Here you can find all about Asus RX3141 like manual and other informations. For example: review.
Asus RX3141 manual (user guide) is ready to download for free.
On the bottom of page users can write a review. If you own a Asus RX3141 please write about it to help other people. [ Report abuse or wrong photo | Share your Asus RX3141 photo ]
Asus RX3141, size: 1.9 MB
User reviews and opinions
No opinions have been provided. Be the first and add a new opinion/review.
ASUSTeK Computer Inc. Print
ASUS RX3141 Gateway Router
The World's First IP Sharing Gateway Router with Integrated 4-port Gigabit Switch
LAN 4 10/100/1000Mbps GbE ports Auto MDI/MDIX Auto-Negotiation: Speed, Duplex Mode, and Flow Control WAN 10/100Mbps Fast Ethernet port Auto MDI/MDIX Auto negotiation of speed, and duplex mode 193.86 (L) x 153.53 (W) x 42.5 (H) mm Web GUI configuration Firmware update via web GUI Reset to factory default via GUI TCP/IP, ICMP, UDP SPI (Stateful Packet Inspection) ACL (Access control List) DoS (Denial of Service) Protection ALG (Application Level Gateway) Logging and Reporting Static NAT Dynamic NAT PAT (Port Address Translation) NAT + Firewall: Up to 84Mbps Up to 4,096 MAC Address 128KB Packet Buffer 9KB Jumbo Frame Switching Fabric: 10Gbp Power Supply AC 100-240V, 50/60Hz
All specifications are subject to change without notice. Please check with your supplier for exact offers. Products may not be available in all markets. PCB color and bundled software versions are subject to change without notice. Brand and product names mentioned are trademarks of their respective companies.
1 von 1
Events in the network, that could be attempts to affect its security, are recorded in the RX3141 system log file. The log maintains a minimum log details such as, time of packet arrival, description of action taken by Firewall and reason for action.
Finding Your Way Around
The front panel contains LED indicators that show the status of the unit.
Figure 2.1. Front Panel LEDs
Table 2.2. Front Panel Label and LEDs LED Label
Status ON OFF
Indication RX3141 is powered on RX3141 is powered off Identifies the LAN port LEDs. Status of each LAN port is indicated by 3 LEDs: STATUS, SPEED and DUPLEX.
ON Blinking OFF
Ethernet link is established and active Data is transmitted or received via the connection No Ethernet link Speed is 1000Mbps Speed is 100Mbps Speed is 10Mbps or no link is established. The LAN port is operating in full-duplex mode. The LAN port is operating in halfduplex mode and collision is occurring. The LAN port is operating in half duplex mode and no collision is detected. Identifies the WAN port LED Ethernet link is established and active. No Ethernet link is established. Speed is 100Mbps Green: Data is transmitted or received via the connection
ON ON OFF ON Blinking
WAN STATUS SPEED Green Green ON OFF ON Blinking
Status ON Blinking OFF
Indication Speed is 10Mbps Data is transmitted or received via the connection No link is established.
The LAN port is operating in full-duplex mode. The LAN port is operating in half duplex mode and no collision is detected.
The rear panel contains the ports for the unit's data and power connections.
Figure 2.2. Rear Panel Connectors
Table 2.3. Rear Panel Labels and LEDs Label
Indication LAN Ports: connects to your PC's Ethernet port, or to the uplink port on your LAN's hub/switch, using the Ethernet cable. WAN Port: connects to your WAN device, such as ADSL or cable modem. Reset Button 1. Reboots the device 2. Resets the system configuration to the factory defaults if pressed for more than 5 seconds. Power Input Jack: connects to the supplied AC adapter
Windows NT 4.0 workstations:
First, check for the IP protocol and, if necessary, install it: 1. In the Windows NT task bar, click the <Start> button, point to Settings, and then click Control Panel. 2. In the Control Panel window, double click the Network icon. 3. In the Network dialog box, click the Protocols tab. The Protocols tab displays a list of currently installed network protocols. If the list includes TCP/IP Protocol, then the protocol has already been enabled. Skip to step 9. 4. If TCP/IP does not display as an installed component, click <Add> button. 5. In the Select Network Protocol dialog box, select TCP/IP, and then click <OK> button. You may be prompted to install files from your Windows NT installation CD or other media. Follow the instructions to install the files. After all files are installed, a window displays to inform you that a TCP/IP service called DHCP can be set up to dynamically assign IP information. 6. Click <Yes> button to continue, and then click <OK> button if prompted to restart your computer. Next, configure the PCs to accept IP addresses assigned by the RX3141: 7. Open the Control Panel window, and then double-click the Network icon. 8. In the Network dialog box, click the Protocols tab. 9. In the Protocols tab, select TCP/IP, and then click <Properties> button. 10. In the Microsoft TCP/IP Properties dialog box, click the radio button labeled Obtain an IP address from a DHCP server. 11. Click <OK> button twice to confirm and save your changes, and then close the Control Panel.
Assigning static IP addresses to your PCs
In some cases, you may want to assign IP addresses to some or all of your PCs directly (often called statically), rather than allowing the RX3141 to assign them. This option may be desirable (but not required) if: You have obtained one or more public IP addresses that you want to always associate with specific computers (for example, if you are using a computer as a public web server). You maintain different subnets on your LAN. However, during the first time configuration of your RX3141, you must assign an IP address in the 192.168.1.0 network for your PC, say 192.168.1.2, in order to establish connection between the RX3141 and your PC as the default LAN IP on RX3141 is pre-configured as 192.168.1.1. Enter 255.255.255.0 for the subnet mask and 192.168.1.1 for the default gateway. These settings may be changed later to reflect your true network environment. On each PC to which you want to assign static information, follow the instructions on pages 13 through 15 relating only to checking for and/or installing the IP protocol. Once it is installed, continue to follow the instructions for displaying each of the Internet Protocol (TCP/IP) properties. Instead of enabling dynamic assignment of the IP addresses for the computer, DNS server, and default gateway, click the radio buttons that enable you to enter the information manually. Your PCs must have IP addresses that place them in the same subnet as the RX3141s LAN port. If you manually assign IP information to all your LAN PCs, you can follow the instructions in the section 5.1.1 to change the LAN port IP address accordingly.
Figure 5.9. WAN Outbound ACL Rule Settings for PPPoE Multi-session Example
Figure 5.10. WAN Default Outbound ACL Rule for PPPoE Multi-session Example
Some of the ADSL service providers may offer PPPoE unnumbered service. Choose this connection mode if your ISP provides such service.
Figure 5.11. WAN PPPoE Unnumbered Configuration
WAN PPPoE Unnumbered Configuration Parameters
Table 5.3 describes the configuration parameters available for PPPoE unnumbered connection mode. Table 5.3. WAN PPPoE Unnumbered Configuration Parameters
Setting Connection Mode Description
Select PPPoE Unnumbered from the connection mode drop-down list. Traditionally, each network interface must have a unique IP address. However, an unnumbered interface does not have to have a unique IP address. This means that when this option is selected, the WAN and the LAN use the same IP address. Network resources are therefore conserved because fewer network IP addresses are used and routing table is smaller. Check or uncheck this box to enable NAPT for this connection. Check Enable or Disable radio button to enable/disable this option. Enter the inactivity timeout period at which you want to disconnect the Internet connection when there is no traffic. A value of 0 means no activity time out. Note that SNTP service may interfere with this function if there are activities from the service. Enter a static IP address here for the PPPoE unnumbered connection. This IP address must be provided by your service provider. Enter the network address provided by your ISP. Enter the subnet mask provided by your ISP. Enter the username and password you use to log into your ISP. (Note: this is different from the information you used to log into Configuration Manager.) Enter the service name provided by your ISP. Service name is optional but may be required by some ISPs. On: PPPoE unnumbered connection is active. Off: No PPPoE unnumbered connection is inactive. Connecting: RX3141 is trying to connect to your ISP using PPPoE unnumbered connection mode. Click the Disconnect or Connect button to disconnect or connect to your service provider using the PPPoE unnumbered connection mode.
Enable NAPT Connect on Demand Disconnect after Idle (min)
IP Address Unnumbered network address Unnumbered netmask User Name and Password Service Name Status
Configuring PPPoE Unnumbered for WAN
Follow the instructions below to configure PPPoE unnumbered settings: 1. Open the Router Connection configuration page by double clicking the Router Setup Connection menu. 2. Select PPPoE Unnumbered from the WAN Connection Mode drop-down list as shown in Figure 5.11. 3. Enter user name and password provided by your ISP. 4. (Optional) Enter the service name if required by your ISP. 5. Enter appropriate connection settings for Disconnect after Idle (min) and Connect on Demand. 6. Click to save the settings.
Dynamic IP is most often used by the cable modem service providers.
Figure 5.12. WAN Dynamic IP (DHCP client) Configuration
Configuring Dynamic IP for WAN
Follow the instructions below to configure dynamic IP settings: 1. Open the Router Connection configuration page by double clicking the Router Setup
2. Select Dynamic from the Connection Mode drop-down list as shown in Figure 5.12. Note that the IP addresses for the primary and/or the secondary DNS servers are automatically assigned by the DHCP server of your ISP. 3. Click to save the settings.
Figure 5.13. WAN Static IP Configuration
WAN Static IP Configuration Parameters
Table 5.4 describes the configuration parameters available for static IP connection mode. Table 5.4. WAN Static IP Configuration Parameters
Setting Connection Mode IP Address Subnet Mask Gateway Address Primary/Secondary DNS Server Description
Select Static from the connection mode drop-down list. WAN IP address provided by your ISP. WAN subnet mask provided by your ISP. Typically, it is set as 255.255.255.0. Gateway IP address provided by your ISP. It must be in the same subnet as the WAN on the RX3141. You must at least enter the IP address of the primary DNS server. Secondary DNS server is optional
Configuring Static IP for WAN
The RX3141 supports three types of default access rules:
Default Inbound Access Rules No default inbound access rule is configured. That is, all traffic from external hosts to the internal hosts is denied. Default Outbound Access Rules The default outbound access rule allows all the traffic originated from your LAN to be forwarded to the external network using NAT. Default Self Access Rules The default self access rules allow http, ping, DNS, DHCP access to the RX3141 router from the LAN.
It is not necessary to remove the default ACL rule from the ACL rule table! It is better to create higher priority ACL rules to override the default rule.
Router Security Settings
Basic Router Security Configuration Parameters
Table 9.1. Basic Router Security Configuration Parameters
Table 9.1 describes the configuration parameters available for basic router security configuration.
Field Firewall NAT Log Port Probing Stealth Mode
Check or uncheck this box to enable or disable firewall. Check or uncheck this box to enable or disable NAT. Connection attempt to closed ports will be logged if this option is enabled. If enabled, RX3141 will not respond to remote peers attempt to connect to the closed TCP/UDP ports.
To configure firewall basic settings, follow the instructions below: 1. Open the Router Security configuration page as shown in Figure 9.1 by double clicking on Router Setup Security menu. 2. Check or uncheck individual check box for each security option. 3. Click to save the settings.
The RX3141 has an Attack Defense Engine that protects internal networks from Denial of Service (DoS) attacks such as IP spoofing, LAND, Ping of Death, smurf and all re-assembly attacks. It can drop ICMP redirects and IP loose/strict source routing packets. For example, a security device with the RX3141 Firewall provides protection from WinNuke, a widely used program to remotely crash unprotected Windows systems. For a complete list of DoS protection provided by the RX3141, please see Tables 2.1 and 9.2.
DoS Protection Configuration Parameters
Table 9.2 provides explanation for each type of DoS attacks. You may check or uncheck the check box to enable or disable the protection or detection for each type DoS attacks. Table 9.2. DoS Attack Definition
Field IP Source Route IP Spoofing Description
Intruder uses "source routing" in order to break into the target system. Spoofing is the creation of TCP/IP packets using somebody elses IP address. IP spoofing is an integral part of many network attacks that do not need to see responses. Attacker sends out packets to the system with the same source and destination IP address being that of the target system and causes the target system trying to resolve an infinite series of connections to itself. This can cause the target system to slow down drastically. An attacker sends out larger than 64KB packets to cause certain operating system to crash. An attacker issues ICMP echo requests to some broadcast addresses. Each datagram has a spoofed IP source address to be that of a real target-host. Most of the addressed hosts will respond with an ICMP echo reply, but not to the real initiating host, instead all replies carry the IP address of the previously spoofed host as their current destination and cause the victim host or network to slow down drastically. Check or un-check this option to enable or disable the logging for SYN/ICMP/UDP flooding attacks. These attacks involve sending lots of TCP SYN/ICMP/UDP to a host in a very short period of time. RX3141 will not drop the flooding packets to avoid affecting the normal traffic. A hacker may be scanning your system by sending these specially formatted packets to see what services are available. Sometimes this is done in preparation for a future attack, or sometimes it is done to see if your system might have a service, which is susceptible to attack. XMAS scan: A TCP packet has been seen with a sequence number of zero and the FIN, URG, and PUSH bits are all set. NULL scan: A TCP packet has been seen with a sequence number of zero and all control bits are set to zero. FIN scan: A hacker is scanning the target system using a "stealth" method. The goal of the hacker is to find out if they can connect to the system without really connecting using the FIN scanning. It attempts to close a non-existent connection on the server. Either way, it is an error, but systems sometimes respond with different error results depending upon whether the desired service is available or not. In the teardrop attack, the attacker's IP puts a confusing offset value in the second or later fragment. If the receiving operating system does not have a plan for this situation, it can cause the system to crash. Check or un-check this option to enable or disable protection against Winnuke attacks. Some older versions of the Microsoft Windows OS are vulnerable to this attack. If the computers in the LAN are not updated with recent versions/patches, you are advised to enable this protection by checking this check box.
Ping of Death Smurf
TCP XMAS/NULL/FI N Scan
Configuring DoS Settings
To configure DoS settings, follow the instructions below: 1. Open the Router Security configuration page as shown in Figure 9.1 by double clicking on Router Setup Security menu. 2. Check or uncheck individual check box for each type DoS attack. 3. Click to save the settings.
Figure 9.1. Router Security Configuration Page
ACL Rule Configuration Parameters
Table 9.3. ACL Rule Configuration Parameters
Table 9.3 describes the configuration parameters firewall inbound, outbound and self-access ACL rules.
Add New Rule Number
Click on this option to add a new ACL rule. Select a rule from the drop-down list, to modify its settings.
Mave This option allows you to set a priority for this rule. The RX3141 Firewall acts on packets based on the priority of the rules. Set a priority by specifying a number for its position in the list of rules:
1 (First) Other numbers
This number marks the highest priority. Select other numbers to indicate the priority you wish to assign to the rule.
Select this button to configure the rule as an allow rule. This rule when bound to the Firewall will allow matching packets to pass through. Select this button to configure the rule as a deny rule. This rule when bound to the Firewall will not allow matching packets to pass through.
Route to (only for outbound ACL) This field is used for policy routing needed for PPPoE unnumbered or PPPoE multi-session. Available options include AUTO, ppp0 (unnumbered), ppp1 (1st PPPoE session), ppp2 (2nd PPPoE session). These options are selectable from the drop-down list. If AUTO is selected, the router will route the packets based on the information in the routing table. Log Select or deselect the check box to enable or disable logging for this ACL rule. Protocol This option allows you to select protocol type from a drop-down list. Available settings are All, TCP, UDP, ICMP, IGMP, AH and ESP. Source IP This option allows you to set the source network to which this rule should apply. Use the drop-down list to select one of the following options:
This option allows you to apply this rule to all the computers in the source network, such as those on the Internet for the inbound traffic or all the computers in the local network for outbound traffic. This option allows you to specify an IP address on which this rule will be applied. Specify the appropriate network address
IP Address IP Address
This option allows you to include all the computers that are connected in an IP subnet. When this option is selected, the following fields become available for entry: Address Mask Enter the appropriate IP address. Enter the corresponding subnet mask. Indicates the router itself.
Self (for self access rule only)
Destination IP This option allows you to set the destination network to which this rule should apply. Use the dropdown list to select one of the following options:
This option allows you to apply this rule to all the computers in the local network for inbound traffic or any computer in the Internet for outbound traffic. Select any of these options and enter details as described in the Source IP section above. Indicates the router itself. In order for this option to work, users PC must use RX3141 as its DNS server. The domain name variable / IP addresses association is cleared after every system restart. Multiple ACL rules can be associated to the same domain name / IP addresses association. Maximum of 30 domain name variables is supported. Each domain name variable / IP addresses association is updated only when the LAN client issues the DNS query to RX3141. For example, when entering the address http://www yahoo.com on your browser, RX3141 will update the IP address association w/ www.yahoo.com in the internal database referenced by the firewall. Each domain name variable can be associated up to 256 IP addresses. Wild card character * is allowed in the domain name Its usage is illurstrated in the following examples: 1. www.google.* : match www.google.com and ww.google.net and does not match www.google.com.tw 2. www.google.*.*: match www.google.com.tw, and www.google.com.sg and does not match www.google.com 3.com.tw : match www.google.com.tw, www.com.tw and does not match com.tw 4. *.com : match google.com and abc.com and does not match www.google.com, com 5. *: match any domain name 6. (a single dot): match any domain name
IP Address, Subnet Self (for self access rule only) Domain
Source Port This option allows you to set the source port to which this rule should apply. Use the drop-down list to select one of the following options:
Select this option if you want this rule to apply to all applications with an
arbitrary source port number. Single Port Number Range This option allows you to apply this rule to an application with a specific source port number. Enter the source port number Select this option if you want this rule to apply to applications with this port range. The following fields become available for entry when this option is selected. Start Port End Port Enter the starting port number of the range Enter the ending port number of the range
Figure 9.6. Outbound ACL Configuration Example
Figure 9.7. Sample Outbound ACL List Table
Modify Outbound ACL Rules
To modify an outbound ACL rule, follow the instructions below: 1. Open the Outbound ACL Rule configuration page, as shown in Figure 9.5, by double clicking the Router Setup Outbound ACL menu.
2. Click on the icon of the rule to be modified in the outbound ACL table or select the rule number from the ID drop-down list. 3. Make desired changes to any or all of the following fields: action, source/destination IP, source/destination port, protocol, ICMP message type and log. Please see Table 9.3 for explanation of these fields. 4. Click on the button to modify this ACL rule. The new settings for this ACL rule will then be displayed in the outbound access control list table at the bottom half of the Outbound ACL Configuration page.
Delete Outbound ACL Rules
To delete an outbound ACL rule, just open the Outbound ACL Rule configuration page by double clicking the Router Setup Outbound ACL menu and then click on the in front of the rule to be deleted:
Display Outbound ACL Rules
Open the Outbound ACL Rule configuration page by double clicking the Router Setup menu.
Configuring Self-Access ACL Rules (Router Setup
Self-Access rules control access to/from the RX3141 itself. You may use Self-Access Rule Configuration page, as illustrated in Figure 9.8, to: Add a Self-Access rule Modify an existing Self-Access rule Delete an existing Self-Access rule View existing Self-Access rules
Figure 9.8. Self-Access ACL Configuration Page
Add a Self-Access Rule
To add a Self-Access rule, follow the instructions below: 1. Open the Self-Access Rule configuration page, as shown in Figure 9.8, by double clicking the Router Setup Self Access ACL menu. 2. Select Add New from the ID drop-down list. 3. Set desired action (Allow or Deny) from the Action drop-down list. 4. Assign a priority for this rule by selecting a number from the Move to drop-down list. Note that the number indicates the priority of the rule with 1 being the highest. Higher priority rules will be examined prior to the lower priority rules by the firewall. 5. Make desired changes to any or all of the following fields: source/destination IP, source/destination port, protocol, ICMP message type and log. Please see Table 9.3 for explanation of these fields. 6. Click on the button to create the new Self-Access rule. The new rule will then be displayed in the Existing Self-Access ACL list table at the bottom half of the Self-Access ACL configuration page.
10.2 Configure Virtual Server
Virtual server allows you to configure up to ten public servers, such as a Web, E-mail, FTP server and etc. accessible by external users of the Internet. Each service is provided by a dedicated server configured with a fixed IP Address. Although the internal service addresses are not directly accessible to the external users, the router is able to identify the service requested by the service port number and redirects the request to the appropriate internal server. RX3141 supports only one server of any particular type at a time.
10.2.1 Virtual Server Configuration Parameters
Table 10.1 describes the configuration parameters available for virtual server configuration.
Table 10.1. Virtual Server Configuration Parameters
Setting Enable Description
Select an application from the list of pre-configured applications. The corresponding protocol and the redirect port range will be automatically selected. Select Manual Setting if you want to configure the settings yourself. To activate the policy, make sure the check box is checked. For a list of pre-configured applications, please refer to Table 10.2.
This option allows you to select protocol type from a drop-down list. Available settings are All, TCP, UDP, TCP/UDP, and ESP.
Protocol Redirect Port Range To IP Address
Enter the desired port numbers. Enter the server IP address.
Table 10.2. Port Numbers for Popular Applications
Application AOE II(Server) AUTH Baldurs Gate II Battle Isle Counter Strike Cu See Me Diablo II DNS FTP FTP GOPHER HTTP HTTP8080 HTTPS I-phone 5.0 ISAKMP mIrc MSN Messenger Need for Speed 5 Netmeeting Audio Netmeeting Call Netmeeting Conference Netmeeting File Transfer Service Port Numbers
2300-2300-2400 3004-3004 27005-27015 7648-7648, 56800,24032 4000-4000 UDP 53-53 TCP 21-21 TCP 20(ALG)-21 TCP 70-70 TCP 80-80 TCP 8080-8080 TCP 443-443 TCP/UDP 22555-22555 UDP 500-500 6601-ALG 9400-9400 TCP 1731-1731 TCP 1720-1720 UDP 49500-49700 TCP 1503-1503
Application Netmeeting or VOIP NEWS PC Anywhere PC Anywhere POP3 Powwow Chat Red Alert II SMTP Sudden Strike TELNET Win VNC
Service Port Numbers
1503-1503, 1720 (ALG) TCP 119-119 TCP: 5631 TCP: 5631, UDP: 5632 TCP 110-110 13223-13223 1234-1237 TCP 25-25 2300-2400 TCP 23-23 UDP 5800-5900
10.2.2 Virtual Server Example
Following describes the procedure to setup a FTP server: 1. Open the Virtual Server configuration page, as shown in Figure 10.3, by double clicking the Advanced Virtual Server menu. 2. Select FTP from the Enable drop-down list and the check the check box to activate this policy. Note that the protocol and the redirect port range are automatically selected. 3. Enter the IP address of the FTP server. Note that this IP address is a private IP address. 4. Click to save the settings.
Figure 10.3. Virtual Server Example
5. For security concerns, the RX3141 denies all the access requests from the external users unless a proper inbound ACL rule is setup for each virtual server to allow external users to access the internal servers set up in the Virtual Server configuration page. For example, if you want to allow any one in the external network to access the FTP server, define an inbound ACL rule as configured in Figure 10.4. Note that the destination IP address is the IP address entered in the To IP Address and the destination port is the port numbers entered in the Redirect Port Range in the Virtual Server configuration page. If you want to restrict access to the FTP server from particular IP addresses, change the settings for the source IP in the inbound ACL rule. For example, if source IP in the inbound ACL rule is configured as 220.127.116.11, the RX3141 will deny all the external access to the FTP server except those from this particular IP address. For detail information about configuring an inbound ACL rule, please refer to the section 9.4 Configuring Inbound ACL Rules.
Figure 11.1. System Administration Configuration Page
System Administration configuration page, as shown in Figure 11.1, allows you to change login password and other global settings for RX3141. Follow the steps below to change password and/or system-wide settings: 1. Open the System Administration configuration page, as shown in Figure 11.1, by double clicking the Router Setup Administration menu. 2. Changing login password a) Type the new password in the New Password text field and again in the Confirm Password text field. The password can be up to 16 characters long. When logging in, you must type the new password in the same upper and lower case characters that you enter here. 3. Clone the MAC address for WAN a) If you had previously registered a specific MAC address with your ISP for Internet access, enter the registered MAC address here; otherwise, keep the default setting the factory assigned MAC address for the WAN port. 4. Auto logout after idle (min): Click Enable radio button and enter in-activity time out period to enable this option; otherwise, click on the Disable radio button, or enter 0 in the text field to diable this option. When this option is enabled, you will be automatically disconnected from the router when the idle timer expires during system configuration via your browser. Youll have to log into the RX3141 again if you want to continue system configuration. 5. Enable UPnP service: check or uncheck the check box to enable or disable UpnP service. 6. Enable DNS Proxy: Check or uncheck the check box to enable or disable DNS proxy service. 7. Allow Administration from Interface: check or uncheck the check box to enable or disable remote management via WAN port. 8. Allow Ping Interface: You may check the LAN and/or WAN check box to allow ping to the RX3141 from the LAN or WAN interface. It is recommended that you enable this option for the LAN only. 9. Click on button to save the settings.
11.2 Viewing System Information
System Information page displays whenever you log into RX3141. It contains information for the overall system settings.
Figure 11.2. System Status Page
11.3 Setup Date and Time
RX3141 keeps a record of the current date and time, which it uses to calculate and report various data. However, there is no real time clock inside RX3141; RX3141 relies on external time servers to maintain correct time. RX3141 allows you to configure up to three external time servers. Make sure that the Enable check box is checked to activate the SNTP (Simple Network Time Protocol) service for time keeping. Changing the date and time on RX3141 does not affect the date and time on your PCs.
Figure 11.3. Date and Time Configuration Page The maintain accurate time for the router: 1. Open the Date and Time configuration page, as shown in,Figure 11.3 by double clicking the Router Setup Timezone menu. 2. Select your time zone from the drop-down list. 3. Check the Enable check box to activate the SNTP (Simple Network Time Protocol) service. 4. Enter IP addresses for the SNTP servers that will be used to update the system time. 5. Click on button to save the settings.
You can manually enter the correct time, however the time will be reset to the default time, 1/1/2000 00:00:00, after system is rebooted or powered off.
11.3.1 View the System Date and Time
To view the updated system date and time, log into Configuration Manager, click the Router Setup Timezone menu. Note that the system will go back to the default time, 1/1/2000 00:00:00, if SNTP service is not enabled or none of the configured SNTP servers are not accessible after system is rebooted or powered off.
11.4 Reset to Factory Default Settings
11.4.1 Reset to Factory Default Settings using GUI
At times, you may want to revert to the factory default settings to eliminate problems resulted from incorrect system configuration. Follow the steps below to reset system configuration: 1. Log into Configuration Manager by double clicking the Management Factory Reset menu. The Default Settings Configuration page displays, as shown in Figure 11.4.
Figure 11.4. Factory Reset Page 2. Click on button to set the system configuration back to factory default.
3. A dialog window as shown in Figure 11.5 will pop up to ask for confirmation. Click on the button to proceed; otherwise, click on the 4. button to cancel the action.
Figure 11.5. Factory Reset Confirmation
5. RX3141 will then reboot thereafter to make the factory default configuration in effect. Note a count down timer such as the one shown in Figure 11.6 will display to indicate when the reboot process will be completed.
Figure 11.6. Factory Reset Count Down Timer
11.4.2 Reset to Factory Default Settings using the Reset Button
Sometimes, you may find that you have no way to access the RX3141, e.g. you forget your password or the IP address of RX3141. The only way out in this scenario is to reset the system configuration to the factory default by pressing the reset button (located on the rear panel the router) for at least 5 seconds. The system configuration will be reverted back to the factory default settings after RX3141 is rebooted.
11.5 Firmware Upgrade
ASUSTeK may from time to time provide you with an update to the firmware running on the RX3141. All system software is contained in a single file, called an image. Configuration Manager provides an easy way to upload the new firmware image. To upgrade the image, follow this procedure: 1. Open the Firmware Upgrade page, as shown in Figure 11.7, by double clicking the Management Firmware Upgrade menu.
Figure 11.7. Firmware Upgrade Page
2. In the Firmware text box, enter the path and name of the firmware image file. Alternatively, you may click on button to open a file manager to search for the firmware image on your computer.
Figure 11.8. File Manager 3. Click on button to update the firmware. A dialog window, such as the one below, button to
will pop up to ask for confirmation of the firmware upgrade. Click the proceed; otherwise, click the button to cancel the action.
Figure 11.9. Firmware Upgrade Confirmation 4. Firmware upgrade status and progress will be shown as illustrated in.
Figure 11.10. Firmware Upgrade Status
5. A count down timer will display, as shown in Figure 11.11, after the firmware upgrade is completed. Youll be reconnected back to RX3141 when the counter returns to zero. You may need to manually connect back to the RX3141 if you are not connected back to RX3141 automatically.
Figure 11.11. Firmware Upgrade Count Down Timer 6. When you are reconnected to the RX3141, click Status menu to check if the new firmware is properly upgraded. Note that you probably need to clear the cache of your web browser to see the new System Information page. Following is the procedure to clear the browser cache for Microsoft Internet Explorer: a) Click on Tools menu b) Click on Internet Options menu c) Click on Delete Files button to clear the browser cache.
Changes to Configuration Manager are not being retained.
Be sure to click on
button to save any changes.
13.1 Diagnosing Problem using IP Utilities
Ping is a command you can use to check whether your PC can recognize other computers on your network and the Internet. A ping command sends a message to the computer you specify. If the computer receives the message, it sends messages in reply. To use it, you must know the IP address of the computer with which you are trying to communicate. On Windows-based computers, you can execute a ping command from the Start menu. Click the Start button, and then click Run. In the Open text box, type a statement such as the following:
Click site, if known.
. You can substitute any private IP address on your LAN or a public IP address for an Internet
If the target computer receives the message, a Command Prompt window displays like that shown in Figure 13.1.
Figure 13.1. Using the ping Utility If the target computer cannot be located, you will receive the message Request timed out. Using the ping command, you can test whether the path to the RX3141 is working (using the preconfigured default LAN IP address 192.168.1.1) or another address you assigned. You can also test whether access to the Internet is working by typing an external address, such as that for www.yahoo.com (18.104.22.168). If you do not know the IP address of a particular Internet location, you can use the nslookup command, as explained in the following section. From most other IP-enabled operating systems, you can execute the same command at a command prompt or through a system administration utility.
You can use the nslookup command to determine the IP address associated with an Internet site name. You specify the common name, and the nslookup command looks up the name on your DNS server (usually located with your ISP). If that name is not an entry in your ISPs DNS table, the request is then referred to another higher-level server, and so on, until the entry is found. The server then returns the associated IP address. On Windows-based computers, you can execute the nslookup command from the Start menu. Click the Start button, and then click Run. In the Open text box, type the following:
Click. A Command Prompt window displays with a bracket prompt (>). At the prompt, type the name of the Internet address you are interested in, such as www.absnews.com. The window will display the associate IP address, if known, as shown in Figure 13.2.
Figure 13.2. Using the nslookup Utility There may be several addresses associated with an Internet name. This is common for web sites that receive heavy traffic; they use multiple, redundant servers to carry the same information. To exit from the nslookup utility, type exit and press <Enter> at the command prompt.
Model 150X Excursion-2002 Berlingo DCR-TRV14E Deere 4100 MF6580 FWD-S47h1 Nikkormat FT2 90093 MW112 BD300 RAR681 HL-EL210 M220C Toshiba XV50 Zoom-nikkor Caddx NX8 UFD 540 MS-570MS TC4400 Sports AW1600 SC-55ST HMC024KD1 XR-1853MK2 S3400 MS1415 F44060VIL Meter IVF KX-FC258PD WG102 Soloist Prego DA5 S1003J Review Suzuki SX4 850 RS VGN-NS21m P Accent IC-245E DV8821P AW2147S ZDF501 WT-2000R X-plus GA9020S ESC5061W JBL PB10 WX-GT77UI 5140I KV-S6045W Asko 1595 PRO HS 21PT4426 WB5000 NW-E505 Microtower PC MFC-3240C Navidrive Dopod 577W AEG-electrolux 60 Studioworks 441 GS116 M-audio 49E CCD-TRV87E WF8804RP 32LG20 Folio 4 DSP-AZ1 W-130 SD-260E Magicolor 2300 PE8036-60-M DA3525 GMX112 KDL-46W2000 Octane MP360 Tracker 1999 Roland HD-1 MPK-WEB ZVC190C MHC-GX470 2700N XRS 989 AW1067F S1000 YSP-800 AR-810 KD-G631 Speed PRO Motorola H550 BJC-4400 535 EB FR-X9A MDS-S707 Panasonic GD87 CVP-98-CVP-96-cvp-600 SMX-F30 LP Monitor RM-VL900T
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101