XN020 G3v (BR00) UG
XN020 G3v (BR00) UG
XN020 G3v (BR00) UG
1910020848 REV1.0.0
Contents
About This Guide..........................................................................................................1
Chapter 5. VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5. 1. Connecting the Telephone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5. 2. Entering Telephone Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5. 3. Telephone Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5. 3. 1.Telephone Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5. 3. 2.Emergency Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5. 4. Telephony Devices Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5. 5. Call Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5. 6. Calling via Which Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5. 7. Call Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5. 7. 1.Do Not Disturb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5. 7. 2.Blocking Certain Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5. 7. 3.Prevent from Dialing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5. 8. Forwarding Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Chapter 6. Parental Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Chapter 7. QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7. 1. Prioritize Internet Traffic with QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7. 1. 1.Basic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7. 1. 2.Queue Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
7. 2. Rule List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
7. 2. 1.Rule Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
7. 2. 2.Filter Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Appendix: Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
About This Guide
This guide is a complement to Quick Installation Guide. The Quick Installation Guide
provides instructions for quick internet setup, while this guide contains details of each
function and demonstrates how to configure them in typical scenarios.
When using this guide, please notice that features of the router may vary slightly
depending on the model and software version you have, and on your location, language,
and internet service provider. All images, parameters and descriptions documents in
this guide are used for demonstration only.
Conventions
In this guide, the following conventions are used:
Convention Description
Hyperlinks are in teal and underlined. You can click to redirect to a website
Underline
or a specific section.
Key information appears in teal, including management page text such as
Teal
menus, items, buttons and so on.
The menu structures to show the path to load the corresponding page. For
example, Advanced > Wireless > MAC Filtering means the MAC Filtering
>
function page is under the Wireless menu that is located in the Advanced
tab.
Ignoring this type of note might result in a malfunction or damage to the
Note:
device.
Indicates important information that helps you make better use of your
Tips:
device.
More Info
• The latest firmware and management app are available from the Download Center at
http://www.tp-link.com/support.
• The Quick Installation Guide (QIG) can be found where you find this guide or inside the
product packaging.
• Specifications can be found on the product page at http://www.tp-link.com.
• A Technical Support Forum is provided for you to discuss our products at
http://forum.tp-link.com.
• Our Technical Support contact information can be found at the Contact Technical
Support page at http://www.tp-link.com/support.
1
Chapter 1
1. 1. Product Overview
TP-Link’s GPON router is a combined wired/wireless network connection device with
integrated high speed GPON ONT, NAT router, 4-port switch, and wireless N access
point, reducing hassle of configuration and saving space.
With extremely high downstream and upstream access speed, the router gives you
unparalleled surfing experience.
With Ethernet ports and antennas, the router provides wired and wireless access for
multiple computers and mobile devices.
With various features and functions, the router is the perfect hub for your home or
business network.
1. 2. Physical Appearance
1. 2. 1. LED
The router’s LEDs are located on the front panel. You can check the router’s working
status by following the LED Explanation table.
3
Chapter 1 Get to Know Your GPON Router
LED Explanation
Note:
If the GPON LED is off or the LOS LED is on or flashing, check your Internet connection first, Refer to Connect Your
GPON Router for more information about how to make Internet connection correctly. If you have already made a right
connection, contact your ISP to make sure your Internet service is avaliable now.
4
Chapter 1 Get to Know Your GPON Router
The router’s back and side panel show the connection ports. Refer to the following for
detailed instructions.
Item Description
For connecting the router to the internet. Connect the port to the
GPON splitter via a fiber cable. For details, please refer to Connect Your GPON
Router
LAN1, LAN2 For connecting the router to your PC or other Ethernet network devices.
For connecting the router to a power socket via the provided power
POWER
adapter.
For connecting the phones to the router. Connect your phones to the
PHONE
RJ11 ports on the back panel.
5
Chapter 1 Get to Know Your GPON Router
1. 2. 3. Buttons
The router’s back panel shows the buttons. Refer to the following for detailed
instructions.
Item Description
ON/OFF The switch for power supply. Press it to power on or off the router.
Press and hold down for 5 seconds to reset the router into factory
RESET
default settings.
To enable WPS function, you can press and hold this button within 3
WPS/Wi-Fi senconds. You can enable or disable the wireless funciton by pressing
and holding this button for more than 3 seconds.
6
Chapter 2
8
Chapter 2 Connect the Hardware
Method 2: Wireless
Use the default SSID (Wireless Network Name) and Wireless Password printed on the
product label of the router to connect wirelessly.
Method 3: Use the WPS button
Wireless devices that support WPS, including Android phones, tablets, most USB
network cards, can be connected to your router through this method. (WPS is not
supported by iOS devices.)
Note:
The WPS function cannot be configured if the wireless function of the router is disabled. Also, the WPS function will be
disabled if your wireless encryption is WEP. Please make sure the wireless function is enabled and is configured with the
appropriate encryption before configuring the WPS.
9
Chapter 3
With the web management page, it is easy to configure and manage the router. The web
management page can be used on any Windows, Macintosh or UNIX OS with a Web
browser, such as Microsoft Internet Explorer, Mozilla Firefox or Apple Safari.
Follow the steps below to log in to your router.
1. If the TCP/IP Protocol on your computer is set to the static (fixed) IP address, you
need to change its settings to obtain an IP address automatically. Refer to Appendix:
Troubleshooting to configure your computer.
2. Launch a web browser and go to http://tplinkmodem.net or http://192.168.1.1.
Enter the default passward “admin“ and click Log in to log in to your router.
11
Chapter 4
13
Chapter 4 Set Up Internet Connection
3. Click Start to test the internet connectivity and you will see the test results in the
gray box.
14
Chapter 4 Set Up Internet Connection
4. Select your WAN Interface Name (Status should be Connected) and click the
(Edit) icon.
5. Scroll down the page, enable IPv6, and configure the IPv6 parameters.
• Addressing Type: Consult your ISP for the addressing type (DHCPv6 or SLAAC).
SLAAC is the most commonly used addressing type.
• IPv6 Gateway: Keep the default setting as Current Connection.
Note: If your ISP has provided the IPv6 address, click Advanced to reveal more settings. Check to use IPv6
specified by ISP and enter the parameters provided by your ISP.
6. Click Save to make the settings effective. Now IPv6 service is available for your
network.
15
Chapter 5
VoIP
This chapter guides you on how to make telephone calls via Internet.
• Connecting the Telephone
• Entering Telephone Information
• Telephone Book
• Telephony Devices Management
• Call Log
• Calling via Which Number
• Call Blocking
• Forwarding Calls
Chapter 5 VoIP
3. Enter the necessary information as required, and click Save to make the settings
effective.
Phone Number: The number you use to dial and answer.
Registrar Address: Usually a domain name, if not, an IP address.
Authentication ID and Password: Not necessary information, but if you have, fill them in.
Advanced: Click to have more configuration.
To have more configuration on telephony settings
Click Advanced under Advanced Settings to configure more telephony settings.
17
Chapter 5 VoIP
Bound Interface: Bound Interface decides where to send/receive the VoIP traffic. An
easy way to select the interface is to check the location of the SIP (Session Initiation
Protocol) server. If it locates somewhere on the Internet then select Any_WAN. If it is on
the local network, select LAN.
Locale Selection: Select a country where you are located. The router is embedded
with some default parameters according to different countries such as ring tones. The
default country is China.
DSCP for SIP/RTP: DSCP (Differentiated Services Code Point) is the first 6 bits in
the ToS byte. DSCP marking allows users to assign specific application traffic to be
executed in priority by the next Router based on the DSCP value. Select DSCP for the
SIP (Session Initiation Protocol) and RTP (Real-time Transport Protocol) respectively. If
you are unsure, please always keep the default value.
DTMF Relay Setting: DTMF is Dual Tone Multi Frequency. Options available are SIP-Info,
RFC2833, and In-band. If you are unsure which one to choose, please always keep the
default value.
• SIP INFO: If it is selected, the router will capture the DTMF tone and transfer it into SIP
form. Then it will be sent to the remote end with SIP message.
• RFC2833: If it is selected, the router will capture the keypad number you pressed and
transfer it into digital form then send to the other side; the receiver will generate the
18
Chapter 5 VoIP
tone according to the digital form it receives. This function is very useful when the
network traffic congestion occurs and it still can remain the accuracy of DTMF tone.
• In-band: If it is selected, the router will send the DTMF tone as audio directly when you
press the keypad on the phone.
Registry Expiration Time: Expiration time for the registration message sending.
Registration Retry Interval: Set the time duration for your SIP Registrar server to keep
your registration record. Before the time expires, the Router will send another register
request to SIP Registrar again. If you are unsure of it, please always keep the default
value.
“No Answer Time: Set a time period, after which the caller is told that the call is not
answered and he or she can leave a message if the voice mail function is enabled.
T.38 Support: Select the checkbox to enable this function. T.38 specifies a protocol for
transmitting a fax across IP network in real time. It allows the transfer of fax documents
in real-time between two standard Group 3 facsimile terminals over the Internet or
other networks using IP protocols. It will only function when both sites support this
feature and are enabled.
End with #: Enable or disable using “#” as the end signal of your dialing.
Digit Map: If enabled, the number will directly dial out when it matches the Digit Map.
When the Status column change to , your telephone information is successfully
registered. At this time, you can pick up your phone, dial the number, and call via Internet!
5. 3. Telephone Book
You can store all contacts in your router, set speed dial numbers for some contacts and
enable emergency calls.
5. 3. 1. Telephone Book
Follow the steps below to have a telephone book on the router.
1. Visit http://tplinkmodem.net, and log in with the default password.
2. Go to Advanced > Telephony > Telephone Book. Click Add to enter a new contact’s
information.
19
Chapter 5 VoIP
3. You can set speed dial number for a certain number type. Speed dial function allows
you to reach the desired party by dialing the reduced number of keys rather than a
long phone number.
4. Click Save to save the settings.
5. 3. 2. Emergency Calls
20
Chapter 5 VoIP
Done! From now on, if you pick up your phone but do not dial within
the no-operation time, your phone will automatically dial the
emergency number!
I want to: Adjust the voice volume of my speaker and the microphone,
because the sounds are too loud/weak and I can’t catch the
words.
21
Chapter 5 VoIP
Done! Now the sounds of your telephony device are set appropriately
and enjoy your conversation.
22
Chapter 5 VoIP
5. 5. Call Log
I want to: Have a call list recording detailed information of incoming calls
and outgoing calls on my router.
Done! From now on, all calls in and out are recorded here. If you’ve
already created a telephone book, the name of the contact will
be shown on the call list.
I want to: Use different outgoing numbers to make different type of calls.
23
Chapter 5 VoIP
Done! From now on, whenever you are dialing a long distance call, the
call is made via the number you choose in step 4.
5. 7. Call Blocking
If you do not want calls to be received or dialed, you can use call block function. DND
& Call Blocking consists of three functions: Do Not Disturb, Block Certain Calls and
Prevent from Dialing.
5. 7. 1. Do Not Disturb
24
Chapter 5 VoIP
3. Enable DND.
4. Set the day(s) and time when DND is enabled.
5. Click Save to make the settings effective.
Done! Now, within the set period of time, no telephone will ring, but all
incoming calls will be recorded in call log. Enjoy your peaceful
time and you can check the call log to see what was missed.
I want to: Block certain calls, for example, the anonymous calls, or calls
from the annoying salespeople.
25
Chapter 5 VoIP
Done! Now your router will automatically block all incoming calls
according to your set list.
Done! Now your router will prevent all mobile phone from being dialed.
5. 8. Forwarding Calls
Done! Now your router will automatically forward the call according to
your rules.
27
Chapter 6
Parental Controls
This function allows you to block inappropriate, explicit and malicious websites and
limit internet access during specified time periods.
Chapter 6 Parental Controls
3. Click Add.
29
Chapter 6 Parental Controls
9. Click Add a New Keyword. You can add many keywords for
both Blacklist and Whitelist. Below are some sample entries
to allow access.
1 ) Enter a web address (for example, www.tp-link.com) or
a web address keyword (for example, wikipedia) to only
allow access to the websites containing that keyword.
2 ) Specify the domain suffix (for example, .edu or .org) to
allow access to the websites with that suffix.
10. Enter the keywords or websites you want to add and click
Save.
Done! Now you can control your children’s internet access according
to your needs.
31
Chapter 7
QoS
This chapter explains how to create a QoS (Quality of Service) rule to prioritize your
online activities, which minimizes the impact caused by heavy internet traffic.
It contains the following sections:
• Prioritize Internet Traffic with QoS
• Rule List
Chapter 7 QoS
7. 1. 1. Basic Settings
1) Visit http://tplinkmodem.net, and log in with the default password.
2) Go to Advanced > Quality of Service > Basic Settings.
3) Enable QoS.
7. 1. 2. Queue Settings
1) Specify the parameters on Queue Settings.
• Upstream Bandwidth: Input the Upstream Bandwidth, the default value is 0, which
means no limit.
• Scheduling Strategy: Set the policies to schedule the queues.
• PQ/SP: Schedule according to the priority of the queue (Hightest, High, Middle,
Low), and prioritize queues with higher priority.
• WRR: Schedule according to the weight of the broadband, and allocate the
bandwidth of the queue according to the set weight.
• CAR: Schedule according to the bandwidth (kbps).
• DSCP/TC Mark: Select the checkbox to enable the DSCP/TC Mark in the head of
the packet IP.
33
Chapter 7 QoS
• 802.1P Mark: Set the 802.1P value for the packet: Mark 0 (the value is set to 0),
Transparent (keep the default value), Re-mark.
2) Click Save.
7. 2. Rule List
7. 2. 1. Rule Settings
Add rules for data classification .
1. Click Add, you can set the specific rules for the packages.
Note:
1. If you want to set DSCP/TC value and 802.1p value, you need to enable DSCP/TC mark and select 802.1p mark as
re-mark.
2. If you want to delete a QoS rule, click to remove the responding rule from the list.
34
Chapter 7 QoS
Now for the packages in Queue Class 1, the DSCP/TC Value will be set to 1, and 802.p
Value will be set to 1.
7. 2. 2. Filter Settings
After setting a new rule, You can assign data to Queue Class1 by Filter Settings.
For example, to assign the TCP packet with destination port 1511 to Queue Class 1.
1. Click , you will see the Filter Settings page.
2. Click the button in the Destination Port row.
3. Set the Min Value and Max Value to 1511, keep the Protocol Type as default.
4. Click Save.
35
Chapter 7 QoS
Now, all TCP packets with destination port 1511 will match to the Rule 1, the packet will
be assigned to Queue Class 1, the DSCP/TC Value will be set to 1, and 802.p Value will
be set to 1.
36
Chapter 8
Network Security
This chapter guides you on how to protect your home network from unauthorized users
by implementing network security functions. You can block or allow specific client
devices to access your wireless network using MAC Filtering, or using Access Control
for wired and wireless networks, or you can prevent ARP spoofing and ARP attacks by
using IP & MAC Binding.
• Firewall & DoS Protection
• Service Filtering
• Access Control
• IP & MAC Binding
Chapter 8 Network Security
DoS Protection can protect your home network against DoS attacks from flooding your
network with server requests. Follow the steps below to configure DoS Protection.
1. Visit http://tplinkmodem.net, and log in with the default password.
2. Go to Advanced > Security > Firewall & DoS Protection.
1. The level of protection is based on the number of traffic packets. You can specify the level under DoS Protection
Level Settings.
38
Chapter 8 Network Security
2. The protection will be triggered immediately when the number of packets exceeds the preset threshold value,
and the vicious host will be displayed in the Blocked DoS Host List.
8. 2. Service Filtering
With Service Filtering, you can prevent certain users from accessing the specified
service, and even block internet access completely.
1. Visit http://tplinkmodem.net, and log in with the default password.
2. Go to Advanced > Security > Service Filtering.
3. Enable Service Filtering.
4. Click Add.
39
Chapter 8 Network Security
5. Select a Service Type from the drop-down list and the following four boxes will be
automatically filled in. Select Custom when your desired service type is not listed,
and enter the information manually.
6. Specify the IP address(es) that this filtering rule will apply to.
7. Click Save.
Note: If you want to disable this entry, click the button.
8. 3. Access Control
Access Control is used to block or allow specific client devices to access your network
(via wired or wireless) based on a list of blocked devices (Blacklist) or a list of allowed
devices (Whitelist).
I want to: Block or allow specific client devices to access my network (via
wired or wireless).
40
Chapter 8 Network Security
41
Chapter 8 Network Security
3 ) Enter the Device Name and MAC Address. (You can copy
and paste the information from Online Devices table if
the device is connected to your network.)
4 ) Click Save.
Done! Now you can block or allow specific client devices to access your
network (via wired or wireless) using the Blacklist or Whitelist.
42
Chapter 8 Network Security
Done! Enjoy the internet without worrying about ARP spoofing and
ARP attacks.
43
Chapter 9
NAT Forwarding
Router’s NAT (Network Address Translation) feature makes the devices in the LAN
use the same public IP address to communicate in the internet, which protects the
local network by hiding IP addresses of the devices. However, it also brings about the
problem that external host cannot initiatively communicate with the specified device in
the local network.
The router can use a forwarding feature to remove the isolation of NAT and allow
external internet hosts to intuitively communicate with the devices in the local network,
thus enabling some special features.
TP-Link router includes four forwarding rules. If two or more rules are set, the priority
of implementation from high to low is Virtual Servers, Port Triggering, UPNP and DMZ.
This chapter contains the following sections:
• Translate Address and Port by ALG
• Share Local Resources over the Internet by Virtual Server
• Open Ports Dynamically by Port Triggering
• Make Applications Free from Port Restriction by DMZ
• Make Xbox Online Games Run Smoothly by UPnP
Chapter 9 NAT Forwarding
45
Chapter 9 NAT Forwarding
I want to: Share my personal website I’ve built in a local network with my
friends through the internet.
For example, the personal website has been built on my home
PC (192.168.1.100). I hope that my friends can visit my website.
The PC is connected to the router with the WAN IP address
218.18.232.154.
Personal Website
Router
Home
46
Chapter 9 NAT Forwarding
4. Click Scan, and choose HTTP. The external port, internal port
and protocol will be automatically filled in. Enter the PC’s IP
address 192.168.1.100 in the Internal IP field.
5. Click Save to save the settings.
Tips:
1. It is recommended to keep the default settings of Internal Port and Protocol
if you are not clear about which port and protocol to use.
2. If the service you want to use is not in the Service Type, you can enter the
corresponding parameters manually. You should verify the port number
that the service needs.
3. You can add multiple virtual server rules if you want to provide several
services from a router. Please note that the External Port cannot be
overlapped.
router can forward them to the corresponding host. Port triggering is mainly applied
to online games, VoIPs and video players. Common applications include MSN Gaming
Zone, Dialpad, Quick Time 4 players, and so on.
Follow the steps below to configure the port triggering rules:
1. Visit http://tplinkmodem.net, and log in with the default password.
2. Go to Advanced > NAT Forwarding > Port Triggering and click Add.
3. Click Scan, and select the desired application. The triggering port and protocol, the
external port and protocol will be automatically filled in. Here we take MSN Gaming
Zone as an example.
4. Click Save to save the settings.
Tips:
1. You can add multiple port triggering rules according to your network need.
2. If the application you need is not listed in the Existing Applications list, you can enter the parameters manually. You should
verify the external ports the application uses first and enter them into External Port field according to the format suggested.
48
Chapter 9 NAT Forwarding
applications, like IP camera and database software, you can set the PC to be a DMZ
host.
Note:
DMZ is most applicable when you don’t know which ports to open. When it is enabled, the DMZ host is totally exposed
to the internet, which may bring some potential safety hazards. If DMZ is not in use, please disable it in time.
I want to: Make the home PC join the internet online game without port
restriction.
For example, due to some port restriction, when playing the
online games, you can log in normally but cannot join a team
with other players. To solve this problem, set your PC as a DMZ
with all ports opened.
49
Chapter 9 NAT Forwarding
For example, when you connect your Xbox to the router which has connected to
the internet to play online games, UPnP will send request to the router to open the
corresponding ports allowing the following data penetrating the NAT to transmit.
Therefore, you can play Xbox online games without a hitch.
LAN WAN
Xbox Router
50
Chapter 10
2. Go to Advanced > Network > LAN Settings page and select IPv4.
3. Scroll down to locate the Address Reservation table and click Add to add an address
reservation entry for your device.
4. Enter the MAC Address of the device for which you want to reserve IP address.
5. Specify the IP address which will be reserved by the router.
6. Check to Enable This Entry and click Save to make the settings effective.
54
Chapter 10 Customize Your Network Settings
1 ) Select the RADVD address type to make the router assign IPv6 address prefixes
to hosts.
Note:
Do not select the Enable RDNSS and Enable ULA Prefix check boxes unless required by your ISP. Otherwise
you may not be able to access the IPv6 network. For more information about RDNSS and ULA Prefix, contact
our technical support.
2 ) Keep Site Prefix Type as the default value Delegated. If your ISP has provided a
specific IPv6 site prefix, select Static and enter the prefix.
3 ) Keep WAN Connection as default.
4. Click Save to make the settings effective.
55
Chapter 10 Customize Your Network Settings
1 ) Select the DHCPv6 Server address type to make the router assign IPv6
addresses to hosts.
2 ) Specify the Start/End IPv6 Address for the IPv6 suffixes. The router will
generate IPv6 addresses within the specified range.
3 ) Keep Address Lease Time as default.
4 ) Keep Site Prefix Type as the default value Delegated. If your ISP has provided a
specific IPv6 site prefix, select Static and enter the prefix.
5 ) Keep WAN Connection as the default value.
4. Click Save to make the settings effective.
56
Chapter 10 Customize Your Network Settings
¾¾ To hide SSID:
Select Hide SSID, and your SSID will not be broadcast. Your SSID won’t display on your
wireless device when you scan for local wireless network list and you need to manually
join the network.
Channel: Select the channel you want to use from the drop-down list. This field
determines which operating frequency will be used. It is not necessary to change the
wireless channel unless you notice interference problems with another nearby access
point.
57
Chapter 10 Customize Your Network Settings
Channel Width: Select the channel width from the drop-down list. The default setting is
Auto, which can adjust the channel width for your clients automatically.
Transmit Power: Select Low, Middle, or High to specify the data transmit power. The
default and recommended setting is High.
58
Chapter 10 Customize Your Network Settings
6. When the WPS LED is on, the client device has successfully connected to the router.
3. Take a note of the Current PIN of the router. You can also click the Generate button
to get a new PIN.
4. Enter the router’s PIN on the client device. (The default PIN is also printed on the
label of the router.)
5. The WPS LED flashes for about 2 minutes during the WPS process.
6. When the WPS LED is on, the client device has successfully connected to the router.
Note:
1. The WPS LED on the router will light on for five minutes if the device has been successfully added to the network.
2. The WPS function cannot be configured if the wireless function of the router is disabled. Please make sure the wireless function
is enabled before configuring WPS.
59
Chapter 10 Customize Your Network Settings
4. Click Add to set the Wireless Off Time, and click Save to save the settings.
Note:
1. Make sure that the time of the router is correct before using this function. For details, refer to Set System Time.
2. The wireless LED will turn off if the corresponding wireless network is disabled.
3. The wireless network will be automatically turned on after the time period you set.
60
Chapter 10 Customize Your Network Settings
Tips: You can also see the wireless details by clicking the router icon on Basic> Network Map.
61
Chapter 10 Customize Your Network Settings
• Beacon Interval: Enter a value between 25 and 1000 in milliseconds to determine the
duration between which beacon packets are broadcasted by the router to synchronize
the wireless network. The default is 100 milliseconds.
• RTS Threshold: Enter a value between 1 and 2347 to determine the packet size of
data transmission through the router. By default, the RTS (Request to Send) Threshold
size is 2347. If the packet size is greater than the preset threshold, the router sends
Request to Send frames to a particular receiving station and negotiates the sending
of a data frame, or else the packet will be sent immediately.
• DTIM Interval: Enter a value between 1 and 255 to determine the interval of the
Delivery Traffic Indication Message (DTIM). 1 indicates the DTIM Interval is the same
as Beacon Interval.
• Group Key Update Period: Enter the number of seconds to control the time interval
for the encryption key automatic renewal. The default is 0, indicating no key renewal.
• WMM: This feature guarantees the packets with high-priority messages being
transmitted preferentially. WMM is enabled compulsively under 802.11n or 802.11ac
mode.
• Short GI: This feature is enabled by default and recommended to increase the data
capacity by reducing the Guard Interval (GI) time.
• AP Isolation: Select this check box to enable the AP Isolation feature that allows you
to confine and restrict all wireless devices on your network from interacting with each
other, but still able to access the Internet. AP isolation is disabled by default.
• Interference Suppression: Enable this feature to reduce interference.
can change any time and you don’t know when it changes. In this case, you might need
the DDNS (Dynamic Domain Name Server) feature on the router to allow you and your
friends to access your router and local servers (FTP, HTTP, etc.) using domain name, in
no need of checking and remembering the IP address.
Note: DDNS does not work if the ISP assigns a private WAN IP address (such as 192.168.1.x) to the router.
I want to: Visit multiple networks and multiple servers at the same time.
For example, in a small office, my PC can surf the Internet, but I
also want to visit my company’s server. Now I have a switch and
another router. I connect the devices as shown in the following
figure so that the physical connection between my PC and my
63
Chapter 10 Customize Your Network Settings
WAN: 172.30.30.100
Switch
My PC
192.168.1.100
How can I 1. Make sure the routers use different LAN IP addresses on the
do that? same subnet. Disable Router 2’s DHCP function.
2. Visit http://tplinkmodem.net, and log in with the default
password.
3. Go to Advanced > Network > Static Routing. Select your
current WAN Interface and click Save.
4. Click Add to add a new static routing entry. Finish the settings
according to the following explanations:
64
Chapter 10 Customize Your Network Settings
65
Chapter 10 Customize Your Network Settings
I want to: Set up the IPv6 tunnel though my ISP doesn’t provide me with
the tunnel service.
Note:
If there is no available WAN connection to choose, make sure you have
connected to the Internet and the connection type is not Bridge.
Done! Now you can visit the IPv6 websites with the 6to4 tunnel.
66
Chapter 10 Customize Your Network Settings
Note:
Still not being able to access IPv6 resources means that not any 6to4 public server was found in your network. You can
contact your ISP to sign up for IPv6 connection service.
10. 6. 2. Specify the 6rd Tunnel with Parameters Provided by Your ISP
I want to: Specify the 6rd tunnel with the parameters provided by my 6rd
tunnel service provider.
Note:
If there is no available WAN connection to choose, make sure you have
connected to the Internet and the connection type is not Bridge.
Done! Now you can visit the IPv6 websites with the 6rd tunnel.
Tips:
The way to set up DS-Lite tunnel is similar to that of 6rd tunnel. If you are provided with an IPv6-only WAN connection
and have signed up for DS-Lite tunnel service, specify the DS-Lite tunnel by referring to the steps above.
67
Chapter 11
This chapter introduces how to change the system settings and administrate your
router’s network.
This chapter contains the following sections:
• Set System Time
• Update the Firmware
• Back up and Restore Configuration Settings
• Change the Administrator Account
• Local Management
• Remote Management
• System Log
• Monitor the Internet Traffic Statistics
• CWMP Settings
Chapter 11 Manage Your GPON Router
69
Chapter 11 Manage Your GPON Router
70
Chapter 11 Manage Your GPON Router
3. Click Backup to save a copy of the current settings to your local computer. A conf.
bin file will be stored to your computer.
3. Click Browse to locate the previous backup configuration file, and click Restore.
4. Wait for the restoring and then the router will automatically reboot.
71
Chapter 11 Manage Your GPON Router
3. Enter the old password. Enter the new password and enter it again to confirm.
4. Click Save to make the settings effective.
4. Click Save.
Now, you can manage the router over both HTTP (http://tplinkmodem.net) and HTTPS
(https://tplinkmodem.net).
72
Chapter 11 Manage Your GPON Router
Note:
If you want all local devices can manage the router, just leave the IP/MAC Address field blank.
Follow the steps below to allow remote devices to manage the router over HTTPS.
1. Visit http://tplinkmodem.net, and log in with the password.
2. Go to Advanced > System Tools > Administration page. Locate the Remote
Management section.
3. Tick the check box to enable Remote Management. Enable Remote Management
via HTTPS to allow for HTTPS connection. Keep the Port as the default setting.
4. Set the client device allowed for remote management. Select All to allow all remote
devices to manage the router. If you just want to allow a specific device to manage
the router, select Only the Following IP/MAC Address and enter the IP/MAC address
of the remote device.
5. Click Save.
All devices or the specific device on the Internet can log in to your router using the
address displayed on the Manage This Router via the Address field to manage the
router.
73
Chapter 11 Manage Your GPON Router
Tips:
1. If you were warned about the certificate when visiting the web management page remotely, click Trust (or a similar option)
to continue. To avoid this warning, you can download and install the certificate on the router’s web management page at
Advanced > System Tools > Administration.
2. The router’s WAN IP is usually a dynamic IP. Please refer to Set Up a Dynamic DNS Service Account if you want to log in to
the router through a domain name.
74
Chapter 11 Manage Your GPON Router
• Save Locally: Select this option to cache the system log to the router’s local memory,
select the minimum level of system log to be saved from the drop-down list. The logs
will be shown in the table in descending order on the System Log page.
• Save Remotely: Select this option to send the system log to a remote server, select
the minimum level of system log to be saved from the drop-down list and enter the
information of the remote server. If the remote server has a log viewer client or a sniffer
tool implemented, you can view and analyze the system log remotely in real-time.
75
Chapter 11 Manage Your GPON Router
4. You can also go to Traffic Monitor List to view the traffic usage of all devices.
76
Chapter 11 Manage Your GPON Router
• CWMP: Enable or disable the CWMP (CPE WAN Management Protocol) function.
• Inform: Enable or disable the function of sending an inform message to the ACS (Auto
Configuration Server) periodically.
• Inform Interval: Set the time interval in seconds when the Inform message will be sent
to the ACS.
• ACS URL: Enter the web address of the ACS which is provided by your ISP.
• ACS Username/Password: Enter the username/password to log in to the ACS server.
• Interface used by TR-069 client: Select which interface to be used by the TR-069
client.
• Save SOAP messages to File: Toggle to enable and click Save To to save the messages
to a specific file.
• Connection Request Authentication: Select this check box to enable authentication
for the connection request.
• Username/Password: Enter the username/password for the ACS server to log in to
the router.
• Path: Enter the path for the ACS server to log in to the router.
• Port: Enter the port that connects to the ACS server.
77
Chapter 11 Manage Your GPON Router
78
Appendix: Troubleshooting
T1. How do I restore my router’s configuration to its factory default
settings?
• With the router powered on, press and hold down the Reset button on the side panel
of the router for until all LEDs turn on momentarily, then release the button.
• Use the Backup & Restore page, For details, please refer to the instruction in To reset
the router to factory default settings.
Note: Once the router is reset, the current configuration settings will be lost and you will need to re-configure the
router.
79
4 ) Click LAN settings, deselect the following three options and click OK;
80
• Change a web browser or computer and log in again.
• Reset the router to factory default settings: With the router powered on, press and
hold down the WPS/RESET button on the rear panel of the router for 8 seconds
until all LEDs turn back on momentarily, then release the button.
Note: You’ll need to reconfigure the router to surf the Internet once the router is reset.
Open a web browser and log in again. If login fails, please contact the technical
support.
• If you are using the computer with the authenticated MAC address to access
the router, please select Use Current Computer MAC Address.
• If you know the authenticated MAC address, please select Use Custom MAC
Address and then enter the address.
3. Click Save to make the settings effective.
T6. How to use the WDS Bridging function to extend my wireless network?
My house covers a large area. The wireless network coverage of the router I’m using (the
root router) is limited. I want to use an extended router to extend the wireless network of
the primary router. Follow the steps to configure the router.
1. Visit http://tplinkmodem.net, and log in with the password.
2. Configure the LAN IP address of the router in the same subnet as the root
router(255.255.255.0). For example, the IP address of the root router is 192.168.1.1,
the IP address of the extended router should be from 192.168.1.2 to 192.168.1.254.).
82
3. Go to Advanced > Wireless > Advanced Settings page. Locate the WDS section
and select the checkbox to enable the WDS Bridging function.
4. Click Scan to scan all the AP devices and choose the root AP to be bridged.
5. Click the connect icon and then the SSID and MAC will be automatically filled in.
Configure the security settings as the AP you choose to be bridged.
83
Now, the root’s wireless network is extended and you can use the router’s SSID and
password to enjoy the network.
Note: The extended router (router) can have different SSID and password from the root router, you can change your
router’s SSID and password on Basic > Wireless page.
84
connect the wireless network?
¾¾ If you failed to find any wireless network, follow the steps below:
1. Make sure the wireless function is enabled if you’re using a laptop with built-in
wireless adapter. You can refer to the relevant document or contact the laptop
manufacturer.
2. Make sure the wireless adapter driver is installed successfully and the wireless
adapter is enabled. You can refer to the relevant document or contact the wireless
adapter manufacturer.
¾¾ If you can find other wireless network except your own, follow the steps below:
1. Check the Wi-Fi LED indicator on your wireless router/modem;
2. Make sure your computer/device is still in the range of your router/modem. Move
closer if you are currently too far away.
3. Go to Basic > Wireless page, and check the wireless settings, double-check your
Wireless Name (SSID) is not hidden.
4. Connect to wireless network.
¾¾ If you can find your wireless network but fail to connect, follow the steps below:
1. Authentication problem: Network Security Key Mismatch.
1 ) Sometimes you will be asked to type in a PIN number when you connect to
the wireless network for the first time. This PIN number is different from the
Wireless Password/Network Security Key, usually you can only find it on the
label of your router.
2 ) If you cannot find the PIN or PIN failed, you may choose “Connecting using
a security key instead”, and then type in the Network Security Key/Wireless
Password;
85
3 ) If you continue to be told there is a network security key mismatch, it is
suggested to check the wireless password on your router.
Note: Wireless password/Network Security Key is case sensitive.
86
COPYRIGHT & TRADEMARKS
Specifications are subject to change without notice. is a registered trademark
of TP-Link Technologies Co., Ltd. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used
to make any derivative such as translation, transformation, or adaptation without
permission from TP-Link Technologies Co., Ltd. Copyright © 2018 TP-Link Technologies
Co., Ltd. All rights reserved.
87
FCC STATEMENT
Responsible party:
TP-Link USA Corporation, d/b/a TP-Link North America, Inc.
Address: 145 South State College Blvd. Suite 400, Brea, CA 92821
Website: http://www.tp-link.com/us/
Tel: +1 626 333 0234
Fax: +1 909 527 6803
E-mail: [email protected]
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to part 15 of the FCC Rules. These limits are designed
to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following
measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
• Consult the dealer or an experienced radio/ TV technician for help.
This device complies with part 15 of the FCC Rules. Operation is subject to the
following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference
that may cause undesired operation.
88
Any changes or modifications not expressly approved by the party responsible
for compliance could void the user’s authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or TV interference
caused by unauthorized modifications to this equipment. Such modifications
could void the user’s authority to operate the equipment.
90
CE Mark Warning
RF Exposure Information
This device meets the EU requirements (2014/53/EU Article 3.1a) on the
limitation of exposure of the general public to electromagnetic fields by way of
health protection.
The device complies with RF specifications when the device used at 20 cm from
your body.
91
Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated
with minimum distance 20 cm between the radiator & your body.
NCC Notice:
注意!
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均
不得擅自變更頻率、加大功率或變更原設計之特性或功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通行;經發現有干
擾現象時,應立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依
電信規定作業之無線電信。低功率射頻電機需忍受合法通信或工業、科學以及醫
療用電波輻射性電機設備之干擾。
BSMI Notice
安全諮詢及注意事項
• 請使用原裝電源供應器或只能按照本產品注明的電源類型使用本產品。
• 清潔本產品之前請先拔掉電源線。請勿使用液體、噴霧清潔劑或濕布進行
清潔。
• 注意防潮,請勿將水或其他液體潑灑到本產品上。
• 插槽與開口供通風使用,以確保本產品的操作可靠並防止過熱,請勿堵塞
或覆蓋開口。
• 請勿將本產品置放於靠近熱源的地方。除非有正常的通風,否則不可放在
密閉位置中。
• 請不要私自打開機殼,不要嘗試自行維修本產品,請由授權的專業人士進
行此項工作。
92
限用物質含有情況標示聲明書
限用物質及其化學符號
產品元件名稱 鉛 鎘 汞 六價鉻 多溴聯苯 多溴二苯醚
Pb Cd Hg CrVI PBB PBDE
PCB ○ ○ ○ ○ ○ ○
外殼 ○ ○ ○ ○ ○ ○
電源適配器 − ○ ○ ○ ○ ○
備考1. 超出0.1 wt %” 及 “超出0.01 wt %” 系指限用物質之百分比
含量超出百分比含量基準值。
備考2.“○”系指該項限用物質之百分比含量未超出百分比含量基準
值。
備考3.“ − “ 系指該項限用物質為排除項目。
Safety Information
• Keep the device away from water, fire, humidity or hot environments.
• Do not attempt to disassemble, repair, or modify the device.
• Do not use damaged charger or USB cable to charge the device.
• Do not use any other chargers than those recommended
• Do not use the device where wireless devices are not allowed.
• Adapter shall be installed near the equipment and shall be easily accessible.
• Use only power supplies which are provided by manufacturer and in the
original packing of this product. If you have any questions, please don’t hesitate
to contact us.
Please read and follow the above safety information when operating the device.
We cannot guarantee that no accidents or damage will occur due to improper
use of the device. Please use this product with care and operate at your own risk.
93
Explanations of the symbols on the product label
Symbol Explanation
DC voltage
RECYCLING
This product bears the selective sorting symbol for Waste electrical and electronic equipment
(WEEE). This means that this product must be handled pursuant to European directive 2012/19/
EU in order to be recycled or dismantled to minimize its impact on the environment.
User has the choice to give his product to a competent recycling organization or to the retailer
when he buys a new electrical or electronic equipment.
94