the number of binary bits comprising the key.

This means that keys with a greater number of bits have a greater degree of security and are considerably more difficult to crack. Encryption strength can be set to either bit or bit. Each key contains a bit header an initiation vector which enables parallel decoding of multiple streams of encrypted data.

Other authentication modes do not use WPS so they must be configured manually. To configure security settings with WPS, follow the procedures below. Configured is used when the ARu will assign security settings to clients. Unconfigured is used when an external client assigns security settings to the ARu.

Consult the device documentation to check its capabilities.


Comtrend AR-5381U Wireless ADSL2+ router User Manual UM AR 5381u A2 2

Since this firewall blocks incoming connections you may need open a port through it for certain games and applications. This process of opening a port is frequently called a port forward, since you are forwarding a port from the internet to your home network. The basic process to open a port is: Setup a static IP address on either your computer or device that you want to forward a port to. Login to your Comtrend ARu router. Navigate to the port forwarding section.


Comtrend Corporation AR-5381u Manuals



Comtrend AR-5381u Router Port Forwarding Instructions


Related Articles