User&#39
IEEE 802.11b/g/n Outdoor Wireless CPE/
IEEE 802.11a/n Outdoor Wireless CPE
User’s Manual
Model name: ZAC-1023-2 / ZAC-1023-5
ZAC-503 / ZAC-504
ZWA-3090 / ZWA-3100
ZN-7200-2EI-O / ZN-7200-2AEI-O
V1.0 May. 2014
Copyright
Copyright © 2014 all rights reserved. No part of this publication may be reproduced, adapted, stored in
a retrieval system, translated into any language, or transmitted in any form or by any means without
the written permission of the supplier.
About This Manual
This user manual is intended to guide professional installer to install the IEEE 802.11n Wireless
Access Point and how to build the infrastructure centered on it. It includes procedures to assist you in
avoiding unforeseen problems.
Conventions
For your attention on important parts, special characters and patterns are used in this manual:
Note:
This indicates an important note that you must pay attention to.
Warning:
This indicates a warning or caution that you have to abide.
Bold: Indicates the function, important words, and so on.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection
against harmful interference in a residential installation.
This equipment generates uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the following measures:
-
Reorient or relocate the receiving antenna.
-
Increase the separation between the equipment and receiver.
-
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
-
Consult the dealer or an experienced radio/TV technician for help.
Verify that the ambient temperature remains between 0 to 40° C, taking into account the elevated
temperatures when installed in a rack or enclosed space.
-
Verify the integrity of the electrical ground before installing the device.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
To avoid the possibility of exceeding radio frequency exposure limits, you shall beep a distance of at
least 100cm between you and the antenna of the installed equipment.
This transmitter must not be
co-located or operating in conjunction with any other antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are country
dependent and are firmware programmed at the factory to match the intended destination. The
firmware setting is not accessible by the end user.
根據低功率電波輻射性電機管理辦法
(1) 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更
頻率、加大功率或變更原設計之特性及功能。
(2) 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應
立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信法規定作業之無線電通信。低功率射頻電機須忍受合法通信或工
業、科學及醫療用電波輻射性電機設備之干擾。
Warranty
Hardware warranty is for one (1) year from date of shipment from Distributor warrants that hardware
will conform to the current relevant published specifications and will be free from material defects in
material and workmanship under normal use and service.
IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY
DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR
OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT (INCLUDING,
WITHOUT
LIMITATION,
DAMAGES
FOR
LOSS
OF
BUSINESS
PROFITS,
BUSINESS
INTERRUPTION, LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, OR
FROM ANY BREACH OF WARRANTY, EVEN IF DISTRIBUTOR HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
IN NO CASE SHALL EXCEED THE AMOUNT YOU PAID
FOR THE PRODUCT.
本器材須經專業工程人員安裝及設定,始得設置使用,且不得直接販售給一般消費者
Table of Content
Chapter 1 Introduction ....................................................................................................................... 12
Introduction ..................................................................................................................................... 12
Appearance ..................................................................................................................................... 13
Key Features ................................................................................................................................... 13
Typical Application ......................................................................................................................... 14
Chapter 2 Hardware Installation ....................................................................................................... 15
Preparation before Installation ...................................................................................................... 15
Professional Installation Required ................................................................................................ 15
Safety Precautions ........................................................................................................................ 15
Installation Precautions ................................................................................................................. 16
Product Package ........................................................................................................................... 16
Hardware Installation ..................................................................................................................... 18
Connect up .................................................................................................................................... 18
Using the Grounding Wire ............................................................................................................ 19
Install External Antennas .............................................................................................................. 19
Mount the AP on a Pole ................................................................................................................ 22
Power Up ...................................................................................................................................... 23
Connect to the Access Point ......................................................................................................... 24
Chapter 3 Basic Settings ................................................................................................................... 27
Factory Default Settings ................................................................................................................ 27
System Requirements .................................................................................................................... 28
How to Login the Web-based Interface ........................................................................................ 28
Basic System Settings ................................................................................................................... 30
Network Settings ............................................................................................................................ 30
Time Settings .................................................................................................................................. 33
RADIUS Settings ............................................................................................................................. 34
Firewall Filtering ............................................................................................................................. 35
Port Forwarding .............................................................................................................................. 36
DMZ .................................................................................................................................................. 37
Basic Wireless Settings ................................................................................................................. 38
Site Survey ...................................................................................................................................... 40
VAP Profile Settings ....................................................................................................................... 40
Chapter 4 Advanced Settings ........................................................................................................... 43
Advanced Wireless Set tings ........................................................................................................ 43
Traffic Shaping ................................................................................................................................ 44
Wireless Security Settings ............................................................................................................ 45
Access Control ............................................................................................................................... 47
WDS Settings .................................................................................................................................. 48
Chapter 5 Management...................................................................................................................... 50
Password ......................................................................................................................................... 50
Upgrade Firmware .......................................................................................................................... 50
Backup/ Retrieve Settings ............................................................................................................. 51
Restore Factory Default Settings .................................................................................................. 52
Reboot ............................................................................................................................................. 52
User Certificate ............................................................................................................................... 53
Remote Management ..................................................................................................................... 54
SNMP Management ........................................................................................................................ 54
Chapter 6 Monitoring Tools ............................................................................................................... 57
System Log ..................................................................................................................................... 57
Ping Watch Dog .............................................................................................................................. 57
Chapter 7 Status ................................................................................................................................. 59
View Basic Information .................................................................................................................. 59
View Association List ..................................................................................................................... 59
View Network Flow Statistics ........................................................................................................ 60
View ARP Table ............................................................................................................................... 61
View Bridge Table ........................................................................................................................... 62
View Routing Table ......................................................................................................................... 62
View Active DHCP Client Table ..................................................................................................... 62
Chapter 8 Troubleshooting ............................................................................................................... 64
Appendix A. ASCII .............................................................................................................................. 66
FIGURE
Figure 1 IEEE 802.11n Wireless Access Point .................................................................................... 13
Figure 2 Typical Application ................................................................................................................. 14
Figure 3 Login Page ............................................................................................................................. 28
Figure 4 Main Page .............................................................................................................................. 29
Figure 5 Basic System Settings ........................................................................................................... 30
Figure 6 Network Settings .................................................................................................................... 31
Figure 7 TCP/IP Settings (Router) ....................................................................................................... 32
Figure 8 Time Settings ......................................................................................................................... 34
Figure 9 RADIUS Settings ................................................................................................................... 35
Figure 10 Source IP Filtering ............................................................................................................... 36
Figure 11 Port Forwarding .................................................................................................................... 37
Figure 12 DMZ ..................................................................................................................................... 37
Figure 13 Basic Wireless Settings ....................................................................................................... 38
Figure 14 Site Survey ........................................................................................................................... 40
Figure 15 VAP Profile Settings ............................................................................................................. 41
Figure 16 VAP Profile Settings ............................................................................................................. 41
Figure 17 Advanced Wireless Settings ................................................................................................ 43
Figure 18 Traffic Shaping ..................................................................................................................... 45
Figure 19 Security Settings .................................................................................................................. 45
Figure 20 Access Control ..................................................................................................................... 48
Figure 21 WDS Settings ....................................................................................................................... 49
Figure 22 Password Settings ............................................................................................................... 50
Figure 23 Firmware Upgrade ............................................................................................................... 51
Figure 24 Backup/Retrieve Settings .................................................................................................... 51
Figure 25 Restore to Default Settings .................................................................................................. 52
Figure 26 Reboot ................................................................................................................................. 53
Figure 27 Reboot ................................................................................................................................. 53
Figure 28 Remote Management .......................................................................................................... 54
Figure 29 SNMP Management ............................................................................................................. 54
Figure 30 Syslog .................................................................................................................................. 57
Figure 31 Ping Watchdog ..................................................................................................................... 58
Figure 32 Basic Information ................................................................................................................. 59
Figure 33 Connection ........................................................................................................................... 60
Figure 34 Network Flow Statistics ........................................................................................................ 61
Figure 35 ARP Table ............................................................................................................................ 61
Figure 36 Bridge Table ......................................................................................................................... 62
Figure 37 Routing Table ....................................................................................................................... 62
Figure 38 DHCP Client Table ............................................................................................................... 63
Figure 57 MAC Address ....................................................................................................................... 64
TABLE
Table 1 IEEE 802.11n Wireless Access Point Factory Default Settings .............................................. 27
Table 2 ACSII ....................................................................................................................................... 66
Chapter 1 Introduction
Introduction
Designed for environment application, the IEEE 802.11n Wireless Access Point is a high-performance
last-mile broadband solution that provides reliable wireless network coverage. Designed with IEEE
802.11n standard, 2x2 MIMO technology and high output power makes it possible deliver up to
300Mbps high data rate with longer range for applications.
ZAC-1023-2 operates at 2.4GHz band
while ZAC-1023-5 operates at 5GHz band.
IEEE 802.11n Wireless Access Point can be used as the access point, the customer premises
equipment (CPE), the WDS and the AP Repeater. While being as the access point, it can be deployed
to provide wireless internet service. In the other way to be as the CPE, it can receive wireless signal
over the last mile, helping WISPs deliver internet service to the new residential and the business
customer where wired broadband internet service, such as cable and DSL, cannot serve in. In addition,
the easy-to-install IEEE 802.11n Wireless Access Point features with outstanding throughput
performance and a cost-effective design that allows users to have the reliable wireless connection at
the affordable price.
12
Appearance
Figure 1 IEEE 802.11n Wireless Access Point
Key Features
Compliant with IEEE 802.11n standard
Support passive PoE which is supplied with 24V.
High reliable watertight housing endures almost any harsh environments
Support 64/128/152-bit WEP and 802.1X, WPA, WPA2, WPA&WPA2,WPA-PSK, WPA2-PSK, and
WPA-PSK&WPA2-PSK etc
User-friendly Web and SNMP-based management interface
13
Typical Application
The IEEE 802.11n Wireless Access Point can be applied into the following environments:
Cost-effectively provide long distance backhaul for remote areas (e.g. village, oil well, island,
mountain and etc.)
Establish local backhaul for campus, farm and factory
Provide and access for video streaming or surveillance for industrial and mining enterprises
Figure 2 Typical Application
14
Chapter 2 Hardware Installation
This chapter describes safety precautions and product information you have to know and check before
installing IEEE 802.11n Wireless Access Point.
Preparation before Installation
Professional Installation Required
Please seek assistance from a professional installer who is well trained in the RF installation and
knowledgeable in the local regulations.
Safety Precautions
1.
To keep you safe and install the hardware properly, please read and follow these safety
precautions.
2.
If you are installing IEEE 802.11n Wireless Access Point for the first time, for your safety as well
as others’, please seek assistance from a professional installer who has received safety training
on the hazards involved.
3.
Keep safety as well as performance in mind when selecting your installation site, especially
where there are electric power and phone lines.
4.
5.
When installing IEEE 802.11n Wireless Access Point, please note the following things:

Do not use a metal ladder;

Do not work on a wet or windy day;

Wear shoes with rubber soles and heels, rubber gloves, long sleeved shirt or jacket.
When the system is operational, avoid standing directly in front of it. Strong RF fields are present
when the transmitter is on.
15
Installation Precautions
To keep the IEEE 802.11n Wireless Access Point well while you are installing it, please read and follow
these installation precautions.
1.
Users MUST use a proper and well-installed grounding and surge arrestor with the IEEE
802.11n Wireless Access Point; otherwise, a random lightening could easily cause fatal damage
to IEEE 802.11n Wireless Access Point.
EMD (Lightning) DAMAGE IS NOT COVERED
UNDER WARRNTY.
2.
Users MUST use the “Power cord & PoE Injector” shipped in the box with the IEEE 802.11n
Wireless Access Point. Use of other options will likely cause damage to the IEEE 802.11n
Wireless Access Point.
3.
Users MUST power off the ZAC Access Point first before connecting the external antenna to it.
Do not switch from built-in antenna to the external antenna from WEB management without
physically attaching the external antenna onto the unit; otherwise, damage might be caused to
the ZAC Access Point itself.
4.
This device is for indoor use only.
Product Package
The product package you have received should contain the following items. If any of them are not
included or damaged, please contact your local vendor for support.
IEEE 802.11n Wireless Access Point
× 1

Detachable 5dBi Antennas
× 2

Pole Mounting Ring
× 2

24VDC Power Cord & PoE Injector
× 1

Ferrite Suppression Core
× 1

Grounding Wire
× 1

Product CD
× 1
Note:
Product CD contains Quick Installation Guide and User Manual.
16
Pole Mounting Ring
Ferrite Suppression Core
24VDC Power Cord & PoE Injector
Warning:
Users MUST use the “Power cord & PoE Injector” shipped in the box with the IEEE
802.11n Wireless Access Point. Use of other options will likely cause damage to the
IEEE 802.11n Wireless Access Point.
17
Hardware Installation
Connect up
1.
The bottom of the Access Point is a movable cover. Grab the cover and pull it back harder to
take it out as the figure shown below.
2.
Plug a standard Ethernet cable into the RJ45 port.
3.
Slide the cover back and press down the lock button to seal the bottom of the Access Point.
18
Using the Grounding Wire
The IEEE802.11n Wireless Access Point is equipped with a grounding wire. It is important that the
Access Point, cables, and PoE Injector must be properly connected to earth ground during normal use
against surges or ESD.
1. Remove the screw on the grounding point at the bottom of the Access Point.
2. Put the grounding wire on the grounding point at the bottom of the Access Point.
Then screw the
grounding wire to tighten up.
Install External Antennas
The Access Point provides two reverse SMA antenna connectors for connecting external antennas.
1.
Connect external antennas that came with the package to the SMA-type connectors on top of the
Access Point.
For longer coverage distance, it is recommended that higher gain antennas be
used to best suit the application.
19
Warning:
Users MUST power off the Access Point first before connecting the external antenna
to it. Do not power on the device for a certain of time without physically attaching the
external antenna; otherwise, damage might be caused to the unit itself.
2.
Bend the antennas to 90 degree or 45 degree.
3.
You may turn one antenna 45 degrees to the left and the other 45 degrees to the right. The tilted
antennas are a reasonable way to operate and the best way if the antennas are fairly close
together since they couple together much less than if they are both pointed in the same direction
(parallel).
20
Note:
The polarization of antennas should be properly aligned. Maximum signal strength
between bridges occurs when both bridges are using identical polarization.
4.
Tighten up the connector joint clockwise to fix the antennas.
5.
To adjust antennas, loose the connector joint counterclockwise first, then adjust antenna to the
desired position.
DO NOT bend or turn the antennas without loosening the connector joint,
otherwise, damage might be caused to the antennas.
21
6.
Antenna installation is complete.
Mount the AP on a Pole
1.
Turn the Access Point over. Put the pole mounting ring through the middle hole of it. Note that
you should unlock the pole mounting ring with a screw driver before putting it through the device
as the following right picture shows.
22
2.
Mount the Access Point steadily to the pole by locking the pole mounting ring tightly.
P.S. This device is for indoor use only.
Power Up
1.
Connect power cord to the PoE injector as the following right picture shows.
23
2.
Connect the Ethernet cable that connects the Access Point to the “POE” port of the PoE injector
as figured below.
3.
Connect the power plug to a power socket. The Access Point will be powered up immediately.
Connect to the Access Point
To be able to configure and manage the Access Point, please do the followings:
1.
Open the ferrite core by unsnapping the connector latches. The core will open, revealing a
concave surface.
2.
Lay the Ethernet cable into the core, usually within 2 to 3 inches of the connector.
You may have
to experiment with the final location depending on the effectiveness of the high frequency
abatement.
24
3.
Loop the cable around and through the core.
This helps "lock" the core in place, and may be
required in circumstances with severe interference.
4.
Close the core and snap the halves back together.
Note:
The ferrite is professionally installed and a shrink wrap has been put around the ferrite
so the users CAN’T take the ferrite off.
25
5.
Connect the Ethernet cable with suppression core to the “Data In” port of the PoE injector.
6.
Connect the other end of Ethernet cable to a PC or a switch hub.
The hardware installation is
complete.
To configure the Access Point, please refer to Chapter 3 Basic Settings.
26
Chapter 3 Basic Settings
Factory Default Settings
We’ll elaborate the IEEE 802.11n Wireless Access Point factory default settings. You can re-acquire
these parameters by default. If necessary, please refer to the “Restore Factory Default Settings”.
Table 1 IEEE 802.11n Wireless Access Point Factory Default Settings
Features
Factory Default Settings
Username
admin
Password
password
Wireless Device Name
apXXXXXX (X represents the last 6
digits of Ethernet MAC address)
Operating Mode
AP
Data Rate
Auto
LAN
IP Address
192.168.1.1
Subnet Mask
255.255.255.0
Gateway
0.0.0.0
Primary DNS Server
0.0.0.0
Secondary DNS Server
0.0.0.0
Spanning Tree
Enable
Data Rate
Auto
Output Power
Full
WMM
Enabled
RTS Threshold (byte)
2346
Fragmentation Length (byte)
2346
Channel Protection
None
Short GI
Enable
Distance
1000m
Flow Control by AP
Disable
Security
Open System
Encryption
None
27
System Requirements
Before configuration, please make sure your system meets the following requirements:
A computer coupled with 10/ 100 Base-TX adapter;
Configure the computer with a static IP address of 192.168.1.x, as the default IP address of IEEE
802.11n Wireless Access Point is 192.168.1.1. (X cannot be 0, 1, nor 255);
A Web browser on PC for configuration such as Microsoft Internet Explorer 6.0 or above,
Netscape, Firefox or Google Chrome.
How to Login the Web-based Interface
The IEEE 802.11n Wireless Access Point provides you with user-friendly Web-based management
tool.
Open Web browser and enter the IP address (Default: 192.168.1.1) of IEEE 802.11n Wireless
Access Point into the address field. You will see the login page as below.
Figure 3 Login Page
28
Enter the username (Default: admin) and password (Default: password) respectively and click
“Login” to login the main page of IEEE 802.11n Wireless Access Point. As you can see, this
management interface provides five main options in the black bar above, which are Status,
System, Wireless, Management and Tools.
Figure 4 Main Page
Note:
The username and password are case-sensitive, and the password should be no
more than 19 characters!
29
Basic System Settings
For users who use the IEEE 802.11n Wireless Access Point for the first time, it is recommended that
you begin configuration from “Basic Settings” in “System” shown below:
Figure 5 Basic System Settings
Device Name: Specify the device name, which is composed of no more than 15 characters with
(0-9), (A-Z), (a-z) or (-).
Country Region: For FCC domain, default country is United States only.
Network Settings
The Network Settings allows you to change network, IP address and configure few network
parameters like spanning tree and management VLAN ID.
Make configuration in “Network Settings”
from “System”.
30
Figure 6 Network Settings
Network Mode:
Specify the network mode, including Bridge and Router. It is easy to configure parameters in
Bridge Mode; however, users must pay extra attention to the way they configure the device when
it is set to Router Mode. For details, please refer to TCP/IP Settings”.
Spanning Tree:
Spanning Tree Protocol (STP) is a link management protocol for AP which provides path
redundancy while preventing loops in a network. STP allows only one active path at a time
between the Access Points but establish the redundant link as a backup if the initial link fails.
STP Forward Delay:
STP Forward Delay is the time spent in detecting and learning network tree topology state before
entering the forward state. Default time value is 1 sec.
802.1Q VLAN:
To allow users on the VLAN to access the WEB page of the IEEE 802.11n Wireless Access Point,
you need to enable “Enable 802.1Q VLAN” and assign a management VLAN ID for your device.
Make sure the assigned management VLAN ID is identical to your network VLAN ID to avoid
failures of accessing the Web page of the IEEE 802.11n Wireless Access Point.
IP Address Assignment
31
Users may change the settings for IP Address, Subnet Mask, and DHCP Server.
Obtain IP Address Automatically: If a DHCP server exists in your network, you can check this
option, thus the IEEE 802.11n Wireless Access Point is able to obtain IP settings automatically
from that DHCP server.
Note:
When the IP address of the Access Point is changed, the clients on the network often
need to wait for a while or even reboot before they can access the new IP address. For
an immediate access to the bridge, please flush the netbios cache on the client
computer by running the “nbtstat –r” command before using the device name of the
Access Point to access its Web Management page.
In case the IEEE 802.11n Wireless Access Point is unable to obtain an IP address
from a valid DHCP server, it will fall back to default static IP address.
Use Fixed IP Address: Check this option. You have to specify a static IP address, subnet mask,
default gateway and DNS server for the Access Point manually. Make sure the specified IP
address is unique on your network in order to prevent IP conflict.
If the IEEE 802.11n Wireless Access Point configured as Router mode, you need to configure
some additional TCP/IP parameters for accessing the Internet.
Figure 7 TCP/IP Settings (Router)
32
WAN Access Type:
Specify the Internet access method to Static IP, DHCP or PPPOE. Users must enter WAN IP
Address, Subnet Mask, Gateway settings provided by your ISPs.
LAN Settings:
When DHCP Server is disabled, users can specify IP address and subnet mask for the Access
Point manually. Make sure the specified IP address is unique on your network in order to prevent
IP conflict. When DHCP Server is enabled, users may specify DHCP IP Address Range, DHCP
Subnet Mask, DHCP Gateway and Lease Time (15-44640 minutes).
A DHCP relay agents is
used to forward DHCP requests and replies between clients and servers when they are not on the
same physical subnet.
To enable the DHCP relay agent, check the “Enable DHCP Relay”
checkbox and enter the IP address of the DHCP server.
Warning:
In AP mode, the IEEE 802.11n Wireless Access Point must establish connection with
another wireless device before it is set to Router mode. To access the unit in Router
mode via wired port, please type the WAN IP address to enter the web page for WAN
is on wired port and LAN is on wireless port. Or, you can access device through the
wireless device connected with the Access Point.
In wireless client mode, users can access the Access Point via its wired port, for WAN
is on wireless port and LAN is on wired port when device is set to Router mode.
Bridge mode and AP Repeater mode are similar to AP mode when device is set to
Router mode; WAN is on wired port and LAN is on wireless port. Thus users must also
connect the Access Point with another wireless device before it is set to Router mode
and access the Access Point via the connected wireless device.
Time Settings
Compliant with NTP, the IEEE 802.11n Wireless Access Point is capable of keeping its time in
complete accord with the Internet time. Make configuration in “Time Settings” from “System”. To use
this feature, check “Enable NTP Client Update” in advance.
33
Figure 8 Time Settings
Current Time:
Display the present time in Yr, Mon, Day, Hr, Min and Sec.
Time Zone Select:
Select the time zone from the dropdown list.
NTP Server:
Select the time server from the “NTP Server” dropdown list.
Manual IP: Manually input the IP address of available time server.
Hit “Apply” to save settings.
RADIUS Settings
RADIUS (Remote Authentication Dial-In User Service) is a server for remote user authentication and
accounting; playing a central role in the network in providing the capabilities of authenticating,
authorizing, accounting, auditing, alarming and etc. It allows an organization to maintain user profiles
in a central database that all remote servers can share.
Open “RADIUS Settings” in “System” to make RADIUS configuration.
34
Figure 9 RADIUS Settings
Authentication RADIUS Server
This is for RADIUS authentication. It can communicate with RADIUS through IP Address, Port and
Shared Secret.
IP Address: Enter the IP address of the Radius Server;
Port: Enter the port number of the Radius Server;
Shared Secret: This secret, which is composed of no more than 31 characters, is shared by the
IEEE 802.11n Wireless Access Point and RADIUS during authentication.
Global-Key Update:
Check this option and specify the time interval between two global-key updates.
Firewall Filtering
The firewall is a system or group of systems that enforce an access control policy between two
networks.
It may also be defined as a mechanism used to protect a trusted network from an
un-trusted network. IEEE 802.11n Wireless Access Point has capabilities of Source IP Filtering,
Destination IP Filtering, Source Port Filtering, Destination Port Filtering, Port Forwarding as well as
DMZ. This is available only under Router Mode.
To make the Firewall Filtering page show up, select Router from System > Network Settings and it
will appear under System menu.
Tick Enable Firewall Filtering to enable firewall functions.
35
Figure 10 Source IP Filtering
Filter Type:
MAC Filtering: The MAC filtering gives users the ability to restrict packets from certain devices by
entering MAC address.
Source IP Filtering: The source IP filtering gives users the ability to restrict certain types of data
packets from your local network to Internet through IEEE 802.11n Wireless Access Point. Use of
such filters can be helpful in securing or restricting your local network.
Destination IP Filtering: The destination IP filtering gives you the ability to restrict the computers
in LAN from accessing certain websites in WAN according to specified IP addresses.
Source Port Filtering: The source port filtering enable you to restrict certain ports of data packets
from your local network to Internet through IEEE 802.11n Wireless Access Point. Use of such
filters can be helpful in securing or restricting your local network.
Destination Port Filtering: The destination port filtering enables you to restrict certain ports of
data packets from your local network to Internet through IEEE 802.11n Wireless Access Point.
Use of such filters can be helpful in securing or restricting your local network.
Port Forwarding
The port forwarding allows you to automatically redirect common network services to a specific
machine behind the NAT firewall. These settings ne are only necessary if you wish to host some sort of
36
server like a web server or mail server on the private local network behind IEEE 802.11n Wireless
Access Point’s NAT firewall.
Figure 11 Port Forwarding
DMZ
A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its
local private network. Typically, the DMZ host contains devices accessible to the Internet traffic, such
as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. To enable it tick the
Enable DMZ checkbox.
Figure 12 DMZ
Enable DMZ:
DMZ Host IP Address: Type the IP address of the device you want to place under DMZ.
37
Basic Wireless Settings
Open “Basic Settings” in “Wireless” as below to make basic wireless configuration.
Figure 13 Basic Wireless Settings
Disable Wireless LAN Interface:
Check this option to disable WLAN interface, then the wireless module of IEEE 802.11n Wireless
Access Point will stop working and no wireless device can connect to it.
Operation Mode:
Four operating modes are available in IEEE 802.11n Wireless Access Point.
AP: The IEEE 802.11n Wireless Access Point establishes a wireless coverage and receives
connectivity from other wireless devices.
Wireless Client: The IEEE 802.11n Wireless Access Point is able to connect to the AP and thus
join the wireless network around it.
Bridge: The IEEE 802.11n Wireless Access Point establishes wireless connectivity with other
APs by keying in remote MAC address.
Please refer to the “WDS Setting” for detailed
configuration.
AP Repeater: The IEEE 802.11n Wireless Access Point servers as AP and Bridge concurrently.
In other words, the IEEE 802.11n Wireless Access Point can provide connectivity services for
ACCESS POINTs under Bridge mode.
38
Wireless Network Name (SSID):
This wireless network name is shared among all associated devices in your wireless network.
Keep it identical on all those devices.
Note that the SSID is case-sensitive and cannot exceed
32 characters.
Broadcast SSID:
Under AP mode, hiding network name is necessary when you are in a wireless environment that
may have potential risk. By disabling broadcast SSID, the STA can not scan and find IEEE
802.11n Wireless Access Point, so that malicious attack by some illegal STA could be avoided.
802.11 Mode:
The IEEE 802.11n Wireless Access Point can communicate with wireless devices of 802.11b/g or
802.11b/g/n. (For ZAC-1023-5 it’s 802.11a or 802.11n)
Channel Mode:
Four levels are available: 20MHz and 40MHz. The last one can enhance data throughput, but it
takes more bandwidth, thus it might cause potential interference
Channel:
Channel varies much as the available band differs from country to country. Select a proper
operating channel in the drop-down list according to your situation.
Extension Channel:
Only applicable to AP, AP Repeater, and 40MHz channel width) indicates the use of channel
bonding that allows the IEEE 802.11n Wireless Access Point to use two channels at once.
Two
options are available: Upper Channel and Lower Channel.
Data Rate:
Usually “Auto” is preferred. Under this rate, the IEEE 802.11n Wireless Access Point will
automatically select the highest available rate to transmit. In some cases, however, like where
there is no great demand for speed, you can have a relatively-low transmit rate for compromise of
a long distance.
HT Protect:
Enable HT (High Throughput) protect to ensure HT transmission with MAC mechanism. Under
802.11n mode, wireless client can be divided into HT STA and Non-HT STA, among which the one
with HT protect enabled gets higher throughput.
39
Enable MAC Clone
Available only under wireless client mode, it hides the MAC address of the AP while displays the
one of the device connected to the Access Point.
Default is Auto MAC Clone.
User may
choose to enter the MAC address to be cloned manually.
Site Survey
Under wireless client mode, the IEEE 802.11n Wireless Access Point is able to perform site survey,
through which, information on the available Access Points will be detected.
Open “Basic Settings” in “Wireless”, by clicking the “Site Survey” button beside “Wireless Mode”
option, the wireless site survey window will pop up with a list of available AP in the vicinity.
Select the
AP you would like to connect and click “Selected” to establish connection.
Figure 14 Site Survey
VAP Profile Settings
Available in AP mode, the IEEE 802.11n Wireless Access Point allows up to 8 virtual SSIDs on a single
BSSID and to configure different profile settings such as security and VLAN ID to each SSID.
To create a
40
virtual AP, you may check the Enabled box of the profile and click on the profile (eg. Profile 2) to
configure wireless and security settings.
Hit Apply to active the profile.
Figure 15 VAP Profile Settings
Figure 16 VAP Profile Settings
Profile Name:
Name of the VAP profile
SSID:
Assign a network name for the VAP
Broadcast SSID:
41
In AP mode, hiding network name is necessary when you are in a wireless environment that may
have potential risk. By disabling broadcast SSID, the STA cannot scan and find the IEEE 802.11n
Wireless Access Point, so that malicious attack by some illegal STA could be avoided.
Wireless Separation:
Wireless separation is an ideal way to enhance the security of network transmission. Under the
mode except wireless client mode, enable “Wireless Separation” can prevent the
communication among associated wireless clients.
WMM Support:
WMM (Wi-Fi Multimedia) is a subset of 802.11e. It allows wireless communication to define a
priority limit on the basis of data type under AP mode only, thus those time-sensitive data, like
video/audio data, may own a higher priority than common one.
To enable WMM, the wireless
client should also support it
Max. Station Number:
By checking the “Max. Station Num” the Access Point will only allow up to 32 wireless clients to
associate with for better bandwidth for each client.
By disabling the checkbox the Access Point
will allow up to 128 clients to connect, but it is likely to cause network congestion or poor
performance.
IGMP Snooping:
Available in AP/Router mode, IGMP snooping is the process of listening to IGMP network traffic.
By enabling IGMP snooping, the AP will listen to IGMP membership reports, queries and leave
messages to identify the ports that are members of multicast groups. Multicast traffic will only be
forwarded to ports identified as members of the specific multicast group or groups.
Security Setting:
To prevent unauthorized radios from accessing data transmitting over the connectivity, the
IEEE802.11n Wireless Access Point provides you with rock solid security settings.
For detailed
information please go to Chapter 4 Wireless Security Setting.
42
Chapter 4 Advanced Settings
Advanced Wireless Set tings
Open “Advanced Settings” in “Wireless” to make advanced wireless settings.
Figure 17 Advanced Wireless Settings
MPDU/A-MSDU Aggregation
The data rate of your AP except wireless client mode could be enhanced greatly with this option
enabled; however, if your wireless clients don’t support A-MPDU/A-MSDU aggregation, it is not
recommended to enable it.
Short GI
Under 802.11n mode, enable it to obtain better data rate if there is no negative compatibility issue.
RTS Threshold
The IEEE 802.11n Wireless Access Point sends RTS (Request to Send) frames to certain
receiving station and negotiates the sending of a data frame. After receiving an RTS, that STA
responds with a CTS (Clear to Send) frame to acknowledge the right to start transmission. The
setting range is 0 to 2346 in byte.
Setting it too low may result in poor network performance.
43
Leave it at its default of 2346 is recommended.
Fragmentation Length
Specify the maximum size in byte for a packet before data is fragmented into multiple packets.
Setting it too low may result in poor network performance. Leave it at its default of 2346 is
recommended.
Beacon Interval
Specify the frequency interval to broadcast packets. Enter a value between 20 and 1024.
DTIM Interval
DTIM, which stands for Delivery Traffic Indication Message, is contained in the data packets. It is
for enhancing the wireless transmission efficiency. The default is set to 1. Enter a value between
1 and 255.
Preamble Type
It defines some details on the 802.11 physical layer.
“Long” and “Auto” are available.
Distance:
To decrease the chances of data retransmission at long distance, the IEEE 802.11n Wireless
Access Point can automatically adjust proper ACK timeout value by specifying distance of the two
nodes.
Traffic Shaping
It allows the administrator to manage the traffic flow to ensure optimal performance.
44
Figure 18 Traffic Shaping
Enable Traffic Shaping
Check this box to control the overall bandwidth for a specific VAP network.
Interface Selection:
Select the VAP network you would like to enable traffic shaping.
Outgoing Traffic Rate:
To specify maximum outgoing bandwidth to a certain rate in kbit/s.
Outgoing Traffic Burst:
To specify the buffer size for outgoing traffic that can be sent within a given unit of time. The
suggested value is 20KBytes. You may just leave the default value there, and then the connection
will be bound to the traffic shaping rule at all times. You may decrease it to smaller value if the
incoming traffic limit is smaller.
Wireless Security Settings
To prevent unauthorized radios from accessing data transmitting over the connectivity, the IEEE
802.11n Wireless Access Point provides you with rock solid security settings.
Open “Profile Setting” in “Wireless” and enter “VAP Profile 1 Settings” as below.
Figure 19 Security Settings
Network Authentication
45
Open System: It allows any device to join the network without performing any security check.
Shared Key: Data encryption and key are required for wireless authentication (Not available in
Bridge/AP Repeater mode).
Legacy 802.1x: Available in AP/Wireless Client mode, it provides the rights to access the
wireless network and wired Ethernet. With User and PC identity, centralized authentication as well
as dynamic key management, it controls the security risk of wireless network to the lowest. To
serve the 802.1x, at least one EAP type should be supported by the RADIUS Server, AP and
wireless client.
Note:
For first time users, if EAP type “TLS” is selected, you need to import valid user
certificate given by CA in prior.
To import user certificates, please refer to Chapter 5
Management/Certificate Settings for more details. .
WPA with RADIUS: Available in AP/Wireless Client mode, with warrant (username, password
and etc.) offered by user, this kind of authentication can be realized with specific RADIUS server.
This is the common way to be adopted in large enterprise network.
WPA2 with RADIUS: Available in AP/Wireless Client mode, as a new version of WPA, only all the
clients support WPA2, can it be available. If it is selected, AES encryption and RADIUS server is
required.
It is only available in AP/Wireless Client mode.
WPA&WPA2 with RADIUS: Available in AP mode, it provides options of WPA (TKIP) or WPA2
(AES) for the client. If it is selected, the data encryption type must be TKIP + AES and the
RADIUS server must be set.
WPA-PSK: It is a simplified WPA mode with no need for specific authentication server. In this
so-called WPA Pre-Shared Key, all you have to do is just pre-enter a key in each WLAN node and
this is the common way to be adopted in large and middle enterprise as well as residential
network.
WPA2-PSK: As a new version of WPA, only all the clients support WPA2, can it be available. If it is
selected, the data encryption can only be AES and the passphrase is required.
WPA-PSK&WPA2-PSK: Available in AP mode, it provides options of WPA (TKIP) or WPA2 (AES)
46
encryption for the client. If it is selected, the data encryption can only be TKIP + AES and the
passphrase is required.
Data Encryption
If data encryption is enabled, the key is required and only sharing the same key with other
wireless devices can the communication be established.
None: Available only when the authentication type is open system.
64 bits WEP: It is made up of 10 hexadecimal numbers.
128 bits WEP: It is made up of 26 hexadecimal numbers.
152 bits WEP: It is made up of 32 hexadecimal numbers.
TKIP: Temporal Key Integrity Protocol, which is a kind of dynamic encryption, is co-used with
WPA-PSK, etc.
AES: Advanced Encryption Standard, it is usually co-used with WPA2-PSK, WPA, WPA2, etc.
TKIP + AES: It allows for backwards compatibility with devices using TKIP.
Note:
We strongly recommend you enable wireless security on your network!
Only setting the same Authentication, Data Encryption and Key in the IEEE 802.11n
Wireless Access Point and other associated wireless devices, can the
communication be established!
Access Control
The Access Control appoints the authority to wireless client on accessing IEEE 802.11n Wireless
Access Point, thus a further security mechanism is provided. This function is available only under AP
mode.
Open “Access Control” in “Wireless” as below.
47
Figure 20 Access Control
Profile Selection
Select the VAP profile you would like to enable Access Control
Access Control Mode
If you select “Allow Listed”, only those clients whose wireless MAC addresses are in the access
control list will be able to connect to your AP. While when “Deny Listed” is selected, those
wireless clients on the list will not be able to connect the AP.
MAC Address
Enter the MAC address of the wireless client that you would like to list into the access control list,
click “Apply” then it will be added into the table at the bottom.
Delete/Clear
Check the box before one or more MAC addresses of wireless client(s) that you would like to
cancel, and click “Delete” or “Clear” to cancel that access control rule.
WDS Settings
Bridge mode extends the range of your network without having to use cables to link the Access Points
by using the Wireless Distribution System (WDS): Simply put, you can link the Access Points
wirelessly. To enable Bridge mode, please go to Wireless > Basic Settings and choose “Bridge” in
Operation Mode. Then go to “WDS Settings” in “Wireless” as below:
48
Figure 21 WDS Settings
Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and
click “Apply” to save settings.
Note:
WDS Settings is available only under Bridge and AP Repeater Mode.
Bridge uses the WDS protocol that is not defined as the standard thus compatibility
issues between equipment from different vendors may arise.
Moreover, Tree or
Star shape network topology should be used in all WDS use-cases (i.e. if AP2 and
AP3 are specified as the WDS peers of AP1, AP2 should not be specified as the
WDS peer of AP3 and AP3 should not be specified as the WDS peer of AP2 in any
case). Mesh and Ring network topologies are not supported by WDS and should be
avoided in all the use cases.
49
Chapter 5 Management
Password
From “Password Settings” in “Management”, you can change the password to manage your IEEE
802.11n VAC Access Point.
Figure 22 Password Settings
Current Password:
Enter the current password.
New Password:
Enter the new password.
Confirm Password:
Enter the new password again for confirmation.
Note:
The password is case-sensitive and its length cannot exceed 19 characters!
Upgrade Firmware
Open “Firmware Upload” in “Management” and follow the steps below to upgrade firmware locally or
remotely through IEEE 802.11n VAC Access Point’s Web:
50
Figure 23 Firmware Upgrade
Click “Browse” to select the firmware file you would like to load;
Click “Upload” to start the upload process;
Wait a few minutes, the VAC Access Point will reboot after successful upgrade.
Note:
Do NOT cut the power off during upgrade, otherwise the system may crash!
Only official firmware issued by applicant to be used for firmware upgrade to
continuously compliance of FCC rule.
Backup/ Retrieve Settings
It is strongly recommended you back up configuration information in case of something unexpected. If
tragedy hits your device, you may have an access to restore the important files by the backup. All
these can be done by the local or remote computer.
Open “Configuration File” in “Management” as below:
Figure 24 Backup/Retrieve Settings
51
Save Setting to File
By clicking “Save”, a dialog box will pop up. Save it, then the configuration file ap.cfg will be
generated and saved to your local computer.
Load Settings from File
By clicking “Browse”, a file selection menu will appear, select the file you want to load, like ap.cfg;
Click “Upload” to load the file. After automatically rebooting, new settings are applied.
Restore Factory Default Settings
The IEEE 802.11n VAC Access Point provides two ways to restore the factory default settings:
Restore factory default settings via Web
From “Configuration File”, clicking “Reset” will eliminate all current settings and reboot your
device, then default settings are applied.
Figure 25 Restore to Default Settings
Restore factory default settings via Reset Button
If software in IEEE 802.11n VAC Access Point is unexpectedly crashed and no longer reset the
unit via Web, you may do hardware reset via the reset button.
Press and hold the button for at
least 5 seconds and then release it until the PWR LED gives a blink.
Reboot
You can reboot your IEEE 802.11n VAC Access Point from “Configuration File” in “Management” as
below:
52
Click “Reboot” and hit “Yes” upon the appeared prompt to start reboot process. This takes a few
minutes.
Figure 26 Reboot
User Certificate
Under Wireless Client mode, when EAP-TLS is used, the RADIUS server must know which user
certificates to trust.
The Server can trust all certificates issued by a given CA.
To import a user certificate, from Import User Certificates, click “Browse” and specify the location
where the user certificate is placed.
Click “Import”.
Figure 27 Reboot
Delete User Certificate:
Delete the selected user certificate.
Import User Certificates:
Imported the user certificate
53
Remote Management
The IEEE 802.11n VAC Access Point provides a variety of remotes managements including Telnet,
SNMP, FTP, SSH, HTTPS and exclusive WISE tool, making configuration more convenient and
secure.
Figure 28 Remote Management
SNMP Management
The IEEE 802.11n VAC Access Point supports SNMP for convenient remote management. Open
“SNMP Settings” in “Management” shown below. Set the SNMP parameters and obtain MIB file
before remote management.
Figure 29 SNMP Management
54
Protocol Version:
Select the SNMP version, and keep it identical on the IEEE 802.11n VAC Access Point and the
SNMP manager.
The IEEE 802.11n VAC Access Point supports SNMP v2/v3.
Server Port:
Change the server port for a service if needed; however you have to use the same port to use that
service for remote management.
Get Community:
Specify the password for the incoming Get and GetNext requests from the management station.
By default, it is set to public and allows all requests.
Set Community:
Specify the password for the incoming Set requests from the management station. By default, it is
set to private.
Trap Destination:
Specify the IP address of the station to send the SNMP traps to.
Trap Community:
Specify the password sent with each trap to the manager. By default, it is set to public and allows
all requests.
Configure SNMPv3 User Profile
For SNMP protocol version 3, you can click “Configure SNMPv3 User Profile” in blue to set the
details of SNMPv3 user. Check “Enable SNMPv3 Admin/User” in advance and make further
configuration.
User Name: Specify a user name for the SNMPv3 administrator or user. Only the SNMP
commands carrying this user name are allowed to access the IEEE 802.11n VAC Access Point.
Password: Specify a password for the SNMPv3 administrator or user. Only the SNMP commands
carrying this password are allowed to access the IEEE 802.11n Wireless VAC Access Point.
Confirm Password: Input that password again to make sure it is your desired one.
Access Type: Select “Read Only” or “Read and Write” accordingly.
Authentication Protocol: Select an authentication algorithm. SHA authentication is stronger
than MD5 but is slower.
55
Privacy Protocol: Specify the encryption method for SNMP communication. None and DES are
available.
None means no encryption is applied.
DES is a Data Encryption Standard that
applies a 58-bit key to each 64-bit block of data.
56
Chapter 6 Monitoring Tools
System Log
System log is used for recording events occurred on the IEEE 802.11n VAC Access Point, including
station connection, disconnection, system reboot and etc.
Open “System Log” in “Tools” as below.
Figure 30 Syslog
Remote Syslog Server
Enable System log to alert remote server.
IP Address: Specify the IP address of the remote server.
Port: Specify the port number of the remote server.
Ping Watch Dog
If you mess your connection up and cut off your ability the log in to the unit, the ping watchdog has a
chance to reboot due to loss of connectivity.
57
Figure 31 Ping Watchdog
Enable Ping Watchdog:
To activate ping watchdog, check this checkbox.
IP Address to Ping:
Specify the IP address of the remote unit to ping.
Ping Interval:
Specify the interval time to ping the remote unit.
Startup Delay:
Specify the startup delay time to prevent reboot before the IEEE 802.11n VAC Access Point is
fully initialized.
Failure Count To Reboot:
If the ping timeout packets reached the value, the IEEE 802.11n VAC Access Point will reboot
automatically.
58
Chapter 7 Status
View Basic Information
Open “Information” in “Status” to check the basic information of the Access Point, which is read only.
Information includes system information, LAN settings, wireless setting and interface status.
Click
“Refresh” at the bottom to have the real-time information.
Figure 32 Basic Information
View Association List
Open “Connections” in “Status” to check the information of associated wireless devices such as MAC
address, signal strength, connection time, IP address, etc.
All is read only.
Click “Refresh” at the
bottom to update the current association list.
59
Figure 33 Connection
By clicking on the MAC address of the selected device on the web you may see more details including
device name, connection time, signal strength, noise floor, ACK timeout, link quality, IP information,
current data rate, current TX/RX packets.
View Network Flow Statistics
Open “Statistics” in “Status” to check the data packets received on and transmitted from the wireless
and Ethernet ports. Click “Refresh” to view current statistics.
60
Figure 34 Network Flow Statistics
Poll Interval
Specify the refresh time interval in the box beside “Poll Interval” and click “Set Interval” to save
settings. “Stop” helps to stop the auto refresh of network flow statistics.
View ARP Table
Open “ARP Table” in “Status” as below.
Click “Refresh” to view current table.
Figure 35 ARP Table
61
View Bridge Table
Open “Bridge Table” in “Status” as below. Click “Refresh” to view current connected status..
Figure 36 Bridge Table
View Routing Table
Available in Router mode, the routing table shows the current route information.
Figure 37 Routing Table
View Active DHCP Client Table
Available in Router mode, the DHCP allows to check the assigned IP address, MAC address and time
expired for each DHCP leased client. Click “Refresh” to view current table.
62
Figure 38 DHCP Client Table
63
Chapter 8 Troubleshooting
This chapter provides troubleshooting procedures for basic problems with the IEEE 802.11n Wireless
Access Point. For warranty assistance, contact your service provider or distributor for the process.
Q 1. How to know the MAC address of IEEE 802.11n Wireless Access Point?
MAC Address distinguishes itself by the unique identity among network devices. There are two
ways available to know it.

Each device has a label posted with the MAC address. Please refer below.
Figure 39 MAC Address

On the IEEE 802.11n Wireless Access Point Web-based management interface, you can view
the MAC Address from “View Basic Information”.
Q 2. What if I would like to reset the unit to default settings?
You may restore factory default settings in “Configuration File” from “Management”.
Q 3. What if I would like to backup and retrieve my configuration settings?
You may do the backup by generating a configuration file or retrieve the settings you have backed
up previously in “Configuration File” from “Management”.
Q 4. What if I can not access the Web-based management interface?
Please check the followings:

Check whether the power supply is OK; Try to power on the unit again.

Check whether the IP address of PC is correct (in the same network segment as the unit);
64

Login the unit via other browsers such as Firefox.

Hardware reset the unit.
Q 5. What if the wireless connection is not stable after associating with an AP under wireless
client mode?

Since the IEEE 802.11n Wireless Access Point comes with a built-in directional antenna, it is
recommended make the IEEE 802.11n Wireless Access Point face to the direction where the
AP is to get the best connection quality.

In addition, you can start “Site Survey” in “Wireless Basic Settings” to check the signal
strength. If it is weak or unstable (The smaller the number is, the weaker the signal strength
is.), please join other available AP for better connection.
65
Appendix A. ASCII
WEP can be configured with a 64-bit, 128-bit or 152-bit Shared Key (hexadecimal number or ACSII).
As defined, hexadecimal number is represented by 0-9, A-F or a-f; ACSII is represented by 0-9, A-F,
a-f or punctuation. Each one consists of two-digit hexadecimal.
Table 2 ACSII
ASCII
Hex
ASCII
Hex
ASCII
Hex
ASCII
Hex
Character
Equivalent
Character
Equivalent
Character
Equivalent
Character
Equivalent
!
21
9
39
Q
51
i
69
"
22
:
3A
R
52
j
6A
#
23
;
3B
S
53
k
6B
$
24
<
3C
T
54
l
6C
%
25
=
3D
U
55
m
6D
&
26
>
3E
V
56
n
6E
‘
27
?
3F
W
57
o
6F
(
28
@
40
X
58
p
70
)
29
A
41
Y
59
q
71
*
2A
B
42
Z
5A
r
72
+
2B
C
43
[
5B
s
73
,
2C
D
44
\
5C
t
74
-
2D
E
45
]
5D
u
75
.
2E
F
46
^
5E
v
76
/
2F
G
47
_
5F
w
77
0
30
H
48
`
60
x
78
1
31
I
49
a
61
y
79
2
32
J
4A
b
62
z
7A
3
33
K
4B
c
63
{
7B
4
34
L
4C
d
64
|
7C
5
35
M
4D
e
65
}
7D
6
36
N
4E
f
66
~
7E
7
37
O
4F
g
67
8
38
P
50
h
68
66
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement