WR 6895
WR 6895
Wireless Router
User Manual
This manual provides information related to the installation and operation of this
device. The individual reading this manual is presumed to have a basic
understanding of telecommunications terminology and concepts.
For product update, new product release, manual revision, or software upgrades,
please visit our website at http://www.comtrend.com
Do not use or install this product near water, to avoid fire or shock hazard. For
example, near a bathtub, kitchen sink or laundry tub, or near a swimming pool.
Also, do not expose the equipment to rain or damp areas (e.g. a wet basement).
Do not connect the power supply cord on elevated surfaces. Allow it to lie freely.
There should be no obstructions in its path and no heavy items should be placed
on the cord. In addition, do not walk on, step on, or mistreat the cord.
Use only the power cord and adapter that are shipped with this device.
To safeguard the equipment against overheating, make sure that all openings in
the unit that offer exposure to air are not blocked.
Avoid using a telephone (other than a cordless type) during an electrical storm.
There may be a remote risk of electric shock from lightening. Also, do not use
the telephone to report a gas leak in the vicinity of the leak.
Never install telephone wiring during stormy weather conditions.
CAUTION:
To reduce the risk of fire, use only No. 26 AWG or larger
telecommunication line cord.
Always disconnect all telephone lines from the wall outlet before servicing
or disassembling this equipment.
WARNING
This program is free software: you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation, either version 3 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
details.
You should have received a copy of the GNU General Public License
along with this program. If not, see http://www.gnu.org/licenses/
This symbol indicates that when the equipment has reached the end of
its useful life, it must be taken to a recycling centre and processed
separate from domestic waste.
The cardboard box, the plastic contained in the packaging, and the parts that make
up this router can be recycled in accordance with regionally established regulations.
Never dispose of this electronic equipment along with your household waste; you
may be subject to penalties or sanctions under the law. Instead, please be
responsible and ask for disposal instructions from your local government.
WR-6895 has a USB3.0 host port which provides high speed access for USB devices
such as printer server, 3G dongle, HDD, and supports DLNA and samba accessibility.
Non-stackable
This device is not stackable – do not place units on top of each other, otherwise
damage could occur.
BACK PANEL
Power ON
Press the power button to the OFF position (OUT). Connect the power adapter to the
power port. Attach the power adapter to a wall outlet or other AC source. Press the
power button to the ON position (IN). If the Power LED displays as expected then
the device is ready for setup (see section 2.2 LED Indicators).
Caution 1: If the device fails to power up, or it malfunctions, first verify that the
power cords are connected securely and then power it on again. If the
problem persists, contact technical support.
Caution 2: Before servicing or disassembling this equipment, disconnect all power
cords and telephone lines from their outlets.
Reset Button
Restore the default parameters of the device by pressing the Reset button for 10
seconds. After the device has rebooted successfully, the front panel should display
as expected (see section 2.2 LED Indicators for details).
NOTE: If pressed down for more than 60 seconds, the WR-6895 will go into a
firmware update state (CFE boot mode). The firmware can then be
updated using an Internet browser pointed to the default IP address.
FRONT PANEL
10
Technical Note
During power on, the device initializes all settings to default values. It will then
read the configuration profile from the permanent storage section of flash memory.
The default attributes are overwritten when identical attributes with different values
are configured. The configuration profile in permanent storage can be created via
the web user interface or telnet user interface, or other management protocols.
The factory default configuration can be restored either by pushing the reset button
for more than ten seconds until the power indicates LED blinking or by clicking the
Restore Default Configuration option in the Restore Settings screen.
11
When the WR-6895 powers up, the onboard DHCP server will switch on. Basically,
the DHCP server issues and reserves IP addresses for LAN devices, such as your PC.
To obtain an IP address from the DCHP server, follow the steps provided below.
NOTE: The following procedure assumes you are running Windows. However,
the general steps involved are similar for most operating systems (OS).
Check your OS support documentation for further details.
STEP 1: From the Network Connections window, open Local Area Connection (You
may also access this screen by double-clicking the Local Area Connection
icon on your taskbar). Click the Properties button.
STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.
STEP 3: Select Obtain an IP address automatically as shown below.
If you experience difficulty with DHCP mode, you can try static IP mode instead.
12
NOTE: The following procedure assumes you are running Windows. However,
the general steps involved are similar for most operating systems (OS).
Check your OS support documentation for further details.
STEP 1: From the Network Connections window, open Local Area Connection (You
may also access this screen by double-clicking the Local Area Connection
icon on your taskbar). Click the Properties button.
STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.
STEP 3: Change the IP address to the 192.168.1.x (1<x<255) subnet with subnet
mask of 255.255.255.0. The screen should now display as shown below.
13
NOTE: The default settings can be found in section 3.1 Default Settings.
STEP 1: Start the Internet browser and enter the default IP address for the device
in the Web address field. For example, if the default IP address is
192.168.1.1, type http://192.168.1.1.
NOTE: For local administration (i.e. LAN access), the PC running the browser
must be attached to the Ethernet, and not necessarily to the device.
For remote access (i.e. WAN), use the IP address shown on the Device
Information screen and login with remote username and password.
STEP 2: A dialog box will appear, such as the one below. Enter the default
username and password, as defined in section 3.1 Default Settings.
Click OK to continue.
NOTE: The login password can be changed later (see section 8.6.1 Accounts).
14
You can also reach this page by clicking on the following icon located at the top of
the screen.
15
The web user interface window is divided into two frames, the main menu (on the
left) and the display screen (on the right). The main menu has several options and
selecting each of these options opens a submenu with more selections.
NOTE: The menu items shown are based upon the configured connection(s) and
user account privileges. For example, user account has limited access to
configuration modification.
Device Info is the first selection on the main menu so it will be discussed first.
Subsequent chapters will introduce the other main menu options in sequence.
This screen shows hardware, software, IP settings and other related information.
16
Heading Description
Interface Name of the interface for WAN
Description Name of the WAN connection
Type Shows the connection type
VlanMuxId Shows 802.1Q VLAN ID
IPv6 Shows WAN IPv6 status
Igmp Pxy Shows Internet Group Management Protocol (IGMP)
proxy status
Igmp Src Enbl Shows the status of WAN interface used as IGMP source
MLD Pxy Shows Multicast Listener Discovery (MLD) proxy status
MLD Src Enbl Shows the status of WAN interface used as MLD source
NAT Shows Network Address Translation (NAT) status
Firewall Shows the status of Firewall
Status Lists the status of DSL link
IPv4 Address Shows WAN IPv4 address
IPv6 Address Shows WAN IPv6 address
17
This screen shows data traffic statistics for each LAN interface.
Heading Description
Interface LAN interface(s)
Received/Transmitted: - Bytes Number of Bytes
- Pkts Number of Packets
- Errs Number of packets with errors
- Drops Number of dropped packets
18
This screen shows data traffic statistics for each WAN interface.
Heading Description
Interface WAN interfaces
Description WAN service label
Received/Transmitted - Bytes Number of Bytes
- Pkts Number of Packets
- Errs Number of packets with errors
- Drops Number of dropped packets
19
Field Description
Destination Destination network or destination host
Gateway Next hop IP address
Subnet Mask Subnet Mask of Destination
Flag U: route is up
!: reject route
G: use gateway
H: target is a host
R: reinstate route for dynamic routing
D: dynamically installed by daemon or redirect
M: modified from routing daemon or redirect
Metric The 'distance' to the target (usually counted in hops). It is not
used by recent kernels, but may be needed by routing daemons.
Service Shows the WAN connection label
Interface Shows connection interfaces
20
Field Description
IP address Shows IP address of host PC
Flags Complete, Incomplete, Permanent, or Publish
HW Address Shows the MAC address of host PC
Device Shows the connection interface
4.5 DHCP
Click DHCP to display all DHCP Leases.
Field Description
Hostname Shows the device/host/PC network name
MAC Address Shows the Ethernet MAC address of the device/host/PC
IP Address Shows IP address of device/host/PC
Expires In Shows how much time is left for each DHCP Lease
21
22
Field Description
Source IP The source IP from which the NAT session is established
Source Port The source port from which the NAT session is established
Destination IP The IP which the NAT session was connected to
Destination Port The port which the NAT session was connected to
Protocol The Protocol used in establishing the particular NAT session
Timeout The time remaining for the TCP/UDP connection to be active
23
Field Description
Interface The Source interface from which the IGMP report was received
WAN The WAN interface from which the multicast traffic is received
Groups The destination IGMP group address
Member The Source IP from which the IGMP report was received
Timeout The time remaining before the IGMP report expires
24
Field Description
Interface WAN interface with IPv6 enabled
Status Connection status of the WAN interface
Address IPv6 Address of the WAN interface
Prefix Prefix received/configured on the WAN interface
Device Link-local Address The CPE's LAN Address
Default IPv6 Gateway The default WAN IPv6 gateway
IPv6 DNS Server The IPv6 DNS servers received from the WAN interface
/ configured manually
25
Field Description
IPv6 Address Ipv6 address of the device(s) found
Flags Status of the neighbor device
HW Address MAC address of the neighbor device
Device Interface from which the device is located
26
Field Description
Destination Destination IP Address
Gateway Gateway address used for destination IP
Metric Metric specified for gateway
Interface Interface used for destination IP
27
Displays the system performance graphs. Shows the current loading of the CPU and
memory usage with dynamic updates.
28
4.11 Wireless
4.11.1 Station Info
This page shows authenticated wireless stations and their status. Click the Refresh
button to update the list of stations in the WLAN.
29
Field Description
MAC Lists the MAC address of all the stations.
Associated Lists all the stations that are associated with the Access
Point, along with the amount of time since packets were
transferred to and from each station. If a station is idle for
too long, it is removed from this list.
Authorized Lists those devices with authorized access.
SSID Lists which SSID of the modem that the stations connect
to.
Interface Lists which interface of the modem that the stations
connect to.
30
31
Click Add to create a new Layer 2 Interface (see Appendix F - Connection Setup).
32
Click the Add button to create a new connection. For connections on ETH WAN
interfaces see Appendix F - Connection Setup.
To remove a connection, select its Remove column radio button and click Remove.
Heading Description
Interface Name of the interface for WAN
Description Name of the WAN connection
Type Shows the connection type
Vlan8021p VLAN ID is used for VLAN Tagging (IEEE 802.1Q)
VlanMuxId Shows 802.1Q VLAN ID
VlanTpid VLAN Tag Protocol Identifier
IGMP Proxy Shows Internet Group Management Protocol (IGMP) Proxy
status
IGMP Source Shows the status of WAN interface used as IGMP source
NAT Shows Network Address Translation (NAT) status
Firewall Shows the Security status
IPv6 Shows the WAN IPv6 address
MLD Proxy Shows Multicast Listener Discovery (MLD) Proxy status
Mld Source Shows the status of WAN interface used as MLD source
Remove Select interfaces to remove
Edit Click the Edit button to make changes to the WAN interface.
To remove a connection, select its Remove column radio button and click Remove.
33
34
Field/Header Description
Choose All Interface Virtual server rules will be created for all WAN interfaces.
35
Some applications require that specific ports in the firewall be opened for access by
the remote parties. Port Triggers dynamically 'Open Ports' in the firewall when an
application on the LAN initiates a TCP/UDP connection to a remote party using the
'Triggering Ports'. The Router allows the remote party from the WAN side to
establish new connections back to the application on the LAN side using the 'Open
Ports'. A maximum 32 entries can be configured.
36
37
The DSL router will forward IP packets from the WAN that do not belong to any of
the applications configured in the Virtual Servers table to the DMZ host computer.
To Activate the DMZ host, enter the DMZ host IP address and click Save/Apply.
To Deactivate the DMZ host, clear the IP address field and click Save/Apply.
Enable NAT Loopback allows PC on the LAN side to access servers in the LAN
network via the router’s WAN IP.
38
Field/Header Description
Rule The number of the rule
Type Mapping type from local to public.
Local Start IP The beginning of the local IP
Local End IP The ending of the local IP
Public Start IP The beginning of the public IP
Public End IP The ending of the public IP
Remove Remove this rule
39
To allow/deny the corresponding ALG protocol, select Enable / Disable and then click
the Save button. After reboot, the protocol will be added/removed from the
system module.
40
Subnet Mask: Enter the subnet mask for the LAN port.
41
Blocking Mode: In blocking mode, the multicast data traffic will be blocked and not
flood to all bridge ports when there are no client subscriptions to any
multicast group.
Enable IGMP LAN to LAN Multicast: Select Enable from the drop-down menu to
allow IGMP LAN to LAN Multicast forwarding
DHCP Server: To enable DHCP, select Enable DHCP server and enter Start and
End IP addresses and the Leased Time. This setting configures the
router to automatically assign IP, default gateway and DNS server
addresses to every PC on your LAN.
Setting TFTP Server: Enable by ticking the checkbox . Then, input the TFTP
server address or an IP address.
To add an entry, enter MAC address and Static IP address and then click
Apply/Save.
To remove an entry, tick the corresponding checkbox in the Remove column and
then click the Remove Entries button, as shown below.
42
To configure a secondary IP address, tick the checkbox outlined (in RED) below.
Configure auto negotiation, or enforce selected speed and duplex mode for the
Ethernet ports.
43
44
Heading Description
EUI-64 Use EUI-64 algorithm to calculate link-local address from MAC
address
User Setting Use the Interface Identifier field to define a link-local address
Heading Description
Interface Address Configure static LAN IPv6 address and subnet prefix
(prefix length is length
required):
Heading Description
Stateless Use stateless configuration
Refresh Time (sec): The information refresh time option specifies how long a
client should wait before refreshing information retrieved
from DHCPv6
Stateful Use stateful configuration
Start interface ID: Start of interface ID to be assigned to dhcpv6 client
End interface ID: End of interface ID to be assigned to dhcpv6 client
Leased Time (hour): Lease time for dhcpv6 client to use the assigned IP address
To add an entry, enter MAC address and Interface ID and then click Apply/Save.
45
Heading Description
Enable RADVD Enable use of router advertisement daemon
RA interval Min(sec): Minimum time to send router advertisement
RA interval Max(sec): Maximum time to send router advertisement
Reachable Time(ms): The time, in milliseconds that a neighbor is
reachable after receiving reachability
confirmation
Default Preference: Preference level associated with the default
router
MTU (bytes): MTU value used in router advertisement
messages to insure that all nodes on a link use
the same MTU value
Enable Prefix Length Relay Use prefix length receive from WAN interface
Enable Configuration Mode Manually configure prefix, prefix length,
preferred lifetime and valid lifetime used in
router advertisement
Enable ULA Prefix Advertisement Allow RADVD to advertise Unique Local Address
Prefix
Randomly Generate Use a Randomly Generated Prefix
Statically Configure Prefix Specify the prefix to be used
Preferred Life Time (hour) The preferred life time for this prefix
Valid Life Time (hour) The valid life time for this prefix
Enable MLD Snooping Enable/disable IPv6 multicast forward to LAN
ports
Standard Mode In standard mode, IPv6 multicast traffic will
Blocking Mode flood to all bridge ports when no client
subscribes to a multicast group even if MLD
snooping is enabled
46
This page is used to configure a static IPv4 or IPv6 Neighbor entry. Static ARP
entries will be created for these neighbor devices.
Heading Description
IP Version The IP version used for the neighbor device
IP Address Define the IP Address for the neighbor device
MAC Address The MAC Address of the neighbor device
Associated Interface The interface where the neighbor device is located
47
Select the checkbox provided and click Apply/Save to enable UPnP protocol.
48
The Basic option allows you to configure basic features of the wireless LAN interface.
Among other things, you can enable or disable the wireless LAN interface, hide the
network from active scans, set the wireless network name (also known as SSID)
and restrict the channel set based on country requirements.
Option Description
Enable A checkbox that enables or disables the wireless LAN interface.
Wireless When selected, a set of basic wireless options will appear.
49
50
WIRELESS SECURITY
Setup requires that the user configure these settings using the Web User Interface
(see the table below).
Select SSID
Select the wireless network name from the drop-down menu. SSID stands for
Service Set Identifier. All stations must be configured with the correct SSID to
access the WLAN. If the SSID does not match, that client will not be granted access.
Network Authentication
This option specifies whether a network key is used for authentication to the
wireless network. If network authentication is set to Open, then no authentication
is provided. Despite this, the identity of the client is still verified.
Each authentication type has its own settings. For example, selecting 802.1X
authentication will reveal the RADIUS Server IP address, Port and Key fields. WEP
Encryption will also be enabled as shown below.
51
WEP Encryption
This option specifies whether data sent over the network is encrypted. The same
network key is used for data encryption and network authentication. Four network
keys can be defined although only one can be used at any one time. Use the Current
Network Key list box to select the appropriate network key.
Security options include authentication and encryption services based on the wired
equivalent privacy (WEP) algorithm. WEP is a set of security services used to
protect 802.11 networks from unauthorized access, such as eavesdropping; in this
case, the capture of wireless network traffic.
When data encryption is enabled, secret shared encryption keys are generated and
used by the source station and the destination station to alter frame bits, thus
avoiding disclosure to eavesdroppers.
Under shared key authentication, each wireless station is assumed to have received
a secret shared key over a secure channel that is independent from the 802.11
wireless network communications channel.
52
Please see 6.11 for MAC Filter, Wireless Bridge and Advanced Wireless features.
The Basic option allows you to configure basic features of the wireless LAN interface.
Among other things, you can enable or disable the wireless LAN interface, hide the
network from active scans, set the wireless network name (also known as SSID)
and configure the channel setting for the wireless LAN interface.
Option Description
Enable A checkbox that enables or disables the wireless LAN interface.
Wireless When selected, a set of basic wireless options will appear.
53
Please see 6.11 for MAC Filter, Wireless Bridge and Advanced Wireless features.
54
See below for field descriptions. Click Apply/Save to add a time restriction.
55
This screen allows for the creation of a filter rule for access rights to websites based
on their URL address and port number.
Tick the Exclude radio button to deny access to the websites listed.
Tick the Include radio button to restrict access to only those listed websites.
Enter the URL address and port number then click Apply/Save to add the entry to
the URL filter. URL Addresses begin with “www”, as shown in this example.
56
57
Please reference Appendix E to see the procedure for enabling the Printer Server.
5.6.2 DLNA
Enabling DLNA allows users to share digital media, like pictures, music and video, to
other LAN devices from the digital media server.
Insert the USB drive into the USB host port on the back of the router.
Click Enable on-board digital media server, a dropdown list of directories found on
the USB driver will be available for selection. Select media path from the
drop-down list or manually modify the media library path and click Apply/Save to
enable the DLNA media server.
58
Enabling Samba service allows the user to share files on the storage
device. Different levels of user access can be configured after samba security mode
is enabled. This page also displays storage devices attached to the USB host.
59
This page allows you to enable / disable USB 3.0 device support.
Note: Enabling USB 3.0 can cause interference with the built-in 2.4GHz wireless
radio. It is advised leaving the default value as USB 2.0
60
You can reach this page by clicking on the following icon located at the top of the
screen.
The Auto Detection page simply provides a checkbox allowing users to enable or
disable the feature. Check the checkbox to display the following configuration
options.
61
62
Options for each WAN service: These options are selectable for each WAN
service. Users can pre-configure both WAN services and other provided settings to
meet their deployed requirements.
63
The Auto-detection status is used to display the real time status of the
Auto-detection feature.
The Restart button is used to detect all the WAN services that are either detected
by the auto-detection feature or configured manually by users.
The following window will pop up upon clicking the Restart button. Click the OK
button to proceed.
Note: The following description concerning ETHWAN is for multiple LAN port devices
only.
1) This feature will automatically detect one WAN service only. If customers require
multiple WAN services, manual configuration is required.
2) If a physical ETHWAN port is detected, the Auto Detection for ETHWAN will be
fixed on the physical ETHWAN port and cannot be configured for any LAN port;
if the physical ETHWAN port is not detected, the Auto Detection for ETHWAN will
be configured to the 4th LAN port by default and allows it to be configured for any
LAN port as well.
3) For cases in which both the DSL port and ETHWAN port are plugged in at the
same time, the DSL WAN will have priority over ETHWAN. For example, the
ETHWAN port is plugged in with a WAN service detected automatically and then
the DSL port is plugged in and linked up. The Auto Detection feature will clear
the WAN service for ETHWAN and re-detect the WAN service for DSL port.
4) If none of the pre-configured services are detected, a Bridge service will be
created.
64
6.2.1 IP Filtering
This screen sets filter rules that limit IP traffic (Outgoing/Incoming). Multiple filter
rules can be set and each applies at least one limiting condition. For individual IP
packets to pass the filter all conditions must be fulfilled.
NOTE: This function is not available when in bridge mode. Instead, MAC Filtering
performs a similar function.
OUTGOING IP FILTER
By default, all outgoing IP traffic is allowed, but IP traffic can be blocked with filters.
To add a filter (to block some outgoing IP traffic), click the Add button.
On the following screen, enter your filter criteria and then click Apply/Save.
65
INCOMING IP FILTER
By default, all incoming IP traffic is blocked, but IP traffic can be allowed with filters.
To add a filter (to allow incoming IP traffic), click the Add button.
On the following screen, enter your filter criteria and then click Apply/Save.
66
Field Description
Filter Name The filter rule label.
IP Version Select from the drop down menu.
Protocol TCP, TCP/UDP, UDP, or ICMP.
Policy Permit/Drop packets specified by the firewall
rule.
Source IP address Enter source IP address.
Source Port (port or port:port) Enter source port number or range.
Destination IP address Enter destination IP address.
Destination Port (port or port:port) Enter destination port number or range.
At the bottom of this screen, select the WAN and LAN Interfaces to which the filter
rule will apply. You may select all or just a subset. WAN interfaces in bridge mode or
without firewall enabled are not available.
67
68
Each network device has a unique 48-bit MAC address. This can be used to filter
(block or forward) packets based on the originating device. MAC filtering policy and
rules for the WR-6895 can be set according to the following procedure.
The MAC Filtering Global Policy is defined as follows. FORWARDED means that all
MAC layer frames will be FORWARDED except those matching the MAC filter rules.
BLOCKED means that all MAC layer frames will be BLOCKED except those
matching the MAC filter rules. The default MAC Filtering Global policy is
FORWARDED. It can be changed by clicking the Change Policy button.
Choose Add or Remove to configure MAC filtering rules. The following screen will
appear when you click Add. Create a filter to identify the MAC layer frames by
specifying at least one condition below. If multiple conditions are specified, all of
them must be met.
69
Field Description
Protocol Type PPPoE, IPv4, IPv6, AppleTalk, IPX, NetBEUI, IGMP
Destination MAC Address Defines the destination MAC address
Source MAC Address Defines the source MAC address
Frame Direction Select the incoming/outgoing packet interface
WAN Interfaces Applies the filter to the selected bridge interface
70
To Enable QoS tick the checkbox and select a Default DSCP Mark.
Default Differentiated Services Code Point (DSCP) Mark: This specifies the per hop
behavior for a given flow of packets in the Internet Protocol (IP) header that do not
match any other QoS rule.
71
72
The Enable button will scan through every queue in the table. Queues with the
enable-checkbox checked will be enabled. Queues with the enable-checkbox
un-checked will be disabled.
The enable-checkbox also shows status of the queue after page reload.
Note that if WMM function is disabled in the Wireless Page, queues related to
wireless will not take effect. This function follows the Differentiated Services rule of
IP QoS. You can create a new Queue entry by clicking the Add button.
Enable and assign an interface and precedence on the next screen. Click
Save/Reboot on this screen to activate it.
74
75
Displays the list of available wireless queues for WMM and wireless data transmit
priority.
76
Click Add to configure a network traffic class rule and Enable to activate it. To
delete an entry from the list, click Remove.
This screen creates a traffic class rule to classify the upstream traffic, assign
queuing priority and optionally overwrite the IP header DSCP byte. A rule consists of
a class name and at least one logical condition. All the conditions specified in the
rule must be satisfied for it to take effect.
77
78
79
NOTE: In bridge mode, the RIP menu option is hidden while the other menu
options are shown but ineffective.
The default gateway interface list can have multiple WAN interfaces served as
system default gateways but only one will be used according to the priority with the
first being the highest and the last one the lowest priority if the WAN interface is
connected. Priority order can be changed by removing all and adding them back in
again.
80
81
On the following screen, complete the form and click Apply/Save to create a policy.
Field Description
Policy Name Name of the route policy
Physical LAN Port Specify the port to use this route policy
Source IP IP Address to be routed
Use Interface Interface that traffic will be directed to
Default Gateway IP IP Address of the default gateway
82
To activate RIP, configure the RIP version/operation mode and select the Enabled
checkbox for at least one WAN interface before clicking Save/Apply.
83
84
To add a dynamic DNS service, click Add. The following screen will display.
Field Description
D-DNS provider Select a dynamic DNS provider from the list
Hostname Enter the name of the dynamic DNS server
Interface Select the interface from the list
Username Enter the username of the dynamic DNS server
Password Enter the password of the dynamic DNS server
85
Choose Add or Remove to configure DNS Entry. The entries will become active after
save/reboot.
Enter the domain name and IP address that needs to be resolved locally, and click
the Add Entry button.
86
DNS proxy receives DNS queries and forwards DNS queries to the Internet. After the
CPE gets answers from the DNS server, it replies to the LAN clients. Configure DNS
proxy with the default setting, when the PC gets an IP via DHCP, the domain name,
Home, will be added to PC’s DNS Suffix Search List, and the PC can access route with
“Comtrend.Home”.
87
To add an Interface Group, click the Add button. The following screen will appear.
It lists the available and grouped interfaces. Follow the instructions shown
onscreen.
88
Add support to automatically map LAN interfaces to PVC's using DHCP vendor ID
(option 60). The local DHCP server will decline and send the requests to a remote
DHCP server by mapping the appropriate LAN interface. This will be turned on when
Interface Grouping is enabled.
For example, imagine there are 4 PVCs (0/33, 0/36, 0/37, 0/38). VPI/VCI=0/33 is
for PPPoE while the other PVCs are for IP set-top box (video). The LAN interfaces are
ETH1, ETH2, ETH3, and ETH4.
89
If the onboard DHCP server is running on "Default" and the remote DHCP server is
running on PVC 0/36 (i.e. for set-top box use only). LAN side clients can get IP
addresses from the CPE's DHCP server and access the Internet via PPPoE (0/33).
If a set-top box is connected to ETH1 and sends a DHCP request with vendor ID
"Video", the local DHCP server will forward this request to the remote DHCP server.
The Interface Grouping configuration will automatically change to the following:
90
Options Description
Tunnel Name Input a name for the tunnel
Mechanism Mechanism used by the tunnel deployment
Associated WAN Interface Select the WAN interface to be used by the tunnel
Associated LAN Interface Select the LAN interface to be included in the tunnel
Manual/Automatic Select automatic for point-to-multipoint tunneling /
manual for point-to-point tunneling
IPv4 Mask Length The subnet mask length used for the IPv4 interface
6rd Prefix with Prefix Length Prefix and prefix length used for the IPv6 interface
Border Relay IPv4 Address Input the IPv4 address of the other device
91
Options Description
Tunnel Name Input a name for the tunnel
Mechanism Mechanism used by the tunnel deployment
Associated WAN Interface Select the WAN interface to be used by the tunnel
Associated LAN Interface Select the LAN interface to be included in the tunnel
Manual/Automatic Select automatic for point-to-multipoint tunneling /
manual for point-to-point tunneling
AFTR Address of Address Family Translation Router
92
6.8.1 Local
93
IMPORT CERTIFICATE
Click Import Certificate to paste the certificate content and the private key
provided by your vendor/ISP/ITSP into the corresponding boxes shown below.
Enter a certificate name and click the Apply button to import the certificate and its
private key.
94
Click Import Certificate to paste the certificate content of your trusted CA. The
CA certificate content will be provided by your vendor/ISP/ITSP and is used to
authenticate the Auto-Configuration Server (ACS) that the CPE will connect to.
95
96
Multicast Precedence:
Select precedence of multicast packets.
Field Description
Default Version Define IGMP using version with video server.
Query Interval The query interval is the amount of time in seconds
between IGMP General Query messages sent by the
router (if the router is the querier on this subnet). The
default query interval is 125 seconds.
97
98
The Basic option allows you to configure basic features of the wireless LAN interface.
Among other things, you can enable or disable the wireless LAN interface, hide the
network from active scans, set the wireless network name (also known as SSID)
and restrict the channel set based on country requirements.
99
100
WIRELESS SECURITY
Setup requires that the user configure these settings using the Web User Interface
(see the table below).
Select SSID
Select the wireless network name from the drop-down menu. SSID stands for
Service Set Identifier. All stations must be configured with the correct SSID to
access the WLAN. If the SSID does not match, that client will not be granted access.
Network Authentication
This option specifies whether a network key is used for authentication to the wireless
network. If network authentication is set to Open, then no authentication is
provided. Despite this, the identity of the client is still verified.
Each authentication type has its own settings. For example, selecting 802.1X
authentication will reveal the RADIUS Server IP address, Port and Key fields. WEP
Encryption will also be enabled as shown below.
101
Select the Current Network Key and enter 13 ASCII characters or 26 hexadecimal
digits for 128-bit encryption keys and enter 5 ASCII characters or 10 hexadecimal
digits for 64-bit encryption keys.
Choosing WPA2-PSK, you must enter WPA Pre-Shared Key and Group Rekey
Interval.
WEP Encryption
This option specifies whether data sent over the network is encrypted. The same
network key is used for data encryption and network authentication. Four network
keys can be defined although only one can be used at any one time. Use the Current
Network Key list box to select the appropriate network key.
102
Under shared key authentication, each wireless station is assumed to have received
a secret shared key over a secure channel that is independent from the 802.11
wireless network communications channel.
Encryption Strength
This drop-down list box will display when WEP Encryption is enabled. The key
strength is proportional to the number of binary bits comprising the key. This
means that keys with a greater number of bits have a greater degree of security and
are considerably more difficult to crack. Encryption strength can be set to either
64-bit or 128-bit. A 64-bit key is equivalent to 5 ASCII characters or 10
hexadecimal numbers. A 128-bit key contains 13 ASCII characters or 26
hexadecimal numbers. Each key contains a 24-bit header (an initiation vector)
which enables parallel decoding of multiple streams of encrypted data.
103
Wi-Fi Protected Setup (WPS) is an industry standard that simplifies wireless security
setup for certified network devices. Every WPS certified device has both a PIN
number and a push button, located on the device or accessed through device
software. The WR-6895 has a WPS button on the device.
I. Setup
Step 1: Enable WPS by selecting Enabled from the drop down list box shown.
Step 2: Set the WPS AP Mode. Configured is used when the WR-6895 will assign
security settings to clients. Unconfigured is used when an external
client assigns security settings to the WR-6895.
NOTES: Your client may or may not have the ability to provide security settings to
the WR-6895. If it does not, then you must set the WPS AP mode to
Configured. Consult the device documentation to check its capabilities.
104
NOTE: The wireless AP on the router searches for 2 minutes. If the router stops
searching before you complete Step 4, return to Step 3.
Step 4: Go to your WPS wireless client and activate the push-button function.
A typical WPS client screenshot is shown below as an example.
Now go to Step 7 (part III. Check Connection) to check the WPS connection.
Using this method, security settings are configured with a personal identification
number (PIN). The PIN can be found on the device itself or within the software.
The PIN may be generated randomly in the latter case. To obtain a PIN number for
your client, check the device documentation for specific instructions.
The WPS PIN configuration is described in the procedure below. It is assumed that
the Wireless function is Enabled and that the router is configured as the Wireless
Access Point (AP) of your wireless LAN. In addition, the wireless client must also be
configured correctly and turned on, with WPS function enabled.
Step 5: Select the PIN radio button in the WSC Setup section of the Wireless
Security screen, as shown in A or B below, and then click the appropriate
button based on the WSC AP mode selected in step 2.
Enter STA PIN: a Personal Identification Number (PIN) has to be read from either
a sticker or the display on the new wireless device. This PIN must then be inputted
at representing the network, usually the Access Point of the network.
105
Step 6: Activate the PIN function on the wireless client. For Configured mode,
the client must be configured as an Enrollee. For Unconfigured mode,
the client must be configured as the Registrar. This is different from the
External Registrar function provided in Windows Vista.
The figure below provides an example of a WPS client PIN function in-progress.
Step 7: If the WPS setup method was successful, you will be able access the
wireless AP from the client. The client software should show the status.
The example below shows that the connection established successfully.
You can also double-click the Wireless Network Connection icon from the
Network Connections window (or the system tray) to confirm the status of
the new connection.
106
This option allows access to the router to be restricted based upon MAC addresses.
To add a MAC Address filter, click the Add button shown below. To delete a filter,
select it from the MAC Address table below and click the Remove button.
Option Description
Select Select the wireless network name from the drop-down menu. SSID
SSID stands for Service Set Identifier. All stations must be configured with the
correct SSID to access the WLAN. If the SSID does not match, that user
will not be granted access.
MAC Disabled: MAC filtering is disabled.
Restrict Allow: Permits access for the specified MAC addresses.
Mode Deny: Rejects access for the specified MAC addresses.
MAC Lists the MAC addresses subject to the MAC Restrict Mode. A maximum
Address of 60 MAC addresses can be added. Every network device has a unique
48-bit MAC address. This is usually shown as xx.xx.xx.xx.xx.xx, where
xx are hexadecimal numbers.
107
108
This screen allows for the configuration of wireless bridge features of the WiFi
interface. See the table below for detailed explanations of the various options.
Feature Description
109
The Advanced screen allows you to configure advanced features of the wireless LAN
interface. You can select a particular channel on which to operate, force the
transmission rate to a particular speed, set the fragmentation threshold, set the RTS
threshold, set the wakeup interval for clients in power-save mode, set the beacon
interval for the access point, set XPress mode and set whether short or long
preambles are used. Click Apply/Save to set new advanced wireless options.
Field Description
Band Set to 2.4 GHz for compatibility with IEEE 802.11x
standards. The new amendment allows IEEE 802.11n units
to fall back to slower speeds so that legacy IEEE 802.11x
devices can coexist in the same network. IEEE 802.11g
creates data-rate parity at 2.4 GHz with the IEEE 802.11a
standard, which has a 54 Mbps rate at 5 GHz. (IEEE
802.11a has other differences compared to IEEE 802.11b
or g, such as offering more channels.)
110
111
112
The Basic option allows you to configure basic features of the wireless LAN interface.
Among other things, you can enable or disable the wireless LAN interface, hide the
network from active scans, set the wireless network name (also known as SSID)
and restrict the channel set based on country requirements.
Option Description
Enable A checkbox that enables or disables the wireless LAN interface.
Wireless When selected, a set of basic wireless options will appear.
Hide Select Hide Access Point to protect the access point from detection by
Access wireless active scans. To check AP status in Windows XP, open
Point Network Connections from the start Menu and select View
Available Network Connections. If the access point is hidden, it
will not be listed there. To connect a client to a hidden access point,
the station must add the access point manually to its wireless
configuration.
113
Encryption The encryption mode used for the wireless LAN interface.
Passphrase Enter a passphrase of at least 8 digits is required for WPA2 mode and
mixed mode wireless encryption.
Enable Click Enable Guest SSID to enable an additional SSID to provide
Guest SSID varied access.
114
WPS can be disabled / enabled by selecting the corresponding option and click
“Apply/Save”
a. When enabled in configured mode, use Push button or PIN to allow client
connection.
To activate Push button, click on the “Add Enrollee PBC” button or use the 5G WiFi
On/Off & WPS button on the front panel.
Enter the STA PIN and click the “Add Enrollee PIN” button to active PIN mode
connection
b. When enabled in unconfigured mode, enter the Device PIN to the external
registrar for PIN mode setup.
115
This page is used to set allowed MAC addresses, and click the associated button for
each interface to enable/disable the MAC address control.
The current MAC control status is shown on the associated buttons.
Enter the MAC address in the box provided and click Apply/Save.
117
This page allows you to configure advanced features of the wireless LAN interface.
Click Apply/Save to configure the basic wireless options.
Field Description
Bandwidth Select the bandwidth used on the 5G interface. 80MHz is
selected by default.
Beacon Interval The amount of time between beacon transmissions in
milliseconds. The default is 100 ms and the acceptable
range is 1 – 65535. The beacon transmissions identify the
presence of an access point. By default, network devices
passively scan all RF channels listening for beacons coming
from access points. Before a station enters power save
mode, the station needs the beacon interval to know when
to wake up to receive the beacon (and learn whether there
are buffered frames at the access point).
DTIM Interval Delivery Traffic Indication Message (DTIM) is also known as
Beacon Rate. The entry range is a value between 1 and
65535. A DTIM is a countdown variable that informs clients
of the next window for listening to broadcast and multicast
messages. When the AP has buffered broadcast or
multicast messages for associated clients, it sends the next
DTIM with a DTIM Interval value. AP Clients hear the
beacons and awaken to receive the broadcast and
multicast messages. The default is 1.
Short GI Enable/Disable use of short guard interval.
118
Click the Diagnostics Menu item on the left side of the screen to display the
individual connections.
119
To enable Ethernet Link OAM (802.3 ah), click Enabled to display the full
configuration list. At least one option must be enabled for 802.1ah.
WAN Interface Select layer 2 WAN interface for outgoing OAM packets
OAM ID OAM Identification number
Auto Event Supports OAM auto event
Variable Retrieval Supports OAM variable retrieval
Link Events Supports OAM link events
Remote Loopback Supports OAM remove loopback
Active mode Supports OAM active mode
120
WAN Interface Select from the list of WAN Interfaces to send OAM packets
MD Level Maintenance Domain Level
MD Name Maintenance Domain name
MA ID Maintenance Association Identifier
Local MEP ID Local Maintenance association End Point Identifier
Local MEP VLAN ID VLAN IP used for Local Maintenance End point
Click CCM Transmission to enable CPE sending Continuity Check Message (CCM)
continuously.
Remote MEP ID Maintenance association End Point Identifier for the remote
receiver
To perform Loopback/Linktrace OAM test, enter the Target MAC of the destination
and click “Send Loopback” or “Send Linktrace” button.
121
The "ClearAll" button will restart the counters from 0 or show "Not Connected" if the
interface is down.
122
123
124
The Management menu has the following maintenance functions and processes:
8.1 Settings
This includes Backup Settings, Update Settings, and Restore Default screens.
125
Close the browser and wait for 2 minutes before reopening it. It may also be
necessary, to reconfigure your PC IP configuration to match any new settings.
126
127
Follow the steps below to configure, enable, and view the system log.
Consult the table below for detailed descriptions of each system log option.
Option Description
Log Indicates whether the system is currently recording events. The user
can enable or disable event logging. By default, it is disabled. To
enable it, select the Enable radio button and then click Apply/Save.
128
STEP 3: Click View System Log. The results are displayed as follows.
129
130
Option Description
Enable TR-069 Tick the checkbox to enable.
OUI-serial The serial number used to identify the CPE when making a
connection to the ACS using the CPE WAN Management
Protocol. Select MAC to use the router’s MAC address as
serial number to authenticate with ACS or select serial
number to use router’s serial number.
Inform Disable/Enable TR-069 client on the CPE.
Inform Interval The duration in seconds of the interval for which the CPE
MUST attempt to connect with the ACS and call the Inform
method.
ACS URL URL for the CPE to connect to the ACS using the CPE WAN
Management Protocol. This parameter MUST be in the form
of a valid HTTP or HTTPS URL. An HTTPS URL indicates that
the ACS supports SSL. The “host” portion of this URL is
used by the CPE for validating the certificate from the ACS
when using certificate-based authentication.
131
The Send Inform button forces the CPE to establish an immediate connection to
the ACS.
132
133
8.6.1 Accounts
This screen is used to configure the user account access passwords for the device.
Access to the WR-6895 is controlled through the following user accounts:
The root account has unrestricted access to view and change the
configuration of your Broadband router.
Use the fields to update passwords for the accounts, add/remove accounts (max of
5 accounts) as well as adjust their specific privileges.
134
135
The Services option limits or opens the access services over the LAN or WAN. The
access services available are: HTTP, SSH, TELNET, SNMP, HTTPS, FTP, TFTP and ICMP.
Enable a service by selecting its dropdown listbox. Click Apply/Save to activate.
136
Configure the address and subnet of the management station permitted to access
the local management services, and click Save/Apply.
Interface – Access permission for the specified address, allowing the address to
access the local management service from none/lan/wan/lan&wan interfaces.
137
This tool allows you to wake up (power on) computers connected to the Broadband
Router LAN interface by sending special "magic packets".
The network interface card in the computer or device that is going to be woken up
must support Wake-on-LAN.
LAN Interface – Select the LAN interface to send the Wake-on-LAN packet.
MAC Address – Specify the MAC address of the device that is going to be woken up.
Click “Send WoL magic packet to the Broadcast address” if the WoL packets
should be sent to the broadcast address.
Click the Wake Up! button to send the magic packet out to the LAN interface.
138
Configuration options:
Erase current config – If the router has save_default configuration, this option will
erase the current configuration and restore to save_default configuration after
software upgrade.
Erase All – Router will be restored to factory default configuration after software
upgrade.
STEP 3: Enter the path and filename of the firmware image file in the Software
File Name field or click the Browse button to locate the image file.
STEP 4: Click the Update Software button once to upload and install the file.
NOTE: The update process will take about 2 minutes to complete. The device
will reboot and the browser window will refresh to the default screen upon
successful installation. It is recommended that you compare the
Software Version on the Device Information screen with the firmware
version installed, to confirm the installation was successful.
139
NOTE: You may need to close the browser window and wait for 2 minutes before
reopening it. It may also be necessary, to reset your PC IP configuration.
140
When the following window pops up, click the OK button to exit the router.
141
TCP/IP/PORT/INTERFACE FILTER
These rules help in the filtering of traffic at the Network layer (i.e. Layer 3).
When a Routing interface is created, Enable Firewall must be checked.
Navigate to Advanced Setup Security IP Filtering.
OUTGOING IP FILTER
Helps in setting rules to DROP packets from the LAN interface. By default, if the
Firewall is Enabled, all IP traffic from the LAN is allowed. By setting up one or more
filters, specific packet types coming from the LAN can be dropped.
This filter will Drop all TCP packets coming from the LAN with IP
Address/Subnet Mask of 192.168.1.45/24 having a source port of 80
irrespective of the destination. All other packets will be Accepted.
This filter will drop all UDP packets coming from the LAN with IP Address /
Subnet Mask of 192.168.1.45/24 and a source port range of 5060 to 6060,
destined to 172.16.13.4/24 and a destination port range of 6060 to 7070.
INCOMING IP FILTER
Helps in setting rules to Allow or Deny packets from the WAN interface. By default,
all incoming IP traffic from the WAN is Blocked, if the Firewall is Enabled. By setting
up one or more filters, specific packet types coming from the WAN can be Accepted.
142
This filter will ACCEPT all TCP packets coming from WAN interface “br0” with IP
Address/Subnet Mask 210.168.219.45/16 with a source port of 80, irrespective
of the destination. All other incoming packets on this interface are DROPPED.
This rule will ACCEPT all UDP packets coming from WAN interface “br0” with IP
Address/Subnet Mask 210.168.219.45/16 and a source port in the range of
5060 to 6060, destined to 192.168.1.45/24 and a destination port in the range
of 6060 to 7070. All other incoming packets on this interface are DROPPED.
Addition of this rule drops all PPPoE frames going from eth1 to eth2 with a
Destination MAC Address of 00:12:34:56:78:90 irrespective of its Source MAC
Address. All other frames on this interface are forwarded.
Addition of this rule forwards all PPPoE frames going from eth1 to eth2 with a
Destination MAC Address of 00:12:34:56:78 and Source MAC Address of
00:34:12:78:90:56. All other frames on this interface are dropped.
143
With this rule, a LAN device with MAC Address of 00:25:46:78:63:21 will have
no access to the WAN on Mondays, Wednesdays, and Fridays, from 2pm to 6pm.
On all other days and times, this device will have access to the outside
Network.
144
145
RJ-45 X 4 for LAN, RJ-45 X 1 for WAN, Reset Button X 1, WPS/WiFi on/off
button x2, Internal Wi-Fi Antennas X 2, External Wi-Fi Antennas X 2, Power
Switch X 1, USB 3.0 Host X 1
WAN Interface
LAN Interface
WLAN Interface
Standard ....................IEEE802.11b/g/n/ac
Data Rate.................... Up to 300Mbps (2.4GHz) Up to 800Mbps (5GHz)
Encryption ....................64/128-bit Wired Equivalent Privacy (WEP)
Channels ......................11 (US, Canada)/ 13 (Europe)/ 14 (Japan)
Data Rate .....................Up to 300Mbps
WEP ............................Yes
WPA ............................Yes
IEEE 802.1x .................Yes
MAC Filtering ................Yes
Management
Bridge Functions
Routing Functions
Static route, RIP v1/v2, NAT/PAT, DHCP Server/Relay, DNS Proxy, ARP,
Security Functions
QoS
146
Kit Weight
147
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
To access the ssh client you must first enable SSH access for the LAN or WAN from
the Management Access Control Services menu in the web user interface.
NOTE: The WAN IP address can be found on the Device Info WAN screen
148
NOTE: This function only applies to models with a USB host port.
STEP 1: Enable Print Server from Web User Interface. Select Enable on-board
print server checkbox and enter Printer name and Make and model.
Click the Apply/Save button.
STEP 2: Go to the Printers and Faxes application in the Control Panel and
select the Add a printer function (as located on the side menu below).
149
150
NOTE: The printer name must be the same name entered in the ADSL modem
WEB UI “printer server setting” as in step 1.
STEP 6: Click Have Disk and insert the printer driver CD.
151
152
153
155
F1 ~ Layer 2 Interfaces
The WR-6895 supports a single Ethernet WAN interface over the ETH WAN port.
Follow these procedures to configure an Ethernet interface.
156
STEP 3: Select an Ethernet port and Click Apply/Save to confirm your choices.
On the next screen, check that the ETHERNET interface is added to the list.
157
The WR-6895 supports one WAN connection for each interface, up to a maximum of
16 connections.
STEP 2: Click Add to create a WAN connection. The following screen will display.
158
NOTE: The WAN services shown here are those supported by the layer 2
interface you selected in the previous step. If you wish to change your
selection click the Back button and select a different layer 2 interface.
STEP 4: For VLAN Mux Connections only, you must enter Priority & VLAN ID tags.
STEP 5: You will now follow the instructions specific to the WAN service type you
wish to establish. This list should help you locate the correct procedure:
The subsections that follow continue the WAN service setup procedure.
159
STEP 1: Select the PPP over Ethernet radio button and click Next. You can also
enable IPv6 by selecting from the drop-down box at the bottom of this
screen.
STEP 2: On the next screen, enter the PPP settings as provided by your ISP.
Click Next to continue or click Back to return to the previous step.
160
PPP SETTINGS
The PPP Username, PPP password and the PPPoE Service Name entries are
dependent on the particular requirements of the ISP. The user name can be a
maximum of 256 characters and the password a maximum of 32 characters in
length. For Authentication Method, choose from AUTO, PAP, CHAP, and MSCHAP.
161
DIAL ON DEMAND
The WR-6895 can be configured to disconnect if there is no activity for a period of
time by selecting the Dial on demand checkbox . You must also enter an
inactivity timeout period in the range of 1 to 4320 minutes.
PPP IP EXTENSION
The PPP IP Extension is a special feature deployed by some service providers.
Unless your service provider specifically requires this setup, do not select it.
ENABLE NAT
If the LAN is configured with a private IP address, the user should select this
checkbox . The NAT submenu will appear in the Advanced Setup menu after reboot.
On the other hand, if a private IP address is not used on the LAN side (i.e. the LAN
side is using a public IP), this checkbox should not be selected to free up system
resources for better performance.
ENABLE FIREWALL
If this checkbox is selected, the Security submenu will be displayed on the
Advanced Setup menu after reboot. If firewall is not necessary, this checkbox
should not be selected to free up system resources for better performance.
FIXED MTU
Maximum Transmission Unit. The size (in bytes) of largest protocol data unit which
the layer can pass onwards. This value is 1492 for PPPoE.
162
163
164
After clicking Apply/Save, the new service should appear on the main screen.
165
STEP 1: *Select the IP over Ethernet radio button and click Next.
*
For tagged service, enter valid 802.1P Priority and 802.1Q VLAN ID.
For untagged service, set -1 to both 802.1P Priority and 802.1Q VLAN ID.
STEP 2: The WAN IP settings screen provides access to the DHCP server settings.
You can select the Obtain an IP address automatically radio button to
enable DHCP (use the DHCP Options only if necessary). However, if you
prefer, you can use the Static IP address method instead to assign WAN
IP address, Subnet Mask and Default Gateway manually.
166
STEP 3: This screen provides access to NAT, Firewall and IGMP Multicast settings.
Enable each by selecting the appropriate checkbox . Click Next to
continue or click Back to return to the previous step.
167
ENABLE FIREWALL
If this checkbox is selected, the Security submenu will be displayed on the
Advanced Setup menu after reboot. If firewall is not necessary, this checkbox
should not be selected so as to free up system resources for better performance.
168
169
After clicking Apply/Save, the new service should appear on the main screen.
170
Click to allow use of this bridge WAN interface as IGMP multicast source.
Click to allow use of this bridge WAN interface as MLD multicast source.
*
For tagged service, enter valid 802.1P Priority and 802.1Q VLAN ID.
For untagged service, set -1 to both 802.1P Priority and 802.1Q VLAN ID.
For VLAN tag Q-in-Q service, select the TPID from the list.
STEP 2: The WAN Setup - Summary screen shows a preview of the WAN service
you have configured. Check these settings and click Apply/Save if they
are correct, or click Back to return to the previous screen.
171
NOTE: If this bridge connection is your only WAN service, the WR-6895 will be
inaccessible for remote management or technical support from the WAN.
172