Predator Connect W6d Dual-band WiFi 6 Router

User Guide v.0.1

© 2023. All Rights Reserved. Revision: Feb, 2023

Important: This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your device. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual.

1. Overview

The Acer Connect series W6 is a new Wi-Fi 6 Dual-band wireless router optimized for gamers with intensive features and simple setup steps via a 1-2-3 wizard. It is a stylish 4-antenna desktop wireless router tuned for optimal gaming experience and household use. Network Security protection is embedded, with live updates ensuring your network is immune from malware and vulnerability threats 24-7. Smart home (IoT) devices can be set up on their own WiFi network. ACS (Automatic Channel Selection) dynamically chooses the most suitable channel for the W6d when experiencing interference from nearby 5GHz SSIDs. Port forwarding profiles for most game consoles (PS5, XBOX, etc.) are readily available for gameplay. Hybrid QoS is ideal for your Predator router, ensuring prioritization of gaming traffic and bandwidth utilization. The VPN feature provides a secure connection for your device when surfing the website.

2. Installation and Setup

2.1. Plug in AC adapter.

Diagram showing an AC adapter being plugged into a wall outlet.

2.2. Plug into outlet.

Diagram showing a power plug being inserted into a wall socket.

2.3. Plug in Internet cable.

Diagram showing an Ethernet cable being plugged into the WAN/Internet port of the router.

2.4. Power on device.

Illustration of a hand pressing the power button on the router.

2.5. Connect to PredatorW6 WiFi.

Screenshot of a mobile device displaying WiFi connection options, showing 'PredatorWX-XXXX-X.XGHz' and a 'Connect' button.

2.6. Important information is at the bottom of the device.

Label on the bottom of the device showing MFG Date: OCT.2022, Wi-Fi SSID: PredatorW6-XXXX, Wi-Fi PWD: ConnectXXXX, Admin PWD: AcerXXXX, and URL: http://acerconnect.com. Includes a 'Scan Here' section for Device Binding.

2.7. Setup via mobile app or browser.

How to setup the router via Predator Connect mobile App:

Setup the router via browser:

Note: The admin login password requires modification within the setup wizard for a first time use. Please create a strong password and keep it in a safe place. (New password cannot be same as the prior one.)

Note: The router web admin portal will automatically lock after five consecutive incorrect attempts. You have to power cycle the router to unlock the web admin.

Note: The SSID WiFi password can't be same as admin login password.

3. Initial Configuration

Please log in to the Predator Connect W6d Web Portal (http://acerconnect.com or IP: http://192.168.76.1) by using the current valid Admin password. You can select the language of Web UI by clicking on the drop down arrow [dropdown arrow].

Description of the login screen image: "Predator Connect W6d login screen with fields for Admin login, Enter password, Remember password, and a Log in button. Includes QR codes for downloading the mobile app."

Enter the login password to see the dashboard and other settings of your Predator Connect W6d. The router will automatically guide you step by step how to setup and configure internet access and basic network settings.

You can scan the QR code (on the login screen using your android mobile or iPhone) to download the mobile app and manage your router remotely.

3.1 Dashboard

Once you have successfully logged in, the key information will be displayed on the Predator Connect W6d dashboard.

Description of the dashboard image: "Predator Connect W6d dashboard showing sections for WAN, Host WiFi, Guest WiFi, Clients, Connection status, System up time, Network traffic graph, and Speed test results."

Dashboard Elements Explained

Connected Devices

Shows how many client devices are connected with your Predator Connect W6d through WiFi or LAN.

Description of Connected Devices table image: "Table showing connected devices with columns for Device, IP address, MAC address, Connection, Duration, and an Edit/Block option. Includes sections for Host WiFi, Guest WiFi, Smart home WiFi, and Blocked devices."

9. Network Traffic and Speed Test

Network Traffic: Helps indicate real-time status of the Download (DL) and Upload (UL) speeds across the WAN.

Network Speed Test:

Description of Speed Test image: "Screenshot of the Speedtest interface showing PING, JITTER, DOWNLOAD, and UPLOAD speeds, with server information."

It will test and clearly show the network download and upload speed in Mbps, ping rate and jitter in milliseconds.

After getting the speed test results, you have the option to run the speed test again.

4. Hybrid QoS

Hybrid QoS combines application priority and device priority. The Killer-Enabled PC can set applications priority and send packets with DSCP values to the Predator Connect W6d router, then the router will classify packets and set priority for all different applications based on the below definition.

For non-Killer-Enabled devices, Predator Connect W6d can identify game consoles, streaming devices, computers, and smartphones and IoT devices in the network and allocate them to priority group according to the default settings, or the user can manually set priority for devices connected to the router.

Application based QoS* priority: (Enabled by default)

Note: Application Priority will use the DSCP value in the IP header for packet classification. Laptop/desktop with Killer™ embedded traffic priorities in four grades by application. I.e. Extreme (Games), High (Streaming), Normal (Browsing), Low (Download).

Priority Applications (DSCP) Extreme (Games) High (Streaming) Normal (Browsing) Low (Download)
Intel Killer Killer Priority 1 (Games) Killer Priority 3 (Streaming) Killer Priority 4 (Browsing) Killer Priority 5 & 6 (Cloud Download)
Teams/Zoom, GT-Booster Killer Priority 2 (Real Time) Teams/Zoom Video Teams Shared Screen
NVIDIA GeForce NOW GeForce NOW (Video/Data) GeForce NOW (Audio)
Devices Game Port Connected
Game Console: PS, Xbox, Switch
Chromecast, FireTV, Roku
SmartTV
Computers, Smartphones
Other Devices
IoT Devices, Wearable

Device priority:

Note 1: Killer-Enabled PC is set to default extreme priority whether connected by wired Ethernet or by wireless.

Note 2: You may drag and drop connected clients into the desired priority level. The change is effective immediately.

Description of Device Priority image: "Visual representation of priority levels (Extreme, High, Normal, Low) with example devices like 'BoLsAir' and 'LAPTOP'."

For the upload and download bandwidth configuration, please contact your ISP to get the exact value of upload and download bandwidth. Once the bandwidth is configured, QoS will reserve the bandwidth according to the weighting percentage of each priority queue.

Description of Bandwidth configuration section: "Bandwidth section with options for 'Use default configuration' and 'Setting manually'. Fields for Upload bandwidth, Download bandwidth, and Priority weighting (Extreme, High, Normal, Low percentages). Buttons: 'Cancel', 'Apply bandwidth'."

5. WiFi

WiFi Status

Displays key information such as:

5.1. Basic Settings

In this page, you can edit WiFi SSID and enable or disable SSID broadcast and use the following security parameters for 2.4GHz and 5GHz bands.

Supported security: WPA, WPA2, WPA/WPA2, WPA3 personal, WPA2/WPA3, Enhanced open.

Encryption option: AES, Auto, TKIP. Auto and TKIP are available only, when WPA, WPA/WPA2 security option applied.

Description of Basic Settings image: "Screenshot of WiFi Basic Settings for 2.4GHz and 5GHz bands, showing SSID, broadcast, security, encryption, and password fields."

5.2. Guest WiFi

This tab provides information about the Internet connection for guests and their devices accessing your network.

When enabling Guest WiFi on any band, it will ask to provide Guest WiFi SSID and security parameters. You can select security and encryption option by clicking drop down arrows [dropdown arrow].

Description of Guest WiFi settings image: "Screenshot of Guest WiFi settings for 2.4GHz and 5GHz bands, showing SSID, security, encryption, and password fields."

Guest WiFi Password

Guest WiFi password is set by default for all bands, so it is suggested to change the passwords for security reasons.

5.3. Smart Home WiFi

This tab provides Internet connection for smart home WiFi, but blocks access to devices on your local network.

Choose to enable between 2.4GHz/ 5GHz band and set the WiFi SSID and security parameters for smart home WiFi.

Description of Smart Home WiFi settings image: "Screenshot of Smart Home WiFi settings for 2.4GHz and 5GHz bands, showing SSID, security, and password fields."

5.4. WPS (WiFi Protected Setup)

WPS provides an easy way to connect your device to the network by pushing the WPS button (next to the USB port) or entering a PIN code.

In this page, you can configure the WPS settings of 2.4GHz and 5GHz bands. There are two methods to configure WPS i.e. using a PIN (client's pin or Router's pin) or you can choose a second method, in which you need to click on "Start WPS" [Start WPS button], then enable WPS on your wireless device within two minutes. WPS will be disabled, if WiFi set to WPA3, WPA or TKIP mode, or if SSID broadcast is turned off.

Description of WPS settings image: "Screenshot of WPS settings showing Method 1 (Using a PIN) and Method 2 (Start WPS button)."

5.5. Antenna Calibration

In general, we suggest putting all four router antennas up (90 degree vertical with surface) toward the ceiling when positioned on a flat desk. However, if you want a specific client to benefit with lower latency for better gaming experience, you can follow the steps below to adjust antenna angle accordingly.

Step 1:

Put the mobile or laptop in a position where you want the best coverage, and then enable the calibration option.

Note: Walls and floors affect the signal between router and your device. For optimal signal, it is recommended to put your device in the line of sight with the router.

Step 2:

LED indicators adjacent to the router antenna use color to reflect the signal strength: blue is good; green is normal; red is weak.

Description of Antenna Calibration image: "Diagram of the router with four antennas, showing '5G & 2.4G' and 'LED' labels near each antenna."

Note 1: Please make sure that your mobile device or computer is wirelessly connected to the router. The feature is not applicable when connected via Ethernet LAN.

Note 2: Four signal strength LEDs will be ON when the client is associated with 5GHz and calibrated.

Step 3:

Adjust each antenna direction to get better performance.

5.6. ACS (Automatic Channel Selection)

ACS is a mechanism to optimize the channel assignment. It selects the best working channel dynamically. One that is clear and has the least traffic.

Note 1: There will be a small delay, rescanning and then cycling OFF and ON if the client is associated within the ACS enablement band. Please check your device wireless connection and select the best WiFi W6d router SSID after ACS process is completed.

Note 2: The ACS is not applicable if all the bands (2.4GHz, 5GHz) are configured as fixed channel.

5.7. Advanced Settings

This tab will help you to setup advanced WiFi parameters for 2.4GHz and 5GHz bands.

AP isolation is a feature that enables you to create a separate virtual network preventing client communicating with each other and preventing unwanted hacking. This feature is disabled by default.

DFS (Dynamic Frequency Selection) is a function of using 5GHz Wi-Fi frequencies that are generally reserved for radar, such as satellite communication, weather radar etc.

Description of Advanced Settings image: "Screenshot of Advanced WiFi settings for 2.4GHz and 5GHz bands, showing Channel, 802.11 mode, AP isolation, Bandwidth, and DFS options."

5.8. WiFi MAC filter

Devices which are added in WiFi MAC filter will be blocked from accessing the Internet.

Click on the [Add icon (+)] icon to add the device in filter table by entering its name & MAC address. Up to 32 devices can be added in the MAC filter table.

Description of WiFi MAC filter image: "Screenshot of WiFi MAC filter table with columns for Status, Name, MAC address, and Edit, and an 'Add' button."

6. LAN

LAN status

In this page, you can view each LAN port status including its associated IP address, MAC address and DHCP server. The Predator Connect W6d has one Game port and three LAN ports.

Description of LAN status image: "Screenshot showing LAN status for WAN, Game port, and LAN ports, indicating connection status."

LAN Setting

This tab allows you to setup LAN IP gateway address with an option to enable or disable DHCP server feature.

You can enter/edit gateway address and subnet mask. DHCP server provides and assigns IP addresses, default gateways and other network parameters to client devices. DHCP server can be enabled or disabled as per the network requirement.

Following subnets are reserved for default services. Please do not use as gateway address:

Description of LAN Setting image: "Screenshot of LAN Setting page with fields for Gateway address, Subnet mask, DHCP server, Start IP address, End IP address, and DHCP lease time. Includes notes on reserved subnets and IP ranges."

7. Home Network Security

Home network security tab includes network security setting and web and app controller within parental control feature. These two features must accept the Trend Micro license agreement before enablement.

7.1. Network Security Setting

This tab contains network security related information, powered by Trend Micro, where you can turn on/off the security engine and enable protection against malicious sites, network attacks and harmful connections coming from IoT devices.

Note: Turn off the Security engine, you can turn off Malicious sites blocking, Network attack blocking and IoT security protection functions at the same time.

Security engine: [Toggle switch for Security Engine]

Trend Micro virus pattern version : 1.070

Malicious site blocking

Prevents from unwanted sites to open and hence protecting your computer from being infected with Trojans. There is a feature called “Trend Micro's Web Reputation Service (WRS) that identifies malicious URLs and allow you to take action against infected URLs.

Description of Malicious site blocking image: "Screenshot showing 'Malicious site blocking' with an 'Enable protection' toggle switch and protection status."

Network attack blocking

By enabling Network attack blocking feature, the router detects the infected devices and block its network behavior to prevent infection to other devices.

Description of Network attack blocking image: "Screenshot showing 'Network attack blocking' with an 'Enable protection' toggle switch and protection status."

IoT security protection

Enabling IoT security protection feature detects and blocks harmful connections from compromised IoT devices by using Trend Micro's smart protection network. It's a continuously updated IoT device reputation database that prevents the network from false connections.

Description of IoT security protection image: "Screenshot showing 'IoT security protection' with an 'Enable protection' toggle switch and protection status."

7.2. Parental Control

This feature allows you to control and block unwanted sites on specific devices. You can enable/disable Web & App controller & URL controller.

Once you click on the [Add icon (+)] icon, the following window will appear and here you can enter device list, device name, its MAC address, status and select the following categories for blocking websites.

Under the URL tab (see adjacent image) you can enter device list, device name, its MAC address and URL, which you want to forbid access to e.g. www.aaaa.com. Or you can add a keyword e.g. AAAA to forbid any URL containing the keyword.

You can also enter the Internet access time limit by setting the start time and end time.

Note: If the end time is earlier than the start time, the block time will cross to the next day. If the start time is the same as the end time, the block will be for a full day.

Description of Parental Control configuration image: "Screenshot of Parental Control settings showing fields for Website URL, Device name, MAC address, Status, Category selection, and Internet access limit time."

8. WAN

8.1. WAN Status

This tab provides information about WAN connectivity status and following key information:

Description of WAN Status image: "Screenshot of WAN Status page showing Duration, Connection status, MAC address, Connection mode, IP address, Subnet mask, Default gateway, and Primary/Secondary DNS server."

8.2. WAN Setting:

In this page, you can set up Ethernet WAN connection mode to DHCP, Static IP, PPPoE or switch WAN port to LAN, depending on your connection usage.

Click on the dropdown arrow [dropdown arrow] to reveal the drop down menu to select your preferred WAN settings. You can select "Switch WAN port to LAN (Switch/Bridge mode)", if you are using the router in repeater mode in which the WAN port is not required. As a result, you can have one more LAN port.

Note: After switching to Bridge mode,

Description of WAN Setting image: "Screenshot of WAN Setting page with options for Connection mode (DHCP, Static IP, PPPoE) and Primary/Secondary DNS server."

8.3. DMZ

DMZ is a physical or logical sub network that contains and exposes firm's facing services to an untrusted, usually larger, network such as the Internet.

If external users can't access certain network services provided by the Local Area Network (LAN), use the DMZ function to set the client that provides the required network services as the DMZ host. DMZ host IP address needs to be entered and then external users will have access to all services.

Description of DMZ settings image: "Screenshot of DMZ settings with a field for DMZ host IP address and 'Cancel'/'Apply' buttons."

8.4. NAT pass-through

NAT pass-through allows a Virtual Private Network (VPN) connection to pass through the router to the external network.

Description of NAT pass-through settings image: "Screenshot of NAT pass-through settings with a toggle switch and 'Cancel'/'Apply' buttons."

8.5. Port Forwarding

This feature allows external users to connect to Local Area Network (LAN) services using Hypertext Transfer Protocol (HTTP), File transfer protocols (FTP), and other protocols.

To add any application, click on the [Add icon (+)] icon and select a required service.

You can select any service profile from common services tab and it will then automatically show its name, LAN & WAN port number and its protocol.

Enter the LAN IP address and select the status ON/OFF and click on "Apply" [Apply button] button to activate the service.

We have added new game console profiles including:

Description of Port Forwarding common services list: "List of common services like FTP, SMTP, POP3, NNTP, SNMP, HTTP/PS4/Xbox/Steam TCP Port 80, PS4/Steam TCP Port 443, etc."

8.6. VPN Server

Setup VPN server on Predator Connect W6d for remote VPN connection over the Internet. This router offers two VPN services:

User needs to generate certificate before enabling VPN server. Once you create a VPN server, VPN connection link will establish and status will be shown. It will display the connection type, remote & local IP address and duration.

Description of VPN Server setup image: "Screenshot of VPN Server setup page showing options for OpenVPN and IPsec VPN, with connection type, remote IP, local IP, and duration fields."

OpenVPN Configuration

Open VPN is a SSL VPN and uses a chosen UDP or TCP port, allowing for flexible configuration choices. User access comes with two different options; Home network, Internet and home network.

User can also export OpenVPN configuration file (client.ovpn).

Description of OpenVPN Config image: "Screenshot of OpenVPN server configuration with fields for Service type, WAN IP, Service port, VPN subnet, VPN netmask, User access options, and Export configuration buttons."

IPsec VPN Configuration

IPsec VPN uses predefined communication channels, UDP 500 and UDP 4500, to establish the encrypted tunnel and ESP for the transmission of encrypted data.

Description of IPsec VPN Config image: "Screenshot of IPsec VPN server configuration with fields for Client IP address, Primary DNS server, Secondary DNS server, and Pre-shared key."

8.7. Firewall

Setup firewall rule to accept or drop network request from Internet.

In order to setup a firewall, click on the [Add icon (+)] icon and enter the name, source and destination port and IP address, protocol, target and status info.

Description of Firewall settings image: "Screenshot of Firewall settings page with columns for Name, Source IP address, Source port, Destination IP address, Destination port, Protocol, and Status."

8.8. WAN Ping

By enabling this feature, the WAN port of Predator Connect W6d will respond to ping requests that are sent to the WAN IP address from the Internet.

For better security, keep this feature turned OFF, and the device will not respond to a WAN ping.

Description of WAN Ping settings image: "Screenshot of WAN Ping settings with a toggle switch and 'WAN port ping' information."

8.9. DDNS

A DDNS service provides a fixed domain name for your router's dynamic IP address. You will need to register with a DDNS service among the following ones:

Description of DDNS settings image: "Screenshot of DDNS settings with options to Enable DDNS, select DDNS service, enter Host name, Username, Password, and use external IP check. Includes DDNS status."

9. IPv6

You can setup IPv6 settings from this tab.

The Predator Connect W6d supports IPv6 mode below: DHCPv6, static IPv6, PPPoE, 464xlat, 6rd, DS-Lite. Connection mode will be disabled by default.

Please consult your local Internet Service Provider before enabling and configuring the option.

Description of IPv6 settings image: "Screenshot of IPv6 settings page with Connection mode options."

10. SYSTEM

10.1. Firmware Update

In this tab, you can check the existing firmware version and also click on "check new" [Check new button], to see if there is an update available.

Description of Firmware Update image: "Screenshot of Firmware Update page showing current version, a 'Check new' button, and instructions for updating."

10.2. Login Password

You can change the login password of your Predator Connect W6d from this page. To make a new password, you need to enter the current password first. Please use a strong password to keep it secure.

Description of Login Password settings image: "Screenshot of Login Password settings with fields for Current password, New password, and Confirm new password, and 'Cancel'/'Apply' buttons."

10.3. Backup and Restore

In this tab, you can check how to save the configuration: Click on "Backup" [Backup button] to backup current device configuration. On both Windows and MAC OS, this is saved to your 'Downloads' folder.

How to restore the configuration:

  1. Click Browse [Browse button] to select a file.
  2. Click Restore [Restore button].

Description of Backup & Restore settings image: "Screenshot of Backup & Restore page with Backup and Restore sections, including Browse button."

10.4. System Log

System log will display here all the latest 100 activities you have done with the router. You can save the system log by clicking the "Save log" [Save log button] button at the bottom of the page.

Description of System Log table: "Table showing System Log entries with Date & Time and Event columns."

10.5. System Time

This tab allows you to synchronize the device time with the system time by enabling "Automatically set time zone". By enabling "daylight savings time", device will automatically adjust the time according to the time zone.

Description of System Time settings image: "Screenshot of System Time settings with options for Automatically set time zone, Automatically adjust to daylight savings time, Time zone selection, and Current date and time."

10.6. Main LED

This tab displays information about LED colors and its indication. These LED indicators will help you to know and understand router behavior.

LED Definition:

Congestion Detection test

Helps you to identify the Internet connection status; whether it is good, normal or poor. Different LED lights will indicate different statuses. LED is OFF, if congestion detection is disabled. Enter the host IP addresses for detection.

Description of Congestion Detection settings image: "Screenshot of Congestion Detection settings with options for Congestion detection and Host for detection IPs."

Enabling LED night mode, only dims the device luminance. Please check if you have already setup the correct time zone (auto/manual), before enabling this option. You can setup the daily schedule as needed.

Description of LED night mode setting image: "Screenshot of LED night mode setting with options for Night mode, Night mode from/to, and Repeat days."

10.7. System Information

It shows key device information of Predator Connect W6d, such as:

Description of System Information page: "System Information page showing Device name, Serial number, and Firmware version."

10.8. Restart and Reset Default

From this tab, you can click on "Restart device" [Restart button] to reboot the router and click on "Factory data reset" [Reset button] to restore factory default settings.

Please check if you have bind your device with Predator Connect Mobile App. After factory reset, please don't forget to unbind the device from mobile app.

10.9. Languages

You can select the language of your Predator Connect W6d from this tab.

Description of Languages selection page: "Languages selection page showing a list of available languages including English, Deutsch, Français, Español, Polski, Português (Brasil), Čeština, Português, Русский, Svenska, Norsk, Dansk, Suomi."

10.10. USB Storage

This router has a USB port where you can plug in a USB drive and allow all authorized users to access the files on your USB drive.

Once you plug in USB drive, it will display device type, size and free space available.

Enter the server name and login credentials for shared access to USB drive. In sharing setting, there is an option to enable/disable Network neighborhood (Samba).

Description of USB Storage settings page: "USB Storage page showing USB device details (Type, Total size, Space free) and Sharing setting (Server name, User name, Password, Network neighborhood)."

11. Troubleshooting

11.1 Quick tips

This section describes common issues you may encounter.

Sequence to restart the device and network:

  1. Turn off and unplug the modem power plug.
  2. Turn off the W6d router.
  3. Plug in the modem power plug and then turn it on. Wait for two minutes till the modem LED is steady as before.
  4. Turn on the W6d router and wait for the device upper deck main LED to be steady breathing.

11.2 Frequently Asked Questions (FAQs)

11.2.1 What can I do if I forget my wireless password?

11.2.2 What can I do if I forget the router's web portal admin password?

Reset the device by pressing and holding the reset key until the LED starts blinking white. After the device restores to factory default, please login web admin portal with admin PWD, labeled on the bottom of the device.

Note 1: The device web admin will be locked after 5 wrong password attempts. The user is required to reboot the device to disable the web admin.

Note 2: Remember to setup the device internet connection after reset. Remember to also change the admin password.

Note 3: If you ever bind the device via Predator Connect mobile app, remember to unbind it after factory data reset.

11.2.3 What can I do if I can't log into router's web admin portal?

Please follow the steps below to check on your client's device.

11.2.4 What can I do if I can't surf the internet even though the configuration is finished?

Please follow the step below to check on your W6d router:

12. Appendix: Factory Default Settings

Router web admin

Setting Value
URL http://acerconnect.com or http://192.168.76.1
Login password (case-sensitive) AcerXXXX (XXXX is randomized variables. Please check device bottom label)

Local Network (LAN)

Setting Value
Gateway address 192.168.76.1
Subnet mask 255.255.255.0
DHCP server 192.168.76.1
DHCP range 192.168.76.100 to 192.168.76.254
Time zone Depends on country or region you bought the router.
DHCP starting IP address 192.168.76.100
DHCP ending IP address 192.168.76.254
Time adjusted for daylight save time Enabled.

Wireless LAN (WLAN)

Setting Value
WiFi SSID (case-sensitive) 2.4 GHz : PredatorW6d-YYYY-2.4GHz
5 GHz : PredatorW6d-YYYY-5GHz (YYYY is randomized variables. Please check device bottom label)
Security 2.4 GHz : WPA2/WPA3
5 GHz : WPA2/WPA3
SSID Broadcast Enabled.
Country / Region United States in the US; otherwise, varies by region.
RF channel 2.4 GHz : Auto
5 GHz : Auto
Default operation mode (with AX enabled) 2.4 GHz : Up to 600 Mbps
5 GHz : Up to 4804 Mbps
Guest WiFi Disabled.
Smart Home WiFi Disabled.
Home Network Security Disabled.

13. Router Basic Specification

Component Specification
Processor System: MT7986A (Panther + Merlin)
CPU: Quad A53 2.0GHz
Memory LPDDR: 1GB
Storage: 4GB
Wireless LAN IEEE standard: 802.11 a/b/g/n/ac/ax
MU-MIMO: Yes
Band: Dual band, 2.4/5GHz
Throughput: 1 x 2.5Gbps
Ethernet WAN: N/A
LAN: 4 x 1Gbps with 1 Game port
USB Port: USB 3.0 Type-A
Storage: FTP, Samba
Button WPS: Yes
Power: Power-ON/OFF
Form factor Dimension: N/A
Weight: N/A
DC Power Jack Input Voltage: AC 100-240V, 50-60Hz, 1.6A
Power Adapter: 12V/3A 36W

File Info : application/pdf, 29 Pages, 3.27MB

PDF preview unavailable. Download the PDF instead.

ACER PREDATOR W6D (01)

References

Related Documents

Preview Acer Predator Connect X5 5G CPE User Guide
This user guide provides comprehensive instructions for the Acer Predator Connect X5 5G CPE. Discover how to set up, configure, and optimize this advanced 5G router, designed to deliver high-speed internet connectivity and an enhanced online experience for gamers and media streamers. Explore features such as 5G and Wi-Fi 6 technology, detailed setup procedures, network security options, and performance tuning to maximize your internet usage.
Preview Acer Connect X6E 5G CPE User Guide
User guide for the Acer Connect X6E 5G CPE, covering setup, configuration, features, and troubleshooting.
Preview Acer Predator Connect X7 BE11000 Tri-band Wi-Fi 7 5G CPE User Guide
Comprehensive user guide for the Acer Predator Connect X7 BE11000, a tri-band Wi-Fi 7 5G CPE optimized for gamers. Covers installation, setup, dashboard features, network configurations (5G, WAN, Wi-Fi, LAN), security, system settings, troubleshooting, and basic specifications.
Preview Acer Wave 7 Wi-Fi Mesh Router User Manual
Comprehensive user manual for the Acer Wave 7 Wi-Fi 7 Mesh Router, covering installation, setup, configuration, features like Hybrid QoS, Mesh networking, Wi-Fi settings, LAN, security, system management, troubleshooting, and regulatory information.
Preview Acer Predator Connect X7 BE11000 Tri-band Wi-Fi 7 5G CPE User Guide
Comprehensive user guide for the Acer Predator Connect X7 BE11000, a Tri-band Wi-Fi 7 5G CPE. This guide covers installation, setup, configuration, features like Hybrid QoS, 5G network, Wi-Fi settings, LAN, IPv6, home network security, system settings, troubleshooting, and regulatory information.
Preview Acer UF200 USB Flash Drive: Fast, Durable Storage Solution
Discover the Acer UF200 USB 2.0 Flash Drive, a reliable and portable storage device featuring a durable zinc-alloy design, fast transfer speeds up to 30 MB/s, and broad compatibility with Windows and Mac operating systems. Available in capacities up to 128 GB.
Preview Acer UF300 USB Flash Drive: High-Speed Storage Solution
Discover the Acer UF300 USB 3.2 Gen 1 flash drive, offering up to 120 MB/s read speed, durable zinc-alloy design, and wide compatibility for work and school. Available in capacities up to 512 GB.
Preview Acer UP300 USB 3.2 Gen 1 Flash Drive: Features, Specs & Compatibility
Explore the Acer UP300 USB 3.2 Gen 1 flash drive, featuring up to 120 MB/s read speeds, capacities from 8GB to 1TB, durable design, and broad compatibility. Perfect for fast, reliable data transfer and storage.