UTT HiPER 518W User manual

HiPER 518W Wireless Router
Advanced Configuration Guide
V1.3
UTT Technologies Co., Ltd.
http://www.uttglobal.com

Copyright Notice
Copyright © 2000-2013. UTT Technologies Co., Ltd. All rights reserved.
Information in this document, including URL and other Internet Web site references, is
subject to change without further notice.
Unless otherwise noted, the companies, organizations, people and events described in
the examples of this document are fictitious, which have no relationship with any real
company, organization, people and event.
Complying with all applicable copyright laws is the responsibility of the user. No part of this
document may be reproduced, stored in or introduced into a retrieval system, or
transmitted in any form or by any means (electronic, mechanical, photocopying, recording,
or otherwise), or used for any commercial and profit purposes, without the express prior
written permission of UTT Technologies Co., Ltd.
UTT Technologies Co., Ltd. has the patents, patent applications, trademarks, trademark
applications, copyrights and other intellectual property rights that are mentioned in this
document. You have no license to use these patents, trademarks, copyrights or other
intellectual property rights, without the express prior written permission of UTT
Technologies Co., Ltd.
艾泰®and UTT®are the registered trademarks of Technologies Co., Ltd.
HiPER® is the registered trademark of UTT Technologies Co., Ltd.
Unless otherwise announced, the products, trademarks and patents of other companies,
organizations or people mentioned herein are the properties of their respective owners.
Product Number (PN): 0904-0101-001
Document Number (DN): PR-PMMU-1150.50-PPR-EN-1.0A

UTT Technologies Table of Contents
http://www.uttglobal.com Page I
Table of Contents
COPYRIGHT NOTICE..................................................................................................................... 2
TABLE OF CONTENTS...................................................................................................................I
ABOUT THIS MANUAL.................................................................................................................. 1
0.1 SCOPE.......................................................................................................................................1
0.2 WEB UI STYLE .........................................................................................................................1
0.3 DOCUMENTS CONVENTIONS.....................................................................................................2
0.3.1 Symbol Conventions .......................................................................................................2
0.3.2 Other Conventions...........................................................................................................2
0.3.3 Common Button Descriptions .........................................................................................2
0.3.4 Detailed Description of List ............................................................................................3
0.4 FACTORY DEFAULT SETTINGS...................................................................................................5
0.5 DOCUMENT ORGANIZATION .....................................................................................................5
0.6 CONTACT INFORMATION...........................................................................................................9
CHAPTER 1 PRODUCT OVERVIEW .................................................................................... 10
1.1 PRODUCT BRIEF......................................................................................................................10
1.2 KEY FEATURES .......................................................................................................................11
1.3 PHYSICAL SPECIFICATION.......................................................................................................12
1.4 DETAILED SPECIFICATIONS TABLE..........................................................................................12
CHAPTER 2 HARDWARE INSTALLATION.......................................................................... 14
2.1 PHYSICAL CHARACTERISTICS .................................................................................................14
2.1.1 Front Panel ....................................................................................................................14
2.1.2 Rear Panel......................................................................................................................15
2.2 INSTALLATION PROCEDURE ....................................................................................................16
CHAPTER 3 QUICK SETUP................................................................................................... 19
3.1 CONFIGURING YOUR COMPUTER............................................................................................19
3.2 LOGGING IN TO THE WIRELESS ROUTER .................................................................................21
3.3 SETUP WIZARD.......................................................................................................................23
3.3.1 Running the Setup Wizard.............................................................................................23
3.3.2 Setup Wizard - Internet Access Mode ...........................................................................24
3.3.3 Setup Wizard - Internet Connection Settings.................................................................25
3.3.4 Setup Wizard - Wireless Settings...................................................................................33
CHAPTER 4 START MENU.................................................................................................... 35

UTT Technologies Table of Contents
http://www.uttglobal.com Page II
4.1 SETUP WIZARD.......................................................................................................................35
4.2 SYSTEM STATUS......................................................................................................................35
4.2.1 Wired Status ..................................................................................................................35
4.2.2 Wireless Status ..............................................................................................................36
4.3 INTERFACE TRAFFIC ...............................................................................................................38
4.4 RESTART.................................................................................................................................40
CHAPTER 5 NETWORK......................................................................................................... 41
5.1 WAN SETTINGS......................................................................................................................41
5.1.1 Internet Connection List................................................................................................41
5.1.2 Internet Connection Settings .........................................................................................45
5.2 LOAD BALANCING..................................................................................................................53
5.2.1 Introduction to Load Balancing and Failover................................................................53
5.2.2 Load Balancing Global Settings....................................................................................55
5.2.3 Load Balancing List ......................................................................................................56
5.2.4 Connection Detection Settings ......................................................................................57
5.2.5 Identity Binding.............................................................................................................58
5.2.6 How to Configure Connection Detection Settings ........................................................59
5.3 LAN SETTINGS.......................................................................................................................60
5.4 DHCP SERVER........................................................................................................................62
5.4.1 DHCP Server Settings ...................................................................................................62
5.4.2 Static DHCP ..................................................................................................................64
5.4.3 DHCP Auto Binding......................................................................................................66
5.4.4 DHCP Client List...........................................................................................................67
5.4.5 Configuration Example for DHCP ................................................................................68
5.5 DDNS ....................................................................................................................................71
5.5.1 Introduction to DDNS ...................................................................................................71
5.5.2 Apply for a DDNS Account...........................................................................................71
5.5.3 DDNS Settings ..............................................................................................................72
5.5.4 DDNS Status .................................................................................................................75
5.5.5 DDNS Verification ........................................................................................................75
5.6 UPNP......................................................................................................................................76
5.6.1 Enable UPnP..................................................................................................................76
5.6.2 UPnP Port Forwarding List ...........................................................................................76
5.7 NUMBER OF WAN.........................................................................................................................77
CHAPTER 6 WIRELESS......................................................................................................... 78
6.1 BASIC WIRELESS SETTINGS....................................................................................................78
6.1.1 AP Mode........................................................................................................................78
6.1.2 APClient Mode..............................................................................................................80
6.1.3 WDS..............................................................................................................................82
6.1.4 Configuration Example for WDS..................................................................................87
6.2 WIRELESS SECURITY SETTINGS..............................................................................................91

UTT Technologies Table of Contents
http://www.uttglobal.com Page III
6.2.1 Disabling Wireless Security...........................................................................................91
6.2.2 Wireless Security Settings –WEP.................................................................................91
6.2.3 Wireless Security Settings - WPA/WPA2......................................................................93
6.2.4 Wireless Security Settings - WPA-PSK/WPA2-PSK.....................................................94
6.3 WIRELESS MACADDRESS FILTERING....................................................................................96
6.3.1 MAC Address Filtering Global Settings........................................................................96
6.3.2 MAC Address Filtering List ..........................................................................................97
6.3.3 MAC Address Filtering Settings....................................................................................97
6.3.4 How to Configure MAC Address Filtering ...................................................................98
6.3.5 Configuration Example for MAC Address Filtering .....................................................98
6.4 ADVANCED WIRELESS SETTINGS..........................................................................................100
6.5 WIRELESS CLIENT LIST ........................................................................................................102
CHAPTER 7 ADVANCED ..................................................................................................... 103
7.1 NATAND DMZ ....................................................................................................................103
7.1.1 Introduction to NAT Features......................................................................................103
7.1.2 Port Forwarding...........................................................................................................105
7.1.3 NAT Rule.....................................................................................................................109
7.1.4 DMZ............................................................................................................................115
7.2 STATIC ROUTE ......................................................................................................................116
7.2.1 Introduction to Static Route.........................................................................................116
7.2.2 Static Route List..........................................................................................................116
7.2.3 Static Route Settings....................................................................................................117
7.2.4 How to Add Static Routes ...........................................................................................118
7.3 POLICY ROUTING..................................................................................................................119
7.3.1 Policy Routing Settings...............................................................................................120
7.3.2 Enable Policy Routing.................................................................................................122
7.3.3 Policy Routing List......................................................................................................122
7.4 ANTI-NETSNIPER..................................................................................................................123
7.5 PLUG AND PLAY....................................................................................................................123
7.5.1 Introduction to Plug and Play......................................................................................123
7.5.2 Enable Plug and Play...................................................................................................124
7.6 SYSLOG ................................................................................................................................125
7.7 SNMP ..................................................................................................................................125
CHAPTER 8 USER MANAGEMENT ................................................................................... 127
8.1 USER STATUS........................................................................................................................127
8.1.1 User Application Analysis Pie Charts..........................................................................127
8.1.2 User Status List ...........................................................................................................128
8.2 IP/MAC BINDING.................................................................................................................129
8.2.1 Introduction to IP/MAC Binding.................................................................................130
8.2.2 IP/MAC Binding Global Settings................................................................................131
8.2.3 IP/MAC Binding List ..................................................................................................132

UTT Technologies Table of Contents
http://www.uttglobal.com Page IV
8.2.4 IP/MAC Binding Settings............................................................................................133
8.2.5 How to Add IP/MAC Bindings ...................................................................................134
8.2.6 Internet Whitelist and Blacklist ...................................................................................135
8.3 PPPOESERVER.....................................................................................................................137
8.3.1 PPPoE Overview.........................................................................................................138
8.3.2 PPPoE Server Global Settings.....................................................................................140
8.3.3 PPPoE Account List ....................................................................................................141
8.3.4 PPPoE Account Settings..............................................................................................142
8.3.5 PPPoE User Status.......................................................................................................144
8.3.6 Export PPPoE Accounts ..............................................................................................145
8.3.7 Import PPPoE Accounts ..............................................................................................145
8.4 WEB AUTHENTICATION ........................................................................................................146
8.4.1 Enable Web Authentication .........................................................................................146
8.4.2 Web Authentication User Account Settings.................................................................147
8.4.3 Web Authentication User Account List .......................................................................148
8.4.4 How to Use Web Authentication .................................................................................149
8.5 USER GROUP ........................................................................................................................151
8.5.1 Introduction to User Group .........................................................................................151
8.5.2 User Group Settings ....................................................................................................152
8.5.3 User Group List...........................................................................................................153
8.5.4 How to Add the User Groups ......................................................................................154
8.5.5 How to Edit an User Group.........................................................................................154
CHAPTER 9 APPLICATION CONTROL ............................................................................. 156
9.1 SCHEDULE ............................................................................................................................156
9.2 APPLICATION CONTROL .......................................................................................................157
9.2.1 Internet Application Management List........................................................................158
9.2.2 Internet Application Management Settings .................................................................158
9.2.3 Internet Application Management Configuration Example.........................................160
9.3 QQ WHITELIST.....................................................................................................................163
9.4 MSN WHITELIST ..................................................................................................................164
9.5 NOTIFICATION.......................................................................................................................165
9.5.1 Daily Routine Notification ..........................................................................................165
9.5.2 Account Expiration Notification .................................................................................167
9.6 APPLICATION AUDIT .............................................................................................................168
9.6.1 View Audit Log ...........................................................................................................168
9.6.2 Log Management.........................................................................................................169
9.7 POLICY DATABASE................................................................................................................170
CHAPTER 10 QOS.................................................................................................................. 171
10.1 FIXED RATE LIMITING ..........................................................................................................171
10.1.1 Fixed Rate Limiting Rule List.....................................................................................171
10.1.2 Fixed Rate Limiting Rule Settings ..............................................................................172

UTT Technologies Table of Contents
http://www.uttglobal.com Page V
10.2 FLEXIBLE BANDWIDTH MANAGEMENT ................................................................................173
10.3 P2P RATE LIMIT....................................................................................................................173
10.4 SESSION LIMITING ................................................................................................................175
CHAPTER 11 FIREWALL ....................................................................................................... 177
11.1 ATTACK PREVENTION ...........................................................................................................177
11.1.1 Internal Attack Prevention...........................................................................................177
11.1.2 External Attack Prevention..........................................................................................180
11.2 ACCESS CONTROL ................................................................................................................181
11.2.1 Introduction to Access Control....................................................................................181
11.2.2 Access Rule List..........................................................................................................183
11.2.3 Access Rule Settings ...................................................................................................184
11.2.4 Configuration Examples for Access Rule....................................................................189
11.3 DOMAIN FILTERING ..............................................................................................................195
11.3.1 Domain Filtering Global Settings................................................................................195
11.3.2 Domain Filtering Settings............................................................................................195
11.4 10.4 MACADDRESS FILTERING ...........................................................................................196
11.4.1 MAC Address Filtering List ........................................................................................197
11.4.2 MAC Address Filtering Setting...................................................................................197
CHAPTER 12 VPN................................................................................................................... 199
12.1 PPTPVPN............................................................................................................................199
12.1.1 Introduction to PPTP Implementation.........................................................................199
12.1.2 PPTP Client Settings ...................................................................................................204
12.1.3 PPTP Server Settings...................................................................................................205
12.1.4 Notes on Configuring PPTP Client and Server............................................................208
12.1.5 PPTP List.....................................................................................................................208
12.1.6 How to Add, View, Edit and Delete PPTP Clients or Server Entries...........................210
12.1.7 Configuration Example for PPTP................................................................................211
12.2 IPSEC VPN...........................................................................................................................212
12.2.1 Introduction to IPSec Implementation.........................................................................212
12.2.2 IPSec Settings–AutoKey (IKE)...................................................................................228
12.2.3 IPSec List ....................................................................................................................238
12.2.4 How to Add, View, Edit and Delete IPSec Entries ......................................................239
12.2.5 Configuration Examples for IPSec –AutoKey (IKE) .................................................240
CHAPTER 13 SYSTEM........................................................................................................... 248
13.1 ADMINISTRATOR...................................................................................................................248
13.1.1 Administrator List .......................................................................................................248
13.1.2 Administrator Settings.................................................................................................249
13.2 SYSTEM TIME .......................................................................................................................250
13.3 CONFIGURATION...................................................................................................................252
13.3.1 Backup Configuration .................................................................................................252
13.3.2 Restore Configuration .................................................................................................252

UTT Technologies Table of Contents
http://www.uttglobal.com Page VI
13.3.3 Reset to Factory Defaults ............................................................................................253
13.4 FIRMWARE UPGRADE............................................................................................................254
13.5 REMOTE MANAGEMENT .......................................................................................................255
13.6 SCHEDULED TASK.................................................................................................................256
13.6.1 Scheduled Task Settings ..............................................................................................257
13.6.2 Scheduled Task List.....................................................................................................257
CHAPTER 14 STATUS............................................................................................................ 259
14.1 INTERFACE STATUS ...............................................................................................................259
14.2 SYSTEM INFORMATION .........................................................................................................259
14.3 SYSTEM LOG ........................................................................................................................260
14.3.1 Log Management Settings...........................................................................................261
14.3.2 System Log Information..............................................................................................261
CHAPTER 15 SUPPORT ........................................................................................................ 264
APPENDIX A HOW TO CONFIGURE YOUR PC..................................................................... 265
APPENDIX B FAQ ...................................................................................................................... 269
1. HOW TO CONNECT THE WIRELESS ROUTER TO THE INTERNET USING PPPOE?......................269
2. HOW TO CONNECT THE WIRELESS ROUTER TO THE INTERNET USING STATIC IP?..................270
3. HOW TO CONNECT THE WIRELESS ROUTER TO THE INTERNET USING DHCP? ......................270
4. HOW TO CONNECTAWINDOWS XPPCTO THE DEVICE WIRELESSLY? ..................................272
5. HOW TO CONNECTAWINDOWS 7PCTO THE DEVICE WIRELESSLY? .....................................273
6. HOW TO RESETTHE WIRELESS ROUTER TO FACTORY DEFAULT SETTINGS? ................................274
APPENDIX C COMMON IP PROTOCOLS............................................................................... 275
APPENDIX D COMMON SERVICE PORTS............................................................................. 276
APPENDIX E FIGURE INDEX.................................................................................................... 281
APPENDIX F TABLE INDEX...................................................................................................... 287

UTT Technologies About This Manual
http://www.uttglobal.com Page 1
About This Manual
0.1 Scope
This guide mainly describes how to install and configure the HiPER 518W Wireless
Router offered by UTT Technologies Co., Ltd. For more information, please visit our
website at www.uttglobal.com.
0.2 Web UI Style
The Web UI style complies with the browser standard, which is as follows:
Radio Button: It allows you to choose only one of a predefined set of options.
Check Box: It allows you to choose one or more options.
Button: It allows you to click to perform an action.
Text Box: It allows you to enter text information.
List Box: It allows you to select one or more items
from a list contained within a static, multiple line text box.
Drop-down List: It allows you to choose one item from a list. When a
drop-down list is inactive, it displays a single item. When activated, it drops down a list of
items, from which you may select one.

UTT Technologies About This Manual
http://www.uttglobal.com Page 2
0.3 Documents Conventions
0.3.1 Symbol Conventions
: It represents a configuration parameter. Parameters may be optional or required.
Required parameters are indicated by a red asterisk (*).
: It represents a button.
: It represents one or more notes.
0.3.2 Other Conventions
0.3.2.1 Convention for a Page Path
First Level Menu Item > Second Level Menu Item (bold font) means the menu path to
open a page. For example, Wireless > MAC Filtering means that in the Web UI, click the
first level menu item Wireless firstly, and then click the second level menu item MAC
Filtering to open the corresponding page.
0.3.2.2 Convention for Clicking a Button
Click the XXX button (XXX is the name of the button, bold font) means performing the
corresponding operation. E.g., click the Delete button means performing the delete
operation, the Delete button is shown as .
0.3.3 Common Button Descriptions
The following table describes the commonly-used buttons in the Web UI.
Button
Description
Click to save your changes.

UTT Technologies About This Manual
http://www.uttglobal.com Page 3
Click to revert to the last saved settings.
Click to delete the selected entry(s).
Click to display the latest information on the page.
Click to clear all the statistics on the page.
Click to go back to the previous page.
Table 0-1 Common Button Descriptions
0.3.4 Detailed Description of List
0.3.4.1 Basic Elements and Features
The Web UI contains two kinds of lists: editable list and read-only list.
●An editable list is used to add, display, modify and delete the configuration entries.
●A read-only list is used to display the system status information which is not editable.
Let’s take the editable MAC Address Filtering List (see Figure 0-1) as an example to
explain the basic elements and features of the list.
Note
Only the editable lists support Add, Modify, and Delete operations. The read-only lists
don’t support them.
Figure 0-1 MAC Address Filtering List
The following table describes the basic elements and features of the list.

UTT Technologies About This Manual
http://www.uttglobal.com Page 4
Element
Description
Current page number/ total pages, the example means that the current
page is the first page, and total one page.
Click to jump to the first page.
Click to jump to the previous page.
Click to jump to the next page.
Click to jump to the last page.
Enter page number in text field, then click Go to or press <Enter> key
to jump to that page.
Enter the text string you want to search for in this text box, then press
<Enter> key to display all the matched entries. In addition, you can do
the search within the displayed results. If you want to display all the
entries, you only need clear the text box and then press <Enter> key.
Note that the matching rule is substring matching, that is, it will search
for and display those entries that contain the specified text string.
Configured number / maximum number, the example means that there
are 2 configured MAC address filtering entries, and the maximum
number of MAC address filtering allowed is 50.
Click to go to the setup page to modify the corresponding entry.
Click to delete the corresponding entry.
Click (add the check mark) to select all the entries in the current page.
Click again (remove the check mark) to unselect all the entries in the
current page.
Click to go to the setup page to add a new entry to the list.
Click to delete all the entries in the list.
To delete one or more entries, select the leftmost check boxes of them,
and then click the Delete button.
Table 0-2 Basic Elements and Features of the List

UTT Technologies About This Manual
http://www.uttglobal.com Page 5
0.3.4.2 Sorting Function
All the lists in the Web UI support sorting function. The operation is as follows: You can
click any column header to sort the entries in a list by that column. Click once to sort the
entries in descending order, click again to sort them in ascending order. Click a third time
to sort them in descending order, and so forth. After sorted, the list will be displayed from
the first page.
0.4 Factory Default Settings
The following table lists the default values of several important parameters.
Parameter
Default Value
Description
Administrator User Name
admin
You can use the administrator account to login
to the Wireless Router’s Web UI.
Note: Both the User Name and Password are
case sensitive.
Administrator Password
admin
LAN IP Address
192.168.1.1
They are the IP address and subnet mask of
the Wireless Router’s LAN interface. You can
use this IP address to access and manage the
Wireless Router.
LAN Subnet Mask
255.255.255.0
SSID
UTT-HIPER_XXXXXX
To connect to the Wireless Router, wireless
clients must use the same SSID as the
Wireless Router. Therein, “XXXXXX”is the
Wireless Router’s serial number in
hexadecimal format.
Table 0-3 Factory Default Settings
0.5 Document Organization
This guide mainly describes the settings and applications of the HiPER 518W Wireless
Router, which include product overview, hardware installation, quick setup, start menu,
network, wireless, advanced, user management, firewall, VPN, System, status and
support.

UTT Technologies About This Manual
http://www.uttglobal.com Page 6
Chapter 1 Product Overview
This chapter describes functions and features of the Wireless Router.
Chapter 2 Hardware Installation
This chapter describes how to install the Wireless Router.
Chapter 3 Quick Setup
This chapter describes the following contents:
How to install and configure TCP/IP properties on your PC.
How to login to the Wireless Router; and introduction to the WEB UI layout.
How to use the Setup Wizard to quickly configure the basic parameters for the
Wireless Router to operate properly.
Chapter 4 Start Menu
This chapter describes how to quickly go to the following pages to configure the related
features via the Start menu items:
Setup Wizard: How to configure the basic parameters for the Wireless Router to
operate properly.
System Status: How to view wired and wireless status of the Wireless Router.
Interface Traffic: How to view the real-time traffic chart for each interface, and the
ingress and egress traffic statistics for each interface.
Restart: How to restart the Wireless Router.
Chapter 5 Network
This chapter describes how to configure the basic network parameters of the Wireless
Router, including:
WAN: How to configure Internet connections and view their configuration and status.
Load Balancing: How to configure the load balancing feature which includes
detection and weight settings, global settings; and how to view the load balancing list.
LAN Settings: How to configure the parameters of the LAN interface, such as IP
address, subnet mask, MAC address, and so on.
DHCP Server: How to configure DHCP server, DNS proxy, static DHCP; how to view
the static DHCP list and DHCP client list.
DDNS: How to apply for DDNS account and configure DDNS service, and view
DDNS status.
UPnP: How to enable or disable UPnP, and view the UPnP port forwarding list.
Chapter 6 Wireless

UTT Technologies About This Manual
http://www.uttglobal.com Page 7
This chapter describes how to configure the wireless features of the Wireless Router,
including:
Basic Wireless Settings: How to configure basic wireless settings.
Wireless Security Settings: How to configure wireless security settings.
Wireless MAC Address Filtering: How to filter the wireless clients based on their
MAC addresses.
Advanced Wireless Settings: How to configure advanced wireless settings.
Wireless Client List: How to view the status of the wireless clients, and easily
configure MAC address filtering entries via the list.
Chapter 7 Advanced
This chapter describes how to configure the advanced features of the Router, including:
NAT and DMZ: How to configure and view NAT rules, port forwarding entries and
DMZ host.
Static Route: How to configure and view the static routes.
Policy Routing: How to configure and view the policy routings.
Anti-NetSniper: How to enable Anti-Netsniper.
Plug and Play: How to enable Plug and play
Syslog: How to configure syslog.
SNMP: How to configure SNMP.
Chapter 8 User Management
This chapter describes how to control the LAN users, including:
User Status: How to view user status.
IP/MAC Binding: How to configure IP/MAC bindings to prevent IP address spoofing.
How to configure an Internet whitelist or blacklist for the LAN users.
PPPoE Server: How to configure PPPoE server global settings and PPPoE account
settings, and view PPPoE user status.
Web Authentication: How to configure web authentication global settings and web
authentication account settings.
User Group: How to configure and view user group.
Chapter 9 Applications Control
This chapter describes how to control and manage the Applications of the LAN users
based on schedule, including:
Schedule: How to configure and view schedule.
Applications Control: How to configure and view application control.

UTT Technologies About This Manual
http://www.uttglobal.com Page 8
QQ Whitelist: How to configure and view QQ whitelist.
MSN Whitelist: How to configure and view MSN whitelist.
Notification: How to configure notification.
Application Audit: How to view application audic.
Policy Database: How to configure policy database.
Chapter 10 QoS
Fixed Rate Limiting: How to configure fixed rate limiting.
Flexible Bandwidth: How to configure flexible bandwidth.
P2P Rate Limit: How to configure P2P rate limiting.
Session Limiting: How to configure session limiting.
Chapter 11 Firewall
This chapter describes how to configure firewall features, including:
Attack Prevention: How to configure attack prevention features.
Access Control: How to configure access control rules to assign Internet access
privileges to the LAN users based on schedule, and to prevent external attacks.
Domain Filtering: How to configure domain filtering feature to block access to the
specified websites.
MAC Address Filtering: How to configure MAC address filtering to block or allow
specified hosts.
Chapter 12 VPN
This chapter describes the PPTP and IPsec implementation, and how to configure the
Router as a server/client.
Chapter 13 System
This chapter describes how to perform maintenance activities on the Router, including:
Administrator: How to add, view, modify and delete the administrator accounts.
Time: How to set the system date and time manually or automatically.
Configuration: How to backup and restore the system configuration, and reset the
Router to factory default settings.
Firmware upgrade: How to backup, download and upgrade firmware.
Remote Management: How to enable HTTP remote management feature to
remotely configure and manage the Router via Internet.
Scheduled Task: How to create and view the scheduled tasks. Now the Router only

UTT Technologies About This Manual
http://www.uttglobal.com Page 9
supports one scheduled task: Restart.
Chapter 14 Status
This chapter describes how to view the system status information and statistics, including:
Interface Status: It displays traffic statistics of the Router.
System Information: It displays the current system time, system up time, system
resources usage information, SN, firmware version, and system log messages.
System Log: How to configure and view system log.
Chapter 15 Support
This chapter describes how to link to the UTTCare, Forum, Knowledge and Reservation
page of the UTT website, which can help you quickly learn the UTT Technologies service
system and enjoy the most intimate and professional services.
Appendix
This guide provides six appendixes, including:
Appendix A How to Configure Your PC: How to configure TCP/IP settings on a
Windows XP-based computer.
Appendix B FAQ: Frequent questions and answers.
Appendix C Common IP Protocols: Provides the list of common IP protocols and
their protocol numbers.
Appendix D Common Service Ports: Provides the list of common services and their
port numbers.
Appendix E Figure Index: Provides a figure index directory.
Appendix F Table Index: Provides a table index directory.
0.6 Contact Information
If you have any questions regarding the operation or installation of the HiPER 518W
Wireless Router, please contact us in any of the following ways.
Technical Support Phone: +1(626)722-5032
E-mail: uttgloba[email protected]

UTT Technologies Chapter 1 Product Overview
http://www.uttglobal.com Page 10
Chapter 1 Product Overview
Thanks for choosing the HiPER 518W Wireless Router from UTT Technologies Co., Ltd.
This chapter describes the functions and features of the HiPER 518W Wireless Router in
brief.
1.1 Product Brief
The HiPER 518W Wireless Router is designed for small-sized businesses and branch
offices, integrating wired networks with 3G and 802.11 wireless networks. In addition, it
adheres to the characteristics of UTT Technologies products: open, easy-to-use, safe,
smooth, and so on. The HiPER 518W has three models: HiPER 518W Plus, HiPER 518W
VPN, HiPER 518W Lite. This manual is base on HiPER 518W Plus.
The HiPER 518W is based on IEEE 802.11n standard and is compatible with IEEE
802.11b and IEEE 802.11g standards. It provides maximum wireless transfer rate up to
300Mbps, wide wireless coverage, and stable wireless data transmission.
The HiPER 518W supports multiple security modes which include WEP, WPA-Enterprise,
WPA2-Enterprise, WPA-PSK and WPA2-PSK. What’s more, it provides simple and
efficient wireless MAC address filtering to improve the security of your wireless network.
The HiPER 518W supports DHCP server, NAT, static route, DDNS, IP/MAC binding,
PPPoE server and other advanced features. Furthermore, it provides feature-rich user
management, which can help you control and manage the Internet behaviors of the LAN
users based on schedule and address group, including QQ, MSN and P2P applications
(e.g., Bit Comet, Bit Spirit, and Thunder Search) control, the maximum upload and
download rate limiting.
The HiPER 518W supports flexible firewall features like access control and domain
filtering to effectively prevent network attacks, and provide security for the LAN users.
The HiPER 518W provides a concise, intuitive, and feature-rich Web User Interface. The
Setup Wizard can help you quickly configure the basic parameters for the Wireless Router
to operate properly. The status information (System Status, Wireless Client List, Traffic
Statistics, etc.) can help you identify and diagnose the source of current system problems,
or predict potential system problems. In addition, the Support page provides links to the
UTT website to help you quickly learn the UTT Technologies service system and enjoy the
most intimate and professional services.

UTT Technologies Chapter 1 Product Overview
http://www.uttglobal.com Page 11
1.2 Key Features
Supports multiple Internet connection types: 3G, PPPoE, Static IP, DHCP and Wi-Fi
AP
Provides two wired WAN interfaces (WAN1 and WAN2), two wireless WAN interfaces
(3G and APClient), and three 10M/100M LAN ports
Supports multiple Internet connections that provide intelligent load balancing and
automatic failover
Supports 6kV lightning protection
Conforms to IEEE 802.11n (802.11g and 802.11b Compatible).
Provides maximum wireless transfer rate up to 300Mbps
Supports multiple wireless security modes which include WEP, WPA-Enterprise,
WPA2-Enterprise, WPA-PSK and WPA2-PSK
Supports hidden SSID
Supports VPN pass-through (IPSec, PPTP)
Supports PPTP VPN and IPSec VPN
Supports QoS
Supports WMM (Wi-Fi Multimedia)
Supports wireless MAC address filtering feature, whitelist, blacklist, one-click filtering
of MAC addresses
Supports DHCP server
Supports DNS proxy
Supports DDNS (Dynamic Domain Name System)
Supports IP/MAC binding
Supports feature-rich PPPoE server
Supports upload and download rate limiting for the LAN users
Supports Internet behavior management for the LAN users, such as block or allow
QQ, MSN and P2P applications (e.g., Bit Comet, Bit Spirit, and Thunder Search)
Supports flexible and strong firewall features
Supports IP packet filtering based on IP address, protocol and TCP/UDP port
Supports URL and keyword filtering
Supports DNS request filtering
Supports HTTP remote management
Provides the Web User Interface (Web UI) for ease of use
Supports firmware upgrade via the Web UI

UTT Technologies Chapter 1 Product Overview
http://www.uttglobal.com Page 12
Supports configuration backup and restore
Provides wireless client list and system status
1.3 Physical Specification
●Conforms to IEEE 802.11n, IEEE 802.11b and IEEE 802.11g standards
●Conforms to IEEE 802.3 Ethernet and IEEE 802.3u Fast Ethernet standards
●Supports TCP/IP, PPPoE, DHCP, ICMP, NAT, Static Route, etc.
●Each physical port supports auto-negotiation for the port speed and duplex mode
●Each physical port supports auto MDI/MDI-X
●Provides system and port LEDs
●Operating Environment:
Temperature: 32°to 104°F (0°to 40°C)
Relative Humidity: 10% to 90%, Non-condensing
Height: 0m to 4000m
1.4 Detailed Specifications Table
The HiPER 518W has three models: HiPER 518W Plus, HiPER 518W VPN, HiPER 518W
Lite. The features and specifications of each model are different. The following table lists
detailed specifications for each model.
Model Name
HiPER 518W-Plus
HiPER 518W-VPN
HiPER 518W-Lite
WAN
1 to 4(2)
1 to 4(2)
1 to 4(2)
LAN
4 to 1(3)
4 to 1(3)
4 to 1(3)
USB
1
1
1
Dimension
182mm×129mm×27
mm
182mm×129mm×2
7mm
182mm×129mm×27
mm
Input Voltage
DC:12V 1A
DC:12V 1A
DC:12V 1A
Power
Consumption
Max 6W
Max 6W
Max 6W
Forwarding
Capability
30K PPS
30K PPS
30K PPS
Max Concurrent
Clients
30
30
30
TX by Rv
2×2
2×2
2×2
Table of contents
Other UTT Wireless Router manuals