Home
WLAN-LCCPE516-1 User Manual - L
Contents
1. Basic Settings Time Settings You can synchronize System Log s time stamp with a public time server over the Internet TCP IP Settings LG A Current Time Yr 2011 Mon 8 Day 118 Hr 10 Mn 5 Sec 58 RADIUS Settings Time Zone Select GMT Greenwich Mean Time Dublin Edinburgh Lisbon London e Enable NTP client update Er Nee 192 5 41 41 North America v 2 Manual IP 0 0 0 0 Figure 14 Time Settings e Current Time Display the present time in Yr Mon Day Hr Min and Sec e Time Zone Select Select the time zone from the dropdown list e NTP Server Select the time server from the NTP Server dropdown list or manually input the IP address of available time server into Manual IP Hit Apply to save settings RADIUS Settings RADIUS Remote Authentication Dial In User Service is a server for remote user authentication and accounting playing a central role in the network in providing the capabilities of authenticating authorizing accounting auditing alarming and etc It allows an organization to maintain user profiles in a central database that all remote servers can share Open RADIUS Settings in System to make RADIUS configuration Chapter 3 Basic Settings Page 19 L Cet Global Connectivi www L com com Status y Logout System Wireless Management Tools Basic Settings RADIUS Settings Use this page to set the radius server settings TCP IP Settings U
2. Disabled Link Integration Enabled o Disabled TDM Coordination O Enabled Disabled Space In Meter 0 15000 m Enable Traffic Shaping Figure 27 Advanced Wireless Settings e A MPDU A MSDU Aggregation The data rate of your CPE except wireless client mode could be enhanced greatly with this option enabled however if your wireless clients don t support A MPDU A MSDU aggregation it is not recommended to enable it e Short Gl Under 802 11n mode enable it to obtain better data rate if there is no negative compatibility issue e RTS Threshold The IEEE 802 11a n Wireless Outdoor CPE sends RTS Request to Send frames to certain receiving station and negotiates the sending of a data frame After receiving an RTS that STA responds with a CTS Clear to Send frame to acknowledge the right to start transmission The setting range is 0 to 2346 in byte Setting it too low may result in poor network performance Chapter 4 Advanced Settings Page 32 Leave it at its default of 2346 is recommended e Fragmentation Length Specify the maximum size in byte for a packet before data is fragmented into multiple packets Setting it too low may result in poor network performance Leave it at its default of 2346 is recommended e Beacon Interval Specify the frequency interval to broadcast packets Enter a value between 20 and 1024 e DTIM Interval DTIM which stands for Delivery Traffic Indication Message is contained in the data packets It
3. Equivalent Character Equivalent 2 39 22 3A 23 3 24 3 25 3 26 3 27 3 2 4 2 4 2 42 2 43 2 4 2 45 2 46 2 47 3 48 3 4 32 4 33 K 4 34 4 35 4 36 4 3 4 s Jr de IIe ololelolo alata afafalfafalalalfelafeld oltieipat 7 ololjfofalsjelr TAAl Af alAalalAlalN Nl N NTolo D D mIo olsteietaieto vdin o T m gt oO N o aa a Tl jo jp a E 5 74 I Be Ber a b ie i e ee a E 0 Appendix A ASCII Page 60 Appendix B SSH Settings Table 3 SSH Settings get set del Keyword Descriptions Vv v time time setting y NOW current system time Vv v zone time zone Vo iv NTPUpdate NTP Update NIN servertype server type Y y IP IP V v Manual IP Manual IP V v system system setting y swversion system firmware version Y iv systemmac system MAC address Vv v devname system name Vv v country country region y ethernet1 DataRate ether port 1 data rate V v ethernet2DataRate ether port 2 data rate Vv v macclone mac clone enable d v clonedmac cloned mac address Ja poepower secondary RJ45 power Vv v stp Spanning Tree NIN stpForwardDelay STP forward delay Y iv gpslatitude gps latitude Ne gpslongitude gps longitude yV w ipset network mode select V v networkmode bridge or router V v bridge bridge mode ip settings i fixed d
4. Select SSID Frequency Chann l MAC Address Mode Strengt Securit a Wireless 5745MHz 149 00 19 70 00 fo c5 80211AN 23 NONE Selected Scan Figure 23 Site Survey VAP Profile Settings Available in AP mode the IEEE 802 11a n Wireless Outdoor CPE allows up to 16 virtual SSIDs on a single BSSID and to configure different profile settings such as security and VLAN ID to each SSID To create a virtual AP you may check the Enable box of the profile and click on the profile eg Profile 2 to configure wireless and security settings Hit Apply to active the profile Chapter 3 Basic Settings Page 28 SFN y Global L C a Connectivit www L com com System y Basic Settings Advanced Settings Profile Name Access Control Profile1 WDS Settings Profile2 Profile3 Profile4 Profile5 Profile6 Profile7 Profiles Profiled Profile10 Profile11 Profile12 Wireless Management VAP Profile Settings define each WLAN s attribute SSID Security Wireless Open System Wireless Open System Wireless Open System Wireless Open System Wireless Open System Wireless Open System Wireless Open System Wireless Open System Logout Tools Enable Always Enabled Wireless Open System Wireless Open System Wireless Open System Wireless Open System Figure 24 VAP Profile Settings CE eee L CS Connectivit u www L com com Statu
5. Figure 52 DHCP Client Taole nt erven AA endet A ati heated 56 Figure 53 Network ActivitieS A 57 Figure 54 MAG Address tl A AEE P AEE 58 Table 1 Factory Default Settings ooooncccnnnnninncnnnccnnnccnnncrnancccnnrcn nn 12 Table 2ACS Nuit art aaa 60 Table 3 Public Software Name and Description 70 Table 4 FCC Countries 74 Table CE Counties in cutee ante edere edn ELBE 74 Table 6 Other Countres e 75 Chapter 1 Introduction Introduction Designed for outdoor environment application the IEEE 802 11a n Wireless Outdoor CPE is a high performance 802 11 a n 2x2 MIMO broadband solution that provides fast and reliable wireless network coverage Designed with IEEE 802 11n draft 2 0 standard high output power and built in 16dBi dual polarity antenna makes it possible to deliver several times faster data rate than normal wireless device and higher bandwidth with longer range for outdoor applications The IEEE 802 11a n Wireless Outdoor CPE supports four wireless communication connectivity AP Wireless Client Bridge and AP Repeater allowing for various application requirements thus helping to find the key to the last mile with least effort With high output power and reliable performance the IEEE 802 11a n Wireless Outdoor CPE is an ideal wireless broadband solution for wireless Internet service providers and system integrators Appearance WIRELESS CPE Figure 1 IEEE 802 11a n Wireless Outdoor CPE Chapter 1 Introduct
6. Secure You may also choose Customized to enable any methods as desired L cam Global Connectivi www L com com Status y Logout System Wireless Management Tools Remote Settings Remote Settings CoovaChilli Settings Use this page to switch services of remote console Firmware Upload Management Privacy Mode Configuration File Normal Secure 5 Customized Password Settings Telnet SNMP FTP SSH Force HTTPS WISE Certificate Settings Figure 31 Remote Management SNMP Management The IEEE 802 11a n Wireless Outdoor CPE supports SNMP for convenient remote management Open Remote Settings in Management shown below Set the SNMP parameters and obtain MIB file before remote management Chapter 5 Management Page 40 L Cem Global Connectivi www L com com Status System Wireless Management Tools y Logout Remote Settings Use this page to switch services of remote console Remote Settings CoovaChilli Settings Management Privacy Mode Firmware Upload Normal Secure Customized Configuration File Telnet SNMP FTP Password Settings SSH Force HTTPS WISE Certificate Settings SNMP Settings V2 v 161 public private 0 0 0 0 public Protocol Version Server Port Get Community Set Community Trap Destination Trap Community Configure SNMPv3 Us
7. Ss i Connectivi www L com com Status System Wireless Management y Basic Settings Destination Port Filtering TCP IP Settings Entries in this table are used to restrict certain ports of data packets from your local network to o z Internet through the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings nek RADIUS Settings Enable Destination Port Filtering Port Range Firewall Settings Protocol Both v Src IP Filtering Comment Dst IP Filtering Src Port Filtering Dest Port Range Protocok Comment Select Port Forwarding BE Delete Selected Delete All DMZ Setting Figure 19 Destination Port Filtering Port Forwarding The port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall These settings ne are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind the router s NAT firewall Chapter 3 Basic Settings Page 23 L Cem Global Connectivi www L com com Status System Wireless Management y Logout Basic Settings Port Forwarding TCP IP Settings Zn Entries in this table allow you to automatically redirect common network services to a specific machine e A behind the NAT firewall These settings are only necessary if you wish to host some sort of server like Time Settings a web server or mail server on the
8. destination ip filter rule lists srcportfilter source port filter settings enable source port filter enable e IAA addrule add a source port filter rule delerule delete source port filter rule rulelist show source port filter rule lists y destportfilter destination port filter settings y enable destination port filter 0 Appendix B SSH Settings Page 65 enable add a destination port filter Vv v addrule rule delete destination port y delerule filter rule show destination port filter Ni rulelist rule lists NIN portforward port forward settings Vo iv enable port forward enable Vv v addrule add a port forward rule y delerule delete port forward rule l show port forward rule y rulelist lists Vv v dmzenable dmz enable Vv v dmzipaddr dmz ip address d tE ea management setting NIA privacy radius IP address V Jx telnet enable telnet V Jx snmp enable snmp NIN ftp enable ftp V v ssh enable ssh Vv v forcehttps force https Vv v wise enable wise tools Vv v snmp SNMP setting Vv v version Protocol Version Vo iv port Server Port NIN getCommunity SNMP Read Community d setCommunity SNMP Write Community V IN trapdesti
9. generating a configuration file or retrieve the settings you have backed up previously in Configuration File from Management Q 4 What if I cannot access the Web based management interface Please check the followings e Check whether the power supply is OK Try to power on the unit again e Check whether the IP address of PC is correct in the same network segment as the unit e Login the unit via other browsers such as Firefox e Hardware reset the unit Chapter 8 Troubleshooting Page 58 Q 5 In wireless client mode what if the wireless connection is not stable after associating with an AP e Since the CPE comes with a built in directional antenna it is recommended make it face to the direction where the AP is to get the best connection quality e In addition you can start Site Survey in Wireless Basic Settings to check the signal strength If it is weak or unstable The smaller the number is the weaker the signal strength is please join other available AP for better connection Chapter 8 Troubleshooting Page 59 Appendix A ASCII WEP can be configured with a 64 bit 128 bit or 152 bit Shared Key hexadecimal number or ACSII As defined hexadecimal number is represented by 0 9 A F or a f ACSII is represented by 0 9 A F a f or punctuation Each one consists of two digit hexadecimal Table 2 ACSII ASCII Hex ASCII Hex ASCII Hex ASCII Hex Character Equivalent Character Equivalent Character
10. list 100 104 108 SH 116 132 136 140 112 132 136 0 Appendix D Country Channel List Page 74 100 102 104 106 116 118 132 134 1 36 138 140 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 100 101 102 103 104 105 106107 108 109 110 111 112 113 114 115 116 117 118 119 131 132 133 134 135 136 137 138 Estonia 139 140 141 Finland France Germany Greece Hungary Iceland Ireland Italy Latvia Liechtenstein Lithuania Luxembourg Macedonia Malta Netherlands Norway Poland Portugal Romania Slovakia Slovenia Spain Sweden United Kingdom Table 6 Other Countries Country Mode Channel list 40MHz 20MHz 10MHz 5MHz 149 150 151 152 153 154 155 156 149 151 153 155 149 153 157 1149 153 157 161 157 159 161 163 1 pe eee gt 161 162 163 164 65 167 169 171 17 3 165 166 167 168 169 170 171 172 173 0 Appendix D Country Channel List Page 75 100 104 108 112 149 153 157 161 100 102 104 106 100 104 108 112 116 149 153 157 108 110 112 114 Russia 116 149 151 153 1 161 55 157 159 161 100 102 104 106 100 104 108 100 104 108 112 108 110 112 114 100 101 102 103 104 105 106107 108 109 110 111 112 113 114 115 116 149 150 151 152 153 154 155 156 157 158 159 160 161 100 101 102 103 104 105 106107 108 109 110 111 112 113 114 115 116 117 118 119 112 116 132 116 132 136 140 1 16
11. name of the radius server if any Radius Administrative User Radius Admin Username Enter the username of the Radius Administrator Radius Admin Password Enter the password of the Radius Administrator Captive Portal UAM Portal URL Enter the address of the UAM portal server UAM Secret Enter the secret password between the redirect URL and the Hotspot Upgrade Firmware Open Firmware Upload in Management and follow the steps below to upgrade firmware locally or remotely through the CPE s Web Chapter 5 Management Page 44 L corri Global Connectivi www L com com Status System Wireless Management Tools y Logout Remote Settings Upgrade Firmware This page allows you upgrade the device firmware to a new version Please do not power off the device during the upload because it may crash the system CoovaChilli Settings Select File wi Configuration File Password Settings Figure 35 Upgrade Firmware H Click Browse to select the firmware file you would like to load D Click Upload to start the upload process e Wait a moment the system will reboot after successful upgrade Note e Do NOT cut the power off during upgrade otherwise the system may crash Backup Retrieve Settings It is strongly recommended you back up configuration information in case of something unexpected If tragedy hits your device you may have an access to restore the important files by the ba
12. private local network behind your Gateway s NAT firewall RADIUS Settings Enable Port Forwarding IP Address Firewall Settings m Protocol Both v Src IP Filtering Port Range Comment Dst IP Filtering Src Port Filtering Det ety ae LocalIP Address Protocel PortRange Comment Port Forwarding DMZ Setting Delete Selected Delete Al Figure 20 Port Forwarding DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to the Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers EN y Global L cef Connectivity www L com com System i Wireless Management Basic Settings DMZ TCP IP Settings S A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to Internet traffic such as Time Settings Web HTTP servers FTP servers SMTP e mail servers and DNS servers RADIUS Settings Enable DMZ E E DMZ Host IP Address 0 0 0 0 Firewall Settings d Src IP Pie Figure 21 DMZ Settings Chapter 3 Basic Settings Page 24 Basic Wireless Settings Open Basic Settings in Wireless as below to make basic wireless configuration L Cem Global Connectivi www L com com Stat
13. this vap we Broadcast SSID Enable or V Jx ssidhided l Disable V Jx vlanID vlan D of this vap NIN Isolation wireless separation 0 Appendix B SSH Settings Page 64 wmm WMM Support MaxStaNum Max Station Number a a StaNumLmt Whether manually limit the number o f station authentication wireless authentication type encryption default wireless data encryption wireless wep default key index lt 2 Al wpa wireless WPA setting association list of associated wireless clients vian vlan setting active enable 802 1Q VLAN managelD Management VLAN ID radius radius setting IPaddr IP address lt lt 2 lt 2 2 2 e JH port port shared secret Shared Secret firewall firewall setting srcipfilter source ip filter settings enable source ip filter enable 2 ie addrule add a source ip filter rule lt e jeje lt e e lt lt lt e e delerule delete source ip filter rule rulelist show source ip filter rule lists a destipfilter destination ip filter settings enable destination ip filter enable lt jejej e addrule add a destination ip filter rule delerule delete destination ip filter rule rulelist show
14. time the browser is redirected to a web page which may require authentication Captive portals are used at most Wi Fi hotspots Therefore to use Coovachilli you need to find Coovachilli service providers that have the additional services needed to make Coovahcilli work P Cem Global Connectivi www L com com y Logout System Wireless Management Tools Remote Settings CoovaChilli Settings Use this page to set basic CoovaChilli settings u Coovachilli Enable Firmware Upload RADIUS Settings Configuration File Primary RADIUS Server radius1 coova net Password Settings Secondary RADIUS Server radius2 coova net RADIUS Auth Port 1812 EE RADIUS Acct Port 1813 Certificate Settings RADIUS Shared Secret RADIUS NASID your radius nasid RADIUS Administrative User RADIUS Admin Username your admin username RADIUS Admin Password Captive Portal UAM Portal URL https www coova n UAM Secret Figure 34 Coovachilli Settings Radius Settings e Primary Radius Server Enter the name or IP address of the primary radius server Chapter5 Management Page 43 Secondary Radius Server Enter the name or IP address of the primary radius server if any Radius Auth Port Enter the port number for authentication Radius Acct Port Enter the port number for billing Radius Shared Secret Enter the secret key of the radius server Radius NAS ID Enter the
15. to define a priority limit on the basis of data type under AP mode only thus those time sensitive data like video audio data may own a higher priority than common one To enable WMM the wireless client should also support it Max Station Number By checking the Max Station Num the CPE will only allow up to 32 wireless clients to associate with By disabling the checkbox the CPE will allow up to 128 clients to connect but it is likely to cause network congestion or poor performance e Security Setting To prevent unauthorized radios from accessing data transmitting over the connectivity the IEEE 802 11a n Wireless Outdoor CPE provides you with rock solid security settings For detailed information please go to Chapter 4 Wireless Security Setting VLAN Tab If your network uses VLANs you can assign one SSID to a VLAN and client devices using the SSID are grouped in that VLAN To allow users on the VLAN to access the WEB page of the IEEE 802 11a n Wireless Outdoor CPE you need to enable Enable 802 1Q VLAN and assign a management VLAN ID for your device Make sure the assigned management VLAN ID is identical to your network VLAN ID to avoid failures of accessing the Web page of the IEEE 802 11 a n Wireless CPE Chapter 3 Basic Settings Page 30 EN y Global L cef Connectivity www L com com Status Wireless Basic Settings Profile Profiles Advanced Settings Profiled Access Control Profile10 WDS Settin
16. 1 18 132 134 1 131 132 133 134 153 157 161 165 0 Appendix D Country Channel List Page 76 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165
17. 2 is for IP video integration To use it you need to enable the secondary port in advance before connecting with the IP camera from the CPE s Web Management as shown below CF Sibel L C Connectivity www L com com Status Wireless Management Basic Settings Basic Settings Use this page to configure the basic parameters of device TCP IP Settings Time Settings Device Settings RADIUS Settings Device Name ap0ofbc5 max 15 characters and no spaces Network Mode Bridge v Ethernet 1 DataRate Auto v Ethernet 2 DataRate Auto Country Region United States v Firewall Settings Secondary RJ45 Power O Enabled Disabled Spanning Tree E Enabled Disabled STP Forward Delay 1 1 30 seconds GPS Coordinate Settings Latitude Longitude 3 Take out the power cord and POE injector from the gift box and plug the power cord into the DC port of the POE injector as the below picture shows 3auuJayy3 JaAD JaMmog Figure 5 Connect to POE Injector 4 Put what in the Step 2 and Step 3 together by plugging the other side of the Ethernet cable in the Step 2 into the POE port of the POE injector in the Step 3 When you finish the Step 4 the set will be like the following picture Chapter 2 Hardware Installation Page 7 WIRELESS CPE Figure 6 Plug the Ethernet cable to the RJ 45 jack of the injector 5 Press the black PWR button beside the LAN 1 Ethernet port 6 Attach and f
18. 29 Figure 26 Management VLAN ID 31 Figure 27 Advanced Wireless Settings ooooocccnccnnnnnninnccnnnccccorcnnnonnna nan nnnnc cnn narran narran 32 Figure 28 Security SOU EE 35 Figure 29 ee el re 37 Figure 30 WDS Settings EEN 38 Figure 31 Remote Management roesini e sana ea E EENE EEA E EAN E EA ARENAS 40 Figure 32 SNMP Configuration cooncocnnncncnncccconcccnonnnonannnonoc conc cnn cnn crac rra 41 Figure 33 Configure SNMPv3 User Profile oooooooonnnnninncnnnncicinnnnnnoconnnccccnrcnn corn nn nr nnnrccnn rana 42 Figure 34 Goovachill Settings toi A Een 43 Figure 35 Upgrade Firmware cirio ci rer ni bidet den a 45 Figure 36 Backup Retrieve Settings nnn ennnenenneerenneenenenenneerennenreneennnneneneevenernenenenneeeenenn 45 Figure 37 Restore Settings nn nnnnnenneneeneennnenenneenenereenenennnenennereenennnnsnenneeeene nnn enennnenenenenenn 46 le UI Te 47 Figure Ne e ar a hd 47 Figure 40 Certificate Geitings nnna 48 Figure 41 System Log iii re ja 49 Figure 42 Site Survey Tool en inch in Iren E cia 50 Figure 43 Ping Watendog EE 50 Figure 44 Data Rate Test eek aiii 51 Figure 45 Antenna Alignment nnen nennen nenrenseneerennnervennnervennnenvensenennenneenvensnenvensenennenen 52 Egeter ee de tenere oil 52 Figure 47BasicIntorMaliON aiii dida 53 Figure 48 Connection iii A A A 54 Figure 49 Network Flow Giatteilce narra nn crac cnn rana rn 55 Figure 50 ARP TA A lea ee ee eae 56 Figure 51 Bridge Table coin ratas Obi 56
19. 5 Power The secondary Ethernet port labeled LAN 2 is for IP video integration To use it you need to enable the secondary port via WEB UI in advance before connecting with the IP camera Chapter 3 Basic Settings Page 15 Spanning Tree Spanning Tree Protocol STP is a link management protocol for AP which provides path redundancy while preventing loops in a network STP allows only one active path at a time between the access points but establish the redundant link as a backup if the initial link fails STP Forward Delay STP Forward Delay is the time spent in detecting and learning network tree topology state before entering the forward state Default time value is 1 sec GPS Coordinate Settings The GPS Coordinate Setting helps you mark the latitude and longitude of the Power R2 Extender Just enter the coordinates and click the Apply button e TCP IP Settings Open TCP IP Settings in System as below to configure the parameters for LAN which connects to the LAN port of the CPE In this page users may change the settings for IP Address Subnet Mask and DHCP Server L Cem Global Connectivi www L com com Status y System Wireless Management Basic Settings ao TCP IP Settings TCP IP Settings E S SE Use this page to configure the parameters for local area network which connects to the LAN port of A our Access Point Here you may change the setting for IP address subnet mask DHCP etc Time Sett
20. Connectivity Logout www L com com Status Wireless Management Tools Basic Settings Source IP Filtering TCP IP Settings Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings E RADIUS Settings Enable Source IP Filtering 5 2 Local IP Address Firewall Settings 3 Comment Dst IP Filtering Src Port Filtering Local IP Address Dst Port Filtering Port Forwarding Delete Selected Delete Al DMZ Setting Figure 16 Source IP Filtering Destination IP Filtering The destination IP filtering gives you the ability to restrict the computers in LAN from accessing certain websites in WAN according to specified IP addresses Check the Enable Destination IP Filtering checkbox and enter the IP address of the clients to be restricted Hit Apply to make the setting take effect SIN y Global L cor Connectivity www L com com Status System Wireless Management Basic Settings Destination IP Filtering TCP IP Settings Entries in this table are used to restrict the computers in LAN from accessing certain websites in WAN Time Settings according to IP address Enable Destination IP Filterin RADIUS Settings zi Destination IP Address Firewall Settings Comment Sre IP Filtering Destination IP Addres Comment Sr
21. D EE Authentication RADIUS Server RADIUS Settings IP Address 0 0 0 0 Port 1812 Shared Secret Firewall Settings Global Key Update every 3600 Seconds Figure 15 RADIUS Settings e Authentication RADIUS Server This is for RADIUS authentication It can communicate with RADIUS through IP Address Port and Shared Secret IP Address Enter the IP address of the Radius Server Port Enter the port number of the Radius Server Shared Secret This secret which is composed of no more than 31 characters is shared by the AP and RADIUS during authentication Global Key Update Check this option and specify the time interval between two global key updates Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks It may also be defined as a mechanism used to protect a trusted network from an un trusted network The IEEE 802 11a n Wireless Outdoor CPE has capabilities of Source IP Filtering Destination IP Filtering Source Port Filtering Destination Port Filtering Port Forwarding as well as DMZ This is available only under Router Mode Source IP Filtering The source IP filtering gives users the ability to restrict certain types of data packets from your local network to Internet through the IEEE 802 11a n Wireless Outdoor CPE Use of such filters can be helpful in securing or restricting your local network Chapter 3 Basic Settings Page 20 EN y Global L cef
22. E IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH LICENSEE 5 Public Software Name and Description Table 3 Public Software Name and Description Program Copy Right Origin Sour Licenses or License Terms Name Description Code Distribution Models or Website its special license Reference terms Wolfgang Denk ftp ftp denx de GNU GENERAL GNU GENERAL DENX Software pub u boot PUBLIC LICENSE PUBLIC Engineering Version 2 LICENSE Version wd denx de 2 Busybox http www busy GNU GENERAL http www gnu or box net downloa PUBLIC LICENSE g licenses old lice ds busybox 1 01 Version 2 nses gpl 2 0 html tar bz2 O Appendix C GPL Declamation Page 70 Goahead hostapd wpa_suppl icant ntpclient Copyright c GoAhead Software Inc 1992 2000 Copyright c 2002 2006 Jouni Malinen lt jkmaline cc hut fi gt and contributors Copyright c 2003 2005 Jouni Malinen lt jkmaline cc hut fi gt and contributors Copyright 1997 1999 2000 2003 Larry Doolittle Copyright c 2001 2003 Networks Associates Technology Inc All rights reserved O Appendix C GPL Declamation 71 http data goahe ad com Software Webserver 2 1 8 webs218 tar g z http hostap epit est fi releases h ostapd 0 4 8 tar gz http hostap epit est fi releases w pa_supplicant 0 4 7 tar g
23. GNU GENERAL http www gnu or 2005 Johnny e net projects ig PUBLIC LICENSE g licenses old lice Egeland mpproxy files ig Version 2 nses gpl 2 0 html lt johnny rlo org gt mpproxy 0 1 igm pproxy 0 1 tar gz download Copyright C http sourceforg GNU GENERAL f http www gnu or 1998 Brad M e net projects dn PUBLIC LICENSE g licenses old lice Garcia rd files dnrd 2 12 Version 2 nses gpl 2 0 htm lt garsh home co dnrd 2 12 tar gz m gt download O Appendix C GPL Declamation Page 72 iproute Stephen Hemminger shemminger osd l org Alexey Kuznetsov kuznetOms2 inr a c ru Paul Mackerras lt paulus linuxcar e com gt O Appendix C GPL Declamation 73 http developer osdl org dev ipro ute2 ftp ftp samba or g pub ppp GNU PUBLIC Version 2 GENERAL http www gnu or LICENSE g licenses old lice nses gpl 2 0 html Page Appendix D Country Channel List The IEEE802 11a n Wireless Outdoor CPE supports country selection Channels may vary upon each country s regulation The following tables list the channel with country code in each bandwidth Table 4 FCC Countries United States Chile China Columbia Mexico 5725 5850 Panama Pilippines Taiwan Uruguay Venezuela Table 5 CE Countries 5470 5725 Excluded Belgium Belgium LAs eus Czech Republic Radars 149 153 157 149 153 157 161 149 151 153 155 157 159 161 163 1 65 Channel
24. IEEE 802 11a n Wireless Outdoor CPE User s Manual F3 0 4 Sep 2011 Copyright Copyright O 2011 all rights reserved No part of this publication may be reproduced adapted stored in a retrieval system translated into any language or transmitted in any form or by any means without the written permission of the supplier About This Manual This user manual is intended to guide professional installer to install the IEEE 802 11a n Wireless CPE and how to build the infrastructure centered on it It includes procedures to assist you in avoiding unforeseen problems Conventions For your attention on important parts special characters and patterns are used in this manual a Note e This indicates an important note that you must pay attention to La warning e This indicates a warning or caution that you have to abide Bold Indicates the function important words and so on Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will no
25. al Key Integrity Protocol which is a kind of dynamic encryption is co used with WPA PSK etc Chapter 4 Advanced Settings Page 36 AES Advanced Encryption Standard it is usually co used with WPA2 PSK WPA WPA2 etc TKIP AES It allows for backwards compatibility with devices using TKIP Note e We strongly recommend you enable wireless security on your network e Only setting the same Authentication Data Encryption and Key in the CPE and other associated wireless devices can the communication be established Access Control The Access Control appoints the authority to wireless client on accessing the IEEE 802 11a n Wireless Outdoor CPE thus a further security mechanism is provided This function is available only under AP mode Open Access Control in Wireless as below L cam Global Connectivi www L com com y Logout Status Wireless Management Tools Basic Settings Wireless Access Control If you choose Allowed Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point When Deny Listed is selected these wireless clients on the list will not be able to connect the Access Point Profile Settings Advanced Settings Access Control Access Control Mode Allow Listed e MAC Address WDS Settings MAC Address Select 00 19 70 00 fb c5 Figure 29 Access Control e Access Control Mode If yo
26. asten the removable cover to the bottom of the unit with the screw 7 Power on the IEEE 802 11a n Wireless Outdoor CPE by plugging the power adapter to the power socket Chapter 2 Hardware Installation Page 8 Using the External Antenna The IEEE 802 11a n Wireless Outdoor CPE provides two reverse SMA antenna connectors if you prefer to use the external antenna for your application instead of the built in directional antenna please follow the steps below 1 Remove the two plugs as circled below 2 Connect your external antenna to the SMA type connectors at the bottom of the CPE E Warning e Users MUST power off the CPE first before connecting the external antenna to it Do not switch from built in antenna to the external antenna from WEB management without physically attaching the external antenna onto the CPE otherwise damage might be caused to the unit itself Follow the steps described in Connect Up to finish the installation Chapter 2 Hardware Installation Page 9 Pole Mounting 1 Turn the CPE over Put the pole mounting rings through the middle hole of it Note that you should unlock the pole mounting ring with a screw driver before putting it through the CPE as the following right picture shows Figure 7 Pole Mounting Step 1 2 Mount the IEEE 802 11a n Wireless Outdoor CPE steadily to the pole by locking the pole mounting ring tightly The mounting ring supports pole diameter 32mm to 70
27. c Port Filtering Dst Port Filterin oe Delete Selected Delete Al Port Forwarding DMZ Setting Figure 17 Destination IP Filtering Chapter 3 Basic Settings Page 21 Source Port Filtering The source port filtering enable you to restrict certain ports of data packets from your local network to Internet through the IEEE 802 11a n Wireless Outdoor CPE Use of such filters can be helpful in securing or restricting your local network L Cem Global Connectivi www L com com Status System Wireless Management Tools y Logout Basic Settings 5 z Source Port Filtering TCP IP Settings Entries in this table are used to restrict certain ports of data packets from your local network to S Internet through the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings nebari S x SS Ko ay RADIUS Settings Enable Source Port Filtering A 3 Port Range Firewall Settings E Protocol Src IP Filtering Comment Dst IP Filtering Dst Port Filtering Port Forwarding d Delete Selected Delete All DMZ Setting Figure 18 Source Port Filtering Chapter 3 Basic Settings Page 22 Destination Port Filtering The destination port filtering enables you to restrict certain ports of data packets from your local network to Internet through the IEEE 802 11a n Wireless Outdoor CPE Use of such filters can be helpful in securing or restricting your local network L cs
28. cate Settings Privacy Protocol None v Password Settings Enable SNMPv3User User Name SNMPv3User Password eeccccce Confirm Password Access Type Read Only Y Authentication Protocol MDS v Privacy Protocol None v Figure 33 Configure SNMPv3 User Profile e User Name Specify a user name for the SNMPv3 administrator or user Only the SNMP commands carrying this user name are allowed to access the CPE e Password Specify a password for the SNMPv3 administrator or user Only the SNMP commands carrying this password are allowed to access the CPE e Confirm Password Input that password again to make sure it is your desired one e Access Type Select Read Only or Read and Write accordingly e Authentication Protocol Select an authentication algorithm SHA authentication is stronger than MD5 but is slower Chapter5 Management Page 42 e Privacy Protocol Specify the encryption method for SNMP communication None and DES are available None No encryption is applied DES Data Encryption Standard it applies a 58 bit key to each 64 bit block of data Coovachilli Settings Coovachilli is a captive portal management which allows WLAN users to easily and securely access the Internet Under Router mode when Coovachilli is enabled the IEEE 802 11b g n Wireless Access Point will force an HTTP client on a network to see a special web page usually for authentication purposes before using the Internet normally At that
29. ckup All these can be done by the local or remote computer Open Configuration File in Management as below L Cem Global Connectivi www L com com Status Wireless Management y Remote Settings Configuration File CoovaChilli Settings This page allows you to save current settings to a file or load the settings from the file which was saved previously Besides you could reset the current configuration to factory default or reboot the Firmware Upload device Configuration File Save Settings to File Password Settings Load Settings from File a Certificate Settings Reset Settings to Default Reboot The Device Figure 36 Backup Retrieve Settings e Save Settings to File Chapter5 Management Page 45 By clicking Save a dialog box will pop up Save it then the configuration file ap cfg will be generated and saved to your local computer e Load Setting from File By clicking Browse a file selection menu will appear select the file you want to load like ap cfg Click Upload to load the file After automatically rebooting new settings are applied Restore Factory Default Settings The IEEE 802 11a n Wireless Outdoor CPE provides two ways to restore the factory default settings e Restore factory default settings via Web From Configuration File clicking Reset Settings to Default will eliminate all current settings and reboot your device then default setti
30. code form ii be licensed for the purpose of making derivative works or iii be redistributable at no charge Public Software includes without limitation software licensed or distributed under any of the following licenses or distribution models or licenses or distribution models similar to any of the following 1 GNU s General Public License GPL or Lesser Library GPL LGPL 2 the Artistic License e g PERL 3 the Mozilla Public License 4 the Netscape Public License 5 the Sun Community Source License SCSL 6 the Sun Industry Source License SISL and 7 the Apache Software license 2 Limited Use Any Public Software provided under the agreement shall be subject to the licenses terms and O Appendix C GPL Declamation Page 69 conditions of its model Licensee hereby agrees to comply with the terms and conditions applicable to any such Public Software as set forth in its presentation on website 3 Limited Liability The supplier hereby express that the supplier shall have no liability for any costs loss or damages resulting from Licensee s breach of the terms and conditions applicable to use conversion or combination of the licensed software with or into Public Software 4 NO WARRANTY This program or licensed software is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO TH
31. d and follow these safety precautions 2 If you are installing the IEEE 802 11a n Wireless Outdoor CPE for the first time for your safety as well as others please seek assistance from a professional installer who has received safety training on the hazards involved 3 Keep safety as well as performance in mind when selecting your installation site especially where there are electric power and phone lines 4 When installing the CPE please note the following things D Do not use a metal ladder D Do not work on a wet or windy day D Wear shoes with rubber soles and heels rubber gloves long sleeved shirt or jacket 5 When the system is operational avoid standing directly in front of it Strong RF fields are present when the transmitter is on Chapter 2 Hardware Installation Page 3 Installation Precautions To keep the IEEE 802 11a n Wireless Outdoor CPE well while you are installing it please read and follow these installation precautions 1 Users MUST use a proper and well installed grounding and surge arrestor with the CPE otherwise a random lightening could easily cause fatal damage to the unit EMD Lightning DAMAGE IS NOT COVERED UNDER WARRNTY 2 Users MUST use the Power cord amp POE Injector shipped in the box with the CPE Use of other options will likely cause damage to the unit 3 Users MUST power off the IEEE 802 11a n Wireless Outdoor CPE first before connecting the external antenna to it Do not swi
32. d or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user Warranty Hardware warranty is for one 1 year from date of shipment from Distributor warrants that hardware will conform to the current relevant published specifications and will be free from material defects in material and workmanship under normal use and service IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT INDIRECT GENERAL SPECIAL INCIDENTAL CONSEQUENTIAL EXEMPLARY OR OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT INCLUDING WITHOUT LIMITATION DAMAGES FOR LOSS OF BUSINESS PROFITS BUSINESS INTERRUPTION LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS OR FROM ANY BREACH OF WARRANTY EVEN IF DISTRIBUTOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES INNO CASE SHALL EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT Content Chapter 1 Intro UCtION iii aii ip nidad 1 ugeet 1 Lee 17219107 gt ii cad 1 Key Features de rennend rn 2 Ree ee ere 2 Chapter 2 Hardware Installation annen anne enanenennnenensenesnanenananennennenseennnanenanenennnnnensnenannvennnnennnen 3 Preparation before Installation nennen eneen eeen enneenenennnenenenneeeenenneeeenennenenennenennenneenvenneen 3 Professional Installation Required nnen enne enenenneerenenneenenenneereeenneenenenne
33. data retransmission at long distance the IEEE 802 11a n Wireless Outdoor CPE can automatically adjust proper ACK timeout value by specifying distance of the two nodes e Flow Control It allows the administrator to specify the incoming and outgoing traffic limit by checking Enable Traffic Shaping This is only available in Router mode a Note e We strongly recommend you leave most advanced settings at their defaults except Distance in Meters adjusted the parameter for real distance any modification on them may negatively impact the performance of your wireless network Chapter 4 Advanced Settings Page 34 Wireless Security Settings To prevent unauthorized radios from accessing data transmitting over the connectivity the IEEE 802 11a n Wireless Outdoor CPE provides you with rock solid security settings Data Encryption and Authentication Settings Open Profile Setting in Wireless and enter VAP Profile 1 Settings as below L cam Global Connectivi www L com com Status Wireless Management Tools y Logout Basic Settings VAP Profile1 Settings Profile Settings gt Advanced Settings Basic Settings Profile Name Profile1 Wireless Network Name SSID Broadcast SSID O Enabled Disabled Access Control Wireless WDS Settings Wireless Separation Enabled Disabled WMM Support D Enabled Disabled F Max Station Num 32 0 32 Security Settings Network Authent
34. default or reboot the device Save Settings to File Password Settings Load Settings from File EE CoovaChilli Settings Firmware Upload Certificate Settings Reset Settings to Default Reboot The Device Reboot Figure 38 Reboot Password From Password Settings in Management you can change the password to manage your CPE Enter the new password respectively in New Password and Confirm Password fields click Apply to save settings L Cem Global Connectivi www L com com Status Wireless Management Tools y Logout Remote Settings Password Settings Use this page to set the password of this Access Point CoovaChilli Settings Firmware Upload New Password Confirm Password Configuration File E Figure 39 Password note e The password is case sensitive and its length cannot exceed 19 characters Chapter 5 Management Page 47 Certificate Settings Under Client mode when EAP TLS is used the RADIUS server must know which user certificates to trust The Server can trust all certificates issued by a given CA To import a user certificate from Import User Certificates click Browse and specify the location where the user certificate is placed Click Import C N eee E C Connectivit www L com com Status System Wireless Management Tools y Logout Remote Settings Certificate Settings CoovaChilli Sett
35. e first time it is recommended that you begin configuration from Basic Settings in System shown below L cam Global Connectivi www L com com Status System Wireless Management Tools y Logout Basic Settings gt Basic Settings Use this page to configure the basic parameters of device TCP IP Settings Time Settings Device Settings RADIUS Settings Device Name ap00fc60 max 15 characters and no spaces Network Mode Bridge v Ethernet 1 DataRate Auto Ethernet 2 DataRate Auto Country Region United States v Firewall Settings Secondary RJ45 Power enabled O Disabled Spanning Tree O Enabled Disabled STP Forward Delay 1 1 30 seconds GPS Coordinate Settings Latitude Longitude Figure 11 Basic System Settings e Basic Settings Device Name Specify the device name which is composed of no more than 15 characters with 0 9 A Z a z or Network Mode Specify the network mode including Bridge and Router It is easy to configure parameters in Bridge Mode however users must pay extra attention to the way they configure the device when it is set to Router Mode Ethernet 1 Data Rate Specify the transmission rate of data of LAN1 Default is Auto Ethernet 2 Data Rate Specify the transmission rate of data of LAN2 Default is Auto Country Region The availability of some specific channels and or operational frequency bands are country dependent Secondary RJ4
36. eg ee arial a 43 Upgrade Firmware toos ata idas 44 Backup Retrieve Settings ooconiccinncnnnnnconnccnoccnnnnccnnnnocn nn nn cnn cancer nn 45 Restore Factory Default Settings 0 0 0 0 cccccccccssececeesseeeceesseeccsesaeeeesessececsesseceesesaeeecsesaeeeeeesaeeeeneaaes 46 A rn Re een te 46 Password naan it 47 Certificate due ER 48 Chapter 6 Monitoring TOOIS nannn ane erense ensen enanenenneensnseenananensnenensennnnnsnannvennennsnsnnnannvennnenensennn 49 SISMO eben Een telen 49 Se E E eet a ne 49 Ping Waten DOG A ed eee tan rennend 50 Date Rat et a ee en ee a eee 51 auer EE 51 Speed TEST rer A A eten A a Babel ei 52 Chapter Z Statuses iaa 53 View Basic Information eseis eene ieiet etr eia E AE AEA TOEAU AEEA 53 Miew Association BE 53 View Network Flow StatistiCS nnen 54 ET RE EE 55 View Bridge Table ccoo a cd delicate 56 View Active DHCP Client Table oooonoocccnnnocccinonoccconononononononnnnnonnnn corno non n nono nn nro nn rn nn eneerenenneeenn eneen 56 View Network Activities di 57 Chapter 8 Troubleshooting nnn anen enne er ene enanenennnenennennsnanenanenenneneenanenannnenannnennennnnnenannnennnnennn 58 Appendix A ASC PA 60 Appendix B SSH SettingS ees 61 Appendix C GPL Declamation c scccsseeceseeeseeeeeseeenseeeseesesaeensneeenseaeseaeseseaeenseaeeseeseseaesnseaeenseaes 69 Appendix D Country Channel List umunnssrreennnennnnnnnnnnnnnnnnnnnnnnnnnnnnn nennen nennen
37. er Profile Figure 32 SNMP Configuration e Protocol Version Select the SNMP version and keep it identical on the CPE and the SNMP manager The IEEE 802 11a n Wireless CPE supports SNMP v2 v3 Server Port Change the server port for a service if needed however you have to use the same port to use that service for remote management e Get Community Specify the password for the incoming Get and GetNext requests from the management station By default it is set to public and allows all requests e Set Community Specify the password for the incoming Set requests from the management station By default it is set to private e Trap Destination Specify the IP address of the station to send the SNMP traps to e Trap Community Specify the password sent with each trap to the manager By default it is set to public and allows all requests Chapter5 Management Page 41 Configure SNMPv3 User Profile For SNMP protocol version 3 you can click Configure SNMPv3 User Profile in blue to set the details of SNMPv3 user Check Enable SNMPv3 Admin User in advance and make further configuration E Cem Global Connectivi www L com com y Logout Status System Wireless Management Tools Remote Settings gt gt CoovaChilli Settings Enable SNMPv3Admin Firmware Upload User Name SNMPv3Admin Password Configuration File Confirm Password so Access Type Read Write e Authentication Protocol MDS e Certifi
38. erenenneenenenneenveensen 3 E le tende en ene enen Aen te eem ne 3 Installation PrECAUTIONS dci ina 4 Product Package ici en nein 4 Hardware installation 32 2 42 hass ers air dea enee gege Los Dolares 6 Gonnect uptime Esel EE 6 Using the External Antenna ooooccccnnccnnonoconncnnnnonononononnnnnnnnnnnonononnnonnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnns 9 Pole Mounting A A eee 10 Chapter 3 B sic SettingS ccoo eii 12 Factory Default SONAS aio 12 System Requirements a e es 13 How to Login the Web based Interface AA 13 Basic System Settings reiia ur na 15 A OE 18 RADIUS Settings ii 22 ia Ri eee eeh 19 Firewall Setting Siina da 20 Basic ne EEN 25 SO UV nee Heel ab te 28 VAP Profile SettinOS stos tii itinere 28 VEAN Tab oo it io il id enen en nb neen eeen 30 Chapter 4 Advanced Settings nannn anne ersnsnenanenenanenensnnennanenanenenneensnnnenananenanneensennnnanenanenennnnennn 32 Advanced Wireless SettingS nnee a a e a A aA E EE eit 32 Wireless Se c rity SettiNgS vitara 35 Data Encryption and Authentication Settings coccocccnnnocccononooccnnononcconononccnnononcnnnnoncnnnnnnnncnnos 35 Access COMMON tarada 37 WDS SEtINgS ne E hel tires AGA EE 38 Chapter 5 Managment iii ii il aint ni 40 Remote Manage Medicina AAA dE a oa 40 SNMP Management 40 Configure SNMPv3 User Profile ooooooccnncccccnoncccccnonocnncnononnoncnnonnncnnnnnnnnnnnnnnnnnnonnnnnnnnnnnnnnnnnnos 42 lee ME L
39. ess Control WDS Separation Enabled Disabled WDS Settings Local MAC Address 00 19 70 00 fc 60 Remote AP MAC Address 1 00 19 70 00 fb c5 Remote AP MAC Address 2 Remote AP MAC Address 3 Remote AP MAC Address 4 Figure 30 WDS Settings Enter the MAC address of another CPE you wirelessly want to connect to into the appropriate field and click Apply to save settings Note WDS Settings is available only under Bridge and AP Repeater Mode Bridge uses the WDS protocol that is not defined as the standard thus compatibility issues between equipment from different vendors may arise Moreover Tree or Star shape network topology should be used in all WDS use cases i e if AP2 and Chapter 4 Advanced Settings Page 38 AP3 are specified as the WDS peers of AP1 AP2 should not be specified as the WDS peer of AP3 and AP3 should not be specified as the WDS peer of AP2 in any case Mesh and Ring network topologies are not supported by WDS and should be avoided in all the use cases Chapter 4 Advanced Settings Page 39 Chapter 5 Management Remote Management The IEEE 802 11a n Wireless Outdoor CPE provides a variety of remotes managements including Telnet SNMP FTP SSH HTTPS and exclusive WISE tool making configuration more convenient and secure With Normal selected Telnet SNMP and FTP are activated as default remote management options To use secure management tools such as SSH HTTPS and WISE please select
40. esult Open Site Survey in Tools as below Chapter 6 Monitoring Tools Page 49 L cam Global Connectivi www L com com y Logout Status System Wireless Management Tools System Log Wireless Site Survey This page provides tool to scan the wireless network If any Access Point or IBSS is found you could i d z d Ping Watchdog choose to connect it manually when client mode is enabled Data Rate Test s Wireless Signal j SSID Frequency Chann l MAC Address Mode Si th Security Antenna Alignment Wireless 5745MH2 149 00 19 70 00 0 c5 80211AN 37 NONE Speed Test Figure 42 Site Survey Tool Ping Watch Dog If the link is somehow broken and cut off your ability the log in to the unit the ping watchdog has a chance to reboot due to loss of connectivity SIN y Global L cor Connectivity Logout www L com com Status System Wireless Management Tools System Log Ping Watchdog This page provides a tool to configure the Ping Watchdog If the failcount of the Ping reaches to a specified value the watchdog will reboot the device Site Survey Ping Watchdog NM Enable Ping Watchdog IP Address to Ping 192 168 173 34 Antenna Alignment Ping Interval 300 seconds 2 Startup Delay 120 seconds gt 120 Data Rate Test Speed Test Failure Count To Reboot 300 Figure 43 Ping Watchdog e Ping Watchdog Enable Ping Watchdog To activate ping watchdog check this checkbox IP Address to P
41. gs Profile11 Profile12 Profile13 Profile14 Profile15 Profile16 Enable 802 1Q VLAN Management VLAN ID Wireless Wireless Wireless Wireless Wireless Wireless Wireless Wireless Wireless Wireless Wireless Management Open system Open System Open System Open System Open System Open System Open System Open System Open System Open System Open System Figure 26 Management VLAN ID Chapter 3 Basic Settings Logout Tools Page 31 Chapter 4 Advanced Settings Advanced Wireless Settings Open Advanced Settings in Wireless to make advanced wireless settings L cam Global Connectivi www L com com Status y Logout Wireless Management Tools Basic Settings Wireless Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about EE wireless LAN These settings should not be changed unless you know what effect the changes will Advanced Settings take Profile Settings Access Control A MPDU aggregation 9 Enabled Disabled A MSDU aggregation pi WDS Settings ggreg Enabled Disabled Short GI Enabled Disabled RTS Threshold 2347 1 2347 Fragment Threshold 2346 256 2346 Beacon Interval 100 20 1024 ms DTIM Interval 1 1 255 IGMP Snooping Enabled Disabled RIFS O enabled
42. ication Open System A Open System Shared Key Key Type Legacy 802 1x WPA with Radius Default Tx Key EAT WPA2 with Radius WEP Passphrase WPA amp WPA2 with Radius WPA PSK Encryption Key 1 WPA2 PSK Data Encryption WPA PSK amp WPA2 PSK Figure 28 Security Settings e Network Authentication Open System It allows any device to join the network without performing any security check Shared Key Data encryption and key are required for wireless authentication not available in Bridge AP Repeater mode Legacy 802 1x Available in AP Wireless Client mode it provides the rights to access the wireless network and wired Ethernet With User and PC identity centralized authentication as well as dynamic key management it controls the security risk of wireless network to the lowest To serve the 802 1x at least one EAP type should be supported by the RADIUS Server AP and wireless client Note Chapter 4 Advanced Settings Page 35 e For first time users if EAP type TLS is selected you need to import valid user certificate given by CA in prior To import user certificates please refer to Chapter 5 Management Certificate Settings for more details WPA with RADIUS Available in AP Wireless Client mode with warrant username password and etc offered by user this kind of authentication can be realized with specific RADIUS server This is the common way to be adopted in large enterprise network WPA2 with RADIUS Avai
43. ing Specify the IP address of the remote unit to ping Ping Interval Specify the interval time to ping the remote unit Startup Delay Specify the startup delay time to prevent reboot before the CPE is fully initialized Failure Count To Reboot If the ping timeout packets reached the value the CPE will reboot automatically Chapter 6 Monitoring Tools Page 50 Date Rate Test The Data Rate Test allows you test the current RSSI at each data rate between your IEEE 802 11a n Wireless CPEs e Le Qor goa Connectivit www L com com System Wireless Management Tools y Logout System Log Data Rate Test Site Survey Use this page to test the link quality to the remote WDS node Ping Watchdog Index MAC Address Data Rate Test 5 1 00 19 70 00 fc 60 Antenna Alignment Packet Size Remote 256 752 Local RSS RSSI Bytes Bytes 1472 Bytes 82 100 100 33 27 6M 100 100 99 33 24 DM 100 100 100 100 33 26 12M 100 100 100 100 33 24 18M 100 100 100 100 34 25 24M 100 100 100 100 34 27 Figure 44 Data Rate Test Antenna Alignment Under WDS mode when the bridges are not easily visible from the location where the dish will be installed the antenna alignment tool can help you evaluate the position of the unit and adjust the angle of the antenna more precisely Keep it that in real circumstances a lot of additional factors should be taken into account when your un
44. ings Use this page to upload delete user certificate Firmware Sere Delete User Certificate Configuration File Import User Certificates Password Settings Figure 40 Certificate Settings Chapter5 Management Page 48 Chapter 6 Monitoring Tools System Log System log is used for recording events occurred on the CPE including station connection disconnection system reboot and etc Open System Log in Tools as below e C N Global L C Connectivit www L com com Status Wireless Management y System Log System Log Site Survey Use this page to set remote log server and show the system log Ping Watchdog Enable Remote Syslog Server IP Address 0 0 0 0 Port 514 Data Rate Test Antenna Alignment Speed Test Time Source Message 2011 8 18 09 59 05 00 19 70 00 FC 60 WLAN service stopped 2011 8 18 09 59 06 00 19 70 00 FC 60 WLAN service started 2011 8 18 09 59 06 00 19 70 00 FC 60 WLAN service stopped 2011 8 18 09 59 06 00 19 70 00 FC 60 WLAN service started IP why Figure 41 System Log Remote Syslog Server Enable Remote Syslog Enable System log to alert remote server IP Address Specify the IP address of the remote server Port Specify the port number of the remote server Site Survey Only available under Wireless Client mode site survey allows you to scan all the APs within coverage so that you may select a clean channel for your device based on the scan r
45. ings a z if E d IP Address Assignment RADIUS Settings Obtain IP Address Automatically Firewall Settings 9 Use Fixed IP Address IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway Ip Address 0 0 0 0 DNS 1 0 0 0 0 DNS 2 0 0 0 0 Figure 12 TCP IP Settings Bridge Obtain IP Address Automatically If a DHCP server exists in your network you can check this option thus the IEEE 802 11a n Wireless Outdoor CPE is able to obtain IP settings automatically from that DHCP server Note Chapter 3 Basic Settings Page 16 e When the IP address of the CPE is changed the clients on the network often need to wait for a while or even reboot before they can access the new IP address For an immediate access to the bridge please flush the netbios cache on the client computer by running the nbtstat r command before using the device name of the CPE to access its Web Management page e Incase the IEEE 802 11a n Wireless Outdoor CPE is unable to obtain an IP address from a valid DHCP server it will fall back to default static IP address Use Fixed IP Address Check this option You have to specify a static IP address subnet mask default gateway and DNS server for the CPE manually Make sure the specified IP address is unique on your network in order to prevent IP conflict If the IEEE 802 11a n Wireless Outdoor CPE is configured as Router mode you need to configure some additional TCP IP pa
46. ion Page 1 Key Features e Compliant with IEEE 802 11a and IEEE 802 11n as well e Support passive PoE which is supplied with 15V e High reliable watertight housing endures almost any harsh environments e Four operating modes including AP Wireless Client Bridge and AP Repeater e Support 64 128 152 bit WEP and 802 1X WPA WPA2 WPA amp WPA2 WPA PSK WPA2 PSK and WPA PSK amp WPA2 PSK etc e User friendly Web and SNMP based management interface Typical Application This section describes the typical applications of the IEEE 802 11a n Wireless Outdoor CPE By default it is set to AP mode which allows it to establish a wireless coverage besides it is also able to join any available wireless network under wireless client mode the IEEE 802 11a n Wireless Outdoor CPE is able to deliver stable and efficient broadband connectivity for various applications E as BI ireless D Pi 900 Client Figure 2 Typical Application Chapter 1 Introduction Page 2 Chapter 2 Hardware Installation This chapter describes safety precautions and product information you have to know and check before installing the IEEE 802 11a n Wireless Outdoor CPE Preparation before Installation Professional Installation Required Please seek assistance from a professional installer who is well trained in the RF installation and knowledgeable in the local regulations Safety Precautions 1 To keep you safe and install the hardware properly please rea
47. ip V v wlan wlan setting V Wa operationmode operation mode N N ssid wireless network name yV SN ssidhided wireless SSID broadcast N y radio radio switch Y iy wirelessmode wireless mode O Appendix B SSH Settings Page 62 V Jx yV w HTprotect HT protect wireless frequency channel V fv frequency channel depends on country and wireless mode V v power power V Jx rate rate NIN antenna antenna type Vv v antennaGain antenna gain setings V v wmm wmm settings wireless isolate V v Isolation communication between clients y y SEN max sta connection number y y Sant Whether manyay limit the number o f station y y cable wireless bwa space in meter setting LinkIntegration wireless bwa coverage class setting channelMode channel mode channelOffset channel offset of 40MHz type wireless wep key type default wireless wep default key index 1 V v V Jx V v V v extension extension V y A MPDU A MPDU V y A MSDU A MSDU V v shortGl short Gl NIN RIFS rifs Y y RTS RTS V A fragment fragment V v beacon beacon Y y DTIM DTIM yV AN preamble preamble Y y IGMP IGMP Vv v stdm stdm setting NIN cpeType CPE Type BER wireless authentication d v authentication type NIN e
48. ireless connectivity with other IEEE 802 11a n Wireless Outdoor CPEs by keying in remote MAC address Please refer to the WDS Setting for detailed configuration AP Repeater The IEEE 802 11a n Wireless Outdoor CPE servers as AP and Bridge concurrently In other words it can provide connectivity services for CPEs under Bridge mode Chapter 3 Basic Settings Page 25 e Wireless Network Name SSID This wireless network name is shared among all associated devices in your wireless network Keep it identical on all those devices Note that the SSID is case sensitive and cannot exceed 32 characters e 802 11 Mode The IEEE 802 11a n Wireless Outdoor CPE can communicate with wireless devices of 802 11n or 802 11a n e HT Protect Enable HT High Throughput protect to ensure HT transmission with MAC mechanism Under 802 11n mode wireless client can be divided into HT STA and Non HT STA among which the one with HT protect enabled gets higher throughput e Frequency Channel Channel varies much as the available band differs from country to country Select a proper operating channel in the drop down list according to your situation e Extension Channel Only applicable to AP AP Repeater and 40MHz channel width indicates the use of channel bonding that allows the IEEE 802 11a n Wireless CPE to use two channels atonce Two options are available Upper Channel and Lower Channel e Channel Mode 4 levels are available 40MHz 20MHz 10MHz and 5MH
49. is for enhancing the wireless transmission efficiency The default is set to 1 Enter a value between 1 and 255 e IGMP Snooping Available in AP Router mode IGMP snooping is the process of listening to IGMP network traffic By enabling IGMP snooping the AP will listen to IGMP membership reports queries and leave messages to identify the ports that are members of multicast groups Multicast traffic will only be forwarded to ports identified as members of the specific multicast group or groups e RIFS RIFS Reduced Interframe Spacing is a means of reducing overhead and thereby increasing network efficiency e Link Integration Available under AP Bridge AP repeater mode it monitors the connection on the Ethernet port by checking Enabled It can inform the associating wireless clients as soon as the disconnection occurs e TDM Coordination Stands for Time Division Multiplexing Technique this resource reservation control mechanisms can avoid packet collisions and send the packets much more efficiently allowing for higher effective throughput rates This function is only available in AP CPE mode It is highly recommended to enable TDM coordination when there are multiple CPEs needed to connect to the AP in your application e LAN2LAN CPE LAN2LAN CPE mode enables packet forwarding at layer 2 level It is fully transparent for all the Chapter 4 Advanced Settings Page 33 Layer2 protocols Space in Meter To decrease the chances of
50. it is installed These factors include various obstacles buildings trees the landscape the altitude transponder orientation polarization etc To use the tool select the desired remote WDS bridge and click Start the web page will display the measured signal strength RSSI and transmit receive packets If the signal quality is not quite good try to adjust the antenna and see if the quality improves or not Chapter 6 Monitoring Tools Page 51 Cen Global Connectivi www L com com y Logout Status Wireless Management Tools System Log Antenna Alignment Use this page to align the antenna by link quality Site Survey Ping Watchdog Index MAC Address Data Rate Test 1 00 19 70 00 fb c5 Antenna Alignment Speed Test Signal Strength 27 dBm Current RSSI 27 dBm Transmit Packets 1872 Receive Packets 9252 Figure 45 Antenna Alignment Speed Test The speed test is to monitor the current data transmission TX and data reception RX rate with the remote 802 11an Wireless Outdoor CPE Enter the IP address of the remote CPE type in the user name password and click Test The result will display in the bottom STATUS You may test single TX RX or bi direction L cam Global Connectivi www L com com y Logout Status Wireless Management Tools System Log Speed Test Site Survey BE This page allows you test the network speed between this device and another terminal Ping Watchdog De
51. lable in AP Wireless Client mode as a new version of WPA only all the clients support WPA2 can it be available If it is selected AES encryption and RADIUS server is required WPA amp WPA2 with RADIUS Available in AP mode it provides options of WPA TKIP or WPA2 AES for the client If it is selected the data encryption type must be TKIP AES and the RADIUS server must be set WPA PSK It is a simplified WPA mode with no need for specific authentication server In this so called WPA Pre Shared Key all you have to do is just pre enter a key in each WLAN node and this is the common way to be adopted in large and middle enterprise as well as residential network WPA2 PSK As a new version of WPA only all the clients support WPA2 can it be available If it is selected the data encryption can only be AES and the passphrase is required WPA PSK amp WPA2 PSK Available in AP mode it provides options of WPA TKIP or WPA2 AES encryption for the client If it is selected the data encryption can only be TKIP AES and the passphrase is required e Data Encryption If data encryption is enabled the key is required and only sharing the same key with other wireless devices can the communication be established None Available only when the authentication type is open system 64 bits WEP It is made up of 10 hexadecimal numbers 128 bits WEP It is made up of 26 hexadecimal numbers 152 bits WEP It is made up of 32 hexadecimal numbers TKIP Tempor
52. mm feo S CPE Figure 8 Pole Mounting Step 2 3 Now you have completed the hardware installation of the IEEE 802 11a n Wireless Outdoor Chapter 2 Hardware Installation Page 10 CPE Chapter 2 Hardware Installation Page 11 Chapter 3 Basic Settings Factory Default Settings We ll elaborate the Wireless Outdoor CPE factory default settings You can re acquire these parameters by default If necessary please refer to the Restore Factory Default Settings Table 1 Factory Default Settings Features Factory Default Settings Username admin Password password Wireless Device Name apXXXXXX X represents the last 6 digits of Ethernet MAC address operaing ede CN senm oo Chapter 3 Basic Settings Page 12 Encryption IP Address 0 0 0 0 SNMP System Requirements Before configuration please make sure your system meets the following requirements e Acomputer coupled with 10 100 Base TX adapter e Configure the computer with a static IP address of 192 168 1 x as the default IP address of the CPE is 192 168 1 1 X cannot be 0 1 nor 255 e A Web browser on PC for configuration such as Microsoft Internet Explorer 6 0 or above Netscape Firefox or Google Chrome How to Login the Web based Interface The IEEE 802 11a n Wireless Outdoor CPE provides you with user friendly Web based management tool Open Web browser and enter the IP address Default 192 168 1 1 of the CPE into
53. n throughput value Throughput statistics can be updated manually using the Refresh button L Corn Soa Connectivi www L com com y Logout Status System Wireless Management Tools Information Network Activities This page shows Throughput information of wireless and ethernet networks Connections Statistics Wireless 8 ARP Table 6 W nc 229b s E e E t Ob s Bridge Table 2 DHCP Clients Network Activities Ethernet 1 E rx 1 09kb s E t 904bis Figure 53 Network Activities Chapter 7 Status Page 57 Chapter 8 Troubleshooting This chapter provides troubleshooting procedures for basic problems with the CPE For warranty assistance contact your service provider or distributor for the process Q 1 How to know the MAC address of the IEEE 802 11a n Wireless Outdoor CPE MAC Address distinguishes itself by the unique identity among network devices There are two ways available to know it e Each device has a label posted with the MAC address Please refer below MAC 0060B3 XXXXXX XXXXXXXXXXXXXXX Figure 54 MAC Address e Onthe CPE s Web based management interface you can view the MAC Address from View Basic Information Q 2 What if I would like to reset the unit to default settings You may restore factory default settings in Configuration File from Management Q3 What if I would like to backup and retrieve my configuration settings You may do the backup by
54. nation Trap Destination Vv v trapcommunity Trap Community a v3Admin v3Admin Y IN on Enable SNMPv3Admin V v name name y password password Ne va on access type V v SEN Authentication Protocol tion Y y Privacy privacy protocol Vv v v3User v3User V A on Enable SNMPv3User Vv v name name y password password O Appendix B SSH Settings Page 66 AN ES access type Vv v sene Authentication Protocol tion Y y Privacy privacy protocol Vv v coovachilli CoovaChilli setting NIN coovaChilliEnable Coovachilli Enable Vv v SAA Primary RADIUS Server y y secondaryRadiusSe Secondary RADIUS rver Server F y RADIUS Authentication radiusAuthPort Port Y y radiusAcctPort RADIUS Accounting Port Vv v radiusSharedSecret RADIUS Shared Secret Y IN radiusNasid RADIUS Nasid NIN ER RADIUS Admin Username V v Ce RADIUS Admin Password Y IN uamPortalUrl UAM Portal URL Vv v uamSecret UAM Secret V syslog syslog V if client enable syslog client NIN ipaddr syslog server IP address V v port syslog server port number y clear syslog clear Vv v pingwdg ping watchdog Vv v enable enable Vv v interval interval yV N startdelay startup delay Vv v failcount failure count Vo iv ip ip address V v IN Jad access control N eat enable wireless access cont
55. ncryption wireless data encryption NIN key wireless wep key setting V NA Vv v V v wireless wep key 1 0 Appendix B SSH Settings Page 63 V AE HIA 2 wireless wep key 2 Viv v 3 wireless wep key 3 NIN IN 4 wireless wep key 4 MI EE wpa wireless WPA setting j y y DR wireless pre shared key PSK for WPA PSK y J ER Barden WPA _re auth period in seconds enable wireless WPA Y y keyupdate global key update ea lla eap WPA EAP setting NIN IN eaptype WPA EAP Type V Je Jg er WPA inner EAP Type V v username WPA user name V v loginname WPA login name V v password WPA password Vv v usercert WPA cert file d vg N WPA private key password password V v trafficshaping traffic shaping Y fv enable enable Traffic Shaping Vv v downlimit Incoming Traffic Limit Vv v downburst Incoming Traffic Burst Vv v uplimit Outgoing Traffic Limit V v upburst Outgoing Traffic Burst Vv v wdsMac WDS Remote Mac y local local macAddr Vv v remote1 remote macAddr1 Vv v remote2 remote macAddr2 Vv v remote3 remote macAddr3 Vv v remote4 remote macAddr4 NIN wdsSeparation WDS Separation CR list of associated wireless y association clients V Jx Kee VAP setting 1 2 3 etc Y y active on off this vap d v profileName Name of profile NIN ssid ssid of
56. nd replies between clients and servers when they are not on the same physical subnet To enable the DHCP relay agent check the Enable DHCP Relay checkbox and enter the IP address of the DHCP server La warning e In AP mode the IEEE 802 11a n Wireless Outdoor CPE must establish connection with another wireless device before it is set to Router mode To access the unit in Router mode via wired port please type the WAN IP address to enter the web page for WAN is on wired port and LAN is on wireless port Or you can access device through the wireless device connected with the CPE e In wireless client mode users can access the CPE via its wired port for WAN is on wireless port and LAN is on wired port when device is set to Router mode e Bridge mode and AP Repeater mode are similar to AP mode when device is set to Router mode WAN is on wired port and LAN is on wireless port Thus users must also connect the CPE with another wireless device before it is set to Router mode and access the CPE via the connected wireless device Time Settings Compliant with NTP the IEEE 802 11a n Wireless Outdoor CPE is capable of keeping its time in complete accord with the Internet time Make configuration in Time Settings from System To use this feature check Enable NTP Client Update in advance Chapter 3 Basic Settings Page 18 LC Connectivit www L com com System Wireless Management Tools y Logout Status
57. ngs are applied y Er y Global E C a Connectivity www L com com Status Logout System Wireless Management Tools Remote Settings Configuration File CoovaChilli Settings This page allows you to save current settings to a file or load the settings from the file which was gt saved previously Besides you could reset the current configuration to factory default or reboot the Firmware Upload dica Save Settings to File Save Load Settings from File Certificate Settings Reset Settings to Default Reboot The Device Password Settings Figure 37 Restore Settings e Restore factory default settings via Reset Button If software in the CPE is unexpectedly crashed and no longer reset the unit via Web you may do hardware reset via the reset button Press and hold the button for at least 5 seconds and then release it until the PWR LED gives a blink Reboot You can reboot your CPE from Configuration File in Management as below Chapter5 Management Page 46 Click Reboot and hit Yes upon the appeared prompt to start reboot process This takes a few minutes L Cem Global Connectivi www L com com Status y Logout Wireless Management Tools Remote Settings Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously Besides you could reset the current configuration to factory
58. nme anne 74 Figure 1 IEEE 802 11a n Wireless Outdoor CDEN 1 Figure 2 Typical Application ooonccccnnnncccnnnnoccconnnocccnnnnonccnnnnarn cnn nn 2 Figure Re Ve EE 6 Figure 4 Cable Connection is sen Bin ia eege geet 6 Figure 5 Connect to POE Injector anneer nana nono c conca rn 7 Figure 6 Plug the Ethernet cable to the RJ 45 jack of the injector ennen eenen eneen 8 Figure 7 Pole Mounting Step 1 10 Figure 8 Pole Mounting Ste RE 10 Figure 9 LOGIN Pader il 13 Figure 10 Mald Page EE 14 Figure 11 Basic System Settings ooooconncccnnnccnnccnnoconnnonnnanoccnnrnnn arrancan rare 15 Figure 12 TCP IP Settings Bridge nanne e a e a 16 Figure 13 TCP IP Settings Router nnn nnn ennenenneereneereneeeeneenenneerenernenenenneenenernenvennnnenenneenenn 17 Figure a Hi e TEE 19 Figure 15 RADIUS Settings 4 12 22 ld 20 Figure 16 Source IP Eiltering esana e aa aaa aa aa e a a aa ae a aa iiaa a ueis 21 Figure 17 Destination IF Filtering asserena entente eeen en 21 Figure 18 Source Port Eitering arcano cnc crac 22 Figure 19 Destination Port Filtering nnee enne enen enne enenenseenenenseenenenneenenenseerenenneenenenseeneeensen 23 Figure 20 Port Forwardihg teren de ed ded eed ae ee ded en ed 24 Fig re 21 BMZ Settings evitan an Elia 24 Figure 22 Basic Wireless Settings nennen 25 Figure 23 Site UV iii A did 28 Figure 24 VAP Brotlle SelINgS Ei IIS AO RI Zenne 29 Figure 25 VAP Profile Settings tamarindo
59. r this rate the Wireless Outdoor CPE will automatically select the highest available rate to transmit In some cases however like where there is no great demand for speed you can have a relatively low transmit rate for compromise of a long distance Extension Channel Protection Mode This is to avoid conflict with other wireless network and boost the ability of your device to catch all legacy devices transmissions However it may decrease wireless network performance Compared to CTS Self the transmission amount of CTS RTS is much lower Enable MAC Clone Available in wireless client mode it hides the MAC address of the CPE while displays the one of associated wireless client or the MAC address designated manually Chapter 3 Basic Settings Page 27 Site Survey Under wireless client mode the IEEE 802 11a n Wireless Outdoor CPE is able to perform site survey through which information on the available access points will be detected Open Basic Settings in Wireless by clicking the Site Survey button beside Wireless Mode option the wireless site survey window will pop up with a list of available wireless networks around Select the AP you would like to connect and click Selected to establish connection Wireless Site Survey This page provides tool to scan the wireless network If any Access Point or IBSS is found you could choose to connect it manually when client mode is enabled IN a Wireless Signal 2
60. rameters for accessing the Internet Status Basic Settings Time Settings RADIUS Settings Firewall Settings Lo Cer www L com com System Global Connectivity Wireless Logout Management Tools TCP IP Settings Use this page to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP address subnet mask DHCP etc WAN Settings WAN Access Type IP Address Subnet Mask Default Gateway DNS 1 DNS2 LAN Settings IP Address Subnet Mask DHCP Server DHCP IP Address Range Lease Time Enable DHCP Relay Static IP v 192 168 1 1 255 255 255 0 0 0 0 0 0 0 0 0 0 0 0 0 192 168 0 99 255 255 255 0 Disabled v 0 0 0 0 0 0 0 0 0 15 44640 Minutes Figure 13 TCP IP Settings Router WAN Settings Specify the Internet access method to Static IP DHCP or PPPOE Users must enter WAN IP Address Subnet Mask Gateway settings provided by your ISPs LAN Settings When DHCP Server is disabled users can specify IP address and subnet mask Chapter 3 Basic Settings Page 17 for the CPE manually Make sure the specified IP address is unique on your network in order to prevent IP conflict When DHCP Server is enabled users may specify DHCP IP Address Range DHCP Subnet Mask DHCP Gateway and Lease Time 15 44640 minutes A DHCP relay agents is used to forward DHCP requests a
61. rol ACL y dde delete a local ACL address g y list delete or display all local ACL address d DOE add mac address to Current Access Control List y statistics statistics y Wireless Wireless LAN O Appendix B SSH Settings Page 67 Ethernet Ethernet LAN y log list syslog list y password system password y reset restore factory y reboot reboot system y exit logout from CLI O Appendix B SSH Settings Page 68 Appendix C GPL Declamation PUBLIC SOFTWARE DECLAMATION In the software we delivered there may contains some public software if it is please read below carefully 1 Definition Public Software when applicable shall mean that portion of the Licensed Software in source code form set forth in the below Table and provided under the terms set forth in the Section 5 the indicated website the complete license terms can be found Public Software shall mean each of a any computer code that contains or is derived in any manner in whole or in part from any computer code that is distributed as open source software e g Linux or similar licensing or distribution models and b any software that requires as a condition of use modification and or distribution of such software that such software or other software incorporated into derived from or distributed with such software i be disclosed or distributed in source
62. s y System Basic Settings Profile Settings Advanced Settings Basic Settings Profile Name Wireless Network Name SSID Broadcast SSID Access Control WDS Settings Wireless Separation WMM Support Man Station Num Security Settings Network Authentication Data Encryption Key Type Default Tx Key WEP Passphrase Encryption Key 1 Wireless Management VAP Profile1 Settings Profile1 Wireless O Enabled O Disabled enabled Disabled Enabled Disabled 32 0 32 Open System None v Hex v Keyl y _ Generate Keys Figure 25 VAP Profile Settings e Basic Setting Profile Name Name of the VAP profile Chapter 3 Basic Settings Logout Tools Page 29 Wireless Network Name Enter the virtual SSID for the VAP Broadcast SSID In AP mode hiding network name is necessary when you are in a wireless environment that may have potential risk By disabling broadcast SSID the STA cannot scan and find the IEEE 802 11a n Wireless Outdoor CPE so that malicious attack by some illegal STA could be avoided Wireless Separation Wireless separation is an ideal way to enhance the security of network transmission Under the mode except wireless client mode enable Wireless Separation can prevent the communication among associated wireless clients WMM Support WMM Wi Fi Multimedia is a subset of 802 11e lt allows wireless communication
63. stination IP 192 168 1 2 Data Rate Test User Name admin Antenna Alignment Password zeessen TETAS Direction Transmit w Speed Test STATUS Test complete TEST RESULT RX NIA TX 12 0 Mbits sec Figure 46 Speed Test Chapter 6 Monitoring Tools Page 52 Chapter 7 Status View Basic Information Open Information in Status to check the basic information of the CPE which is read only Information includes system information LAN settings wireless setting and interface status Click Refresh at the bottom to have the real time information SIN y Global E C a Connectivity Logout Management Wireless Information This page shows the current status and some basic settings of the device Connections Statistics ARP Table Bridge Table DHCP Clients Network Activities System Information Device Name MAC Address Country Region Firmware Version LAN Settings IP Address Subnet Mask Gateway IP Address MAC Address Wireless Settings Operation Mode Wireless Mode Encryption ACK Timeout WMM Enable ap00fc60 00 19 70 00 fc 60 United States 3 0 4 LC 1 192 168 1 1 255 255 255 0 0 0 0 0 00 19 70 00 fc 60 Bridge 802 11A N Open System 27 us Figure 47 Basic Information View Association List Open Connections in Status to check the information of associated wireless devices such as MAC address signal strength connection time IP address e
64. t occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment To avoid the possibility of exceeding radio frequency exposure limits you shall beep a distance of at least 100cm between you and the antenna of the installed equipment This transmitter must not be co located or operating in conjunction with any other antenna or transmitter The availability of some specific channels an
65. ta packets received on and transmitted from the Chapter 7 Status Page 54 wireless and Ethernet ports Click Refresh to view current statistics L Cem Global Connectivity Logout www L com com Status Wireless Management Information Statistics This page shows the packet counters for transmission and reception regarding to wireless and ethernet networks Poll interval 5 0 65534 sec Set Interval Received Transmitted Connections ARP Table Bridge Table ___ Wireless DHCP Clients Unicast Packets 14603 EE Broadcast Packets 37 234 Network Activities Multicast Packets 306 372 E Total Packets 14653 15209 Total Bytes 5599655 15962900 Ethernet 1 Total Packets 6009 7893 Total Bytes 688555 5790180 Ethernet 2 Total Packets Total Bytes Figure 49 Network Flow Statistics e Poll Interval Specify the refresh time interval in the box beside Poll Interval and click Set Interval to save settings Stop helps to stop the auto refresh of network flow statistics View ARP Table Open ARP Table in Status as below Click Refresh to view current table SFN y Global L C Za Connectivit www L com com Status System Wireless Management y Information ARP Table This table shows ARP table Connections Statistics IP Address MAC Address 192 168 1 88 20 6A 8A 2F D5 BE Bridge Table 192 168 1 2 00 19 70 00 FB C5 DHCP Clients Network Activities Chapter 7 Stat
66. tc All is read only Click Refresh at the bottom to update the current association list Chapter 7 Status Page 53 y EN Global L C Da Connectivit www L com com Status Wireless Management Tools y Logout Information Association List This table shows the MAC Address IP Address and RSSI for each associated device s Statistics See VAP ARP Table Index 3 1 00 19 70 00 fb c5 24 96 2011 8 18 10 37 29 192 168 1 2 MAC Address SI i LastiP Action Bridge Table DHCP Clients Network Activities Figure 48 Connection By clicking on the MAC address of the selected device on the web you may see more details including device name connection time signal strength noise floor ACK timeout link quality IP information current data rate current TX RX packets Association Node Details The details information of association node MAC Address 00 19 70 00 fb c5 Negotiated EE Device Name ap00fbc5 Connect Time 2011 8 18 10 37 29 6M 20 dBm Signal Strength 23 dBm 6 5M 28 dBm Noise Floor 96 dBm 9M 14 dBm ACK Timeout 27 12M 22 dBm Link Quality 80 13M 24 dBm Last IP 192 168 1 2 18M 15 dBm TXIRX Rate 104 104 Mbps 19 5M 21 dBm TXIRX Packets 15497 14625 24M 22 dBm Bytes Transmitted 16371769 26M 30 dBm Bytes Received 5597991 36M 21 dBm 39M 12 dBm 48M 29 dBm 52M 22 dBm 54M 23 dBm 58 5M 17 dBm View Network Flow Statistics Open Flow Statistics in Status to check the da
67. tch from built in antenna to the external antenna from WEB management without physically attaching the external antenna onto the CPE otherwise damage might be caused to the device itself Product Package The product package you have received should contain the following items If any of them are not included or damaged please contact your local vendor for support e IEEE 802 11a n Wireless Outdoor CPE x1 e Pole Mounting Ring x2 e Power Cord amp POE Injector x1 e Product CD x1 Note e Product CD contains Quick Installation Guide and User Manual Chapter 2 Hardware Installation Page 4 Pole Mounting Ring N ua Power Cord amp POE Injector Lr Warning e Users MUST use the Power cord amp POE Injector shipped in the box with the IEEE 802 11a n Wireless Outdoor CPE Use of other options will likely cause damage to the unit Chapter 2 Hardware Installation Page 5 Hardware Installation Connect up 1 The bottom of IEEE 802 11a n wireless outdoor CPE is a movable cover Loosen the screw with a Philips screwdriver Grab the cover and pull it back harder to take it out as the figure shown below AR pas Zi Figure 3 Move the Cover 2 Plug a standard Ethernet cable into the RJ45 port labeled LAN 1 Do not plug the cable into the RJ45 port labeled LAN 2 Figure 4 Cable Connection Chapter 2 Hardware Installation Page 6 The secondary Ethernet port labeled LAN
68. the address field You will see the login page as below DFN Global Lec Connectivity www L com com Name admin Password Losin ree Figure 9 Login Page Chapter 3 Basic Settings Page 13 e Enter the username Default admin and password Default password respectively and click Login to login the main page of the CPE As you can see this management interface provides 5 main options in the black bar above which are Status System Wireless Management and Tools EN y Global Lo C Da Connectivit www L com com y Wireless RK Note Information gt gt Connections Statistics ARP Table Bridge Table DHCP Clients Network Activities System Information Management This page shows the current status and some basic settings of the device System Information Device Name MAC Address Country Region Firmware Version LAN Settings IP Address Subnet Mask Gateway IP Address MAC Address Wireless Settings Operation Mode Wireless Mode Encryption ACK Timeout WMM Enable ap00fc60 00 19 70 00 fc 60 United States 3 0 4 LC 1 192 168 1 1 255 255 255 0 0 0 0 0 00 19 70 00 fc 60 Bridge 802 11A N Open System Figure 10 Main Page The username and password are case sensitive and the password should be no more than 19 characters Chapter 3 Basic Settings Page 14 Basic System Settings For users who use the IEEE 802 11a n Wireless Outdoor CPE for th
69. u select Allow Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP While when Deny Listed is selected those wireless clients on the list will not be able to connect the AP e MAC Address Chapter 4 Advanced Settings Page 37 Enter the MAC address of the wireless client that you would like to list into the access control list click Apply then it will be added into the table at the bottom e Delete Selected All Check the box before one or more MAC addresses of wireless client s that you would like to cancel and click Delete Selected or Delete All to cancel that access control rule WDS Settings Extend the range of your network without having to use cables to link the bridges by using the Wireless Distribution System WDS Simply put you can link the bridges wirelessly Open WDS Settings in Wireless as below y EN Global E C a Connectivity Logout www L com com Status System Wireless Management Tools Basic Settings WDS Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet A does To do this you must set these APs in the same channel and set MAC addresses of other APs Advanced Settings which you want to communicate with in the table and then enable the WDS This function can work only in Bridge and AP Repeater mode Profile Settings Acc
70. us y Logout System Wireless Management Tools Basic Settings gt Wireless Basic Settings Profile Settings Use this page to configure the parameters for wireless LAN clients which may connect to your S Access Point Here you may change wireless mode as well as wireless network parameters Advanced Settings Disable Wireless LAN Interface Access Control Wireless Mode AP v Site Survey Wireless Network Name SSID Broadcast SSID O Enabled disabled 802 11 Mode 802 11A N e WDS Settings Wireless more HT protect Enabled Disabled Frequency Channel 5745MHz 149 e Extension Channel None y Channel Mode Antenna Internal 16 dBi SMA Connector 21 Maximum Output Power per chalay oa dBm Data Rate Auto y Extension Channel Protection None Figure 22 Basic Wireless Settings e Disable Wireless LAN Interface Check this option to disable WLAN interface then the wireless module of the CPE will stop working and no wireless device can connect to it e Wireless Mode Four operating modes are available on the IEEE 802 11a n Wireless Outdoor CPE AP The IEEE 802 11a n Wireless Outdoor CPE establishes a wireless coverage and receives connectivity from other wireless devices Wireless Client The IEEE 802 11a n Wireless Outdoor CPE is able to connect to the AP and thus join the wireless network around it Bridge The IEEE 802 11a n Wireless Outdoor CPE establishes w
71. us Page 55 Figure 50 ARP Table View Bridge Table Open Bridge Table in Status as below Click Refresh to view current connected status L cam Global Connectivity Logout www L com com Status System Wireless Management Tools Information _ Bridge Table Connections This table shows bridge table Statistics MAC Address Ageing Timer s 00 19 70 00 fc 60 20 6a 8a 2f d5 be 0 00 00 19 70 00 fb c5 1 17 ARP Table DHCP Clients Network Activities Figure 51 Bridge Table View Active DHCP Client Table Open DHCP Client in Status as below to check the assigned IP address MAC address and time expired for each DHCP leased client Click Refresh to view current table L cam Global Connectivi www L com com y Logout Status System Wireless Management Tools Information DHCP Clients Connections This table shows the assigned IP address MAC address and time expired for each DHCP leased client Statistics IP Address MAC Address Time Expired s ARP Table TEE Bridge Table DHCP Clients Network Activities Figure 52 DHCP Client Table Chapter 7 Status Page 56 View Network Activities The network activities allows you to monitor the current Wireless and Ethernet TX RX data traffic in graphical and numerical form on the Web of the Skyport The chart scale and throughput dimension Bps Kbps Mbps changes dynamically according to the mea
72. ynamical ip dhcp V v iptype i client NIN ipaddr ip address d v netmask subnet mask yV IA gateway gateway ip address Vv v dns1 dns1 V E dns2 dns2 Vo iv router router mode ip settings Vv v wan wan ip settings NIN oe router mode access type NIN ER static ip address r O Appendix B SSH Settings Page 61 staticnetm y y static subnet mask ask staticgate N N static gateway ip address way d v staticdns1 static dns1 NI y staticdns2 static dns2 dhcpclient y y S dhcp client hostname hostname pppoecon y pppoe connect status nectstatus y pppoelocal obtains IP from pppoe ip server pppoestati y y PRR pppoe static ip address cipaddr pppoeuser y Nl pppoe username name pppoepas Nl Nl PEPER pppoe password sword pppoeserv y y pppoe server name ername pppoecon Nl A RED pppoe connect mode nectmode pppoeidleti A y KEE pppoe idle time me y y lan lan ip settings Nl NI ipaddr lan ip address y netmask lan subnet mask dhcpserve y P dhcp server enable renable dhcpserve y y x dhcp server ip start ripstart dhcpserve y dhcp server ip end ripend dhcpserve y P l dhcp server leasetime rleasetime dhcprela y pees dhcp relay enable enable dhcpserve y y dhcp server ip r
73. z http doolittle ica rus com ntpclien t ntpclient 2003 _194 tar gz http prdownloa ds sourceforge n et net snmp net snmp 5 4 1 tar g Z GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 http www gnu or g licenses old lice nses gpl 2 0 html http www gnu or g licenses old lice nses gpl 2 0 html http www gnu or g licenses old lice nses gpl 2 0 html http www gnu or g licenses old lice nses gpl 2 0 html Page Author Chris ftp vsftpd beast GNU GENERAL http www gnu or Evans s org users ceva PUBLIC LICENSE g licenses old lice ns vsftpd 1 1 2 t Version 2 nses gpl 2 0 html ar gz ftp ftp kernel or GNU GENERAL http www gnu or g pub linux kern PUBLIC LICENSE g licenses old lice el v2 6 linux 2 6 Version 2 nses gpl 2 0 html 15 tar bz2 iptables Copyright ftp ftp netfilter o GNU GENERAL f http www gnu or 2000 2004 rg pub iptables i PUBLIC LICENSE g licenses old lice netfilter project ptables 1 3 6 tar Version 2 nses gpl 2 0 html http www netfilter bz2 org Copyright c http www open GNU GENERAL http www gnu or 1998 2008 The ssl org source o PUBLIC LICENSE g licenses old lice OpenSSL Project penssl 0 9 8k tar Version 2 nses gpl 2 0 html All rights os reserved Igmpproxy Copyright C http sourceforg
74. z 40MHz can enhance data throughput but it takes more bandwidth thus it might cause potential interference e Antenna By default the IEEE 802 11a n Wireless Outdoor CPE uses its built in antenna for directional transmission however if you prefer to use an external antenna for your case dependent applications you can switch from Internal 16 dBi to SMA Connector When SMA Connector is selected an Antenna Gain bar will appear to allow you specify the gain of the external antenna The antenna gain calculates the TX power back off needed to remain in compliance with regulations Warning e You are able to choose SMA Connector only from the WEB UI after you have Chapter 3 Basic Settings Page 26 physically installed the external antenna otherwise it might damage the unit itself Maximum Output Power per chain Specify the signal transmission power The higher the output power is the wider the signal can cover but the power consumption will be greater accordingly Ki Note e The output power here is counted from the RF single chain only not including the 16dBi internal antenna e The maximum output power will vary depending on the country selected in order to comply with the local regulation e You are able to choose SMA Connector only when you have well done installing the external antenna otherwise it might damage IEEE 802 11a n Wireless CPE itself Data Rate Usually Auto is preferred Unde
Download Pdf Manuals
Related Search
Related Contents
TAXAN “MéoBankSD Plus ” Wiley BlackBerry Pearl For Dummies Oster Digital Countertop Oven Oven User Manual MODE D`EMPLOI: AN- Réglisse LTE Antenne Intérieure 取扱説明書 - M ID27218_MANUAL LINHA SOLIS LI MARCA APC_V1011 bulletin CF avec Pages (d`origine) - copie - Chemin Faisant to view the installation manual Copyright © All rights reserved.
Failed to retrieve file