EOC-2610 User Manual - EnGenius Technologies, Inc.

EOC-2610 User Manual - EnGenius Technologies, Inc.
Wireless Outdoor
Access Point & Client Bridge
User’s Manual
Version: 1.0
Long Range Wireless Access Point / Client Bridge
Version 1.0
Table of Contents
1
INTRODUCTION .................................................................................................................... 5
1.1
1.2
1.3
1.4
1.5
1.6
FEATURES........................................................................................................................ 5
PACKAGE CONTENTS ........................................................................................................ 6
SAFETY GUIDELINES ......................................................................................................... 6
SYSTEM REQUIREMENTS .................................................................................................. 6
APPLICATIONS .................................................................................................................. 7
NETWORK CONFIGURATION............................................................................................... 7
a)
b)
2
UNDERSTANDING THE HARDWARE .................................................................................. 9
2.1
2.2
2.3
2.4
3
HARDWARE INSTALLATION ................................................................................................ 9
HARDWARE DESCRIPTION ................................................................................................. 9
MOUNTING KITS ............................................................................................................. 10
IP ADDRESS CONFIGURATION ......................................................................................... 10
SWITCHING BETWEEN OPERATING MODES.................................................................. 12
3.1
4
Ad-hoc (peer-to-peer) Mode.................................................................................................... 7
Infrastructure Mode ................................................................................................................. 8
LOGGING IN .................................................................................................................... 12
ACCESS POINT OPERATING MODE ................................................................................. 13
LOGGING IN ................................................................................................................................. 13
STATUS ....................................................................................................................................... 14
MAIN ........................................................................................................................................... 14
WIRELESS CLIENT LIST ................................................................................................................ 15
SYSTEM LOG ............................................................................................................................... 15
SYSTEM..................................................................................................................................... 16
SYSTEM PROPERTIES .................................................................................................................. 16
IP SETTINGS ............................................................................................................................... 16
SPANNING TREE SETTINGS .......................................................................................................... 17
WIRELESS ................................................................................................................................... 18
WIRELESS NETWORK ................................................................................................................... 18
WIRELESS SECURITY - WEP ........................................................................................................ 18
WIRELESS SECURITY – WPA-PSK, WPA2-PSK, WPA-MIXED ..................................................... 19
WIRELESS SECURITY – WPA, WPA2 ........................................................................................... 20
WIRELESS MAC FILTER ............................................................................................................... 21
WIRELESS ADVANCED SETTINGS .................................................................................................. 22
MANAGEMENT ............................................................................................................................. 24
ADMINISTRATION ......................................................................................................................... 24
SNMP SETTINGS ........................................................................................................................ 24
BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS........................................... 25
FIRMWARE UPGRADE ................................................................................................................... 26
TIME SETTINGS ........................................................................................................................... 27
LOG ............................................................................................................................................ 27
5
CLIENT BRIDGE OPERATING MODE................................................................................ 28
5.1
5.2
5.2.1
5.2.2
5.2.3
5.3
5.3.1
LOGGING IN .................................................................................................................... 28
STATUS.......................................................................................................................... 29
MAIN .............................................................................................................................. 29
CONNECTION STATUS ..................................................................................................... 30
SYSTEM LOG .................................................................................................................. 30
SYSTEM ....................................................................................................................... 31
SYSTEM PROPERTIES ..................................................................................................... 31
2
Long Range Wireless Access Point / Client Bridge
5.3.2
5.3.3
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.5
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
6
Version 1.0
IP SETTINGS .................................................................................................................. 31
SPANNING TREE SETTINGS ............................................................................................. 32
WIRELESS ...................................................................................................................... 33
WIRELESS NETWORK ...................................................................................................... 33
WIRELESS SECURITY - WEP........................................................................................... 34
WIRELESS SECURITY – WPA-PSK, WPA2-PSK, ............................................................ 35
WIRELESS ADVANCED SETTINGS ..................................................................................... 35
MANAGEMENT ................................................................................................................ 36
ADMINISTRATION ............................................................................................................ 36
SNMP SETTINGS ........................................................................................................... 37
BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS ............................. 38
FIRMWARE UPGRADE...................................................................................................... 38
TIME SETTINGS .............................................................................................................. 39
LOG ............................................................................................................................... 39
CLIENT ROUTER OPERATING MODE............................................................................... 41
6.1
6.2
6.2.1
6.2.2
6.2.3
6.3
6.3.1
6.4
6.4.1
6.4.1.1
6.4.1.2
6.4.1.3
6.4.2
6.5
6.5.1
6.5.1.1
6.5.1.2
6.5.2
6.6
5.5.7
5.5.8
5.5.9
5.5.10
5.5.11
5.5.12
LOGGING IN .................................................................................................................... 41
STATUS.......................................................................................................................... 42
MAIN .............................................................................................................................. 42
CONNECTION STATUS ..................................................................................................... 43
SYSTEM LOG .................................................................................................................. 43
SYSTEM ....................................................................................................................... 44
SYSTEM PROPERTIES ..................................................................................................... 44
ROUTER ......................................................................................................................... 44
WAN SETTINGS ............................................................................................................. 44
WAN - DHCP............................................................................................................ 45
WAN – STATIC IP ...................................................................................................... 46
WAN – PPPOE ......................................................................................................... 47
VPN PASS THROUGH ..................................................................................................... 48
WIRELESS ...................................................................................................................... 48
WIRELESS NETWORK ...................................................................................................... 48
WIRELESS SECURITY - WEP ...................................................................................... 49
WIRELESS SECURITY – WPA-PSK, WPA2-PSK,........................................................ 50
WIRELESS ADVANCED SETTINGS ..................................................................................... 51
MANAGEMENT ................................................................................................................ 52
ADMINISTRATION ............................................................................................................ 52
SNMP SETTINGS ........................................................................................................... 53
BACKUP/RESTORE SETTINGS, RESET TO FACTORY DEFAULT SETTINGS ............................. 54
FIRMWARE UPGRADE ................................................................................................. 55
TIME SETTINGS .......................................................................................................... 55
LOG ........................................................................................................................... 56
APPENDIX A – SPECIFICATIONS............................................................................................... 57
APPENDIX B – FCC INTERFERENCE STATEMENT ................................................................. 60
3
Long Range Wireless Access Point / Client Bridge
Version 1.0
Revision History
Version
Date
Notes
1.0
August 24, 2008
Initial Version
4
Long Range Wireless Access Point / Client Bridge
Version 1.0
1 Introduction
EOC-2610 is a long range outdoor wireless Access Point and Client Bridge that operates
seamlessly in the 2.4GHz frequency spectrum. It features high transmitted output power
and high receivable sensitivity. High output power and high sensitivity can extend range
and coverage to reduce the roaming between Access Points to get a more stable
wireless connection. It also reduces the expense of equipment in the same environment.
It supports distance range from 1km to 30km and RSSI indicator which enables the best
transmit and receive signals for traffic communication. This product comes with PoE
injector for building in outdoor environment easily.
To protect your wireless connectivity, it can encrypt all wireless transmissions through
64/128-bit WEP data encryption and also supports WPA/WPA2. The MAC address filter
lets you select exactly which stations should have access to your network. In addition,
the User Isolation function can protect the private network between client users.
The attractive design, high performance, and array of features make EOC-2610 a
suitable wireless solution for your residence or office.
This chapter describes the features, package contents, applications, and network
configuration.
1.1 Features
Wireless
• 2.4GHz It works in 2.4GHz frequency spectrum
• High output power Transmit output power programmable for different country
selections
•
•
•
•
High Data Rate High speed transmitting rate up to 108Mbps with Super G, support
large payload such as MEPG video streaming
Multifunction application Access Point/Client Bridge/Client Router
Long range transmitting Transmit power control and distance control (ACK
timeout)
Signal Strength LED indicators have the best transmit and receive signal for traffic
communication
Networking
• Public wireless solution An AP interface that is especially useful in public areas
such as hotspots and enterprise
• Signal Strength Display RF signal strength status shown LEDs of 3 colors,
making network build-up easier
• QoS(WMM) Enhance performance and quality of service
Security
• 802.11i WEP, WPA, WPA2 (Encryption support TKIP/AES)
5
Long Range Wireless Access Point / Client Bridge
•
•
•
•
Version 1.0
802.1x IEEE 802.1x Authenticator
MAC address functions MAC address filter (AP mode)
L2 isolation
Station isolation
Management
• Firmware Upgrade Upgrading firmware via web browser, setting are reserved after
upgrade
• Reset & Backup Reset to factory default. User can export all setting into a file via
WEB
• MIB MIB I, MIB II(RFC1213)
• SNMP V1, V2c
1.2 Package Contents
Open the package carefully, and make sure that none of the items listed below are
missing. Do not discard the packing materials, in case of return; the unit must be shipped
in its original package.
h
h
h
h
h
h
h
1* 802.11b/g Long range AP/CB (EOC-2610)
1* PoE injector (EPE-1212)
1* Power Adaptor
1* CD with User’s Manual
1* Quick Installation Guide (QIG)
1* Metal strap
1* Special screw set
1.3 Safety Guidelines
In order to reduce the risk of fire, electric shock and injury, please adhere to the following
safety guidelines.
h
h
h
h
h
h
h
h
Carefully follow the instructions in this manual; also follow all instruction labels
on this device.
Except for the power adapter supplied, this device should not be connected to
any other adapters.
Do not spill liquid of any kind on this device.
Do not place the unit on an unstable stand or table. This unit may drop and
become damaged.
Do not expose this unit to direct sunlight.
Do not place any hot devices close to this unit, as they may degrade or cause
damage to the unit.
Do not place any heavy objects on top of this unit.
Do not use liquid cleaners or aerosol cleaners. Use a soft dry cloth for cleaning.
1.4 System Requirements
The following are the minimum system requirements in order configure the device.
6
Long Range Wireless Access Point / Client Bridge
Version 1.0
h PC/AT compatible computer with an Ethernet interface.
h Operating system that supports HTTP web-browser
1.5 Applications
The wireless LAN products are easy to install and highly efficient. The following list
describes some of the many applications made possible through the power and flexibility
of wireless LANs:
a) Difficult-to-wire environments
There are many situations where wires cannot be laid easily. Historic
buildings, older buildings, open areas and across busy streets make the
installation of LANs either impossible or very expensive.
b) Temporary workgroups
Consider situations in parks, athletic arenas, exhibition centers, disasterrecovery, temporary offices and construction sites where one wants a
temporary WLAN established and removed.
c) The ability to access real-time information
Doctors/nurses, point-of-sale employees, and warehouse workers can
access real-time information while dealing with patients, serving customers
and processing information.
d) Frequently changed environments
Show rooms, meeting rooms, retail stores, and manufacturing sites where
frequently rearrange the workplace.
e) Small Office and Home Office (SOHO) networks
SOHO users need a cost-effective, easy and quick installation of a small
network.
f) Wireless extensions to Ethernet networks
Network managers in dynamic environments can minimize the overhead
caused by moves, extensions to networks, and other changes with wireless
LANs.
g) Wired LAN backup
Network managers implement wireless LANs to provide backup for missioncritical applications running on wired networks.
h) Training/Educational facilities
Training sites at corporations and students at universities use wireless
connectivity to ease access to information, information exchanges, and
learning.
1.6 Network Configuration
To better understand how the wireless LAN products work together to create a
wireless network, it might be helpful to depict a few of the possible wireless LAN PC
card network configurations. The wireless LAN products can be configured as:
a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs.
b) Infrastructure for enterprise LANs.
a) Ad-hoc (peer-to-peer) Mode
7
Long Range Wireless Access Point / Client Bridge
Version 1.0
This is the simplest network configuration with several computers
equipped with the PC Cards that form a wireless network whenever they
are within range of one another. In ad-hoc mode, each client is peer-topeer, would only have access to the resources of the other client and
does not require an access point. This is the easiest and least expensive
way for the SOHO to set up a wireless network. The image depicts a
network in ad-hoc mode.
b) Infrastructure Mode
The infrastructure mode requires the use of an access point (AP). In this
mode, all wireless communication between two computers has to be via
the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet
network. If used in stand-alone, the AP can extend the range of
independent wireless LANs by acting as a repeater, which effectively
doubles the distance between wireless stations. The image below
depicts a network in infrastructure mode.
8
Long Range Wireless Access Point / Client Bridge
Version 1.0
2 Understanding the Hardware
2.1 Hardware Installation
1. Place the unit in an appropriate location after conducting a site survey.
2. Plug one end of the Ethernet cable into the Network port of the PoE injector and
another end into your PC/Notebook.
3. Plug one end of another Ethernet cable to AP/Bridge port of the PoE injector and the
other end into you cable/DSL modem (Internet)
4. Insert the DC-inlet of the power adapter into the 24V port of the PoE injector and the
other end into the power socket on the wall.
This diagram depicts the hardware configuration
PC, Cable/DSL
Modem
Ethernet
Ethernet
PoE Injector
Access Point
AC/DC cable
Power Outlet
2.2 Hardware Description
The images below depict the front and rear panel of the Access Point / Client Bridge.
Front Panel
Rear Panel
9
Long Range Wireless Access Point / Client Bridge
Version 1.0
2.3 Mounting Kits
The images below depict the standard and optional mounting kits.
Standard
Pole Mount
Optional
Wall Mount
Optional
Window Mount
2.4 IP Address Configuration
This device can be configured as a Bridge/Router or Access Point. The default IP
address of the device is 192.168.1.1 In order to log into this device, you must first
configure the TCP/IP settings of your PC/Notebook.
1. In the control panel, double click Network Connections and then double click on the
connection of your Network Interface Card (NIC). You will then see the following
screen.
10
Long Range Wireless Access Point / Client Bridge
Version 1.0
2. Select Internet Protocol (TCP/IP) and then click on the Properties button. This will
allow you to configure the TCP/IP settings of your PC/Notebook.
3. Select Use the following IP Address radio button and then enter the IP address
and subnet mask. Ensure that the IP address and subnet mask are on the same
subnet as the device.
For Example:
PC IP address: 192.168.1.10
PC subnet mask: 255.255.255.0
4. Click on the OK button to close this window, and once again to close LAN properties
window.
11
Long Range Wireless Access Point / Client Bridge
Version 1.0
3 Switching Between Operating Modes
This device can operate in three modes: Access Point, Client t Bridge, and Client Router.
This chapter will describe how to switch between operating modes.
3.1 Logging In
ƒ
ƒ
ƒ
ƒ
To configure the device through the web-browser, enter the IP address of the device
(default: 192.168.1.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Specify admin for both the user name and password.
ƒ
After logging in, you will see the graphical user interface of the device. Click on the
System Properties link under the System navigation drop-down menu.
ƒ
Select and operating mode from the list (Access Point, Client Bridge, or Client Router)
and then click on the Apply button.
12
Long Range Wireless Access Point / Client Bridge
Version 1.0
4 Access Point Operating Mode
Logging In
ƒ
ƒ
ƒ
ƒ
ƒ
1.
2.
3.
4.
To configure the device through the web-browser, enter the IP address of the device
(default: 192.168.1.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Specify admin for both the user name and password.
After logging in you will graphical user interface (GUI) of the device. The navigation
drop-down menu on left is divided into four sections:
Status: Displays the overall status, connection status, and event log.
System: This menu includes the system properties, IP and Spanning Tree settings.
Wireless: This menu includes status, basic, advanced, and security.
Management: This menu includes the admin setup, SNMP, firmware upgrade, and
save/restore backup.
13
Long Range Wireless Access Point / Client Bridge
Version 1.0
Status
ƒ
Click on the Status link on the navigation dropdown menu. You will then see three options: Main,
Wireless Client List, and System Log. Each option is
described in detail below.
Main
ƒ
Click on the Main link under the Status drop-down menu. The status that is
displayed corresponds with the operating mode that is selected. Information such as
operating mode, system up time, firmware version, serial number, kernel version and
application version are displayed in the ‘System’ section. LAN IP address, subnet
mask, and MAC address are displayed in the ‘LAN’ section. In the ‘Wireless section,
the frequency, channel is displayed. Since this device supports multiple-SSIDs, the
details of each SSID, such as ESSID and its security settings are displayed.
14
Long Range Wireless Access Point / Client Bridge
Version 1.0
Wireless Client List
ƒ
ƒ
Click on the Wireless Client List link under the Status drop-down menu. This page
displays the list of Clients that are associated to the Access Point.
The MAC addresses and signal strength for each client is displayed. Click on the
Refresh button to refresh the client list
System Log
ƒ
Click on the System Log link under the Status drop-down menu. The device
automatically logs (records) events of possible interest in its internal memory. If there
is not enough internal memory for all events, logs of older events are deleted, but
logs of the latest events are retained.
15
Long Range Wireless Access Point / Client Bridge
Version 1.0
System
ƒ
Click on the System link on the navigation
drop-down menu. You will then see three
options: System Properties, IP Settings, and
Spanning Tree Settings. Each option is
described in detail below.
System Properties
ƒ
Click on the System Properties link under the System drop-down menu. This page
allows you to switch the operating mode of the device, as well as specify a name and
select the operating region.
ƒ
ƒ
ƒ
Device Name: Specify a name for the device (this is not the SSID),
Country/Region: Select a country from the drop-down list.
Operating Mode: Select and operating mode. Configuration for each operating
mode is described in their respective chapters.
Click on the Apply button to save the changes.
ƒ
IP Settings
ƒ
Click on the IP Settings link under the System drop-down menu This page allows
you to configure the device with a static IP address or a DHCP client.
ƒ
IP Network Setting: Select Obtain an IP address automatically (DHCP) radio
button if the Access Point is connected to a DHCP server. This will allow the Access
16
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
Version 1.0
Point to pass IP addresses to the clients associated with it. You may select Specify
an IP Address radio button if you would like the device to use a static IP address. In
this case, you would be required to specify an IP address, subnet mask, and default
gateway IP address.
IP Address: Specify an IP address
IP Subnet Mask: Specify the subnet mask for the IP address
Default Gateway: Specify the IP address of the default gateway.
Click on the Apply button to save the changes.
Spanning Tree Settings
ƒ
Click on the Spanning Tree link under the System drop-down menu Spanning-Tree
Protocol is a link management protocol that provides path redundancy while
preventing undesirable loops in the network.
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Spanning Tree Status: Choose to enable or disable the spanning tree feature.
Bridge Hello Time: Specify the number of seconds for the hello time.
Bridge Max Age: Specify the number of seconds for the max age.
Bridge Forward Delay: Specify the number of seconds for the bridge forward delay.
Priority: Specify the number of seconds for the priority.
Click on the Apply button to save the changes.
17
Long Range Wireless Access Point / Client Bridge
Version 1.0
Wireless
ƒ
Click on the Wireless link on the navigation
drop-down menu. You will then see four
options: wireless network, wireless MAC filter,
WDS link settings, and wireless advanced
settings. Each option is described below.
Wireless Network
ƒ
The Wireless Network page allows you to configure the wireless mode, channel,
SSID, and security settings.
ƒ
Wireless Mode: Depending on the type of wireless clients that are connected to the
network, you may select B, G, B/G-mixed or Super-G. If you are not sure about
which clients will be accessing the wireless networks, it is recommended that you
select B/G-mixed for the best performance.
ƒ
Super-G is a proprietary mode which combines all channels into a single channel to
maximize the through-put up to 200%. Please be aware that Super-G works only with
other Super-G supported devices.
ƒ
Channel: Select a channel from the drop-down list. The channels available are
based on the country’s regulation. When selecting Infrastructure mode, a channel is
not required, however, when selecting Adhoc mode, you must select the same
channel on all points.
Wireless Security - WEP
ƒ
Security Mode: Select WEP from the drop-down list if your wireless network uses
WEP encryption. WEP is an acronym for Wired Equivalent Privacy, and is a security
18
Long Range Wireless Access Point / Client Bridge
Version 1.0
protocol that provides the same level of security for wireless networks as for a wired
network.
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Authentication Type: Select an authentication method. Options available are Open
Key, Shared Key or Auto. An open system allows any client to authenticate as long
as it conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends an
unencrypted challenge text string to any device attempting to communicate with the
Access Point. The device requesting authentication encrypts the challenge text and
sends it back to the Access Point. If the challenge text is encrypted correctly, the
Access Point allows the requesting device to authenticate. It is recommended to
select Auto if you are not sure which authentication type is used.
Input Type: Select He or ASCII from the drop-down list
Key Length: Select a key format from the drop-down list. 64bit-hex keys require 10
characters, where as 128-bit keys require 26 characters. A hex key is defined as a
number between 0 through 9 and letter between A through F.
Default Key: You may use up to four different keys for four different networks. Select
the current key that will be used.
Key 1-4: You may enter four different WEP keys.
Click on the Apply button to save the changes.
Wireless Security – WPA-PSK, WPA2-PSK, WPA-Mixed
ƒ
Security Mode: Select WPA-PSK, WPA2-PSK, or WPA-Mixed from the drop-down
list if your wireless network uses WPA pre-shared key.
19
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
Version 1.0
Encryption: Select TKIP or AES from the drop-down list if your wireless network
uses this encryption. WPA (Wi-Fi Protected Access) was designed to improve upon
the security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol (TKIP),
which scrambles the keys using a hashing algorithm and by adding an integrity
checking feature which makes sure that keys haven’t been tampered with.
Passphrase: Specify a passphrase that is shared amongst the Access Points and
clients.
Group Key Update Interval: Specify the number of seconds after which the Access
Point will probe the client for the passphrase.
Click on the Apply button to save the changes.
Wireless Security – WPA, WPA2
ƒ
Security Mode: Select WPA or WPA2 from the drop-down list if your wireless
network uses WPA. WPA (Wi-Fi Protected Access) was designed to improve upon
the security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol (TKIP),
which scrambles the keys using a hashing algorithm and by adding an integrity
checking feature which makes sure that keys haven’t been tampered with.
20
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
Encryption: Select TKIP or AES from the drop-down list if your wireless network
uses this encryption.
RADIUS IP Address: Enter the IP address of the RADIUS server.
RADIUS Port: Enter the port number of the RADIUS server. The default is usually
1812.
RADIUS Secret: Enter the shared password of the RADIUS server.
Group Key Update Interval: Specify the number of seconds after which the Access
Point will probe the client for the secret.
Click on the Apply button to save the changes.
Wireless MAC Filter
ƒ
Click on the Wireless MAC Filter link under the Wireless menu. On this page you
can filter the MAC address by allowing or blocking access the network.
ƒ
ACL (Access Control) Mode: You may choose to Disable, Allow Listed, or Deny
Listed MAC addresses from associating with the network. By selecting Allow MAC
21
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Version 1.0
in the List, only the address listed in the table will have access to the network; all
other clients will be blocked. On the other hand, selected Deny MAC in the List,
only the listed MAC addresses will be blocked from accessing the network; all other
clients will have access to the network.
MAC Address: Enter the MAC address.
This table lists the blocked or allowed MAC addresses; you may delete selected
MAC address or delete all the addresses from the table by clicking on the Delete
button.
Click on the Apply button to save the changes.
Wireless Advanced Settings
ƒ
Click on the Wireless Advanced Settings link. On this page you can configure the
advanced settings to tweak the performance of your wireless network. Options
available are: data rate, transmit power, fragmentation threshold, RTS threshold,
protection mode and distance.
ƒ
Data Rate: If you would like to force a data rate, you may select one from the dropdown list. However, for best performance it is recommended to use the Auto setting.
Transmit Power: You may have the different application distance of the device by
selecting a value from the drop-down list. This feature can be helpful in restricting the
coverage area of the wireless network.
You can arrange the different data rate in distance in Access Point mode. Please
refer below table. The table only for 11g and 11b/g mix mode
ƒ
ƒ
High
Ultra High
Super
Extreme
ƒ
6M-24M
ˇ
ˇ
ˇ
Great
36M
ˇ
ˇ
Great
N/A
48M
ˇ
Great
NA
N/A
54M
Great
N/A
N/A
N/A
Fragment: Packets over the specified size will be fragmented in order to improve
performance on noisy networks.
22
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to
maintain performance in noisy networks and preventing hidden nodes from
degrading the performance.
Protection Mode: If your wireless network is using both 802.11b and 802.g devices
then it is recommended to enable this feature so that the 802.11b devices will not
degrade the performance of 802.11g devices.
WMM: Enable wireless Quality of Service
Distance (1-30km): Specify a distance between 1 and 30Km.
Click on the Apply button to save the changes.
23
Long Range Wireless Access Point / Client Bridge
Version 1.0
Management
ƒ
Click on the Management link on the
navigation drop-down menu. You will then see
seven options: administration, SNMP settings,
backup/restore settings, firmware upgrade,
time settings, and log. Each option is described
below.
Administration
ƒ
Click on the Administration link under the Management menu. This option allows
you to create a user name and password for the device. By default, this device is
configured without a user name and password admin. For security reasons it is
highly recommended that you create a new user name and password.
ƒ
ƒ
Name: Specify a user name into the first field.
Password: Specify a password into this field and then re-type the password into the
Confirm Password field.
Click on the Apply button to save the changes.
ƒ
SNMP Settings
ƒ
Click on the SNMP Settings link under the Management menu. This option allows
you to assign the contact details, location, community name and trap settings for
SNMP. This is a networking management protocol used to monitor network-attached
devices. SNMP allows messages (called protocol data units) to be sent to various
parts of a network. Upon receiving these messages, SNMP-compatible devices
(called agents) return data stored in their Management Information Bases. .
24
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
SNMP Enable/Disable: Choose to enable or disable the SNMP feature.
Contact: Specify the contact details of the device.
Location: Specify the location of the device.
Read-Only Community Name: Specify the password for access the SNMP
community for read only access.
Read-Write Community Name: Specify the password for access to the SNMP
community with read/write access.
Send SNMP Trap: Specify the IP address of the computer that will receive the
SNMP traps.
Trap Community Name: Specify the password for the SNMP trap community.
Click on the Apply button to save the changes.
Backup/Restore settings, Reset to factory default settings
ƒ
Click on the Backup/Restore Setting link under the Management menu. This option
is used to save the current settings of the device in a file on your local disk or load
settings on to the device from a local disk. This feature is very handy for
administrators who have several devices that need to be configured with the same
settings.
ƒ
Save a copy of the current settings: Click on the Backup button to save the current
configuration.
25
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
Version 1.0
Restore saved settings from a file: Once a file has been backed up, you may
restore it by clicking on the Browse button to select the file, and then the Restore
button.
Revert to factory default settings: Click on the Factory Default Settings button to
reset the device to the default settings. Please wait while the device restart and then
access the device using the default IP address: 192.168.1.1
Firmware Upgrade
ƒ
Click on the Upgrade Firmware link under the Management menu. This page is
used to upgrade the firmware on the device. Make sure that downloaded the
appropriate firmware from your vendor.
ƒ
Click on the Browse button and then select the appropriate firmware and then click
on the Upgrade button.
Note: The upgrade process may take about 1 minute to complete. Do not power off
the device during this process as it may crash the device and make it unusable. The
device will restart automatically once the upgrade is complete.
26
Long Range Wireless Access Point / Client Bridge
Version 1.0
Time Settings
ƒ
Click on the Time Settings link under the Management menu. This page allows you
to configure the time on the device. You may do this manually or by connecting to a
NTP server.
ƒ
ƒ
Manually Set Date and Time: Specify the date and time
Automatically Get Date and Time: Select the time zone from the drop down list and
then specify the IP address of the NTP server.
Click on the Apply button to save the changes.
ƒ
Log
ƒ
Click on the Log link under the Management menu. The Log page displays a list of
events that are triggered on the Ethernet and Wireless interface. This log can be
referred when an unknown error occurs on the system or when a report needs to be
sent to the technical support department for debugging purposes.
ƒ
ƒ
Syslog: Choose to enable or disable the system log.
Log Server IP Address: Specify the IP address of the server that will receive the
system log.
Local Log: Choose to enable or disable the local log.
Click on the Apply button to save the changes.
ƒ
ƒ
27
Long Range Wireless Access Point / Client Bridge
Version 1.0
5 Client Bridge Operating Mode
5.1 Logging In
ƒ
ƒ
ƒ
ƒ
ƒ
1.
2.
3.
4.
To configure the device through the web-browser, enter the IP address of the device
(default: 192.168.1.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Specify admin for both the user name and password.
After logging in you will graphical user interface (GUI) of the device. The navigation
drop-down menu on left is divided into four sections:
Status: Displays the overall status, connection status, and event log.
System: This menu includes the system properties, IP and Spanning Tree settings.
Wireless: This menu includes status, basic, advanced, and security.
Management: This menu includes the admin setup, SNMP, firmware upgrade, and
save/restore backup.
28
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.2 Status
ƒ
Click on the Status link on the navigation
drop-down menu. You will then see three
options: Main, Connection Status, and System
Log. Each option is described in detail below.
5.2.1 Main
ƒ
Click on the Main link under the Status drop-down menu. The status that is
displayed corresponds with the operating mode that is selected. Information such as
operating mode, system up time, firmware version, serial number, kernel version and
application version are displayed in the ‘System’ section. LAN IP address, subnet
mask, and MAC address are displayed in the ‘LAN’ section. In the ‘Wireless section,
the frequency, channel is displayed. Since this device supports multiple-SSIDs, the
details of each SSID, such as ESSID and its security settings are displayed.
29
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.2.2 Connection Status
ƒ
Click on the Connection Status link under the Status drop-down menu. This page
displays the current status of the network, including network type, SSID, BSSID,
connection status, wireless mode, current channel, security, data rate, noise level
and signal strength.
5.2.3 System Log
ƒ
Click on the System Log link under the Status drop-down menu. The device
automatically logs (records) events of possible interest in its internal memory. If there
is not enough internal memory for all events, logs of older events are deleted, but
logs of the latest events are retained.
30
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.3 System
ƒ
Click on the System link on the navigation
drop-down menu. You will then see three
options: System Properties, IP Settings, and
Spanning Tree Settings. Each option is
described in detail below.
5.3.1 System Properties
ƒ
Click on the System Properties link under the System drop-down menu. This page
allows you to switch the operating mode of the device, as well as specify a name and
select the operating region.
ƒ
ƒ
ƒ
Device Name: Specify a name for the device (this is not the SSID),
Country/Region: Select a country from the drop-down list.
Operating Mode: Select and operating mode. Configuration for each operating
mode is described in their respective chapters.
Click on the Apply button to save the changes.
ƒ
5.3.2 IP Settings
ƒ
Click on the IP Settings link under the System drop-down menu This page allows
you to configure the device with a static IP address or a DHCP client.
31
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
IP Network Setting: Select Obtain an IP address automatically (DHCP) radio
button if the Access Point is connected to a DHCP server. This will allow the Access
Point to pass IP addresses to the clients associated with it. You may select Specify
an IP Address radio button if you would like the device to use a static IP address. In
this case, you would be required to specify an IP address, subnet mask, and default
gateway IP address.
IP Address: Specify an IP address
IP Subnet Mask: Specify the subnet mask for the IP address
Default Gateway: Specify the IP address of the default gateway.
Click on the Apply button to save the changes.
5.3.3 Spanning Tree Settings
ƒ
Click on the Spanning Tree link under the System drop-down menu Spanning-Tree
Protocol is a link management protocol that provides path redundancy while
preventing undesirable loops in the network.
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Spanning Tree Status: Choose to enable or disable the spanning tree feature.
Bridge Hello Time: Specify the number of seconds for the hello time.
Bridge Max Age: Specify the number of seconds for the max age.
Bridge Forward Delay: Specify the number of seconds for the bridge forward delay.
Priority: Specify the number of seconds for the priority.
Click on the Apply button to save the changes.
32
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.4 Wireless
ƒ
Click on the Wireless link on the
navigation drop-down menu. You will
then see three options: wireless network,
wireless
security,
and
wireless
advanced settings. Each option is
described below.
5.4.1 Wireless Network
ƒ
The Wireless Network page allows you to configure the wireless mode, channel,
SSID, and security settings.
ƒ
Wireless Mode: Depending on the type of wireless clients that are connected to the
network, you may select B, G, or B/G-mixed. If you are not sure about which clients
will be accessing the wireless networks, it is recommended that you select B/Gmixed for the best performance.
SSID: The SSID is a unique named shared amongst all the points of the wireless
network. The SSID must be identical on all points of the wireless network and cannot
exceed 32 characters. You may specify an SSID or select one from the Site Survey.
Site Survey: Click on the Site Survey button in order to scan the 2.4GHz frequency
for devices that broadcast their SSID. Click on the BSSID link to connect to the
Access Point. Click on the Refresh button to re-scan the frequency.
ƒ
ƒ
33
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.4.2 Wireless Security - WEP
ƒ
Security Mode: Select WEP from the drop-down list if your wireless network uses
WEP encryption. WEP is an acronym for Wired Equivalent Privacy, and is a security
protocol that provides the same level of security for wireless networks as for a wired
network.
ƒ
Authentication Type: Select an authentication method. Options available are Open
Key, Shared Key or Auto. An open system allows any client to authenticate as long
as it conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends an
unencrypted challenge text string to any device attempting to communicate with the
Access Point. The device requesting authentication encrypts the challenge text and
sends it back to the Access Point. If the challenge text is encrypted correctly, the
Access Point allows the requesting device to authenticate. It is recommended to
select Auto if you are not sure which authentication type is used.
Input Type: Select He or ASCII from the drop-down list
Key Length: Select a key format from the drop-down list. 64bit-hex keys require 10
characters, where as 128-bit keys require 26 characters. A hex key is defined as a
number between 0 through 9 and letter between A through F.
Default Key: You may use up to four different keys for four different networks. Select
the current key that will be used.
Key 1-4: You may enter four different WEP keys.
Click on the Apply button to save the changes.
ƒ
ƒ
ƒ
ƒ
ƒ
34
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.4.3 Wireless Security – WPA-PSK, WPA2-PSK,
ƒ
Security Mode: Select WPA-PSK, or WPA2-PSK from the drop-down list if your
wireless network uses WPA pre-shared key.
ƒ
Encryption: Select TKIP or AES from the drop-down list if your wireless network
uses this encryption. WPA (Wi-Fi Protected Access) was designed to improve upon
the security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol (TKIP),
which scrambles the keys using a hashing algorithm and by adding an integrity
checking feature which makes sure that keys haven’t been tampered with.
Passphrase: Specify a passphrase that is shared amongst the Access Points and
clients.
Click on the Apply button to save the changes.
ƒ
ƒ
5.4.4 Wireless Advanced Settings
ƒ
Click on the Wireless Advanced Settings link. On this page you can configure the
advanced settings to tweak the performance of your wireless network. Options
available are: data rate, transmit power, fragmentation threshold, RTS threshold,
protection mode and distance.
ƒ
Data Rate: If you would like to force a data rate, you may select one from the dropdown list. However, for best performance it is recommended to use the Auto setting.
35
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
Transmit Power: You may have the different application distance of the device by
selecting a value from the drop-down list. This feature can be helpful in restricting the
coverage area of the wireless network.
You can arrange the different data rate in distance in Access Point mode. Please
refer below table. The table only for 11g and 11b/g mix mode
High
Ultra High
Super
Extreme
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
6M-24M
ˇ
ˇ
ˇ
Great
36M
ˇ
ˇ
Great
N/A
48M
ˇ
Great
NA
N/A
54M
Great
N/A
N/A
N/A
Fragment: Packets over the specified size will be fragmented in order to improve
performance on noisy networks.
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to
maintain performance in noisy networks and preventing hidden nodes from
degrading the performance.
Protection Mode: If your wireless network is using both 802.11b and 802.g devices
then it is recommended to enable this feature so that the 802.11b devices will not
degrade the performance of 802.11g devices.
Distance (1-30km): Specify a distance between 1 and 30Km.
Click on the Apply button to save the changes.
5.5 Management
ƒ
Click on the Management link on the
navigation drop-down menu. You will then
see six options: administration, SNMP
settings, backup/restore settings, firmware
upgrade, time settings, and log. Each option
is described below.
5.5.1 Administration
ƒ
Click on the Administration link under the Management menu. This option allows
you to create a user name and password for the device. By default, this device is
configured without a user name and password admin. For security reasons it is
highly recommended that you create a new user name and password.
36
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Version 1.0
Name: Specify a user name into the first field.
Password: Specify a password into this field and then re-type the password into the
Confirm Password field.
Click on the Apply button to save the changes.
5.5.2 SNMP Settings
ƒ
Click on the SNMP Settings link under the Management menu. This option allows
you to assign the contact details, location, community name and trap settings for
SNMP. This is a networking management protocol used to monitor network-attached
devices. SNMP allows messages (called protocol data units) to be sent to various
parts of a network. Upon receiving these messages, SNMP-compatible devices
(called agents) return data stored in their Management Information Bases. .
ƒ
ƒ
ƒ
ƒ
SNMP Enable/Disable: Choose to enable or disable the SNMP feature.
Contact: Specify the contact details of the device.
Location: Specify the location of the device.
Read-Only Community Name: Specify the password for access the SNMP
community for read only access.
Read-Write Community Name: Specify the password for access to the SNMP
community with read/write access.
Send SNMP Trap: Specify the IP address of the computer that will receive the
SNMP traps.
Trap Community Name: Specify the password for the SNMP trap community.
Click on the Apply button to save the changes.
ƒ
ƒ
ƒ
ƒ
37
Long Range Wireless Access Point / Client Bridge
Version 1.0
5.5.3 Backup/Restore settings, Reset to factory default settings
ƒ
Click on the Backup/Restore Setting link under the Management menu. This option
is used to save the current settings of the device in a file on your local disk or load
settings on to the device from a local disk. This feature is very handy for
administrators who have several devices that need to be configured with the same
settings.
ƒ
Save a copy of the current settings: Click on the Backup button to save the current
configuration.
Restore saved settings from a file: Once a file has been backed up, you may
restore it by clicking on the Browse button to select the file, and then the Restore
button.
Revert to factory default settings: Click on the Factory Default Settings button to
reset the device to the default settings. Please wait while the device restart and then
access the device using the default IP address: 192.168.1.1
ƒ
ƒ
5.5.4 Firmware Upgrade
ƒ
Click on the Upgrade Firmware link under the Management menu. This page is
used to upgrade the firmware on the device. Make sure that downloaded the
appropriate firmware from your vendor.
38
Long Range Wireless Access Point / Client Bridge
ƒ
Version 1.0
Click on the Browse button and then select the appropriate firmware and then click
on the Upgrade button.
Note: The upgrade process may take about 1 minute to complete. Do not power off
the device during this process as it may crash the device and make it unusable. The
device will restart automatically once the upgrade is complete.
5.5.5 Time Settings
ƒ
Click on the Time Settings link under the Management menu. This page allows you
to configure the time on the device. You may do this manually or by connecting to a
NTP server.
ƒ
ƒ
Manually Set Date and Time: Specify the date and time
Automatically Get Date and Time: Select the time zone from the drop down list and
then specify the IP address of the NTP server.
Click on the Apply button to save the changes.
ƒ
5.5.6 Log
ƒ
Click on the Log link under the Management menu. The Log page displays a list of
events that are triggered on the Ethernet and Wireless interface. This log can be
referred when an unknown error occurs on the system or when a report needs to be
sent to the technical support department for debugging purposes.
39
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
Version 1.0
Syslog: Choose to enable or disable the system log.
Log Server IP Address: Specify the IP address of the server that will receive the
system log.
Local Log: Choose to enable or disable the local log.
Click on the Apply button to save the changes.
40
Long Range Wireless Access Point / Client Bridge
Version 1.0
6 Client Router Operating Mode
6.1 Logging In
ƒ
ƒ
ƒ
ƒ
ƒ
1.
2.
3.
4.
5.
To configure the device through the web-browser, enter the IP address of the device
(default: 192.168.1.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Specify admin for both the user name and password.
After logging in you will graphical user interface (GUI) of the device. The navigation
drop-down menu on left is divided into four sections:
Status: Displays the overall status, connection status, and event log.
System: This menu includes the system properties, IP and Spanning Tree settings.
Router: This includes WAN, LAN, and VPN settings.
Wireless: This menu includes status, basic, advanced, and security.
Management: This menu includes the admin setup, SNMP, firmware upgrade, and
save/restore backup.
41
Long Range Wireless Access Point / Client Bridge
Version 1.0
6.2 Status
ƒ
Click on the Status link on the navigation
drop-down menu. You will then see three
options: Main, Connection Status, and System
Log. Each option is described in detail below.
6.2.1 Main
ƒ
Click on the Main link under the Status drop-down menu. The status that is
displayed corresponds with the operating mode that is selected. Information such as
operating mode, system up time, firmware version, serial number, kernel version and
application version are displayed in the ‘System’ section. LAN IP address, subnet
mask, and MAC address are displayed in the ‘LAN’ section. In the ‘Wireless section,
the frequency, channel is displayed. Since this device supports multiple-SSIDs, the
details of each SSID, such as ESSID and its security settings are displayed. The
‘WAN” section displays the MAC address, connection type, interface, IP address,
and subnet mask.
42
Long Range Wireless Access Point / Client Bridge
Version 1.0
6.2.2 Connection Status
ƒ
Click on the Connection Status link under the Status drop-down menu. This page
displays the current status of the network, including network type, SSID, BSSID,
connection status, wireless mode, current channel, security, data rate, noise level
and signal strength.
6.2.3 System Log
ƒ
Click on the System Log link under the Status drop-down menu. The device
automatically logs (records) events of possible interest in its internal memory. If there
is not enough internal memory for all events, logs of older events are deleted, but
logs of the latest events are retained.
43
Long Range Wireless Access Point / Client Bridge
Version 1.0
6.3 System
ƒ
Click on the System link on the navigation
drop-down menu. You will then see System
Properties setting, which is described below.
6.3.1 System Properties
ƒ
Click on the System Properties link under the System drop-down menu. This page
allows you to switch the operating mode of the device, as well as specify a name and
select the operating region.
ƒ
ƒ
ƒ
Device Name: Specify a name for the device (this is not the SSID),
Country/Region: Select a country from the drop-down list.
Operating Mode: Select and operating mode. Configuration for each operating
mode is described in their respective chapters.
Click on the Apply button to save the changes.
ƒ
6.4 Router
ƒ
Click on the Router link on the navigation
drop-down menu. You will then see three
options: WAN settings, LAN settings, and
VPN Pass Through. Each section is
described in detail below.
6.4.1 WAN Settings
ƒ
Click on the WAN Settings link under the Router drop-down menu. This page allows
you to configure the WAN interface as DHCP, Static IP, or PPPoE.
44
Long Range Wireless Access Point / Client Bridge
6.4.1.1
Version 1.0
WAN - DHCP
ƒ
The WAN interface can be configured as a DHCP Client in which the ISP provides
the IP address to the device. This is also known as Dynamic IP.
ƒ
ƒ
ƒ
ƒ
Internet Connection Type: Select the DHCP from the drop-down list.
Account Name: Specify an account name if your ISP has provided you with one.
Domain Name: Specify a domain name if the ISP has provided you with one.
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the
largest packet size (in bytes) that the router will send to the WAN. If LAN devices
send larger packets, the router will break them into smaller packets. Ideally, you
should set this to match the MTU of the connection to your ISP. Typical values are
1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the
router's MTU is set too high, packets will be fragmented downstream. If the router's
MTU is set too low, the router will fragment packets unnecessarily and in extreme
cases may be unable to establish some connections. In either case, network
performance can suffer.
Domain Name Service: Select Get Automatically from ISP if the ISP will provide
the DNS address, if not, select Use these DNS servers and specify the primary and
secondary DNS server IP address.
Router MAC Address: If you need to change the MAC address of the router’s WAN
interface, either type in an alternate MAC address (for example, the MAC address of
the router initially connected to the ISP) or click on the Clone MAC button.
Click on the Apply button to save the changes.
ƒ
ƒ
ƒ
45
Long Range Wireless Access Point / Client Bridge
6.4.1.2
Version 1.0
WAN – Static IP
ƒ
The WAN interface can be configured as Static IP address. In this type of connection,
your ISP provides you with a dedicated IP address (which does not change as
DHCP).
ƒ
ƒ
ƒ
ƒ
Internet Connection Type: Select the Static IP from the drop-down list.
Account Name: Specify an account name if your ISP has provided you with one.
Domain Name: Specify a domain name if the ISP has provided you with one.
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the
largest packet size (in bytes) that the router will send to the WAN. If LAN devices
send larger packets, the router will break them into smaller packets. Ideally, you
should set this to match the MTU of the connection to your ISP. Typical values are
1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the
router's MTU is set too high, packets will be fragmented downstream. If the router's
MTU is set too low, the router will fragment packets unnecessarily and in extreme
cases may be unable to establish some connections. In either case, network
performance can suffer.
IP Address: Specify the IP address for this device, which is assigned by your ISP.
Subnet Mask: Specify the subnet mask for this IP address, which is assigned by
your ISP.
Default Gateway: Specify the IP address of the default gateway, which is assigned
by your ISP.
ƒ
ƒ
ƒ
46
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Version 1.0
Domain Name Service: Select Get Automatically from ISP if the ISP will provide
the DNS address, if not, select Use these DNS servers and specify the primary and
secondary DNS server IP address.
Router MAC Address: If you need to change the MAC address of the router’s WAN
interface, either type in an alternate MAC address (for example, the MAC address of
the router initially connected to the ISP) or click on the Clone MAC button.
Click on the Apply button to save the changes.
6.4.1.3
WAN – PPPoE
ƒ
The WAN interface can be configured as PPPoE. This type of connection is usually
used for a DSL service and requires a username and password to connect.
ƒ
ƒ
Internet Connection Type: Select PPPoE from the drop-down list.
MTU: The Maximum Transmission Unit (MTU) is a parameter that determines the
largest packet size (in bytes) that the router will send to the WAN. If LAN devices
send larger packets, the router will break them into smaller packets. Ideally, you
should set this to match the MTU of the connection to your ISP. Typical values are
1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection. If the
router's MTU is set too high, packets will be fragmented downstream. If the router's
MTU is set too low, the router will fragment packets unnecessarily and in extreme
cases may be unable to establish some connections. In either case, network
performance can suffer.
Login: Specify the user name which is provided by your ISP.
Password: Specify the password which is provided by your ISP, and then verify it
once again in the next field.
ƒ
ƒ
47
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
Version 1.0
Service Name: Specify the name of the ISP.
Type: Select a reconnection type: Keep Alive (A connection to the Internet is
always maintained), Connect on Demand: You have to open up the Web-based
management interface and click the Connect button manually any time that you wish
to connect to the Internet.
Domain Name Service: Select Get Automatically from ISP if the ISP will provide
the DNS address, if not, select Use these DNS servers and specify the primary and
secondary DNS server IP address.
Click on the Apply button to save the changes.
6.4.2 VPN Pass Through
ƒ
Click on the VPN Pass Through link under the Router drop-down menu. This page
allows you to enable the pass through feature.
ƒ
PPTP Pass Through: Place a check in this box if you would like to enable this pass
through. PPTP is a protocol (set of communication rules) that allows corporations to
extend their own corporate network through private "tunnels"
L2TP Pass Through: Place a check in this box if you would like to enable this pass
through. Layer 2 Tunneling Protocol is a transport protocol that enables tunneling
through the Internet for the establishment of virtual private networks.
IPSec Pass Through: Place a check in this box if you would like to enable this pass
through. IPSec is a VPN protocol used to implement secure exchange of packets at
the IP layer.
Click on the Apply button to save the changes.
ƒ
ƒ
ƒ
6.5 Wireless
ƒ
Click on the Wireless link on the
navigation drop-down menu. You will
then see three options: wireless network,
wireless
security,
and
wireless
advanced settings. Each option is
described below.
6.5.1 Wireless Network
ƒ
The Wireless Network page allows you to configure the wireless mode, channel,
SSID, and security settings.
48
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Wireless Mode: Depending on the type of wireless clients that are connected to the
network, you may select B, G, or B/G-mixed. If you are not sure about which clients
will be accessing the wireless networks, it is recommended that you select B/Gmixed for the best performance.
SSID: The SSID is a unique named shared amongst all the points of the wireless
network. The SSID must be identical on all points of the wireless network and cannot
exceed 32 characters. You may specify an SSID or select one from the Site Survey.
Site Survey: Click on the Site Survey button in order to scan the 2.4GHz frequency
for devices that broadcast their SSID. Click on the BSSID link to connect to the
Access Point. Click on the Refresh button to re-scan the frequency.
6.5.1.1
ƒ
Version 1.0
Wireless Security - WEP
Security Mode: Select WEP from the drop-down list if your wireless network uses
WEP encryption. WEP is an acronym for Wired Equivalent Privacy, and is a security
protocol that provides the same level of security for wireless networks as for a wired
network.
49
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Authentication Type: Select an authentication method. Options available are Open
Key, Shared Key or Auto. An open system allows any client to authenticate as long
as it conforms to any MAC address filter policies that may have been set. All
authentication packets are transmitted without encryption. Shared Key sends an
unencrypted challenge text string to any device attempting to communicate with the
Access Point. The device requesting authentication encrypts the challenge text and
sends it back to the Access Point. If the challenge text is encrypted correctly, the
Access Point allows the requesting device to authenticate. It is recommended to
select Auto if you are not sure which authentication type is used.
Input Type: Select He or ASCII from the drop-down list
Key Length: Select a key format from the drop-down list. 64bit-hex keys require 10
characters, where as 128-bit keys require 26 characters. A hex key is defined as a
number between 0 through 9 and letter between A through F.
Default Key: You may use up to four different keys for four different networks. Select
the current key that will be used.
Key 1-4: You may enter four different WEP keys.
Click on the Apply button to save the changes.
6.5.1.2
ƒ
Version 1.0
Wireless Security – WPA-PSK, WPA2-PSK,
Security Mode: Select WPA-PSK, or WPA2-PSK from the drop-down list if your
wireless network uses WPA pre-shared key.
50
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Version 1.0
Encryption: Select TKIP or AES from the drop-down list if your wireless network
uses this encryption. WPA (Wi-Fi Protected Access) was designed to improve upon
the security features of WEP (Wired Equivalent Privacy). The technology is designed
to work with existing Wi-Fi products that have been enabled with WEP. WPA
provides improved data encryption through the Temporal Integrity Protocol (TKIP),
which scrambles the keys using a hashing algorithm and by adding an integrity
checking feature which makes sure that keys haven’t been tampered with.
Passphrase: Specify a passphrase that is shared amongst the Access Points and
clients.
Click on the Apply button to save the changes.
6.5.2 Wireless Advanced Settings
ƒ
Click on the Wireless Advanced Settings link. On this page you can configure the
advanced settings to tweak the performance of your wireless network. Options
available are: data rate, transmit power, fragmentation threshold, RTS threshold,
protection mode and distance.
ƒ
Data Rate: If you would like to force a data rate, you may select one from the dropdown list. However, for best performance it is recommended to use the Auto setting.
Transmit Power: You may have the different application distance of the device by
selecting a value from the drop-down list. This feature can be helpful in restricting the
coverage area of the wireless network.
ƒ
51
Long Range Wireless Access Point / Client Bridge
ƒ
You can arrange the different data rate in distance in Access Point mode. Please
refer below table. The table only for 11g and 11b/g mix mode
High
Ultra High
Super
Extreme
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
6M-24M
ˇ
ˇ
ˇ
Great
36M
ˇ
ˇ
Great
N/A
48M
ˇ
Great
NA
N/A
54M
Great
N/A
N/A
N/A
Fragment: Packets over the specified size will be fragmented in order to improve
performance on noisy networks.
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to
maintain performance in noisy networks and preventing hidden nodes from
degrading the performance.
Protection Mode: If your wireless network is using both 802.11b and 802.g devices
then it is recommended to enable this feature so that the 802.11b devices will not
degrade the performance of 802.11g devices.
WMM: Enable wireless Quality of Service
Distance (1-30km): Specify a distance between 1 and 30Km.
Click on the Apply button to save the changes.
6.6 Management
ƒ
Click on the Management link on the
navigation drop-down menu. You will then
see six options: administration, SNMP
settings, backup/restore settings, firmware
upgrade, time settings, and log. Each option
is described below.
5.5.7 Administration
ƒ
Click on the Administration link under the Management menu. This option allows
you to create a user name and password for the device. By default, this device is
configured without a user name and password admin. For security reasons it is
highly recommended that you create a new user name and password.
52
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
Name: Specify a user name into the first field.
Password: Specify a password into this field and then re-type the password into the
Confirm Password field.
Web Access: Select normal web access HTTP or secured web access HTTPS.
Remote Management: Choose to enable or disable remote management.
Remote Upgrade: Choose to enable or disable remote firmware upgrade.
Remote Management Port: Specify a port for remote management. For example, if
you specify 8080, then you will need to specify <ip address>:<port>
192.168.1.1:8080 to connect to the web interface of the device.
Click on the Apply button to save the changes.
5.5.8 SNMP Settings
ƒ
Click on the SNMP Settings link under the Management menu. This option allows
you to assign the contact details, location, community name and trap settings for
SNMP. This is a networking management protocol used to monitor network-attached
devices. SNMP allows messages (called protocol data units) to be sent to various
parts of a network. Upon receiving these messages, SNMP-compatible devices
(called agents) return data stored in their Management Information Bases. .
53
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
ƒ
Version 1.0
SNMP Enable/Disable: Choose to enable or disable the SNMP feature.
Contact: Specify the contact details of the device.
Location: Specify the location of the device.
Read-Only Community Name: Specify the password for access the SNMP
community for read only access.
Read-Write Community Name: Specify the password for access to the SNMP
community with read/write access.
Send SNMP Trap: Specify the IP address of the computer that will receive the
SNMP traps.
Trap Community Name: Specify the password for the SNMP trap community.
Click on the Apply button to save the changes.
5.5.9 Backup/Restore settings, Reset to factory default settings
ƒ
Click on the Backup/Restore Setting link under the Management menu. This option
is used to save the current settings of the device in a file on your local disk or load
settings on to the device from a local disk. This feature is very handy for
administrators who have several devices that need to be configured with the same
settings.
ƒ
Save a copy of the current settings: Click on the Backup button to save the current
configuration.
54
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
Version 1.0
Restore saved settings from a file: Once a file has been backed up, you may
restore it by clicking on the Browse button to select the file, and then the Restore
button.
Revert to factory default settings: Click on the Factory Default Settings button to
reset the device to the default settings. Please wait while the device restart and then
access the device using the default IP address: 192.168.1.1
5.5.10 Firmware Upgrade
ƒ
Click on the Upgrade Firmware link under the Management menu. This page is
used to upgrade the firmware on the device. Make sure that downloaded the
appropriate firmware from your vendor.
ƒ
Click on the Browse button and then select the appropriate firmware and then click
on the Upgrade button.
Note: The upgrade process may take about 1 minute to complete. Do not power off
the device during this process as it may crash the device and make it unusable. The
device will restart automatically once the upgrade is complete.
5.5.11 Time Settings
ƒ
Click on the Time Settings link under the Management menu. This page allows you
to configure the time on the device. You may do this manually or by connecting to a
NTP server.
55
Long Range Wireless Access Point / Client Bridge
ƒ
ƒ
ƒ
Version 1.0
Manually Set Date and Time: Specify the date and time
Automatically Get Date and Time: Select the time zone from the drop down list and
then specify the IP address of the NTP server.
Click on the Apply button to save the changes.
5.5.12 Log
ƒ
Click on the Log link under the Management menu. The Log page displays a list of
events that are triggered on the Ethernet and Wireless interface. This log can be
referred when an unknown error occurs on the system or when a report needs to be
sent to the technical support department for debugging purposes.
ƒ
ƒ
Syslog: Choose to enable or disable the system log.
Log Server IP Address: Specify the IP address of the server that will receive the
system log.
Local Log: Choose to enable or disable the local log.
Click on the Apply button to save the changes.
ƒ
ƒ
56
Long Range Wireless Access Point / Client Bridge
Version 1.0
Appendix A – Specifications
Hardware Specification
MCU/RF
Atheros AR2316 Single chip
Memory
32MB SDRAM
Flash
8MB
Physical Interface
One 10/100 Fast Ethernet RJ-45
Reset Button
One SMA Connector
One switch (external and internal antenna switching)
LED indicators
Power/ Status
LAN (10/100Mbps)
WLAN (Wireless is up)
3 x Link Quality (Client Bridge mode)
¾
Green: Good Quality
¾
Yellow: Marginally Acceptable Quality
¾
Red: Bad Quality
Power Requirements
Active Ethernet (Power over Ethernet) Proprietary PoE design
Regulation Certifications
FCC Part 15C/15B, EN 300 328/EN 301 489-1/-17
Power Adapter 24 V/0.8A DC
RF Specification
Frequency Band
802.11b/g
2.412~2.472GHz
Modulation Technology
OFDM = BPSK, QPSK, 16-QAM, 64-QAM
DSSS = DBPSK, DQPSK, CCK
Operating Channels
802.11b/g
11 for North America, 14 for Japan, 13 for Europe
Receive Sensitivity
802.11g
802.11b
(Typical)
-92 dBm @ 6Mbps
-97 dBm @ 1Mbps
-74 dBm @ 54Mbp
-89 dBm @ 11Mbps
Available transmit power
(Average power)
FCC
Frequency
ETSI
Power
Frequency
[email protected]~24Mbps
2.412~2.462
[email protected]~24Mbps
2.412~2.472
[email protected]
GHz
[email protected]
GHz
[email protected]
IEEE802.11g
[email protected]
IEEE802.11g
[email protected]
2.412~2.462
Power
[email protected]~11Mbps
[email protected]
2.412~2.472
[email protected]~11Mbps
57
Multi-Function Gigabit Wireless-N Client Bridge
Version 1.0
GHz
GHz
IEEE802.11b
IEEE802.11b
Tolerance
±1 dBm
Internal Antenna
Embedded 10dBi Panel antenna
External Antenna
1* SMA connector
Tolerance
±1 dBm
Software Features
General
Topology
Infrastructure
Protocol / Standard
IEEE 802.3 (Ethernet)
IEEE 802.3u (Fast Ethernet)
IEEE 802.11b/g (2.4GHz WLAN)
Operation Mode
802.11 b/g
Access Point
Client Bridge
Client Router
LAN
DHCP Server
DHCP Client
VPN
VPN – pass through
Wireless
Channel Selection (Setting varies by countries)
Transmission Rate
11 b/g:54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1 in Mbps
Long distance transmission : 1km to 30km
Transmit power table
Signal Strength indication using LEDs
Security
WEP Encryption-64/128/152 bit
WPA/WPA2 Personal (WPA-PSK using TKIP or AES)
WPA/WPA2 Enterprise (WPA-EAP using TKIP)
802.1x Authenticator
Hide SSID in beacons
L2 isolation(AP mode)
Wireless STA (Client) connected list
Web-redirect
QoS
WMM
Management
Configuration
Firmware Upgrade
Web-based configuration (HTTP)
- Upgrade firmware via web-browser
- Keep latest setting when f/w update
Administrator Setting
Administrator password change
Reset Setting
- Reboot (Press 1 second)
- Reset to Factory Default (Press 5 seconds)
System monitoring
Status, Event Log
58
Multi-Function Gigabit Wireless-N Client Bridge
SNMP
V1, V2c (Phase 2)
MIB
MIB I, MIB II (RFC1213) and Private MIB
Backup & Restore
Settings through Web
Time setting
Version 1.0
NTP (Auto-setting of time)
Time setting manually
Environmental and Mechanical
Temperature Range
Operating -20°C~70°C
Storage -30°C to 80°C
Humidity (non-condensing)
0%~90% typical
Dimensions
260mm (L) x 84mm (W) x 55mm (H)
Weight
300g
59
Multi-Function Gigabit Wireless-N Client Bridge
Version 1.0
Appendix B – FCC Interference Statement
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following measures:
z
z
z
z
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment.
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment, under 47
CFR 2.1093 paragraph (d)(2).
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
60
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement