Home
User Manual
Contents
1. Amenia Power Status LEDs a WLAN Signal Strength LED Diaanostic LED Ethemet 2 Ethemet 1 Reset Button Front Panel of the APN 210N 11 Front Panel LEDs Green DC power 1 active Green Red DC power 1 fail non active Green Green Red DC power 2 active DC power 2 fail non active LED 1 lt 25 Green LED 2 lt 50 Green LED 3 lt 75 Green LED 4 lt 100 Blinking Unit not ready Boot sequence Green Off Unit ready 10 100Base T X Fast Ethernet ports Sg on Por Ink up at OMS WLAN Strength Green Red Top Panel The top panel components of the APN 210N are showed as below Terminal block includes PWR1 PWR2 12 24V DC and Relay output 1A 24VDC Relay Output 1A 24VDC Ground A V j a vi A ala y d Ds d F d LPWR U L J LPWR 2 Power 1 Power 2 12 24VDC 12 24VDC Top panel of the APN 210N 12 Rear Panel The rear panel components of the APN 210N are showed as below 1 Screw holes for wall mount kit 2 DIN Rail kit Rare panel of the APN 210N 13 Cables and Antennas Ethernet Cables The APN 210N WLAN AP has standard Ethernet ports According to the link type the AP use CAT 3 4 5 5e UTP cables to connect to any other network device PCs servers switches routers or hubs Please refer to the following table for cable specifications Cable Types and Specifications 10BASE T Cat 3 4 5 100 ohm UTP 100 m 328 ft RJ 45 10
2. Local AP ESS5ID antaira l Hide SSID Country Code bei Ho Country Sat Wireless Profile mu K Channel Spectrum Width 20 300 w Guard Interval Shot se Channel Frequency fe anto Interference Analyzer Data Hate Mbps Je Auto Transmit Power d m Chainmask 1x1 Left Single Chain Power cl Maximurn C obey Regulatory Power Rate Aggressiveness o w Fig 2 3 Basic Wireless Settings Access Point Access Point WDS Local AP ESSID This is the Service Set Identifier used to identify the operator s wireless LAN It should 34 be specified while operating in Access Point or Access Point WDS mode All the client devices within its range will receive broadcast messages from the access point advertising this SSID Hide SSID Once checked this will disable advertising the SSID of the access point in broadcast messages to wireless stations This option is only available in Access Point Access Point WDS and Repeater WDS mode only Country Code Different countries have different power levels and frequency selections To ensure device operation follows regulatory compliance rules operator to select correct country code where device will be used The channel list output power limits IEEE 802 11 and Channel Spectrum Width modes will be tuned according to regulations of the selected country No Country Set Option when checked only the frequency range are available 11n 2 4GHz is 2412 2462MHz Wireless Profile
3. OO 1 C4 04 43 2D 0 0 0 0 0 0 0 0 Realtek ATLE168 O0 03 25 2F D1 80 192 168 168 171 256 255 255 0 Forward A oute List Network Destination Metmask_ Gateway Interface Metio 127 0 0 0 255 0 0 0 127 0 0 1 127 0 0 1 192 168 168 0 255 255 255 0 192 168 168 11 192 162 168 1 192 168 168 11 255 255 255 255 127 0 0 1 127 0 0 1 197 188 TRA 255 254295 PAR AP 192 1RA1A8 11 192 1R 1AA 11 Compe Products List Curent Selected 1 00 20 40 32 34 56 192 165 168 1 Step 3 Do not exit the uConfig program while accessing the web based interface as this will disconnect you from the device Click on the OK button The aelecied preludi is on afferent subact uContig will champ the sytem soettiegs In enable acces de the product s eeh istenir ls not core Usa while accessing Ba producto Web Inteisce daing oe will hieak the conmectan Aer Ghlahieg the piodect coniguesion pinas the Exin Bak om the podesis Web inerece ug wal then close patamaticaliy 24 Step 4 At the login prompt enter the User Name and Password The default are User Name admin Password password Authentication Required a User Name Password Cancel 4 username and password are being requested by http 1192 168 68 3 The site says Wireless M Step 5 ltthen opens the device home page The Status page Y Status APH 210H Mozilla Firefox Pa ET sie DES GAPA ELC4 Idoy Coelgwie fois e bo
4. quest Password Read Only Username Password new password used for read only administrator authentication should be specified Configuration Management CONFIGURATION MANAGEMENT Backup Configuration Upload Configuration Browse Backup Configuration click Download button to export the current configuration to a file Upload Configuration click Browse button to navigate to and select the new configuration file or specify the full path to the configuration file location Activating the Upload button will transfer new configuration file to the system New configuration will be effective after the Apply button is activated and system reboot cycle is completed Previous system configuration is deleted after Apply button is activated It is highly recommended to backup the system configuration before uploading the new configuration Use only configuration backups of the same type device configuration backed up from PowerStation2 suits only PowerStation2 but not LiteStation2 or LiteStation5 Behavior may be unpredictable when mixing configurations from different type devices Device Maintenance DEVICE MAINTENANCE Reset ta defaults The controls in this section are dedicated for the device maintenance routines rebooting resetting generating of the support information report Reboot activate Reboot control in order to initiate full reboot cycle of the device Reboot effect is the same as the hardware reboo
5. 11 20 POF WINCOWS AR 2000 csi ANNA AGA NAA ARNAN 21 Access the WED NR Tu En Ce iia 23 ACCESS CN ELE AA 23 ACCESS WIN WED BIOWSEN dis 26 NAVIA ON AN AN NINANG 29 Mali Menu Baasa AA AG SAA AA An 29 HOWtO SaVe CAM eect ee a ee eee is 29 Basic Network Tab EE 30 Network Mode tee Un Le EE 30 ANS GUD a 30 BaSiIC Wireless aD E 33 Basie Wireless SEINO EE 33 Wireless ele ak a AAO AA AA ANAN 33 ACCESS POINT Parameters S Clin Srita 34 Sei Ee d Le E 36 Wireless DOCU NN Eege 38 ale ee POIN EE 43 Advance Wireless TaD PAA AAAH 44 Long Range Parameters S6lUD essnee aia aa aaa 44 Services AA AA PA PA 46 PING WAIGNO0 DEN 47 PUTO ENC DOO Ll aaa AA NA 47 SNMP CUI IO ss 48 Kee atea 48 e Re RK Ee EI EE 48 Telnet Access SUD s 49 Son ACTOS CIU NA NA NEA EREHE BEL pat oe 49 System LOG Sel Aender dle 49 EL UN 1 A AA AA 50 EH EE ade aaa AA ANA AA AA NSAN 50 FIOSE INGUIN LEE 51 Administrative and Read only Account 1 51 Configuration Management 52 Ried le ee ne 52 Status Page srra AA 54 SUS REDON Le WEEN 54 Stalon GOMMECHON MIO RE 56 More Saga GA AA AG 58 VEAN EL AA AA AA AA 59 VEAN SS Wicca is 59 VLAN Management 60 Appendix ER NGIWONK asias Ai 61 Appendix ll Advanced Settings cccssscccsseeccenseseeseeneeneeseeseesensesseneees 64 Appendix lll SEN E 67 Appendix IV VLAN Setup examples cccccsseecsseeeeseeeeseeeesesenseseeneseees 69 A Tagged Wireless VLAN to Tagged Ethernet VLAN Gen 69 B Untagg
6. Available Sec DNS IP hot Available The Status Page displays a summary of link status information current values of basic configuration settings depending on operating mode network settings and traffic statistics of all the interfaces Status Reporting Main Uptime displays device up time since boot up The time is expressed in days hours minutes and seconds Host Name displays the assigned device host name ID System Time display device current date and time Accurate system date and time is retrieved from the internet services using NTP Network Time Protocol if device is setup and connected to internet Otherwise the date and time update from device own inaccurate autonomous clock Version Firmware Version displays current firmware version in operation Loader Version displays current loader version of the device 54 LAN Setting LAN MAC displays the MAC address of the device LAN Ethernet interface LAN Mode displays the mode used either static or DHCP client LAN IP Address displays the current IP address of the LAN Ethernet interface LAN Gateway IP Address displays the IP address of the gateway used in LAN LAN Pri DNS IP displays the Primary DNS IP address of the LAN setting LAN Sec DNS IP displays the Secondary DNS IP address of the LAN setting WAN Setting Not available in APN 210N units Radio Wireless Mode displays the current operating mode of the device Local AP SS
7. Default is O 32 Basic Wireless Tab Under the tab there is the selection of 4 radios TUS BASIC BASIC AD WIRELESS NETWORK Wil RADIO 1 Fig 2 1 Basic Wireless Tab Currently device support only one 802 11n radio card Select RADIO 1 to configure Basic Wireless Tab contains all the wireless setup which is necessary for the operator to setup the wireless part of the link Basic Wireless Settings All the basic wireless settings can be configured in this page Operators can change the ESSID regulatory country code wireless profile channel spectrum width frequency of interest data rates transmit power and rate aggressiveness Wireless Mode There are 5 modes avallable BASIC WIRELESS SETTINGS Wiere Access Fan Station Station WOS Local AP ESSID O Hide SSID Country Code wl No Country Set y Sooess Pont WOS le j Wireless Profile Repeater WDS Wireless adapter 0 40 s Channel Spectrum Width Guard Interval Short Channel Frequency ke im Select Interference Analyzer Data Rate Mbps i 1 Auto Transmit Power dem Chainmask Lxi Left Single Chain Power Maximum Obey Regulatory Power Rate Aggressiveness 0 W Access Point This mode can be connected to Station mode and then forwards all the traffic to the network devices connected to the Ethernet devices of the Station Access Point WDS This mode can be connected to Station WDS mode Usin
8. EC issued by the Commission of the European Community Compliance with this directive implies conformity to the following EMC Standards FCC 47 CFR Part 15 Subpart B 47 CFR Part 15 Subpart C Section 15 247 CE EN 300 328 2 EN 300 826 EN 301 489 17 Therefore this product is in conformity with the following regional standards FCC Class B following the provisions of FCC Part 15 directive CE Mark following the provisions of the EC directive Manual Version 1 12 January 2013 This manual is written based on Firmware version 1 26 Table of Contents EVEN 7 Tei d ee Tat e DEE 7 FealUkes aNd BEE 8 Hardware Installation aaaaaaaaaaaaa awan w ENKEN R ANNA KNA NN ENNER EN REENEN EN ENEE EE H DIN Rall Installation 9 KE dude Bin l Instala te EE 10 Hardware Overview aam naa naa anuna ANNA NN NANG KANE N ANNA NSAN NAN KEE nnmnnn KEEN R KEREN 11 FONEF WEE 11 FONT Ranes a a AA 12 TOD EE 12 aa ks NG AA AA 13 Cables and Antennas 2 2 0002s sea KEE R ENKEN RREN KEEN REE REN R ENEE NEEN R KEREN R KREE 14 Siet at el icon ene ene AA AA IN 14 10BaseT 100BaseTX Pin Assignments aa 14 Ale e Nadal 15 Operation Modes 8 Connection Examples cscccssssesesseceeseseeseeaeenes 16 Access Point and Access Point WDS Mode cc 11 16 ACCESS IF OIL WIS leie naaa iaa ahas 16 SO ie AE 17 AON DS MOS RI E 18 Repeater ele 19 GContigurethelP AGGress cuna 19 For Windows 95 98 98SE ME NT 111
9. is determined by the country code and the maximum transmit power of the miniPCI that is being used Note on changing channels When the operator changes the channels and if this new frequency have higher power output permitted by regulation the power previously selected low power level will remains unchanged You need to readjust the power level to in order to take advantage higher output power available for the channel Rate Aggressiveness Allows user to reduce or increase transmit rate while still remain in Fully Auto Algorithm There are 2 scenarios that Rate Aggressiveness is useful Environment might be noisy at times Lower the throughput will ensure better stability Rate Aggressiveness allows device to reduce the transmit rate so range or power can be higher Choose a range of value from 3 2 1 Environment might be free of interference But the fully auto algorithm might give low throughput Increase Rate Aggressiveness will increase transmit rate in this case to get higher throughput Choose a range of value from 3 2 1 Station Parameters Settings BASIC WIRELESS SETTINGS Wireless Mode acess Point ha Local AP ESS5ID antaira Hide SSID Country Code bei Ho Country Sat Wireless Profile NG k Channel Spectrum Width 2090 w Guard Interyal Shorr s Channel F requency e Auto Interference Analyzer Data Hate Mbps 11M Auto Transmit Power d m Chainmask 1x1 Left Single Chain Powe
10. let device learn the IP address automatically from the network Netmask Let you set the class for the IP address set Default class C and value is 255 255 255 0 30 Gateway optional Enter the gateway IP address of the network the device is connected Primary DNS IP optional Enter the primary DNS IP address nearest to the gateway router Secondary DNS IP optional Enter the secondary DNS IP address nearest to the gateway router DHCP Mode None function disabled DHCP Server Check to enable Device act IP address distribution server automatically issue IP address and other network information to the DHCP Client request them DHCP Relay check to enable Enter the IP address of the remote DHCP server where the DHCP Client request will be relayed to DHCP Start IP Address Enter the starting IP address to be issue DHCP End IP Address Enter the last IP address the server will issue Netmask Let you set the IP class for the IP address range set for the start and end address Note if device is also the router then IP class must be same as device IP class DHCP Lease Time default is 3600 seconds or 1hour Enter the new lease time in seconds DHCP Server Relay IP Enter the IP address of the remote DHCP server where the DHCP Client request will be relay to get the IP address DHCP Gateway Relay IP Enter the IP address of the remote gateway where the DHCP Client request will be relay to get the gateway IP ad
11. local networks Anternet Access Point WDS Station WDS OI sparent Client Mode MAC MAC D0 70 37 2c f5 de 00 90 59 4c f7 de 18 Repeater WDS Mode Repeater WDS Mode to mainly to extend the wireless range and coverage of the wireless network allowing access and communications over places generally difficult for wireless clients to connect to the network In Repeater mode the access point acts as a relay for network signals on the network by regenerating the signals it receives and retransmitting them to main network infrastructure Detailed information on the Repeater mode is available in the Repeater Setup section Note Repeater WDS requires the access point to be setup in RootAP or Access Point WDS mode to work Ethernet Network a WDS Root AP Ist Repeater AP 2nd Repeater AP Configure the IP Address After setting up the hardware you need to assign an IP address to your PC so that it is in the same subnet as the access point 19 For Windows 95 98 98SE ME NT Step 1 From your desktop right click the Network Neighborhood icon and select Properties Step 2 Select the network adapter that you are using then right click and select Properties Step 3 Highlight TCP IP and click on the Coren oracion damin Cor Properties button ak Pa Pa bt tr Fl arla rd aang b a Head ado Muro ho Loi Maciel Hemos aaah _ _ pr saltado ndice sat o Ste
12. r d Ye role ze ld kel 3 hos ahi cot Na eS Bs DS eg ET rr ala ES TEA Gr B isreg Linke EE Step 2 Open the Connections tab and in the LAN Settings section disable all the option boxes Click on the OK button to update the changes Donal Aras Aram ing 8H SatHnpas Aucomacic a a at ar Abone cor iqursion mag menos manual cetticgs To ee tre Lend patie sain ak kana rf latania hy cd at so ting ead or er GEERT Mn Les a prole seras for cr LAN Mesina Alb capas Lo dal Er YON canon E Fe la SCH La Step 3 At the Address bar type in http 192 168 168 1 and press Enter on your keyboard 26 Step 4 At the login prompt enter the User Name and Password The default are User Name admin Password password Authentication Required ed A username and password are being requested by http 192 168 868 353 The site says Wireless N User Name f Password Cancel It then opens the device home page The Status page 21 ancara STATUS BASIC BASIC ADVANCED VI AN SERVICES SYSTEM WIRELESS NETWORK WIRELESS More Status VERSION Uptime FIRMWARE VERSION 1 20 build 120915 Host Name LOADER ERSTON 2 62 build 1110 Syrtem Time LAN SET TIM WAR SETTING LAN MAG od Od OR 0E43 WAN MAC IP ADDRESS 19216815851 IP ADDRESS GATEWAY IP ADDRESS GATEWAY IP ADDRESS Motavailsbls Pe DS IP Pri DNG IP Met Ae iaka Sec DNS IP Sec DNS IP LAN cable Por
13. vlan ld group te send between AP and wireless cliente AP wlan and ethernet interface must add that wlan group AP ethemet port connecting to the switch must set to the default vian id same as switch port its connecting Setup 3 sakal tag van en ssidi tag vien ID 100 A Ki VLAN switch STH AP VLAN Switch ra SC kf 3 porti tag wan ID 100 Ethernet Ethernet bor tag wan ID 100 emm ome port 2 tag vian D 100 tag vlan Lea tag vian ID 100 porto tag vian e100 POT ethernet PC ethernet tag vlan ID 100 tag vian is 100 69 B Untagged Wireless VLAN to Tagged Ethernet VLAN setup Mulb SSID with untag vlan connections to secured wired tag Vian nebwork connections E _ WEDA N asid untag vlan ID 200 ma Oe YUN F w sida untag vian ID 300 Sid untag van 10100 IN ai ll Ml DE ka AP VLAN gwibch ca Internet access port tag vlan 0100 pad AA Ethernet WPC1 ei e moi port tag vlan ID 200 mah C Company Server tag vlan maba porta tag Wan IDe300 Ng Video VLAN Switch page setup H H 2 mika a ee i for wireless for Ethernet port MAIN add untag vian ID 100 add tag vian ID 100 VAPI add untag vlan ra add tag vlan ID 200 VAP2 ada untag vlan ID 300 add tag vlani ID 300 VAPS add untag vlan De400 add tag vlan ID 400 C Tagged VLAN Pass Through AP and Station link No VLAN Setup Required Tagged VLAN pass through AP and Station link no VLAN Setup Required AP and Station devices no VL
14. 0BASE TX Cat 5100 ohm UTP UTP 100 m 328 ft RJ 45 10BaseT 100BaseTX Pin Assignments With 100BASE TX 10BASE T cable pins 1 and 2 are used for transmitting data and pins 3 and 6 are used for receiving data RJ 45 Pin Assignments TD TD RD The APN 210N AP support auto MDI MDI X operation You can use a straight through cable to connect PC and AP The following table below shows the 10BASE T 100BASE TX MDI and MDI X port pin outs MDI MDI X pins assignment Guten TEE 2 fow AD receive RD receive TD transmit 14 6D receive TD transmit 8 Woued nee Note and signs represent the polarity of the wires that make up each wire pair Wireless Antenna 2 4GHz antennas are used for the APN 210N and connected with reversed SMA connectors External antennas also can be applied with this connectors 15 Operation Modes amp Connection Examples Access Point and Access Point WDS Mode The Access Point Mode is the default mode of the device It enables the bridging of wireless clients to wired network infrastructure and enables transparent access and communication with each other The illustration below shows a typical resources sharing application example using this device The wireless users are able to access the file server connected to the switch through the access point in Access Point Mode internet Cable ADSL modem Switch router Access Point f File ser
15. 1 build 090727 Browse Upgrade Use this section to find out current software version and update the device with the new firmware The device firmware update is compatible with all configuration settings System configurations are preserved while the device is updated with a new firmware version Firmware version displays the version of the current firmware of the device system Upgrade button opens the Firmware Upload window if activated Current Firmware displays the version of the device firmware which is currently operating Firmware File activate Browse button to navigate to and select the new firmware file The full path to the new firmware file location can be specified there New firmware file is transferred to the system after Upload button is activated Close this window button cancels the new firmware upload process if activated Upgrade button should be activated in order to proceed with firmware upgrade routine new firmware image should be uploaded into the system first Please be patient as the firmware upgrade routine can take 3 7 minutes The based device will be un accessible until the firmware upgrade routine is completed Do not switch off do not reboot and do not disconnect the device from the power supply during the firmware upgrade process as these actions will damage the device It is highly recommended to backup the system configuration and the Support Info file before uploading the new configu
16. AN setting required i VLAN switch port 1 tag vlan ID 200 Ethernet Ethernet Lportitag vian ID 200 LL port tag vlan ID 100 Lport2 tag vlan 0 100 POT ethernet PC ethernet tag vlan 02100 tag vlan ID 100 70
17. Because of sending smaller frames collisions are much less likely to occur However lower values of the Fragmentation Threshold will result lower throughput as well Minor or no modifications of the Fragmentation Threshold value is recommended while default setting of 2346 is optimum in most of the wireless network use cases Station Isolation This option allows packets only to be sent from the external network to the CPE and vice verse applicable for AP AP WDS mode only If the Client Isolation is enabled wireless stations connected to the same AP will not be able to interconnect on both layer 2 MAC and layer 3 IP level This is effective for the associated stations and WDS peers also Acknowledgement Timeout Device has an auto acknowledgement timeout algorithm which dynamically optimizes the frame acknowledgement timeout value without user intervention This is a critical feature required for stabilizing long distance outdoor links The user also has the ability to enter the value manually Distance specify the distance value in miles or kilometers using slider or enter the value manually The signal strength and throughput falls off with range Changing the distance value will change the ACK Timeout to the appropriate value of the distance ACK Timeout specify the ACK Timeout Every time the station receives the data frame it sends an ACK frame to the AP if transmission errors are absent If the station receives no ACK frame from t
18. GC OO Industrial Wireless N Access Point APN 210N User Manual Version 1 2 Ntaira www antaira com Copyright 2013 Antaira Technologies LLC All Rights Reserved This document contains information which is protected by copynght Reproduction adaptation or translation without pnor permission is prohibited except as allowed under the copynght laws Trademark Information Antaira is a registered trademark of Antaira Technologies LLC Microsoft Windows and the Windows logo are the trademarks of Microsoft Com NetWare is the registered trademark of Novell Inc WMM and WPA are the registered trademarks of Wi Fi Alliance Allotherbrand and product names are trademarks or registered trademarks of their respective owners Notice Copyrights 2013 by Antaira Technologies LLC All rights reserved Reproduction adaptation or translation without pnor pemission of Antaira Technologies LLC is prohibited except asallowed under the copynght laws Disclaimer Antaira Technologies LLC provides this manual without waranty of any kind expressed or implied including but not limited to the implied warranties of merchantability and fitness for a particular purpose Antaira Technologies LLC may make improvements and or changes to the product and or specifications of the product described in this manual without prior notice Antaira Technologies LIC will not be liable for any technical inaccuracies or typographical errors found in this g
19. ID displays the current SSID Service Set Identifier of device when operates in access point mode Frequency displays current operating frequency running in device WLAN MAC displays the MAC address or BSSID of the current active WLAN card running in device WLAN Local Remote AP MAC displays the MAC address of the WLAN card connected to it WLAN Security display the current active security mode 55 Clients Connection Status in AP Status Info All clients connected to AP can be view from AP Status page Below is an example of a client s connection status info Click to refresh client connection statistics and status page Radio 1 Wireless Mode Acceze Point MAD Fe eb Od 08 05 45 LOCAL AP SSID LOCAL AP MAC Ack Timeout od Refresh CONNECTED STATIONS 0 MAC ADDRESS SIGNAL STRENGTH Tx RATE Tx CCQ Rx RATE CHANNEL WIDTH LOCAL AP STATISTICS Bybes Packets Errors Recelved o cc E la Seitert 7 LOCAL AP ERRORS RX Invalid WWII 716 PX Excessive Hetries Po HX Invalid Crypt Pa Missed Beacons RX Invalid Frag la Other Errors Ir Select vap Signals strength at the left and right port of radio card can be view with more accurately while adjusting the antenna to get a more balanced reception Station Connection Info Status Info Click to refresh client connection statistics and status page Radio 1 Wireless Mode MAC Fe ch Od 03 03 45 REMOTE AP SSID REMOTE AP MAC Signal Streng
20. K Timeout CTS Timeout will be calculated Fine tuning can be further adjusted for the best environment conditions to achieve best performance and better link reliability 44 Noise Immunity Check to enable When enabled it automatically adjusts the signal noise level for best performance In low noise environment it is recommended to turn off this function Signal Strength Indicator RSSI Signal Strength Indicator R551 LED1 Dr LED 20 LED3 Er LED4 ag The default values are LED1 Red 10 LED2 Yellow 20 LED3 Green 40 Each LEDs when turn on indicates the RSSI signal strength has hit over the value e g When LED1 and LED light up it indicate the RSSI is greater than 20 When all 4 LEDs light up it indicate RSSI is greater than 40 For long distant installation when signal strength expected to be about 20 30 the values can be adjusted to display over this new range e g the LEDs values can be adjusted as follows LED1 RSSI value 7 LED2 RSSI value 15 LED3 RSSI value 22 LED4 RSSI value 27 Station Isolation When checked prevent wireless clients on same AP from discovering other clients Chainmask Selection Available is 1x1 Left Chain 1x1 Left Chain radio card to operate with 1transmit and 1 receive stream and both transmit receive on the left port of radio card only 45 Services Tab Click Services tab from menu to open the page below Services section provides varieties of useful and enh
21. LS and WPA EAP PEAP REMOTE AP WIRELESS SECURITY Security wea 7 WPA Authentication EAP j EAP_TTLS Preshared Key aaa UV identity anony mous User Name juser example com User Password password Fig 2 8 WPA Station Station WDS Repeater WDS This applies to the following modes only when WPA or WPA2 with EAP is selected Station Station WDS Repeater WDS Mode Identity Identification credential used by the wpa supplicant for EAP authentication User Name Identification credential used by the wpa supplicant for EAP tunneled authentication in unencrypted form User Password Password credential used by the wpa supplicant for EAP authentication 40 IEEE802 1x Settings The operation of the Keys is the same for ALL the modes Note Operating with IEEE802 1x security will limit AP to maximum wireless link speed of 54Mbps only LOCAL AP WIRELESS SECURITY Security IEEES02 1 sl Pri Radius Server IP ATT Sec Radius Server IP Ionnn Authentication Port isi Accounting Port i813 cc Radius Secret Key private cc IEEE802 1X Key Rotation 600 IEEE802 1X Key Length Gd bit al MAC ACL T Enabled A E Policy Allow E Fig 2 8 IEEE802 1X Access Point Access Point WDS Repeater WDS This option apply to the following modes only when WPA EAP or IEEE802 1x Access Point Access Point WDS Repeater WDS modes Primary Radius Serve
22. NG is 11n 2 4GHz band and represents a mixed of 802 11n 802 11g and 802 11b mode Channel Spectrum Width 20M represents the data transmitted at a bandwidth of 20MHz 20 40MHz represents the data transmitted at either 2OMHz or 40MHz In very noisy environment it automatically falls back to 20MHZ to be more resilient to the interference In situation when auto fall back did not happened manually changing channel spectrum width to 20MHz will to help reduce interference on the link and improve performance Note 40MHz bandwidth is non standard for 802 11n g mode operation If you experience unstable performance change Channel Spectrum Width to 20M Channel Frequency This is frequency selection you can set for device to operate on The frequency range available depends on the country domain you select in Country Code Auto When checked during startup device automatically select the least interfering channels or frequency for the operation Data Rate Data Rates consist of both the legacy rates and the MCS Modulation Coding Scheme Only for 802 11n rates 6 54Mbps are Legacy Rates MCSO to MCS7 are 802 11n rates which uses only 1 stream MCS8 to MCS15 are 802 11n rates which uses 2 streams Auto The data rate selected will follow an advanced rate algorithm that takes into 35 condition the amount of errors at the data rate and fine tune to the best data rate it can use Transmit Power The maximum transmit power displayed
23. address Mask avita 192 168 166 150 10301 ace 00 21 88 10 64 78 bro Bridge Table display a list the devices connect to the bridge interface BRIDGE TABLE Mac Address Is Local Agein Timer 1 O0 06 61 00 F e6 no 25 18 1 00 12 3f 4 45 60 no 119 57 1 00 13 20 5d 10 fa no 3 29 1 00 13 20 67 105 d3 no 329 1 00 13 dd 2F 63 26 no Sa 97 1 00 16 76 b7 50 52 no 1 50 1 00 12 20 8e 0c 7b no 30 66 1 00 21 5b 10 60 78 no 0 12 1 00 2266 11 53 065 no 25 37 1 02 01 00 00 00 00 no O ded DHCP Active Lease Table display a list of IPs addresses leased to all computers DACP ACTIVE LFAaASES HU Pee IP ADAP SS ALAR Re MAI LEASF FXO TRED TIFF STATION Loz 160 89 214 C00 30 49 15 E0 EL FEI DEC 31 17 03 32 1555 58 VLAN Tab This setup lets you create virtual local network connection through the device Ethernet only and over wireless connections By default VLAN mode is disabled and checked on No VLAN VLAN Switch To setup VLAN network check on VLAN Switch VLAN MODES CC No Vian Ce Vlan Switch C wlan Management ETHERNET NL AN Default LAN ID LGA ID Tag VLAN IC Tag 2001 Tag Delete ts zl add RADIO 1 YLAN E ooe Gf aa A Main YAP IL YAP TAPS Default YLAN ID 2001 WAND T ULAN 1D Tha 2001 Tag el Delete Tag l Add To add a Tag VLAN ID for Ethernet port type in the ID number select Tag and click Add To add a Tag VLAN ID for MAIN wireless SSID type in the ID numb
24. anced functions to help assist device operations STATUS BASIC BASIC ADVANCED WIRELESS NETWORK WIRELESS PING WATCHDOG Enable Ping Watchdog IT IP Address To Ping 192 168 168 1 Ping Interval 5 seconds Startup Delay 60 seconds Failure Count To Reboot 5 AUTO REBOOT Auto Reboot Mode Disabled x SNMP SETUP Enable SNMP O Read Password public Engine ID s00007e5BD000027041 Enable SNMP Trap E Trap Destination IP 192 168 168 1 Community public NTP SETUP Select Your Time Zone GMT 07 00 Mountain Time US amp Canada Enable NTP Client iv Custom Time Server time nist gov o Known Time Server bonehed lcs mit edu WEB SERYER Web server mode HTTPS Port TELNET SERYER Enable Telnet Server Server Port SSH SERYER Enable SSH Server Server Port SYSTEM LOG Enable System Log Logging IP Domain Name 192 168 168 1 Logging Port 514 VLAN SERVICES SYSTEM 46 Ping Watchdog PING WATCHDOG Enable Ping Watchdoq IT IP Address To Ping 192 168 168 1 Ping Interval 5 seconds Startup Delay E seconds Failure Count To Reboot 5 Enable Ping Watchdog Default is disabled Check on box to enable IP Address To Ping Target IP address do ping test monitor Ping Interval Default is 5 seconds minimum This is Ping test duration Startup Delay Default is 60 seconds minimum One time delay after device startup Fai
25. des If the device IP settings and administrator PC which is connected to the device in wired or wireless way IP settings will use different address space the device will become unreachable Netmask This is a value which when expanded into binary provides a mapping to define which portions of IP address groups can be classified as host devices and network devices Netmask defines the address space of the network segment where device resides 255 255 255 0 or 24 Netmask is commonly used among many C Class IP networks Gateway IP Typically this is the IP address of the host router which provides the point of connection to the internet This can be a DSL modem Cable modem or a WISP gateway router Device will direct the packets of data to the gateway if the destination host is not within the local network Gateway IP address should be from same address space on same network segment as the device Primary Secondary DNS IP The Domain Name System DNS is an internet phone book which translates domain names to IP addresses These fields identify the server IP addresses of where the device looks for the translation source Primary DNS server IP address should be specified for the device management purposes Secondary DNS server IP address is optional It is used as the fail over in case the primary DNS server will become unresponsive Spanning Tree Protocol Multiple interconnected bridges create larger networks using the IEEE 802 1d S
26. dress Enable DNS Proxy Check to enable function Device router operation will act as proxy to resolve all DNS requests 31 DHCP Reservations DHCP SERVER RESERVATIONS IP Address Hardware MAC IP Address Hardware MAC 192 168 168 100 00 11 22 33 44 55 Remove LL Click Add to enter for each device the IP address and MAC address All DHCP active lease devices are displayed in the Status tab page from the More Status selection Domain Name Server Entry DOMAIN NAME SERVER ADDRESSES Obtain ONS server address automatically o Use the following DNS server addresses Primary ONS IP Secondary ONS IP The Primary and Secondary DNS IP addresses entry is for device operation to resolve domain name to reach certain servers like internet time server and other services that use domain name Note Ensure device gateway IP is also set that to allow device to access to internet Primary DNS IP optional Enter the primary DNS IP address nearest to the gateway router Secondary DNS IP optional Enter the secondary DNS IP address nearest to the gateway router Bandwidth Control between Ethernet and Wireless BANDWIDTH CONTROL SETUP Ethernet to Wireless Traffic Limit kbit Upload Wireless to Ethernet Traffic Limit kbit Download An entry of value O means no bandwidth flow limit between the 2 interfaces An entry of 2000 means 2000Kbit or 2Mbit limit traffic flow between the 2 interfaces
27. e lira or no connect Ca 21 Step 4 Select the Use the following IP e address radio button mn a a Ypa man pal F aling rre naay a ree F a Dt brat capas Othe emu red fk a rere cheat ka Cheap e F Set the IP address to il 192 168 168 X and subnet mask Be Ke F aici to 255 255 255 0 where X can be alias Dala gabay any number from 2 to 254 Ga hg Iha kee DAG maan sdieri Pama NG eet barato Ch m a Step 5 Click on the OK button to close all windows Step 6 To verify that the IP address has been correctly assigned to your PC go to the Start menu Accessories select Command Prompt and type the command pconfig all CWOTA ate 33 cide PC is now setup with a proper IP address to communicate with the access point 22 Access the Web Interface Access with uConfig The UConfig utility provides direct access to the web interface Step 1 Click uConfig icon to launch the utility then click Yes button pa a Ceanlg utility should be run onby in ne Ap eng conmection with a uConfig compatible device Pose PC is connected lo other IP devices in the network Comdiqg may not work properly De you went ba proceed 23 Step 2 Select the access point from the products list and click on the Open Web button To retrieve and display the latest device s in the list click on the Refresh button Help NIC Adaptor List Description MAC Ip Mask Gateway Broadcom wireles
28. e syslog remote sending function while System log messages are sent to a remote server specified by the Remote Log IP Address and Remote Log Port Remote Log IP Address is the host IP address where syslog messages should be sent Remote host should be configured properly to receive syslog protocol messages Remote Log Port is the TCP IP port of the host syslog messages should be sent 514 is the default port for the commonly used system message logging utilities Every logged message contains at least a System Time and a Host Name Usually a particular service name which generates the system event is specifies also within the message Messages from different services have different context and different level of the details Usually error warning or informational system services messages are reported The more detailed system messages are reported the greater volume of log messages will be generated 68 Appendix IV VLAN Setup examples A Tagged Wireless VLAN to Tagged Ethernet VLAN Setup Tag vlan connection Setup Setup 1 saidi tag vlan 1D0 100 tag vlan 0 100 tag vian l0 2200 pa AR Pp 8 d mmm Ethernet port tag van 0100 E WPC1 wlan tag vlan ip E port tag vlan 1D 100 C PC2 ethemat tag vlan ID 100 Setup 2 ssid tag vlan ID 100 rag vlan ID 200 wt al porti tag vian ID 100 port 3 tag van 200 to Ethernet WPCH wlan tag vlan ID 200 baa dech fr KG PC ethemet tag vlan 0900 Hints For each
29. e tuning which provide the access point with the ability to auto calculate parameters such as slot time ACK time out and CTS time out to achieve a longer range Features and Benefits Point to Point 4 Point to MultiPoint Support Point to Point and Point to MultiPoint communication between different buildings enables you to bridge wireless clients that are kilometres apart while unifying the networks Virtual AP Multiple SSID Virtual AP implements mSSID Multi SSID This allows a single wireless system to be set up with multiple virtual AP connections with different SSIDs or BSSID Basic Service Set Identifier and different security settings Highly Secured Wireless Network The access point supports the highest available wireless security standard IEEE802 11i compliant The access point also supports IEEE 802 1x for secure and centralized user based authentication Wireless clients are thus required to authenticate through highly secure methods like EAP TTLS and EAP PEAP in order to obtain access to the network uConfig Utility The exclusive uConfig utility allows users to access the user friendly Web configuration interface of the access point without having to change the TCP IP setup of the workstation HTTPS The access point supports HTTPS SSL in addition to the standard HTTP HTTPS SSL features additional authentication and encryption for secure communication Telnet Telnet allows a computer to remotely connect t
30. ed Wireless VLAN to Tagged Ethernet VLAN setup 70 Gi Tagged VEAN Pass T ALOUGM EE 70 Overview Introduction The high performance Wireless Network Access Point AP is designed for industrial and enterprise access applications Embedded with the Atheros chipset it boasts network robustness stability and wider network coverage Based on 802 11n Draft 2 0 the access point supports high speed data transmission of up to 300Mbps The access point is capable of operating in different modes which makes it suitable for a wide variety of wireless applications including long distance deployments Designed with externals R SMA connectors offering excellent electrical performance and compatible with R SMA antennas the access point can be used for a wide variety of wireless applications and allows you to position the wireless antenna in a better signal broadcasting location for improved wireless coverage and signal strength or simply in a more convenient location To protect your security and privacy the access point is armed with many enhanced and latest wireless security features such as IEEE 802 11i standards MAC Address Filtering IEEE 802 1x Authentication and WEP WPA WPA2 encryption to ensure privacy for the heterogeneous mix of users within the same wireless network The access point also incorporates a unique set of advanced features such as Virtual AP to deliver multiple services Long Range parameter fin
31. er usually it is the IP of the system which the packet is addressed to Destination Port is the destination port of the TCP UDP packet specified within the packet header usually it is the port of the host system application which the packet is addressed to Comments is the informal field for the comment of the particular firewall entry Few words about the particular firewall entry purpose are saved there usually On flag enables or disables the effect of the particular firewall entry All the added firewall entries are saved in system configuration file however only the enabled firewall entries will be active during the system operation New Firewall entries can be saved by activating Apply button or discarded by activating Cancel button in the Firewall configuration window All the active firewall entries are stored in the FIREWALL chain of the ebtables filter table while the device is operating in Bridge mode Click Apply Setting and Save Changes button to save the changes made in the Network page 63 Appendix ll Advanced Settings This section provides more detail explanation on advanced setting for routing and wireless settings The Advanced options page allows you to manage advanced settings that influence on the device performance and behavior The advanced wireless settings are dedicated for more technically advanced users who have a sufficient knowledge about wireless LAN technology These settings should not be changed un
32. er select Tag and click Add To add a Tag VLAN ID for VAP1 wireless SSID type in the ID number select Tag and click Add To add a Tag VLAN ID for VAP2 wireless SSID type in the ID number select Tag and click Add To add a Tag VLAN ID for VAP3 wireless SSID type in the ID number select Tag and click Add Warning Adding a Tag VLAN ID to device interface port can cause lost of connection to device web manager if the PC ethernet port or wireless connection do not have a Tag VLAN ID or do not have the same Tag VLAN ID setup in device If this happened use the device Reset button to clear the config and reconfigure Refer Reset button operations section Similarly to add an untag VLAN ID enter the ID number and select Untag and click Add Refer to Appendix V for VLAN setup examples 59 VLAN Management VLAN management lets you control and limit only clients connection of same tag VLAN ID group be open AP device web page Note VLAN Management works only in tag VLAN pass through mode i e VLAN Switch is disabled When VLAN Switch is enabled or configured VLAN Management function stops operation VLAN MODES E Vian Switch e den Management WLAN MANAGEMENT VLAN ID IP ADDRESS MANAGEMENT IP VLAM TE IP ADDRESS Ba 2002 142 168 160 10 REMOVE 2004 192 168 168 20 REMOVE Example Assuming there are 2 VLAN ID groups 2001 and 2002 setup in AP device One entry in VLAN Management has VLAN ID 2001 with
33. es radius server for authentication and accounting You may not use different secret key for each VAP Or you should configure only for one SSID with radius authentication 43 Advance Wireless Tab TUS BASIC BASIC ADVANCED VLAN SERVICES Sis WIRELESS NETWORK WIRELESS RADIO 1 Click Advanced Wireless tab from menu and select RADIO 1 to open the page below LONG RANGE PARAMETERS RADIO 1 Long Range Parameters Cl Enable Acacon Interval ATS Threshold Fragmentation Threshold Distance In meters Ke Slot Timefusp gt ACE Timeout us ES Auto Adjust tar Shottirne SCE Timeout OTS Timeout CTS Timeout fus OTHER SETTINGS RADIO 1 Hoise Immunity e Enable Signal Strength Indicator R551 LEDI 10 LED 20 LEDA 30 LEDA 40 Radio OF with No Ethernet JEnabla Chaimmask Selection 1x1 Lett Chain Staton Isolation C Enable Minimum Station R551 a7 Lo Enable Long Range Parameters Setup Advanced wireless page let you setup outdoor long distant connection parameters Long Range Parameters Check to enable parameters Beacon Interval default is 100 ms Define the time interval in millisecond the beacon to broadcast Recommend to use default RTS Threshold Default is OFF Fragmentation Threshold Default is OFF Distance Enter the distant in meters the device is to connect with the opposite device Then click Calculate The close approximate values for Slot Time AC
34. g WDS protocol it 33 allows a client or station device to bridge wireless traffic transparently Station This is a client mode that can be connected to the Access Point mode It is used to bridge the wireless connection to an Access Point It forwards all the traffic to from the network devices to the Ethernet interface This mode translates all the packets that pass through device to its own MAC address thus resulting in a lack of transparency Station WDS WDS is the acronym of Wireless Distribution System lt can be connected to the Access Point WDS mode It enables packet forwarding at layer 2 level Unlike Station mode it is fully transparent at layer 2 level Note for Station WDS Access Point WDS Repeater WDS WDS protocol used is not defined as the standard thus compatibility issues between equipment from different vendors might arise Repeater WDS This mode consists of a Station WDS and an Access Point WDS mode The Repeater WDS must first link up with an Access Point WDS and then it can link up with a Station WDS It acts as an extension to the link and can add more Repeater WDS as necessary Note for Repeater WDS ESSID must be the same for the Remote AP and the Local AP The channels used Repeater to link to another Repeater will follow the Access Point WDS connection selected channel Access Point Parameters Settings BASIC WIRELESS SETTINGS Wireless ode Access Paint kal
35. gt O F S a les len anther hm entara Upin HusL Hanri Swal mme LAY SETTING LAM MAL HIE TF ADDRESS STATUS BASE ALS A TOT gs Arh ZU 123189 lii ah UU YG 292 156 LP GA ALERT J AUONESS Fri Dip IF Asr HA IB LAN cable Partl Port ji Buda Wirebess Mode LULAL Al YFL Frequinrs Ack Timesuti Hugged Lnpugazd Access Pont 7 977 Hr l Ge EURHEUTED SEALs E Foi AIMEE aS ERAL STRERGTA Ta RATE LARS AF STATISTICS Recelyed Ernani LOCAL AP EIHUHn EX Invalid WIN EX jponlle Crypt ES Invalid Frag Nyt aa Park at FASE ML IRMUZIR ACR CED WIRELESS FIAMRWARE YERSIO LJADERL ERSLUR Wah SETTING WAY MAL PADIN IF ADDRESS AAIEWAY IP AMIES Bir DHp IF Aer M45 ER MAC LUC AL AW MAL bererttsw TE OD Cowra o Le Lo 22 2 E TX Erraxibea Hadrint D ae fa lo Alznead D pecnns Dither Errors VLAN Ex EATE BE o B m fle Ci SERVICES SIS TEM Lian icuiddz2915 Yor Avalads Poca id 08 03 45 Foes ue Hl AG Kina CHASE EL WiTH fo la sart WiP e 25 Access with Web Browser Step 1 Launch your Web browser e g Internet Explorer FireFox Netscape etc If using MS IE under the Tools tab select Internet Options 3 Yahoo Singapore Mr rerh Internet Explorer Hie am Mag RAGAY pa KC Hed Rall ane Haze b SpE d ist a
36. guration backup Activation Keys Optional special add on functions you can purchased separately to activate in device How to save changes After made changes from each respective setup page click this bt Next the prompt below appear You are asked to confirm if you want to save the change permanently to device flash Save configuration changes Save Discard Click Save will write all configuration changes to flash Click Discard will discard all changes made If not sure what changes were made earlier recommend to discard and reconfigure again 29 Basic Network Tab us BASIC BASIC ADVANCED VL WIRELESS NETWORK WIRELESS Click BASIC NETWORK from the menu bar to open the page as show below Apply Settings WNEIWORK INFORMATION Network Mode Bridge Ww Disable Network NONE kz LOCAL AREA NETWORK LAN Mode O DHCP client ve Static IP Address 192 168 168 1 Netmask 255 255 255 0 Galeway IF DHCP Fallback IP 132 168 166 103 _ DHCP Mode NONE DHCP Server DHCP Relay DHCP Start IP Address E DHCP End IF Address i DHCP Hetmaski Ei DHCP Gateway IP DHCP Lease Time seconds DHCP Belay Server IP DHCP Relay Galeway IP i Enable DNS Proxy O Network Mode Bridging Network Mode Bridge mode default LAN Setup LAN Mode Static default lets you enter a specific IP address for the device Default IP address is 192 168 168 1 DHCP Client when set
37. he AP within set timeout it re sends the frame The performance drops because of the too many data frames are re send thus if the timeout is set too short or too long it will result poor connection and throughput performance Changing the ACK Timeout value will change the Distance to the appropriate distance value for the ACK Timeout Auto Adjust control and enable the ACK Timeout Self Configuration feature If enabled ACK Timeout value will be derived dynamically using an algorithm similar to the Conservative Rate Algorithm described above It is not recommended to use Auto Adjust option for long range links if the signal level is low or the high level of interference is present If two or more stations are located at the considerably different distance from the Access Point the highest ACK Timeout for the farthest station should be set at the AP side It is not recommended to use Auto Adjust option for Point to Multipoint connections as it will not warrant highest network performance in all the use cases 65 Signal Strength LED Settings LED Thresholds Configuration The LED s for signal strength on the device can be made to light on when received signal levels reach the values defined in the following fields This allows a technician to easily deploy a CPE without logging into the unit i e for antenna alignment operation Signal LED Thresholds specify the marginal value of Signal Strength dBm which will switch on LEDs indicating s
38. ignal strength LED 1 Red will switch on if the Signal Strength reaches the value set in an entry field next to it LED 2 Yellow will switch on if the Signal Strength reaches the value set in an entry field next to it LED 3 Green will switch on if the Signal Strength reaches the value set in an entry field next to it LED 4 Green will switch on if the Signal Strength reaches the value set in an entry field next to it Configuration example if the Signal Strength fluctuates around RSSI 15 30 the LED Thresholds can be adjusted to the RSSI values 15 20 25 30 66 Appendix IL Services This section provides more details on the system management services Ping WatchDog The ping watchdog sets the device to continuously ping a user defined IP address it can be the internet gateway for example If it is unable to ping under the user defined constraints the device will automatically reboot This option creates a kind of fail proof mechanism Ping Watchdog is dedicated for continuous monitoring of the particular connection to remote host using the Ping tool The Ping works by sending ICMP echo request packets to the target host and listening for ICMP echo response replies If the defined number of replies is not received the tool reboots the device Enable Ping Watchdog control will enable Ping Watchdog Tool IP Address To Ping enter the target host IP address to monitor Ping Interval specify time interva
39. l in seconds between to send the ICMP echo requests Startup Delay specify initial time delay in seconds from device startup or reboot to start sending first ICMP echo requests Minimum value is 60 seconds Failure Count To Reboot specify the number of ICMP echo response replies If the specified number of ICMP echo response packets is not received continuously the Ping Watchdog Tool will reboot the device SNMP Agent Simple Network Monitor Protocol SNMP is used in network management systems to monitor network attached devices for conditions that warrant administrative attention Device contains an SNMP agent which allows it to communicate to SNMP manage applications for network provisioning SNMP Agent provides an interface for device monitoring using the Simple Network Management Protocol an application layer protocol that facilitates the exchange of management information between network devices SNMP Agent allows network administrators to monitor network performance find and solve network problems For the purpose of equipment identification it is always a good idea to configure SNMP agents with contact and location information Enable SNMP Agent control will enable SNMP Agent SNMP Community specify SNMP community string It is required to authenticate access to MIB objects and functions as embedded password The device supports a Read only community string that gives read access to authorized manageme
40. latory Power checking this box will obey Tx output regulatory power by country Channel Scan List 02412 ME 12417 Mir 12422 MHz 02427 MEz 02432 MHz 12437 Maz 12442 MH 02447 MHz 12452 MEz 02457 MHz 012462 MHz Select all Apaly Close this window Fig 2 5 Channel Scan List In US Country Code According to the availability of channels in the country codes the operator can select which channels to be scanned when scanning for an Access Point Then the scanned channels will appear on the Site Survey Wireless Security All the wireless security settings are set under this section The operation of the Keys is the same for ALL the Wireless modes WPA or WPA2 Authentication LOCAL AP WIRELESS SECURITY Security WPA WPA Aulhentication pep EN Cipher lye AES WPA Preshared Loy 1110110011 Pri Radius Server IP Sec Hadid Server IP Authentication Port Accounting Por Haus Secret Key HAC ALL Enabled papa f Policy i Fig 2 7 WPA Access Point Access Point WDS Repeater WDS 38 WPA PSK PSK Default WPA or WPA2 with Pre shared Key method Cipher Type TKIP Temporal Key Integrity Protocol which uses RC4 encryption algorithm AES Advanced Encryption Standard AES algorithm AUTO Default Automatically select between both algorithms Preshared Key This option is available when WPA or WPA2 with PSK selected The pre shared key is an alpha numeric password betwee
41. led Count To Reboot Default is 5 This is the number of ping failure count before device kick in the reboot process Auto Reboot AUTO REBOOT Auto Reboot Mode Auto Reboot Mode Default is disabled Select By Hour or By Time check This mode lets you preset a timer to automatically force a reboot Timer can in fixed number of hours or at a specified time of day By Hour Enter the number of hours device need to run before kick start reboot process By Time Enter the specific time of day in hh mm 24 hour format to kick start reboots process 47 SNMP Setup SNMP SETUP Enable SNMP el Read Password public Engine ID 800007e5B000002704 Enable SNMP Trap E Trap Destination IP 192 168 168 1 Community public Apply Enable SNMP Default is disabled Check on box to enable Read Only Password Password to query device Engine ID Default is 800007e5BD00002704D000007c Enable SNMP Trap Default is disabled Check on box to enable Trap Destination IP Enter the IP to send the info when trap is triggered Community Enter the SNMP community string NTP Setup NTP SETUP Select Your Time Zone SMT 07 00 Mountain Time US amp Canada Enable NTP Client h Custom Time Server time nist gov Known Time Server bonehed Ics mit edu D Apply Enable NTP Client Default is disabled Check on box to enable Select Your Time Zone Select from list the country you reside Custom Time Server Defa
42. less you know what effect the changes will have on your device Advanced Wireless Setting The 802 11a g data rates include 6 9 12 18 24 36 48 54Mbps The 802 11n data rates are the MCS Modulation Coding Scheme rates MCSO to MCS7 are 802 11n rates which uses only 1 Tx Rx stream MCS8 to MCS15 are 802 11n rates which uses 2 Tx Rx streams The Rate Algorithm has a critical impact on performance in outdoor links as generally lower data rates are more immune to noise while higher rates are less immune but are capable of higher throughput Rate Aggressiveness Allows user to reduce or increase transmit rate while still remain in Fully Auto Algorithm There are 2 scenarios that Rate Aggressiveness is useful Environment might be noisy at times Lower the throughput will ensure better stability Rate Aggressiveness allows device to reduce the transmit rate so range or power can be higher Choose a range of value from 3 2 1 Environment might be free of interference But the fully auto algorithm might give low throughput Increase Rate Aggressiveness will increase transmit rate in this case to get higher throughput Choose a range of value from 3 2 1 Noise Immunity option increases the robustness of the device to operate in the presence of noise disturbance which is usually generated by external 802 11 traffic sources channel hopping signals and other interferes RTS Threshold determines the packet size of a transmission and thro
43. lowing two conditions This device may not cause ha mful interference and This device must accept any interference received including interference that may cause undesired operation RF Exposure waming The equipment complies with FCC RF exposure limits set forth for an uncontrolled environment The equipment must not be co located or operating in conjunction with any other antenna or tra nsmitter ICES 003 Statement This Class B digital apparatus complies with Canadian ICES 003 Declaration of Conformity Antaira declares the following Product Type Wireless Acc ess Point Model No APN 210N conforms to the following Product Standards This device complies with the Electromagnetic Compatibility Directive 89 336 EEC issued by the Commission of the European Community Compliance with this directive implies conformity to the following European Norms in brackets are the equivalent intemational standards Electomagnetc Interference Conduction and Radiation EN 55022 CISPR 22 Eleectromagnetic Immunity EN 55024 IEC 61000 4 2 3 4 5 6 8 11 Low Voltage Directive EN 60 950 1992 A1 1993442 1993443 1995444 1996 A11 1997 Therefore this product is in conformity with the following regional standards FCC Class B following the provisions of FCC Part 15 directive CE Mark following the provisions of the EC directive Antaira also declaresthat The wireless card in this product complies with the R amp TTE Directive 1999 5
44. masquerade IP address 192 168 168 20 Another entry in VLAN Management has VLAN ID 2002 with masquerade IP address 192 168 168 10 You can only select one of the 2 entries to be the active VLAN ID and IP address If VLAN ID 2001 group is selected then only computers in that VLAN ID group can open the AP device web page using the IP address http 192 168 168 20 To change to other ID group say VLAN ID 2002 mark the radio button under Management IP then click Apply and Saved If there is no entry in VLAN Management there is no restriction All computers can open the AP device web page by the default IP address setup in Basic Network page 60 Appendix Network This section provides more detailed explanation on the network operation modes in general The Network Page allows the administrator to setup bridge or routing functionality Device can operate in bridge or router mode The IP configuration as described below is required for device management purposes IP addresses can either be retrieved from a DHCP server or configured manually Use the Network menu to configure the IP settings Network Mode Selections Network Mode Operating network mode for the device The mode depends on the network topology requirements Bridge operating mode is selected by default as it is widely used by the subscriber stations while connecting to Access Point or using WDS In this mode the device will act as a transparent bridge and will operate i
45. n 8 and 63 characters long Important 802 11n network using WPA authentication should use AES cipher type for connection Only AES allows highest transmission speed and throughput operation Using TKIP cipher type device will limit maximum transmission speed of up to 54Mbps only WPA EAP LOCAL AP WIRELESS SECURITY Security wes sl WPA Authentication EAP sl Cipher Type AES WPA Preshared Key Po Pri Radius Server IP 0 0 0 0 Sec Radius Server IP 0 0 0 0 Authentication Port 1812 Accounting Port 1813 Radius Secret Key private MAC ACL T Enabled E Ade Policy Alloy Fig 2 8 WPA EAP EAP WPA or WPA2 with EAP Extensible Authentication Protocol Firmware supported options for clients are EAP TTLS and EAP PEAP Cipher Type TKIP Temporal Key Integrity Protocol which uses RC4 encryption algorithm AES Advanced Encryption Standard AES algorithm AUTO Default Automatically select between both algorithms Primary Radius Server IP Enter the Primary Radius Server IP address 39 Secondary Radius Server IP Enter the Secondary Radius Server IP address Authentication Port Enter the Authentication Port number of the Radius Server Default is 1812 Accounting Port Enter the Accounting Port number of the Radius Server Default is 1813 Radius Secret Key Enter the Secret Key of the Radius Server The device uses this to authenticate itself with Radius Server WPA EAP TT
46. n Layer 2 There will be no network segmentation while broadcast domain will be the same Bridge mode will not block any broadcast or multicast traffic Additional Firewall settings can be configured for Layer 2 packet filtering and access control in Bridge mode Bridge Mode Bridge Mode Network Settings In bridge mode the device forwards all the network management and data packets from one network interface to the other without any intelligent routing For simple applications this provides efficient and fully transparent network solution WLAN wireless and LAN Ethernet interfaces belong to the same network segment which has the same IP address space WLAN and LAN interfaces form the virtual bridge interface while acting as the bridge ports The bridge has assigned IP settings for management purposes Bridge IP Address The device can be set for static IP or can be set to obtain an IP address from the DHCP server it is connected to One of the IP assignment modes must be selected DHCP choose this option to assign the dynamic IP address Gateway and DNS address by the local DHCP server STATIC choose this option to assign the static IP settings for the bridge interface IP Address enter the IP address of the device while Static Bridge IP Address mode is selected This IP will be used for the device management purposes IP Address and Netmask settings should consist with the address space of the network 61 segment where device resi
47. nt stations to all the objects in the MIB except the community strings but does not allow write access for device that supports SNMP v1 67 Contact specify the identity or contact in case an emergency situation arise Location specify the physical location of the device NTP Client Web Telnet SSH Server NTP Client The Network Time Protocol NTP is a protocol for synchronizing the clocks of computer systems over packet switched variable latency data networks It can be used to set the device system time System Time is reported next to the every System Log entry while registering system events if Log option is enabled Web Server the following the device Web Server parameters can be set there Use Secure Connection HTTPS If checked Web server will use secure HTTPS mode HTTP mode is selected by default Secure Server Port Web Server TCP IP port setting while using HTTPS mode Server Port Web Server TCP IP port setting while using HTTP mode Telnet Server the following the device Telnet Server parameters can be set there Enable Telnet Server Enables Telnet access to the device Server Port Telnet service TCP IP port setting SSH Server the following the device SSH Server parameters can be set there Enable SSH Server Enables SSH access to the device Server Port SSH service TCP IP port setting System Log Enable Log option enables the registration routine of the system log messages Enable Remote Log enables th
48. ntry Code Different countries have different power levels and also frequency selections To ensure device operation follows regulatory compliance rules the operator should make sure that correct country code where device will be used is selected The channel list output power limits IEEE 802 11 and Channel Spectrum Width modes will be tuned according to the regulations of the selected country Station setting must match AP country code setting No Country Set Option when checked only the frequency range are available 11n 2 4GHz is 2412 2462MHz Wireless Profile NG is 11n 2 4GHz band and represents a mixed of 802 11n 802 11g and 802 11b mode Station setting must match AP Wireless Profile setting Channel Spectrum Width 20M represents the data transmitted at a bandwidth of 20MHz 20 40MHz represents the data transmitted at either 20MHz or 40MHz In very noisy environment it automatically fall back to 20MHz to be more resilient to the interference In situation when auto fall back did not happened manually changing channel spectrum width to 37 20MHz will to help reduce interference on the link and improve performance Note 40MHz bandwidth is non standard for 802 11n g mode operation If you experience unstable performance change Channel Spectrum Width to 20M Station setting must match AP Channel Spectrum Width setting Maximum checking this box will result in maximum Tx output power overriding regulation Obey Regu
49. o the access point CLI Command Line Interface for control and monitoring SSH SSH Secure Shell Host establishes a secure host connection to the access point CLI for control and monitoring Hardware Installation DIN Hal Installation Each AP has a DIN Rail kit on rear panel The DIN Rail kit helps AP to fix on the DIN Rail It is easy to install the AP on the DIN Rail Step 1 Slant the AP and mount the metal spring to DIN Rail Step 2 Push the AP toward the DIN Rail until you heard a click sound Wall Mount Installation Each AP has another installation method to fix the AP A wall mount panel can be found in the package The following steps show how to mount the AP on the wall Step 1 Remove DIN Hai kit Step 2 Use 6 screws that can be found in the package to combine the wall mount panel The screws specification shows in the following two pictures In order to prevent the AP from any damage the screws should not be larger than the size of that used in the APN 210N Step 3 Mount the combined AP on the wall 10 Hardware Overview Front Panel The following table describes the labels on the APN 210N 10 100 RJ 45 fast 2 10 100Base T X RJ 45 fast Ethernet ports support Ethernet ports auto negotiation Default Setting Speed auto ANT 1 Reversed SMA connector for external antenna Reset unit Momentary press button Reset to factory default Press and hold for 10 sec
50. p 4 TCPJIP Propesties Ha Select the Specify an IP waalen uren l aper Advanced Me itg address radio button DNS Coniguation Gateway WANS Configuration P Ades pine ree Set the IP address to la i alec Gg 192 168 168 X and subnet mask to 255 255 255 0 where X can bh Een be any number from 2 to 254 Step 5 To verify that the IP address has 20 been correctly assigned to your PC go to the Start menu select Run and enter the command winipcfo Select the Ethernet adapter from the drop down list and click OK Peek FTLA 135 Faris PO Fan Ibken 492 966786 160 Soret GG Dead Ber 12 pp W PC is now setup with a proper IP address to communicate with the access point For Windows XP 2000 Step 1 Go to your desktop right click on the My Network Places icon and select Properties Step 2 Right click the network adapter icon and select Properties Step 3 Highlight Internet Protocol TCP IP and click on the Properties button LAN or High Speed Internet Diesble SES EWE Repar Zie ON NONG Create Shortcut ae ee z Derah dahinin Kharwal Comm wong Bp Asabek POLA ay PO act Et iriga Pas adhere aay pt le kaliwang Aerm E HL HAS l D fend SPONSES Coripaible Trorepos Prot gitana Pace FER AP tm ArT Tanan Cil Pa a Packed Tet det dl edo ane ree kv Ulrich Cem ge n EICO ewe corra nakak L Sharon roban ama ver conceded E Host pa when the conrecion h
51. panning Tree Protocol STP which is used for finding the shortest path within network and to eliminate loops from the topology If the STP is turned on the Bridge device will communicate with other network devices by sending and receiving Bridge Protocol Data Units BPDU STP should be turned off selected by default when the device is the only bridge on the LAN or when there are no loops in the topology as there is no sense for the bridge to participate in the Spanning Tree Protocol in this case Bridge mode Firewall Configuration Settings Firewall functionality on bridge interface can be enabled using the Enable Firewall option Bridge Firewall rules can be configured enabled or disabled while using Firewall configuration window which is opened with the Configure button Firewall entries can be specified by using the following criteria Interface the interface WLAN or LAN where filtering of the incoming passing through packets is processed IP Type sets which particular L3 protocol type ICMP TCP and UDP should be filtered Source IP mask is the source IP of the packet specified within the packet header usually 62 it is the IP of the host system which sends the packets Source Port is the source port of the TCP UDP packet specified within the packet header usually it is the port of the host system application which sends the packets Destination IP mask is the destination IP of the packet specified within the packet head
52. r be Maximum O Obey Regulatory Power Rate Aggressiveness O w Fig 2 4 Basic Wireless Settings Station Station WDS This options below are only available in Station Station WDS and Repeater WDS modes unless otherwise stated Wireless Mode Station 36 Remote AP ESSID This is the Service Set Identifier used by station to seek and connect to the access point of same the SSID identifier Site Survey Site Survey will search for the available wireless networks in range on all the supported channels and will allow you to select one for association In case the selected network uses encryption you ll need to set security parameters in wireless security section Click Scan to re scan the Access Points in range Select the Access Point from the list and click Close this window Site Survey channel scan list can be modified using the Channel Scan List control Remote AP Lock to MAC Enter the MAC address of the remote access point the device is connected to This option will make device only connect to this access point This is important when connection is Point to Point operation Remote AP Preferred MAC Enter the preferred MAC address of the access point you want device to connect when it first startup Up to max of 4 MAC addresses can be entered Priority is from top to bottom In the event all preferred MAC addresses are not available device will then pick the matching SSID access point with the strongest signal Cou
53. r IP Enter the Primary Radius Server IP that Access Point will use to query server Secondary Radius Server IP Enter the Secondary Radius Server IP that Access Point will use to query the server Authentication Port Enter the Radius Server Authentication Port number to use Default is 1812 Accounting Port Enter Radius server Accounting Port to use Default is 1813 Radius Secret Key Enter Radius server Secret Key that Access Point to use to authenticate itself with radius server IEEE802 1x Key Rotation Enter time in seconds Time before activate key rotation in authentication process for higher security 41 IEEE802 1x Key Length This is the key length of the initial seed key Select 64 or 128bit WEP LOCAL AP WIRELESS SECURITY eT el Authentication Type E Open Shared Key Key Type ascen j Current Key kevi sl WEP Ees 1 poo WEP Koy 1 Length 6d bit WEP Key 2 WEP Key 2 Length ed bit sl WEP key A WEP Key 3 Length bibi sl WER Key di E E WEP key 4 Length 6d Bit el HAC ACL Enabled Policy Allow zl Fig 2 6 WEP The operation of the Keys is the same for ALL the modes Note Operating with WEP security will limit AP to maximum wireless link speed of 54Mbps only Authentication Type Open Authentication Default No authentication Recommend to use this standard option over shared authentication Shared Authentication May not be compatible with all Acces
54. ration Close this window button closes the firmware upgrade window if activated This action will not cancel the firmware upgrade process 50 Host Name HOST NAME Host Name AP Host Name is the system wide device identifier It is reported by SNMP Agent to authorized management stations Host Name will be represented in popular Router Operating Systems registration screens and discovery tools Host Name specifies the system identity Change button saves the Host Name if activated Administrative and Read only Account ADMINISTRATIVE ACCOUNT Administrator Username admin Current Password Mew Password Verify New Password In this section you can modify the administrator password to protect your device from unauthorized configuration The default administrator s password should be changed on the very first system setup Administrator Username specifies the name of the system user Current Password administrator is required to enter a current password It is required for Password or Administrator Username change routine Default administrator login credentials e User Name admin e Password password New Password new password used for administrator authentication should be specified Verify Password new password should be re entered to verify its accuracy Click Change button to save the changes 5I Enable Read Only Account READ ONLY ACCOUNT Enable Read Only Account fe Read Only Username
55. s Point Not recommended Key Type HEX or ASCII option specifies the character format for the WEP key if WEP security method is used Current Key Specify the Index of the WEP Key used 4 different WEP keys can be configured at the same time but only one is used WEP Key WEP encryption key for the wireless traffic encryption and decryption should be specified if WEP security method is used WEP Key Length 64 bit selected by default or 128 bit WEP Key length should be selected if WEP security method is used The 128 bit option will provide higher level of security For 64 bit specify WEP key as 5 HEX 0 9 A F or a f pairs e g 00112233AA or 5 ASCII characters For 128 bit specify WEP key as 13 HEX 0 9 A F or a f pairs e g 00112233445566778899AABBCC or 13 ASCII characters 42 Virtual Access Point VAP Virtual AP VAP implements mSSID Multi SSID whereby a single wireless card can be setup with up to 3 virtual SSID of BSSID connections Each VAP can be set with different security authentication mode BASIC WIRELESS SETTINGS YAP EFSSID Mimo Series WEP i Hide SSID WIRELESS SECURITY Apply Settings Fig 2 11 Virtual AP Only Available in Access Point Access Point WDS Mode All VAPs are created from the same radio they all share the same wireless channel country code channel spectrum width and transmit power Note Security options like IEEE802 1x and WPA EAP us
56. s which were encrypted with the wrong encryption key and failed the decryption routines It can be used to detect invalid wireless security settings and encryption break attempts Rx Invalid Frag value represents the number of packets missed during transmission and reception These packets were dropped due to re assembling failure as some link layer fragments of the packet were lost Tx Excessive Retries value represents the number of packets which failed to be delivered to the destination Undelivered packet are retransmitted a number of times before an error occurs Missed beacons value represents the number beacons management packets sent at regular intervals by the Access Point which were missed by the client This can indicate that the wireless client is out of range Other errors value represents the total number of transmitted and received packets that were lost or discarded for other reasons 57 More Status In More Status option contains some useful tools and additional status pages Ping Utility a ping tool to test the connectivity between devices MET DREJ MO AT Ras DRST Aib PM AST LA LAA Pacher coann Je ceras E Packat Sisa jansa babi Naat Tanaw TTL ivi d60 2 21 Oiii me e 172 1489 2 24 O 212 ma Ca 197 TR D DA ma md J of 3 packat received O lace Min 0 508 ma AJ 0 Geb ma Pins LC ma 9G ARP Table display a list of MAC addresses of the connected devices ARP TABLE IP address HW type Flags wW
57. t which is similar to the power off power on cycle The system configuration is not modified after the reboot cycle completes Any non applied changes will be lost Reset to Defaults activate Reset to Defaults control in order to initiate reset the device 52 to factory defaults routine Reset routine initiates system Reboot process similar to the power off power on cycle The running system configuration will be deleted and the default system configuration all the system settings with no exception will be set After the Reset to Defaults routine is completed the device system will return to the default IP configuration 192 168 168 1 255 255 255 0 and will start operating in Station Bridge mode It is highly recommended to backup the system configuration before the Reset to Defaults is initiated 53 Status Page antara MAIN Uptime Hast Hamr System Tine LAS SETTING LAH MAC UGE IP ADDRESS GATEWAY IP ADDRESS PriMS IP Gec DHS IP LAN cable Portl Ports STATUS BASIC WIRELESS O Days 00 30 04 APR ZL1UR 1231 1999 16 30 05 7o 00 00 08 03 43 BASIC NETWORK ADVANCED VLAN SERVICES SYSTEM WIRELESS Flore tatus K More Status JEAN ARP Tabla FIRMWARE VERSION U Bridga Tabla LOADER YERSION a CHAP Active Leases WAN SETTING WAN MAD Not Available MODE hot Available Mot available IF ADDRESS GATEWAY IP ADDRESS Hot Available Pri DNS IF Hot
58. th Align Noise level TX Rate RX Rate TX COQ Channel Width Frequency Security Home LOCAL STATION STATISTICS Bytes Packets Errors LOCAL STATION ERRORS RX Invalid HWID 0 TA Excessive Retries RA Invalid Crypt Missed Beacons fo 56 WLAN Connected Status MAC Address displays the MAC address of the current active WLAN card Signal Strength displays the received wireless signal level of opposite connected device TX Rate and RX Rate displays the current 802 11 data transmission TX and data reception RX rate while operating in Station mode Typically the higher the signal the higher the data rate and consequently the higher the data throughput Channel Width HT20 indicates established connection is 20MHz channel width HT40 indicates established connection is 40MHz channel width WLAN Local AP Statistics Bytes transmitted received value represents the total amount of data in bytes transmitted and received during the connection WLAN Local AP Errors section displays the counters of 802 11 specific errors which were registered on wireless interface Rx invalid NWID value represents the number of packets received with a different NWID or ESSID packets which were destined for another access point It can help to detect configuration problems or identify the adjacent wireless network existence on the same frequency Rx Invalid Crypt value represents the number of transmitted and received packet
59. ti Port Plugged Unplugged Badia 1 Wireless Mode MALU fe ch 0 06 03 45 LOCAL AP SSID LOCAL AP MAC Frequency Security Ack Timeouk Refresh CONNECTED STATIONS 0 MAL ALO KE SS SIL AL STRENGIN IH RATE lx LLY He BATE CHANEL ADA LOCAL AP STATISTICS Eybre Packets Frrors Received o D 1 Transmitted Io J a________ LOCAL AP ERRORS EX Invalid HWID TS Excessive Retries Ir E AS Invalid Crypt o Missed Racons ax invalid Frag D Other Errores Select VAP a 28 Navigation Main Menu Bar STATUS BASIC BASIC ADVANCED VLAN SERVICES SYSTEM WIRELESS NETWORK WIRELESS Status Page displays current status of the device and the statistical information Basic Wireless Page contains the controls for a wireless network configuration while covering basic wireless settings which define operating mode associating details and data security options Basic Network Page covers the configuration of network operating mode IP settings and network services i e DHCP Server Advanced Wireless Page settings for advanced wireless features Advanced Network page settings for more details of these features Services Page covers the configuration of system management services i e Ping Watchdog Auto Reboot SNMP NTP Telnet SSH System Log System Page contains controls for system maintenance routines administrator account management device customization and confi
60. ugh the use of an access point helps control traffic flow The range is 0 2347bytes or word off The default value is 2347 which means that RTS is disabled RTS CTS Request to Send Clear to Send is the mechanism used by the 802 11 wireless networking protocol to reduce frame collisions introduced by the hidden terminal problem RTS CTS packet size threshold is 0 2347 bytes If the packet size the node wants to transmit is larger than the threshold the RTS CTS handshake gets triggered If the packet size is equal to or less than threshold the data frame gets sent immediately System uses Request to Send Clear to Send frames for the handshake which provide collision reduction for access point with hidden stations The stations are sending a RTS frame first while data is send only after handshake with an AP is completed Stations respond with the CTS frame to the RTS which provides clear media for the requesting station to send the data CTS collision control management has time interval defined 64 during which all the other stations hold off the transmission and wait until the requesting station will finish transmission Fragmentation Threshold specifies the maximum size for a packet before data is fragmented into multiple packets The range is 256 2346 bytes or word off Setting the Fragmentation Threshold too low may result in poor network performance The use of fragmentation can increase the reliability of frame transmissions
61. uide Changes are penodically made to the information contained herein and will be incorporated into later versions of the manual The information contained is subject to change without prior notice FCC NOTICE This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This device generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occurin a particular installation If this device does cause harmful interference to radio or television reception the user is encouraged to try to corect the interference by one or more of the following measures e Reonent or relocate the receiving antenna e Connect the computer to an outlet on a circuit different from that to which the receiver is connected e Increase the separation between the computer and receiver e Consult the dealer oran experienced radio TV technician for help Caution Any changes or modifications not expressly approved by the grantee of this device could void the user s authority to operate the equipment FCC Compliance Statement This device complies with Part 15 of the FCC Rules Operation is subject to the fol
62. ult is time nist gov Enter preferred time server domain IP Known Time Server You can also select one from this list as your new time server Web HTTP Security WEB SERVER Web server mode HTTP sl HTTPS Port ET Web Server Mode Default is HTTP Option is HTTP and HTTPs HTTP s Port Default is 80 for HTTP and 413 for HTT Ps Enter a new preferred port number 48 Telnet Access Setup TELNET SERVER Enable Telnet Server Server Port Enable Telnet Server Default is enabled Remove check on box to disable Server Port Default is 23 Enter new preferred port number SSH Access Setup 55H SERVER Enable 55H Server Server Port Enable SSH Server Default is disabled Check on box to enable Server Port Default is 22 Enter new preferred port number System Log Setup SYSTEM LOG Enable System Log O Logging IP Domain Name 192 168 168 1 Logging Port 514 Enable System Logging Default is disabled Check on box to enable Logging IP Domain Name Enter destination IP address of device to receive log Logging Port Default is 514 Enter the new preferred port number 49 System Tab The System Page contains Administrative options This page enables administrator to customize reboot the device set it to factory defaults upload a new firmware backup or update the configuration and configure administrator s credentials Firmware Upgrade FIRMWARE UPGRADE Firmware Version 2 0
63. ver Access Point WDS Mode This is mode is generally use for point to point or point to multi point connection lt is mainly use with Station WDS to build the point and multi point connections 16 Station Mode In Station mode the device acts as a wireless client When connected to an access point it creates a network link between the Ethernet network connected at this client device and the wireless Ethernet network connected at the access point In this example the workgroup PCs on the ethernet network connected to the Station device can access the printer across the wireless connection to the access point where the printer is connected Internet Cablo ADSL modem gt router Switch N Station Mode Access Point Bridge Workgroup of PCs 17 Station WDS Mode Station WDS mode is similar to Station mode The difference is Station WDS must connect to access point configured to Access Point WDS or RootAP mode Station WDS is mainly use for point to point connection between 2 buildings or locations as far as several kilometer away Point to Point Point to MultiPoint An access point setup as Access Point WDS or An access point setup as Access Point WDS RootAP and other as Station WDS Transparent or RootAP and several other devices as Client Station WDS or Transparent Client This mode is generally used for outdoor connections over long distances or for indoor connections between
Download Pdf Manuals
Related Search
Related Contents
Home Decorators Collection 4964610820 Instructions / Assembly 絶縁2出力端子台型 2線式伝送器入力変換器 MS3107 取扱説明書 Samsung 403T User Manual Service Manual - GIP WEB タイジ ジェラート&アイスクリームマシン TGM Kingston Technology ValueRAM 8GB DDR3 1600MHz Module ENSC151 KIT M68HC912B32EVB – Altera MAX7128 FPGA Copyright © All rights reserved.
Failed to retrieve file