Home

WL-1502 User`s Manual v1.2

image

Contents

1. 18 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Wireless Access Control If you choose Allowed Listed only those chents whose wireless MAC addresses are im the access control list will be able to connect to your Access Pomt When Deny Listed is selected these wireless chents on the list will not be able to connect the Access Point Wireless Access Control Mode Allow Listed MAC Address Comment Current Access Control List 00202 72 61 86 01 00 00 55 66 66 30 Delete Selected Delete All Screen snapshot Wireless Access Control Item _ _ Description u Wes A Click the Disabled Allow Listed o or Deny Listed ep ger Control Mode down menu choose wireless access control mode This is a security control function only those clients registered in the access control list can link to this WLAN Access Point Te TE Ss Er meng SE CSR Access Point access capability Comment ni in the mar tae forthe amd client Apply C Changes Click the Apply Changes button to register the client to new configuration setting Cem Ee Eer Zu mer BEE BT SS previous configuration setting Current Access Control It shows the registered clients that a are e allowed to link to l List this WLAN Access Point Delete Si Selected Click to delete the selected clients that will bea access o right removed from this WLAN Access Point re ir es er teen eg Ce ren allowed list Reset Click the Reset button to a
2. 30 tr EE E e KEE 31 406 MEAT ES 31 4 7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES INTERFERENCE ccccceseceeeseeeeeeeeeees 32 4 8 WHAT ARE THE OPEN SYSTEM AND SHARED KEY AUTHENTICATIONS ccccccccccercererreeee 32 LI E CA E oe Fee eR S ee een 32 4 10 WHAT IS FRAGMENT IuRpSnOoLD 32 4 11 WHATIS RTS REQUEST TO SEND THRESHOLD ooccooccnnccnnoccnnccnnocnnoccnnccnnaconaronnnconarcnnncnns 33 4 12 WHATIS BEACON INTERVAL nad ie a E NRA 33 AS WHATS PREAMBLE TYPE ses ee EE 34 4 14 WHATIS EE EE 34 4 15 WHATIS WI FI PROTECTED ACCESS WPA rue 34 4 16 WHAEIS WPA airada daa 35 4 1 7 WHATIS802 1X AUTHENTICATION os 35 4 18 WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL TKIP us0000ssseeeeeseeeneenn 35 4 19 WHAT IS ADVANCED ENCRYPTION STANDARD ARA 35 4 20 WHAT IS INTER ACCESS POINT PROTOCOL APP 35 4 21 WHAT IS WIRELESS DISTRIBUTION SYSTEM WDS JP oooccnnccnncccnoccnoccnnoccnncconocanarcnnacanaccnnncnns 36 422 WHATS CLONE MAC ADDRESS use ee a 36 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Revision History DATE Ris or USER S MANUAL FIRMWARE 2006 5 19 First release Version 1 0 al 40 PP ggAPP P gg QgAQgAgeAP_ uu O OO AP NEE USER S MANUAL OF WLAN ACCESS POINT Terminology CCK CSMA CA CSMA CD 2 q EEE Version 1 0 Advanced Encryption Standard Complementary Code Keying Carrier Sense Multiple Access Collision Detection Dynamic Host Configuration
3. POINT sure Pre Shared Key Format Version 1 0 set Enable TKIP or AES Depends on which encryption you set While Encryption is selected to be WPA 00 Select the Pre shared key format from the pull down menu The format can be Passphrase or Hex 64 _Characters WPA Personal Pre Shared Key only a 7 Fill in the key value WPA Personal Pre Shared Key only A Pre Authentication ES RADIUS Server a Ce Mixed only Enterprise only Set the IP address port and login password information of authentication RADIUS sever Click the Apply Changes button to complete the new configuration setting I WEP Key Setup Click the Reset button to abort change and recover the previous configuration setting Wireless WEP Key Setup This page allows you setup the WEP key value Yon could choose use 4 bit or 1 26 bit as the encryption key and select ASCI or Hex as the format of input value Key Length Key Format Default Tx Key Encryption Rey 1 Femme be Femme be gedeckt Screen snapshot WEP Key Setup Item Description 17 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Key Length Select the WEP shared secret key length from pull down menu The length can be chose between 64 bit and 128 bit known as WEP2 keys The WEP key is composed of initialization vector 24 bits and secret key 40 bit or 104 bit jana ae rue ee ee Pen Se menu The format c
4. Some wireless devices don t work properly if SSID isn t broadcast for example the D link DWL 120 USB 802 11b adapter Generally if your client hardware supports operation with SSID disabled it s not a bad idea to run that way to enhance network security However it s no replacement for WEP MAC filtering or other protections 4 15 What is Wi Fi Protected Access WPA Wi Fi s original security mechanism Wired Equivalent Privacy WEP has been viewed as insufficient for securing confidential business communications A longer term solution the IEEE 802 111 standard is under development However since the IEEE 802 111 standard is not expected to be published until the end of 2003 several members of the WI Fi Alliance teamed up with members of the IEEE 802 111 task group to develop a significant near term enhancement to Wi Fi security Together this team developed Wi Fi Protected Access To upgrade a WLAN network to support WPA Access Points will require a WPA software upgrade Clients will require a software upgrade for the network interface card and possibly a software update for the operating system For enterprise networks an 34 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 authentication server typically one that supports RADIUS and the selected EAP authentication protocol will be added to the network 4 16 What is WPA2 It is the second generation of WPA WPA2 is based on the final IEEE 802 111 amendment to the
5. this value too low will limit performance 4 12 What is Beacon Interval In addition to data frames that carry information from higher layers 802 11 includes management and control frames that support data transfer The beacon frame which is a type of management frame provides the heartbeat of a wireless LAN enabling 33 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 stations to establish and maintain communications in an orderly fashion Beacon Interval represents the amount of time between beacon transmissions Before a station enters power save mode the station needs the beacon interval to know when to wake up to receive the beacon and learn whether there are buffered frames at the access point 4 13 What is Preamble Type There are two preamble types defined in IEEE 802 11 specification A long preamble basically gives the decoder more time to process the preamble All 802 11 devices support a long preamble The short preamble is designed to improve efficiency for example for VoIP systems The difference between the two is in the Synchronization field The long preamble is 128 bits and the short is 56 bits 4 14 What is SSID Broadcast Broadcast of SSID s done n access points by the beacon This announces your access point including var ous bits of information about t to the wireless world around it By disabling that feature the SSID configured in the client must match the SSID of the access point
6. wireless end stations This configuration is called a Basic Service Set BSS An Extended Service Set ESS is a set of two or more BSSs forming a single subnetwork Since most corporate WLANS require access 30 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 to the wired LAN for services file servers printers Internet links they will operate in infrastructure mode Distribution System DE a Access Foint d Basic Service Bet Bae i Extended Service Ger Eas Example 1 wireless Infrastructure Mode Ad hoc mode also called peer to peer mode or an Independent Basic Service Set or IBSS is simply a set of 802 11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network This mode is useful for quickly and easily setting up a wireless network anywhere that a wireless infrastructure does not exist or 1s not required for services such as a hotel room convention center or airport or where access to the wired network is barred such as for consultants at a client site 2 E Independent Basic Service Set IB Example 2 wireless Ad Hoc Mode 4 5 What is BSSID A six byte address that distinguishes a particular a particular access point from others Also know as just SSID Serves as a network ID or name 4 6 What is ESSID The Extended Service Set ID ESSID is the name of the network you want to access It is used to identify d
7. 254 Subnet Mask 255 255 255 0 Screen snapshot LAN Interface Setup 10 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 II Wireless Bas c Settings This page 1s used to configure basic wireless parameters like Band Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client 2 Wireless Basic Settings This page is used to configure the parameters for wireless LAN chents which may connect to your Access Point pant Mae Network Type ssm Channel Number 11 D Enable Mac Clone Single Ethernet Client Screen snapshot Wireless Basic Settings 11 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 III Wireless Security Setup This page 1s used to configure wireless security 3 Wireless Security Setup This page allows you setup the wireless security Turn on WEP or WPA by using Encryption Keys could prevent any unauthorized access to your wireless network Encryption Screen snapshot Wireless Security Setup 3 3 3 Wireless Basic Settings This page is used to configure the parameters for wireless LAN clients that may connect to your Access Point Here you may change wireless encryption settings as well as wireless network parameters 12 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Wireless Basic Settings This page is used to configure the parameters for wireless LAN chents which may connect to your Access Point Here you may change wireless encr
8. 802 11 standard 4 17 What is 802 1x Authentication 802 1x 1s a framework for authenticated MAC level access control defines Extensible Authentication Protocol EAP over LANs WAPOL The standard encapsulates and leverages much of EAP which was defined for dial up authentication with Point to Point Protocol in RFC 2284 Beyond encapsulating EAP packets the 802 1x standard also defines EAPOL messages that convey the shared key information critical for wireless security 4 18 What is Temporal Key Integrity Protocol TKIP The Temporal Key Integrity Protocol pronounced tee kip is part of the IEEE 802 111 encryption standard for wireless LANs TKIP is the next generation of WEP the Wired Equivalency Protocol which is used to secure 802 11 wireless LANs TKIP provides per packet key mixing a message integrity check and a re keying mechanism thus fixing the flaws of WEP 4 19 What is Advanced Encryption Standard AES Security issues are a major concern for wireless LANs AES is the U S government s next generation cryptography algorithm which will replace DES and 3DES 4 20 What is Inter Access Point Protocol IAPP The IEEE 802 11f Inter Access Point Protocol LAPP supports Access Point Vendor interoperability enabling roaming of 802 11 Stations within IP subnet APP defines messages and data to be exchanged between Access Points and between the APP and high layer management entities to support roaming The IAPP protoc
9. A WPA2 encryption decryption function to protect the wireless data transmission Supports IEEE 802 1x Authentication Support Wi Fi Protected Access Authentication with Radius and Pre Shared Key mode Supports Inter Access Point Protocol LAPP Supports Wireless Distribution System WDS Supports IEEE 802 3x full duplex flow control on 10 100M Ethernet interface Supports DHCP server to provide clients auto IP addresses assignment Supports DHCP client auto IP address assignment from ISP Supports clone MAC address function Supports WEB based management and configuration Supports Log table and remote Log service Support Setup Wizard mode USER S MANUAL OF WLAN ACCESS POINT Version 1 0 1 4 Upper Panel Description Power LE fay WLAN LED gt ke LAN LED J LED Indicator State Description 1 Power LED On The WLAN Access Point is powered on SE CEET EC 2 WLANLED Flashing Data is transmitting or receiving on the antenna Se 5 o antenna errr en ACT Flashing Data is transmitting or receiving on the LAN interface A re SEENEN E S lA USER S MANUAL OF WLAN ACCESS POINT Version 1 0 1 5 Rear Panel Description Antenna ower LAN Reset Figure 2 WLAN Access Point Rear Panel Interfaces Description 1 Antenna The Wireless LAN Antenna Fixed SMA 2 Power The power jack allows an external DC 7 5 V power supply connection The external AC to DC adaptor
10. AN ACCESS POINT Version 1 0 LAN Interface Setup This page is used to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IF addresss subnet mask DHCP etc P Are Set Default Gateway DNS Server ar 802 1d Spanning Tree Clone MAC Address Screen snapshot LAN Interface Setup Item Description y ate 7 rs a 2 Fr nn seg ay Am Access Point rae S Se Ke S SC emm er CSS CS Access Point Default Gateway PU in the default gateway for LAN interfaces out going data packets nn ae E Gees CSC Ee ann gt E Bu operation mode of wireless Access Point DHCP Client Range Fill i in the start IP address and end IP address to allocate a range of IP addresses client with DHCP function set will be assigned an IP address from the range rn on Fon re Ces SES Bes eem shows the active clients with their assigned IP address MAC address and time expired information Server mode only PS setup Se RER Se a _ 24 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 EE Domain Name Assign Domain Name and dispatch to DHCP clients It 1s optional field 802 1d Spanning Tree Select to enable or disable the IEEE 802 1d Spanning Tree function from pull down menu Clone MAC Address Filli in the MAC address that i 1S the MAC address to be u cloned Refer to 4 24 What is Clone MAC Address cows ise me me Pe re Im
11. Apply C Changes _ Click the Apply Changes button to sa save e above settings SE es eee mg A em Seen m i ta 3 3 11 Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet LAN networks Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet networks semi Packets Received Packets went Packers Received Packets Wireless LAN Ethernet LAN Screen snapshot Statistics fen ___Description _ A Vest LAN K shows the statistic count ers sent ena on ade Se Sent Packets LAN interface Wireless LAN H shows the statistic count of received packets o on n the o Received Packets wireless LAN interface Ethernet L LAN tt shows the statistic count of sent packets o on n the oo Sent Packets Ethernet LAN interface Ethernet L LAN O E shows the statistic count of of received packets o on n the o Received Packets Ethernet LAN interface Refresh Click the en the statiste BEE on bed screen 26 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 3 3 12 Upgrade Firmware This page allows you upgrade the Access Point firmware to new version Please note do not power off the device during the upload because 1t may crash the system Upgrade Firmware This page allows you upgrade the Access Point firmware to new version Please note do not power off the device during the upload because it may c
12. Click OK to completes the IP parameters setting For OS of Microsoft Windows NT 1 Click the Start button and select Settings then click Control Panel The Control Panel window will appear 2 Move mouse and double click the right button on Network icon The Network window will appear Click Protocol tab from the Network window 3 Check the installed list of Network Protocol window If TCP IP is not installed click the Add button to install 1t otherwise go to step 6 Select Protocol in the Network Component Type dialog box and click Add button 5 Select TCP IP in Microsoft of Select Network Protocol dialog box then click OK button to install the TCP IP protocol it may need the Microsoft Windows CD to complete the installation Close and go back to Network dialog box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example v IP Address 192 168 1 1 any IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point v IP Subnet Mask 255 255 255 0 8 Click OK to complete the IP parameters setting USER S MANUAL OF WLAN ACCESS POINT Version 1 0 3 2 Connect to the WLAN Access Point Open a WEB browser 1 e Microsoft Internet Explore then enter 192 168 1 254 on the URL to connect the WLAN Access Point 3 3 Management and configuration on the WLAN Access Point 3 3 1 S
13. Protocol Direct Sequence Spread Spectrum Extensible Authentication Protocol Federal Communications Commission Institute of Electrical and Electronic Engineers Internet Protocol Industrial Scientific and Medical Local Area Network Media Access Control Radio Frequency Signal to Noise Ratio Service Set Identification Transmission Control Protocol Trivial File Transfer Protocol Temporal Key Integrity Protocol Wired Equivalent Privacy Wireless Local Area Network Wi Fi Protected Access USER S MANUAL OF WLAN ACCESS POINT Version 1 0 1 Introduction The Wireless LAN Access Point is an affordable IEEE 802 11b g wireless LAN Access Point solution setting SOHO and enterprise standard for high performance secure manageable and reliable WLAN This document describes the steps required for the initial IP address assign and other WLAN router configuration The description includes the implementation of the above steps 1 1 Package contents The package of the WLAN Access Point includes the following items v The WLAN Access Point v The AC to DC power adapter v The Documentation CD 1 2 Product Specifications Dimension 118x75x25mm USER S MANUAL OF WLAN ACCESS POINT Version 1 0 1 3 Product Features gt gt gt Y Y VV VV VV VV WV Complies with IEEE 802 11b g standard for 2 4GHz Wireless LAN Supports AP Client WDS AP WDS modes on wireless interfaces Supports 64 bit and 128 bit WEP WP
14. User s Manual Version 1 0 Wireless LAN Access Point Trademarks Copyright 242005 Contents are subject to change without notice All trademarks belong to their respective proprietors Copyright Statement THIS DOCUMENT CONTAINS OF PROPRIETARY TECHNICAL INFORMATION THAT IS THE PROPERTY OF THIS COMPANY AND NO PART OF THIS DOCUMENTATION MAY BE REPRODUCED STORED IN A RETRIEVAL SYSTEM OR TRANSMITTED IN ANY FORM OR BY ANY MEANS ELECTRICAL OR MECHANICAL BY PHOTOCOPYING RECORDING OR OTHERWISE WITHOUT THE PRIOR WRITTEN CONSENT OF THIS COMPANY Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation betw
15. an be chose between plant text ASCH and hexadecimal HEX code CSC E ge eg S zm u aa Peg oz Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security eneryption function o Encryption Key2 Secret key 2 of WEP security encryption function a Encryption Key3 Secret key 3 of WEP security encryption function Encryption Key4 Secret key 4 of WEP security encryption function o a DA SS res ee ree geg S configuration setting re Chick eT WEP Key e re nn Gg e ae a rn Ce E erem 1 _ previous configuration setting ICELEREILERERRFLFUEREFLRTRRRFLRTRTEFLETRTRELELRRRFLRTRERFERTRRRELRTRRRTERRRRRTERLRRTERLRERTETTERERRRFRRERERRERELTERTERERERRRRERERRRERRLRERERRRRRERERLRERTERRRERTERERRRRERRRERRRRERRRERRERERERRLRERERLTRERRERTERRERRLERRERRLERTFRRRERTFRRLRRTERERRETFERSERRRERSERERRREERRERTIERRERFERRRERFERERERELRRRERFLTERERRLTERERELTEREERLTERRTELTRRRTERTERRTERRRRRTERRERRTERRERRTERRERRTERRERRRRRRERERRRRRRERERRRRERFERERERTERERRRRERTRRN 128 bit A IEREREERERERELREREREERERERRLEERRERLERERRELTRRERELTERFEELERRRTERRERFEELRERTEERRERRTELFERRTELRERRRLRERLELTRERLELEREERELLREETERLREREEFERLREERERERRRRERERERREREREERLERRRRRRRN 3 3 6 Wireless Access Control If you enable wireless access control only those clients whose wireless MAC addresses are in the access control list w ll be able to connect to your Access Point When this option is enabled no wireless clients will be able to connect 1f the list contains no entries
16. atistic count of sent packets o on n the wireless LAN interface Ce s Fees See GE Ke GE e Kee _ _ Wireless LAN interface er SS oe Er See Si er Kee Peer e OS BE wireless LAN interface TxR Rare Mbps ott shows the wireless link rat rate within WDS Refresh Click to refresh the statistic counters on the s screen en Close Click to close the Curent do 3 3 8 Site Survey This page 1s used to view or configure other APs near yours 22 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Wireless Site Survey This page provides tool to scan the wireless network Fany Access Point or JESS 1s found you could choose to connect H taanvally when client mode is enabled MyWLAN LH AOL 86 11 BHS AP no Dm lan LL EL ad 6 B AP no d KIT SISe VW gjedde 11 BH AP no 66 males OO EAU e 2 11 Bj AP yes 53 DO 72 00 93 fh 9 B AP ER d de te Od Za dd 1 B Ad hoc a2 LOL ORT 11 BHS AF ae OO OOO Screen snapshot Wireless Site Survey Meg SE DE 7 rs rm geg m a Gm i Se ES S SS ER e 7 gt ES r a SR T d Sta type a Ss ey T ge e SC e Cem E ges Se a S ma y m Sg GE S CS o SR CSC Be E a Connect Click the Connect button t ea Eher Ion 3 3 9 TCP IP Settings This page 1s used to configure the parameters for local area network that connects to the LAN ports of your WLAN Access Point Here you may change the setting for IP address subnet mask DHCP etc 23 USER S MANUAL OF WL
17. bort change andr recover r the 19 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 3 3 7 WDS Settings previous configuration setting Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet does To do this you must set these APs in the same channel and set MAC address of other AP that you want to communicate with in the table and then enable the WDS WDS Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet does To do this you must set these APs in the same channel and set MAC address of other APs which you want to communicate with in the table and then enable the WDS Enable WDS Add WDS AP MAC Address Comment lt Apply Changes Show Statistics Current WDS AP List 00 02 72 81 86 0a 00 02 72 81 86 0b AP 1 AP 2 Delete Selected Delete All Screen snapshot WDS Setup Item Description AET S AA Click the check box t to 5 enable is Fe a system Refer to gt 421 What is Wireless Distribution T Fill i HE n the MAC address of AP is register she class distribution system access capability Comment Fill in the comment tag for the registered AP Click the Apply Changes button to register the AP tor new configuration setting Reset Click the Reset button to abort change andr recover r the previous configuration setting Set Security Click button to config
18. ccsceccscecescececescecescscescecesescesescecescecescecesescesescess 4 2 INS AN a 5 2 1 HARDWARE INSTALLATION ccceccsceccceccscscscececcsceccececescscesesceseecscescscesescesescecescscesescesescess 5 2 2 SORIWARE INSTALLATION eures dene 5 3 SOFTWARE CONFIGURATION iia es 6 3 1 PREPARE YOUR PC TO CONFIGURE THE WLAN ACCESS POINT ceccececcececscecesceceseececs 6 3 2 CONNECT TO THE WLAN ACCESS POINT ccceccececcececcececesceccscecscscescscecescecescscesescesescess 8 3 3 MANAGEMENT AND CONFIGURATION ON THE WLAN ACCESS POINT 2ceceececececescececes 8 3 3 1 O 8 3 352 SCHIP Wizard WEE 9 li EAN Teh CS e UDe Io 10 I Wireless Basic Selin Sier o Rn 11 III Wireless Securty SEID anna ee 12 333 Wireless Basic Settings una ee ee 12 3 3 4 Wireless Advanced Setlinss da 14 339 Wireless secu SC Duena een 15 L WEP IR Gy clima 17 3 3 6 Wireless Access COMO ii 18 3 3 7 BEE 20 We Be On e EE 21 ED WDSAP Kn EE 21 3 3 8 SIE O O 22 3 3 9 EE 23 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 E E E EE 25 all A a ea ee ee ee 26 33 12 Uperado ee 27 33 13 DAVE Re 1634 EN een 2d 3 314 Password ett ia an 28 EN e GE E e EE 29 4 FREQUENTLY ASKED QUESTIONS FAQQ cccccssssscccccccccccccccsssssssssssssssssscccccccccscsees 30 4 1 WHAT AND HOW TO FIND MY PC S IP AND MAC ADDRESS oooocccnonoccnonocononnconnnnacananaconananonss 30 42 WHATIS EE EE EE 30 45 WHAT ARE RRE 30 4 4 HOW DOES WIRELESS NETWORKING WORK
19. configuration setting A qn nn See ee Een Em Ge BEE SC _ previous configuration setting 3 3 10 Log This page is used to configure the remote log server and shown the current log System Log This page can be used to set remote log server and show the system log Enable Log F system all wireless Enable Remote Log Log Server IP Address Apply Changes wireless client is associated 00 20 4B 01 wireless client is associated 00 04 23 69 wireless client is associated 00 04 23 69 expired STA is resumed 00 04 23 69 20 38 wireless client is associated 00 04 23 69 expired STA is resumed 00 04 23 69 20 38 wireless client is associated 00 04 23 69 expired STi is resumed 00 04 23 69 80 35 wireless client is associated 00 04 23 69 expired STA is resumed 00 04 23 69 20 3B wireless client is associated 00 04 23 69 expired STA is resumed 00 04 23 69 20 3B wireless client is associated 00 E0 4cC 61 STA is expired 0O0 E0 42 51 097 05 expired STi is resumed 0O0 E0 4C0 51 57 05 D A A A A A D A A A A A A Screen snapshot Log Item PDeseriptiom en 7A TP ae R gaer weg System all Show all log of wireless Access Point Wireless only Only show wireless log 25 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Enable Remote Log Click the checkbox to enable remote log service Log Server IP Address Input the remote log IP address
20. een the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator amp your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Table of Contents REVISION HISTORY a as I TERMINOLOGY ie EE II L INTRODUCCION ii ice 1 1 1 PACKSGEICONTEN Te ee een 1 1 2 PRODUCT SPECIFICATIONS een eines edi iia 1 Lo Ke Ree DER E a ee tr tica ladito 2 1 4 UPPER PANEL DESCRIPTION s isesesesusesesesesesesreresesesesreresesesrseeresesesesrereresesesesrevesesesrerereneres 3 1 5 REAR PANEL DESCRIPTION ccceccsceccsceccsce
21. ess 192 168 1 1 any IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point v IP Subnet Mask 255 255 255 0 8 Click OK and reboot your PC after completes the IP parameters setting For OS of Microsoft Windows 2000 XP 1 Click the Start button and select Settings then click Control Panel The Control 6 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Panel window will appear 2 Move mouse and double click the right button on Network and Dial up Connections icon Move mouse and double click the Local Area Connection icon The Local Area Connection window will appear Click Properties button in the Local Area Connection window 3 Check the installed list of Network Components If TCP IP is not installed click the Add button to install it otherwise go to step 6 Select Protocol in the Network Component Type dialog box and click Add button Select TCP IP in Microsoft of Select Network Protocol dialog box then click OK button to install the TCP IP protocol it may need the Microsoft Windows CD to complete the installation Close and go back to Network dialog box after the TCP IP installation Select TCP IP and click the properties button on the Network dialog box Select Specify an IP address and type in values as following example v IP Address 192 168 1 1 any IP address within 192 168 1 1 to 192 168 1 253 is good to connect the Wireless LAN Access Point v IP Subnet Mask 255 255 255 0 8
22. evel RF Output Power Turbo Mode Fr Version 1 0 Description Click to a the authentication ue in a Open y Shared Key or Auto selection Set the data packet fragmentation threshold value c can n be written between 256 and 2346 bytes Refer to 4 10 What 1 is Fragment Threshold Set the RTS Threshold value can be written benceno o 5 and 2347 bytes Refer to 4 JI What 1 is RIS Request To Send Threshold Set the Beacon Interval value can be written between 20 and 1024 ms Refer to 4 12 What i is Beacon Interval Select the transmission data rate from pull down n menu Click to select the Long Preamble or Short Preamble support on the wireless data packet transmission Refer to 4 13 What i is Preamble Type Click to enable or disable the SSID broadcast function Refer to 4 14 What 1 is SSID Broadcast Click to enable or disable the LAPP nes Se Click to enable disable turbo mode On ly app D a WLAN IC of Realtek Click the Apply Changes button io complete them new configuration setting Click the Reset button to abort change andr recover r the previous configuration setting 3 3 5 Wireless Security Setup This page allows you setup the wireless security Turn on WEP WPA WPA2 by using encryption keys could prevent any unauthorized access to your wireless network 15 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Wireless Security Setup Thi page a
23. h WLAN Rees Point BSSID is a six byte address Associated Clients Attain IP Protocol i shows total numbers of WLAN clients c conne ecte d m TCP IP Configuration It shows how the WLAN Access Point gets the IP address The IP address can be set manually to a fixed one or set dynamically by DHCP server T It shows the IP address of WAN interface of WLAN Access Point Cem It cows the IP subnet mak of LAN Bere Pr WLAN Access Point ey It shows the default gateway setting for outgoing daa packets vere 3 3 2 Setup Wizard It shows s the M MAC address of WL AN OTERO P ey ES This page guides you to configure wireless Access Point for first time USER S MANUAL OF WLAN ACCESS POINT Version 1 0 setup Wizard The setup wizard will guide you to configure access point for first time Please follow the setup wizard step by step Welcome to Setup Wizard The Wizard will guide you the through following steps Begin by clicking on Next 1 Setup LAN Interface 2 Wireless LAN Setting 4 Wireless Security Setting Screen snapshot Setup Wizard I LAN Interface Setup This page s used to configure local area network IP address and subnet mask 1 LAN Interface Setup This page is used to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP addresss subnet mask DHCP etc IP Address 192 166 1
24. ifferent wireless networks 31 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 A 4 7 What are potential factors that may causes interference Factors of interference gt Obstacles walls ceilings furniture etc gt Building Materials metal door aluminum studs gt Electrical devices microwaves monitors and electrical motors Solutions to overcome the interferences v Minimizing the number of walls and ceilings v Position the WLAN antenna for best reception v Keep WLAN devices away from other electrical devices eg microwaves monitors electric motors etc Y Add additional WLAN Access Points if necessary 4 8 What are the Open System and Shared Key authentications IEEE 802 11 supports two subtypes of network authentication services open system and shared key Under open system authentication any wireless station can request authentication The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station The receiving station then returns a frame that indicates whether it recognizes the sending station Under shared key authentication each wireless station 1s assumed to have received a secret shared key over a secure channel that is independent from the 802 11 wireless network communications channel 4 9 What is WEP An optional IEEE 802 11 function that offers frame transmission privacy similar to a wired netwo
25. llows you setup the wireless security Tum on WEP or WEA by using Encryption Keys could prevent any unauthorized access to your wireless network Encryption Tse 802 1 Authentication WEP 64 bits WEF 128bits WPA Authentication Mode Enterprise RADIUS Personal Pre Shared Key WPA Cipher Suite TEIP AES WPA Cipher Suite TEIP AES Pre Shared Key Format Enable Pre Anuthentication Authentication RADIUS Server pog 1812 IF address A Password 2 Avis When encrvpioo WES seiercto vor mist set WEF Lev valine Screen snapshot Wireless Security Setup Item Description VER ma gt u r er ne aa mag encryption method can be None WEP WPA TKIP WPA2 or WPA2 Mixed Refer to 4 9 What is WEP 4 15 What is Wi Fi Protected Access WPA 4 16 What is WPA2 AES 4 17 What is 802 1 X Authentication 4 18 What is Temporal Key Integrity Protocol TKIP 4 19 What is Advanced Encryption Standard AES Use 802 1x While Encryption i 1S selected to be WEP Authentication Click the check box to enable IEEE 802 1x authentication function Refer to 4 16 What 1 18 802 1x Authentication WPA Authentication While Encryption i is selected to be WPA Oo Mode Click to select the WPA Authentication Mode with Enterprise RADIUS or Personal Pre Shared Key Refer to 4 15 What 1 is Wi Fi Protected Access WPA WPA Cipher Suite Enable TKIP or AES Depends on which encryption you 16 USER S MANUAL OF WLAN ACCESS
26. ol uses TCP for inter Access Point communication and UDP for RADIUS request response exchanges It also uses Layer 2 frames to update the forwarding tables of Layer 2 devices 35 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 4 21 What is Wireless Distribution System WDS The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless channel like the wireless bridge or repeater service 4 22 What is Clone MAC Address Clone MAC address is designed for your special application that request the clients to register to a server machine with one identified MAC address Since that all the clients will communicate outside world through the WLAN Access Point so have the cloned MAC address set on the WLAN Access Point will solve the issue 36
27. provide adaptive power requirement to the WLAN Access Point 3 LAN The RJ 45 sockets allow LAN connection through Category 5 cables Support auto sensing on 10 100M speed and half full duplex comply with IEEE 802 3 802 3u respectively 4 Reset Push continually the reset button 5 10 seconds to reset the configuration parameters to factory defaults USER S MANUAL OF WLAN ACCESS POINT Version 1 0 2 Installation 2 1 Hardware Installation Step 1 Place the Wireless LAN Access Point to the best optimum transmission location The best transmission location for your WLAN Access Point is usually at the geographic center of your wireless network with line of sign to all of your mobile stations Step 2 Connect the WLAN Access Point to your wired network Connect the Ethernet LAN interface of WLAN Access Point by category 5 Ethernet cable to your switch hub xDSL modem or cable modem A straight through Ethernet cable with appropriate cable length is needed Step 3 Supply DC power to the WLAN Access Point Use only the AC DC power adapter supplied with the WLAN Access Point it may occur damage by using a different type of power adapter The hardware installation finished 2 2 Software Installation gt There are no software drivers patches or utilities installation needed but only the configuration setting Please refer to chapter 3 for software configuration USER S MANUAL OF WLAN ACCESS POINT Version 1 0 3 Soft
28. rash the system Screen snapshot Management Upgrade Firmware jem nn aa AAA AAA firmware image file a firmware image to the WLAN Access Point Cem KEE EE previous configuration setting 3 3 13 Save Reload Settings This page allows you save current settings to a file or reload the settings from the file that was saved previously Besides you could reset the current configuration to factory default Save Reload Settings This page allows you save current settings to a file or reload the settings from the file which was saved previously Besides you could reset the current configuration to factory default Save Settings to File Load Sering from File rns Upload Reset Settings to Default Screen snapshot Management Save Reload Settings 21 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Item _ Description Save St to o File Click the Sa Ent to load Te e o parameters to your personal computer Load Si Settings from 1 File Click the Browse button to select the configuration fi files i then click the Upload button to update the selected configuration to the WLAN Access Point Reset Settings to Click the Reset button to reset the confi guration Be Default parameter to factory defaults 3 3 14 Password Setup This page 1s used to set the account to access the web server of Access Point Empty user name and password will disable the protection Password Setup This page is used to se
29. ress is a 32 bit numeric address written as four numbers separated by periods Each number can be zero to 255 For example 191 168 1 254 could be an IP address The MAC Media Access Control address is your computer s unique hardware number On an Ethernet LAN it s the same as your Ethernet address When you re connected to the Internet from your computer or host as the Internet protocol thinks of it a correspondence table relates your IP address to your computer s physical MAC address on the LAN To find your PC s IP and MAC address v Open the Command program in the Microsoft Windows v Type in ipconfig all then press the Enter button gt Your PC s IP address is the one entitled IP Address and your PC s MAC address is the one entitled Physical Address 4 2 What is Wireless LAN A wireless LAN WLAN is a network that allows access to Internet without the need for any wired connections to the user s machine 4 3 What are ISM bands ISM stands for Industrial Scientific and Medical radio frequency bands that the Federal Communications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz 4 4 How does wireless networking work The 802 11 standard define two modes infrastructure mode and ad hoc mode In infrastructure mode the wireless network consists of at least one access point connected to the wired network infrastructure and a set of
30. rger than the size programmed in this field will be fragmented If you find that your corrupted packets or asymmetric packet reception all send packets for example You may want to try lowering your fragmentation threshold This will cause packets to be broken into smaller fragments These small fragments if corrupted can be resent faster than a larger fragment Fragmentation increases overhead so you ll want to keep this value as close to the maximum value as possible 4 11 What is RTS Request To Send Threshold The RTS threshold is the packet size at which packet transmission is governed by the RTS CTS transaction The IEEE 802 11 1997 standard allows for short packets to be transmitted without RTS CTS transactions Each station can have a different RTS threshold RTS CTS is used when the data packet size exceeds the defined RTS threshold With the CSMA CA transmission mechanism the transmitting station sends out an RTS packet to the receiving station and waits for the receiving station to send back a CTS Clear to Send packet before sending the actual packet data This setting is useful for networks with many clients With many clients and a high network load there will be many more collisions By lowering the RTS threshold there may be fewer collisions and performance should improve Basically with a faster RTS threshold the system can recover from problems faster RTS packets consume valuable bandwidth however so setting
31. rk The Wired Equivalent Privacy generates secret shared encryption keys that both source and destination stations can use to alert frame bits to avoid disclosure to eavesdroppers WEP relies on a secret key that is shared between a mobile station e g a laptop with a wireless Ethernet card and an access point 1 e a base station The secret key is used to encrypt packets before they are transmitted and an integrity check 1s used to ensure that packets are not modified in transit 4 10 What is Fragment Threshold The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802 11 to achieve parallel transmissions A large data frame is fragmented into several 32 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes The determination of an efficient fragment threshold is an important issue in this scheme If the fragment threshold is small the overlap part of the master and parallel transmissions is large This means the spatial reuse ratio of parallel transmissions is high In contrast with a large fragment threshold the overlap is small and the spatial reuse ratio is low However high fragment threshold leads to low fragment overhead Hence there is a trade off between spatial re use and fragment overhead Fragment threshold is the maximum packet size used for fragmentation Packets la
32. t the account to access the web server of Access Point Empty user name and password will disable the protection User Name New Password Apply Changes Screen snapshot Management Password Setup lem bene _ mes TA nn en pen eng EA New P Password o Fill i in the password for web management login control Confirmed P Password Because tl the password input 1s invisible so please fill i in l the password again for confirmation purpose a Sa Fr en ne Ces par u means to apply no web management login control Click the Apply Changes button to complete the new configuration setting Pr ae E a a See Cep Ka men BS previous configuration setting 28 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 3 3 15 Logout This page is used to logout web management page This item will be activated next time you login after you define user account and password Logout This page 15 used to logont Do you want to logout Screen snapshot Logout Change setting successfully Screen snapshot Logout OK Item Description A O Chama tena tama Oe eee 29 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 4 Frequently Asked Questions FAQ 4 1 What and how to find my PC s IP and MAC address IP address is the identifier for a computer or device on a TCP IP network Networks using the TCP IP protocol route messages based on the IP address of the destination The format of an IP add
33. tatus This page shows the current status and some basic settings of the device includes system wireless and Ethernet LAN configuration information Access Point Status This page shows the current status and some basic settings of the device Sys TEM Uptime Firmware Version Wireless Configuration Associated Clients Odav 2h 10m 348 al 40 AP 2 4GHz EHS Mi VLAN 11 Disabled DO Dese da bf E TCP IP Configuration Attain IF Protocol IP Address subnet Mask Default Gateway MAC Address Screen snapshot Status Item System Uptime Fixed IP 192 168 1 244 255 255 2550 192 168 1 254 DO Dese id ieahbt Description It shows the duration since WLAN Access Point 1s powered on Firmware version It shows the firmware version of WLAN Access Point USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Wireless configuration Mode Band SE SSID It shows wireless operation mode It shows the current wireless operating frequency It shows the SSID of this WLAN Access Point The SSID is the unique name of WLAN Access Point and shared among its service area so all devices attempts to join the same wireless network can identify it Channel N CS Encryption Associated Clients It shows the wireless channel connected currently It shows the status of encryption function It shows the number of connected clients or stations ES It hows the BSSID addes of t
34. to complete the new configuration setting a ae previous configuration setting 3 3 4 Wireless Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN These settings should not be changed unless you know what effect the changes will have on your WLAN Access Point Wireless Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN These settings should not be changed unless you know what effect the changes will have on your Access Point Authentication Type O Open System O Shared Key Auto Fragment Threshold 56 2346 RTS Threshold 2347 0 2387 Beacon interval 20 1024 ms Data Rate Preamble Type Long Preamble Short Preamble Broadcast SSID 2 Enabled Disabled TAPP Enabled Disabled 802 112 Protection Enabled Disabled RF Output Power 2 100 O3 Ox O10 O Turbo Mode Auto O Always or Note Always may have compatibility issue Auto will only work with Realtek product Screen snapshot Wireless Advanced Settings 14 USER S MANUAL OF WLAN ACCESS POINT Item on ee ETA ey O Data Rate Data rate can be auto select 11M 5 SM 2M or 1Mbps Preamble Type ae EE Refer to 4 20 What 1 18 Inter Access Point Protocol I APP Protect 802 11b user 802 11 E Protection To adjust transmission power l
35. ure wireless security like 20 USER S MANUAL OF WLAN ACCESS POINT Show Statistics It shows the TX RX packets rate statistics Delete Selected Version 1 0 WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None cities added from the wireless distribution system co distribution system allowed list Click the Reset button to abort change and recover the previous configuration setting I WDS Security Setup Requirement Set Wireless gt Bas c Settings gt Mode gt AP WDS This page 1s used to configure the wireless security between APs Refer to 3 3 6 Wireless Security Setup WDS Security Setup This page allows you setup the wireless secunty for WDS When enabled you must make sure each WDS device has adopted the same encryption algorithm and Key Encryption WEP Key Format WEP Key Pre Shared Key Format Pre Shared Key __ApplyChanges _ None ka m Screen snapshot WDS Security Setup II WDS AP Table This page s used to show WDS statistics 21 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 WDS AP Table This table shows the MAC address transmission recerption packet counters and state information for each configured WDS AP MAC Address Tx Packets 00 02 72 81 26 0a D 00 02 72 81 86 0b ER Screen snapshot WDS AP Table fer _ Description _ MACA Address o It shows the MAC Address within WDS Tx P Packets a It shows the St
36. ware configuration There are web based management and configuration functions allowing you to have the jobs done easily The WLAN Access Point is delivered with the following factory default parameters on the Ethernet LAN interfaces Default IP Address 192 168 1 254 Default IP subnet mask 255 255 255 0 WEB login User Name lt empty gt WEB login Password lt empty gt 3 pd Prepare your PC to configure the WLAN Access Point For OS of Microsoft Windows 95 98 Me 1 Click the Start button and select Settings then click Control Panel The Control Panel window will appear Note Windows Me users may not see the Network control panel If so select View all Control Panel options on the left side of the window 2 Move mouse and double click the right button on Network icon The Network window will appear 3 Check the installed list of Network Components If TCP IP is not installed click the Add button to install 1t otherwise go to step 6 Select Protocol in the Network Component Type dialog box and click Add button 5 Select TCP IP in Microsoft of Select Network Protocol dialog box then click OK button to install the TCP IP protocol 1t may need the Microsoft Windows CD to complete the installation Close and go back to Network dialog box after the TCP IP installation Select TCP IP and click the properties button on the Network dialog box Select Specify an IP address and type in values as following example v IP Addr
37. yption settings as well as wireless network parameters C Disable Wireless LAN Interface Band 2 4GHz B G ze Mode A Network Type SSID MyAVLAN Channel Number Associated Clients Show Active Clients Enable Mac Clone Single Ethernet Client Enable Universal Repeater Mode Acting as AP and client simultaneouly SSID of Extended Interface Apply Changes Screen snapshot Wireless Basic Settings Jaen O Disable Wireless LAN Click on to disable the wireless LAN data transmission _ Interface CN TEE Me ee ee A wireless mode Guten Shale EES eg network If any Access Point or IBSS is found you could choose to connect it manually when client mode is enabled Refer to 3 3 9 Site Survey SS TIE RR TEE et bytes long Channel Number Select the wireless communication channel from pull down menu Associated Clients Click the Show Active Clients button to open Active Wireless Client Table that shows the MAC address transmit packet receive packet and transmission rate for 13 USER S MANUAL OF WLAN ACCESS POINT Version 1 0 Se ee AG EA each associated wireless client Enable Mac Clone Take Laptop NIC MAC address as wireless client MAC Single Ethernet Client address Client Mode only Enable Universal Click to enable Universal Repeater Mode Repeater Mode SSID of Extended Assign SSID when enables Universal Repeater Mode Interface Apply Changes Click the Apply Changes button

Download Pdf Manuals

image

Related Search

Related Contents

NMRevue 05 2006  履歴書 - Pacific Translations  Rockbox user manual  HP HEWLETT-PACKARD User's Manual  GA 15 combo de guitarra manual de instrucciones  平成24 年度 春期 ーT バスポー ト試験 公開問題  2. Symbols………………………………  Becker Designed AR 4201 - ( O) (GK 415) User's Manual  Deliverable 5.1 Addendum III User Evaluation questionnaire  Voyager Focus UC  

Copyright © All rights reserved.
Failed to retrieve file