Home
TT5800/TT2400 User Manual
Contents
1. Antenna Selection Please refer to Appendix G on page 59 for further information 29 Access Point Mode Default IP Address in Access Point Mode 192 168 10 240 To access the web control interface please open up a browser window and type in the factory default IP address in the URL http 192 168 10 240 M Press Enter on your keyboard and a login prompt window similar to the one shown below will appear bommert PEG H LULU Login User name Password Remember my password There is no default User name or Password Leave User Name and Password field blank and then click OK Note You may set a new password by clicking the Admin tab after you enter the Web Configuration page 30 Information TELETRONICS INTERNATIONAL INC TT5800 Information R On this page you can get the current status about the device NOTE You may need to reload this page to see the current settings Access Point Information Access Point Name TT Access Point Radio Type 5GHz MAC Address 0060B3E94D14 Firmware version C3 9 1 1030 SSID teletronics Current transmit rate Automatic Current channel 161 Security None IP address 192 168 10 240 Static Register Status Not Registered Unit SysUpTime Od Oh O4m 545 NOTE You are using the empty username password Under the main web interface home page you will see the following configuration menu pages Information Stations Wir
2. 3 2 0SU 3 2 1AP 3 3 0SU 3 3 1AP 3 4 0SU 3 4 1AP 3 5 0SU 3 5 1AP 3 6 0SU 3 6 1AP 3 7 0SU 3 7 1AP 3 8 0SU 3 8 1AP C3 9 0SU C3 9 1AP Z Z Zz zz zz Zz ZZ Z Z ZZ K X z zZz z zZ Z zz Zz ZZ Z zZ ZZ K X 61 Appendix J Glossary 802 1x The standard for wireless LAN authentication used between an AP and a client 802 1x with EAP will initiate key handling Ad Hoc Network The wireless network based on a peer to peer communications session Also referred to as AdHoc Access Point Access points are stations in a wireless LAN that are connected to an Ethernet hub or server Users can roam within the range of access points and their wireless device connections are passed from one access point to the next Authentication Authentication refers to the verification of a transmitted message s integrity Beacon In wireless networking a beacon is a packet sent by a connected device to inform other devices of its presence and readiness Beacon interval When a wirelessly networked device sends a beacon it includes with it a beacon interval which specifies the period of time before it will send the beacon again The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon Network managers can adjust the beacon interval usually measured in milliseconds ms or its
3. gt Uninstall Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks Show icon in notification area when connected Notify me when this connection has limited or no connectivity 2 Select the Internet Protocol TCP IP for your network card and then click Properties 3 In the opened dialog box choose Use the following IP address 4 Under the General tab choose Use the following IP address and then specify an IP address For example type in 192 168 10 X in the IP Address where X is any free IP number from 1 254 excluding 241 area and 255 255 255 0 in the Subnet Mask area 11 Intaygai d GVA Proves ties General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 192 168 10 13 Subnet mask 255 255 255 0 Default gateway 192 168 10 1 btain DNS server address automatically Use the following DNS server addresses Preferred DNS server Alternate DNS server 5 Click OK to finish configuration Web Configuration Interface Client Bridge Mode Default IP Address in Client Bridge Mode 192 168 10 241 To access the web control interface please open up a browser windo
4. 3dB 36Mbps e 22dBm 3dB 6 Mbps Receiver Sensitivity IEEE 802 11b Sensitivity 8 Packet Error Rate IEEE 802 119 Sensitivity 10 Packet Error Rate 54Mbps 72dBm 48Mbps 73dBm 36Mbps 77dBm 24Mbps 81dBm 18Mbps 84dBm 12Mbps 86dBm 9Mbps 88dBm 6Mbps 89dBm 11Mbps 88dBm 5 5Mbps 90dBm 2Mbps 92dBm 1Mbps 95dBm 11Mbps 88dBm 5 5Mbps 90dBm 2Mbps 92dBm 1Mbps 95dBm Modulation IEEE 802 11b DSSS e 5 5 11 Mbps CCK e 2 Mbps DOPSK e 1 Mbps DBPSK IEEE 802 11g OFDM DSSS 48 54 Mbps QAM 64 24 36 Mbps CAM 16 12 18 Mbps QPSK 6 9 Mbps BPSK 5 5 11Mbps CCK 2Mbps DOPSK 1Mbps DBPSK Operating Frequency e USA FCC 2 412GHz 2 462 GHz CH1 CH11 e Europe ETSI 2 412 GHz 2 472 GHz CH1 CH13 Japan TELEC 11b 2 412 GHz 2 484 GHz CH1 CH14 11g 2 412 GHz 2 472 GHz CH1 CH13 LED Definition Item Specification ON Red Power on Power Off No power On Yellow Connected RF WLAN Off Not connected Blinking Green Connected and transmitting On Green Connected LAN Off Not connected Blinking Green Connected and transmitting Blinking left to l Received Signal Strength right Not connected Scanning for AP Indicator RSS Connected indicating Received Signal On Strength Software Specification Item Specification e Universal Bridging e MAC Address Cloning Bridge
5. e TELETRONICS INTERNATIONAL IN E TT5800 TT2400 User Manual C 802 11a 200mW 802 11b g 200mW Table of Contents Diselamers sonne Ba kean 3 Introduction s5vssv ss sans ss sss vasa sx as g 5 a 25 99 a 3 r 3 9402 R 9925039992 d Product 91T 5 Product Specifications un 5 S 11 ls u 10 Configuring windows for IP Networking ss sss sss sss ss sse sse esec esc esc ss ses 11 Web Configuration Interface 13 Client Bridge Mode une 13 Access Point Mode an 30 Appendix A Warranty Policy nn 50 Appendix B RMA P lley u 51 Appendix C Regulatory Information scscscscsscscscsccscscscccsssees 52 Appendix D Contact Information sss ss sss sss sese sse esse esse sse esse enes ees 54 Appendix E WDS Explained sai css nee 55 Appendix F TT2400 TT5800 Upgrade FAQ csssscscscecccsescssseees 57 Appendix G Antenna Diversity sss sse ss esse ess esse essen enean ro 59 Appendix H Troubleshooting ss sss sss sss esse sss sse esse esse eaea ea ees 60 Appendix I Key Requirement Charts sss sss sees sse esen esse 61 Appendix J GIOSSOTV uni 62 Disclaimers No part of this documentation may be reproduced in any form or by any means or used to make any derivative work such as translation transformation or adaptation without written permission from the copyright owner All other trademarks and registered trademarks are the property of their respective owners Statement of Conditions We may m
6. 4 Check the LEDs on the TT5800 TT2400 to confirm if the status is okay At this point the Power PWR LED indicator should be red and Ethernet LAN LED should be green The RF light should light up once the unit is associated wirelessly with another wireless device However at this point the unit is still in factory default setting so do not be alarmed that the WLAN light doesn t light up 5 Now the hardware installation is complete and you may proceed to the next chapter Configuring Windows for IP Networking for instructions on setting up network configurations 10 Configuring Windows for IP Networking To establish a communication link between your PC and TT5800 TT2400 you will need to set up a static IP address for your computer first This section helps you configure the network settings for your operating system Please follow the procedures below to complete the settings Windows XP 1 Click Start on the taskbar and from the Control Panel choose Network Connections Right click the Local Area Connection icon and then choose Properties from the menu You should see the Local Area Connection Properties dialog box shown below mee yes yoy Curisetiog HR TU UST tls General Authentication Advanced Connect using BB Realtek RTL8139 810x Family Fast This connection uses the following items AF Microsoft TCP IP version 6 AF AEGIS Protocol IEEE 802 1 v3 2 0 3 T Internet Protocol TCP IP
7. 10 hex digits into each key box For 128 bit keys you must enter 26 hex digits into each key box A hex digit is either a number from O to 9 ora letter from A to F If you leave a key box blank then this means a key of all zeros Enable WEP Default WEP key to use 4uthentication WEP key lengths WEP key 1 WEP key 2 WEP key 3 WEP key 4 m Check this box to enable WEP For the most secure use of WEP also set the authentication type to Shared Key when WEP is enabled WEP Key 1 Select the key to be used as the default key Data transmissions are always encrypted using the default key The other keys can only be used to decrypt received data Open Select the type of authentication used when connecting to stations Open is used if anyone can connect to this device Shared key is used if both devices must know the encryption key 64 bit 10 hex digits Select the WEP key size This length applies to all keys Cancel 37 WPA Configuration Short for Wi Fi Protected Access WPA is a Wi Fi standard that was designed to improve upon the security features of WEP WPA has the following improvements over WEP Improved data encryption through temporal key integrity protocol TKIP TKIP scrambles the keys using a hashing algorithm By adding an integrity checking feature TKIP ensures that keys have not been tampered with User authentication through the Extensible Authentica
8. 2 pe WEP key 3 fe WEP key 4 pm Save Cancel 19 WPA Configuration Short for Wi Fi Protected Access WPA is a Wi Fi standard that was designed to improve upon the security features of WEP WPA has the following improvements over WEP Improved data encryption through temporal key integrity protocol TKIP TKIP scrambles the keys using a hashing algorithm By adding an integrity checking feature TKIP ensures that keys have not been tampered with User authentication through the Extensible Authentication Protocol EAP WEP regulates access to a wireless network based on a computer s hardware specific MAC address which is relatively simple to be sniffed out and stolen EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network WPA Enable This option enables the WPA Authenticator Note that any client that does not support the WPA standard will not be able to handshake authenticate with a WPA enabled device WPA Mode WPA O WPA2 Designed to secure present and future versions of IEEE 802 11 devices WPA is a subset of the IEEE 802 11i specification WPA addresses all known vulnerabilities in WEP WPA also provides user authentication since WEP lacks any means of authentication WPA replaces WEP with a strong new encryption technology called Temporal Key Integrity Protocol TKIP with Message Integrity Check MIC It also provides a scheme of mutual a
9. 802 11a 5 GHz mini PCI card Specification Description Chipset MAC BB Processor Atheros AR5213 RF Chip Atheros AR5112 Power Consumption IEEE 802 11a TX 1000 mA RX 400 mA Antenna Connector N type Female Output Power 16dBm 2dB 17dBm 2dB 18dBm 2dB 54Mbps 48Mbps 36Mbps 6 Mbps 19dBm 2dB YS wae wa wa Receiver Sensitivity IEEE 802 11a Sensitivity 10 Packet Error Rate 54Mbps 70dBm 48Mbps 71dBm 36Mbps 75dBm 24Mbps 79dBm 18Mbps 82dBm 12Mbps 84dBm 9Mbps 86dBm 6Mbps 87dBm Modulation IEEE 802 11a OFDM 48 54 Mbps QAM 64 24 36 Mbps QAM 16 12 18 Mbps QPSK 6 9 Mbps BPSK Operating Frequency e USA FCC 5 15GHz 5 25GHz 5 25GHz 5 35GHz 5 47 GHz 5 725 GHz 5 725 GHz 5 825 GHz e Europe ETSI 5 15 GHz 5 35 GHz 5 47 GHz 5 725 GHz e Japan TELEC 5 15 GHz 5 25 GHz IEEE 802 11b g 2 4 GHz mini PCI card Specification Description Chipset MAC BB Processor Atheros AR5213 RF Chip Atheros AR5112 Power Consumption IEEE 802 11b TX 1500 mA RX 400 mA IEEE 802 11g TX 1500 mA RX 400 mA Antenna Connector U FI R SMT Inside N type Female Outside Output Power IEEE 802 11b e 22dBm 3dB 1Mbps e 22dBm 3dB 2Mbps e 22dBm 3dB 5 5Mbps s 22dBm 3dB 11Mbps IEEE 802 11g e 21dBm 3dB 54Mbps e 22dBm 3dB 48Mbps e 22dBm
10. AES AES satisfies U S government security requirements It has been adopted as an official government standard by the U S Department of Commerce and the National Institute of Standards and Technology NIST Organizations that require the AES encryption available in WPA2 should be aware that upgrading to it may require new hardware Section II of this document offers a roadmap for organizations planning to upgrade to WPA2 Considerations for its deployment are outlined in Section II 20 Cipher Type e TKIP o Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1 1 that fixes known security problems in WEP s implementation of the RC4 stream cipher TKIP scrambles the keys using a hashing algorithm and by adding an integrity checking feature ensures that the keys haven t been tampered with e AES o Advanced Encryption Standard Rijndael Cypher is the U S government s next generation cryptography algorithm which will replace DES and 3DES AES works at multiple network layers simultaneously AES Supports 128 192 and 256 bit keys Unlike the older standard AES and 802 11i WEP version 2 are based on 32bit processing e TKIP and AES o If clients support both the TKIP and AES standards then this would be the strongest cipher type to use that combines both TKIP and AES security PSK PSK stands for Pre Shared Key and serves as a password User may key in 8 to 63 characters string to set the password and activate 8
11. Channel 58 5 290 Channel 152 5 760 Channel 160 5 800 35 WDS Wireless Distribution System WDS Wireless Distributiomr ystem WDS when WDS is enabled this access point functions as a wireless repeater and is able to wirelessly communicate with other APs Please note that WDS is incompatible with WPA both features can not be used at the same time You can specify the MAC addresses of up to six other WDS capable APs Enable WDS Check this box to enable this access point to communicate with other APs over WDS links AP MAC address 1 AP MAC address 2 AP MAC address 3 L AP MAC address 4 AP MAC address 5 BE AP MAC address 6 Save Cancel Enable WDS The Wireless Distribution System Repeater functionality enables this AP to support wireless traffic to other WDS relay Access Points In other words it is like bridging between the 2 access points in order to extend the reach of the wireless network beyond that of a single AP By enabling the WDS feature the coverage area of the wireless network is thus extended for authenticated client devices that can roam from this Access Point to another WDS can extend the reach of your network into areas where cabling might be difficult The TT5800 TT 2400 in Access Point mode can support up to 6 other Access Points for WDS communication Enter the MAC Address of other Access Points in the area that you want to add to the WDS The MAC Address
12. Features e RTS Threshold Fragmentation Threshold e Infrastructure or Ad Hoc Mode e Non IP Traffic Bridging s 64 Bit 128 Bit WEP Encryption e WPA Personal Using TKIP or AES Security Features e WPA Enterprise Using TKIP or AES y e 802 1x Authenticator e Cisco LEAP Support e MAC Address Filter e Web Access Username Password Protected e Static IP ianagement Feat res e Automatic Device Discovery amp Configuration g e SNMP v1 DHCP and PPPoE Ethernet or Wireless e Firmware Upgrade via Web Browser e Transmit Power Adjustment External AC Power Adapter ltem Specification Input Voltage 110 240VAC Line Frequency 50 60Hz Power Output to M B 48VDC 1A Environmental Item Specification 20 C to 40 C 4 F to 104 F Operating lemper ature 10 to 90 non condensing 25 C to 70 C 13 F to 158 F SOO Temperature 10 to 90 non condensing Standards Regulatory Compliance e CE FCC Product Kit Part Listing TT5800 802 11a PCBA or TT2400 802 11b g PCBA 1 IEEE 802 11a o r IEEE 802 11b g mini PCI radio card 1 Power over Ethernet Injector 1 48VDC Power Adapter 1 Ethernet Cable 2 Waterproof RJ 45 Connector 1 Mounting Hardware 1 User Manual ONOORWN gt Note If any item listed above is damaged or missing please contact your dealer immediately System Requirements Any desktop or laptop with an Ethernet interface TCP IP protocol suite installed Standard CAT5 Et
13. Filters are schemes which only allow specified data to be transmitted For example the router can filter specific IP addresses so that users cannot connect to those addresses Firmware Programming inserted into programmable read only memory thus becoming a permanent part of a computing device Fragmentation Refers to the breaking up of data packets during transmission Gateway Is the place where two or more networks connect IBSS Independent Basic Service Set See ad hoc network Infrastructure Mode When a wireless network functions in infrastructure mode every user communicates with the 62 network and other users through an access point this is the typical way corporate WLANs work An alternative is ad hoc mode but users would have to switch to infrastructure mode to access a network s printers and servers ISP An ISP is an organization providing Internet access service via modems ISDN Integrated Services Digital Network and private lines LAN Local Area Network A group of computers and peripheral devices connected to share resources MAC Medium Access Control Address A unique number that distinguishes network cards MTU MTU Maximum Transmission Transfer Unit is the largest packet size that can be sent over a network Messages larger than the MTU are divided into smaller packets NAT NAT Network Address Translation also known as IP masquerading enables an organization to present itself to the Internet w
14. NOTE You may need to reload this page to see new changes MAC address SSID Channel Security Mode Rate Signal 0060B3E94DSE teletronics 165 None 802 11a 1Mbps 81dBm OO60B344EDA4 teletronics 161 None 802 11a 1Mbps 88dBm D060B344EE4D teletronics 40 None 802 113 1Mbps 89dBm 0050B344EE1F teletronics 161 None 802 11a 1Mbps 70dBm The APs section displays available hotspots in the area along with the MAC address SSID Channel Wireless mode signal strength and transmission rate for each access point 14 Wireless N TELETRONICS INTERNATIONAL INC TT5800 Basic Wireless On this page you can configure the basic 802 11a g wireless settings Any new settings will not take effect until the bridge is rebooted ns O on O off Enable Disable wireless port Wireless Mode Infrastructure Ad hoc Select Infrastructure to connect to a wireless AP Access Point select Ad hoc to connect to another bridge or wireless station Wireless SSID This is the name of the wireless access point that this staion will associate to Leave this field blank to associate to any access point This is the MAC address of the Access point which subscriber unit is forced to associate with Leave this field blank to associate to any access point with the same SSID Please input MAC address like this format OOODF5123456 Transmission rate Mbits s Best automatic This is the speed at which the device will transmit data Normally you
15. What does the prefixed Alphabet mean from version 3 9 x or later You probably notice the new version name changed to Cx x x since C3 9 0 and C3 9 1 The prefix C means the firmware is to be upgraded on hardware revisions V3 0 and V5 0 0 In the future we ll use prefix D for our next hardware revision to distinguish between hardware revisions Important Activation Key might be needed when upgrading to a higher firmware version Check the key requirement chart below and get the activation key first before proceeding with the firmware upgrade Do I need an Activation Key for new firmware Please check the key requirement chart How to get the activation key Please use our online help desk to submit a key request ticket You may need to include the following information Purchase Number Purchase Date Serial No MAC Address Current Firmware version Firmware version to be upgraded SH Qn EU M A Or you may send all activation key requests to keyrequest teletronics com All you have to provide in the email will be the model of the unit and the MAC address Is there a fee for the activation key Right now we don t charge our customer for firmware upgrade or switching between AP and SU Bridge mode 57 Will upgrade keep my previous configuration Although the upgrade might keep your previous configuration we suggest customer to reset the unit to factory default located in admin section and configure it again 5
16. can adjust the beacon interval usually measured in milliseconds ms or its equivalent kilo microseconds KHsec 28 802 11d 802 11d is a wireless network communications specification for use in countries where systems using other standards in the 802 11 family are not allowed to operate The 802 11d specification is well suited for systems that want to provide global Roaming ACK Timeout ACK Timeout 200 The value is used for ack time out adjustment It is usefull for the long distance application Following is a reference table for the ack timeout value and distance ack timeout SCH zacz 0 Antenna selection Use antenna 1 Select antenna of non MiMo radios for testing The valid values are Ofauto switching 1 antenna 1 and Z antenna 2 Save Cancel When a packet is sent out from 802 11 Station A it will wait for an ACKnowledgement frame from 802 11 Station B Station A will only wait for a certain amount of time ACK timeout or ACK window Ifthe ACK is NOT received within that timeout period then the packet will be re transmitted from Station A resulting in reduced throughput When sending LOTS of packets as in 802 11g and 802 11a the constant re transmission could cost severe performance degradation due to the ACK frame not making it back to 802 11 Station A in time This will have a dramatic impact on the throughput of the link regardless of the quantity of signal strength and good receiver sensitivity
17. o Temporal Key Integrity Protocol is an upgrade to the WEP known as WEP 1 1 that fixes known security problems in WEP s implementation of the RC4 stream cipher TKIP scrambles the keys using a hashing algorithm and by adding an integrity checking feature ensures that the keys haven t been tampered with e AES o Advanced Encryption Standard Rijndael Cypher is the U S government s next generation cryptography algorithm which will replace DES and 3DES AES works at multiple network layers simultaneously AES Supports 128 192 and 256 bit keys Unlike the older standard AES and 802 11i WEP version 2 are based on 32bit processing e TKIP and AES o If clients support both the TKIP and AES standards then this would be the strongest cipher type to use that combines both TKIP and AES security PSK PSK stands for Pre Shared Key and serves as a password User may key in 8 to 63 characters string to set the password and activate 802 1x Authentication Note that the same password must be used at both ends of the communication link access point and client end WPA Group Key Update Interval The Group Key Group Transient Key is a shared key among all Supplicants connected to the same AP and is used to secure multicast broadcast traffic It is not used for normal unicast traffic A pair wise Transient Key secures the unicast traffic Group Key renewal controls how often the Group Transient Key is changed The Group Key renewal does not cont
18. of this Access Point should be also be added to other access points in the same WDS network to enable intra AP communication Please Consult Appendix E on page 55 for further information 36 Security Security and Encryption Settings On this page you can set the 802 11a g security and encryption options Any new settings will not take effect until the device is rebooted WPA configuration Enable WPA Authenticator to require stations to use high grade encryption and authentication WPA Enable wWPA Mode Cipher Type PSK WPA Group Key Update Interval IF WPA Select the WPA Mode TKIF Select the cipher type pas Enter a text pass phrase between 8 and 63 characters Leave blank to enable 802 1 Authentication 3600 seconds 802 1 configuration when 802 1 authentication is enabled then the AP will authenticate clients via a remote RADIUS server 802 1 enabled Authentication timeout mins RADIUS server IP address RADIUS server port number RADIUS server shared secret MAC Address Authentication RADIUS server IP address RADIUS server port number RADIUS server shared secret MAC Address Authentication 1812 radius_shared ge 1 radius_sh red WEP configuration WEP is the wireless encryption standard To use it you must enter the same key s into the access point and all stations that associate to it For 64 bit keys you must enter
19. older firmware 3 6 x or lower You might need an activation key for older firmware Please check the upgrade guide released with the older firmware Do I need an Activation Key after swapping out with another radio card Yes if the radio card is swapped out with another card an activation key will still be required This rule will apply to all radio cards swapped out with a different MAC address from the original card Which firmware to upgrade Currently there are two PCB Hardware revisions V3 0 and V5 0 0 both have 4MB Flash on the board However the old firmware 3 1 x released for our first batch back in year 2005 utilized 2MB flash only while the firmware 3 2 x or above utilized the whole 4MB flash The firmware revision 3 1 X and 3 2 X or above are not interchangeable due to the different flash size utilization If you received boards by default with firmware 3 1 X then you have the 2M version If you received boards by default with firmware 3 2 X or above then you have the 4M version If you were to upgrade a 4M unit with a 2M firmware the unit will show no change after the flashing process For each release we publish 2 series of firmware one for 2M version and one for 4M version Function and performance wise there s no difference between these two So the customer with 2M version will continue to enjoy the latest feature upgrades and bug fixes For instance 3 1 70 is the 2M version while the counterpart 4M version is 3 7 0
20. should select best here although if your wireless network is unusually noisy or quiet you may wish to use a fixed low or high rate Note that the actual TX rate values in brackets is doubled for turbo mode 802 11 Mode 802 11a only This setting controls the types of 802 11 wireless clients or stations that can connect to this AP RF TX power mo w Select TX power The valid range is 0 30 0 1000mw in unit of dBm The actual TX power may be limited by your radio card model number Example for 200mw version use 23 dbm Super mode Disabled E Select super mode Country amp 1 _ Region united states Region 4 Select the proper country or region where this device is installed Channel 5 805 GHz CH 161 v This is the radio channel that the access point will use Note that 802 11g and 802 11b use only 2 4 GHz channels and 802 114 uses only 5 GHz channels DISCLAIMER Each device should be configured to use the proper regional setting that does NOT violate the radio regulatory at the installed location Teletronics takes NO responsibility of misusing the regional settings If you find the local radio regulatory differs with teletronics region channel list please email your findings to support teletronics com thanks Cancel 15 Wireless On Off This is the on off switch of the radio card Wireless Mode Infrastructure An 802 11 networking framework in which devices communicate with each oth
21. 02 1x Authentication Note that the same password must be used at both ends of the communication link access point and client end WEP Configuration Short for Wired Equivalent Privacy a security protocol for wireless local area networks WLANs defined in the 802 11b standard WEP is designed to provide the same level of security as that of a wired LAN Enable WEP To enable the WEP Authenticator Default WEP key to use e WEP Key 1 4 Select the key to be used as the default key Data transmissions are always encrypted using the default key The other keys can only be used to decrypt received data Authentication e Open Open system authentication involves a two step authentication transaction sequence The first step in the sequence is the identity assertion and request for authentication The second step in the sequence is the authentication result If it is successful the station shall be mutually authenticated Open system authentication does not provide authentication It provides identification using the wireless adapter s MAC address Open system authentication is used when no authentication is required It is the default authentication algorithm Open system authentication uses the following process 1 The authentication initiating wireless client sends an IEEE 802 11 authentication management frame that contains its identity 2 The receiving wireless AP checks the initiating station s identity and sends back an a
22. 5 255 255 0 fi 92 168 10 1 This is the IP address of the gateway that connects you to the internet The factory default is 192 168 1 1 User name Administrator password This is the user name that you must type when logging in to these web pages This is the password that you must type when logging in to these web pages You must enter the same password into both boxes for confirmation 43 Device Name Device Name This is the name that the Access Point will use to identify itself to external configuration and IP address programs This is not the same as the SSID It is okay to leave this blank if you are not using these programs SNMP Setting SNMP enabled Option to enable or disable SNMP support Community The SNMP Read only Community string is like a user id or password that allows access to a router s or other device s statistics InterMapper sends the community string along with all SNMP requests If the community string is correct the device responds with the requested information If the community string is incorrect the device simply discards the request and does not respond Factory default setting for the read only community string is set to public It is standard practice to change all the community strings so that outsiders cannot access read information about the internal network In addition the administrator may also employ firewalls to block any SNMP traffic to ports 161 and 162 on the inter
23. 8 Appendix G Antenna Diversity Latest firmware provides Choose Antenna option This new feature has been incorporated into versions 3 1 4x and 3 4 x There are 3 options Diversity Use Antenna 1 and Use Antenna 2 If the wireless frequency in the area is very crowded there will be lots of interference Using the default Diversity option might not be the best option to achieve optimal performance Please configure Use Antenna 2 for TT2400 and Use Antenna 1 for TT5800 to force the cards to use only those ports at all times for both RX and TX operations This will under most cases give you extra output power and receive sensitivity Ensure that the U FL cable adapter for the MiniPCI radio card is connected properly matching the antenna number you selected Please use the following pictures to identify antenna port numbers Antenna 2 Antenna 1 Antenna 1 TT2400 802 11G MiniPCI Card TT5800 802 11A MiniPCI Card Teletronics TT2400 TT5800 Antenna Selection TT2400 shipped with 3 4 x firmware or earlier Use Antenna 2 TT2400 shipped with 3 5 x firmware or later Use Antenna 1 TT5800 Use Antenna 1 only How to identify the physical radio port Make sure also that U FL cable adapter for the MiniPCI radio card is connected properly matching the antenna number you selected Please use the following picture to identify antenna port number Note Using the wron
24. CC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with instructions may cause harmful interference to radio communication However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to overcome the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help The equipment is for home or office use Important Note FCC RF Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with a minimum distance of 20cm between the antenna and your body and must not be co located or operated in conjunction with any other antenna or transmitter Caution Changes or modifications not expressly approved by the party responsible for compliance could void the user s auth
25. IP address of the syslog daemon 192 168 10 1 server Ping Watchdog Utility Ping Watchdog o Utility enabled It is the option to enable the Ping Watchdog Utility Destination IP address of the Ping 192 168 10 1 Watchdog Utility Security This section is used to set up the administrative login name and password User name This is the user name that you must type when logging into the web interface Administrator Password This is the password that you must type when logging into the web interface You must enter the same password into both boxes for confirmation Syslog Syslog Enabled Option to enable or disable Syslog support Syslog Daemon Server The Syslog server IP address input box Ping Watchdog Utility Ping Watchdog Utility Enabled If enabled the Ping Watchdog utility tracks the TCP IP link between this device and another remote destination at the other end of the wireless link When the remote destination is unreachable loss of connection the Ping Watchdog Utility will reboot the unit in an attempt to re establish the connection When the TT is up for 2 minutes the ping watchdog utility will start to ping the remote network device every 20 seconds if there is no icmp response for 3 times in a row then the ping watchdog will kick off the reboot action Destination IP address of the Ping Watchdog Utility This is the IP address of the remote destination 25 Device Control This section has func
26. ake improvements or changes in the product described in this documentation at any time The information regarding the product in this manual is subject to change without notice We assume no responsibility for errors contained herein or for direct indirect special incidental or consequential damages with the furnishing performance or use of this manual or equipment supplied with it even if the suppliers have been advised about the possibility of such damages Electronic Emission Notices This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device must accept any interference received including interference that may cause undesired operation FCC INFORMATION The Federal Communication Commission Radio Frequency Interference Statement includes the following paragraph The equipment has been tested and found to comply with the limits for a Class B Digital Device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment usage generates radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication However there is no grantee that interference will not occur in a particular installation If this equipment does cause harmful interference to rad
27. beacon again The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon Network managers can adjust the beacon interval usually measured in milliseconds ms or its equivalent kilo microseconds KHsec DTIM interval A Delivery Traffic Indication Message DTIM is a signal sent as part of a beacon by an access point to a client device in sleep mode alerting the device to a packet awaiting delivery A DTIM interval also known as a Data Beacon Rate is the frequency at which an access points beacon will include a DTIM This frequency is usually measured in milliseconds ms or its equivalent kilo microseconds Kusec 802 11d 802 11d is a wireless network communications specification for use in countries where systems using other standards in the 802 11 family are not allowed to operate The 802 11d specification is well suited for systems that want to provide global roaming ACK Timeout ACK Timeout 200 The value is used for ack time out adjustment It is usefull for the long distance application Following is a reference table for the ack timeout value and distance eG Gem det dear p 5m 5 M S 10k R EJ 20km 160 89 174 25km 203 219 30km 249 7 a R S a Use antenna 1 Select antenna of non MiMo radios for testing The valid values are D auto switching 1 antenna 1 amd 2 antenna 2 48 When a packet is sent ou
28. campuses WEP key lengths 64 bit 10 Hex Digit WEP Key type 64 bit WEP with 5 characters 64 bit WEP with 10 hexadecimal digits 0 9 A F 128 bit 26 Hex Digit WEP Key type 128 bit WEP with 13 characters 128 bit WEP with 26 hexadecimal digits 0 9 A F Example Key1 2e3f4 Key2 5y7js Key3 24fg7 Key4 98jui Key1 123456789A Key2 23456789AB Key3 3456789ABC Key4 456789ABCD Example Key1 2e3f4w345ytre Key2 5y7jse8r4i038 Key3 24fg70okx3fr7 Key4 98jui2wss35u4 Key1 112233445566778899AABBCDEF Key2 22334455667 78899AABBCCDDEE Key3 3344556677889900AABBCCDDFF Key4 44556677889900AABBCCDDEEFF 41 Access Access Control On this page you can enable Access Control If enabled only the MAC addresses entered into the MAC address boxes are allowed to associate to this AP Note that you can cut and paste the addresses from the Station List page into the MAC address boxes Any new settings will not take effect until the device is rebooted Enable access control N E Check this box to enable access control MAC address 1 MAC address 2 MAC address 3 MAC address 4 MAC address 5 MAC address 6 MAC address 7 MAC address 8 MAC address 9 MAC address 10 Access Control Enable access control If enabled this feature allows you to associate up to 64 different units devices by MAC addresses Any MAC addr
29. e actual TX rate values in brackets is doubled for turbo mode 802 11 Mode 802 11a only This setting controls the types of 802 11 wireless clients or stations that can connect to this AP Super mode Disabled Select super mode Adaptive Radio E Selection Check this box to enable Adaptive Radio feature in Dynamic Turbo mode when this feature is enabled Access Point stays out of turbo mode whenever it detects any non turbo traffic on adjacent channels Auto Channel Select Oo Check this box to enable Access Point to automatically select the best channel at start up This may take upto 20 seconds and no clients will be able to associate during this period Select TX power The valid range is 0 30 0 1000mw in unit of dBm The actual TX power may be limited by your radio card model number Example for 200mw version use 23 dbm Country amp R z A Region united states Region 4 B Select the proper country or region where this device is installed Channel 5 805 GHz CH 161 This is the radio channel that the access point will use Note that 802 119 and 802 11b use only 2 4 GHz channels and 802 11a uses only 5 GHz channels DISCLAIMER Each device should be configured to use the proper regional setting that does NOT violate the radio regulatory at the installed location Teletronics takes NO responsibility of misusing the regional settings If you find the local radio regulatory differs with t
30. e default key Data transmissions are always encrypted using the default key The other keys can only be used to decrypt received data Authentication e Open Open system authentication involves a two step authentication transaction sequence The first step in the sequence is the identity assertion and request for authentication The second step in the sequence is the authentication result If it is successful the station shall be mutually authenticated Open system authentication does not provide authentication It provides identification using the wireless adapter s MAC address Open system authentication is used when no authentication is required It is the default authentication algorithm Open system authentication uses the following process 1 The authentication initiating wireless client sends an IEEE 802 11 authentication management frame that contains its identity 2 The receiving wireless AP checks the initiating station s identity and sends back an authentication verification frame 3 With some wireless APs you can configure the MAC addresses of allowed wireless clients However configuring the MAC address does not provide sufficient security because the MAC address of a wireless client can be spoofed e Shared Key Shared key authentication supports authentication of stations as either a member of those who know a shared secret key or a member of those who do not Shared key authentication is not secure and is not rec
31. ed from a reseller or distributor you must contact them directly for return instructions 2 Damaged items as a result of misuse neglect or improper environmental conditions 3 Products purchased directly from Teletronics more than 30 days prior to a product return request To return any product under 1 year warranty for repair replacement follow the RMA procedure 51 Appendix C Regulatory Information Statement of Conditions We may make improvements or changes in the product described in this documentation at any time The information regarding the product in this manual are subject to change without notice We assume no responsibility for errors contained herein or for direct indirect special incidental or consequential damages with the furnishing performance or use of this manual or equipment supplied with it even if the suppliers have been advised of the possibility of such damages Electronic Emission Notices This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference 2 This device must accept any interference received including interference that may cause undesired operation FCC Information The Federal Communication Commission Radio Frequency Interference Statement includes the following paragraph The equipment has been tested and found to comply with the limits for a Class B Digital Device pursuant to part 15 of the F
32. ed to an Xbox or if there is only one Ethernet device connected to the Bridge When multiple Ethernet devices are connected to the Bridge it may not be obvious which MAC Address is being used If set to WLAN Card the MAC Address of the WLAN Card typically written on the back of the card will be used When multiple Ethernet devices are connected to the Bridge the MAC Address of the Bridge will not change Advanced wireless Fragmentation threshold 2346 Transmitted wireless packets larger than this size will be fragmented to maintain performance in noisy wireless networks The valid range is 256 65535 Values larger than about 1560 will prevent fragmentation from taking place RTS threshold 2346 Transmitted wireless packets larger than this size will use the RTS CTS protocol to a maintain performance in noisy wireless networks and b prevent hidden nodes from degrading performance The valid range is 1 65535 Values larger than about 1560 will prevent RTS CTS from taking place Beacon period ho In adhoc mode beacons are sent out periodically This is the number of milliseconds between each beacon The valid range is 20 1000 802 11d E Check this box to enable support for receiving regional information from the access point The value is used for ack time out adjustment It is usefull for the long distance application Following is a reference table for the ack timeout value and distance selector select
33. eless WDS Security Access Admin Advanced Detailed information on each section is provided below Stations Associations This is a list of MAC addresses of stations that have associated to the access point NOTE You may need to reload this page to see new changes N Total 0 stations associated MAC address Mode Rate Signal StationIdleTime The Stations section will display all the associated clients along with the MAC address and basic RF related information on the Mode Rate Signal and StationldleTime for each associated client 31 Wireless TELETRONICS gt INTERNATIONAL INC 115800 Basic Wireless On this page you can configure the basic 802 11a g wireless settings Any new settings will not take effect until the device is rebooted enn on O orr Enable Disable wireless port Halala O Visible O Invisible When Invisibility is selected this device will not broadcast its SSID in the beacons so that each wireless client needs to explicitly know and use the SSID Wireless Network Name Wireless Network Name teletron cs SSID This is the wireless network name of this device Stations that associate to this device should know this name Transmission rate Mbits s Best automatic This is the speed at which the device will transmit data Normally you should select best here although if your wireless network is unusually noisy or quiet you may wish to use a fixed low or high rate Note that th
34. eletronics region channel list please email your findings to support teletronics com thanks 32 Wireless On Off Enable or disable the wireless port Wireless Network Name SSID Network Name is also known as SSID which stands for Service Set Identifier This is where you re going to setup the Service Set Identifier name for this AP Remember that the SSID is cap sensitive just like the password Visibility Status This controls the SSID broadcasting function If enabled the SSID will be broadcasted to all wireless clients in the area If disabled wireless clients will not be able to pickup the SSID but must explicitly know the SSID of the unit in order to associate The recommended practice is to set the visibility status to invisible after setting up the wireless network Transmission rate Mbits s This option indicates the transmission rate of the bridge Specify the rate according to the speed of your wireless network from the list Most of the time the default setting Best automatic should be selected for best performance The setting can be adjusted manually if the link quality and signal strength are unusually low or high to get the best performance 802 11 Mode Wireless mode allows the user to select whether this Access Point will connect to an 802 11b only network an 802 119 only network an 802 11a only network or both b g networks For b or g only wireless devices on the network selecting 802 11b or 802 11g on
35. ential damages so the above exclusion or limitation may not apply to you This warranty gives you specific legal rights and you may also have other rights that vary from state to state 50 Appendix B RMA Policy Product Return Policy It is important to us that all Teletronics products are bought with full confidence If you are not 100 satisfied with any product purchased from Teletronics you may receive a prompt replacement or refund subject to the terms and conditions outlined below IMPORTANT Before returning any item for credit or under warranty repair you must obtain a Return Merchandise Authorization RMA number by filling out the RMA form Products will not be accepted without an RMA number All products being shipped to Teletronics for repair refund exchange must be freight prepaid customer pays for shipping For all under warranty repair replacement Teletronics standard warranty applies 30 Day full refund or credit policy 1 Product was purchased from Teletronics no more than 30 day prior to the return request 2 All shipping charges associated with returned items are non refundable 3 Products are returned in their original condition along with any associated packaging accessories mounting hardware and manuals Any discrepancy could result in a delay or partial forfeiture of your credit Unfortunately Teletronics cannot issue credits for 1 Products not purchased from Teletronics directly If you purchas
36. equivalent kilo microseconds Kmsec BSS Basic Service Set When a WLAN is operating in infrastructure mode each access point and its connected devices are called the Basic Service Set BSSID The unique identifier for an access point in a BSS network See SSID for more details DHCP DHCP Dynamic Host Configuration Protocol software automatically assigns IP addresses to client stations logging onto a TCP IP network which eliminates the need to manually assign permanent IP addresses DSSS Direct Sequence Spread Spectrum Method of spreading a wireless signal into wide frequency bandwidth Dynamic IP Address An IP address that is automatically assigned to a client station in a TCP IP network typically by a DHCP server DNS Domain Name System System used to map readable machine names into IP addresses DTIM DTIM Delivery Traffic Indication Message provides client stations with information on the next opportunity to monitor for broadcast or multicast messages DTIM interval A DTIM interval also known as a Data Beacon Rate is the frequency at which an access point s beacon will include a DTIM This frequency is usually measured in milliseconds ms or its equivalent kilo microseconds Kmsec ESS Extended Service Set ESS is the collective term for two or more BSSs that use the same switch in a LAN ESSID Extended Service Set Identifier An ESSID is the unique identifier for an ESS See SSID for more details Filter
37. er by first going through an Access Point AP Ad hoc An 802 11 networking framework in which devices or stations communicate directly with each other without the use of an access point AP Use this mode if there is no wireless infrastructure or where services are not required Wireless Network Name SSID Network Name is also known as SSID which stands for Service Set Identifier Any client in Infrastructure mode has to indicate the SSID of an Access Point to access a service such as internet access through the Access point Access Point Identifier BSSID The Basic Service Set Identifier is the unique identifier MAC address of an access point in a Basic Service Set BSS network The subscriber unit is forced to associate with this particular unit if there are multiple access points in the network Transmission rate Mbits s This option indicates the transmission rate of the bridge Specify the rate according to the speed of your wireless network from the list Most of the time the default setting Best automatic should be selected for best performance The setting can be adjusted manually if the link quality and signal strength are unusually low or high to get the best performance 802 11 Mode Wireless mode allows the user to select whether this subscriber unit will connect to an 802 11b only network an 802 11g only network an 802 11a only network or both b g networks For b or g only wireless devices on the network selec
38. essential requirements under article 3 2 of the R amp TTE Directive EN 301 489 1 V1 4 1 2002 EN 301 489 17 V1 2 1 2002 Electromagnetic compatibility and radio spectrum matters ERM electromagnetic compatibility EMC standard for radio equipment and services Part 1 Common technical requirements Part 17 Part 17 Specific conditions for 2 4 GHz wideband transmission systems and5 GHz high performance RLAN equipment Warning According to ERC REC 70 30 appendix 3 National Restrictions annex 3 Band A RLANs and HIPERLANSs See list of 802 11b g restrictions for specific countries under the heading European Economic Area Restrictions as below English This product follows the provisions of the European Directive 1999 5 EC Danish Dette produkt er i overensstemmelse med det europ iske direktiv 1999 5 EF Dutch Dit product is in navolging van de bepalingen van Europees Directief 1999 5 EC Finnish Tama tuote noudattaa EU direktiivin 1999 5 EY m r yksi French Ce produit est conforme aux exigences de la Directive Europ enne 1999 5 CE 53 Appendix D Contact Information Need to contact Teletronics Visit us online for information on the latest products and updates to your existing products at http www teletronics com Can t find information about a product you want to buy on the web Do you want to know more about networking with Teletronics products Give us a call at 301 309 8500 or fax your reque
39. esses not programmed into the list will be prohibited from associating with this unit 42 Admin D TELETRONICS INTERNATIONAL INC Administration Device name Device name SNMP Setting SNMP enabled Read only community IP settings IP Address Mode Default IP address Default gateway Security TT5800 TT2400 On this page you can configure the IP address used by the Web server running on this device For static mode the IP address settings are given here For DHCP mode these settings are supplied by a DHCP server on your network You can also change the password reboot the device or reset all settings to their factory defaults If you have changed any settings itis necessary to reboot the device for the new settings to take effect OEM_AP This is the name that the device will use to identify itself to external configuration and IP address finding programs This is not the same as the SSID It is okay to leave this blank if you are not using these programs Iv Check this option if you need pull information from the bridge thru SNMP public Static DHCP Client Select DHCP to get the IP settings from a DHCP server on your network Select Static to use the IP settings specified on this page fi 92 168 10 240 Type the IP address of your device Default subnet mask 255 255 255 0 The subnet mask specifies the network number portion of an IP address The factory default is 25
40. g antenna port on the TT2400 will drastically lower your radio output power sometimes by as much as 20dBm 59 Appendix H Troubleshooting Symptom Can not access the TT5800 TT2400 through the web browser Resolution e Check that the IP address in the URL field is correct e Check your host computer IP address If the IP address of the TT5800 TT2400 is 192 168 10 241 then the host computer IP must set to the 192 168 1 X subnet e f using the PoE make sure that you re using the provided 48V power adapter Make sure that the TT5800 TT2400 is connected to the ODU side of the PoE The computer should be connected to the NET side of the PoE e Clear out all internet cache and cookies e Clear the ARP table by going into the dos prompt and type in the following arp d e Reset unit back to factory default by holding down the reset bottom for 10 seconds while the unit is powered on Symptom Forgot IP address Resolution If you forgot the IP address of the TT5800 TT2400 you can press reset button to restore the default factory settings by holding down the reset button for 10 seconds The factory default IP for Client Bridge mode is 192 168 10 241 and Access Point mode is 192 168 10 240 Symptom The web control interface graphics isn t showing up properly Resolution Due to many anti malware software on the market some features of these programs may disable certain IE functions which can then lead to pictures not being displayed co
41. hernet cables with RJ45 connectors Internet Explorer 5 0 or later Firefox 1 0 or higher Installation Preparation for Installation Always double check for any missing parts from the kit you received before deployment The next step is to set up the computer Ethernet interface for configuring the TT5800 TT2400 Since the default IP Address of the unit is on the 192 168 10 x IP range in both Client Bridge and AP mode you will need to set the Ethernet interface within the same IP range where x will have to be a free IP address number from 1 254 Check the following section Hardware Installation and the next chapter Configuring Windows for IP Networking to obtain complete details Hardware Installation Follow the procedure below to install your TT5800 TT2400 device 1 Select a suitable place on the network to install the TT5800 TT2400 For best wireless reception and performance the external antenna should be positioned within Line of Sight from the AP with proper alignment 2 Connect the TT5800 TT2400 to the ODU side of the PoE Injector via a straight Ethernet cable Cat 5 and then connect the NET side of the PoE Injector to either a computer or an Ethernet Switch Note The TT5800 TT2400 now fully supports the MDI MDI X standard and no longer requires the use of a cross over cable to connect directly with a computer 3 Connect the 48VDC power adapter to the power jack on the PoE injector to power on the TT5800 TT 2400
42. hreshold RTS Threshold is the frame size above which an RTS CTS handshake will be performed before attempting to transmit RTS CTS asks for permission to transmit to reduce collisions but adds considerable overhead Disabling RTS CTS can reduce overhead and latency in WLANs where all stations are close together but can increase collisions and degrade performance in WLANs where stations are far apart and unable to sense each other to avoid collisions aka Hidden Nodes If you are experiencing excessive collisions you can try turning RTS CTS on or if already on reduce RTS CTS Threshold on the affected stations 47 Burst time Maximum burst time is a feature based on the PRISM Nitro anew WLAN software solution that more than triples 802 11g throughput in a mixed mode environment and offers up to 50 percent greater throughput performance in 802 11g only networks PRISM Nitro is fully IEEE 802 11 compliant and uses prioritization algorithms and enhanced protection mechanisms to significantly increase wireless networking performance The recommended value for the maximum burst time for 11b or the mixed 11b g environment is 650 The 11g only mode uses the value 1400 Beacon Period In wireless networking a beacon is a packet sent by a connected device to inform other devices of its presence and readiness When a wirelessly networked device sends a beacon it includes with it a beacon interval which specifies the period of time before it will send the
43. io or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna s Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help The equipment is for home or office use IMPORTANT NOTE FCC RF Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with a minimum distance of 20cm between the antenna and your body and must not be co located or operating in conjunction with any other antenna or transmitter Caution Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment Introduction The TT5800 is Teletronics s answer to the ever growing demand for higher bandwidth and security in a wireless network environment It is based on a brand new redesigned platform that not only offers faster performance and capacity but also supports all current pre IEEE 802 11i wireless security standards The TT5800 is the IEEE 802 11a version of the platform that directly targets the need for the more secure less c
44. ion Use antenna 1 Select antenna of non MiMo radios for testing The valid values are D auto switching 1 antenna 1 and 2 antenna 2 27 Cloning Cloning Mode e WLAN Card o If set to WLAN Card the MAC Address of the WLAN Card will be used When multiple Ethernet devices are connected to the Bridge the MAC Address of the Bridge will not change e Ethernet Client o If set to Ethernet Client the MAC Address from the first Ethernet client that transmits data through the Bridge will be used This means the client MAC address will become the alias address to the Bridge Advanced Wireless Fragmentation threshold Fragmentation Threshold is the maximum length of the frame beyond which payload must be broken up fragmented into two or more frames Collisions occur more often for long frames because sending them occupies the channel for a longer period of time increasing the chance that another station will transmit and cause collision Reducing Fragmentation Threshold results in shorter frames that busy the channel for shorter periods reducing packet error rate and resulting retransmissions However shorter frames also increase overhead degrading maximum possible throughput so adjusting this parameter means striking a good balance between error rate and throughput RTS threshold RTS Threshold is the frame size above which an RTS CTS handshake will be performed before attempting to transmit RTS CTS asks for permission to tra
45. ith one address NAT converts the address of each LAN node into one IP address for the Internet and vice versa NAT also provides a certain amount of security by acting as a firewall by keeping individual IP addresses hidden from the WAN Preamble Preamble refers to the length of a CRC Cyclic Redundancy Check block that monitors communications between roaming wireless enabled devices and access points Protocol Astandard way of exchanging information between computers RADIUS Remote Authentication Dial In User Service A server that issues authentication key to clients RAM Random Access Memory Non permanent memory RIP RIP Routing Information Protocol is a routing protocol that is integrated in the TCP IP protocol RIP finds a route that is based on the smallest number of hops between the source of a packet and its destination Router A router is a device that forwards data packets along networks The device is connected to at least two networks commonly two LANs or WANs or a LAN and an ISP Routers are located at gateways the places where two or more networks connect and use headers and forwarding tables to determine the best path for forwarding the packets And they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts Very little filtering of data is done through routers Roaming The ability to use a wireless device while moving from one access point to another witho
46. l centers are 20 MHz from the outer edges In addition to the frequency and channel allocations transmit power is a key parameter regulated in the 5 GHz U NII band Three transmit power levels are specified 40 mW 200 mW and 800 mW The upper band defines RF transmit power levels suitable for bridging applications while the lower band specifies a transmit power level suitable for short range indoor home and small office environments 802 11a Non overlapping Channel Frequency Ranges Lower Band 5 15 5 25 GHz Maximum Output Power 40mW Channel 36 5 15 5 18 Channel 40 5 18 5 20 Channel 44 5 20 5 22 Channel 48 5 22 5 25 Middle Band 5 25 5 35 GHz Maximum Output Power 200mW Channel 52 5 25 5 28 Channel 56 5 28 5 30 Channel 60 5 30 5 32 Channel 64 5 32 5 35 Upper Band 5 725 5 825 GHz Maximum Output Power 800mW Special Atheros Turbo Mode Channels Channel 149 5 725 5 745 Channel 153 5 745 5 765 Channel 157 5 765 5 785 Channel 161 5 785 5 805 Channel 165 5 805 5 825 Use this setting only when both side of the wireless connection is using the Atheros chipset The radio will combine 2 free channels for the wireless transmission to double the bandwidth Channel 42 5 210 Channel 50 5 250 Channel 58 5 290 Channel 152 5 760 Channel 160 5 800 18 Security Security and Encryption Settings On this page you can set the securi
47. le in real time video and audio transmission TFTP Trivial File Transfer Protocol Simple form of FTP File Transfer Protocol which Uses UDP User Datagram Protocol rather than TCP IP for data transport and provides no security features TKIP Temporal Key Integrity Protocol An encryption method replacing WEP TKIP uses random IV and frequent key exchanges 63 UDP User Datagram Protocol Acommunication method protocol that offers a limited amount of service when messages are exchanged between computers in a network UDP is used as an alternative to TCP IP Uplink Link to the next level up in a communication hierarchy UTP Unshielded Twisted Pair cable Two or more unshielded wires twisted together to form a cable Virtual Servers Virtual servers are client servers such as Web servers that share resources with other virtual servers i e itis not a dedicated server WEP Wired Equivalent Privacy An encryption method based on 64 or 128bit algorithm WLAN WLANs Wireless LANs are local area networks that use wireless communications for transmitting data Transmissions are usually in the 2 4 GHz band WLAN devices do not need to be lined up for communications like infrared devices WLAN devices use access points which are connected to the wired LAN and provide connectivity to the LAN The radio frequency of WLAN devices is strong enough to be transmitted through non metal walls and objects and can cover an area u
48. ly mode will provide better performance than mixed mode In the case of TT5800 only 802 11a mode is allowed For TT2400 the options of 802 11b 802 11g only or Mixed 802 11g and 802 11b are available Adaptive Radio Selection When using dynamic turbo mode with a compatible Atheros radio chipset this option allows the Access point to switch to non turbo mode when non turbo traffic is detected and vice versa Super Mode Super Mode is only supported if both the client and the AP are using compatible Atheros radio chipsets Disabled Super A G without Turbo Super A G with Static Turbo Super A G with Dynamic Turbo AR enabled Auto Channel Select Check this box to enable the Access Point to automatically select the best channel at start up This may take up to 20 seconds and during this period no clients will be able to associate RF Transmit Power This section controls the power output for the mini PCI radio card The valid input range for this section is in the range of 0 30 in dBm units The default value is 23 dBm or 200mW 33 Channel Channels are important to understand because they affect the overall capacity of your Wireless LAN A channel represents a narrow band of radio frequency A radio frequency modulates within a band of frequencies as a result there is a limited amount of bandwidth within any given range to carry data It is important that the frequencies do not overlap or else the throughput would be significantly red
49. nal network Change this value to have InterMapper use the new string when querying SNMP devices IP Settings IP Address Mode e Static o Manually setup a static IP address for this device e DHCP o Setup the access point as a DHCP client which will pick up an IP from a DHCP server Default IP address The default Access Point Mode IP address 192 168 10 240 Default subnet mask The factory subnet default value is 255 255 255 0 Default gateway The factory gateway default address is 192 168 10 1 Security This section is used to set up the administrative login name and password User name This is the user name that you must type when logging into the web interface 44 Administrator Password This is the password that you must type when logging into the web interface You must enter the same password into both boxes for confirmation Syslog Syslog Syslog dnabled J This is the option to enable the syslog IP address of the syslog daemon 192 168 10 1 server Ping Watchdog Utility Ping Watchdog oO Utility enabled This is the option to enable the Ping Watchdog Utility Destination IP address of the Ping 192 168 10 1 Watchdog Utility Intra B traffic blocking Intra BSS enabled This Intra BSS traffic blocking Layer 2 Isolation option keeps clients from communicating with each other Device Control Clicking the button below will immediately reboot the device A reboot is necessary in
50. nly 3 channels out of the 11 available that do not overlap with one another To avoid interference within a network with multiple APs set each AP to use one of the 3 channels e g Channel 1 and then the other AP to be one of the other 2 channels i e Channel 6 or Channel 11 within the range of the wireless radio This simple method will reduce interference and improve network reliability 802 11b g Wireless Channel Frequency Range 2 4 GHz 2 497 GHz 802 11b g Non overlapping Channel Frequency Ranges e Channel 1 2 401 GHz 2 423 GHz e Channel 6 2 426 GHz 2 448 GHz e Channel 11 2 451 GHz 2 473 GHz Americas Wireless Channels 1 11 Asia Wireless Channels 1 14 Europe Wireless Channels 1 13 802 11a Wireless Channel Frequency Range 5 15 GHz 5 35 GHz 5 725 5 825 802 11a is an extension to 802 11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band 802 11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS Unlike that of 802 11b g 802 11a standard separates its channels into 3 100MHz segments in the US The lower and middle band accommodates 8 channels in a total bandwidth of 200 MHz and the upper band accommodates 4 channels in a 100 MHz bandwidth The frequency channel center frequencies are spaced 20 MHz apart The outermost channels of the lower and middle bands are centered 30 MHz from the outer edges In the upper band the outermost channe
51. nput here If your product is not registed you can not change some of the wireless settings such as SSID and channel S N Register Firmware Upgrade This section allows the TT5800 TT2400 firmware to be upgraded or changed directly from the web interface Click on the Browse button to select a file from the host machine Register The TT5800 TT2400 has implemented a hardware modification authorization process to prevent use by fraudulent hardware from other manufacturers This will require any hardware change on the radio card used on the TT5800 TT2400 to input a serial code generated based on each unique MAC address Please contact Teletronics Support to a pickup a valid serial number to deactivate the pre registration protection after a radio card swap If the unit is not registered some features such as SSID and Wireless Channel selection will be disabled 46 Advanced TELETRONICS gt INTERNATIONAL INC TT5800 TT2400 Advanced On this page you can configure the advanced wireless settings Any new settings will not take effect until the device is rebooted Advanced wireless Fragmentation 200 threshold 3200 Transmitted wireless packets larger than this size will be fragmented to maintain performance in noisy wireless networks The valid range is 256 65535 Values larger than about 1560 will prevent fragmentation from taking place RTS threshold 3200 Transmitted wireless packets larger than this size will
52. nsmit to reduce collisions but adds considerable overhead Disabling RTS CTS can reduce overhead and latency in WLANs where all stations are close together but can increase collisions and degrade performance in WLANs where stations are far apart and unable to sense each other to avoid collisions aka Hidden Nodes If you are experiencing excessive collisions you can try turning RTS CTS on or if already on reduce RTS CTS Threshold on the affected stations Burst time Maximum burst time is a feature based on the PRISM Nitro a new WLAN software solution that more than triples 802 11g throughput in a mixed mode environment and offers up to 50 percent greater throughput performance in 802 11g only networks PRISM Nitro is fully IEEE 802 11 compliant and uses prioritization algorithms and enhanced protection mechanisms to significantly increase wireless networking performance The recommended value for the maximum burst time for 11b or the mixed 11b g environment is 650 The 11g only mode uses the value 1400 Beacon Period In wireless networking a beacon is a packet sent by a connected device to inform other devices of its presence and readiness When a wirelessly networked device sends a beacon it includes with it a beacon interval which specifies the period of time before it will send the beacon again The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon Network managers
53. o one of its distributors with transportation charges prepaid Returned products must include a copy of the purchase receipt In the absence of a purchase receipt the warranty period shall be one 1 year from the date of manufacture This warranty shall be voided if the product is damaged as a result of defacement misuse abuse neglect accident destruction or alteration of the serial number improper electrical voltages or currents repair alteration or maintenance by any person or party other than a Teletronics International Inc employee or authorized service facility or any use in violation of instructions furnished by Teletronics International Inc This warranty is also rendered invalid if this product is removed from the country in which it was purchased if it is used in a country in which it is not registered for use or if it is used in a country for which it was not designed Due to variations in communications laws this product may be illegal for use in some countries Teletronics International Inc assumes no responsibility for damages or penalties incurred resulting from the use of this product in a manner or location other than that for which it is intended IN NO EVENT SHALL TELETRONICS INTERNATIONAL INC BE LIABLE FOR ANY SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR BREACH OF THIS OR ANY OTHER WARRANTY EXPRESSED OR IMPLIED WHATSOEVER Some states do not allow the exclusion or limitation of special incidental or consequ
54. ommended for use It verifies that an authentication initiating station has knowledge of a shared secret This is similar to pre shared key authentication for Internet Protocol security IPSec The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 In practice a user manually types this secret for the wireless AP and the wireless client 40 Shared key authentication uses the following process 6 The authentication initiating wireless client sends a frame consisting of an identity assertion and a request for authentication 7 The authenticating wireless node responds to the authentication initiating wireless node with challenge text 8 The authentication initiating wireless node replies to the authenticating wireless node with the challenge text that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret 9 The authentication result is positive if the authenticating wireless node determines that the decrypted challenge text matches the challenge text originally sent in the second frame The authenticating wireless node sends the authentication result 10 Because the shared key authentication secret must be manually distributed and typed this method of authentication does not scale appropriately in large infrastructure network mode such as corporate
55. onds with the requested information If the community string is incorrect the device simply discards the request and does not respond Factory default setting for the read only community string is set to public It is standard practice to change all the community strings so that outsiders cannot see information about the internal network In addition the administrator may also employ firewalls to block any SNMP traffic to ports 161 and 162 on the internal network Change this value to have InterMapper use the new string when querying SNMP devices IP Settings IP Address Mode e Static o Manually setup an IP address for this device e DHCP o Setup the bridge as a DHCP client which will pick up an IP address from a DHCP server Default IP address The default Client Bridge Mode IP address 192 168 10 241 Default subnet mask The factory subnet default value is 255 255 255 0 Default gateway The factory gateway default address is 192 168 10 1 24 Default gateway 192 168 10 1 This is the IP address of KS gateway that connects you to the internet The factory defauk is 192 168 1 1 Security This is the user name that you must type when logging in to these web pages Administrator password This is the password that you must type when logging in to these web pages You must enter the same password into both boxes for confirmation Syslog Syslog enabled E It is the option to enable the syslog
56. order to change most configuration options Syslog Enabled Option to enable or disable Syslog support Syslog Daemon Server The Syslog server IP address input box Ping Watchdog Utility Ping Watchdog Utility Enabled If enabled the Ping Watchdog utility tracks the TCP IP link between this device and another remote destination at the other end of the wireless link When the remote destination is unreachable loss of connection the Ping Watchdog Utility will reboot the unit in an attempt to re establish the connection Destination IP address of the Ping Watchdog Utility This is the IP address of the remote destination 45 Intra BSS traffic blocking This option blocks clients in the same BSS from communicating with each other Layer 2 Isolation Device Control This section has functions that will allow the TT5800 TT2400 to Reboot and Reset the system configuration to factory defaults Firmware Upgrade To upgrade the firmware enter the name of the firmware upgrade file and click on the upgrade button below File to upload T Browse Upload The upload may take up to 60 seconds Register To regist your product input your S N and click the register button below By default you needn t register your product Whenever you change the radio card you need ask Teletronics Inc for S N to regist Please get the MAC address of the radio card and call teletronics technical support You will get a S N and then i
57. ority to operate the equipment R amp TTE Compliance Statement This equipment complies with all the requirements of the Directive 1999 5 EC of the European Parliament and the Council of 9 March 1999 on radio equipment and telecommunication terminal equipment R amp TTE and the mutual recognition of their conformity The R amp TTE Directive repeals and replaces in the directive 98 13 EEC As of April 8 2000 European Union CE Marking and Compliance Notices Products intended for sale within the European Union are marked which indicates compliance with the applicable directives identified below This equipment also carries the Class 2 identifier 52 With the Conformit Europ ene CE and European standards and amendments we declare that the equipment described in this document is in conformance with the essential requirements of the European Council Directives standards and other normative documents listed below 73 23 EEC Safety of the User article 3 1 a 89 336 EEC Electromagnetic Compatibility article 3 1 b 1999 5 EC R amp TTE Radio and Telecommunications Terminal Equipment Directive EN 60950 2000 Safety of Information Technology Equipment Including Electrical Business Equipment EN 300 328 V1 4 1 2003 Electromagnetic compatibility and Radio spectrum Matters ERM Wideband Transmission systems Data transmission equipment operating in the 2 4 GHz ISM band and using spread spectrum modulation techniques Harmonized EN covering
58. p to a thousand feet Laptops and notebooks use wireless LAN PCMCIA cards while PCs use plug in cards to access the WLAN 64
59. r AP only 55 WDS in Chain Configuration d a aie A yon a u ST er l en u 4 P Pa TT2400 TT5800 bi em In this configuration setup example you ll be expanding your wireless network coverage that will span an area in length AP Awill have only AP B s MAC address in its WDS and ACL configuration setting AP B will have AP A and C s MAC address in its WDS and ACL configuration setting AP C will have AP B and D s MAC address in its WDS and ACL configuration setting AP D will have only AP C s MAC address in its WDS and ACL configuration setting N u PP N 56 Appendix F TT2400 TT5800 Upgrade FAQ How to upgrade The TT2400 TT5800 could be upgraded either through the web interface or from EZ Manager Please check Web Configuration Interface and Installation sections of this manual for detailed instructions Do I need an Activation Key after flashing with a newer firmware 3 7 x or higher No All the TT2400 TT5800 units shipped from Teletronics are already activated Since Firmware 3 1 7X and 3 7 X or higher Teletronics has now removed the necessary step to provide an activation key to change from SU to AP and vice versa in our TT2400 and TT5800 product line For example if you have a TT2400 in SU mode with 3 6 0 firmware the activation key is not required if you upgrade to either 3 7 0 SU mode or 3 7 1 AP mode or later Do I need an Activation Key after flashing with an
60. r your product Whenever you change the radio card you need ask Teletronics Inc for Activation Key to regist Please get the MAC address of the radio card and call teletronics technical support You will get a Activation Key and then input here If your produa is not registed you can not change some of the wireless settings such as SSID and channel Activation Key Cesis The TT5800 TT2400 has implemented a hardware modification authorization process to prevent use by fraudulent hardware from other manufacturers This will reguire any hardware change on the radio card used on the TT5800 TT2400 to input a serial code generated based on each unigue MAC address Please contact Teletronics Support to a pickup a valid serial number to deactivate the pre registration protection after a radio card swap If the unit is not registered some features such as SSID and Wireless Channel selection will be disabled 26 Advanced TELETRONICS INTERNATIONAL INC TT5800 Advanced On this page you can configure the advanced 802 11a g wireless settings Any new settings will not take effect until the bridge is rebooted Cloning Cloning mode WLAN Card Ethernet Client This feature controls the MAC Address of the Bridge as seen by other devices wired or wireless If set to Ethernet Client the MAC Address from the first Ethernet client that transmits data through the Bridge will be used This setting is useful when connect
61. rol the update period for the pair wise Transient Key The pair wise Transient Key is changed each time the Supplicant authenticates or re authenticates 802 1X Configuration Remote RADIUS server configuration settings There are two sections to setup 2 RADIUS servers for the TT5800 TT2400 to connect to At any given time the TT5800 TT2400 will connect to one RADIUS server for authentication and will use the other one as a backup if that option is configured 802 1X enabled Option that enables or disables remote RADIUS authentication Authentication timeout mins The default value is 60 minutes When the time expires the device will re authenticate with RADIUS server RADIUS server IP address Enter the RADIUS server IP address RADIUS server port number Port used for RADIUS the port number must be the same as the RADIUS server s normally the port is 1812 39 RADIUS server shared secret When registered with a RADIUS server a password will be assigned This would be the RADIUS server shared secret MAC Address Authentication Use client MAC address for authentication with RAIDUS server WEP Configuration Short for Wired Equivalent Privacy a security protocol for wireless local area networks WLANs defined in the 802 11b standard WEP is designed to provide the same level of security as that of a wired LAN Enable WEP To enable the WEP Authenticator Default WEP key to use e WEP Key 1 4 Select the key to be used as th
62. rowded 5 8 GHz frequency spectrum TT5800 Product Photos TT5800 PCB IEEE 802 1 1a miniPCI Card TT5800 Enclosure Cast Aluminum Powder Coated Silver Product Features Compact size for small enterprise or system integrate service market Compliant with IEEE 802 11a specifications Supports 64 128 bit WEP WPA and IEEE802 1x Supports Atheros Super A up to 108Mbps Intelligent firmware upgrade via Web browser Built in Web based utility for easy configuration from any Web browser Support POE IEEE 802 3af function Supports wireless bridging and MAC address filtering Super bright LED indicating status and signal level RSSI Provide 10 100M auto sensing MDI MDI X Ethernet port EzManager Support Atheros Super G Proprietary technology of Atheros Communication Inc would only work in situations where both ends of the communication link are using the Atheros radio chipset Product Specifications Main Chips CPU Ubicom IP3023 Radio Supports 802 11a Atheros AR5213 AR5112 Mechanical Chassis Dimension W x D x L 161mm x 30mm x 119mm Board Specifications Specification Description Network Standard IEEE 802 11 a IEEE 802 3 IEEE802 3x Ethernet 10 100BaseT Ethernet Auto MDI MDI X Network Architecture Infrastructure Ad Hoc MAC CSMA CA Status Indicators POWER Wireless LAN RF Ethernet LAN Receives Signal Strength RSS Push Button Reset to Default Button Radio Specifications IEEE
63. rrectly If this happens try turning off some of the more restrictive features of these anti malware software or try accessing the web control interface with a different browser such as the firefox Symptom Can not connect to the TT5800 TT2400 with a wireless client Resolution e Make sure that the client supports the wireless mode that the TT5800 TT2400 is set to e Make sure that the Mode SSID Cap Sensitive Channel and encryption settings are set the same on both sides e Make sure that your computer is within range and free from any strong electrical devices that may cause interference e Double check that the wireless client is set to the appropriate transmission speed under the advanced tab of the wireless connection property e Temporary disable all securities and encryption settings e Try it on a different client e f DHCP is enabled make sure that the client is set to obtain an IP automatically 60 Appendix I Key Requirement Chart 2M Version From 3 1 2SU 3 1 3AP 3 1 4SU 3 1 5AP 3 1 40SU 3 1 41AP 3 1 50SU 3 1 51AP 3 1 60SU 3 1 61AP 3 1 70SU 3 1 71AP 3 1 80SU 3 1 81 AP C3 1 90SU C3 1 91AP Key Requirement Chart Key Required Y Yes N No To Latest Version C3 1 90SU C3 1 91AP Y Y z iz z zZ zZ lll Z ZZ elel X z z z zZ zZ lll Zz ZZ elel e 4M Version To Latest Version From C3 9 0SU C3 9 1AP
64. s vendor compatible When properly installed WPA provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1X authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA2 is the second generation of WPA security providing enterprise and consumer Wi Fi users with a high level of assurance that only authorized users can access their wireless networks Launched in September 2004 by the Wi Fi Alliance WPA2 is the certified interoperable version of the full IEEE 802 11i specification which was ratified in June 2004 Like WPA WPA2 supports IEEE 802 1X EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Counter Mode CBC MAC Protocol CCMP called the Advanced Encryption Standard AES AES satisfies U S government security requirements It has been adopted as an official government standard by the U S Department of Commerce and the National Institute of Standards and Technology NIST Organizations that require the AES encryption available in WPA2 should be aware that upgrading to it may require new hardware Section II of this document offers a roadmap for organizations planning to upgrade to WPA2 Considerations for its deployment are outlined in Section II 38 Cipher Type e TKIP
65. se settings are supplied by a DHCP server on your network You can also change the password reboot the to their factory defaults If you have changed any settings it is necessary to reboot the bridge for the new settings to take effect TT Subscriber Unit This is the name that the bridge will use to identify itself to external configuration and IP address finding programs This is not the same as the SSID It is okay to leave this blank if you are not using these programs Check this option if you need pull information from the bridge thru SNMP public IP Address Mode Default IP address Device Name Static O DHCP Client Select DHCP to get the IP settings from a DHCP server on your network Select Static to use the IP settings specified on this page 192 168 10 241 Type the IP address of your bridge Default subnet mask 255 255 255 0 This is the name that the bridge will use to identify itself to external configuration and IP address programs This is not the same as the SSID It is okay to leave this blank if you are not using these programs SNMP Setting SNMP enable Option to enable or disable SNMP support 23 Community The SNMP Read only Community string is like a user id or password that allows access to a router s or other device s statistics or management information InterMapper sends the community string along with all SNMP requests If the community string is correct the device resp
66. st to 301 309 8551 For technical support issues you can e mail us at support teletronics com If any Teletronics product proves defective during its warranty period you can email the Teletronics Return Merchandise Authorization department to obtain a Return Authorization Number at rma teletronics com Details on Warranty and RMA issues can be found in Appendix A and B 54 Appendix E WDS Explained One of the requirements for aWDS network is that the operational frequency channel on all the APs must be the same This is one of the reasons why there is a huge bandwidth penalty when setting up a wireless network in WDS mode How to properly configure your APs in a WDS network will foremost depend on the locations of your wireless hotspots Please take a look at the following two WDS topology examples WDS in a Star Configuration aoe ow a F TT2400 TT5800 Y H x Master I A I TT2400 TT5800 TT2400 TT5800 Slave A SlaveC R an am a a N TT2400 TT5800 7 SR SlaveB _ This is the mode to use if you re expanding the hotspots in the area around your master AP that is connected to the WAN What you ll need to do is enable WDS and ACL on all the APs Then input each of the MAC addresses of Slave A B C into the Master AP under both the WDS and ACL section For the Slave APs A B C you ll input only the MAC address of the Master AP into the WDS and ACL list to limit them to direct their traffic through the Maste
67. t from 802 11 Station A it will then wait for an ACKnowledgement frame from 802 11 Station B Station A will only wait for a certain amount of time ACK timeout or ACK window Ifthe ACK is NOT received within that timeout period then the packet will be re transmitted from Station A resulting in reduced throughput When sending lots of packets as in 802 11g and 802 11a the constant re transmission could cost severe performance degradation due to the ACK frame not making it back to 802 11 Station A in time This will have a dramatic impact on the throughput of the link regardless of signal strength or good receiver sensitivity Antenna Selection Antenna Use antenna 2 g selection Use antenna 2 v Select antenna of non MiMo radios for testing The valid values are Ofauto switching lfantenna 1 and 2 antenna 2 Please refer to Appendix G on page 60 for further information 49 Appendix A Warranty Policy Limited Warranty All Teletronics products are warranted to the original purchaser to be free from defects in materials and workmanship under normal installation use and service for a period of one 1 year from the date of purchase Under this warranty Teletronics International Inc shall repair or replace at its discretion during the warranty period any part that proves to be defective in material of workmanship under normal installation use and service provided the product is returned to Teletronics International Inc or t
68. ting 802 11b or 802 11g only mode will provide better performance than mixed mode In the case of TT5800 only 802 11a mode is allowed For TT2400 the options of 802 11b 802 11g only or Mixed 802 11g and 802 11b are available RF Transmit Power This section controls the power output for the mini PCI radio card The valid input range for this section is in the range of 0 30 in dBm units or 1mw 1000mw The default value is 23 dBm or 200mW Super Mode Super Mode is only supported if both the client and the AP are using compatible Atheros radio chipsets Disabled Super A G without Turbo Super A G with Static Turbo Super A G with Dynamic Turbo AR enabled 16 Country and Region This option selects the country and region of operation Every device should be configured to use the proper regional settings which comply with and do NOT violate the radio regulatory laws at the installed location Channel Channels are important to understand because they affect the overall capacity of your Wireless LAN A channel represents a narrow band of radio frequency A radio frequency modulates within a band of frequencies as a result there is a limited amount of bandwidth within any given range to carry data It is important that the frequencies do not overlap or else the throughput would be significantly reduced as the network sorts and reassembles the data packets sent over the air For the TT2400 2 4 GHz 2 497 GHz frequency range there are o
69. tion secret 4 The authentication result is positive if the authenticating wireless node determines that the decrypted challenge text matches the challenge text originally sent in the second frame The authenticating wireless node sends the authentication result 5 Because the shared key authentication secret must be manually distributed and typed this method of authentication does not scale appropriately in large infrastructure network mode such as corporate campuses WEP key lengths 64 bit 10 Hex Digit WEP Key type Example Key1 2e3f4 A Key2 5y7js 64 bit WEP with 5 characters Key3 24197 Key4 98jui Key1 123456789A 64 bit WEP with 10 hexadecimal digits Key2 23456789AB 0 9 A F Key3 3456789ABC Key4 456789ABCD 128 bit 26 Hex Digit WEP Key type Example Key1 2e3f4w345ytre Key2 5y7jse8r4i038 Key3 24fg70okx3fr7 Key4 98jui2wss35u4 Key1 112233445566778899AABBCDEF 128 bit WEP with 26 hexadecimal digits Key2 22334455667 78899AABBCCDDEE 0 9 A F Key3 3344556677889900AABBCCDDFF Key4 44556677889900AABBCCDDEEFF 128 bit WEP with 13 characters 22 TELETRONICS INTERNATIONAL INC Administration bridge or reset all settin Device name Device name SNMP Setting SNMP enabled Community IP settings TT5800 On this page you can configure the IP address used by the Web server running on this bridge For static mode the IP address settings are given here For DHCP mode the
70. tion Protocol EAP WEP regulates access to a wireless network based on a computer s hardware specific MAC address which is relatively simple to be sniffed out and stolen EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network WPA Enable This option enables the WPA Authenticator Note that any client that does not support the WPA standard will not be able to handshake authenticate with a WPA enabled device WPA Mode WPA O WPA2 Designed to secure present and future versions of IEEE 802 11 devices WPA is a subset of the IEEE 802 11i specification WPA addresses all known vulnerabilities in WEP WPA also provides user authentication since WEP lacks any means of authentication WPA replaces WEP with a strong new encryption technology called Temporal Key Integrity Protocol TKIP with Message Integrity Check MIC It also provides a scheme of mutual authentication using IEEE 802 1X Extensible Authentication Protocol EAP authentication or pre shared key PSK technology WPA was designed and has been scrutinized by well known cryptographers It can be implemented immediately and inexpensively as a software or firmware upgrade to most existing Wi Fi CERTIFIED access points and client devices with minimal degradation in network performance WPA offers standards based Wi Fi CERTIFIED security It assures users that the Wi Fi CERTIFIED devices they buy will be cros
71. tions that will allow the TT5800 TT2400 to Reboot and Reset the system configuration to factory defaults S TELETRONICS b ji Sul INTERNATIONAL INC 15800 Device Control R Er Clicking the button below will immediately reboot the device A reboot is necessary in order to change most configuration options Clicking the button below will reset all configuration options to their factory default values and the device will reboot Note that the IP address of the device will also be reset and it may be necessary to change the address in your browser to access this website again Reset Configuration Firmware Upgrade To upgrade the firmware enter the name of the firmware upgrade file and click on the upgrade button below File to upload Browse The upload may take up to 60 seconds Register To regist your product input your Activation Key and click the register button below By default you needn t register your product Whenever you change the radio card you need ask G Teletranice Tne far Artivatinn Kew tn rentet Pleace net the MAr address nf the radia card and Firmware Upgrade This section allows the TT5800 TT2400 firmware to be upgraded or changed directly from the web interface Click on the Browse button to select a file from the host machine Register Register To regist your product input your Activation Key and click the register button below By default you needn t registe
72. ty and encryption options Any new settings will not take effect until the bridge is rebooted WPA configuration Enable WPA Authenticator to require stations to use high grade encryption and authentication WPA Enable P WPA Mode WPA Select the WPA Mode Cipher Type TKIP r Select the cipher type PSK password Enter a text pass phrase between 8 and 63 characters WEP configuration WEP is the wireless encryption standard To use it you must enter the same key s into the bridge and the access point For 64 bit keys you must enter 10 hex digits into each key box For 128 bit keys you must enter 26 hex digits into each key box A hex digit is either a number from 0 to 9 or a letter from A to F If you leave a key box blank then this means a key of all zeros Enable WEP L Check this box to enable WEP For the most secure use of WEP also set authentication type to Shared Key when WEP is enabled Default WEP key to use WEPKeyl x Select the key to be used as the default key Data transmissions are always encrypted using the default key The other keys can only be used to decrypt received data Authentication Open z Select the type of authentication used when connecting to an access point Open is used if anyone can connect to the AP Shared key is used if both devices must know the encryption key perkey Rane 2 Select the WEP key size This length applies to all keys WEP key 1 pe WEP key
73. uced as the network sorts and reassembles the data packets sent over the air For the TT2400 2 4 GHz 2 497 GHz frequency range there are only 3 channels out ofthe 11 available that do not overlap with one another To avoid interference within a network with multiple APs set each AP to use one ofthe 3 channels e g Channel 1 and then the other AP to be one of the other 2 channels i e Channel 6 or Channel 11 within the range of the wireless radio This simple method will reduce interference and improve network reliability 802 11b g Wireless Channel Frequency Range 2 4 GHz 2 497 GHz 802 11b g Non overlapping Channel Frequency Ranges e Channel 1 2 401 GHz 2 423 GHz e Channel 6 2 426 GHz 2 448 GHz e Channel 11 2 451 GHz 2 473 GHz Americas Wireless Channels 1 11 Asia Wireless Channels 1 14 Europe Wireless Channels 1 13 802 11a Wireless Channel Frequency Range 5 15 GHz 5 35 GHz 5 725 5 825 802 11a is an extension to 802 11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band 802 11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS Unlike that of 802 11b g 802 11a standard separates its channels into 3 100MHz segments in the US The lower and middle band accommodates 8 channels in a total bandwidth of 200 MHz and the upper band accommodates 4 channels in a 100 MHz bandwidth The frequency channel center frequencies are spaced 20 MH
74. use the RTS CTS protocol to a maintain performance in noisy wireless networks and b prevent hidden nodes from degrading performance The valid range is 1 65535 Values larger than about 1560 will prevent RTS CTS from taking place Beacon period fi 00 Access point beacons are sent out periodically This is the number of milliseconds between each beacon The valid range is 1 65535 DTIM interval fi This controls the rate at which broadcast and multicast packets are delivered to stations in power save mode A value of 1 means send these packets after each beacon 2 means after every second beacon etc The valid range is 1 255 802 11d D Check this box to enable support for sending regional information to the stations Advanced Wireless Fragmentation threshold Fragmentation Threshold is the maximum length of the frame beyond which payload must be broken up fragmented into two or more frames Collisions occur more often for long frames because sending them occupies the channel for a longer period of time increasing the chance that another station will transmit and cause collision Reducing Fragmentation Threshold results in shorter frames that busy the channel for shorter periods reducing packet error rate and resulting retransmissions However shorter frames also increase overhead degrading maximum possible throughput so adjusting this parameter means striking a good balance between error rate and throughput RTS t
75. ut losing the connection RTS RTS Request To Send is a signal sent from the transmitting station to the receiving station requesting permission to transmit data Server Servers are typically powerful and fast machines that store programs and data The programs and data are shared by client machines workstations on the network Static IP Address A permanent IP address is assigned to a node in a TCP IP network Also known as global IP Subnet Mask Subnet Masks SUBNET work masks are used by IP protocol to direct messages into a specified network segment i e subnet A subnet mask is stored in the client machine server or router and is compared with an incoming IP ad dress to determine whether to accept or reject the packet SSID SSID Service Set Identifier is a security measure used in WLANs The SSID is a unique identifier attached to packets sent over WLANs This identifier emulates a password when a wireless device attempts communication on the WLAN Because an SSID distinguishes WLANS from each other access points and wireless devices trying to connect to a WLAN must use the same SSID TCP IP TCP IP Transmission Control Protocol Internet Protocol is the main Internet communications protocol The TCP part ensures that data is completely sent and received at the other end Another part of the TCP IP protocol set is UDP which is used to send data when accuracy and guaranteed packet delivery are not as important for examp
76. uthentication using IEEE 802 1X Extensible Authentication Protocol EAP authentication or pre shared key PSK technology WPA was designed and has been scrutinized by well known cryptographers It can be implemented immediately and inexpensively as a software or firmware upgrade to most existing Wi Fi CERTIFIED access points and client devices with minimal degradation in network performance WPA offers standards based Wi Fi CERTIFIED security It assures users that the Wi Fi CERTIFIED devices they buy will be cross vendor compatible When properly installed WPA provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1X authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA2 is the second generation of WPA security providing enterprise and consumer Wi Fi users with a high level of assurance that only authorized users can access their wireless networks Launched in September 2004 by the Wi Fi Alliance WPA2 is the certified interoperable version of the full IEEE 802 111 specification which was ratified in June 2004 Like WPA WPA2 supports IEEE 802 1X EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Counter Mode CBC MAC Protocol CCMP called the Advanced Encryption Standard
77. uthentication verification frame 3 With some wireless APs you can configure the MAC addresses of allowed wireless clients However configuring 21 the MAC address does not provide sufficient security because the MAC address of a wireless client can be spoofed e Shared Key Shared key authentication supports authentication of stations as either a member of those who know a shared secret key or a member of those who do not Shared key authentication is not secure and is not recommended for use It verifies that an authentication initiating station has knowledge of a shared secret This is similar to pre shared key authentication for Internet Protocol security IPSec The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 In practice a user manually types this secret for the wireless AP and the wireless client Shared key authentication uses the following process 1 The authentication initiating wireless client sends a frame consisting of an identity assertion and a request for authentication 2 The authenticating wireless node responds to the authentication initiating wireless node with challenge text 3 The authentication initiating wireless node replies to the authenticating wireless node with the challenge text that is encrypted using WEP and an encryption key that is derived from the shared key authentica
78. w and type in the factory default IP address in the URL 5 http 192 168 10 241 Press Enter on your keyboard and a login prompt window similar to the one shown below will appear tonnasi ty PAA EOG H DE E Login User name Password Remember my password There is no default User name or Password Leave User name and Password field blank and click OK Note You may set a new password by clicking the Admin tab after you enter the Web Configuration page 13 Information TELETRONICS INTERNATIONAL INC TT5800 Information Information NOTE You may need to reload this page to fee the current settings Subscriber Unit Information Subscriber Unit Name TT Subscriber Unit Radio Type 5GHz MAC Address 0060B3E94D14 Firmware version C3 9 0 1030 SSID of AP Not associated BSSID of AP 000000000000 Current transmit rate Automatic Current channel 153 Current Signal Strength 0 Security None IP address 192 168 10 241 Static Register Status Not Registered Unit SysUpTime Od Oh 00m 29s NOTE You are using the empty username password Under the main web interface home page you will see the following configuration menu pages Information APs Wireless Security Admin and Advanced Detailed information for each section is provided below Access Points APs TELETRONICS A INTERNATIONAL INC TT5800 Access Points N This is a list of available access points
79. z apart The outermost channels of the lower and middle bands are centered 30 MHz from the outer edges In the upper band the outermost channel centers are 20 MHz from the outer edges In addition to the frequency and channel allocations transmit power is a key parameter regulated in the 5 GHz U NII band Three transmit power levels are specified 40 mW 200 mW and 800 mW The upper band defines RF transmit power levels suitable for bridging applications while the lower band specifies a transmit power level suitable for short range indoor home and small office environments 802 11a Non overlapping Channel Frequency Ranges Lower Band 5 15 5 25 GHz Maximum Output Power 40mW Channel 36 5 15 5 18 Channel 40 5 18 5 20 Channel 44 5 20 5 22 Channel 48 5 22 5 25 Middle Band 5 25 5 35 GHz Maximum Output Power 200mW Channel 52 5 25 5 28 Channel 56 5 28 5 30 Channel 60 5 30 5 32 Channel 64 5 32 5 35 Upper Band 5 725 5 825 GHz Maximum Output Power 800mW e Channel 149 5 725 5 745 34 Special Atheros Turbo Mode Channels Channel 153 5 745 5 765 Channel 157 5 765 5 785 Channel 161 5 785 5 805 Channel 165 5 805 5 825 Use this setting only when both side of the wireless connection is using the Atheros chipset The radio will combine 2 free channels for the wireless transmission to double the bandwidth Channel 42 5 210 Channel 50 5 250
Download Pdf Manuals
Related Search
Related Contents
Lenovo ThinkVision E74 User's Manual Manual de Instruções 1 CIRCULAIRE n° E.T. 122.682 (AGFisc N° 22/2012) dd LEDA37NW/ LEDA38NW BEDIENUNGSANLEITUNG & Gerätebuch GUARD@AED GX 120 - Hilti Magnavox AZ 6831 User's Manual Explanation_E_GM2_12_0 user manual Safety precautions Copyright © All rights reserved.
Failed to retrieve file