Home

User Manual

image

Contents

1. Configuration File Current Password ananasen User Certificates New Password Remote Services Confirm Password SNMP Settings Apply ar Figure 5 72 Password Settings screen Page 86 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Current Password Enter the current password New Password Enter the new password Confirm Password Enter the new password again for confirmation NOTE The password is case sensitive and its length cannot exceed 19 characters Upgrade Firmware Open Firmware Upload in Management and follow the steps below to upgrade firmware locally or remotely through the Wireless Ethernet Extender s Web BLACK BOX Wireless Broadband Access Point Logout Status System Wireless Management Tools Password Settings Firmware Upgrade This page allows you upgrade the device fir t version Please do not power off the device it Firmware Upgrade mware to a new during the upload because it may crash the system Configuration File Select File Choose File No file chosen User Certificates Upgrade Cancel Remote Services SNMP Settings Figure 5 73 Firmware Upgrade screen Click Browse to select the firmware file you would like to load Click Upload to start the upload process Wait a few minutes the VAC Access Point will reboot after successful upgrade CAUTION Do NOT cut the power off during upgrade otherwise the system may cras
2. Figure 3 12 Extender mounted on a pole 724 746 5500 blackbox com Page 17 Chapter 3 Installation 3 4 5 Power Up 1 Plug the power cord into the DC port of the POE injector Figure 3 13 Power cord plugged into the injector s DC port 2 Connect the power plug to a power socket 3 Use an Ethernet cable to connect the Wireless Ethernet Extender to the POE port of the PoE injector as shown below Figure 3 14 Power up the extender 4 Connect the power plug to a power socket The Wireless Ethernet Extender will be powered up immediately 3 4 6 Connect to the Extender To be able to configure and manage the extender do the following 1 Open the ferrite core by unsnapping the connector latches The core will open revealing a concave surface Figure 3 15 Open the connector latches Page 18 724 746 5500 blackbox com Chapter 3 Installation 2 Lay the Ethermet cable into the core usually within 2 to 3 inches of the connector JA Figure 3 16 Putting cable into the core 3 Loop the cable around and through the core This helps lock the core in place and may be required in circumstances withe severe interference Figure 3 17 Loop cable around core 4 Close the core and snap the halves back together Figure 3 18 Close core 724 746 5500 blackbox com Page 19 Chapter 3 Installation 5 Connect the Ethernet cable with suppression core to the Data In port of the Po
3. Figure 4 19 Dsiable Wireless LAN interface screen 724 746 5500 blackbox com Page 29 Chapter 4 Quick Setup Tutorial 2 If security is required open Wireless gt Profile Setting and enter VAP Profile 1 Settings as below You may set the parame ters such as Network Authentication and Data Encryption for more secure network communication in your application Click Apply to save the parameters Status System Wireless Management Basic Settings P Profile Settings 2 Profile Settings gt gt i Define each VAP s attribute Advanced Settings Enabled Profile Name SSID Security VLANID Traffic Shaping i r Profile1 3 Wireless Open System 0 Access Control 2 O Profile2 Wireless Open System 0 WDS Settings 3 O Profile3 Wireless Open System lo Ex Profiled Wireless Open System 0 5 O Profile5 Wireless Open System 0 6 O Profile6 Wireless Open System 0 7 O Profile7 Wireless Open System 0 8 O Profile8 Wireless Open System 0 Figure 4 20 VAP Profilel Settings screen 3 You may configure Network Authentication and Data Encryption parameters for more secure network communication in your application After you configure these parameters click Apply to save the parameters Basic Settings VAP1 Profile Settings Profile Settings Define the VAP s basic settings and security settings Advanced Settings Basic Settings Traffic Shaping Profile Name Profile1 Access Control
4. er gt Figure 5 64 VAP Profile Settings screen Page 78 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Status System Wireless Management Tools Basic Settings VAP Profile1 Settings Profile Settings Ad d Setti vanced settings Basic Settings Access Control Profile Name Profile1 Traffic Shaping Wireless Network Name SSID Wireless A Broadcast SSID O Enabled Disabled Captive Portal Wireless Separation O Enabled Disabled WDS Settings WMM Support O Enabled Disabled O Max Station Num 32s 0 32 Security Settings Network Authentication Legacy 802 1x v Data Encryption None v Key Type Figure 5 65 VAP Profile1 Settings screen Basic Setting Profile Name Name of the VAP profile Wireless Network Name Enter the virtual SSID for the VAP Broadcast SSID In AP mode hiding network name is necessary when you are in a wireless environment that may have potential risk By disabling broadcast SSID the STA cannot scan and find the Wireless Ethernet Extender so that malicious attack by some illegal STA can be avoided Wireless Separation Wireless separation is an ideal way to enhance the security of network transmission Under the mode except wireless client mode enabling Wireless Separation can prevent the communication among associated wireless clients WMM Support WMM Wi Fi Multimedia is a subset of 802 11e It allows wirele
5. Password Settings gt gt Apply Figure 5 34 Password Settings screen Current Password Enter the current password New Password Enter the new password Confirm Password Enter the new password again for confirmation NOTE The password is case sensitive and its length cannot exceed 19 characters Syslog Settings The Wireless Ethernet Extender provides remote syslog management by sending logs to an external syslog server The log can be also sent through Email Page 58 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Status Wireless Settings Management Tools AP Management Syslog Setting This page to set remote log server and SMTP server System Settings Cl Enable Remote Syslog Server Time Settings sl IP Address 0 0 Firmware Upload P Port 514 Configuration File Send Syslog via Email Password Settings Log Schedule Never v Syslog Setting gt Severity Level A Send Log To Ema System Log RI Email Address Day For Sending Log sunday System Alert Time For Sending Log o hour minute Clear Log After Sending Mail E Mail Server Settings Send Log From Email Address Mail Subject SMTP Server SMTP Server Name or P Address Figure 5 35 Syslog Settings screen Remote Syslog Server Enable Remote Syslog Enable to send log to remote syslog server IP Address Specify the IP address of the remote server Port Specif
6. Secondary RADIUS Server radius2 coova net Firewall Settings RADIUS Auth Port 1812 RADIUS Acct Port 1813 RADIUS Shared Secret 00000000000000000 RADIUS NASID your radius nasid Captive Portal UAM Portal URL https www coova nl UAM Secret seccccesccccees Figure 5 15 Captive Portal screen To enable Captive Portal check Captive Portal and select the VAP network needed for captive portal Radius Settings Primary Radius Server Enter the name or IP address of the primary radius server Secondary Radius Server Enter the name or IP address of the secondary radius server if any Radius Auth Port Enter the port number for authentication Radius Acct Port Enter the port number for billing Radius Shared Secret Enter the secret key of the radius server Radius NAS ID Enter the name of the radius server if any Page 46 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Radius Administrative User Radius Admin Username Enter the username of the Radius Administrator Radius Admin Password Enter the password of the Radius Administrator Captive Portal UAM Portal URL Enter the address of the UAM portal server UAM Secret Enter the secret password between the redirect URL and the Hotspot Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks It may also be defined as a mechanism used to protect a trusted ne
7. To establish a point to point bridge connection follow the procedures described in Bridge mode To connect the wireless client to the AP follow the procedures described in Wireless Client mode 724 746 5500 blackbox com Page 35 Chapter 5 Navigate the Web Configurator 5 Navigate the Web Configurator 5 1 Virtual AC Thin AP Mode 5 1 1 Status View Basic Information Open Information in Status to check the basic information of the Wireless Ethernet Extender which is read only Information includes system information IP settings and wireless network setting Click Refresh at the bottom of the page to display the real time information Status Information gt gt Managed APs Wireless Users DHCP Clients View Managed APs Wireless Settings Information Management This page shows the current status and some basic settings of the device System Information Firmware Version 1 1 1 MAC Address 00 19 70 86 c6 e1 Device Name ap86c6e1 IP Settings Ethernet Auto IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway IP Address 0 0 0 0 Wireless Networks Index SSID Security Clients Uploaded Downloaded 1 Wireless Open System 0 16KB OKB Figure 5 1 Information screen Open Managed APs in Status to check information of managed AP such as device name MAC address IP address numbers of associated clients and uploaded downloaded packets All options ar
8. is selected those wireless clients on the list will not be able to connect the AP MAC Address Enter the MAC address of the wireless client that you would like to list into the access control list click Apply then it will be added into the table at the bottom Delete Selected All Check the box before one or more MAC addresses of wireless client s that you would like to cancel and click Delete Selected or Delete All to cancel that access control rule Traffic Shaping This allows the administrator to manage the traffic flow to ensure optimal performance 724 746 5500 blackbox com Page 43 Chapter 5 Navigate the Web Configurator Status Wireless Settings Management Tools Wireless Networks Traffic Shaping Wireless Protocol Traffic shaping is the control of network traffic in order to optimize or guarantee performance improve latency Access Control a Interface Selection VAPI Y Traffic Shaping i Enable Traffic Shaping RADIUS Settings Outgoing Traffic Rate 1024000 Kbits s Outgoing Traffic Burst 20 KBytes Save Cancel Figure 5 12 Traffic Shaping screen Enable Traffic Shaping Check this box to control the overall bandwidth for a specific VAP network Interface Selection Select the VAP network you would like to enable traffic shaping Outgoing Traffic Rate This specifies maximum outgoing bandwidth to a certain rate in kbps Outgoing Traffic Burst This specifies the buf
9. blackbox com Chapter 5 Navigate the Web Configurator Wireless Separation Wireless separation is an ideal way to enhance the security of network transmission Enabling Wireless Separation can prevent the communication among associated wireless clients WMM Support WMM Wi Fi Multimedia is a subset of 802 11e It allows wireless communication to define a priority limit on the basis of data type under AP mode only thus those time sensitive data like video audio data may own a higher priority than common ones To enable WMM the wireless client should also support it By default it is enabled and cannot be disabled in b g n mode Max Station Number By default the Max Station Num the VAC Access Point will only allow up to 32 wireless clients to associate with for better bandwidth for each client Tick the box and enter the preferable limits for maximum client association number Security Setting To prevent unauthorized radios from accessing data transmitting over the connectivity the IEEE 802 11a n VAC Access Point provides you with rock solid security settings Status Wireless Settings Management Tools Wireless Networks VAP Profile1 Settings Wireless Protocol Ri Custom WLAN s security profile settings Access Control Traffic Shaping Basic Settings RADIUS Settings oa WE Description Profile Broadcast SSID Enabled Disabled Wireless Separation O Enabled Disabled WMM S
10. 2011 12 22 00 55 06 2011 12 22 00 55 06 2011 12 22 00 55 06 2011 12 22 00 55 11 2011 12 22 00 55 12 2011 12 22 00 55 41 2011 12 22 01 36 47 2011 12 22 01 39 47 2011 12 22 02 15 06 Time Settings Firmware Upload Configuration File Password Settings Syslog Setting System Log A Arcsscssccccssscoceosessescoseoncccencendi 5 00 IN oa a a 0 mn System Alert Priority Management Source info 192 168 1 100 alert 00 19 70 86 C6 E1 alert 00 19 70 86 C6 E1 alert 00 19 70 86 C6 E1 alert 192 168 1 100 notice 192 168 1 111 alert 192 168 1 2 alert 00 60 B3 11 22 33 alert 00 60 B3 11 22 33 notice 192 168 1 111 Figure 5 36 System Log screen System Alert Message znmpd AC started WLAN service started WLAN service stopped WLAN service started znmpd Device connected WEB Authorized user admin znmpd Device connected Station reassociated Station deauthenticated WEB User admin logout System alert record and events occurred on both Wireless Ethernet Extender in AC mode and VAC managed AP in this page Once the log entries are all used the log will wrap around and the old logs will be deleted Click Clear to delete logs manually as Management Source 00 19 70 86 C6 E1 00 19 70 86 C6 E1 00 19 70 86 C6 E1 192 168 1 100 192 168 1 2 00 60 B3 11 22 33 00 60 B3 11 22 33 Figure 5 37 System Alert screen well Status Wireless Settings AP Man
11. 4 To check whether the association with the extender has been successfully made go to Status gt Connections If the connec tion is established it will display association information including MAC addres wireless mode signal strength and connection time Status System Wireless Management Tools Information Association List JEEE This table shows the MA Address 802 11 Mode Signal Strength and Connected Time for each associated device s Statistics ARP Table mu Cc Ad dre e 8 0 2 11 Mode e Sign al Strength a c o nnected Time e 00 19 70 bS 7a aa 802 1 1A N 42 dem 5m 11s Bridge Table Refresh Figure 4 27 Association list 4 8 3 Bridge Mode 1 Choose Wireless gt Basic Settings Then you will see the Wireless Basic Settings page Choose Bridge from Wireless Mode and click Apply to save it You can change the other parameters to optimize your application before clicking Apply Status System Wireless Management Basic Settings gt gt Security Settings Basic Settings Use this page to change the wireless mode as well as configure any associated wireless network parameters Advanced Settings E J Disable Wireless LAN Interface Traffic Shaping a E 3 Operation Mode Bridge Y Site Survey Access Control 802 11 Mode 802 11B G N v WDS Settings Channel Mode 20 MHz hd a 4 Channel 2437MHz 6 Extension Channel None Y Data Rate Auto 7 5
12. Antenna Gain ww adi 12 17 Output Power e 17 dBm Apply Cancel Figure 4 28 Wireless Basic Settings screen 2 Go to WDS Settings in Wireless type in the MAC address of the remote bridge to Remote AP MAC Address 1 field and click Apply Basic Settings _ WDS Settings Profile Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet E does To do this you must set these APs in the same channel and set MAC addresses of other APs Advanced Settings which you want to communicate with in the table and then enable the WDS This function can work only in Bridge and AP Repeater mode Access Control 5 Local MAC Address 2 WDS Settings gt gt 3 Remote AP MAC Address 00 19 70 00 00 01 Remote AP MAC Address2 Remote AP MAC Address3 Remote AP MAC Address4 Figure 4 29 WDS Settings screen 724 746 5500 blackbox com Page 33 Chapter 4 Quick Setup Tutorial NOTE The bridge uses the WDS protocol that is not defined as the standard so compatibility issues between equipment from different vendors may arise Moreover Tree or Star shape network topology should be used in all WDS use cases i e if AP2 and AP3 are specified as the WDS peers of AP1 AP2 should not be specified as the WDS peer of AP3 and AP3 should not be specified as the WDS peer of AP2 in any case Mesh and Ring network topologies are not support
13. Captive Portal Outgoing Traffic Limit 1102400 kbit s Outgoing Traffic Burst 120 KBy WDS Settings alii i E Lea Profile Selection VAP1 Wireless J VAP Traffic Shaping Outgoing Traffic Limit 102400 kbit s Outgoing Traffic Burst lao kBytes Figure 5 69 Traffic Shaping screen Overall Traffic Shaping Check this box to control the overall bandwidth of the Wireless Ethernet Extender Incoming Traffic Limit To specify the maximum incoming bandwidth to a certain rate in kbps Incoming Traffic Burst To specify the buffer size for incoming traffic that can be sent within a given unit of time The suggested value is 20 KBytes You may just leave the default value there and then the connection will be bound to the traffic shaping rule at all times You may decrease it to smaller value if the incoming traffic limit is smaller Outgoing Traffic Limit To limit the outbound traffic to a certain rate in kbit s Outgoing Traffic Burst To specify the buffer size for outbound traffic The suggested value is 20KBytes You may decrease it to smaller value if the outbound traffic limit is smaller VAP Traffic Shaping Check this box to control the overall bandwidth for a specific VAP network Incoming Traffic Limit To specify maximum incoming bandwidth to a certain rate in kbps Incoming Traffic Burst To specify the buffer size for incoming traffic that can be sent within a given unit of time The suggested value is 20 KBytes You
14. Entries in this table are used to restrict certain ports of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local network Access Control Traffic Shaping Enable Source Port Filtering RADIUS Settings Port Range Protocol TCP IP Settings _ Comment Captive Portal El Firewall Settings Src IP Filteri dE A Port Range Protocol Comment Select Edit Dst IP Filtering 2000 2500 TCP UDP O Edit Figure 5 18 Source Port Filtering screen Page 48 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator You may create and activate a rule that filters a packet based on the source port from your local network to Internet Check Enable Source Port Filtering to activate rule Port Range Enter the port range you would like to restrict Protocol Select port protocol Both TCP UDP Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the restricted source ports click Select checkbox of the desig nated ports and click the Delete Selected button You may delete all the IP addresses in the list by clicking Delete All Destination Port Filtering Status Wireless Settings Management Tools Wireless Networks Destination Port Filtering Entries in this table are used to restrict certain ports of data packets from your local network to Inter
15. Specify the Internet access method to Static IP DHCP or PPPOE Users must enter WAN IP Address Subnet Mask and Gateway settings provided by your ISPs LAN Settings When DHCP Server is disabled users can specify IP address and subnet mask for the Wireless Ethernet Extender manually Make sure the specified IP address is unique on your network in order to prevent IP conflict When DHCP Server is enabled users may specify DHCP IP Address Range DHCP Subnet Mask DHCP Gateway and Lease Time 15 44640 minutes A DHCP relay agent is used to forward DHCP requests and replies between clients and servers when they are not on the same physical subnet To enable the DHCP relay agent check the Enable DHCP Relay checkbox and enter the IP address of the DHCP server WARNING In AP mode the IEEE 802 11n VAC Access Point must establish connection with another wireless device before it is set to Router mode To access the unit in Router mode via wired port type the WAN IP address to enter the web page for WAN on the wired port and LAN the on wireless port Or you can access device through the wireless device connected with the Wireless Ethernet Extender In wireless client mode users can access the Wireless Ethernet Extender via its wired port for WAN is on wireless port and LAN is on wired port when device is set to Router mode Bridge mode and AP Repeater mode are similar to AP mode when device is set to Router mode WAN is on wired port and L
16. Status Clients Uploaded Downloaded Fi Upload PERE ap20fad2 00 19 70 20 fa d2 192 168 1 2 1 1 1 Registered 2 2kBytes OkBrtes Configuration File ap86c6e1 00 19 70 86 c6 e1 192 168 1 100 1 1 1 Registered 0 0 kBytes 0 kBytes Password Settings ia Figure 5 21 AP Management screen Page 50 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Restart Restart the selected VAC managed AP Rename Rename the selected VAC managed AP Set IP Assign a static IP address for the selected VAC managed AP or obtain the IP address from the Wireless Ethernet Extender in AC mode Default is DHCP client O Static IP DHCP Client IP Address subnet Mask Gateway IP DNS1 DNS2 Figure 5 22 DHCP Client Static IP screen Radio Allows you to configure the channel bandwidth operating channel antenna and output power for the selected VAC managed Access Point Channel Mode 40 MHz Channel 2422MHz 3 Extension Channel Antenna Internal 8 dBi w Output Power 12dBm Close Figure 5 23 Radio channel screen From the AP Management list move the mouse cursor to the MAC address of the selected VAC managed AP the screen will pop up radio configuration information 724 746 5500 blackbox com Page 51 Chapter 5 Navigate the Web Configurator AP Management AP Management This page shows the APs that managed by AC 2Device a sine MAC gt IP FW Status Clients
17. 2 0 0 0 0 Figure 5 27 IP Address Assignment screen Obtain IP Address Automatically If a DHCP server exists in your network you can check this option so the Wireless Ethernet Extender can obtain IP settings automatically from the DHCP server Use Fixed IP Address Check this option You have to specify a static IP address subnet mask default gateway and DNS server for the Wireless Ethernet Extender manually Make sure the specified IP address is unique on your network in order to prevent IP conflict DHCP Server The Wireless Ethernet Extender in AC mode can perform a DHCP server to assign IP address to the VAC managed APs Default is enabled DHCP Server DHCP IP Address Range 192 168 1 2 192 168 1 200 DHCP Subnet Mask 10 29 2000 DHCP Gateway 0 0 0 wd PJ DI DI Lease Time 15 44640 Minutes Figure 5 28 DHCP Server screen DHCP IP Address Range Specify the IP range DHCP Subnet Mask Specify the DHCP Subnet Mask DHCP Gateway Specify the gateway address Page 54 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Lease Time Specity the DHCP lease time Time Settings Compliant with NTP the IEEE 802 11n VAC Access Point is capable of keeping its time in complete accord with the Internet time To use this feature check Enable NTP Client Update in advance Status Wireless Settings Management AP Management Time Settings You can synchronize System Log s time stamp with
18. 5 dBi Omni directional Antennas 4 LEDs Power WLAN LAN Signal Operating temperature 4 to 158 F 20 to 70 C Storage temperature 40 to 158 F 40 to 70 C Humidity 10 95 noncondensing 24 V Each unit 10 06 H x 4 37 W x 1 88 D 25 56 x 11 10 x 4 77 cm Each unit 1 1 lb 0 5 kg 2 external 2 4 GHz 5 dBi Omni directional Antennas 802 11b 1 2 5 5 11 802 11g 6 9 12 18 24 36 48 54 802 11n MCSO to MCS15 6 5 Mbps to 300 Mbps per radio 2x2 MIMO with two spatial streams IEEE 802 11b g n 2 4 GHz 802 11 b g n 2 4 2 484 GHz 2 4 GHZ FCC 1 11 ETSI 1 13 2 4 GHz 30dBm 2 TX The maximum power setting will vary by channel and according to individual country regulations IEEE 802 11b 85 dBm 11 Mbps IEEE 802 11g 89 dBm 6 Mbps IEEE 802 11n 86 dBm HT20 83 dBm O HT40 Open Share key 64 128 152 bits WEP Legacy 802 1X WPA WAP2 WPA PSK TKIP WPA2 PSK AES WPA PSK WPA2 PSK 724 746 5500 blackbox com Chapter 2 Overview 2 Overview 2 1 Introduction The Wireless Ethernet Extender is a multimode 2x2 outdoor access point embedded with a software based virtual access controller VAC The LWE120A operates at 2 4 GHz band Ideally suited for SMB or hotspot networks this breakthrough innovation provides superior Wi Fi network solutions at significantly lower cost In addition the easy to install Wireless Ethernet Extender is also a high performance last mile broadband so
19. Address Captive Portal WDS Settings LApply gt MAC Address Select Edit 00 19 70 86 c6 e3 O Edit Figure 5 68 Wireless Access Control screen Profile Selection Select the VAP network you would like to enable access control Access Control Mode If you select Allow Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP When Deny Listed is selected those wireless clients on the list will not be able to connect the AP MAC Address Enter the MAC address of the wireless client that you would like to list in the access control list then click Apply and it will be added to the table at the bottom Delete Selected All Check the box before one or more MAC addresses of wireless client s that you would like to cancel and click Delete Selected or Delete All to cancel that access control rule 724 746 5500 blackbox com Page 83 Chapter 5 Navigate the Web Configurator Traffic Shaping This allows the administrator to manage the traffic flow to ensure optimal performance Status Wireless Management Basic Settings Traffic Shaping Traffic shaping is the control of network traffic in order to optimize or guarantee performance improve latency Profile Settings Advanced Settings Access Control Overall Traffic Shaping e sonni Incoming Traffic Limit 1102400 kbitis Traffic Shaping Incoming Traffic Burst 120 kBytes
20. Ethernet 2 DataRate IP Settings Obtain IP Address Automatically Use Fixed IP Address IP Address 1192 168 1 2 Subnet Mask 255 255 255 0 Figure 4 18 Basic Settings screen The Fat AP covers AP mode Wireless Client mode Bridge mode and AP Repeater mode 4 8 1 AP Mode 1 Choose Wireless gt Basic Settings The default is AP mode already Here you can set the parameters to optimize your application or you can leave them as the default Click Apply to save the parameters NOTE In the example here we only chaneg the Wireless Network Name SSID as Join_me In addition for better coverage of the AP to optimize your WLAN network use a high gain external antenna To allow the radio to calculate the EIRP and limit output to legal levels to comply with the regulation you need to enter the Web GUI and specify the gain of the antenna after the external antenna Is installed onto the access point Status System Wireless Management Basic Settings gt Disable Wireless LAN Interface Profile Settings Operation Mode AP y Site Survey Advanced Settings SSID Wireless more Broadcast SSID Enabled Disabled Traffic Shaping 802 11 Mode 602 11B G N X Access Control Channel Mode 20 MHz WDS Settings Channel 2437MHz 6 v Extension Channel None X Data Rate Auto v HT Protect Enabled Disabled Artenna Gain Output Power Apply Cancel
21. Extender especially SSID and encryption method go to Wireless Settings gt Wireless Networks and click on 1 Wireless SSID for configuration Click Save to save the settings Wireless Settings Management Wireless Networks gt Wireless Networks Define each WLAN s attribute Wireless Protocol Access Control Enable SSID Security VLANID Description Traffic Shaping 1 Y Wireless e Open System 0 Profile1 RADIUS Settings J 2 Wireless Open System 0 Pronle2 3 Wireless Open System 0 Profile3 4 Wireless Open System 0 Profile4 5 Wireless Open System 0 ProfileS 6 Wireless Open System 0 Profile6 Figure 4 4 Wireless Networks screen Page 22 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial Status Wireless Settings Management Wireless Networks gt Basic Settings Wireless Protocol SSID Wireless Access Control Description Profile1 z Broadcast SSID j Traffic Shapinn roadcas O Enabled Disabled Wireless Separation O Enabled Disabled RADIUS Settings WMM Support Enabled Disabled Ol Max Station Num 0 32 Security Settings Network Authentication Open System Data Encryption Legacy 802 1x WPA with Radius WPA2 with Radius WPA amp WPA2 with Radius WPA PSK Figure 4 5 Wireless Settings screen The wireless setting will also apply to the VAC managed APs A dialog message will pop up to remind you changes wil
22. O Use Fixed IP Address IP Address Subnet Mask Gateway Ip Address DNS 1 DNS 2 LlEnable 802 10 VLAN Management VLAN ID lo Figure 5 41 Basic Settings screen Page 62 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator General Settings Device Mode Three modes are provided AC Thin AP Thin AP FAT AP Select AC Thin AP to have the device act as virtual access controller to manage other VAC managed APs on your network Select Thin AP to have the VAC Access Point managed by the VAC AP in AC mode Select FAT AP to perform as a standalone AP neither managing nor managed by other VAC APs Device Name Specify the device name which is composed of no more than 15 characters with 0 9 A Z a z or Ethernet Data Rate Specify the transmission rate of data for Ethernet Default is Auto IP Address Assignment Obtain IP Address Automatically If a DHCP server exists in your network you can check this option thus the IEEE 802 11n VAC Access Pioint is able to obtain IP settings automatically from the DHCP server Use Fixed IP Address Check this option You have to specify a static IP address subnet mask default gateway and DNS server for the VAC Access Point manually Make sure the specified IP address is unique on your network in order to prevent IP conflict Enable 802 1Q VLAN To be able to access the web page of the VAC managed AP in the VLAN network you need to assign the
23. Radius Server Port Enter the port number of the Radius Server Shared Secret This secret which is composed of no more than 31 characters is shared by the Wireless Ethernet Extender and RADIUS during authentication Global Key Update Check this option and specify the time interval between two global key updates Default is 3600 seconds TCP IP Settings When the Router mode is activated the TCP IP Settings will show up in Wireless Settings so the user can configure the TCP IP for the VAC managed Access Point Management Status Wireless Settings Wireless Networks TCP IP Settings This page configures the Thin AP IP address subnet mask DHCP and other parameters at the ath for your local area network that is connected to the LAN port of the device Wireless Protocol Access Control Traffic Shaping LAN Settings RADIUS Settings IP Address 92 168 0 99 TCP IP Settings gt gt Subnet Mask 255 255 255 0 T N DHCP Server Enabled Captive Portal DHCP IP Address Range 192 168 0 1 192 168 0 200 Firewall Settings DHCP Subnet Mask 255 255 255 0 Lease Time 7200 15 44640 Minutes Figure 5 14 TCP IP Settings screen 724 746 5500 blackbox com Page 45 Chapter 5 Navigate the Web Configurator LAN Settings IP Address Specify the IP address for the Wireless Ethernet Extender Subnet Mask Specify the Subnet mask for the Wireless Ethernet Extender DHCP Server Select to enabl
24. Uploaded Downloaded ap20fad2 00 19 70 20 fa d2 0 kBytes 0 kBytes Channel Mode 40 MHZ O aps6c6e1 00 19 0 86 c6 e1 0 kBytes 0 kBytes Frequency Channel 2422MHz 3 Extension Channel Upper Channel Antenna Internal 8 dBi Output Power 12d8m Figure 5 24 AP Management screen Upgrade Selected Upgrade firmware for the selected Wireless Ethernet Extender NOTE You need to upload the firmware file into the Wireless Ethernet Extender mode before upgrading firmware otherwise a window will pop up saying TAP firmware hasn t been uploaded You haven t upload TAP Firmware Figure 5 25 TAP Firmware prompt Upgrade All Click to upgrade all the VAC managed APs simultaneously Refresh Refresh the AP management list manually Page 52 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator System Settings Allows you to configure device and IP settings for the Wireless Ethernet Extender in AC mode Status Wireless Settings Management as AP Management _ A System Settings a Use this page to configure the basic parameters of device span we ama Time Settings Device Settings Finnware Upioi Device Mode AC Thin AP v Device Name ap86c6el max 15 characters and no spaces Configuration File Ethernet Data Rate Auto v g Password Serii Spanning Tree O Enabled Disabled si STP Forward Delay 1 30 seconds Syslog Setting System Log IP Address Assignment System A
25. VLAN management ID for the VAC managed AP Note that the ID on the switch must be identical of the AP s VLAN ID Check Enable 802 1Q VLAN checkbox to activate it Management VLAN ID Enter the VLAN ID 5 3 FAT AP Mode 5 3 1 Status View Basic Information Open Information in Status to check the basic information of the Wireless Ethernet Extender which is read only Information includes system information LAN settings wireless setting and interface status Click Refresh at the bottom for real time information Information gt gt Information This page shows the current status and some basic settings of the device Connections Statistics System Information ARP Table d Device Name aps6chet MAC Address 00 19 70 86 c6 e1 Bridge Table l l se Country Region United States a Firmware Version 1 1 1 DHCP Clients LAN Settings Network Activity IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Gateway IP Address 0 0 0 0 MAC Address 00 19 70 86 c6 e1 Wireless Settings Operation Mode AP Wireless Mode 802 1 1B G N Figure 5 42 Information screen 724 746 5500 blackbox com Page 63 Chapter 5 Navigate the Web Configurator View Association List Open Connections in Status to check the information of associated wireless devices such as MAC address signal strength connection time IP address etc All options are read only Click Refresh at the bottom to update the current as
26. a Caimi MAC gt IP F V Status Clients Uploaded Downloaded Firmware Upload O ap996633 00 19 70 99 66 33 192 168 1 1 1 1 1 Registered 1 24 kBytes 11 kBytes Configuration File apeeeeee 00 60 b3 ee ee ee 192 168 1 2 1 1 1 Registered 0 0 kBytes 0 kBytes Password Settings Syslog Setting _ Restart Rename Jet IP Radio Upgrade Selectec Upgrade All System Log System Alert Figure 4 11 AP Management screen The Wireless Ethernet Extender AP in Virtual AC Thin AP mode on the list is highlighted in bold font Select it and press Radio to configure its radio setting including channel bandwidth channel antenna and output power 724 746 5500 blackbox com Page 25 Chapter 4 Quick Setup Tutorial Status Wireless Settings Management AP Management gt gt System Settings Time Settings Firmware Upload Configuration File Password Settings Syslog Setting System Log System Alert AP Management gt gt System Settings Time Settings Firmware Upload Configuration File Password Settings Syslog Setting System Log Svstem Alert AP Management This page shows the APs that managed by AC es Device MAC IP FW Status Clients Uploaded Downloaded 0 kBytes 0 kBytes apeeeeee 00 60 b3 ee ee ee 192 168 1 2 1 1 1 Registered 0 e Selected AP Management This page shows the APs that managed by AC 2
27. a public time server over the Internet System Settings Current Time vr Mon Day Hr Mn Sec Time Settings gt gt Time Zone Select GMT Greenwich Mean Time Dublin Edinburgh Lisbon London M Firmware Upload Menable NTP Client Update NTP server 192 5 41 41 North America M Configuration File O Manual IP Password Settings Syslog Setting Figure 5 29 Time Settings screen Current Time Display the present time in Yr Mon Day Hr Min and Sec Time Zone Select Select the time zone from the dropdown list NTP Server Select the time server from the NTP Server dropdown list or manually input the IP address of available time server into Manual IP Firmware Upgrade Besides upgrading firmware for the Wireless Ethernet Extender in AC mode it also provides firmware update for the VAC managed APs BLACK BOX Wireless Broadband Access Point Logout Status System Wireless Management Tools Password Settings Firmware Upgrade Firmware Upgrade version P This pag ease do not power off the device e allows you upgrade the device firmware to a new during the upload because it may crash the system Configuration File Select File Choose File No file chosen User Certificates Upgrade Cancel Remote Services SNMP Settings Figure 5 30 Upgrade Firmware screen 724 746 5500 blackbox com Page 55 Chapter 5 Navigate th
28. and from Upgrade AC Firmware browse the firmware file where it is placed Press Upload to start the upgrade process It will take approximately two minutes to complete the update Status System Wireless Management Tools Password Settings p Firmware Upgrade Firmware Upgrade gt E a i PI This page allows you upgrade the device firmware to a new version Please do not power off the device during the upload because it may crash the system Configuration File y Select File Choose File No file chosen User Certificates Upgrade Cancel Remote Services SNMP Settings Figure 4 8 Upgrade Firmware screen 4 4 Install the Managed Thin AP Install and connect the rest of managed Access Points to your network with the Ethernet cable Power them up respectively They will automatically discover the Wireless Ethernet Extender in AC mode and issue registration request To check whether the thin APs are successfully registered or not enter the web page of the Wireless Ethernet Extender master access controller and go to Management gt AP Management You will see Registered in the Status column You can also see other information such as MAC address IP address FW version number of clients that associate to each thin AP and upload download speed Status Wireless Settings AP Management gt gt AP Management This page shows the APs that managed by AC System Settings Time Set
29. as configure any associated wireless network parameters Wireless Protocol gt Access Control Traffic Shaping Basic Settings RADIUS Settings Country Region United States v 802 11 Mode 802 11A B G NIK4 Data Rate El Advanced Settings A MPDU Aggregation Enabled Disabled A MSDU Aggregation O Enabled O Disabled Ohad l InN s EN m Figure 5 9 Wireless Basic Settings screen 724 746 5500 blackbox com Page 41 Chapter 5 Navigate the Web Configurator Basic Settings Country Region The availability of some specific channels and or operational frequency bands is country dependent 802 11 Mode The IEEE 802 11n VAC Access Point can communicate with wireless devices using 802 11b g or 802 11b g n Data Rate Usually Auto is preferred Under this rate the IEEE 802 11n VAC Access Point will automatically select the highest available rate to transmit In some cases for example where there is no great demand for speed you can set a relatively low transmit rate and get longer distance Advanced Settings Status Management Wireless Settings United States 802 11A B G N Data Rate Auto Y f Country Region Wireless Networks Qi 802 11 Mode Wireless Protocol gt Access Control 4 EA Advanced Settings Traffic Shaping A MPDU Aggregation O Enabled Disabled RADIUS Settings A MSDU Aggregation O Enabled Disabled Short Gl O Enabl
30. at long distance the Wireless Ethernet Extender can automatically adjust proper ACK timeout value by specifying distance of the two nodes Flow Control This allows the administrator to specify the incoming and outgoing traffic limit by checking Enable Traffic Shaping This is only available in Router mode NOTE We strongly recommend you leave most advanced settings at their defaults except Distance in Meters Adjust this param eter for real distance any modification may negatively impact the performance of your wireless network Page 82 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Access Control The Access Control appoints the authority to wireless client on accessing IEEE 802 11n VAC Access Point thus a further security mechanism is provided This function is available only under AP Router mode Open Access Control in Wireless Settings as shown next Status System Wireless Management Tools Basic Settings Wireless Access Control If you choose Allowed Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point When Deny Listed is selected these wireless Advanced Settings clients on the list will not be able to connect the Access Point Profile Settings Access Control Profile Selection VAP1 Wireless Traffic Shaping Access Control Mode Deny Listed Y MAC
31. for captive portal Radius Settings Primary Radius Server Enter the name or IP address of the primary radius server Secondary Radius Server Enter the name or IP address of the secondary radius server if any Radius Auth Port Enter the port number for authentication Radius Acct Port Enter the port number for billing Radius Shared Secret Enter the secret key of the radius server Radius NAS ID Enter the name of the radius server if any Radius Administrative User Radius Admin Username Enter the username of the Radius Administrator Radius Admin Password Enter the password of the Radius Administrator Captive Portal UAM Portal URL Enter the address of the UAM portal server UAM Secret Enter the secret password between the redirect URL and the Hotspot WDS Settings Extend the range of your network without having to use cables to link the Access Points by using the Wireless Distribution System WDS Simply put you can link the Access Points wirelessly Open WDS Settings in Wireless as shown next 724 746 5500 blackbox com Page 85 Chapter 5 Navigate the Web Configurator Wireless Broadband Access Point Logout Status System Wireless Management Tools Basic Settings WDS Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet does To do this you must set these APs in the same channel and set MAC addresses of other APs Advanced Setti
32. much lower Distance To decrease the chances of data retransmission at long distance the Wireless Ethernet Extender can automatically adjust proper ACK timeout value by specifying distance of the two nodes Access Control The Access Control appoints the authority to wireless client for accessing the Wireless Ethernet Extender thus a further security mechanism is provided This function is available only under AP Router mode Open Access Control in Wireless Settings as shown next Status Wireless Settings Management Wireless Networks Wireless Access Control If you choose Allowed Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point When Deny Listed is selected these wireless clients on the list will not be able to connect the Access Point Wireless Protocol w ia il Access Control Traffic Shaping Wireless Network VAP1 Wireless 4 RADIUS Settings 3 Access Control Mode Deny Listed vi MAC Address t 5 MAC Address Select Edit 1 00 19 70 86 c6 e3 Edit Delete Selected Delete All Figure 5 11 Wireless Access Control screen Wireless Network Select the VAP network you would like to enable access control Access Control Mode If you select Allow Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP When Deny Listed
33. on the device without physically attaching the antenna otherwise your extender might be damaged 2 Bend the antenna to 90 degrees or 45 degrees Figure 3 8 Bend antenna 3 You may turn one antenna 45 degrees to the left and the other 45 degrees to the right The tilted antennas couple together much less than if they are both pointed in the same direction NOTE Align the polarization of the antennas properly Maximum signal strength between bridges occurs when both antennas are using identical polarization 4 Tighten the connector joint clockwise to fix the antennas Figure 3 9 Tighten the connector clockwise 5 To adjust antennas loosen the connector joint counterclockwise first then adjust the antenna to the desired position DO NOT bend or turn the antennas without loosening the connector joint otherwise you might damage the antennas 6 Antenna installation is complete Page 16 724 746 5500 blackbox com Chapter 3 Installation i 1 Figure 3 10 Installed antennas 3 4 4 Mount the AP on a Pole 1 Turn the Wireless Ethernet Extender over Put the pole mounting ring through the middle hole of it NOTE Unlock the pole mounting ring with a screw driver before putting it through the device as the following right picture shows Figure 3 11 Installing the pole mounting ring on the extender 2 Mount the Wireless Ethernet Extender steadily to the pole by locking the pole mounting ring tightly
34. packets reached the value the Wireless Ethernet Extender will reboot automatically Page 92 724 746 5500 blackbox com Appendix ASCII Appendix ASCII VVEP can be configured with a 64 bit 128 bit or 152 bit Shared Key hexadecimal number or ACSII As defined a hexadecimal number is represented by 0 9 A F or a f ACSII is represented by 0 9 A F a f or punctuation Each one consists of a two digit hexadecimal value Table A 1 ASCII and Hex Equivalents ASCII Hex ASCII Hex ASCII Hex ASCII Hex Character Equivalent Character i Character n CNA Equivalent mim O D NN W N N N N Ul Y N NO no o B Bo Bo 7 EM ECN TA 724 746 5500 blackbox com Page 93 NOTES Page 94 724 746 5500 blackbox com NOTES 724 746 5500 blackbox com Page 95 Black Box Tech Support FREE Live 24 7 Tech support the way it should be Great tech support is just 60 seconds away at 724 746 5500 or blackbox com lt BLACK BOX About Black Box Black Box provides an extensive range of networking and infrastructure products You ll find everything from cabinets and racks and power and surge protection products to media converters and Ethernet switches all supported by free live 24 7 Tech support avallable in 60 seconds or less Copyright 2015 Black Box Corporation All rights reserved Black Box and the Double Diamond logo are registered trademarks of BB Technologies Inc Any third party trademarks
35. your network Select Thin AP to have the VAC Access Point managed by the VAC AP in AC mode elect FAT AP to perform as a standalone AP neither managing nor managed by other VAC APs 724 746 5500 blackbox com Page 67 Chapter 5 Navigate the Web Configurator Device Name Specify the device name which is composed of no more than 15 characters with 0 9 A Z a z or Network Mode Specify the network mode including Bridge and Router It is easy to configure parameters in Bridge Mode however users must pay extra attention to the way they configure the device when it is set to Router Mode For details please refer to TCP IP Settings Ethernet Data Rate Specify the transmission rate of data for Ethernet Default is Auto Country Region The availability of some specific channels and or operational frequency bands is country dependent Spanning Tree Spanning Tree Protocol STP is a link management protocol for AP which provides path redundancy while preventing loops in a network STP allows only one active path at a time between the access points but establish the redundant link as a backup if the initial link fails STP Forward Delay STP Forward Delay is the time spent in detecting and learning network tree topology state before entering the forward state Default time value is 1 sec GPS Coordinate Settings The GPS Coordinate Setting helps you mark the latitude and longitude of the Wireless Ethernet Extender Just enter
36. 0 MHz 2437MHz 6 Channel Mode Channel Extension Channel None 2S 11 kBytes Internal 8 dBi v 12dBm Antenna 0 kBytes Output Power Figure 4 12 AP Management screen Radio button highlighted Besides radio setting you may also reboot the managed AP change its IP address and upgrade the firmware for a managed AP 4 6 Firmware Upgrade for the Ethernet Extender in AC mode For firmware upgrade you may choose to upgrade the selected managed AP by pressing Upgrade Selected or do the group upgrade by pressing Upgrade All Before upgrading the managed AP you need to locate the new firmware in the Wireless Ethernet Extender Go to Management gt Firmware Upload browse the firmware file where it is located click Upload and Click OK Page 26 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial SBLACK BOX Wireless Broadband Access Point www blackbox com Status Wireless Management Password Settings Firmware Upgrade This page allows you upgrade the device firmware to a new version Please do not power off the device during the upload because it may crash the system Firmware Upgrade Configuration File i 4 Select File Choose File No file chosen User Certificates Upgrade Cancel Remote Services SNMP Settings Figure 4 13 Upgrade Firmware screen Firmware upload success Figure 4 14 Upload Firmware scre
37. 46 5500 blackbox com Page 71 Chapter 5 Navigate the Web Configurator Destination IP Filtering Status Wireless Management Basic Settings Destination IP Filtering Entries in this table are used to restrict the computers in LAN from accessing certain websites in WAN according to IP address TCP IP Settings Time Settings RADIUS Settings Enable Destination IP Filtering E Destination IP Address Firewall Settings Comment Src IP Filtering Dst IP Filtering gt Src Port Filterina Destination IP Address Comment Select Edit Figure 5 56 Destination IP Filtering screen You may create and activate a rule that filters a packet based on the destination IP address to restrict the local computers from accessing certain websites Check Enable Destination IP Filtering to activate a rule Destination IP Address Enter the IP address to be restricted Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the IP address from filtering click Select checkbox of the designated destination IP address and click the Delete Selected button To delete all the IP addresses in the list click Delete All Source Port Filtering Status System Wireless Management Basic Settings Source Port Filtering TCP IP Settings Entries in this table are used to restrict certain ports of data packets from your local network to Internet through
38. 5 o Pe a 86 COL Er ut em 86 Eeer e a e E E ia 87 SUI SES RR 87 Restore Factory A A ner n aniani Ea EEE E TAKERE n 88 RO On 89 Remo Manageme o ao 89 724 746 5500 blackbox com Table of Contents ANA E E a e E EEEE A E EEE E EAE EEA i 90 EE Sion ei pela o een 91 A ee eee a ere ee ee eee eer ee On Ee ee one ee ee 91 BS OI OG ria E E o AT n 91 PVC erro ion cotos ted tieso 92 SN rset ets ces ns ns neste cent ee esate este attests eter eet 93 724 746 5500 blackbox com Page 7 Chapter 1 Specifications 1 Specifications Approvals Configuration on File Environmental Management Interfaces Connectors Indicators Environmental Power Dimensions Weight LWE121A Wireless Specifications Antennas Data Rates Radio Chains Standards Frequency Operating Channels RF Output Power Receive Sensitivity Security Page 8 ROHS Backup and restore Reset to factory default Reboot device injector via POE Operating temperature 4 to 158 F 20 to 70 C Storage temperature 40 to 158 F 40 to 70 C Humidity 10 95 noncondensing Operating Modes Virtual Access Controller VAC Thin AP FAT AP AP Wireless Client Bridge AP Repeater Access Method Web User Interface HTTP S Telnet SSH FTP SNMP V1 V2c V3 Restore Factory Default Web Push button 1 10 100BASE T RJ 45 1 RJ 45 1 Grounding screw 2 connectors for detachable external 2 4 GHz
39. AN is on wireless port Thus users must also connect the Wireless Ethernet Extender with another wireless device before it is set to Router mode and access the VAC Access Point via the connected wireless device Time Settings Compliant with NTP the Wireless Ethernet Extender can keep its time in accord with the Internet time To use this feature check Enable NTP Client Update in advance 724 746 5500 blackbox com Page 69 Chapter 5 Navigate the Web Configurator Status Wireless Management Basic Settings _ _ Time Settings TCP IP Settings Time Settings gt Current Time yr 2010 mon g__ pay 19_ Hr 21 mn 44_ sec 21_ Time Zone Select GMT Greenwich Mean Time Dublin Edinburgh Lisbon London You can synchronize System Log s time stamp with a public time server over the Internet RADIUS Settings Y Enable NTP client update Firewall Settings NTP server Manual IP 0 0 0 0 Figure 5 53 Time Settings screen Current Time Display the present time in Yr Mon Day Hr Min and Sec Time Zone Select Select the time zone from the dropdown list NTP Server Select the time server from the NTP Server dropdown list Or manually input the IP address of the available time server into Manual IP RADIUS Settings RADIUS Remote Authentication Dial In User Service is a server for remote user authentication and accounting playing a central role in the network in providing the capabilities of au
40. DIUS It provides options of WPA TKIP or WPA2 AES for the client If it is selected the data encryption type must be TKIP AES and the RADIUS server must be set NOTE If Radius relevant authentication type is selected go to Wireless gt Radius Settings for further radius server configuration WPA PSK It is a simplified WPA mode with no need for specific authentication server In this so called WPA Pre Shared Key all you have to do is just pre enter a key in each WLAN node This is commonly used in large and middle enterprise as well as residential networks WPA2 PSK As a new version of WPA only all the clients support WPAZ2 can it be available If it is selected the data encryption can only be AES and the passphrase is required WPA PSK amp WPA2 PSK Available in AP mode it provides options of WPA TKIP or WPA2 AES encryption for the client If it is selected the data encryption can only be TKIP AES and the passphrase is required Data Encryption If data encryption is enabled the key is required and other wireless devices can communicate only if they share the same key None Available only when the authentication type is open system 64 bits WEP It is made up of 10 hexadecimal numbers 128 bits WEP It is made up of 26 hexadecimal numbers 152 bits WEP It is made up of 32 hexadecimal numbers TKIP Temporal Key Integrity Protocol which is a kind of dynamic encryption is used with WPA PSK etc AES Advanced Encryp
41. E injector Figure 3 19 Connecting cable to data in port 6 Connect the other end of the Ethernet cable to a PC or a switch hub The hardware installation is complete Figure 3 20 Completed installation Page 20 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial 4 Quick Setup Tutorial 4 1 Access the Web Configurator The Wireless Ethernet Extender provides you with user friendly Web based management interface to easily manage the access point e Configure the computer with a static IP address of 192 168 1 x as the default IP address of the VAC Access Point is 192 168 1 1 X cannot be 0 1 or 255 e Open a Web browser and enter the IP address Default 192 168 1 1 of the Wireless Ethernet Extender into the address field You will see the login page as below Wireless Broadband Access Point Name la min Password Figure 4 1 Login page e Enter the username Default admin and password Default password respectively and click Login to login the main page of the Wireless Ethernet Extender Thin AP Information Information This page show the associated devices Basic Settings Model Name LWE121A Firmware Version 1 1 1 MAC Address 00 19 70 86 c6 e1 Current Time 2011 12 22 0 56 9 Register Status Unregistered AC MAC Address Figure 4 2 Main page NOTE The username and password are case sensitive and the password should be no more than 19 ch
42. IUS Wi Fi Protected Access WPA is a subset of the IEEE 802 111 standard With warrant username password and etc offered by user this kind of authentication can be realized with specific RADIUS server This is the common way to be adopted in large enterprise network WPA2 with RADIUS WPA2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WPA If it is selected AES encryption and RADIUS server are required WPA amp WPA2 with RADIUS It provides options of WPA TKIP or WPA2 AES for the client If it is selected the data encryption type must be TKIP AES and the RADIUS server must be set NOTE If Radius relevant authentication type is selected please go to Wireless gt Radius Settings for further radius server configuration WPA PSK This is a simplified WPA mode with no need for specific authentication server In this so called WPA Pre Shared Key all you have to do is just pre enter a key in each WLAN node and this is the common way to be adopted in large and middle enterprise as well as residential network WPA2 PSK As a new version of WPA only if all the clients support WPA2 can it be available If it is selected the data encryption can only be AES and the passphrase is required WPA PSK amp WPA2 PSK Available in AP mode this provides WPA TKIP or WPA2 AES encryption options for the client If it is selected the data encryption can only be TKIP AES an
43. Information Association List This table shows the MAC Address 802 11 Mode Signal Strength and Connected Time for each associated device s Statistics ARP Table MAC Address 802 11 Mode Signal Strength o Connected Time 00 19 70 05 7a aa 802 11A N 42 dBm Sm 11s Bridge Table Refresh Figure 4 31 Association list screen 4 8 4 AP Repeater Mode 1 Choose Wireless gt Basic Settings Choose AP Repeater from Wireless Mode and click Apply to save it You can also change the other parameters to optimize your application before clicking Apply Page 34 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial Status System Wireless Management Basic Settings Wireless Basic Settings Use this page to configure the parameters for wireless LAN clients which may connect to your Access Point Here you may change wireless mode as well as wireless network parameters Profile Settings Advanced Settings Access Control O Disable Wireless LAN Interface WDS Settings Wireless Mode PERICIA Y Ste Surve Wireless Network Name Wireless i x SSID Vi imore Broadcast SSID O Enabled Disabled 802 11 Mode 802 11B G N HT protect O Enabled Disabled Frequency Channel 2437MHz 6 Extension Channel None Channel Mode 20 MHz ae Internal 8 dBi External N Type Maximum Output Power per 4 26 Figure 4 32 Wireless Basic Settings screen
44. LWE121A LWE121AE BLACK BOX LWETRIAE KIT Customer Order toll free in the U S Call 877 877 BBOX outside U S call 724 746 5500 Support FREE technical support 24 hours a day 7 days a week Call 724 746 5500 or fax 724 746 0746 Information www blackbox com infofblackbox com Trademarks Used in this Manual Trademarks Used in this Manual Black Box and the Double Diamond logo are registered trademarks of BB Technologies Inc Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners Disclaimer Black Box Network Services shall not be liable for damages of any kind including but not limited to punitive consequential or cost of cover damages resulting from any errors in the product information or specifications set forth in this document and Black Box Network Services may revise this document at any time without notice We re here to help If you have any questions about your application or our products contact Black Box Tech Support at 724 746 5500 or go to blackbox com and click on Talk to Black Box You ll be live with one of our technical experts in less than 60 seconds Page 2 724 746 5500 blackbox com FCC and IC RFI Statements FCC Radiation Exposure Statement Federal Communications Commission and Industry Canada Radio Frequency Interference Statements This equipment generates uses and can radiate radio frequency energy and if not installed and use
45. SSID My network i Broadcast SSID Enabled Disabled WDS Settings Wireless Separation Enabled Disabled WMM Support Enabled Disabled IGMP Snooping Enabled Disabled J Max Station Num 32 1 32 Security Settings Authentication WPA2 PSK Data Encryption AES ri WPA Passphrase 1q92w3e4r Back Apply Cancel Figure 4 21 VAP1 Profile Settings screen Page 30 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial 4 To decrease the chances of data retransmission at long distances the extender can automatically adjust proper ACK timeout value by specifying the distance between the nodes Go to Wireless gt Advanced Settings and fill in the number in the Distance field If the distance is below 3280 feet 1000 meters do not change it Status Wireless Management 1 Basic Settings Advanced Settings Profile Settings These settings are only for more technically advanced users who have a sufficient knowledge 2 about wireless LANs These settings should not be changed unless you understand the Advanced Settings gt effects that such changes will cause Traffic Shaping A MPDU Aggregation Enabled Disabled A MSDU Aggregation Enabled Disabled Access Control i Short GI Enabled Disabled WDS Settings RTS Threshold 2347 256 2347 E Fragment Threshold 2346 256 2346 Beacon Interval 100 40 3500 ms DTIM Interval 1 1 255 Preamble Type Lon
46. Table in Status as shown next Click Refresh to view current connected status Status Wireless Management Information Bridge Table canoa This table shows bridge table Statistics MAC Address Interface Ageing Timer s ARP Table i 00 13 02 71 35 ba LAN 8 78 Bridge Table 90 e6 ba 5b 9e 26 LAN 0 00 00 19 70 00 fb c5 Bridge DHCP Clients Network Activities Figure 5 47 Bridge Table screen View Active DHCP Client Table Open DHCP Clients in Status as shown next to check the assigned IP address MAC address and time expired for each DHCP leased client Click Refresh to view the current table Status Wireless Management Information DHCP Clients Connections This table shows the assigned IP address MAC address and time expired for each DHCP leased client Statistics IP Address MAC Address Time Expired s ARP Table 192 168 1 100 00 19 70 00 fb c5 1799913 Bridge Table soils hse a Refresh DHCP Clients Network Activities Figure 5 48 DHCP Clients screen Page 66 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator View Network Activities The network activities allows you to monitor the current Wireless and Ethernet TX RX data traffic in graphical and numerical form on the Web of the Skyport The chart scale and throughput dimension Bps Kbps Mbps changes dynam
47. agement System Alert E This page show the system alert System Settings Time Settings ot Time 1 2011 12 22 00 55 06 Firmware Upload 2 2011 12 22 00 55 06 3 2011 12 22 00 55 06 Configuration File E 2011 12 22 00 55 11 Password Settings 5 2011 12 22 00 55 41 6 2011 12 22 01 36 47 Syslog Setting 7 2011 12 22 01 39 47 System Log E z 5 1 4 Tools Tools Message WELAN service started WLAN service stopped WLAN service started znmpd Device connected znmpd Device connected Station reassociated station deauthenticated The IEEE 802 11n VAC Access Points provide two tools to test the link status with other VAC managed Access Points or anyone on the network Page 60 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Ping Status Wireless Settings Management Ping gt gt a Ping Trace Route p Use this page to test the ping Ping Address 1192 168 1 2 Ping Count 5 Package Size PING 192 168 1 2 192 168 1 2 40 data bytes 68 bytes from 192 168 1 2 icmp_seq 0 ttl 64 time 0 7 ms 68 bytes from 192 168 1 2 icmp_seq 1 ttl 64 time 0 5 ms 68 bytes from 192 168 1 2 icmp_seq 2 ttl 64 time 0 6 ms 68 bytes from 192 168 1 2 icmp_seq 3 ttl 64 time 0 7 ms Figure 5 38 Ping screen Ping Address Enter IP address of the remote destination Ping Count Enter the number of pings Packet Size Specify ping packet size Trace Route This tool is used to discover the route
48. appearing in this manual are acknowledged to be the property of their respective owners LWE121A User Manual version 1 724 746 5500 blackbox com
49. aracters 724 746 5500 blackbox com Page 21 Chapter 4 Quick Setup Tutorial 4 2 Configure the AC Thin AP mode To operate as AC Thin AP mode go to Basic Settings From the Device Mode drop down list select Virtual AC mode To use the extender as a virtual controller and access point concurrently select Virtual AC Thin AP mode Then assign an IP address to the Wireless Ethernet Extender and specify subnet mask gateway and DNS address respectively Press Apply and wait for about 50 seconds to take effect Information Basic Settings 1 gt Use this page to configure the basic parameters of device Gernral Settings Device Mode Thin AP v Fat AP Thin AP Virtual AC Virtual AC Thin AP Device Name x 15 characters and no spaces IP Settings DHCP Client Static IP IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway IP Address 0 0 0 0 DNS 1 0 0 0 0 DNS 2 0 0 0 0 AC Connection Mode LAN Internet 0 0 0 0 Enable 802 1Q VLAN Management VLAN ID 0 0 means disabled Figure 4 3 Basic settings screen NOTE AC Thin AP mode allows the Wireless Ethernet Extender to operate as access controller and thin AP at the same time NOTE To operate the extender as a standalone Access Point wireless client or bridge select FAT AP from device mode For Virtual Controller Thin AP mode if you need to configure the wireless settings for the Wireless Ethernet
50. arized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to the Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers To activate DMZ check the Enable DMZ checkbox Status System Wireless Management Tools Basic Settings DMZ TCP IP Settings A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to Internet traffic such as Time Settings Web HTTP servers FTP servers SMTP e mail servers and DNS servers RADIUS Settings Enable DMZ DMZ Host IP Address 0 0 0 0 Firewall Settings Src IP Filtering Figure 5 61 DMZ screen DMZ Host IP Address Enter the local host IP address 5 3 3 Wireless Open Basic Settings in Wireless as shown next to make basic wireless configuration Status Wireless Management Basic Settings Wireless Basic Settings Profile Settings i Use this page to change the wireless mode as well as configure any associated wireless network parameters Advanced Settings Access Control Ol Disable Wireless LAN Interface Traffic Shaping Operation Mode AP vi site Surve e Wireless Network Name SSID Wireless more Captive Portal Broadcast SSID O Enabled O D
51. ault is set to 1 Enter a value between 1 and 255 Preamble Type This defines some details on the 802 11 physical layer Long and Auto are available IGMP Snooping Available in AP Router mode IGMP snooping is the process of listening to IGMP network traffic By enabling IGMP snooping the AP will listen to IGMP membership reports queries and leave messages to identify the ports that are members of multicast groups Multicast traffic will only be forwarded to ports identified as members of the specific multicast group or groups RIFS RIFS Reduced Interframe Spacing reduces overhead thereby increasing network efficiency Link Integration Available under AP Bridge AP repeater mode this monitors the connection on the Ethernet port by checking Enabled It can inform the associating wireless clients as soon as the disconnection occurs TDM Coordination Stands for Time Division Multiplexing Technique this resource reservation control mechanisms can avoid packet collisions and send the packets much more efficiently allowing for higher effective throughput rates This function is only available in AP CPE mode We highly recommend enabling TDM coordination when there are multiple CPEs needed to connect to the AP in your application LAN2LAN CPE LAN2LAN CPE mode enables packet forwarding at layer 2 level It is fully transparent for all the Layer 2 protocols Space in Meter To decrease the chances of data retransmission
52. aved to the specified location Save TAP Settings to File Click Save to export the configuration file of the Wireless Ethernet Extender Then the configuration file tap cfg will be generated and saved to the specified location Load Settings from File Import ac cfg load into the VAC Access Point in AC mode Restore Factory Default Settings The IEEE 802 11n VAC Access Point provides two ways to restore the factory default settings Restore factory default settings via Web From Configuration File in Management click Reset restore factory default settings Page 56 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator BLACK BOX Wireless Broadband Access Point Logout Status System Wireless Management Tools Password Settings Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously You may also reset the current configuration to factory default or reboot the Configuration File device Firmware Upgrade User Certificates Save Settings to File Save Load Settings from File Choose File No file chosen Upload Remote Services Reset Settings to Default Reset A SUT d Reboot The Device Reboot Figure 5 32 Configuration file screen Restore factory default settings via Reset Button If software in the Wireless Ethernet Extender unexpectedly crashes and you can no longer reset the unit via Web y
53. crito en las instrucciones de operaci n Todo otro servicio deber ser referido a personal de servicio calificado El aparato el ctrico debe ser situado de tal manera que su posici n no interfiera su uso La colocaci n del aparato el ctrico sobre una cama sof alfombra o superficie similar puede bloquea la ventilaci n no se debe colocar en libreros o gabinetes que impidan el flujo de aire por los orificios de ventilaci n El equipo el ctrico deber ser situado fuera del alcance de fuentes de calor como radiadores registros de calor estufas u otros aparatos incluyendo amplificadores que producen calor El aparato el ctrico deber ser connectado a una fuente de poder s lo del tipo descrito en el instructivo de operaci n o como se indique en el aparato Precauci n debe ser tomada de tal manera que la tierra fisica y la polarizaci n del equipo no sea eliminada Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por objetos colocados sobre o contra ellos poniendo particular atenci n a los contactos y recept culos donde salen del aparato El equipo el ctrico debe ser limpiado nicamente de acuerdo a las recomendaciones del fabricante En caso de existir una antena externa deber ser localizada lejos de las lineas de energia El cable de corriente deber ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo Cuidado debe ser tomado de tal ma
54. d PoE injector e 1 ferrite suppression core e 1 grounding wire e This printed quick installation guide The LWE121A KIT and LWE120AE KIT packages contain two each of the items listed above for LWE120A and LWE120AE To download this user manual from the Web site 1 Go to www blackbox com 2 Enter the part number LWE121A in the search box 3 Click on the Resources tab on the product page and select the document you wish to download NOTE Users MUST use the power cord and PoE injector shipped in the box with the Wireless Ethernet Extender Using other options will damage the unit 724 746 5500 blackbox com Page 9 Chapter 2 Overview 2 4 Hardware Description Figure 2 1 Front view Mounting Hole Figure 2 2 Back view Page 10 724 746 5500 blackbox com Chapter 2 Overview RJ 45 port Grounding point Reset button Figure 2 3 Inside the bottom cover Table 2 1 LED indicators Description The device is powered on The device is not receiving power 2 LED ON The signal strength is good 1 LED ON The signal strength is weak Blinking Transmitting receiving wireless packets Green 3 LED ON The signal strength is excellent 724 746 5500 blackbox com Page 11 Chapter 2 Overview 2 5 Typical Management Scenario This section describes the typical management of the Wireless Ethernet Extender By default it is set to thin AP mode managed AP which allows it to be managed by the Wire
55. d by the Wireless Ethernet Extender To switch from Virtual AC mode to Fat AP mode go to Management gt System Settings From the Device Mode drop down list select Fat AP and press YES to make the change take effect Status Wireless Settings Management Tools 1 a AP Management System Settings Use this page to configure the basic parameters of device 2 System Settings gt Device Settings Time Settings Device Mode Virtual AC Thin AP_ m 3 f Fa AP l Firmware Upload NONNI AF Virtual AC Device Name z 4 15 characters and no spaces Configuration File Virtual AC Thin AP Spanning Tree Enabled Disabled Password Settings STP Forward Delay 1 1 30 seconds Syslog Settings O Enable 802 10 VLAN System Log Management VLAN ID 0 0 means disabled IP Address Assignment DHCP Client Static IP IP Address y Figure 4 17 System settings Page 28 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial To switch from default mode Thin AP to Fat AP mode for the first time configuration go to Basic Settings From the Device Mode drop down list select Fat AP and press YES to make the change take effect Thin AP Information _ Basic Settings Basic Settings Use this page to configure the basic parameters of device Gernral Settings Device Mode Device Name max 15 characters and no spaces Ethernet 1 DataRate AC Thin AP
56. d properly that is in strict accordance with the manufacturer s instructions may cause interference to radio communication It has been tested and found to comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15 of FCC rules which are designed to provide reasonable protection against such interference when the equipment is operated in a com mercial environment Operation of this equipment in a residential area is likely to cause interference in which case the user at his own expense will be required to take whatever measures may be necessary to correct the interference Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This digital apparatus does not exceed the Class A limits for radio noise emission from digital apparatus set out in the Radio Interference Regulation of Industry Canada Le pr sent appareil num rique n met pas de bruits radio lectriques d passant les limites applicables aux appareils num riques de la classe A prescrites dans le R glement sur le brouillage radio lectrique publi par Industrie Canada FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment To avoid the possibility of exceeding radio frequency exposure limits you shall beep a distance of at least 100 cm between you and the an
57. d the passphrase is required Data Encryption If data encryption is enabled the key is required and only by sharing the same key with other wireless devices can the communication be established None Available only when the authentication type is open system 64 bits WEP This is made up of 10 hexadecimal numbers 128 bits WEP This is made up of 26 hexadecimal numbers 152 bits WEP This is made up of 32 hexadecimal numbers TKIP Temporal Key Integrity Protocol which is a kind of dynamic encryption is used with WPA PSK etc AES Advanced Encryption Standard it is commonly used with WPA2 PSK WPA WPA2 etc TKIP AES It allows for backwards compatibility with devices using TKIP NOTES We strongly recommend you enable wireless security on your network Only with the same Authentication Data Encryption and Key among the Wireless Ethernet Extender and wireless clients can the communication be established VLAN If your network uses VLANS you can assign one SSID to a VLAN and client devices using the SSID are grouped in that VLAN To allow users on the VLAN to access the Wireless Ethernet Extender s Web page you need to enable Enable 802 1Q VLAN and assign a management VLAN ID for your device Make sure the assigned management VLAN ID is identical to your network VLAN ID to avoid failures in accessing the Wireless Ethernet Extender s Web page Page 80 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurat
58. d wlan operation mode from Bridge to AP ANAIA NA ND 99 AN AT natinn Fnanfinenni nr Dhanna wlan anaratian mada fram Al Figure 5 80 System Log screen 724 746 5500 blackbox com Page 91 Chapter 5 Navigate the Web Configurator Remote Syslog Server Enable Remote Syslog Enable System log to alert remote server IP Address Specify the IP address of the remote server Port Specify the port number of the remote server Ping Watch Dog If you mess your connection up and cut off your ability the log in to the unit the ping watchdog has a chance to reboot due to loss of connectivity Status System Wireless Management System Log Ping Watchdog Ping Watchdog This page provides a tool to configure the Ping Watchdog If the fail count of the Ping reaches a specified value the watchdog will reboot the device Enable Ping Watchdog IP Address to Ping 192 168 1 111 Ping Interval 300 seconds Startup Delay 100 seconds gt 100 Failure Count To Reboot 300 Apply Cancel Figure 5 81 Ping Watchdog screen Ping Watchdog Enable Ping Watchdog To activate ping watchdog check this checkbox IP Address to Ping Specify the IP address of the remote unit to ping Ping Interval Specify the interval time to ping the remote unit Startup Delay Specify the startup delay time to prevent reboot before the Wireless Ethernet Extender is fully initialized Failure Count To Reboot If the ping timeout
59. down the lock button to seal the bottom of the Wireless Ethernet Extender Figure 3 3 Replacing the bottom cover 3 4 2 Using the Grounding Wire The extender has a grounding wire Be sure to connect the extender cables and PoE injector to earth ground properly during normal use to protect against surges or ESD 1 Remove the screw on the grounding point at the bottom of the Wireless Ethernet Extender Figure 3 4 Grounding point on the extender Page 14 724 746 5500 blackbox com Chapter 3 Installation 2 Put the grounding wire on the grounding point at the bottom of the Wireless Ethernet Extender Then screw the grounding wire to tighten up Figure 3 5 Tighten the grounding wire 3 Connect the grounding wire to earth ground 3 4 3 Install the External Antenna The Wireless Ethernet Extender provides two reverse SMA antenna connectors for connecting the external antennas lt gt BLACK BOX www blackbox com Wireless ALA M4 1 gt MAA Fi Figure 3 6 External antenna connectors 1 Connect your external antennas to the SMA type connectors on top of the Wireless Ethernet Extender For longer distance we recommend using higher gain antennas to best suit the application Figure 3 7 External antennas connected to the extender 724 746 5500 blackbox com Page 15 Chapter 3 Installation WARNING Users MUST power off the extender first before connecting the external antennas to it Do not power
60. e SSID is case sensitive and can not exceed 32 characters Broadcast SSID Under AP mode hiding network name is necessary when you are in a wireless environment that may have potential risk By disabling broadcast SSID the STA can not scan and find the Wireless Ethernet Extender so that malicious attack by some illegal STA could be avoided 802 11 Mode The Wireless Ethernet Extender can communicate with 802 11b g or 802 11b g n wireless devices HT Protect Enable HT High Throughput protect to ensure HT transmission with MAC mechanism Under 802 11n mode a wireless client can be divided into HT STA and Non HT STA among which the one with HT protect enabled gets higher throughput Frequency Channel Channel varies much as the available band differs from country to country Select a proper operating channel in the drop down list according to your situation Extension Channel Only applicable to AP AP Repeater and 40 MHz channel width extension channel indicates the use of channel bonding that allows the Wireless Ethernet Extender to use two channels at once Two options are available Upper Channel and Lower Channel Channel Mode Four levels are available 5 MHz 10 MHz 20 MHz and 40 MHz The last one can enhance data throughput but it takes more bandwidth thus it might cause potential interference Antenna By default IEEE 802 11n VAC Access Point uses its built in antenna for directional transmission however if you pref
61. e Web Configurator Upload AC Firmware Allows the network administrator to upgrade firmware for the Wireless Ethernet Extender in AC mode Upload TAP Firmware Before updating the firmware for the VAC managed APs you need to upload the firmware into the VAC Access Point in AC mode that allows the virtual controller AP to do the firmware upgrade for VAC managed APs CAUTION Do NOT cut the power off during upgrade otherwise the system may crash Backup Retrieve Settings We strongly recommend you back up configuration information in case of something unexpected If tragedy hits your device you may have access to restore the important files by the backup All these can be done by the local or remote computer Wireless Broadband Access Point Logout System Wireless Management Configuration File This page allows you to sa rent settings to a file or load the settings from the file which was saved previ boot the ve cur ously You may also reset the current configuration to factory default or reboot tl Configuration File device User Certificates Save Settings to File Save Load Settings from File Choose File No file chosen Upload Reset Settings to Default Reset SERE a i Reboot The Device Reboot Figure 5 31 Backup configuration screen Save AC Settings to File Click Save to export the configuration file of the Wireless Ethernet Extender in AC mode Then the configuration file ac ctg will be generated and s
62. e or disable DHCP server on the Wireless Ethernet Extender DHCP IP Address Range When the DHCP Server is enabled users may specify DHCP IP Address Range for the Wireless Ethernet Extender DHCP Subnet Mask Specify the DHCP Subnet Mask for the Wireless Ethernet Extender Lease Time Specify the lease time 15 44640 minutes for the Wireless Ethernet Extender NOTE For wireless clients who want to access the unit s web page in Router mode type the IP address here in the browser s address bar to enter the web page Captive Portal Captive portal is a management which allows WLAN users to easily and securely access the Internet Under Router mode when captive portal is enabled the IEEE 802 11n VAC Access Point will redirect the client to go to an authentication web page before browsing Internet web pages Captive portals are used on most Wi Fi hotspots networks Therefore to use captive portal you need to find the service providers that have the additional services needed to make captive portal work Status Wireless Settings Management Tools Wireless Networks Captive Portal Wireless Protocol st Use this page to set basic Captive Portal settings Captive Portal is implementd by CoovaChilli Access Control Traffic Shaping Captive Portal Wireless Network VAPI Wireless Y RADIUS Settings TCP IP Settings RADIUS Settings Primary RADIUS Server radiusi coova net Captive Portal gt gt
63. e read only Click Refresh at the bottom of the page to update the list Status Information cs Wireless Users DHCP Clients Page 36 Wireless Settings METER ta Managed APs This page shows the APs that managed by AC Device mac IP FW Status Clients Uploaded ap996633 00 19 70 99 66 33 192 168 1 1 1 1 1 Registered 1 3 kBytes apeeeeee 00 60 b3 ee ee ee 19216812 1 1 1 Registered 0 O kBytes Figure 5 2 Managed APs screen 724 746 5500 blackbox com Tools Downloaded 0 kBytes 0 kBytes Chapter 5 Navigate the Web Configurator View Wireless Users Open Wireless Users in Status to check the information of all the wireless clients such as MAC address SSID of the managed APs that are associated with signal strength connection up time and uploaded downloaded packets All options are read only Click Refresh at the bottom of the page to update the list Status Wireless Settings Management Tools Information Wireless Users This page shows the clients associated with current wireless network Managed APs Wireless Users gt MAC Description SSID AP Signal Uptime Uploaded Downloaded DHCP Clients _ 00 25 d3 7c 89 b7 Wireless ap86c6e1 28 dBm 2011 12 OKB 1KB 22 02 15 25 Figure 5 3 Wireless Users screen View DHCP Client Table Open DHCP Clients in Status as shown next to check the assigned IP address MAC address and
64. ed O Disabled IGMP Snooping Enabled Disabled RIFS O Enabled Disabled HT Protect O Enabled Disabled Preamble Type OLong Auto RTS Threshold 2347 1 2347 Fragment Threshold 2346 256 2346 Beacon Interval 100 20 1024 ms DTIM Interval 1 1 255 Extension Channel Frotection None M Space In Meter 1000 0 15000m Link Integration TDM Coordination Enabled Disabled O Enabled Disabled Figure 5 10 Advanced Settings screen A MPDU A MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled however if your wireless clients don t support A MPDU A MSDU aggregation we do not recommend enabling it Short Gl Under 802 11n mode enables better data rate if there is no negative compatibility issue IGMP Snooping IGMP snooping is the process of listening to IGMP network traffic By enabling IGMP snooping the AP will listen to IGMP membership reports and queries and leave messages to identify the ports that are members of multicast groups Multicast traffic will only be forwarded to ports identified as members of the specific multicast group RIFS RIFS Reduced Interframe Spacing reduces overhead and thereby increases network efficiency HT Protect Enable HT High Throughput protect to ensure HT transmission with MAC mechanism Under 802 11n mode wireless client can be divided into HT STA and Non HT STA among which the one with HT protect
65. ed by WDS so do not use them 1 Repeat the above procedures to configure the remote IEEE 802 11b g n Wireless Ethernet Extender 2 Enter the actual distance in meters For example if the distance between the two VAC bridges is 3 kilometers enter 3000 in the field Status System Wireless Management 1 Basic Settings Advanced Setti ngs Security Settings i These settings are only for more technically advanced users who have a sufficient knowledge about wireless LANs These settings should not be changed unless you understand the 2 Advanced Settings gt effects that such changes will cause Traffic Shaping WMM Support Enabled Disabled A MPDU Aggregation Enabled Disabled Access Control A MSDU Aggregation Enabled Disabled WDS Settings Short Gl Enabled Disabled i RTS Threshold 2347 256 2347 Fragment Threshold 2346 256 2346 Channel Protection None v 3 Distance 3000 0 15000 meter Signal LED Thresholds Weak lt 90 Mediums 74 lt Strong Background Scan Enabled Disabled Apply Cancel Figure 4 30 Advanced settings screen 3 Use ping to check whether the link between the two bridges is OK 4 To check the wireless connectivity go to Status gt Connections If the connection is established it will display association information of the remote bridge including MAC address wireless mode signal strength and connection time Status SS l Wireless Management
66. ee ie 33 dio d APRE OO ra iena 34 De Navigating the Web Conhgurator sillaba 36 A E A E A OTT 36 Am N ee E 36 Malo ieri 36 AS o A m rc Ei 36 Vaia 37 View DHCP Client SS 37 ol NEE I eee a E E E E E E E eee ee 3 Wireless Networks VAP Profiles Settings a ENEE TE 37 NETOS Basic CN ee E E E E EEE E E eee eee ee 41 E A Sn 41 o PRO REA 43 Ta A rn A 43 o RO E A E E E T ne rene ee ee eee 44 CC RE RAI NT 46 724 746 5500 blackbox com Page 5 Table of Contents 5 2 5 3 Page 6 A A ant 47 Ss a 50 AR In e A 50 iS IES UENO PROA CCOOOe05 e T A E E I o 53 WES O a e o EEA 55 o e 55 POULE 56 Restore Factory DEI CR eta 56 e e _9 _ _ _ en 57 COLLE Rn 58 Di tt rr 58 OI RR e O reo SO A 60 A e a UU In E E e ee 60 PI ian AO ERICA O E AEE ET 61 ee ES A A N E E E A E E E 61 IO AFETO a A E E e e a 62 CAIO E E EE E A E EAA E EE A E EE A EE A 62 dz BI dr 62 Coe ee AR A 63 ol i UL ne sts sored a on nee oh tsetse sesso nara cete tainty nosing E teu 63 MEW Bas CANON RE 63 MVS Oon US een o n rn 64 view Network Flow Stats O nro tios 64 VEW ARF TAO dot 65 SA 66 View Active DHCP Client Ta boa 66 NTE PONO CES E EO AE O E E E 67 MES E A I E A A qn A PP 67 BRR 67 LA AP e PP A E A A EEE 68 PPP e e 69 RADIUS CUI or OM e a e E o 70 IO E rr re 71 Ud A 74 Arr Tr Ja e ire ti 75 o A nn et 78 Lalla A III A 80 ES CR en 81 EER 0 PRO REVO RI 83 ca Onn en ee ee 84 O 84 UGO ARA 8
67. en Then go back to Management gt AP Management to do single or group updates Status Wireless Settings Management Tools AP Management gt gt AP Management This page shows the APs that managed by AC System Settings Time Settings o eee z MAC IP FW Status Clients Uploaded Downloaded Firmware Upload P O ap996633 00 19 70 99 66 33 192 168 1 1 1 1 1 Registered 1 24 kBytes 11 kBytes Configuration File Password Settings System Log System Alert Figure 4 15 AP Management screen Upgrade 724 746 5500 blackbox com Page 27 Chapter 4 Quick Setup Tutorial 4 7 Monitor the Ethernet Extender Managed AP To view each managed AP s status go to Status gt Managed APs Besides viewing device information such as device name MAC address IP address and FW version you may also monitor the wireless clients that are currently associated with the man aged APs as well as packets statistics Status Wireless Settings Management Tools Information Managed APs This page shows the APs that managed by AC anaged API Re Wireless Users a Device DHCP Clients Pe MAC IP FW Status Clients Uploaded Downloaded ap996633 00 19 70 99 66 33 192 168 1 1 1 1 1 Registered 1 3 kBytes 0 kBytes apeeeeee 00 60 b3 ee ee ee 19216812 1 1 1 Registered 0 O kBytes 0 kBytes Figure 4 16 Managed APs screen 4 8 Configure the Fat AP mode Fat AP mode operates as standalone AP that cannot be manage
68. enabled gets higher throughput Preamble Type It defines some details on the 802 11 physical layer Long and Auto are available RTS Threshold The Wireless Ethernet Extender sends RTS Request to Send frames to certain receiving stations and negotiates the sending of a data frame After receiving an RTS that STA responds with a CTS Clear to Send frame to acknowledge the right to start transmission The setting range is 0 to 2346 bytes Setting it too low may result in poor network performance Leave We recommend using the default setting 2346 Fragmentation Threshold Specify the maximum size in byte for a packet before data is fragmented into multiple packets Setting it too low may result in poor network performance Leave it at its default of 2346 is recommended Beacon Interval Specify the frequency interval to broadcast packets Enter a value between 20 and 1024 Page 42 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator DTIM Interval DTIM which stands for Delivery Traffic Indication Message is contained in the data packets It is for enhancing the wireless transmission efficiency The default is set to 1 Enter a value between 1 and 255 Channel Protection Mode This is to avoid conflict with other wireless network and boost the ability of your device to catch all 802 11g transmissions However it may decrease wireless network performance Compared to CTS Self the transmission amount of CTS RTS is
69. er to use an external antenna for your case dependent applications you can switch from Internal 8 dBi to External N Type When External N Type is selected an Antenna Gain bar will appear to allow you specify the gain of the external antenna The antenna gain calculates the TX power back off needed to remain in compliance with regulations NOTES You are able to choose External N Type only when you have installed the external antenna properly otherwise the Wireless Page 76 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Fthernet Extender might be damaged The maximum output power will vary depending on the country selected in order to comply with the local regulation The output power here is counted from the RF single chain only not including the 8dBi internal antenna Maximum Output Power per chain Specify the signal transmission power The higher the output power is the wider the signal can cover but the power consumption will be greater accordingly The output power will vary depending on each country s regulation Data Rate Usually Auto is preferred Under this rate the Wireless Ethernet Extender will automatically select the highest available rate to transmit In some cases however where there is no great demand for speed you can have a relatively low transmit rate for compromise of a long distance Extension Channel Protection Mode This is to avoid conflict wit
70. fer size for outgoing traffic that can be sent within a given unit of time The suggested value is 20 KB You may just leave the default value there and then the connection will be bound to the traffic shaping rule at all times You may decrease it to smaller value if the incoming traffic limit is smaller Radius Settings RADIUS Remote Authentication Dial In User Service is a server for remote user authentication and accounting it plays a central role in the network in providing the capabilities of authenticating authorizing accounting auditing alarming and etc It allows an organization to maintain user profiles in a central database that all remote servers can share If 802 1X WPA 2 is used you need to configure radius settings Go to RADIUS Settings in Wireless Settings to make RADIUS configuration Page 44 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Status Wireless Settings Management Wireless Networks RADIUS Settings Wireless Protocol i Use this page to set the radius server settings Access Control Traffic Shaping Authentication RADIUS Server RADIUS Settings gt IP Address 0 0 0 0 Fot Shared Secret CI Global Key Update Figure 5 13 RADIUS Settings Authentication RADIUS Server This is for RADIUS authentication It can communicate with RADIUS through IP Address Port and Shared Secret IP Address Enter the IP address of the
71. figurator Status Wireless Management Information Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet networks Connections ARP Table Poll Interval 5 0 65534 sec Set Interval Bridge Table Wireless Received Transmitted DHCP Clients Unicast Packets 676 1 e E Broadcast Packets 400 421 Network Activities Multicast Packets 19 299 l i Total Packets 1095 721 Total Bytes 54548 63429 Ethernet 1 f Received Transmitted Total Packets 595 144190 Total Bytes 73818 519993 Ethernet 2 Figure 5 45 Statistics screen Poll Interval Specify the refresh time interval in the box beside Poll Interval and click Set Interval to save settings Stop helps to stop the auto refresh of network flow statistics View ARP Table Open ARP Table in Status as below Click Refresh to view current table Status Wireless Management Information ARP Table This table shows ARP table Connections Statistics Se ee ee i IP Address MAC Address Interface ARP Table gt gt ita i illa rt 192 168 1 111 90 E6 BA 5B 9E 26 bro Bridge Table mn Refresh DHCP Clients Network Activities Figure 5 46 ARP Table screen 724 746 5500 blackbox com Page 65 Chapter 5 Navigate the Web Configurator View Bridge Table Open Bridge
72. g Auto Channel Protection None _ 3 Distance 1000 0 15000 meter Apply Cancel Figure 4 22 Advanced settings screen specifying distance 4 8 2 Wireless Client Mode 1 Choose Wireless gt Basic Settings Then you will see the Wireless Basic Settings page Choose Wireless Client from Wireless Mode and click Apply to save it You can then change the other parameters to optimize your application before clicking Apply Status System Wireless Management Tools Basic Settings Profile Settings Use this page to change the wireless mode as well as configure any associated wireless network parameters Advanced Settings 7 J Disable Wireless LAN Interface Traffic Shaping Operation Mode Wireless Client Access Control 3 Wirelessl SSID WDS Settings Locked AP MAC 802 11 Mode 802 11B G N v Data Rate Auto v 4 Output Power Q 30 dBm LI Enable MAC Clone Auto MAC Clone Manual MAC Clone 00 19 70 a2 91 0b Annmh fanral Figure 4 23 Basic Settings page 2 Click the Site Survey button beside Wireless Mode It will scan all the available access points within coverage Select the one you prefer to connect to and click Selected to establish the connection 724 746 5500 blackbox com Page 31 Chapter 4 Quick Setup Tutorial Basic Settings Use this page to change the wireless mode as well as configure any associated w
73. h Backup Retrieve Settings We strongly recommend you back up configuration information in case of something unexpected If tragedy hits your device you may have an access to restore the important files by the backup All these can be done by the local or remote computer Open Configuration File in Management as shown next 724 746 5500 blackbox com Page 87 Chapter 5 Navigate the Web Configurator BLACK BOX Wireless Broadband Access Point Logout Status System Wireless Management Tools Password Settings SE File A ype scale aos a file or load the ee A edp cal voi ey also set the rent c e atio Ao factor y default or reboot the Firmware Upgrade Configuration File de evice User Certificates Save Settings to File Save Remote Services Load Settings from File Choose File No file chosen Upload Reset Settings to Default Reset SNMP Settings Reboot The Device Reboot Figure 5 74 Configuration File screen Save Setting to File Click Save and a dialog box will pop up Save it then the configuration file ap cfg will be generated and saved to your local computer Load Settings from File Click Browse and a file selection menu will appear Select the file you want to load like ap cfg Click Upload to load the file After automatically rebooting new settings are applied Restore Factory Default Settings The IEEE 802 11n VAC Access Point provides two ways to restore t
74. h other wireless network and boost the ability of your device to catch all 802 11g transmissions However it may decrease wireless network performance Compared to CTS Self the transmission amount of CTS RTS is much lower Enable MAC Clone Available only under wireless client mode this hides the MAC address of the AP while it displays the one of associated wireless client or the MAC address is designated manually Site Survey Under wireless client mode the Wireless Ethernet Extender can perform site survey detecting information on the available access points Open Basic Settings in Wireless by clicking the Site Survey button beside the Wireless Mode option The wireless site survey window will pop up with a list of available AP in the vicinity elect the AP you would like to connect and click Selected to establish connection 724 746 5500 blackbox com Page 77 Chapter 5 Navigate the Web Configurator Wireless Site Survey Windows Internet Explorer ES http 192 168 1 14wlsurvey asp Wireless Site Survey This page provides tool to scan the wireless network If any Access Point or IBSS is found you could choose to connect it manually when client mode is enabled Ill Wireless Signal Select SSID Frequency Chann l MAC Address Mode Strength Security O aeap17 2412MHz 1 00 24 01 df67 8e 802 11B G 78 WPA O aeap18 2412MHz 1 00 21 91 f6 f7 55 802 11B G 77 NONE O FRITZ Box Fo
75. he factory default settings Restore factory default settings via Web From the Configuration File screen clicking Reset will eliminate all current settings and reboot your device then will apply default settings BLACK BOX Wireless Broadband Access Point Logout Status System Wireless Management Password Settings ee File This page allows you to nts patient UR si ad the settings from the st which was saved previous sly You mye es set the ration to qa ctory default o Febo ot the Configuration File x device Firmware Upgrade User Certificates Save Settings to File Save Remote Seni A Load Settings from File Choose File No file chosen Upload Reset Settings to Default Reset SUMP Settings Reboot The Device Reboot Figure 5 75 Configuration File screen Reset settings to default Restore factory default settings via Reset Button If software in the Wireless Ethernet Extender unexpectedly crashes you can no longer reset the unit via Web You may do hardware reset via the reset button Press and hold the button for at least 5 seconds and then release it until the PWR LED blinks Page 88 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Reboot You can reboot your Wireless Ethernet Extender from the Configuration File screen in Management as shown next Click Reboot and click Yes when the prompt appears to start reboot process This takes a few mi
76. ically according to the mean throughput value Throughput statistics can be updated manually using the Refresh button Status System Wireless Management Tools Information Network Activities Connections This page shows Throughput information of LAN and WLAN Statistics Wireless 100 solo 90 H rx 93 KDE PNT 80 erred Ch srt y Bridge Table Mt 93 6kb s NAS pr 60 50 DHCP Clients 20 30 Network Activities gt gt 20 10 kb s 0 Ethernet 1 100 90 II nc 947fb s y y o A 80 ETA 7kbis ATT A A 70 Ns e f gt 60 Figure 5 49 Network Activities screen 5 3 2 System Basic System Settings seseneneneeecaesseesceseesscessessce Men Basic Settings Use this page to configure the basic parameters of device TCP IP Settings Time Settings Device Settings RADIUS Settings Device Mode Fat AP Firewall Settings Device Name ap86c6e1 max 15 characters and no spaces Network Mode Router Y Ethernet DataRate Auto v Country Region United States Y Spanning Tree O Enabled Disabled STP Forward Delay 1 1 30 seconds GPS Coordinate Settings Latitude NO milo lo lo Longitude E llo to To Figure 5 50 Basic Settings screen Device Settings Device Mode Three modes are provided AC Thin AP Thin AP FAT AP Select AC Thin AP to have the device act as virtual access controller to manage other VAC managed APs on
77. ional avoid standing directly in front of it Strong RF fields are present when the transmitter is on 3 3 Installation Precautions To keep the Wireless Ethernet Extender well while you are installing it read and follow these installation precautions 1 Users MUST use a proper and well installed grounding and surge arrestor with the Wireless Ethernet Extender otherwise ran dom lightning could easily cause fatal damage to the unit WARNING EMD Lightning DAMAGE IS NOT COVERED UNDER WARRANTY 2 Users MUST use the power cord and PoE injector shipped in the box with the Wireless Ethernet Extender Using other options will damage the unit 3 Users MUST power off the Wireless Ethernet Extender first before connecting the external antenna to it Do not switch from the built in antenna to the external antenna from Web management without physically installing the external antenna onto the unit Otherwise the Wireless Ethernet Extender might be damaged 3 4 System Installation 3 4 1 Connect up Connect up 1 The bottom of the Wireless Ethernet Extender is a movable cover Grab the cover and pull it back harder to take it out as the figure shown below Figure 3 1 Removing the bottom cover from the extender 724 746 5500 blackbox com Page 13 Chapter 3 Installation 2 Plug a standard Ethernet cable into the RJ 45 port Figure 3 2 Plugging a standard Ethernet cable into the RJ 45 port 3 Slide the cover back and press
78. ireless network parameters L Disable Wireless LAN Interface Operation Mode Wireless Client Y Site Survey SSID Wireless Locked AP MAC 802 11 Mode 802 11B G N v Data Rate Auto v 0 19 Antenna Gain gt o OB Output Power O dBm LJ Enable MAC Clone Auto MAC Clone 100 19 70 a2 91 0b Manual MAC Clone Figure 4 24 Select the preferred extender Wireless Site Survey This page provides a tool to scan the wireless network WB171 SL 2457MHz 10 00 50 c6 ac 23 79 802 118 G O 92 j 2450AP 2437MHz 6 00 19 70 32 95 72 802 118 G 81 WEP 1 Wireless 2412MHz 1 00 19 70 05 73 39 802 118 G 83 NONE O MIS Guest 2422MHz 3 00 19 70 40 tfb 802 11B GMN 84 WPAZ O MISVOIP 2412MHz 1 00 18 e7 eb 7d da 802 11B G 85 WEP Select AP Select SSID Scan 2 Figure 4 25 Wireless Site Survey screen 3 If the AP you connect to require authentication or encryption keys click Profile Settings in the left column fill out the corre sponding items and click Apply for data encryption A ee Status System Wireless Management Basic Settings Security Settings Define the wireless security settings Advanced Settings Authentication Traffic Shaping Data Encryption WPA Passphrase Access Control WDS Settings Figure 4 26 Security Settings screen Page 32 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial
79. ireless Ethernet Extender to access its Web Management page In case the Wireless Ethernet Extender is unable to obtain an IP address from a valid DHCP server it will fall back to default static IP address Page 68 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Use Fixed IP Address Check this option You have to specify a static IP address subnet mask default gateway and DNS server for the VAC ACCESS POINT manually Make sure the specified IP address is unique on your network in order to prevent IP conflict If the IEEE 802 11n VAC Access Point is configured as Router mode you need to configure some additional TCP IP parameters for accessing the Internet Status System Wireless Firewall Management Tools Basic Settings TCP IP Settings e Use this page to configure the parameters for local area network which connects to the LAN port TCP IP Settings gt of your Access Point Here you may change the setting for IP address subnet mask DHCP etc Time Settings WAN Settings RADIUS Settings S WAN Access Type Static IP bi IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 0 0 0 0 DNS 1 0 0 0 0 DNS 2 0 0 0 0 LAN Settings IP Address 192 168 0 99 Subnet Mask 255 255 255 0 DHCP Server DHCP IP Address Range ooo Lease Time lo 15 44640 Minutes Figure 5 52 TCP IP Settings screen WAN and LAN Settings WAN Settings
80. isabled WDS Settings 802 11 Mode 802 11B G N HT protect O Enabled Disabled Frequency Channel 2462MHz 11 w Extension Channel None Channel Mode 20 MHz Y Antenna Internal 8 dBi External N Type 2 28 Figure 5 62 Wireless Basic Settings screen 724 746 5500 blackbox com Page 75 Chapter 5 Navigate the Web Configurator Disable Wireless LAN Interface Check this option to disable the WLAN interface then the wireless module of Wireless Ethernet Extender will stop working and no wireless device can connect to it Operation Mode Four operating modes are available in IEEE 802 11n VAC Access Point when it acts as a FAT AP AP The Wireless Ethernet Extender establishes a wireless coverage and receives connectivity from other wireless devices Wireless Client The Wireless Ethernet Extender is able to connect to the AP and thus join the wireless network around it Bridge The Wireless Ethernet Extender establishes wireless connectivity with other APs by keying in remote MAC address Please refer to the WDS Settings for detailed configuration AP Repeater The Wireless Ethernet Extender serves as AP and Bridge concurrently In other words the IEEE 802 11n VAC Access Point can provide connectivity services for CPEs under Bridge mode Wireless Network Name SSID This wireless network name is shared among all associated devices in your wireless network Keep it identical on all those devices NOTE Th
81. l also apply to other extender managed APs Click Apply to apply the configuration immediately Status Wireless Settings Management LELIE Wireless Networks TAP configuration contains changes Apply these changes Wireless Protocol Cou wantto sinchronous local TAP restartyourAC Apply 26 Ireless rotoco Figure 4 6 Wireless Settings screen To make the change on the Wireless Ethernet Extender itself take effect you need to reboot the extender To reboot the Wireless Ethernet Extender go to Management gt Configuration File and click the Reboot button The reboot process will take about 50 seconds Status Wireless Management Password Settings Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously You may also reset the current configuration to factory default or reboot the Configuration File device Firmware Upgrade User Certificates Save Settings to File Save Reale Sonic Load Settings from File Choose File No file chosen Upload Reset Settings to Default Reset SNMP i Reboot The Device Reboot Figure 4 7 Configuration file screen 724 746 5500 blackbox com Page 23 Chapter 4 Quick Setup Tutorial 4 3 Firmware Upgrade for Ethernet Extender in AC mode To upgrade the firmware for the Wireless Ethernet Extender in AC mode go to Management gt Firmware Upload
82. lease time for each DHCP client Click Refresh to update the table Status Wireless Settings Management Information DHCP Clients Managed APs i This table shows the assigned IP address MAC address and time expired for each DHCP leased client Wireless Users DHCP Clients gt gt IPAddress MAC Address Time Expired s i 192 168 1 2 00 25 d3 7c 89 b7 431968 Figure 5 4 DHCP Clients screen 5 1 2 Wireless Settings Wireless Settings allow you to configure wireless parameters security method access control and flow control for your Wireless Ethernet Extender NOTE The configuration will also apply on all the other VAGmanaged APs Wireless Networks VAP Profiles Settings The IEEE 802 11n VAC Access Point allows up to 8 virtual SSIDs on a single BSSID and to configure different profile settings such as security and VLAN ID to each SSID To create a virtual AP you may check the Enable box of the profile and click on the profile eg Profile 2 to configure wireless and security settings Hit Apply to active the profile 724 746 5500 blackbox com Page 37 Chapter 5 Navigate the Web Configurator Status Wireless Settings Management gt Wireless Networks Wireless Networks Define each WLAN s attribute Wireless Protocol Access Control Traffic Shaping Enable SSID gt Security VLANID Description RADIUS Settings 1 Wireless Open System o Profile1 2 O Wireless Ope
83. lert F Obtain IP Address Automatically 2 O Use Fixed IP Address Figure 5 26 System Settings screen Device Settings Device Mode Three modes are provided AC Thin AP Thin AP and FAT AP Select AC Thin AP to have the device act as a virtual access controller to manage other VAC managed APs on your network Select Thin AP to have the VAC Access Point managed by the VAC AP in AC mode Select FAT AP to perform as a standalone AP neither managing nor managed by other VAC APs Device Name Specify the device name which is composed of no more than 15 characters with 0 9 A Z a z or Ethernet Data Rate Specify the transmission rate of data for Ethernet Default is Auto Spanning Tree Spanning Tree Protocol STP is a link management protocol for AP which provides path redundancy while preventing loops in a network STP allows only one active path at a time between the access points but establishes the redundant link as a backup if the initial link fails STP Forward Delay STP Forward Delay is the time spent in detecting and learning network tree topology state before entering the forward state Default time value is 1 sec 724 746 5500 blackbox com Page 53 Chapter 5 Navigate the Web Configurator IP Address Assignment IP Address Assignment Obtain IP Address Automatically Use Fixed IP Address IP Address 192 168 1 100 subnet Mask Pia w OP ey BE a Gateway Ip Address 0 0 0 0 DNS 1 0 0 0 0 DNS
84. less Ethernet Extender in AC mode When a thin AP mode joins a wired network it will start to look for a Wireless Ethernet Extender in AC mode If the thin AP finds the AP controller on the network it will send the registration request to the AP controller Once the registration is successfully made the AP that acts as the AP controller will add the thin AP to its management list and provides it configuration information Page 12 724 746 5500 blackbox com Chapter 3 Installation 3 Installation 3 1 Preparing for Installation CAUTION Professional Installation Required Seek assistance from a professional installer who is well trained in RF installation and knowledgeable in the local regulations 3 2 Safety Precautions To keep you safe and install the hardware properly read and follow these safety precautions 1 If you are installing the Wireless Ethernet Extender for the first time for your safety as well as others please assistance from a professional installer who has received safety training on the hazards involved 2 Keep safety as well as performance in mind when selecting your installation site especially where there are electric power and phone lines 3 When installing the Wireless Ethernet Extender note the following things e Do not use a metal ladder e Do not work on a wet or windy day e Wear shoes with rubber soles and heels rubber gloves and a long sleeved shirt or jacket 4 When the system is operat
85. licy between two networks It may also be defined as a mechanism used to protect a trusted network from an un trusted network The Wireless Ethernet Extender uses Source IP Filtering Destination IP Filtering Source Port Filtering Destination Port Filtering Port Forwarding and DMZ This is available only under Router Mode Source IP Filtering Status Wireless Management Basic Settings Source IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings network TCP IP Settings RADIUS Settings Enable Source IP Filtering Firewall Settings Local IP Address Comment Dst IP Filtering Src Port Filtering Dst Port Filtering Local IP Address Figure 5 55 Source IP Filtering screen You may create and activate a rule that filters a packet based on the source IP address trom your local network to Internet Check Enable Source IP Filtering to activate rule Local IP Address Enter the IP address you would like to restrict Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the IP address from filtering click Select checkbox of the designated IP address and click the Delete Selected button You may delete all the IP addresses in the list by clicking Delete All 724 7
86. list by clicking Delete All 724 746 5500 blackbox com Page 4 Chapter 5 Navigate the Web Configurator Destination IP Filtering Status Wireless Settings Management Tools Wireless Networks Destination IP Filtering Wireless Protocol ee sai Entries in this table are used to restrict the computers in LAN from accessing certain websites in WAN according to IP address Access Control Traffic Shapin 3 Enable Destination IP Filtering RADIUS Settings Destination IP Address E Comment TCP IP Settings Captive Portal E Firewall Settings gt IP Address gt Comment Select Edit Src IP Flltoring e 192 168 130 O Figure 5 17 Destination IP Filtering screen You may create and activate a rule that filters a packet based on the destination IP address to restrict the local computers from accessing certain websites Check Enable Destination IP Filtering to activate rule Destination IP Address Enter the IP address to be restricted Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the IP address from filtering click Select checkbox of the designated destination IP address and click the Delete Selected button You may delete all the IP addresses in the list by clicking Delete All Source Port Filtering Status Wireless Settings Management Wireless Networks Source Port Filtering Wireless Protocol oat eae i
87. lution that provides reliable wireless network coverage for outdoor broadband application While operating as access point the Wireless Ethernet Extender also provides centralized management and monitoring of all the VAC managed APs on the network In addition the easy to install Wireless Ethernet Extender is also a high performance last mile broadband solution that provides reliable wireless network coverage for outdoor broadband application 2 2 Features e Centralized configuration control for your network e Compliant with IEEE 802 11n standard e Support passive PoE supplied with 24V e High reliable watertight housing endures almost any harsh environments e Three management modes including AC AC Thin AP Thin AP and Fat AP e Four wireless operation modes in FAT AP mode including AP Wireless Client WDS and AP Repeater e Up to 8 BSSIDs available for service deployment e Support encryption 64 128 152 bit WEP and 802 1X WPA WPA2 WPA amp WPA2 WPA PSK WPA2 PSK and WPA PSK WPA2 PSK e User friendly Web and SNMP based management interface 2 3 What s Included Your package should contain the following items If anything is missing or damaged contact Black Box Technical Support at 724 746 5500 or into blackbox com The LWE121A and LWE120AE packages contain the following items 1 IEEE 802 11n Wireless Ethernet Extender e 2 detachable 5 dBi antennas 1 2 e 2 pole mounting rings e 1 24 VDC power cord an
88. may just leave the default value there and then the connection will be bound to the traffic shaping rule at all times You may decrease it to smaller value if the incoming traffic limit is smaller Captive Portal Captive portal is management that allows WLAN users to easily and securely access the Internet Under Router mode when captive portal is enabled the Wireless Ethernet Extender will redirect the client to go to an authentication web page before browsing Internet web pages Captive portals are used on most Wi Fi hotspots networks Therefore to use captive portal you need to find the service providers that have the additional services needed to make captive portal work Page 84 724 746 5500 blackbox com Status Chapter 5 Navigate the Web Configurator System Wireless Management Basic Settings Profile Settings Advanced Settings Access Control Traffic Shaping WDS Settings aa Primary RADIUS Server Captive Portal Use this page to set basic Captive Portal settings O Captive Portal Enable Profile Selection RADIUS Settings Secondary RADIUS Server RADIUS Auth Port 12 E RADIUS Acct Port 181 RADIUS Shared Secret 00000000000000000 RADIUS NASID Captive Portal Settings UAM Portal URL UAM Secret ww 200000000000000 Figure 5 70 Captive Portal screen To enable Captive Portal check Captive Portal and select the VAP network needed
89. n System o Profile2 3 O Wireless Open System o Profile3 4 O Wireless Open System o Profile4 5 O Wireless Open System lo Profiles 6 O Wireless Open System lo Profiles 7 O Wireless Open System o Profile7 8 O Wireless Open System lo Profile8 9 O Wireless Open System lo Profile9 d 0 O Wireless Open System o Profile10 Figure 5 5 Wireless Networks screen Status Wireless Settings Management Wireless Networks gt VAP Profile1 Settings Custom WLAN s security profile settings Wireless Protocol Access Control Traffic Shaping Basic Settings RADIUS Settings aa Description Broadcast SSID Enabled Disabled Wireless Separation O Enabled O Disabled WMM Support O Enabled Disabled O Max Station Num 0 32 Security Settings Network Authentication Open System be Data Encryption None v Figure 5 6 VAP Profilel Settings screen Basic Setting SSID This wireless network name is shared among all associated devices in your wireless network Keep it identical on all those devices NOTE The SSID is case sensitive and cannot exceed 32 characters Description Name of the VAP profile Broadcast SSID In AP mode hiding the network name is necessary when you are in a wireless environment that may have potential risk By disabling broadcast SSID the STA cannot scan and find the Wireless Ethernet Extender so that malicious attack by an illegal STA can be avoided Page 38 724 746 5500
90. n WLAN 7270 2412MH2 1 00 24 fe 46 b9 c8 802 11B GIN 75 WPA2 O RT G32 2437MHZ 6 20 cf 30 d6 5a d0 802 11B G 62 WEP O MIS AP2 2437MHZ 6 00 13 f7 8e 8d d3 802 11B GINN 49 WPA2 O HTC 243 7MHZ 6 90 21 55 c2 3f 9c 802 11B G 81 NONE O DIR 635 2462MHz 11 00 24 a5 b4 cf 77 802 11B G 64 WPA O Apple Network 873669 241 7MHZ2 2 10 9a dd 87 3e 69 16802 11B G N 75 WPA2 O ASIKX_WIFi 2422MHz 3 00 1e 58 29 28 27 802 11B G 65 NONE Figure 5 63 Wireless Site Survey screen VAP Profile Settings Available in AP mode the Wireless Ethernet Extender allows up to 16 virtual SSIDs on a single BSSID and to configure different profile settings such as security and VLAN ID to each SSID To create a virtual AP you may check the Enable box of the profile and click on the profile eg Profile 2 to configure wireless and security settings Click Apply to active the profile Status Wireless Management Basic Settings _ _ Ho VAP Profile Settings Profile Settings iii ana Advanced Settings Profile Name SSID S Security Vian ID Enable Access COM 1 Profile1 Wireless Legacy 802 1X Always Enabled Traffic Shaping 2 Profile Wireless Open System lo O Captive Portal 3 Profile3 Wireless Open System lo i Profile4 Wireless Open System WDS Settings be H i 5 Profile5 Wireless Open System lo O 6 Profile6 Wireless Open System o O T Profile7 Wireless Open System O 8 Profiles Wireless Open System lo O lt ane 7
91. nera que objectos liquidos no sean derramados sobre la cubierta u orificios de ventilaci n Servicio por personal calificado deber ser provisto cuando El cable de poder o el contacto ha sido da ado u Objectos han ca do o liquido ha sido derramado dentro del aparato o El aparato ha sido expuesto a la lluvia o El aparato parece no operar normalmente o muestra un cambio en su desempe o O El aparato ha sido tirado o su cubierta ha sido da ada PU ge 4 724 746 5500 blackbox com Table of Contents Table of Contents o eo A EII 8 ZII E A E 9 AE PR RA 9 22 A o enna 9 PRE e cc 9 Z4 HADES oi totales 10 ea E a a 12 A A i eni 13 cl REPARTO dina 13 IE SAAS it isis 13 a IRSA OM Proc aironi al O ire 13 sA EN a 13 A i 13 342 Usno te o o io 14 34a Instal ine Prtemnal AMENNA a EE TEE 15 34A Mount ihe Ar on PP 17 545 TONT UD E E ei 18 IA O MS oia 18 4 OCS HN ON loas 21 Mai A C ONO O ee E E EE E EE eer oe 21 4 2 Configure the AC Thin AP DM Oli eine 22 4 3 Firmware Upgrade for Ethernet Extender in AC Mode 24 4 4 Install the Managed Thin AP nn nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnninennnnnnnns 24 45 Manage theExtender Managed A 25 4 6 Firmware Upgrade for Managed Thin APS i 26 AJ Monitor the Ethernet Extender Managed APPS iaia 28 Ao o ine FCAP MOUE E e E S EAE 28 CA APTO AS ae E E E E E E 0 29 Ag Wireless Chen een n 31 45 Bdge NOE sere oe
92. net through the Gateway Use of such filters can be helpful in securing or restricting your local network Wireless Protocol Access Control Traffic Shapin paa Enable Destination Por Filtering RADIUS Settings Port Range e Protocol Both Comment TCP IP Settings Captive Portal E Firewall Settings Apply Src IP Filtering q 2 Port Range Protocol 5 Comment Select Edit Dst IP Filtering 2000 2500 TCP UDP O Figure 5 19 Destination Port Filtering screen You may create and activate a rule that filters a packet based on the destination port from your local network to Internet Check Enable Destination Port Filtering to activate rule Port Range Enter the port range you would like to restrict Protocol Select port protocol Both TCP UDP Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the restricted destination ports click Select checkbox of the designated ports and click the Delete Selected button You may delete all the IP addresses in the list by clicking Delete All 724 746 5500 blackbox com Page 49 Chapter 5 Navigate the Web Configurator Port Forwarding Status Wireless Settings Management Wireless Networks Port Forwarding Wireless Protocol z C an s Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall These setti
93. nfigure SNMPv3 User Profile For SNMP protocol version 3 you can click Configure SNMPv3 User Profile in blue to set the details of SNMPv3 user Check Enable SNMPv3 Admin User in advance and make further configuration User Name Specify a user name for the SNMPv3 administrator or user Only the SNMP commands carrying this user name are allowed to access the Wireless Ethernet Extender Password Specify a password for the SNMPv3 administrator or user Only the SNMP commands carrying this password are allowed to access the Wireless Ethernet Extender Confirm Password Input that password again to make sure it is your desired one Access Type Select Read Only or Read and Write accordingly Authentication Protocol Select an authentication algorithm SHA authentication is stronger than MD5 but is slower Privacy Protocol Specity the encryption method for SNMP communication None and DES are available None means no encryption is applied DES is a Data Encryption Standard that applies a 58 bit key to each 64 bit block of data Page 90 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Certificate Settings Under Wireless Client mode when EAP TLS is used the RADIUS server must know which user certificates to trust The Server can trust all certificates issued by a given CA To import a user certificate from Import User Certificates click Browse and specify the location where the user certifica
94. ng _ Comment Src Port Filtering Dst Port Filtering AEREA RARAS Port Forwarding LocaliP Address Protocol PortRange Comment Select Edit Figure 5 59 Port Forwarding screen Port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind th Wireless Ethernet Extender s NAT firewall Check the Enable Port Forwarding checkbox to activate port forwarding IP Address Enter the IP address the local server Protocol Select Both UDP or TCP Port Range Specify the port range Comment Make comments to record the port forwarding rule UDP Pass Through Status Wireless Management Basic Settings UDP Pass through TCP IP Settings 9 All UDP packets will be passed through the firewall Time Settings O Enable UDP Pass through RADIUS Settings O Firewall Settings Src IP Filtering Dst IP Filtering Src Port Filtering Dst Port Filtering Port Forwarding UDP Pass through gt Figure 5 60 UDP Passthrough screen Page 74 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Check Enable UDP Pass through to allow all the UDPs packets to pass through the firewall NOTE Opening all the UDP ports will be very likely to expose the network to intruders DMZ A Demilit
95. ngs are only necessary if you wish to host some sort of server like a Access Control web server or mail server on the private local network behind your Gateway s NAT firewall Traffic Shaping Enable Port Forwarding RADIUS Settings _ IP Address TCP IP Settings Protocol gd Port Range Captive Portal i Comment E Firewall Settings Src IP Filtering Dst IP Filtering _ IP Address Protocol Port Range Comment Select Edit Src Port Filtering 192 168 1 20 TCP UDP 25 O Figure 5 20 Port Forwarding screen Port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some a server such as a web server or mail server on the private local network behind the Wireless Ethernet Extender NAT firewall 5 1 3 Management The Wireless Ethernet Extender can manage up to 50 VAC managed APs The Wireless Ethernet Extender provides thin AP management for editing the VAC managed AP settings upgrading the firmware and monitoring etc AP Management AP Management allows you to configure and upgrade the VAC managed APs Select the VAP managed AP you would like to specifically configure Status Wireless Settings Management AP Management gt gt AP Management This page shows the APs that managed by AC System Settings Device Time Settings v Name gt MAC IP F V
96. ngs which you want to communicate with in the table and then enable the WDS This function can work k only in Bridge and AP Repeater mode Profile Settings Access Control Local MAC Address Remote AP MAC Address1 00 19 70 00 00 01 Remote AP MAC Address2 WDS Settings Remote AP MAC Address3 Remote AP MAC Address4 Figure 5 71 Wireless Broadband Access Point screen Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and click Apply to save the settings NOTES WDS Settings is available only under Bridge and AP Repeater Mode Bridge uses the WDS protocol that is not defined as the standard so compatibility issues between equipment from different vendors may arise Moreover Tree or Star shape network topology should be used in all WDS use cases i e if AP2 and AP3 are specified as the WDS peers of AP1 AP2 should not be specified as the WDS peer of AP3 and AP3 should not be specified as the WDS peer of AP2 in any case Mesh and Ring network topologies are not supported by WDS and should be avoided in all the use cases 5 3 4 Management Password From the Password Settings screen in Management you can change the password to manage your Wireless Ethernet Extender Status System Wireless Management Tools Password Settings Password Settings Firmware Upgrade i Use this page to set the password of this unit
97. nient remote management Open the SNMP Settings screen in Management shown next Set the SNMP parameters and obtain MIB file before remote management Status System Wireless Management Tools Password Settings SNMP Settings Firmware Upgrade i Use this page to config snmp settings Configuration File A Enable SNMP User Certificates Protocol Version v3 v Remote Services Server Port 161 SNMP Settings n Get Community public 7 Set Community private Trap Destination 0 0 0 0 Trap Community public Location Configure SNMPv3 User Profile Apply Cancel Figure 5 78 SNMP Settings screen Protocol Version Select the SNMP version and keep it identical on the IEEE 802 11n VAC Access Point and the SNMP manager The Wireless Ethernet Extender supports SNMP v2 v3 Server Port Change the server port for a service if needed however you have to use the same port to use that service for remote management Get Community Specify the password for the incoming Get and GetNext requests from the management station By default it is set to public and allows all requests Set Community Specify the password for the incoming Set requests from the management station By default it is set to private Trap Destination Specify the IP address of the station to send the SNMP traps to Trap Community Specify the password sent with each trap to the manager By default it is set to public and allows all requests Co
98. nutes lt SBLACK BOX Wireless Broadband Access Point www blackbox com Logout Status System Wireless Management Tools Password Settings Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously You may also reset the current configuration to factory default or reboot the Configuration File gt device Firmware Upgrade User Certificates Save Settings to File Save enote ara Load Settings from File Choose File No file chosen Upload Reset Settings to Default Reset SNMP Settings Reboot The Device Reboot Figure 5 76 Configuration File screen Reboot the device option Remote Management TheWireless Ethernet Extender provides a variety of remote management including Telnet SNMP FTP SSH HTTPS and exclusive WISE tool making configuration more convenient and secure Status Wireless Management Password Settings Remote Services Use this page to customise services of remote console Firmware Upgrade Configuration File Enable Telnet Server Enable FTP Server i Enable WISE U Force HTTPS e W Enable SSH Server User Certificates _ Enable CPE Management Remote Services Apply Cancel SNMP Settings Figure 5 77 Remote Services screen 724 746 5500 blackbox com Page 89 Chapter 5 Navigate the Web Configurator SNMP Management The Wireless Ethernet Extender supports SNMP for conve
99. or status System Wireless Management Basic Settings 10 Profile10 Wireless Open System O i sirel ssh l Profile Settings 11 Profile11 Wireless Open System io O 12 Profilet Wireless Open System O Advanced Settings 13 Profile13 Wireless Open System O Access Control 14 Profile14 wireless Open System g Traffic Shaping 15 Profile15 Wireless Open System O E 16 Profile16 Wireless Open System Captive Portal li O WDS Settings es ll Enable 802 10 VLAN Management VLAN ID El Figure 5 66 VLAN screen Advanced Settings Open Advanced Settings in Wireless to make advanced wireless settings Status System Wireless Management Tools Basic Settings y _ Wireless Advanced Settings Profile Settings x g These settings are only for more technically advanced users who have a sufficient knowledge about wireless LANs These settings should not be changed unless you understand the effects that such Advanced Settings changes will cause Sasesenesasesasesserererereseseeezesaeosecsesevoseseceesenen is Access Control _ S A MPDU Aggregation Enabled Disabled Traffic Shaping A MSDU Aggregation O Enabled Disabled Captive Poll E Short GI Enabled Disabled _ i RTS Threshold 2347 1 2347 WDS Settings Fragment Threshold 2346 256 2346 Beacon Interval 100 20 1024 ms DTIM Interval a 1 255 Preamble Type O Long Auto IGMP Snoo
100. ou may do a hardware reset via the reset button Press and hold the button for at least 5 seconds and then release it until the PWR LED blinks The hardware reset will take about 2 minutes to complete Reboot You can software reboot your Wireless Ethernet Extender from Configuration File in Management as described next Status Wireless Settings Management AP Management Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously You may also reset the current configuration to factory default or reboot the device System Settings Time set Save AC Settings to File Firmware Upload Save TAP Settings to File l i l i Load Settings from File SONAS CHA Reset Settings to Default Password Settings Reboot The Device Figure 5 33 Rebooting from the Configuration screen Click Reboot and c lick Yes when prompt appears to start reboot process This takes a few minutes 724 746 5500 blackbox com Page 57 Chapter 5 Navigate the Web Configurator Password Settings You can change the password for your Wireless Ethernet Extender Status Wireless Settings Management Tools AP Management Password Settings Use this page to set the password of this unit System Settings Time Settings Current Password eecceees A New Password seccceee Firmware Upload Confirm Password 000000000 Configuration File
101. ping O Enabled Disabled RIFS O Enabled Disabled Figure 5 67 Wireless Advanced Settings screen A MPDUIA MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled however if your wireless clients don t support A MPDU A MSDU aggregation we do not recommend to enabling it Short GI Under 802 11n mode enable it to obtain a better data rate if there is no negative compatibility issue 724 746 5500 blackbox com Page 81 Chapter 5 Navigate the Web Configurator RTS Threshold The Wireless Ethernet Extender sends RTS Request to Send frames to certain receiving station and negotiates the sending of a data frame After receiving an RTS that STA responds with a CTS Clear to Send frame to acknowledge the right to start transmission The setting range is 0 to 2346 bytes Setting it too low may result in poor network performance We recommend leaving it at its default of 2346 Fragmentation Length Specify the maximum byte size for a packet before data is fragmented into multiple packets Setting it too low may result in poor network performance We recommend leaving it at its default of 2346 Beacon Interval Specify the frequency interval to broadcast packets Enter a value between 20 and 1024 DTIM Interval DTIM which stands for Delivery Traffic Indication Message is contained in the data packets It is for enhancing the wireless transmission efficiency The def
102. s that packets take when traveling to the destination destination Status Wireless Settings Management Ping Trace Route Use this page to test the path from one station to another Trace Route gt gt Destination IP Address 192 168 1 2 1 192 168 1 2 192 168 1 2 4623 ms 0 565 ms 0 5 ms Figure 5 39 Trace Route screen 724 746 5500 blackbox com Page 61 Chapter 5 Navigate the Web Configurator Destination IP Address Enter IP address of the remote destination and click Start to start 5 2 Thin AP Mode 5 2 1 Information You may see some VAC managed AP s basic information such as model name firmware version MAC address current up time registration status as well as MAC address Thin AP n a Information This page show the associated devices Basic Settings Model Name LWE121A Firmware Version 1 1 1 MAC Address 00 19 70 20 fa d2 Current Time 2011 12 22 2 56 29 Register Status Registered AC MAC Address 00 19 70 86 c6 e1 Figure 5 40 Information screen 5 2 2 Basic Settings Allows you to configure device and IP settings for the VAC managed AP Thin AP Information Basic Settings Basic Settings EA Miane RO Use this page to configure the basic parameters of device Gernral Settings Device Mode Thin AP Device Name ap20fad2 max 15 characters and no spaces Ethernet DataRate Auto v IP Settings Obtain IP Address Automatically
103. sociation list Status System Wireless Management Tools Information Association List ES Tao This table shows the MAC Address IP Address and RSSI for each associated wireless client Statistics A VAP Signal ARP Table Ind MAC Address E LI Connection Time Last IP Action a 4 00 19 70 00 fb c5 48 2011 1 24 18 09 20 0 0 0 0 Bridge Table DHCP Clients Network Activities Figure 5 43 Association List By clicking on the MAC address of the selected device on the web you may see more details including device name connection time signal strength noise floor ACK timeout link quality IP information current data rate and current TX RX packets Association Node Details The details information of association node g MAC AAs 00 13 02 71 35 ba Negotiated ast signal Device Name em 86dBm Connect time na 24M 87 dBm Signal Strength 85 dBm 36M 85dBm Noise Floor 117 dBm ACK Timeout 27 Link Quality 0 Last IP 1169 254 17 206 TXIRX Rate 10 24 MBs TX RX Packets 21115 Bytes Transmitted 1119 Bytes Received 110002 Figure 5 44 Association Node Details screen View Network Flow Statistics Open Statistics in Status to check the data packets received on and transmitted from the wireless and Ethernet ports Click Refresh to view current statistics Page 64 724 746 5500 blackbox com Chapter 5 Navigate the Web Con
104. ss communication to define a priority limit on the basis of data type under AP mode only thus those time sensitive data like video audio data may own a higher priority than a common one To enable WMM the wireless client should also support it Max Station Number By checking the Max Station Num the Wireless Ethernet Extender will only allow up to 32 wireless clients to associate with for better bandwidth for each client By disabling the checkbox the Wireless Ethernet Extender will allow up to 128 clients to connect but it is likely to cause network congestion or poor performance Security Setting To prevent unauthorized radios from accessing data transmitting over the connectivity the Wireless Ethernet Extender provides you with rock solid security settings Network Authentication Open System This allows any device to join the network without performing any security check Shared Key Data encryption and key are required for wireless authentication Not available in Bridge AP Repeater mode Legacy 802 1x This provides the rights to access the wireless network and wired Ethernet With User and PC identity centralized authentication as well as dynamic key management it controls the security risk of wireless network to the lowest To serve the 802 1x at least one EAP type should be supported by the RADIUS Server AP and wireless client 724 746 5500 blackbox com Page 79 Chapter 5 Navigate the Web Configurator WPA with RAD
105. te is placed Click Import BLACK BOX Wireless Broadband Access Point www blackbox Logout Status Wireless Management Password Settings User Certificates Firmware Upgrade Pg Use this page to upload delete user certificates Configuration File Import Certificate Choose File No file chosen Import En Delete Certificate v Delete User Certificates e v Remote Services SNMP Settings Figure 5 79 User Certificates screen Delete User Certificate Delete the selected user certificate Import User Certificates Import the user certificate 5 3 5 Tools System Log System log is used for recording events occurred on the Wireless Ethernet Extender including station connection disconnection system reboot and etc Open System Log in Tools as shown next Status System Wireless Management Tools System Log System Log Ping Watchdog i Use this page to set remote log server and show the system log Enable Remote Log IP Address 0 0 0 0 Port 514 Apply Cancel Clear Time Priority Source Message 1 2014 01 02 21 06 18 alert Configserver System was resetto factory setting 2 2014 01 02 21 01 01 notice 192 168 1 111 WEB Authorized user admin A 2014 01 02 21 02 27 notice Configserver Changed device mode from TAP to FAP 4 2014 01 02 22 48 44 notice 192 168 1 33 WEB Authorized user admin 5 2014 01 02 22 49 24 notice Configserver Change
106. tenna of the installed equipment This transmitter must not be co located or operating in conjunction with any other antenna or transmitter The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user 724 746 5500 blackbox com Page 3 N In OM Statement strucciones de Seguridad Normas Oficiales Mexicanas Electrical Safety Statement 1 2 3 4 5 10 11 PA 13 14 15 16 1 18 Pa Todas las instrucciones de seguridad y operaci n deber n ser le das antes de que el aparato el ctrico sea operado Las instrucciones de seguridad y operaci n deber n ser guardadas para referencia futura Todas las advertencias en el aparato el ctrico y en sus instrucciones de operaci n deben ser respetadas Todas las instrucciones de operaci n y uso deben ser seguidas El aparato el ctrico no deber ser usado cerca del agua por ejemplo cerca de la tina de ba o lavabo s tano mojado o cerca de una alberca etc El aparato el ctrico debe ser usado nicamente con carritos o pedestales que sean recomendados por el fabricante El aparato el ctrico debe ser montado a la pared o al techo s lo como sea recomendado por el fabricante Servicio El usuario no debe intentar dar servicio al equipo el ctrico m s all a lo des
107. the coordinates and click the Apply button TCP IP Settings Open TCP IP Settings in System as shown next to configure the parameters for the LAN that connects to the LAN port of the Wireless Ethernet Extender In this page users may change the settings for IP Address Subnet Mask and DHCP Server Status System Wireless Management Tools Basic Settings TCP IP Settings LIA AI A I gd Use this page to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP address subnet mask DHCP etc Time Settings RADIUS Settings IP Address Assignment Obtain IP Address Automatically J Use Fixed IP Address Firewall Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway Ip Address 0 0 0 0 DNS 1 0 0 0 0 DNS 2 0 0 0 0 Figure 5 51 TCP IP Settings screen Obtain IP Address Automatically If a DHCP server exists in your network you can check this option so the Wireless Ethernet Extender can obtain IP settings automatically from that DHCP server NOTES When the IP address of the VAC Access Point is changed the clients on the network often need to wait for a while or even reboot before they can access the new IP address For an immediate access to the bridge flush the netbios cache on the client computer by running the nbtstat r command before using the device name of the W
108. the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings network RADIUS Settings Enable Source Port Filtering Firewall Settings Port Range gt Protocol Both Src IP Filtering S Comment Dst IP Filtering Sre Port Filtering Dst Port Filtering Source Port Range Protocol Comment Select Edit Figure 5 57 Source Port Filtering screen You may create and activate a rule that filters a packet based on the source port from your local network to Internet Check Enable Source Port Filtering to activate a rule Port Range Enter the port range you would like to restrict Page 72 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Protocol Select port protocol Both TCP UDP Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the restricted source ports click Select checkbox of the designated ports and click the Delete Selected button To delete all the IP addresses in the list click Delete All Destination Port Filtering Status Wireless Management Basic Settings Destination Port Filtering Entries in this table are used to restrict certain ports of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local Time Settings network TCP IP Settings RADIUS Settings Enable Des
109. thenticating authorizing accounting auditing alarming etc It allows an organization to maintain user profiles in a central database that all remote servers can share If 802 1X WPA 2 is used you need to configure radius settings Open RADIUS Settings in System to make RADIUS configuration Status System Wireless Management Tools Basic Settings RADIUS Settings TCP IP Settings Use this page to set the radius server settings Time Settings Authentication RADIUS Server RADIUS Settings ReseaszeseasenseniezeonizesesnesiaaieazeoeazeoniseeMeMered IP Address 0 0 0 0 Fi i vaio Settings Port 1812 Shared Secret HO Global Key Update every Seconds Figure 5 54 RADIUS Settings screen Page 70 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Authentication RADIUS Server This is for RADIUS authentication It can communicate with RADIUS through IP Address Port and Shared Secret IP Address Enter the IP address of the Radius Server Port Enter the port number of the Radius Server Shared Secret This secret which is composed of no more than 31 characters is shared by the IEEE 802 11n VAC Access Point and RADIUS during authentication Global Key Update Check this option and specify the time interval between two global key updates Default is 3600 seconds Firewall Settings The firewall is a system or group of systems that enforce an access control po
110. tination Port Filtering Firewall Settings Port Range Protocol Src IP Filtering Comment Dst IP Filtering Src Port Filtering Figure 5 58 Destination Port Filtering screen You may create and activate a rule that filters a packet based on the destination port from your local network to Internet Check Enable Destination Port Filtering to activate rule Port Range Enter the port range you would like to restrict Protocol Select port protocol Both TCP UDP Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the restricted destination ports click Select checkbox of the designated ports and click the Delete Selected button To delete all the IP addresses in the list click Delete All 724 746 5500 blackbox com Page 73 Chapter 5 Navigate the Web Configurator Port Forwarding Status Wireless Management Basic Settings Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of Time Settings server like a web server or mail server on the private local network behind your Gateway s NAT firewall TCP IP Settings RADIUS Settings Enable Port Forwarding IP Address Firewall Settings Src IP Filtering Protocol Port Range Dst IP Filteri
111. tings Daie oF era MAC gt IP FW Status Clients Uploaded Downloaded Firmware Upload ap996633 00 19 70 99 66 33 192 168 1 1 1 1 1 Registered 1 24 kBytes 11 kBytes Configuration File apeeeeee 00 60 b3 ee ee ee 192 168 1 2 1 1 1 Registered 0 0 kBytes 0 kBytes Password Settings Syslog Setting z ast e at I adic Upgrade Upgrade All Figure 4 9 AP Management screen Registered APs highlighted Moving the mouse over MAC address of each managed AP will also display relevant RF infofmation such as channel mode cur rent channel antenna being used and transmit output power Page 24 724 746 5500 blackbox com Chapter 4 Quick Setup Tutorial AP Management This page shows the APs that managed by AC ef Selected DeviceName RE IP FW Status Clients TK PRX 1 apbiffca 00 19 70 b1 ff dd 465 8KB 0 08 i Channel Mode 20 MHz 5745MHz 149 Channel Restart Rename Set IP Radio Refresh Extension Channel None Internal 2708m Figure 4 10 AP Management screen RF information 4 5 Manage the extender managed APs To configure and manage the managed APs 1 Enter the web page of the Wireless Ethernet Extender in AC mode and go to Management gt AP Management The following screen appears Status Wireless Settings Management AP Management gt gt AP Management This page shows the APs that managed by AC System Settings Time Settings an aDevice
112. tion Standard it is commonly used with WPA2 PSK WPA WPA2 etc TKIP AES It allows for backwards compatibility with devices using TKIP NOTE We strongly recommend you enable wireless security on your network NOTE Only Wireless Ethernet Extenders and wireless clients with the same Authentication Data Encryption and Key can communicate Page 40 724 746 5500 blackbox com Chapter 5 Navigate the Web Configurator Network Basic Setting Status Wireless Settings Management A Wireless Networks gt gt n FP Wireless Open System Profile 11 i n Syste Prof Was Pri 2 P Wireless Open System lo rofile12 13 O Wireless Open System Profile 13 Access Control o mt 1 ll 14 O Wireless Open System lo Profile 14 Traffic Shaping 15 O Wireless Open System lo Profile15 RADIUS Settings 16 P Wireless Open System o Profile16 Network Basic Settings Network Mode O Enable 802 10 VLAN Management VLAN ID Ul app cancel J d Figure 5 8 Network Basic Setting screen Network Mode Specify the network mode It includes Bridge and Router When switched to Router mode the LAN IP address for web page access will become 192 168 0 99 Wireless Protocols Allows the user to change country code 802 11 mode and other advanced parameters for the Wireless Ethernet Extender Status Wireless Settings Management Wireless Networks Wireless Basic Settings Use this page to change the wireless mode as well
113. twork from an un trusted network The Wireless Ethernet Extender uses Source IP Filtering Destination IP Filtering Source Port Filtering Destination Port Filtering and Port Forwarding as well as DMZ This is available only under Router Mode Source IP Filtering Status Wireless Settings Management Wireless Networks A p Source IP Filtering Wireless Protocol sint i Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local network Access Control Traffic Shapin ping Enable Source IP Filtering RADIUS Settings Local IP Address Comment TCP IP Settings Captive Portal Apply E Firewall Settings IP Address gt Comment Select Edit 192 168 1 3 O Edit gt sa Src IP Filtering Dst IP Filtering Figure 5 16 Source IP Filtering screen You may create and activate a rule that filters a packet based on the source IP address from your local network to Internet Check Enable Source IP Filtering to activate rule Local IP Address Enter the IP address you would like to restrict Comment Make comments to record your filtering rule Click Apply and the IP address will be added in the list To delete the IP address from filtering click Select checkbox of the designated IP address and click the Delete Selected button You may delete all the IP addresses in the
114. upport O Enabled Disabled O Max Station Num 0 32 Security Settings Network Authentication Open System si Data Encryption vp Shared Key Legacy 802 1x WPA with Radius WPA2 with Radius WPA E WPA2 with Radius WPA PSK WIPA2 PSK WPA PSKEWPA2 PSK Figure 5 7 VAP Profilel Settings screen Network Authentication Open System Allows any device to join the network without performing any security check Shared Key Data encryption and key are required for wireless authentication Not available in Bridge AP Repeater mode Legacy 802 1x Provides the rights to access the wireless network and wired Ethernet With User and PC identity centralized authentication as well as dynamic key management it reduces the security risk To serve the 802 1x at least one EAP type should be supported by the RADIUS Server AP and wireless client WPA with RADIUS Wi Fi Protected Access WPA is a subset of the IEEE 802 11i standard With warrant username password and etc offered by user this kind of authentication can be realized with specific RADIUS server This is the common way to be adopted in large enterprise network 724 746 5500 blackbox com Page 39 Chapter 5 Navigate the Web Configurator WPA2 with RADIUS WPA2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WPA If it is selected AES encryption and RADIUS server are required WPASWPA2 with RA
115. y the port number of the remote server Send Syslog via Email Log Schedule Configure the frequency of logs being sent Five scheduling options are provided Never Hourly Daily Weekly and When log is full Severity Level Choose All to send all the logs or Alert to send only the alert messages Send Log to Specify the email address where you would like to send the log Day for Sending Log When Weekly scheduling is selected you may specify which week day to send the log Time for Sending Log Specify the time of the day to send the log Clear Log To clear log after sending logs via email check the After Sending Mail checkbox Mail Server Setting Send Log From Enter the email address of the mail server Mail Subject Type a title to be presented in the subject line of the log email message SMTP Server Enter the IP address of the SMTP sever SMTP Authentication If you want to use SMTP authentication check SMTP Authentication checkbox and enter the user account and password 724 746 5500 blackbox com Page 59 Chapter 5 Navigate the Web Configurator System Log System log record and display all logs and alert message in this page Once the log entries are all used the log will wrap around and the old logs will be deleted You may click Clear to delete logs manually as well Status Wireless Settings AP Management System Log This page show the system log System Settings Time 2011 12 22 00 55 05

Download Pdf Manuals

image

Related Search

Related Contents

MÁQUINA DE LAVAR ROUPA  models rgac & sgac - Johnson Controls Inc.  Universal Wal FL-2500 Universal Wall Light User Manual  User Manual - FTP Directory Listing  DCD-SA500  Set 09 Cuadro de reemplazo para Llantas Pasajero y  Seminar Notes: - Donandpatty.us  EpsonWorkForce WF-2530WF  

Copyright © All rights reserved.
Failed to retrieve file