Friday, 13 February 2015

Top 10 Internet tips and tricks

You don't need the http:// portion of a web page

When entering an Internet address you do not need to type http:// or even www. in the address. For example, if you wanted to visit google you could just type  google.com and press enter. To make things even quicker, if you are visiting a .com address you can typegoogle and then press Ctrl + Enter to type out the full http://www.google.com address.

Quickly move between the fields of a web page

If you are filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, in the example form below you can click in the "First Name" field type anything and press tab to switch to the next field.


  •  Tip: This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and allows you to press the space bar or enter to push the button.
  • Tip: With a drop-down box that lists dozens of options you can press the first letter to scroll down to that letter. For example, click the drop down box below and then press "u" to quickly scroll to Utah.

Know your Internet browser shortcuts

There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.
  • Press Alt + D to move the cursor into the address bar.
  • Hold down the Ctrl key and press the + or - to increase and decrease the size of text. Ctrl + 0 will reset the text.
  • Press the backspace key or press Alt key + left arrow to go back a page.
  • Press F5 to refresh or reload a web page.
  • Press F11 to make the Internet browser screen full screen. Press F11 again to return to the normal view.
  • Press Ctrl + B to open your Internet bookmarks.
  • Press Ctrl + F to open the find box to search for text within the web page you are reading.

My laptop mouse touchpad is not working

When the touchpad stops working, there are a few things you can do to try and fix it or work around the issue.
Tip: Since some of the settings do require you to navigate the mouse cursor for troubleshooting purposes use the Trackpoint, PS/2, or USB mouse a temporary fix. If you cannot get the mouse to work see our navigating Windows with the keyboard page for tips on how to use the keyboard to navigate in Windows.

Other USB device

Some USB and PS/2 devices, especially any USB input device (including a computer mouse), can disable the touchpad. As a troubleshooting step, turn off the computer, disconnect all USB devices, then start the computer again to make sure no other device is disabling the touchpad. If this fixes your problem, but the touchpad is disabled again, the next time you connect the device, check your touchpad software settings for a setting that can prevent this from happening.

Check mouse settings

First, in the Windows Control Panel, access the mouse settings and verify the touchpad is enabled. Also, you can adjust the sensitivity of the touchpad to work best for your fingers. Check these settings to make sure something was not disabled or adjusted to cause the touchpad to not work.

Check Device Manager

Second, open the Device Manager and check through the device list and find the touchpad. Check to see that it is enabled. If disabled, re-enable it and test the touchpad. If it is already enabled, change it to disabled, then re-enable it again. Sometimes toggling this setting can kick-start the touchpad into working again.
If there are any yellow exclamation marks, red X's or "Other devices" in Device Manager, any of these errors can indicate there is a problem with hardware in your computer that may be causing the touchpad problems.
  • Identifying problems in Windows Device Manager.

Check CMOS (BIOS) setup

Make sure the touchpad has not been disabled in the CMOS (BIOS) setup. In the setup, check the hardware device settings and see if the touchpad is enabled or disabled. If disabled, re-enable it, restart the laptop, and test the touchpad.
  • How to enter the BIOS or CMOS setup.

Software driver issues

If the above options do not fix the problem, the software driver for the touchpad may be corrupted or not updated enough to work correctly. Visit the laptop manufacturer's website and download the most current touchpad driver for your specific laptop model. Install the driver, restart the laptop, and test the touchpad to see if it works.

Hardware defect

Lastly, if the touchpad still is not working correctly or at all, you may need to take it to a computer repair shop and have it fixed. It could require replacement of the touchpad itself or another component in the laptop. If you cannot repair the touchpad, connect and use an external mouse as a workaround.

Wednesday, 11 February 2015

How do I password protect my files and folders in Windows?

Tip: Before password protecting any document, you may want to create a backup of the non-password protected files and folder in case you forget the password in the future.
The majority of Microsoft Windows operating systems do not come with a method of password protecting your sensitive files and folders. If you're using Microsoft Windows 3.x, Windows 95, or Windows 98, you need to download or purchase a third-party program to password protect your files and folders in Windows; skip down to the other security solutions section if you're using one of these operating systems.
Microsoft Windows XP professional users
Microsoft Windows XP home users
Microsoft Windows Vista/7/8 users
Other security solutions for protecting your files and folders in Windows
Things to remember when encrypting or password protecting files and folders

Microsoft Windows XP professional users

The steps below for encrypting the files on Windows XP Professional applies to users who are using a computer that has different accounts. If you are using a single account, see the other security solutions section.
  1. Select the file or folder you want to encrypt.
  2. Right-click the file or folder and click Properties.
  3. Click the Advanced button.
  4. Check "Encrypt contents to secure data" option.
  5. Click Apply and then Ok.
Encrypt contents to secure data is grayed out
This will be grayed out if you're using the home edition of Microsoft Windows XP. See the steps below for securing the contents of your folders in Windows XP home.
Show "Encrypt" on the context menu
The newest version of TweakUI also enables you to show the Encrypt option in the context menu. To do this, follow the steps below.
  1. Open TweakUI.
  2. In the TweakUI window, select Explorer
  3. In the right side of the window under Settings, locate Show 'Encrypt' on context menu and check the box. This option should be below Prefix 'shortcut to' on new shortcuts and above Show 'View workgroup computers' in NetPlaces.
  • I'm missing Show "Encrypt" on the context menu in TweakUI.

Microsoft Windows XP home users

  1. Select the file or folder you want to encrypt.
  2. Right-click the file or folder and click Properties.
  3. Click the Sharing tab.
  4. Check the box Make this folder private
  5. Click Apply and then Ok.
Make this folder private is grayed out
In order for this option to work in Microsoft Windows XP home you must meet the below requirements.
  1. The hard drive must be formatted in NTFS and not FAT32 File System.
  2. The folder you're attempting to encrypt must be in your own personal folder. For example, if your name is bob, you must be encrypting a folder that is or that is contained within the below folder:

    C:\Documents and Settings\Bob\

    You cannot encrypt any folders outside of this folder. If you want to encrypt outside this folder, see the below other security solutions.

Microsoft Windows Vista/7/8 users

Unfortunately, Windows Vista, Windows 7, and Windows 8 do not provide any features for password protecting files or folders. You need to use a third-party software program to accomplish this.
If you want to encrypt a file or folder, this can be done by following these steps:
  1. Select the file or folder you want to encrypt.
  2. Right-click the file or folder and click Properties.
  3. Click the Advanced button.
  4. Check "Encrypt contents to secure data" option.
  5. Click Apply and then Ok.

Other security solutions for protecting your files and folders in Windows

File and folders not frequently used
If you need to password protect files or folders that you do not frequently use, one of the simplest ways is to compress the folder and files with a compression utility and password protect the compressed file. However, each time you want to work with or modify the files, you need to uncompress the files using the password.
Windows ME and Windows XP users - Windows ME and Windows XP come with their own compression utility. This utility can also be used to compress and password protect files.
Windows Vista and Windows 7 users - Windows Vista and Windows 7 also include a compression utility. However, password protection for the compressed files is not possible without the use of a third-party software program.
Tip: When a file is compressed, users can still view a listing of the files in the compressed file. If you want both your file names and the contents to be hidden, move all the files into a single folder and password protect that folder.  
File and folders frequently used or accessed
If you need to password protect or encrypt data you frequently use, you need to install a third-party program that allows you to protect your files and folders. Below are some free and commercial solutions.
  • 7-Zip - A free file and folder zipping utility, which also includes the ability to password protect zipped files and folders.
  • AxCrypt - An excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed unless a passphrase (password) is known.
  • Folder Guard - A commercial version of a password protection software that enables you to password protect files, folders, and other Windows resources.
  • Protected Folder- For a small fee, it's an excellent software program that enables you to password protect folders.

Things to remember when encrypting or password protecting files and folders

  1. There is no such thing as a 100% protected file. There are numerous tools, utilities, and instructions for how to break encryption and passwords on files. However, the protection methods listed above will protect your files from the majority of users who may encounter them. If you are working with really sensitive data, we suggest a commercial product for protecting your files and data.
  2. Even though a file or folder may be password protected, it still can be deleted (unless the program supports the ability to protect files from being deleted). Always remember to backup all your files, even those protected by passwords.
  3. If you forget the password, unless you're willing to spend the time attempting to break it or pay someone else to break the password, all the data in the file or folder will be lost. Thus, it is important to backup a copy of the non-password protected files or folders, just in case.

Microsoft DOS debug command


About debug

Debug is a method of looking at portions of your computer and writing assembly code to perform certain tasks on your computer.
MS-DOS 2.x - 4.x uses debug.com
MS-DOS 5.x and above uses debug.exe

Availability

The debug command is an external command and is available in the below Microsoft operating systems.
All Versions of MS-DOS
Windows 95
Windows 98
Windows ME
Windows NT
Windows 2000
Windows XP

Syntax

DEBUG [[drive:][path]filename [testfile-parameters]]
[drive:][path]filename Specifies the file you want to test.
testfile-parameters Specifies command-line information required by the file you want to test.
After Debug starts, type ? to display a list of debugging commands.
To get out of Debug you need to "Q" and enter
To execute the Debug routine you need to do "G" and enter

Examples

debug       <press enter>
-D40:00    <TypeD40:00, and press enter>
Information about your computer ports is displayed.
-Q             <Type Q, and press enter>

OS INSTALLATION

Step-by-Step Guide to Remote OS Installation

One of the most challenging and costly functions performed by IT staff today is deploying a new operating system to client computers on a network. The Windows® 2000 operating system Remote OS Installation feature was created to meet this need to deploy an operating system throughout an enterprise network without having to physically attend to each client computer. The Remote Installation Services (RIS) takes advantage of the new Dynamic Host Configuration Protocol (DHCP)-based remote boot technology to assist IT staff with deploying Windows 2000 Professional remotely—reducing and, in some cases, eliminating the need to visit the desktop. This document outlines the steps necessary to install, configure, and use RIS.

Introduction

Remote Installation Services (RIS) ships as part of the Windows® 2000 Server operating system. This document outlines the steps necessary to install, configure, and use RIS.
RIS was designed to reduce the costs incurred by pre-installing or physically visiting each client computer to install the operating system (OS). By combining RIS with other Windows 2000 IntelliMirror™ management technologies features—User Data Management, Software Installation and Maintenance, and User Settings Management—companies benefit from better disaster recovery with easier OS and application management.

Prerequisites

See Appendix A below to ensure that both your server and client hardware meet the remote installation hardware requirements.
The drive on the server where you choose to install RIS must be formatted with the NTFS file system. RIS requires a significant amount of disk space and cannot be installed on the same drive or partition on which Windows 2000 Server is installed. Ensure that the chosen drive contains enough free disk space for at least one full Windows 2000 Professional compact disc—a minimum of approximately 800 megabytes (MB)–1 gigabyte (GB).
RIS requires several other services that also ship as part of Windows 2000 Server. These services can be installed on individual servers, or all on a single server, depending on your network design:
  • Domain Name Service (DNS) Server. Remote installation relies on DNS for locating the directory service and client machine accounts. You can use any Windows 2000 Active DirectoryTM service-compliant DNS server, or you can use the DNS server provided with Windows 2000 Server.
  • Dynamic Host Configuration Protocol (DHCP) Server. RIS requires a DHCP server to be present and active on the network. The remote boot-enabled client computers receive an IP address from the DHCP server before contacting RIS.
  • Active Directory. RIS relies on Windows 2000 Active Directory for locating existing client machines as well as existing RIS servers. RIS must be installed on a Windows 2000-based server that has access to Active Directory. This can be a domain controller or a server that is a member of a domain with access to the Active Directory.
To ensure a successful installation, you must install and configure the additional services described above in order for RIS to function. In addition, make sure that you have both the Windows 2000 Server and Professional CDs available.
Before beginning this step-by-step guide, you need to build the common infrastructure, which specifies a particular hardware and software configuration. The common infrastructure is covered in the Common Infrastructure step-by-step guide, "Part 1: Installing a Windows 2000 Server as a Domain Controller" If you are not using the common infrastructure, you need to make the appropriate changes to this instruction set.
Although not required, we also recommend reading and performing the exercises available in the Step-by-Step Guide to Understanding the Group Policy Feature Set. It addresses how Group Policy works and can be applied in the context of remote installations.

Prerequisites for Client Installations

Ensure that the client computer's network card has been set as the primary boot device within the system BIOS. When the client computer boots and is configured with the network card as the primary boot device, it requests a network service boot from the remote installation server on the network. Once contacted, the RIS server prompts users to press the F12 key to download the Client Installation wizard. Users should be instructed to press F12 only if prompted, and only if they need a new OS installation or access to maintenance and troubleshooting tools. Once the OS has been installed via RIS, the user can ignore the request to press F12 during future client computer reboots. If using the RIS boot floppy disk, simply insert the boot floppy into the drive and start the client computer. The computer boots from the floppy disk, and the user is requested to press F12 to initiate the network service boot. When the RIS boot floppy disk is used, the user must remove the boot floppy at some point after pressing F12 and before the text mode portion of setup completes.
Note: Compaq computer systems provide the ability to press the F12 key during power up on PC98 or Net PC-based systems. In this case, the user is required to press F12 on the Compaq Splash screen, and then press F12 again when prompted by the RIS server.

Installing the Windows 2000 Remote Installation Services

The following instructions help you install, configure, and use the Windows 2000 Remote Installation Services.
Install Remote Installation Services
  1. On a Windows 2000 Server, click Start, point to Settings, and click Control Panel.
  2. Double-click Add/Remote Programs.
  3. Double-click Add/Remove Windows Components.
  4. Scroll down and select Remote Installation Services and Click Next.
  5. Insert the Windows 2000 Server CD-ROM into the CD drive and click OK . The necessary files are copied to the server.
    Note: After the CD is entered, a dialog box asks if you want to upgrade to the operating system. Click No and exit this screen.
  6. Click Finish to end the wizard.
  7. You are prompted to restart your computer. Click Yes.
  8. When the server is done rebooting, logon as a local administrator.
To set up Remote Installation Services
  1. Click Start, click Run, and type RISetup.exe. This starts the Remote Installation Services (RIS) Setup wizard.
  2. The Welcome screen appears, indicating some of the requirements to successfully install RIS. Click Next.
  3. The next screen prompts you to enter the server drive and directory where you would like to install the RIS files. The default drive and directory will be the largest non-system, non-boot, NTFS-formatted drive. In our example, this would be E:\RemoteInstall. Click Next.
    Note: The drive on which you choose to install RIS must be formatted with the NTFS file system. RIS requires a significant amount of disk space and cannot be installed on the same drive or partition on which Windows 2000 Server is installed. Ensure that the chosen drive contains enough free disk space for at least one full Windows 2000 Professional compact disc —a minimum of approximately 800 MB–1GB.
    The setup wizard prompts you to either enable RIS at the end of setup, or disable the service to allow modification of specific server options before servicing client computers. These options are:
    • Respond to clients requesting service. This option controls whether this RIS server responds to client computers requesting service at the end of setup. If this option is checked, the server will respond to clients and provide them with OS installation options. If unchecked, this RIS server will not respond to clients requesting service.
    • Do not respond to unknown client computers. This option controls whether this server responds to unknown client computers requesting a remote installation server. A client computer is known if a managed computer account object exists for it within Active Directory. This allows the administrator to offer only authorized—that is, pre-staged within the Active Directory—computers the OS installation options from this RIS server. This setting also provides support for multiple Remote Boot or Install servers from different vendors on one physical network. For example, if another vendor's remote install/boot server exists on the same network as the RIS server, you cannot control which server answers the client computer's request. Setting this option and pre-staging client computers ensures that this RIS server will service only pre-staged client computers.
  4. For the purpose of this guide, select Respond to client computers requesting service and click Next.
  5. The setup wizard prompts you for the location of the Windows 2000 Professional installation files. RIS supports the remote installation of Windows 2000 Professional only. Insert the Windows 2000 Professional CD into the server's CD drive and type the drive letter containing the CD (or browse to a network share that contains the installation source files). Click Next.
  6. The wizard prompts you to enter the directory name that will contain the workstation files on the RIS server. This directory is created beneath the directory specified in Step 3 above. The directory name should reflect its contents—for example, Win2000.pro. Click Next to accept the default name of win2000.pro.
  7. You are prompted for a friendly description and help text that describes this OS image. The friendly description and help text is displayed to users or IT staff during the client installation wizard (OSChooser) at initial startup on a remote client. For example, if this workstation OS will be tailored to sales staff, then a friendly description might be "Windows 2000 Professional for Sales Staff." The help text is displayed when the user selects the description within the Client Installation wizard. Make sure you provide clear help text to your users, to ensure that they choose the correct OS option at installation time. For this exercise, click Next to accept the default name of Microsoft Windows 2000 Professional.
  8. At this point, you are presented with a summary screen indicating the choices you have made. Click Finish to confirm your choices. Once the installation wizard completes, you are ready to either service client computers, or additionally configure the RIS settings.
    Wait while the wizard installs the service and settings you have selected. This takes several minutes. When it is finished, a screen appears as in Figure 1 below:
    Figure 1: Completed RIS installation.
    Figure 1: Completed RIS installation.
  9. Click Done.
Now that RIS is successfully installed, you must authorize the RIS server within Active Directory. If you do not authorize the RIS server, it will fail to service client computers requesting a network service boot. The next section outlines these steps.

Authoring RIS within the Active Directory

RIS allows you to control which RIS servers can service client computers on the network. For a RIS server to operate, it must first be authorized within Active Directory. If the RIS server is not authorized within Active Directory, client computers requesting service will not be able to contact the RIS server and will not be answered.
To authorize a RIS server within Active Directory, you must be logged on as an enterprise administrator or a domain administrator of the root domain. You can complete the following steps on any domain controller, member server of the domain, or a Windows 2000 Professional workstation that has installed the Administrator Tools Package containing the DHCP Server Management snap-in. This guide performs the authorization on a domain controller: specifically, the domain controller that would have been created by running Part I of the Common Infrastructure step-by-step guide.
  1. Click Start, point to Programs, point to Administrative Tools and click DHCP. The following snap-in appears as in Figure 2 below:
    Bb742378.remote02(en-us,TechNet.10).gif
    Figure 2: DHCP Snap-In
  2. Right-click DHCP in the upper-left corner of the DHCP screen, and select > Manage Authorized Servers. If your server is not already listed, click Authorize, and enter the IP address of the RIS server. Click > Yes when prompted to verify that the address is correct.
At this point, your RIS server is authorized within Active Directory and is now able to respond to client computers requesting service.
Note: If you authorize the RIS server on a non-domain controller computer, follow these steps to install the Administrator Tools Package: Click Start, click Run, and type adminpak.msi on a Server system. From a Professional based system, execute adminpak.msi from the Windows 2000 Server CD.

Setting Required User Permissions

If users are allowed to use RIS to install their own client computers, the administrator must ensure that those users have been granted the correct permissions for creating machine accounts within the domain. The permissions granted using the steps below will allow users to create computer accounts anywhere in the domain.
  1. Click Start, point to Programs, point to Administrative Tools, and click Active Directory Users and Computers.
  2. Right-click the Domain Name (Reskit.com) at the top of the snap-in, and click the Delegate Control option.
  3. A wizard starts. Click Next.
  4. Click Add to add users who are allowed to install their own computers using Remote OS Installation.
  5. For the purpose of this guide, highlight Everyone and click Add. Click OK.
  6. Click Next to continue.
  7. Check the Join a Computer to the Domain option, and click Next.
  8. Click Finish. Users can now create computer account objects during the OS installation using the RIS service.
You can now either use the default RIS settings and immediately begin servicing client computers, or you can make changes to the RIS settings first. In either case, review the section titled "Prerequisites for Client Installations" above before servicing the first client computer.

Installing Client Computers Using Remote Installation

This section describes the steps required to successfully install Windows 2000 Professional on a Net PC, a Managed PC (PC 98 compliant system), or a PC that contains a network card supported by the remote installation boot floppy. To ensure a successful client installation, complete all prerequisites listed at the beginning of this document.
  1. Reboot your client machine from either the remote floppy or the PXE boot ROM. When prompted, press the F12 key to start the download of the client installation wizard.
  2. Press Enter at the welcome screen.
  3. For the user name, type Jon Grande (this user is created using the Common Infrastructure step-by-step guide discussed in the Prerequisites Section above.) Press the Tab key twice. For this instruction set, the password is left blank and the domain name should be entered as reskit.com. Press Enter to continue.
  4. You will get a warning message that all data on the client machine hard drive will be deleted. To continue, press Enter.
  5. A computer account and a global unique ID for this workstation are displayed. Press Enter to begin Setup. The Windows 2000 Setup program begins.
  6. If prompted, type the Product Key (found on the back of the Windows 2000 Professional CD case) and click > Next. (Note: This step can be avoided by specifying the product key in the .sif file; see Windows 2000 Online Help for assistance in making this change to the .sif file.)
After the installation is complete, the user is prompted to log on to the network with an existing user account, password, and logon domain.
At this point, you have successfully configured and installed a remote operating system using RIS. See below for additional information on configuration options.

Configuring Remote Installation Services

This section outlines the specific RIS configuration options that can be configured. If desired, these optional steps should be performed using the Active Directory Users and Computer snap-in on the RIS server.
Note: Although not covered in this guide, you can administer the majority of the RIS configuration settings from a Windows 2000 Professional client. To administer a RIS server from a Windows 2000 Professional client, install the Administrator Tools package AdminPak.msi that ships as part of the Windows 2000 Server CD. The Administrator Tools package can be deployed or installed from the <Windir>\System32 directory on the server.
  1. Click Start, point to Programs, point to Administrative Tools, and click Active Directory Users and Computers.
    You are presented with your Active Directory tree as in Figure 3 below:
    Bb742378.remote03(en-us,TechNet.10).gif
    Figure 3: Active Directory Users and Computers Snap-In
    There are two areas of administration concerning the configuration of the RIS server settings:
    • Remote installation server properties, which allow you to determine how this RIS server responds to client computers that request service.
    • Advanced settings, which provide additional flexibility regarding the ways in which client computers are installed.
    Locate your RIS server computer object within the Active Directory Users and Computers snap-in. Depending on the type of server, domain controller, or member server of a domain, the server's computer object can be located in the Domain Controller Active Directory container or another container specified by the administrator at install time.
  2. Click Domain Controllers in the left pane.
  3. Right-click HQ-RES-DC-01 in the right pane.
  4. Click Properties.
  5. Click the Remote Install tab. The property page appears as in Figure 4 below :
    Figure 4: RemoteInstall Options
    Figure 4: RemoteInstall Options
    The server options control how this RIS server responds to remote client computers requesting service.
  6. Click Advanced Settings on the RIS server property page.
  7. Click the down arrow next to the Generate client computer names using drop-down box as in Figure 5 below.
    Figure 5: Client under Advanced
    Figure 5: Client under Advanced
    The administrator can define the automatic computer naming policy that is used during OS installation to provide the computer with a unique name. The computer name is used to identify the client computer on the network, similar to the older NetBIOS name used in previous versions of the Windows NT® and Windows operating systems.
    This tab also allows you to define a default Active Directory container for client computer account object creation. You can group clients within a specific directory service domain or organizational unit (OU). During OS installation, Windows 2000 setup queries these settings to ensure the client computer is configured according to what the administrator has specified. These are the options:
    • Default directory service location. This option specifies that the computer account object for the client computer will be created in the default Active Directory computer accounts location. The default Active Directory location is set to the Computers container within the Active Directory. The client computer becomes a member of the same domain as the RIS server installing the client.
    • Same location as the user setting up the computer.This options pecifies that the client computer account object will be created within the same Active Directory container as the user setting up the machine. For example, if Jon logs on within the Client Installation wizard and his user account currently resides within the "Users" Active Directory container, the client computer account is created within the "Users" container in the Active Directory.
    • A specific directory service location. This option allows the administrator to set a specific Active Directory container where all client computer account objects installed from this server are created. It is assumed that most administrators will select this option and specify a specific container for all remote installation client computer account objects to be created in.
    Note: If an end user is setting up the client computer, the user must have the appropriate rights to create the computer account within the domain or OU chosen. For more information on giving users computer account creation permissions, please see the RIS online Help.
    Note: In order for all client computers using the RIS feature for OS installation to contain the same settings, all remote installation servers need to be configured in the exact same way. This release does not support replication of OS images or RIS configuration settings between RIS servers.
  8. Specify the desired user name parameters and directory service location and click Apply.
  9. Click the Images tab.
    The Images tab is used for managing the client operating system images installed on a RIS server. Its options allow an administrator to add, remove, or modify the properties of an operating system image.
    There are two types of images that can be displayed on the Images tab:
    • CD-based.A CD-based image is simply a copy of the Windows 2000 Professional CD. This installs only the base operating system without applications or configuration settings.
    • Remote Installation Preparation (RIPrep). RIPrep images are a combination of the OS, locally installed applications, and configuration settings. Many companies standardize on a single type of OS installation across their organization. Administrators can now use RIS to install the base OS, then add corporate standard applications and configure the installation exactly as they want. Once the workstation is configured appropriately, the administrator runs the Remote Installation Preparation Wizard (RIPrep) utility to create that image on an available RIS server. Once the image is replicated on the RIS server, new client computers requesting an OS installation can download the image. For more information on the RIPrep wizard and feature set, please see the section, "Using the Remote Installation Preparation Wizard" below.
    • Use the Addoption to add a new CD-based OS image or to associate an unattended setup answer file (*.sif) to an existing CD-based image on the RIS server. You can associate a number of unattended setup answer files to a single OS-based CD Image. This allows the administrator to offer users a variety of unattended Windows 2000 installation types, each performing a different type of installation from the same OS image on the RIS server. RIS installs a default unattended setup installation (.sif) file with the default OS image that was added during RIS installation.
      Note: You cannot use the Add option on the Images tab to add an RIPrep image, nor can you use the Add option to associate additional unattended setup answer files to a RIPrep image.
    • Use the Remove option to remove the unattended setup answer file (*.sif) that is associated with the OS image. Note that this option removes only the .sif file. You should not remove the physical OS image completely until all client computers have upgraded beyond that version. To remove the OS image from the remote installation server, use Windows Explorer to delete the directory and subdirectories containing the image.
    • Use the Propertiesoption to change the friendly description and help text that describes the operating system image. If you want to change the description of an OS image, click the Image you want to modify and click Properties. The dialog box appears as in Figure 6 below:
      Figure 6: Image Properties
      Figure 6: Image Properties
    If you replace the existing friendly description and help text with new text, all users of the client installation from that point forward see the new text descriptions. You can also use the Properties option to view specific image attributes, such as OS version, language, and the type of image (CD or RIPrep).
  10. Click Cancel to make no changes.
  11. Click the Tools tab if you wish to view its options.
    The Tools tab is available for independent software vendors (ISVs) or original equipment manufacturers (OEMs) that would like to use their pre-boot tools with RIS. ISVs or OEMs need to provide an external setup program that adds their respective tool to the \RemoteInstall directory tree. Once added, the tool shows up on the Tools tab and is available to administrators and users of the Client Installation wizard.
    The Tools option also allows ISVs or OEMs to provide pre-OS installation maintenance and troubleshooting tools to administrators, IT staff, or users. This provides administrators with an easy way to update client computer systems, such as the system BIOS.
  12. After making the desired changes, close Active Directory snap-in.
 

Client Installation Options

There are four installation options that you can choose to present to a user of the Client Installation wizard. These options are:
  • Automatic setup
  • Custom setup
  • Restart a previous setup attempt
  • Maintenance and troubleshooting
The installation options available to any given user are determined by the specific Remote Installation Services Group Policy settings. For example, you can choose to provide all members of the Help Desk Security group access to all of the installation options, yet restrict general network users to the Automaticsetupand Maintenance and troubleshootingoptions. This prevents user confusion and helps guide the user to the correct choices for OS installation. By default, users are given the right to automatic setup only.

Automatic Setup

The Automatic setup option is the default installation option enabled for all users of the Client Installation wizard. If this is the only installation option available to a user, when the user logs on within the Client Installation wizard, the automatic setup option is not displayed. Instead, the Client Installation wizard jumps directly to the OS images selection screen. If there is only one OS image offered, the user simply logs on within the Client Installation wizard and is asked to confirm the installation. If more than one OS image is available for installation, the user has a choice of which OS to install. Note that you can configure the RIS server to limit the OS images the user can see. For more information on restricting OS image access, see the section "Restricting OS Image Options" below.
By using an unattended installation setup answer file (*.sif), you can create several unattended OS installations that are associated with one CD-based OS image on the remote installation server. You can customize which items are installed, as well as how the specific OS options are configured during OS install.
For example, you can choose to create a specific OS unattended setup answer file (*.sif) that installs the TCP/IP protocol, sets the display resolution to 800 x 600, and sets a specific company or department name. You can provide a friendly description for this OS image that the user can relate to, such as Windows 2000 Professional for Sales Staff. The friendly description is configurable after the initial posting of the workstation OS image on the RIS server (see the preceding section on configuring options on the RIS server). When a user logs on, a list of OS installation images is displayed for the user to choose from.
When the user selects one of the operating system images, a message displays stating that an operating system is about to be installed on this computer, and that the operating system requires the local hard disk to be repartitioned and formatted, thus erasing all data that currently resides on the disk.
Note: An administrator can edit the "Caution.osc" screen using the Notepad.exe program to provide a friendly message regarding the repartition and format of the local hard disk.

Custom Setup

The Custom setup option allows you to override the automatic computer name assignment, as well as the computer account creation mechanism. You are prompted to manually enter a computer name or the Active Directory location where the computer account should be created.
Note: The Custom setup option can also be used to pre-stage a client computer into the Active Directory before delivery of the PC to the end user. Windows 2000 Remote Installation Services do not support fully unattended installations on machines that contain ISA or non Plug and Play aware devices.

Restart a Previous Setup Attempt

This option provides the ability to restart a failed setup attempt. If you started to install the OS and for some reason lost your connection to the RIS server, you can reboot the client computer, press F12 when prompted for a network service boot, and choose the Restart a Previous Setup Attempt. This restarts the installation of the previous installation attempt without asking for the computer name or Active Directory location previously entered before the initial failure.

Maintenance and Troubleshooting

This option provides access to third-party ISV and or OEM Pre-OS maintenance and troubleshooting tools.

Restricting Client Installation Options

To restrict the client installation options for users of RIS within your organization, apply the appropriate Group Policy settings for the RIS servers on your network.
  1. Click Start, point to Programs, point to Administrative tools, and click Active Directory Users and Computers.
  2. Locate the Active Directory container where you would like the RIS policy settings to be set. By default, the RIS policy settings are applied within the Default Domain Policy Object, which is located at the root of your domain.
  3. Right-click Reskit.com in the left pane, and click the Properties option.
  4. Click the Group Policy tab from the top of the Properties dialog box.
  5. Click the Default Domain Policy object and click Edit.
  6. Expand the User Configuration option by clicking the + next to it (unless it is already expanded), and then expand the Windows Settings option in the same way. Click the Remote Installation Services option as in Figure 7 below.
    Figure 7: Group Policy RIS Choice Options
    Figure 7: Group Policy RIS Choice Options
  7. Double-click the Choice Options in the right pane.
    Each Choice Option allows for a specific setting, as follows:
    • Allow. If this option is selected, the users that this policy is applied to are offered the installation option.
    • Don't Care. If this option is selected, the administrator accepts the policy settings of the parent container. For example, if the administrator for the entire domain has set RIS specific policy, and the administrator of this container has chosen the Don't Care option, the policy that is set on the domain is applied to all users who are affected by that policy.
    • Deny. If this option is set, the users affected by this policy are not allowed to access that installation option within the Client Installation wizard.
  8. Close the Choice Options and other windows, and close the Active Directory Users and Computers Snap-In.

Restricting OS Image Options

RIS provides the administrator flexibility in the amount of control users have in choosing the OS that is installed on their computer. The administrator can configure the RIS servers to guide users through a successful OS installation without requiring the user to select the correct OS image.
By setting explicit user or group security permissions on the unattended setup answer file (*.sif) for a given OS image, you can determine which OS options a user can see and install. You can choose to allow all users of RIS to choose from all of the OS images available on a given RIS server, or you can restrict the user to only a select few that are appropriate for that user or group of users.
  1. Click Start, point to Programs, point to Accessories, and click Windows Explorer.
  2. Click the + next to My Computer
  3. Click the + next to New Volume
  4. Click the + next to RemoteInstall
  5. Click the + next to Setup
  6. Click the + next to English (or whatever language you are using)
  7. Click the + next to Images
  8. Click the + next to win2000.pro
  9. Click the + next to i386
  10. Click Template. A sample directory structure is shown in Figure 8 below.
    Bb742378.remote08(en-us,TechNet.10).gif
    Figure 8: Templates
    Note: Each CD-based OS image that you add to a RIS server has an associated \Templates directory that contains the image's associated unattended setup answer files (*.sif).
    Depending on the level of restriction that you want to establish, you can set specific access permissions on the \Templates directory or in the individual unattended setup answer files within this directory. If you have not associated additional unattended answer files to the base OS image, you will only see one SIF file (Ristndrd.sif) within the \Templates directory.
  11. Right-click the \Templates directory, and click the Properties option. The property page for the \Templates folder appears.
  12. Select the Security tab. A dialog box appears as in Figure 9 below:
    Figure 9: Template Properties
    Figure 9: Template Properties
    In this example, the existing security permissions allow all users access to this OS image from within the Client Installation wizard.
  13. To restrict access to this OS image, select the Everyone group, and click Remove. This removes user access to this OS image. If a normal user were to run the Client Installation wizard at this point, the user would not have access to any available OS image to install.
  14. Click Add, and select the security group or individual users that should be allowed access to this OS image. Click Add to add them to the authorized list, and then click OK twice. The default permissions that are set for each user or security group are sufficient for use with RIS.
Note: Selecting individual users for specific access can become an administrative burden. Instead group your users by security group and apply the security group to the \Templates directory for OS image access. In this way, if you add users to the security group, they already have access to the correct OS image.
Important Note Never remove the permissions assigned to the Administrators group for a .SIF file. Doing so will prevent the RIS components themselves from accessing the file and prevent proper client installations.
At this point, you are ready to service client computers with RIS. Ensure that all services are running, all configuration settings have been made, and that the client computers adhere to the minimum requirements as described above.

Remote Installation Preparation Wizard (RIPrep)

The Remote Installation Preparation wizard (RIPrep.exe) provides the ability to prepare an existing Windows 2000 Professional installation, including locally installed applications and specific configuration setting, and replicate that image to an available RIS server on the network. The RIPrep feature currently supports replication of a single disk single partition (C Drive only) with Windows 2000 Professional installation. This means that the OS and all of the applications that make up the standard installation must reside on the C: drive before running the wizard.
First use RIS to remotely install the base Windows 2000 Professional OS on a client computer. Next, install any desired applications on the client computer. Configure the installation to adhere to any company policies; for example, you might choose to define specific screen colors, set the background bitmap to a company-based logo, or set intranet proxy server settings within Internet Explorer. Once the workstation is configured and tested, run the Remote Installation Preparation wizard (RIPrep.exe) from the RIS server that will receive the RIPrep-based OS image.
The destination computer does not need to have the same hardware as the source computer used to create the image, with the exception that the Hardware Abstraction Layer (HAL) drivers must be the same. For example, both computers must be ACPI (Advanced Configuration and Power Interface)-based or both must be non ACPI-based). In many cases, workstation-class computers do not require unique HAL drivers. The RIPrep utility uses the new Plug and Play support that ships with Windows 2000 for detecting any differences between the source and the destination computer hardware during image installation time.
To run the Remote Installation Preparation wizard (RIPrep.exe)
  1. Install the base Windows 2000 Professional OS from an available RIS server on a supported client computer.
  2. Install any applications locally on the client computer. Configure the client computer with any specific corporate standard desktop settings. Be sure the client installation is exactly as you want it to be. Once the image is replicated to the RIS server, you cannot alter its configuration.
  3. Connect to the RIS server where you want to replicate this image, as follows:
  4. Click Start , click Run, and type the following command in the Open text box:
    \\RISservername\Reminst\Admin\I386\RIPrep.exe 
    
    where RISservername is the computer name of the destination RIS server. In our example, this is HQ-RES-DC-01. Reminst is the Remote Installation Share that is created when you installed the RIS service on the server. Admin is the directory that contains the RIPrep.exe that launches the remote installation.
  5. At this point, the Remote Installation Preparation wizard starts and you are presented with a welcome screen that describes the feature and its functionality. Click Next.
  6. You are prompted to enter the name of the RIS server where you would like to replicate the contents of the client hard disk. By default, the RIS server that the wizard (RIPrep.exe) is being run from is automatically filled in (in our example, Reskit.com). Click Next.
  7. You are prompted to provide the name of the directory on the RIS server where this image will be copied. The image is created under the \remoteInstall\setup\OS Language\Images directory. Click Next.
  8. You are prompted to provide a friendly description and help text describing this image. The friendly description and help text are displayed to users of the Client Installation wizard during OS image selection. Provide enough information that a user can distinguish between images. Click Next.
  9. The wizard displays a summary screen of your selections. After you have reviewed them, click Next.
The image preparation and replication process begins. The system is prepared and files are copied to the RIS server specified. Once the replication of the image completes, any remote boot enabled client computer can select the image for a local installation.
 

Remote Installation Boot Disk Option

The remote installation boot disk can be used with computers that do not contain a remote boot-enabled ROM on the network card. The boot disk is designed to simulate the PXE boot process for computers that lack a supported DHCP PXE-based remote boot ROM. The boot disk generator utility is called RBFG.EXE and is located within the \RemoteInstall\admin directory on every Remote Installation Server.
The RBFG.exe utility is also contained within the Administrator Tools package that ships with Windows 2000 Server. The Administrator Tools package can be deployed across your organization using either Systems Management Server 2.0 or using the new Software Management feature, which is part of the Group Policy infrastructure.
Creating a Remote Installation Boot Floppy
To create a Remote Installation Boot Floppy, run the RBFG.exe utility from the RIS server either on a client computer that is connected to the RIS server or a computer with the administrator tools package installed.
  1. Click Start, click Run, and in the Open text box, type RBFG.exe, and click OK.
Note: The RBFG.exe utility does not allow you to add network adapters). To create a remote installation boot disk, insert a disk into the appropriate drive and then select Create Disk.
 
Remote Boot ROM PXE Architecture
Remote Installation Services uses DHCP for IP address assignment to clients. When a new DHCP- PXE-based remote boot client computer is powered on for the first time, the client requests an Internet Protocol (IP) address, and the IP address of an active boot server via the DHCP protocol. As part of the initial request, the client computer sends out its globally unique identifier (GUID or UUID), which is used to uniquely identify the client machine within the Active Directory, in the case of Windows 2000 Remote Installation Services.
From the RIS server, the client computer receives:
  • Its own IP address from DHCP.
  • The IP address of the RIS server.
  • The name of a boot image the client computer will need to request when contacting the RIS server for initial service.
Once the client request is made, the first RIS server to respond will check Active Directory to see if this client has been pre-staged or not. RIS does this by checking in Active Directory for a computer account object that has the unique GUID/UUID.
The PXE process is used every time a remote boot ROM-enabled client requests a network service boot. Remote boot/installation server vendors implement their own process to download the first image.
 

Conclusion

The information presented in this guide has provided the technical details required to install, configure, and use Microsoft Remote Installation Services.
Remote Installation Services require several of the Windows 2000 Server technologies—Active Directory, DHCP server, and the DNS server services. The remote installation server also requires that client computers contain either the new DHCP PXE-based remote boot capable ROMs or a network card supported by the remote installation boot floppy.

Appendix A: Remote Installation Server and Workstation Hardware Requirements

Server Hardware Requirements

See the Product Compatibility page to verify that your server meets the minimum requirements for Windows 2000 Server.
  • Pentium or Pentium II 200 megahertz (MHz) recommended (166 MHz minimum)
  • 64 MB RAM minimum. If additional services such as the DS, DHCP, and DNS are installed then the minimum amount of RAM is 96 or 128 MB
  • 2-GB drive dedicated to the Remote Installation Servers directory tree
  • 10 or 100 megabits per second (Mbps) network adapter card. (100 Mbps preferred.)
Note: You should dedicate an entire hard drive or partition specifically to the Remote Installation Services directory tree. (SCSI-based disk controller/disks are preferred.)

Client Hardware Requirements

See the Product Compatibility page to make sure that your workstation meets the minimum requirements for Windows 2000 Professional.
  • Pentium 166 MHz or greater NetPC client computer
  • 32 MB of RAM
  • 1.2-GB drive minimum
  • PXE DHCP-based boot ROM version .99c or greater or a network adapter supported by the RIS boot floppy.
Best Practice: Always check with the manufacturer of your network adapter to get the latest version of the PXE ROM.
Network Cards supported by RIS Boot Floppy
3 Com Network Adapters
  • 3c900 (Combo and TP0)
  • 3c900B (Combo, FL, TPC, TP0)
  • 3c905 (T4 and TX)
  • 3c905B (Combo, TX, FX)
AMD Network Adapters
  • AMD PCNet and Fast PC Net
Compaq Network Adapters
  • Netflex 100 (NetIntelligent II)
  • Netflex 110 (NetIntelligent III)
Digital Equipment Corporation (DEC) Network Adapters
  • DE 450
  • DE 500
Hewlett-Packard Network Adapters
  • HP Deskdirect 10/100 TX
Intel Corporation Network Adapters
  • Intel Pro 10+
  • Intel Pro 100+
  • Intel Pro 100B (including the E100 series)
SMC Network Adapters
  • SMC 8432
  • SMC 9332
  • SMC 9432

Appendix B: Frequently Asked Questions

How do I know I have the correct PXE ROM version?
When the NetPC or client computer ROM-boots, a PXE (LSA) ROM message appears on the screen. You can see which version of the PXE ROM code is displayed during the boot sequence of the client machine. Windows 2000 RIS supports .99c or greater PXE ROMs. You may be required to obtain a newer version of the PXE-based ROM code from your OEM if you are not successful with this existing ROM version.
How do I know if the client computer has received an IP Address and has contacted the Remote Installation Server?
When the client computer boots, the PXE Boot ROM begins to load and initialize. The following 4-step sequence occurs with most Net PC or PXE ROM-based computers (Note: the sequence may be different on your computer):
Step 1: The client computer displays the message BootP. This message indicates the client is requesting an IP address from the DHCP server.
Troubleshooting: If the client does not get past the BootP message, it means the client is not receiving an IP address. Things to check are:
  • Is the DHCP server available and has the service started? DHCP and RIS servers must be authorized in the Active Directory for their services to start. Check that the service has started and that other non-remote boot-enabled clients are receiving IP addresses on this segment.
  • Can other client computers—that is non-remote boot-enabled clients—receive an IP address on this network segment?
  • Does the DHCP server have a defined IP address scope and has it been activated? To check this click Start, point to Programs, point to Administrative Tools, and click DHCP.
  • Click Start, point to Programs, point to Administrative Tools, and click Event Viewer. Are there any error messages in the event log under the System Log for DHCP?
  • Is there a router between the client and the DHCP server that is not allowing DHCP packets through?
Step 2: When the client receives an IP address from the DHCP server, the message changes to DHCP. This indicates the client successfully leased an IP address and is now waiting to contact the Remote Installation Server.
Troubleshooting: If the client does not get past the DHCP message, it means the client is not receiving a response from the remote installation server. Things to check are:
  • Is the remote installation server available and has the (BINLSVC) RIS service started? RIS servers must be authorized in the Active Directory for their services to start. Check to ensure the service has started using the DHCP snap-in (click Start, point to Programs, point to Administrative Tools, and click DHCP).
  • Are other remote boot-enabled clients receiving the Client Installation wizard? If so, this may indicate this client computer is not supported or is having remote boot ROM-related problems. Check the version of the PXE ROM on the client computer.
    Is there a router between the client and the remote installation server that is not allowing the DHCP-based requests/responses through? When the RIS client and the RIS server are on separate subnets the router between the two systems must be configured to forward DHCP packets to the RIS server. This is because RIS clients discover a RIS server by using a DHCP broadcast message. Without DHCP forwarding set up on a router, the clients' DHCP broadcasts will never reach the RIS server. This DHCP forwarding process is sometimes referred to as DHCP Proxy or IP Helper Address in router configuration manuals. Please refer to your router instructions for setting up DHCP forwarding on your specific router.
  • Click Start, point to Programs, point to Administrative Tools, and click Event Viewer. Are there any error messages in the event log under the System or Application logs specific to RIS (BINLSVC), DNS, or the Active Directory?
Step 3: The client changes to BINL or prompts the user to click the F12 key. This means that the client has contacted the RIS server and is waiting to TFTP the first image file—OSChooser. You may not see the BINL and TFTP message as on some machines as this sequence simply flashes by too quickly.
Troubleshooting: If the client machine does not get a response from the Remote Installation Server, the client times out and displays an error that it did not receive a file from either DHCP, BINL, or TFTP. In this case, the RIS Server did not answer the client computer.
Stop and restart the BINLSVC. From the Start menu, click Run, and type CMD. Enter these commands:
Net Stop BINLSVC
Net Start BINLSVC
If the client machine does not receive an answer after attempting to stop and restart the service, then check the Remote installation Server Object properties to ensure the correct setting has been set—that is, verify that RIS is set to "Respond to client computers requesting service", and "Do not respond to unknown client computers". Click Start, point to Programs, point to Administrative Tools, and click Event Viewer to check the Event log on the RIS server for any errors relating to DHCP, DNS, or RIS (BINLSVC).
Step 4: At this point, the client should have downloaded and displayed the Client Installation wizard application with a Welcome screen greeting the user.
Does RIS support remote installation of Windows 2000 Server CD-based or RIPrep OS images?
No. RIS does not support remotely installing Windows 2000 Server.
Does RIS support remotely installing an OS image (RIPrep or CD-based) on laptop computers?
Yes and no. RIS has been tested with laptop computers in docking stations that support the required PXE ROM code. The laptops must be located within the docking stations with the network cable plugged into the network adapter located in the docking station.
RIS does not support laptop computers that contain PC Card or PCMCIA cards that contain a PXE supported ROM.
Is the Pre-Boot portion of the PXE-based Remote Boot ROM Secure?
No. The entire ROM sequence and OS installation/replication is not secure with regard to packet type encryption, client/server spoofing, or wire sniffer based mechanisms. As such, use caution when using the RIS service on your corporate network. Ensure that you only allow authorized RIS servers on your network and that the number of administrators allowed to install and or configure RIS servers is controlled.
Can RIPrep-based OS images be replicated to alternate media such as DVDs, CDs, and/or Zip drives?
No. This is something that is being considered for the next major release of RIS.
Does the RIPrep feature of RIS support different hardware between the source computer used to create the RIPrep-based OS image and the destination computer that will install the image?
Yes. The hardware between the source PC and the destination PC can be different. The one exception to this is the Hardware Abstraction layer (HAL) driver used. For example, if the source PC is an Advanced Configuration Power Interface (ACPI)-based computer, it uses a specific ACPI HAL driver. If you attempt to install this RIPrep image on a non-ACPI-based or enabled computer, it will fail.
Does the RIPrep wizard support multiple disks and or multiple partitions on a given client computer?
No. The RIPrep utility only supports a single disk with a single partition (C:\ drive) in this release of RIS.
How does the RIPrep wizard deal with disks that differ in size between the source PC used to create the image and the destination PC that will receive it?
The destination PC's disk size must be equal to or larger than the source disk used to create the image.
How do I replicate all of the OS images currently located on one of my RIS servers to other RIS servers on the network for consistency across all client installations?
Currently RIS does not provide a mechanism for replication of OS images from one RIS server to another. There are several mechanisms that can be employed to solve this problem. Take advantage of the replication features of the Microsoft Systems Management Server product, for example. This product provides for scheduled replication, compression, and slow link features. You can also employ third-party vendor solutions for OS image replication. Ensure that the replication mechanism supports maintaining the file attributes and security settings of the source images.
Can I have an RIS server and a third-party remote boot server on the network at the same time? If so, what are the implications?
Yes. You can have multiple vendor Remote Boot/Installation (RB/RI) servers on one physical network. It is important to understand that currently the remote boot PXE ROM code does not know the difference between vendors RB/RI servers. As such, when a remote boot-enabled client computer powers up and requests the IP address of a RB/RI server, all of the available servers respond to that client. Thus, the client has no way to ensure it is serviced by a specific RB/RI server.
RIS allows an administrator the ability to pre-stage client computers into the Active Directory and mandate which RIS server services that client. By configuring the RIS server to answer only known client computers (pre-staged), the administrator is assured that the correct RIS server services the client. Not all of the third-party RB/RI vendors have implemented the ability to ignore service requests, so you may need to segment off the specific vendors servers so that clients are not answered by these vendors' RB/RI servers.
Can I remotely manage the RIS servers from Windows 2000 Professional workstations on my network.
Yes. If you are an administrator in the domain and you have installed the Administrator Tools MSI package, you can administer the majority of the RIS configuration settings. There are some items that you cannot manage. For example, you cannot remotely add additional OS images to RIS servers from Windows 2000 workstation computers.
Can I add additional network adapter cards to the RIS Boot Floppy?
No. The RBFG.exe utility is hard-coded with the supported network card adapters for this release of RIS. Microsoft will be adding additional network card adapters over time. Microsoft makes the updated RBFG.exe utility available through normal distribution channels such as the Web, Windows Update, and future service/feature pack updates.
Can I use the Active Directory object attributes to create a naming format for use with the RIS automatic computer-naming feature?
No. The existing attributes supported with the automatic computer-naming feature leverage the Active Directory. However, all of the Active Directory object attributes are not currently supported. This is something that is being investigated for a future release of RIS.
Where do I look on the client computer to find the GUID/UUID for pre-staging clients in the Active Directory for use with RIS?
The GUID/UUID for client computers that are PC98 or Net PC compliant can be found (in most cases) in the system BIOS. OEMs are encouraged to ship a floppy disk containing a comma-separated file or spreadsheet that contains a mapping of Serial # to GUID/UUID. This allows you to script pre-staging client computers within the Active Directory. OEMs are also encouraged to post the GUID/UUID on the outside of the computer case for easy identification and pre-staging of computer accounts. If the GUID is not found in the above-mentioned locations, you can sniff the network traffic of the client, locate the DHCP Discover packet, and within that field will be the 128-bit 32 byte GUID/UUID.

Important Notes

The example company, organization, products, people, and events depicted in this step-by-step guide are fictitious. No association with any real company, organization, product, person, or event is intended or should be inferred.
This common infrastructure is designed for use on a private network. The fictitious company name and DNS name used in the common infrastructure are not registered for use on the Internet. Please do not use this name on a public network or Internet.
The Active Directory structure for this common infrastructure is designed to show how Windows 2000 features work and function with the Active Directory. It was not designed as a model for configuring an Active Directory for any organization—for such information see the Active Directory documentation.

Tuesday, 10 February 2015

STEP-BY-STEP TO CONFIGURE TP-LINK ROUTER


STEP-BY-STEP TO INSTALL &  CONFIGURE 
                           
TP-LINK ROUTER

         
In this article, am going to show you how to install your TP-Link router after installation of its wireless N PCI or USB adapter be it 150Mbps or 300Mbps as the case may be into your laptop or desktop.
Please follow up as I’ll proceed in details the operation of the configuration of TP-Link Router.
Note:
Kindly click on the faint-blue shaded/indicated area found in the diagram for clear view during your hands-on and proceed in your installation while it last.
This installation and its configuration could work for any other routers that has a similar interface, except CISCO ROUTERS.
I wish you success as you embark on this series of installation……
The procedure is as follows:
After the installation of your TP-Link wireless card  PCI/USB adapter, follow this procedure for the installation of your TP-Link router:
Go-to Network
A web browser will display the below pop-up dialog box
User Name: admin
Password: admin
Note that the following password written at the on-set of this article is DEFAULT….,you can make a change of these at your convenience if your circumstances permit.
To know more about Status, please follow the write-up as detailed below:
Status Help
The Status page displays the Router's current status and configuration. All information is read-only.
LAN - The following parameters apply to the LAN port of the Router. You can configure them in the Network -> LAN page.
  • MAC Address - The physical address of the Router, as seen from the LAN.
  • IP Address - The LAN IP address of the Router.
  • Subnet Mask - The subnet mask associated with LAN IP address.
Wireless - These are the current settings or information for Wireless.You can configure them in the Wireless -> Wireless Settings page.
  • Wireless Radio - Indicates whether the wireless radio feature of the Router is enabled or disabled.
  • Name(SSID) - The SSID of the Router.
  • Channel - The current wireless channel in use.
  • Mode - The current wireless mode which the Router works on.
  • Channel Width - The bandwidth of the wireless channel.
  • Max Tx Rate - The maximum tx rate.
  • MAC Address - The physical address of the Router, as seen from the WLAN.
  • WDS Status - The status of WDS' connection, Init: WDS connection is down; Scan: Try to find the AP; Auth: Try to authenticate; ASSOC: Try to associate; Run: Associated successfully.
WAN - The following parameters apply to the WAN ports of the Router. You can configure them in the Network -> WAN page.
  • MAC Address - The physical address of the WAN port, as seen from the Internet.
  • IP Address - The current WAN (Internet) IP Address. This field will be blank or 0.0.0.0 if the IP Address is assigned dynamically and there is no connection to Internet.
  • Subnet Mask - The subnet mask associated with the WAN IP Address.
  • Default Gateway - The Gateway currently used by the Router is shown here. When you use Dynamic IP as the connection Internet type, the Renew button will be displayed here. Click the Renew button to obtain new IP parameters dynamically from the ISP. And if you have got an IP address Release button will be displayed here. Click the Release button to release the IP address the Router has obtained from the ISP.
  • DNS Server - The DNS (Domain Name System) Server IP addresses currently used by the Router. Multiple DNS IP settings are common. Usually, the first available DNS Server is used.
  • Online Time - The time that you online. When you use PPPoE as WAN connection type, the online time is displayed here. Click the Connect or Disconnect button to connect to or disconnect from Internet.
Secondary Connection - Besides PPPoE, if you use an extra connection type to connect to a local area network provided by ISP, then parameters of this secondary connection will be shown in this area.
Traffic Statistics - The Router's traffic statistics.
  • Sent (Bytes) - Traffic that counted in bytes has been sent out from the WAN port.
  • Sent (Packets) - Traffic that counted in packets has been sent out from WAN port.
  • Received (Bytes) - Traffic that counted in bytes has been received from the WAN port.
  • Received (Packets) - Traffic that counted in packets has been received from the WAN port.
System Up Time - The length of the time since the Router was last powered on or reset.
Click the Refresh button to get the latest status and settings of the Router.

Quick Setup Help

With this guide, you can set the basic parameters to get a connection to the internet. Even if you are not familiar with this product, you can still finish the settings easily. If you are an expert, you can also choose to set what you want in the menu rather than to use this.
Click the Next button to continue, or the Exit button to quit.

WAN Connection Type Help

The Quick Setup supports three popular types of connection. To make sure the connection type your ISP provides, please refer to the ISP.
Auto Detect - If you don't know the connection type your ISP provides, use this option to allow the Quick Setup to search your Internet connection for servers and protocols and determine your ISP configuration. Make sure the cable is securely plugged into the WAN port before detection. The appropriate configuration page will be displayed when an active Internet service is successfully detected by the Router.


PPPoE - If you have applied ADSL to realize Dial-up service, you should choose this type. Under this condition, you should fill in both the User Name and Password that the ISP supplied.
Dynamic IP - When the Router connects to a DHCP server, or the ISP supplies you with DHCP connection, please choose this type. The Router will get the IP address automatically from the DHCP server or the ISP if you choose the Dynamic IP type.
Static IP - In this type, you should fill in the IP address, Subnet Mask, Default Gateway, and DNS IP address manually, which are specified by your ISP.
Click the Next button to continue or the Back button to go back to the previous page.
Please connect your PATCHED CABLE to the WAN port.
Please wait while the connection type is been generating from the ISP provider…….
Static IP Help
The IP parameters should have been provided by your ISP.
  • IP Address - This is WAN IP address as seen by external users on the Internet (including your ISP). Enter the IP address into the field.
  • Subnet Mask - The Subnet Mask is used for the WAN IP address, it is usually 255.255.255.0.
  • Default Gateway - Enter the default gateway into the blank if required.
  • Primary DNS - Enter the DNS IP address into the blank if required.
  • Secondary DNS - If your ISP provides another DNS IP address, enter it into this field.
Click the Next button to continue, or the Back button to return to the previous page.
Quick Secure Setup Help
QSS function will help you add a new device to the network quickly. If the new device supports Wi-Fi Protected Setup and is equipped with a configuration button, you can add it to the network by pressing the configuration button on the device and then press the button on the Router within two minutes. The status LED on the Router will light green for five minutes if the device has been successfully added to the network. If the new device supports Wi-Fi Protected Setup and the connection way using PIN, you can add it to the network by entering the Router's PIN.
  • QSS Status - Enable or disable the QSS function here.
  • Current PIN - The current value of the Router's PIN displayed here. The default PIN of the Router can be found in the label or User Guide.
  • Restore PIN - Restore the PIN of the Router to its default.
  • Gen New PIN - Click this button, and then you can get a new random value for the Router's PIN. You can ensure the network security by generating a new PIN.
  • Add Device - You can add the new device to the existing network manually by clicking this button.
Note: The QSS function cannot be configured if the Wireless Function of the Router is disabled. Please make sure the Wireless Function is enabled before configuring the QSS.
Add A New Device Help
This section will guide you add a new wireless device to an existing network manually. If the new device supports Wi-Fi Protected Setup and equipped with a configuration button, you can add it to the network by pressing the configuration button on the device, then choose the "Press the button of the new device in two minutes" and click the Connect button on this configuration web page within two minutes. In addition, you can also add the new device by entering the PIN of this device and then click the Connect button.
  • Enter the new device's PIN - Choose this setting if the new device supports the connection way by entering its PIN.
  • PIN - Entering the PIN value of the new device here.
  • Press the button of the new device in two minutes - Choose this setting if the new device supports the connection way by pressing the button.
  • Back - Return to the QSS configuration page.
  • Connect - Connect to the new device and add it to the existing network.
NETWORK
LAN Help
You can configure the IP parameters of LAN on this page.
  • MAC Address - The physical address of the LAN ports, as seen from the LAN. The value can not be changed.
  • IP Address - Enter the IP address of your Router in dotted-decimal notation (factory default - 192.168.1.1).
  • Subnet Mask - An address code that determines the size of the network. Usually it is 255.255.255.0 .
Note:
  1. If you change the LAN IP address, you must use the new IP address to login to the Router.
  2. If the new LAN IP address you set is not in the same subnet with the previous one, the IP Address pool in the DHCP server will be configured automatically, but the Virtual Server and DMZ Host will not take effect until they are re-configured
Click the Save button to save your settings.
WAN Help
WAN Connection Type:
If your ISP is running a DHCP server, select the Dynamic IP option.
If your ISP provides a static or fixed IP Address, Subnet Mask, Gateway and DNS setting, select the Static IP option.
If your ISP provides a PPPoE connection, select PPPoE/Russia PPPoE option.
If your ISP provides BigPond Cable (or Heart Beat Signal) connection, please select BigPond Cable option.
If your ISP provides L2TP connection, please select L2TP/Russia L2TP option.
If your ISP provides PPTP connection, please select PPTP/Russia PPTP option.
If you don't know how to choose the appropriate connection type, click the Detect button to allow the Router to automatically search your Internet connection for servers and protocols. The connection type will be reported when an active Internet service is successfully detected by the Router. This report is for your reference only. To make sure the connection type your ISP provides, please refer to the ISP. The various types of Internet connections that the Router can detect are as follows:
  • PPPoE/Russia PPPoE - Connections which use PPPoE that requires a user name and password.
  • Dynamic IP - Connections which use dynamic IP address assignment.
  • Static IP - Connections which use static IP address assignment.
IP Address - The IP address assigned by your ISP dynamically.
Subnet Mask - The subnet mask assigned by your ISP dynamically.
Default Gateway - The default gateway assigned dynamically by your ISP.
Click the Renew button to renew the IP parameters from your ISP.
Click the Release button to release the IP parameters from your ISP.
MTU Size(in bytes) - The normal MTU (Maximum Transmission Unit) value for most Ethernet networks is 1500 Bytes. For some ISPs you need to modify the MTU. But this is rarely required, and should not be done unless you are sure it is necessary for your ISP connection.
If your ISP gives you one or two DNS IP addresses, select Use These DNS Servers and enter the Primary DNS and Secondary DNS into the correct fields. Otherwise, the DNS servers will be assigned from ISP dynamically.
Primary DNS - Enter the DNS IP address in dotted-decimal notation provided by your ISP.
Secondary DNS - Enter another DNS IP address in dotted-decimal notation provided by your ISP.
Note: If you get Address not found error when you access a Web site, it is likely that your DNS servers are set up improperly. You should contact your ISP to get DNS server addresses.
Host Name - This option specifies the Host Name of the Router.
Get IP with Unicast DHCP - A few ISPs' DHCP servers do not support the broadcast applications. If you can't get the IP Address normally, you can choose Unicast. (You generally need not to check this option).
Click the Save button to save your settings.
MAC Clone Help
Some ISPs require that you register the MAC Address of your adapter. Usually, You do not need to change anything here.
WAN MAC Address - This field displays the current MAC address of the WAN port. If your ISP requires that you register the MAC address, please enter the correct MAC address into this field. The format for the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit).
Your PC's MAC Address - This field displays the MAC address of the PC that is managing the Router. If the MAC address of your adapter is registered, you can click the Clone MAC Address button , then it will be filled into the WAN MAC Address field.
Click Restore Factory MAC to restore the MAC address of WAN port to the factory default value.
Click the Save button to save your settings.
Note:
  1. Only the PC(s) in your LAN can use the MAC Address Clone feature.
  2. If you change WAN MAC Address when the WAN connection type is PPPoE, it will not take effect until the connection is re-established.
Wireless Settings Help
Note: The operating distance or range of your wireless connection varies significantly based on the physical placement of the Router. For best results, place your Router.
  • Near the center of the area in which your wireless stations will operate.
  • In an elevated location such as a high shelf.
  • Away from the potential sources of interference, such as PCs, microwaves, and cordless phones.
  • With the Antenna in the upright position.
  • Away from large metal surfaces.
Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the Router.
SSID - Enter a value of up to 32 characters. The same Name (SSID) must be assigned to all wireless devices in your network.
Region - Select your region from the pull-down list. This field specifies the region where the wireless function of the Router can be used. It may be illegal to use the wireless function of the Router in a region other than one of those specified in this filed. If your country or region is not listed, please contact your local government agency for assistance.
Channel - This field determines which operating frequency will be used. It is not necessary to change the wireless channel unless you notice interference problems with another nearby access point. If you select auto, then AP will choose the best channel automatically.
Mode - If all of the wireless devices connected with this wireless router can connect in the same transmission mode(eg. 802.11b), you can choose "Only" mode(eg. 11b only). If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode.
Channel Width - The bandwidth of the wireless channel.
Max Tx Rate - You can limit the maximum tx rate of the Router through this field.
Enable Wireless Router Radio - The wireless radio of the Router can be enabled or disabled to allow wireless stations access. If enabled, the wireless stations will be able to access the Router, otherwise, wireless stations will not be able to access the Router.
Enable SSID Broadcast - If you select the Enable SSID Broadcast checkbox, the wireless router will broadcast its name (SSID) on the air.
Enable WDS - You can select this to enable WDS, with this function, the Router can bridge two or more Wlans. NOTE: If this checkbox is selected, you had better make sure the following settings are correct.
SSID(to be bridged) - The SSID of the AP your Router is going to connect to as a client. You can also use the survey function to select the SSID to join.
BSSID(to be bridged) - The BSSID of the AP your Router is going to connect to as a client. You can also use the survey function to select the BSSID to join.
Survey - Click this button, you can search the AP which runs in the current channel.
Key type - This option should be chosen according to the AP's security configuration.It is recommended that the security type is the same as your AP's security type
WEP Index - This option should be chosen if the key type is WEP(ASCII) or WEP(HEX).It indicates the index of the WEP key.
Auth Type - This option should be chosen if the key type is WEP(ASCII) or WEP(HEX).It indicates the authorization type of the Root AP.
Password - If the AP your Router is going to connect needs password, you need to fill the password in this blank.
Wireless Security Help
You can select one of the following security options:
  • Disable Security - The wireless security function can be enabled or disabled. If disabled, the wireless stations will be able to connect the Router without encryption. It is recommended strongly that you choose one of following options to enable security.
  • WEP - Select 802.11 WEP security.
  • WPA-PSK - Select WPA based on pre-shared passphrase.
  • WPA - Select WPA based on Radius Server.
Each security option has its own settings as described  follows,
WEP
Type - You can select one of following types,
  • Automatic - Select Shared Key or Open System authentication type automatically based on the wireless station's capability and request.
  • Shared Key - Select 802.11 Shared Key authentication.
  • Open System - Select 802.11 Open System authentication.
WEP Key Format - You can select ASCII or Hexadecimal format. ASCII Format stands for any combination of keyboard characters in the specified length. Hexadecimal format stands for any combination of hexadecimal digits (0-9, a-f, A-F) in the specified length.
WEP Key settings - Select which of the four keys will be used and enter the matching WEP key information for your network in the selected key radio button. These values must be identical on all wireless stations in your network.
Key Type - You can select the WEP key length (64-bit, or 128-bit, or 152-bit.) for encryption. "Disabled" means this WEP key entry is invalid.
  • For 64-bit encryption - You can enter 10 hexadecimal digits (any combination of 0-9, a-f, A-F, and null key is not permitted) or 5 ASCII characters.
  • For 128-bit encryption - You can enter 26 hexadecimal digits (any combination of 0-9, a-f, A-F, and null key is not permitted) or 13 ASCII characters.
  • For 152-bit encryption - You can enter 32 hexadecimal digits (any combination of 0-9, a-f, A-F, and null key is not permitted) or 16 ASCII characters.
Note: If you do not set the key, the wireless security function is still disabled even if you have selected Shared Key as Authentication Type.
WPA/WPA2
Version -  You can select one of following versions,
  • Automatic - Select WPA or WPA2 automatically based on the wireless station's capability and request.
  • WPA - Wi-Fi Protected Access.
  • WPA2 - WPA version 2.
Encryption - You can select either Automatic, or TKIP or AES.
Radius Server IP - Enter the IP address of the Radius Server.
Radius Port - Enter the port that radius service used.
Radius Password - Enter the password for the Radius Server.
Group Key Update Period - Specify the group key update interval in seconds. The value can be either 0 or at least 30. Enter 0 to disable the update.
WPA-PSK/WPA2-PSK
Version -  You can select one of following versions,
  • Automatic - Select WPA-PSK or WPA2-PSK automatically based on the wireless station's capability and request.
  • WPA-PSK - Pre-shared key of WPA.
  • WPA2-PSK - Pre-shared key of WPA2.
Encryption - You can select either Automatic, or TKIP or AES.
PSK Password - You can enter ASCII or Hexadecimal characters. For Hexadecimal, the length should be between 8 and 64 characters; for ASCII, the length should be between 8 and 63 characters.
Group Key Update Period - Specify the group key update interval in seconds. The value can be either 0 or at least 30. Enter 0 to disable the update.
Be sure to click the Save button to save your settings on this page.
Wireless MAC Filtering Help
The Wireless MAC Address Filtering feature allows you to control the wireless stations accessing the AP, which depend on the station's MAC addresses.
  • MAC Address - The wireless station's MAC address that you want to access.
  • Description - A simple description of the wireless station.
  • Status - The status of this entry , either Enabled or Disabled.
To disable the Wireless MAC Address Filters feature, keep the default setting, Disable.
To set up an entry, click Enable, and follow these instructions:
First, you must decide whether the specified wireless stations can or cannot access the AP. If you desire that the specified wireless stations can access the AP, please select the radio button Allow the stations specified by any enabled entries in the list to access, otherwise, select the radio button Deny the stations specified by any enabled entries in the list to access.
To Add a Wireless MAC Address filtering entry, clicking the Add New... button, and following these instructions:
  1. Enter the appropriate MAC Address into the MAC Address field. The format of the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). For example, 00-0A-EB-B0-00-0B.
  2. Enter a simple description of the wireless station in the Description field. For example, Wireless station A.
  3. Status - Select Enabled or Disabled for this entry on the Status pull-down list.
  4. Click the Save button to save this entry.
To add another entries, repeat steps 1~4.
To modify or delete an existing entry:
  1. Click the Edit or Delete button in the modify column in the MAC Address Filtering Table.
  2. Enter the value as desired in the Add or Modify Wireless MAC Address Filtering entry page, and click the Save button.
You can click the Enable All button to make all the Entries enabled, click the Disable All button to make all the Entries disabled, click the Delete All button to delete all the entries.
Click the Next button to go to the next page and click the Previous button to return to the previous page.
Note: If you enable the function and select the Allow the stations specified by any enabled entries in the list to access for Filtering Rules, and there are not any enable entries in the list, thus, no wireless stations can access the AP.
Wireless Advanced Help
  • Transmit Power - Here you can specify the transmit power of the Router. You can select High, Middle or Low which you would like. High is the default setting and is recommended.
  • Beacon Interval - The beacons are the packets sent by the Router to synchronize a wireless network. Beacon Interval value determines the time interval of the beacons. You can specify a value between 40-1000 milliseconds. The default value is 100.
  • RTS Threshold - Here you can specify the RTS (Request to Send) Threshold. If the packet is larger than the specified RTS Threshold size, the Router will send RTS frames to a particular receiving station and negotiate the sending of a data frame. The default value is 2346.
  • Fragmentation Threshold - This value is the maximum size determining whether packets will be fragmented. Setting the Fragmentation Threshold too low may result in poor network performance since excessive packets. 2346 is the default setting and is recommended.
  • DTIM Interval - This value determines the interval of the Delivery Traffic Indication Message (DTIM). You can specify the value between 1-255 Beacon Intervals. The default value is 1, which indicates the DTIM Interval is the same as Beacon Interval.
  • Enable WMM - WMM function can guarantee the packets with high- priority messages being transmitted preferentially. It is strongly recommended enabled.
  • Enable Short GI - This function is recommended for it will increase the data capacity by reducing the guard interval time.
  • Enable AP Isolation - Isolate all connected wireless stations so that wireless stations cannot access each other through WLAN. This function will be disabled if WDS/Bridge is enabled.
Note: If you are not familiar with the setting items in this page, it's strongly recommended to keep the provided default values, otherwise may result in lower wireless network performance.
Wireless Statistics Help
This page shows MAC Address, Current Status, Received Packets and Sent Packets for each connected wireless station.
  • MAC Address - the connected wireless station's MAC address
  • Current Status - the connected wireless station's running status, one of STA-AUTH / STA-ASSOC / STA-JOINED / WPA / WPA-PSK / WPA2 / WPA2-PSK / AP-UP / AP-DOWN / Disconnected
  • Received Packets - packets received by the station
  • Sent Packets -packets sent by the station
You cannot change any of the values on this page. To update this page and to show the current connected wireless stations, click on the Refresh button.
If the numbers of connected wireless stations go beyond one page, click the Next button to go to the next page and click the Previous button to return to the previous page.
Note: This page will be refreshed automatically every 5 seconds.
DHCP Settings Help
The Router is set up by default as a DHCP (Dynamic Host Configuration Protocol) server, which provides the TCP/IP configuration for all the PCs that are connected to the Router in the LAN.
  • DHCP Server - Enable or Disable the server. If you disable the Server, you must have another DHCP server within your network or else you must configure the IP address of the computer manually.
  • Start IP Address - This field specifies the first address in the IP Address pool. 192.168.1.100 is the default start IP address.
  • End IP Address - This field specifies the last address in the IP Address pool. 192.168.1.199 is the default end IP address.
  • Address Lease Time - The Address Lease Time is the length of time a network user will be allowed to keep connecting to the Router with the current DHCP Address. Enter the amount of time, in minutes, that the DHCP address will be "leased". The time range is 1~2880 minutes. The default value is 120 minutes.
  • Default Gateway - (Optional) Suggest to input the IP Address of the LAN port of the Router, default value is 192.168.1.1.
  • Default Domain - (Optional) Input the domain name of your network.
  • Primary DNS - (Optional) Input the DNS IP address provided by your ISP. Or consult your ISP.
  • Secondary DNS - (Optional) You can input the IP Address of another DNS server if your ISP provides two DNS servers.
Note: To use the DHCP server function of the Router, you should configure all computers in the LAN as "Obtain an IP Address automatically" mode. This function will take effect until the Router reboots.
Click Save to save the changes.
DHCP Clients List Help
This page shows Client Name, MAC Address, Assigned IP and Lease Time of each DHCP Client connected to the Router.
  • Client Name - The name of the DHCP client.
  • MAC Address - The MAC address of the DHCP client.
  • Assigned IP - The IP address that the Router has allocated to the DHCP client.
  • Lease Time - The time of the DHCP client leased.
You cannot change any of the values on this page. To update this page and to show the current connected devices, click on the Refresh button.
Address Reservation Help
When you specify a reserved IP address for a PC in the LAN, that PC will always receive the same IP address each time when it accesses the DHCP server. Reserved IP addresses could be assigned to servers that require permanent IP settings.
  • MAC Address - The MAC Address of the PC that you want to reserve an IP address for.
  • Reserved IP Address - The IP address that the Router reserved.
  • Status - It shows whether the entry is enabled or not
  • Modify - To modify or delete an existing entry.
To Reserve IP Addresses, you can follow these steps:
  1. Enter the MAC Address (The format for the MAC Address is XX-XX-XX-XX-XX-XX) and the IP address in dotted-decimal notation of the computer you wish to add.
  2. Click the Save button.
To modify a Reserved IP Address, you can follow these steps:
  1. Select the reserved address entry as you desired, modify it. If you wish to delete the entry, click the Delete link of the entry.
  2. Click the Save button.
Click the Add New... button to add a new Address Reservation entry.
Click the Enable All button to enable all the entries in the table.
Click the Disable All button to disable all the entries in the table.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.
Note: The changes will not take effect until the Router reboots.
Network Sharing Help
You can configure a USB disk drive attached to the Router on this page.
Follow the instructions below to set up your Router as a file server:
  1. Plug an external USB hard disk drive or USB flash drive into this Router.
  2. Click the Rescan button to find the USB drive that has been attached to the Router.
  3. To specify a volume that the Network Sharing users can access, click the Edit link in the Properties column and configure the share settings.
  4. Set the Network Sharing user's username and password on User Accounts page.
  5. Click the Start button to start the Network Sharing service.
  6. Now the Network Sharing users inside your local network can access files on the USB drive from Internet Explorer at its Share Name followed by the Router's LAN IP address, for example: \\192.168.1.1\MyShare.
On this page, you can view volume and share properties such as share name, file system, capacity, used space, and free space, etc.
  • Service Status - Indicates the Network Sharing service's current status.
  • Volume - The volume name of the USB drive the users have access to.
  • Share Name - The specified share name of the volume.
  • File System - The file system on the partition can be FAT32 or NTFS.
  • Capacity - The storage capacity of the USB driver.
  • Used - The used space of the USB driver.
  • Free - The available space of the USB driver.
  • Use% - The percentage of the used space.
  • Permissions - Read-Only or Read/Write access to the volume designated as the share.
  • Shared - Indicates the shared or non-shared status of the volume.
Note:
  1. The Router cannot automatically locate new USB drive. You have to click the Rescan button manually to display a list of volumes and information about them.
  2. The new settings will not take effect until you restart the service.
  3. To unplug the USB drive, click Eject Disk button first. Simply pulling USB drive out of the USB port can cause damage to the device and loss of data.
  4. Mounted volumes are subject to the 8-volume limit. So you cannot access more than 8 volumes on the USB storage device.
  5. NTFS is the recommended file system for Network Sharing because it supports several features that the other file systems do not, such as large files and large volume support.
Click the Start button to start the Network Sharing service.
Click the Stop button to stop the Network Sharing service.
Click the Eject Disk button to safely remove the USB storage device that is connected to USB port. This takes the drive offline. A message will appear on your web browser when it is safe to detach the USB disk.
Click the Rescan button to start a new scan.
User Accounts Help
You can specify the user name and password for Network Sharing users on this page. Network Sharing users can use Internet Explorer to access files on the USB drive.
There are two Network Sharing users that can access the shares. They are Administrator and Guest. Administrator has read/write access while Guest has read-only access.
Only Administrator can use a Web browser to transfer the files from a PC to the Writable shared volume on the USB drive.
  • User Name - Type the user name that you want to give access to the USB drive. The user name must be composed of alphanumeric symbols not exceeding 15 characters in length.
  • Password - Enter the password in the Password field. The password must be composed of alphanumeric symbols not exceeding 15 characters in length. For security purposes, the password for each user account is not displayed.
  • Confirm Password - Re-enter the password here.
Note:
  1. Please restart the service for the new settings to take effect.
  2. If you cannot use the new user name and password to access the shares, press Windows logo + R to open the Run dialog box and type net use \\192.168.1.1 /delete /yes and press Enter. (192.168.1.1 is your Router's LAN IP address.)
Click the Save button to save your settings.
Click the Clear All button to clear all the fields.

Virtual Servers Help

Virtual servers can be used for setting up public services on your LAN. A virtual server is defined as a service port, and all requests from Internet to this service port will be redirected to the computer specified by the server IP. Any PC that was used for a virtual server must have a static or reserved IP address because its IP address may change when using the DHCP function.
  • Service Port - The numbers of External Ports. You can enter a service port or a range of service ports (the format is XXX - YYY, XXX is Start port, YYY is End port).
  • IP Address - The IP address of the PC running the service application.
  • Protocol - The protocol used for this application, either TCP, UDP, or All (all protocols supported by the Router).
  • Status - The status of this entry, "Enabled" means the virtual server entry is enabled.
  • Common Service Port - Some common services already exist in the pull-down list.
  • Modify - To modify or delete an existing entry.
To setup a virtual server entry:
  1. Click the Add New... button.
  2. Select the service you want to use from the Common Service Port list. If the Common Service Port menu does not list the service that you want to use, enter the number of the service port or service port range in the Service Port box.
  3. Enter the IP address of the computer running the service application in the IP Address box.
  4. Select the protocol used for this application in the Protocol box, either TCP, UDP, or All.
  5. Select the Enabled option in the Status pull-down list.
  6. Click the Save button.
Note: It is possible that you have a computer or server that has more than one type of available service. If so select another service, and type the same IP address for that computer or server.
To modify or delete an existing entry:
  1. Find the desired entry in the table.
  2. Click Modify or Delete as desired on the Modify column.
Click the Enable All button to make all entries enabled.
Click the Disable All button to make all entries disabled.
Click the Delete All button to delete all entries.
Click the Next button to go to the next page and Click the Previous button to return to the previous page.

Port Triggering Help

Some applications require multiple connections, like Internet games, video conferencing, Internet telephoning and so on. Port Triggering is used for some of these applications that cannot work with a pure NAT Router.
Once configured, operation is as follows:
  1. A local host makes an outgoing connection to an external host using a destination port number defined in the Trigger Port field.
  2. The Router records this connection, opens the incoming port or ports associated with this entry in the Port Triggering table, and associates them with the local host.
  3. When necessary the external host will be able to connect to the local host using one of the ports defined in the Incoming Ports field.
Rules:
  • Trigger Port - The port for outgoing traffic. An outgoing connection using this port will Trigger this rule.
  • Trigger Protocol - The protocol used for Trigger Ports, either TCP, UDP, or All (all protocols supported by the Router).
  • Incoming Port - The port or port range used by the remote system when it responds to the outgoing request. A response using one of these ports will be forwarded to the PC which triggered this rule. You can input at most 5 groups of ports (or port sections). Every group of ports must be separated with ",". For example, 2000-2038, 2046, 2050-2051, 2085, 3010-3030.
  • Incoming Protocol - The protocol used for Incoming Port, either TCP, UDP, or ALL (all protocols supported by the Router).
  • Status - The status of this entry, Enabled means the Port Triggering entry is enabled.
  • Modify - To modify or delete an existing entry.
  • Common Applications - Some popular applications already listed in the from the pull-down list of Incoming Protocol.
To add a new rule do the following on the Port Triggering screen:
  1. Click the Add New... button.
  2. Enter a port number used by the application to send an outgoing request in the Trigger Port box.
  3. Select the protocol used for the Trigger Port from the pull-down list of Trigger Protocol, either TCP, UDP, or All.
  4. Enter the range of port numbers used by the remote system when it responds to the PC's request in the Incoming Ports box.
  5. Select the protocol used for Incoming Ports range from the pull-down list, either TCP, UDP, or All.
  6. Select the Enabled option in the Status pull-down list.
  7. Click the Save button to save the new rule.
There are many popular applications in the Common Application list. You can select an application and then the boxes of Trigger Port and Incoming Ports will be automatically filled in. This has the same effect as adding a new rule.
To modify or delete an existing entry:
  1. Find the desired entry in the table.
  2. Click Modify or Delete as desired on the Modify column.
Click the Enable All button to enable all entries.
Click the Disable All button to disable all entries.
Click the Delete All button to delete all entries.
Click the Next button to go to the next page and Click the Previous button to return to the previous page.
Note:
  1. When the trigger connection is released the corresponding opened ports will be closed.
  2. Each rule can only be used by one host on the LAN at a time. The trigger connection of other hosts on the LAN will be refused.
  3. Incoming Ports ranges cannot overlap each other.

DMZ Help

The DMZ host feature allows one local host to be exposed to the Internet for a special-purpose service such as Internet gaming or video conferencing. The Router forwards packets of all services to the DMZ host. Any PC that is set to be DMZ host must have its DHCP client function disabled and should have a new static IP address assigned to it because its IP Address may change when using the DHCP function.
To assign a computer or server to be a DMZ server:
  1. Click the Enable button.
  2. Enter the IP address of a local PC that is set to be DMZ host in the DMZ Host IP Address field.
  3. Click the Save button.

UPnP Help

The Universal Plug and Play (UPnP) feature allows the devices, such as Internet computers, to access the local host resources or devices as needed. UPnP devices can be automatically discovered by the UPnP service application on the LAN.
Enable UPnP - UPnP can be enabled or disabled by clicking the Enable or Disable button. This feature is enabled by default.
Current UPnP Settings List:
This table displays the current UPnP information.
  • App Description - The description about the application which initiates the UPnP request.
  • External Port - External port, which the Router opened for the application.
  • Protocol - Which type of protocol is opened.
  • Internal Port - Internal port, which the Router opened for local host.
  • IP Address - The IP address of the local host which initiates the UPnP request.
  • Status - Either Enabled or Disabled, "Enabled" means that port is still active, otherwise, the port is inactive.
Click the Enable button to enable UPnP.
Click the Disable button to disable UPnP.
Click the Refresh button to update the Current UPnP Settings List.

Basic Security Help

You can configure the Basic Security Settings on this page.
Firewall - Here you can enable or disable the Router's firewall.
  • SPI Firewall - Stateful Packet Inspection (SPI) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. SPI Firewall is enabled by factory default. If you want all the computers on the LAN exposed to the outside world, you can disable it.
VPN - VPN Passthrough must be enabled if you want to allow VPN tunnels using VPN protocols to pass through the Router.
  • PPTP Passthrough - PPTP Passthrough. Point-to-Point Tunneling Protocol (PPTP) allows the Point-to-Point Protocol (PPP) to be tunneled through an IP network. To allow PPTP tunnels to pass through the Router, click Enable.
  • L2TP Passthrough - Layer Two Tunneling Protocol (L2TP) is the method used to enable Point-to-Point sessions via the Internet on the Layer Two level. To allow L2TP tunnels to pass through the Router, click Enable.
  • IPSec Passthrough - Internet Protocol security (IPSec) is a suite of protocols for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. To allow IPSec tunnels to pass through the Router, click Enable.
ALG - It is recommended to enable Application Layer Gateway (ALG) because ALG allows customized Network Address Translation (NAT) traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, TFTP, H323 etc.
  • FTP ALG - To allow FTP clients and servers to transfer data across NAT, click Enable.
  • TFTP ALG - To allow TFTP clients and servers to transfer data across NAT, click Enable.
  • H323 ALG - To allow Microsoft NetMeeting clients to communicate across NAT, click Enable.
  • RTSP ALG - To allow some media player clients to communicate with some streaming media servers across NAT, click Enable.
Click the Save button to save your settings.

Advanced Security Help

Using the Advanced Settings page, you can protect the Router from being attacked by TCP-SYN Flood, UDP Flood and ICMP-Flood.
Note: FLOOD Filtering will take effect only when the Traffic Statistics in System Tools is enabled.
  • Packets Statistics interval (5~60) - The default value is 10. Select a value between 5 and 60 seconds in the pull-down list. The Packets Statistic interval value indicates the time section of the packets statistic. The result of the statistic used for analysis by SYN Flood, UDP Flood and ICMP-Flood.
  • DoS Protection - Enable or Disable the DoS protection function. Only when it is enabled, will the flood filters be enabled.
  • Enable ICMP-FLOOD Attack Filtering - Enable or Disable the ICMP-FLOOD Attack Filtering.
  • ICMP-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value between 5 ~ 3600. When the current ICMP-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately.
  • Enable UDP-FLOOD Filtering - Enable or Disable the UDP-FLOOD Filtering.
  • UDP-FLOOD Packets Threshold (5~3600) - The default value is 500. Enter a value between 5 ~ 3600. When the current UPD-FLOOD Packets number is beyond the set value, the Router will startup the blocking function immediately.
  • Enable TCP-SYN-FLOOD Attack Filtering - Enable or Disable the TCP-SYN-FLOOD Attack Filtering.
  • TCP-SYN-FLOOD Packets Threshold (5~3600) - The default value is 50. Enter a value between 5 ~ 3600. When the current TCP-SYN-FLOOD Packets numbers is beyond the set value, the Router will startup the blocking function immediately.
  • Ignore Ping Packet From WAN Port - Enable or Disable Ignore Ping Packet From WAN Port. The default setting is disabled. If enabled, the ping packet from Internet cannot access the Router.
  • Forbid Ping Packet From LAN Port - Enable or Disable Forbid Ping Packet From LAN Port. The default setting is disabled. If enabled, the ping packet from LAN cannot access the Router. (Defends against some viruses).
Click the Save button to save the settings.
Click the Blocked DoS Host List button to display the DoS host table by blocking.

Local Management Help

This page allows you to deny LAN computers from accessing the Router.
By default, the radio button All the PCs on the LAN are allowed to access the Router's Web-Based Utility is selected. If you want to allow PCs with specific MAC Addresses to access the Setup page of the Router's Web-Based Utility locally, from inside the network, click the radio button Only the PCs listed can browse the built-in web pages to perform Administrator tasks, and then enter each MAC Address in a separate field. The format for the MAC Address is XX-XX-XX-XX-XX-XX (X is any hexadecimal digit). Only the PCs with the MAC address listed can use the password to browse the built-in web pages to perform Administrator tasks and all the others will be blocked.
After click the Add button, your PC's MAC Address will be placed in the Control List above.
Click the Save button to save your settings.
Note: If your PC is blocked and you want to access the Router again, use a pin to press and hold the Reset Button on the back panel about 5 seconds to reset the Router's factory defaults in the Router's Web-Based Utility.

Remote Management Help

This feature allows you to manage your Router from a remote location via the Internet.
  • Web Management Port - Web browser access normally uses the standard HTTP service port 80. This Router's default remote management web port number is 80. For greater security, you can change the remote management web port to a custom port by entering that number in the box provided. Choose a number between 1 and 65534 but do not use the number of any common service port.
  • Remote Management IP Address - This is the current address you will use when accessing your Router from the Internet. This function is disabled when the IP address is set to the default value of 0.0.0.0. To enable this function change 0.0.0.0 to a valid IP address. If set to 255.255.255.255, then all the hosts can access the Router from internet.
To access the Router, you should enter your Router's WAN IP address into your browser's address (in IE) or location (in Netscape) box, followed by a colon and the custom port number you set in the Web Management Port box. For example, if your Router's WAN address is 202.96.12.8 and you use port number 8080, enter http://202.96.12.8:8080 in your browser. You will be asked for the Router's password. After successfully entering the password, you will be able to access the Router's web-based utility.
Note:
  1. Be sure to change the Router's default password to a secure password.
  2. If the web management port conflicts with the one used for a Virtual Server entry, the entry will be automatically disabled after the setting is saved.

Parental Control Settings Help

The Router, providing convenient Parental Control function to control the internet activities of the child, can limit the child to access certain websites and restrict the time of surfing. On this page, you can create the rule.
  • Parental Control - Check Enable if you want this function to take effect, otherwise check Disable.
  • MAC Address of Parental PC - In this field, enter the MAC address of the controlling PC, or you can make use of the Copy To Above button below.
  • MAC Address of Your PC - This field displays the MAC address of the PC that is managing this Router. If the MAC Address of your adapter is registered, you can click the Copy To Above button to fill this address to the MAC Address of Parental PC field above.
  • Website Description - Description of the allowed website for the PC controlled.
  • Schedule - The time period allowed for the PC controlled to access the Internet. For detailed information, please go to Access Control > Schedule.
  • Modify - Here you can edit or delete an existing entry.
For example: If you desire that the child PC with MAC address 00-11-22-33-44-AA can access www.google.com on Saturday only while the parent PC with MAC address 00-11-22-33-44-BB is without any restriction, you should follow the settings below:
  1. Click Parental Control menu on the left to enter the Parental Control Settings page. Check Enable and enter the MAC address 00-11-22-33-44-BB in the MAC Address of Parental PC field.
  2. Click Access Control > Schedule on the left to enter the Schedule Settings page. Click Add New... button to create a new schedule with Schedule Description is Schedule_1, Day is Sat and Time is "all day-24 hours".
  3. Click Parental Control menu on the left to go back to the Parental Control Settings page:
  • Click Add New... button.
  • Enter 00-11-22-33-44-AA in the MAC Address of Child PC field.
  • Enter Allow Google in the Website Description field.
  • Enter www.google.com in the Allowed Domain Name field.
  • Select Schedule_1 you create just now from the Effective Time drop-down list.
  • In Status field, select Enable.
  • Click Save to complete the settings.
Then you will go back to the Parental Control Settings page and see the following list:
ID
MAC address
Website Description
Schedule
Status
Modify
1
00-11-22-33-44-AA
Allow Google
Schedule_1
Enabled
Edit/Delete
Click the Add New... button to add a new Parental Control entry.
Click the Enable All button to enable all the rules in the list.
Click the Disable All button to disable all the rules in the list.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Internet Access Control Rule Management Help

The Router, providing convenient and strong internet access control function, can control the internet activities of hosts in the LAN. Moreover, you can flexibly combine the Host List, Target List and Schedule to restrict the Internet surfing of these hosts.
  • Enable Internet Access Control - Select the check box to enable the Internet Access Control function, so the Default Filter Rule can take effect.
  • Rule Name - Here displays the name of the rule and this name is unique.
  • Host - Here displays the host selected in the corresponding rule.
  • Target - Here displays the target selected in the corresponding rule.
  • Schedule - Here displays the schedule selected in the corresponding rule.
  • Action - Here displays the action the Router takes to deal with the packets. It could be Allow or Deny. Allow means that the Router permits the packets to go through the Router. Deny means that the Router rejects the packets to go through the Router.
  • Status - This field displays the status of the rule. Enabled means the rule will take effect, Disabled means the rule will not take effect.
  • Modify - Here you can edit or delete an existing rule.
For example: If you desire to allow the host with MAC address 00-11-22-33-44-AA to access www.google.com only from 18:00 to 20:00 on Saturday and Sunday, and forbid other hosts in the LAN to access the Internet, you should follow the settings below:
  1. Click the submenu Host of Access Control in the left to enter the Host List page. Add a new entry with the Host Description is Host_1 and MAC Address is 00-11-22-33-44-AA.
  2. Click the submenu Target of Access Control in the left to enter the Target List page. Add a new entry with the Target Description is Target_1 and Domain Name is www.google.com.
  3. Click the submenu Schedule of Access Control in the left to enter the Schedule List page. Add a new entry with the Schedule Description is Schedule_1, Day is Sat and Sun, Start Time is 1800 and Stop Time is 2000.
  4. Click the submenu Rule of Access Control in the left to return to the Rule List page. Select Enable Internet Access Control and choose "Deny the packets not specified by any internet access control rule to pass through the Router".
  5. Click Add New... button to add a new rule as follows:
  • In Rule Name field, create a name for the rule. Note that this name should be unique, for example Rule_1.
  • In Host field, select Host_1.
  • In Target field, select Target_1.
  • In Schedule field, select Schedule_1.
  • In Action field, select Allow.
  • In Status field, select Enable.
  • Click Save to complete the settings.
Then you will go back to the Access Control Rule Management page and see the following list:
ID
Rule
Host
Target
Schedule
Action
Status
Modify
1
Rule_1
Host_1
Target_1
Schedule_1
Allow
Enabled
Edit/Delete
Click the Add New... button to add a new host list entry.
Click the Enable All button to enable all the rules in the list.
Click the Disable All button to disable all the rules in the list.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Host Settings Help

The Router, providing convenient and strong Internet Access Control function, can control the Internet activities of the host in the LAN. On this page, you can set a host list which is necessary for the Access Control Rule.
  • Host Description - Here displays the description of the host and this description is unique.
  • Information - Here displays the information about the host. It can be IP or MAC.
  • Modify - To modify or delete an existing entry.
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA, you should first follow the settings below:
  1. Click Add New... button to enter the Host List Settings page.
  2. In Mode field, select MAC Address from the drop-down list.
  3. In Host Name field, create a unique description for the host. (eg. Host_1)
  4. In MAC Address field, enter 00-11-22-33-44-AA.
  5. Click Save to complete the settings.
Then you will go back to the Host page and see the following list:
ID
Host Description
Information
Modify
1
Host_1
MAC: 00-11-22-33-44-AA
Edit/Delete
Click the Add New... button to add a new host list entry.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Target Settings Help

The Router, providing convenient and strong internet access control function, can control the internet activities of hosts in the LAN. On this page, you can create a target list for the host to access or not.
  • Target Description - Here displays the description about the target and this description is unique.
  • Information - The target can be IP address, port, or domain name.
  • Modify - To modify or delete an existing entry.
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA in the LAN to access www.google.com only, you should first follow the settings below:
  1. Click Add New¡­ button to enter the Target List Settings page.
  2. In Mode field, select Domain Name from the drop-down list.
  3. In Target Description field, create a unique description for the target. (eg. Target_1)
  4. In Domain Name field, enter www.google.com.
  5. Click Save to complete the settings.
Then you will go back to the Target page and see the following list:
ID
Target Description
Information
Modify
1
Target_1
www.google.com
Edit/Delete
Click the Add New... button to add a new target entry.
Click the Delete All button to delete all the entries in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Schedule Settings Help

The Router, providing convenient and strong internet access control function, can control the internet activities of hosts in the LAN. You can set schedule lists on this page to control the internet activities of hosts in certain time.
  • Schedule Description - Here displays the description of the schedule and this description is unique.
  • Day - Here displays the day(s) in a week.
  • Time - Here displays the time period in a day.
  • Modify - Here you can edit or delete an existing schedule.
For example: If you desire to restrict the internet activities of host with MAC address 00-11-22-33-44-AA to access www.google.com only from 18:00 to 20:00 on Saturday and Sunday, you should first follow the settings below:
  1. Click Add New... button to enter the Schedule List Settings page.
  2. In Schedule Description field, create a unique description for the schedule, for example Schedule_1.
  3. In Day field, choose Select Days and select Sat and Sun.
  4. In Time field, enter 1800 in Start Time and 2000 in Stop Time.
  5. Click Save to complete the settings.
Then you will go back to the Schedule page and see the following list:
ID
Schedule Description
Day
Time
Modify
1
Schedule_1
Sat Sun
18:00 - 20:00
Edit/Delete
Click the Add New... button to add a new host list entry.
Click the Delete All button to delete all the enties in the table.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Static Routing Help

A static route is a pre-determined path that network information must follow to reach a specific host or network. Use the Static Routing page to add or delete a route.
To add static routing entries:
  1. Click the Add New... button.
  2. Enter the following data:
    • Destination Network - The Destination IP Address is the address of the network or host that you want to assign to a static route.
    • Subnet Mask - The Subnet Mask determines which portion of an IP address is the network portion, and which portion is the host portion.
    • Default Gateway - This is the IP address of the default gateway device that allows for the contact between the Router and the network or host.
  1. Select the Enabled in the Status pull-down list.
  2. Click the Save button to save the changes.
To modify or delete an existing entry:
  1. Find the desired entry in the table.
  2. Click Modify or Delete as desired on the Modify column.
Click the Enable All button to enable all entries.
Click the Disable All button to disable all entries.
Click the Delete All button to delete all entries.

System Routing Table Help

System routing table views all of the valid route entries in use. The Destination IP address, Subnet Mask, Gateway, and Interface will be displayed for each entry. Click the Refresh button to refresh the data displayed.
  • Destination Network - The Destination Network is the address of the network or host to which the static route is assigned.
  • Subnet Mask - The Subnet Mask determines which portion of an IP address is the network portion, and which portion is the host portion.
  • Gateway - This is the IP address of the gateway device that allows for contact between the Router and the network or host.
  • Interface - This interface tells you whether the Destination IP Address is on the LAN & WLAN (internal wired and wireless networks), the WAN(Internet). .

Bandwidth Control Settings Help

In this page you can disable or enable the Bandwidth Control feature. The Bandwidth Control Rules will work properly only when the Bandwidth Control feature is enabled.
  • Enable Bandwidth Control - If enabled, the Bandwidth Control rules will take effect.
  • Egress Bandwidth - The upload speed through the WAN port.
  • Ingress Bandwidth - The download speed through the WAN port.

Bandwidth Control Rules List Help

This page shows the Bandwidth Control rules list.
  • ID - The sequence of entry.
  • Description - The information of description include address range, the port range and protocol of transport layer.
  • Egress Bandwidth - The max upload speed which through the WAN port, default number is 0.
  • Ingress Bandwidth - The max download speed which through the WAN port, default number is 0.
  • Enable - Rule status, show whether the rule takes effect.
  • Modify - Choose to modify or delete an existing entry.

Binding Settings Help

ARP Binding is useful for controlling access of specific computers in the LAN.
  • MAC Address - The MAC address of the controlled computer in the LAN.
  • IP Address - The assigned IP address of the controlled computer in the LAN.
  • Bind - Check this option to enable ARP binding for a specific device.
  • Modify-To modify or delete an existing entry.
  • Add New.. - Click the Add New.. button to add a new entry to the table.
  • Enable All - Click the Enable All button to enable all entries.
  • Disable All - Click the Disable All button to disable all entries.
  • Delete All - Click the Delete All button to delete all entries.
  • Find - To find existed entry you want.
Example: If you want to use binding to assign 192.168.1.4 to PC A (MAC: 00-E0-4C-00-07-BE) and to keep other PCs from using the address. First, enable the "ARP Binding". Then add a new item in the binding table so that the table resembles the one below.
ID
MAC Address
IP Address
Bind
Modify
1
00-E0-4C-00-07-BE
192.168.1.4
Modify  Delete

ARP List Help

You can see IP addresses on the LAN and their associated MAC addresses by viewing the ARP list. Also, you can use the Load and Delete buttons to manage the list.
  • MAC Address - The MAC address of a controlled computer in the LAN.
  • IP Address - The assigned IP address of a controlled computer in the LAN.
  • Status - Indicates whether or not the MAC and IP addresses are bound.
  • Configure - These buttons are for loading or deleting an item.
    • Load - Load the item to the IP & MAC Binding list.
    • Delete - Delete the item from the list.
  • Bind All - Bind all current items. This option is only available when ARP Binding is enabled and saved in the Binding Setting page.
  • Load All - Load all items into the IP & MAC Binding list.
Note: An item can not be loaded to the IP & MAC Binding list if the IP address of the item has been loaded before. Error warning will prompt as well. Likewise, "Load All" only loads the items have no interference with the IP & MAC Binding list.

DDNS Help

The Router offers a Dynamic Domain Name System (DDNS) feature. DDNS lets you assign a fixed host and domain name to a dynamic Internet IP address. It is useful when you are hosting your own website, FTP server, or other server behind the Router. Before using this feature, you need to sign up with DDNS service providers such as www.dyndns.org. The Dynamic DNS client service provider will give you a password or key.
Follow these instructions to set up DDNS:
If your selected dynamic DNS Service Provider is www.dyndns.org.
  1. Enter the User Name for your DDNS account.
  2. Enter the Password for your DDNS account.
  3. Enter the Domain Name you received from dynamic DNS service provider.
  4. Click the Login button to login to the DDNS service.
Connection Status - The status of the DDNS service connection is displayed here.
Click Logout to logout of the DDNS service.
Notice:  If you want to login again with another account after a successful login, please click the Logout button, then input your new username and password and click the Login button.

Time Settings Help

This page allows you to set the time manually or to configure automatic time synchronization. The Router can automatically update the time from an NTP server via the Internet.
Time Zone - Select your local time zone from this pull-down list.
To set time manually:
  1. Select your local time zone.
  2. Enter the Date in Month/Day/Year format.
  3. Enter the Time in Hour/Minute/Second format.
  4. Click Save.
For automatic time synchronization:
  1. Enter the address or domain of the NTP Server I or NTP Server II.
  2. Click the Get GMT button to get GMT from the Internet.
Note:
This setting will be used for some time-based functions such as firewall functions. These time dependant functions will not work if time is not set. So, it is important to specify time settings as soon as you successfully login to the Router.
  1. The time will be lost if the Router is turned off.
  2. The Router will automatically obtain GMT from the Internet if it is configured accordingly.

Diagnostic Tools Help

The diagnostic tools (Ping and Traceroute) allow you to check the connections of your network components.
Diagnostic Tool - Click the radio button to select one diagnostic tool:
  • Ping - This diagnostic tool troubleshoots connectivity, reachability, and name resolution to a given host or gateway by using the Internet Control Message Protocol (ICMP) protocol's mandatory Echo Request datagram to elicit an ICMP Echo Response from a host or gateway. You can use ping to test both numeric IP address or domain name. If pinging the IP address is successful, but pinging the domain name is not, you might have a name resolution problem. In this case, ensure that the domain name you are specifying can be resolved by using Domain Name System (DNS) queries.
  • Traceroute - This diagnostic tool determines the path taken to a given host by sending Internet Control Message Protocol (ICMP) Echo Request messages with varying Time to Live (TTL) values to the destination. Each gateway along the path is required to decrement the TTL in an IP packet by at least 1 before forwarding it. Effectively, the TTL is a maximum link counter. When the TTL on a packet reaches 0, the gateway is expected to return an ICMP Time Exceeded response to your Router. Traceroute determines the path by sending the first Echo Request message with a TTL of 1 and incrementing the TTL by 1 on each subsequent transmission until the target responds or the maximum number of hops is reached. The maximum number of hops is 20 by default and can be specified in the field "Traceroute Max TTL". The path is determined by examining the ICMP Time Exceeded messages returned by intermediate gateways and the Echo Reply message returned by the destination. However, some gateways do not return Time Exceeded messages for packets with expired TTL values and are invisible to the traceroute tool. In this case, a row of asterisks (*) is displayed for that hop.
IP Address/ Domain Name - Enter the IP Address or Domain Name of the PC whose connection you wish to diagnose.
Ping Count - Specifies the number of Echo Request messages sent. The default is 4.
Ping Packet Size - Specifies the number of data bytes to be sent. The default is 64.
Ping Timeout - Time to wait for a response, in milliseconds. The default is 800.
Traceroute Max TTL - Set the maximum number of hops (max TTL to be reached) in the path to search for the target (destination). The default is 20.
Click the Start button to start the diagnostic procedure.
Note:
  1. Only one user can use the diagnostic tools at one time.
  2. "Ping Count", "Ping Packet Size" and "Ping Timeout" are Ping Parameters, and "Traceroute Max TTL" is Traceroute Parameter.

Firmware Upgrade Help

To upgrade the Router's firmware, follow these instructions:
  1. Download a most recent firmware upgrade file from our website ( www.tp-link.com ).
  2. Enter or select the path name where you save the downloaded file on the computer into the File Name blank.
  3. Click the Upgrade button.
  4. The Router will reboot while the upgrading has been finished.
Firmware Version - Displays the current firmware version.
Hardware Version - Displays the current hardware version. The hardware version of the upgrade file must accord with the current hardware version.
Note: The firmware version must correspond to the hardware. The upgrade process takes a few moments and the Router restarts automatically when the upgrade is complete. It is important to keep power applied during the entire process. Loss of power during the upgrade could damage the Router.

Factory Defaults Help

Click the Restore button to reset all configuration settings to their default values.
  • Default User Name - admin.
  • Default Password - admin.
  • Default IP Address - 192.168.1.1.
  • Default Subnet Mask - 255.255.255.0.
Note: All changed settings will be lost when defaults are restored.

Backup & Restore Help

Click the Backup button to save all configuration settings to your local computer as a file.
To restore the Router's configuration, follow these instructions:
  • Click the Browse button to find the configuration file which you want to restore.
  • Click the Restore button to update the configuration with the file whose path is the one you have input or selected in the blank.
Note: The current configuration will be covered with the uploading configuration file. Wrong process will lead the device unmanaged. The restoring process lasts for 20 seconds and the Router will restart automatically then. Keep the power of the Router on during the process, in case of any damage.

Reboot Help

Click the Reboot button to reboot the Router.
Some settings of the Router will take effect only after rebooting, which include:
  • Change the LAN IP Address (system will reboot automatically).
  • Change the DHCP Settings.
  • Change the Wireless configurations.
  • Change the Web Management Port.
  • Upgrade the firmware of the Router (system will reboot automatically).
  • Restore the Router's settings to the factory defaults (system will reboot automatically).
  • Update the configuration with the file (system will reboot automatically).

Password Help

It is strongly recommended that you change the factory default user name and password of the Router. All users who try to access the Router's web-based utility will be prompted for the Router's user name and password.
Note: The new user name and password must not exceed 14 characters in length and must not include any spaces. Enter the new Password twice to confirm it.
Click the Save button when finished.
Click the Clear Allbutton to clear all.

System Log Help

  • Auto Mail Feature - Indicates whether auto mail feature is enabled or not.
  • Mail Settings - Set the receiving and sending mailbox address, server address, validation information as well as the timetable for Auto Mail Feature.
  • Log Type - By selecting the log type, only logs of this type will be shown.
  • Log Level - By selecting the log level, only logs of this level will be shown.
  • Refresh - Refresh the page to show the latest log list.
  • Save Log - Click to save all the logs in a txt file.
  • Mail Log - Click to send an email of current logs manually according to the address and validation information set in Mail Settings. The result will be shown in the later log soon.
  • Clear Log - All the logs will be deleted from the Router permanently, not just from the page.
Click the Next button to go to the next page, or click the Previous button return to the previous page.

Statistics Help

The Statistics page shows the network traffic of each PC on the LAN, including total traffic and the value of the last Packets Statistic interval in seconds.
  • Current Statistics Status - Enabled or Disabled. The default value is disabled. To enable, click the Enable button. If disabled, the function of DoS protection in Security settings will be disabled.
  • Packets Statistics Interval - The default value is 10. Select a value between 5 and 60 seconds in the pull-down list. The Packets Statistic interval value indicates the time section of the packets statistic.
  • Sorted Rules- Choose how displayed statistics are sorted.
  • Click the Auto-refresh checkbox to refresh automatically.
  • Click the Refresh button to refresh the page.
  • Click the Reset All button to reset the values of all entries to zero.
  • Click the Delete All button to delete all entries in the table.
Statistics Table
  • IP Address/MAC Address - The IP Address and MAC address are displayed with related statistics.
  • Total
  • Packets - The total number of packets received and transmitted by the Router.
  • Bytes - The total number of bytes received and transmitted by the Router.
  • Current
    • Packets - The total number of packets received and transmitted in the last Packets Statistics interval seconds.
    • Bytes - The total number of bytes received and transmitted in the last Packets Statistics interval seconds.
    • ICMP Tx - The number of ICMP packets transmitted to the WAN per second at the specified Packets Statistics interval. It is shown like "current transmitting rate / Max transmitting rate".
    • UDP Tx - The number of UDP packets transmitted to the WAN per second at the specified Packets Statistics interval. It is shown like "current transmitting rate / Max transmitting rate".
    • TCP SYN Tx - The number of TCP SYN packets transmitted to the WAN per second at the specified Packets Statistics interval. It is shown like "current transmitting rate / Max transmitting rate".
  • Modify
    • Reset - Reset the values of the entry to zero.
    • Delete - Delete the existing entry in the table.