Home
        IEEE 802.11N WIRELESS OUTDOOR CPE User's Manual
         Contents
1.      NTP Server  Select the time server from the  NTP Server  dropdown list or manually input the IP address of  available time server into  Manual IP      Hit  Apply  to save settings     Chapter 3 Basic Settings Page 21    Firewall Settings    The firewall is a system or group of systems that enforce an access control policy between two  networks  It may also be defined as a mechanism used to protect a trusted network from       un trusted network  IEEE 802 11N WIRELESS OUTDOOR CPE has capabilities of Source IP Filtering   Destination IP Filtering  Source Port Filtering  Destination Port Filtering  Port Forwarding as well as  DMZ  This is available only under Router Mode    Source IP Filtering  The source IP filtering gives users the ability to restrict certain types of data  packets from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE  Use    of such filters can be helpful in securing or restricting your local network                    Wireless Management    Basic Settings    Source IP Filtering  IP Settings Bridge            Entries in this table are used to restrict certain types of data packets from your local network to  h Internet through the Gateway  Use of such filters can be helpful in securing or restricting your  IP Settings Router  local network     RADIUS Settings  Enable Source IP Filtering    Time Settings Local IP Address     Comment            Firewall Settings    Dest IP Filtering  Current Filter Table   Local IP Address    Src Po
2.    Appendix     GPL Declamation    PUBLIC SOFTWARE DECLAMATION    In the software we delivered  there may contains some public software  if it is  please read    below carefully     1  Definition    Public Software   when applicable  shall mean that portion of the Licensed Software  in source code  form  set forth in the below Table  and provided under the terms set forth in the Section 5  the indicated  website  the complete license terms can be found     Public Software  shall mean each of     a  any computer code that contains  or is derived in any manner  in whole or in part  from  any  computer code that is distributed as open source software  e g  Linux  or similar licensing or  distribution models  and    b  any software that requires as a condition of use  modification and or distribution of such software  that such software or other software incorporated into  derived from or distributed with such software  i   be disclosed or distributed in source code form   ii  be licensed for the purpose of making derivative  works  or  iii  be redistributable at no charge    Public Software includes  without limitation  software licensed or distributed under any of the following  licenses or distribution models  or licenses or distribution models similar to any of the following   1   GNU s General Public License  GPL  or Lesser Library GPL  LGPL    2  the Artistic License  e g    PERL    3  the Mozilla Public License   4  the Netscape Public License   5  the Sun Community  Sourc
3.    Firmware Upload the device    Configuration File  gt  gt  Save Settings to File   Load Settings from File    ICT      upload    Reset Settings to Default  Reboot The Device     Figure 37 Reboot    System Log    System log is used for recording events occurred on the IEEE 802 11N WIRELESS OUTDOOR CPE   including station connection  disconnection  system reboot and etc     Open    System Log    in  Tools  as below     Chapter 5 Management Page 42    Wireless Broadband Access Point    Status System       System Log  gt  gt   Site Survey    Ping Watchdog    L  Enable Remote Syslog    System Log    Use this page to set remote log server and show the system log     Wireless    Remote Syslog Server                          Management                      IP Address  Port 5            E Time Source   Message   1 00 00 18    00 19 70 27 EB E7   WLAN service stopped   2 00 00 18      00 19 70 27 EB E7   WLAN service started   3 00 00 48  00 19 70 27 EB E7   WLAN service stopped   4 00 00 48      00 19 70 27 EB E7   WLAN service started   5 00 00 18      00 19 70 27 EB E7   WLAN service stopped   6 00 00 19      00 19 70 27 EB E7   WLAN service started   7 00 00 19  00 19 02 99 5   1     Station associated   8 00 00 19      00 19 D2 99 5E 1A      Station disassociated        Figure 38 System Log      Remote Syslog Server    Enable Remote Syslog  Enable System log to alert remote server     IP Address  Specify the IP address of the remote server     Port  Specify the port number of th
4.    Logout 0    Status System Wireless Management Tools    Information    This page shows the current status and some basic settings of the device     Connections    Network Flow    System Information  Bridge Table    Model Name  ARP Table Device Name ap20fabc  MAC Address 00 19 70 20 fa bc  DHCP Client List Country Region United States  Firmware Version 2 0 1    LAN Settings    IP Address 192 168 1 1  Subnet Mask 255 255 255 0  Gateway IP Address 0 0 0 0   MAC Address 00 19 70 20 fa bc    Wireless Settings    Operation Mode  Wireless Mode       Figure 13 Main Page    Note     e The username and password are case sensitive  and the password should be no    more than 19 characters     Chapter 3 Basic Settings Page 16    Basic System Settings    For users who use the IEEE 802 11N WIRELESS OUTDOOR CPE for the first time  it is    recommended that you begin configuration from  Basic Settings  in  System  shown below     Logout  O    System Wireless Management       Basic Settings    IP Settings Bridge  seems    IP Settings Router        Network Modes  Bridge v   RADIUS Settings     Device           ap20fabc          15 characters and no spaces   Time Settings Country Region  United States       Firewall Settings    Figure 14 Basic System Settings     Basic Settings  Network Mode  Specify the network mode  including Bridge and Router  It is easy to configure  parameters in Bridge Mode  however  users must pay extra attention to the way they configure the  device when it is set to R
5.    U u uuu u uu uuu uuu uuu             4  Preparation before Installation    ss 4   Professional Installation Required sn 4  Saltety Preca  tlons    ada et eese etie ds 4  Installation Pr  cautions  2 rd CR EE eC PE ro               5  Product Package  ie ESI raten fe Gein erdt 5  Hardware  Installation              frere opere eec uc ed de ende pt rere ee ug e 7  Conrnectup   au s ne PI tr p en de er    Ud eR 7  Pol   Mo  rititig           iota e aar lette he ia      10  Using the External Antenna    eet een Rec osten tire einen 12   Chapter 3  Basic Setti S u u eere eben Idae        14  Factory Default Settings          x op Ed te dre tei aat pL e Eie eee 14  System Requirements   ho repe intet ee P ERI Le e etie eta 15  How to Login the Web based Interface    15  Basic System Settings su oda tt b mre sa itr dens 17  RADIUS Settings  nicer ee cepto idm e ate em e e e ie td aay 20  Time  Settlhgs ri den ne he ede eee dp eC elt te               21  Firewall Settirigs    i dei Rie tete                                      22  Basic Wireless Setllngs    oti ee ea pd rid di ees 26  Site Survey  iine eade re e n menia fein ea ieee a 28   Chapter 4 Advanced Settings                   30    Advanced Wireless Settings    ser 30    Wireless Security Settings    eee 33    Security Settlrigs   i debe end bab E RE 33  AGCeSS         C I nes A t ME           35  WDS    Settings  2s  RR ieget enit      ee 36  Chapter 5 Manageme    t   u                                 37  SNMP Managemlen
6.   option  the wireless site survey window will popup with a list of available wireless networks around   Select the AP you would like to connect and click  Selected  to establish connection  The wireless site    survey window can also be viewed by opening the  Site Survey  page in  Tools      Chapter 3 Basic Settings Page 28    Wireless Site Survey   Windows Internet Explorer    Wireless Site Survey    This page provides tool to scan the wireless network  If any Access Point or IBSS is found  you could choose to connect it  manually when client mode is enabled     Z Com W32 204 00 15 eb 00 02 04            06 15 eb 00 02 04          b g          Figure 17 Site Survey    Chapter 3 Basic Settings    Page 29    Chapter 4 Advanced Settings    Advanced Wireless Settings    Open  Advanced Settings  in  Wireless  to make advanced wireless settings   Logout     Status Wireless Management    Basic Settings WMM Support  Enabled Disabled  A MPDU aggregation    Enabled    Disabled  A MSDU aggregation    Enabled    Disabled    Short GI  9 Enabled    Disabled  RTS Threshold   2346  1 2346     Security Settings    Access Control        Fragment Threshold   2346  256 2346     WDS Settings Beacon Interval  Bo        20 1024 ms    DTIM Interval          41255   Preamble Type     Long    Short   IGMP Snooping   9 Enabled    Disabled  Wireless Separation     Enabled    Disabled  RIFS   9 Enabled O Disabled  Link Intergration  O Enabled  9 Disabled         Station Num   32    0 32     Space In Me
7.  2  Connect your antenna with the N type connector on the top of IEEE 802 11N WIRELESS    OUTDOOR CPE                     e  f you are going to use      external antenna on IEEE 802 11N WIRELESS OUTDOOR  CPE  get some cable in advance     Be aware of the force you use while connecting to the N type connector  inappropriate    force may damage the N type connector     Ah  Warning        Users MUST power off the IEEE 802 11N WIRELESS OUTDOOR CPE first before  connecting the external antenna to it  Do not switch from built in antenna to the    external antenna from WEB management without physically attaching the external    Chapter 2 Hardware Installation Page 12    antenna onto the IEEE 802 11N WIRELESS OUTDOOR CPE  otherwise  damage    might be caused to the IEEE 802 11N WIRELESS OUTDOOR CPE itself     Chapter 2 Hardware Installation Page 13    Chapter 3 Basic Settings    Factory Default Settings    We ll elaborate the IEEE 802 11N WIRELESS OUTDOOR CPE factory default settings  You can  re acquire these parameters by default  If necessary  please refer to the  Restore Factory Default    Settings    Table 1 IEEE 802 11N WIRELESS OUTDOOR CPE Factory Default Settings       Features Factory Default Settings  Wireless Device Name apXXXXXX  X represents the last 6  ee digits of Ethernet MAC address         Data Rate Auto  IP Address 192 168 1 1  Subnet Mask 255 255 255 0  Gateway 0 0 0 0  Primary DNS Server 0 0 0 0  Secondary DNS Server 0 0 0 0  Spanning Tree Enable      100  Ful   
8.  Space in Meter 0  Flow Control by AP Disable    Security   Open System      Chapter 3 Basic Settings Page 14    Encryption   Wireless Separation Disable   Access Control Disable  Enable Disable Enable  Read Community Name Public    Write Community Name Private  IP Address       System Requirements    Before configuration  please make sure your system meets the following requirements         computer coupled with 10  100 Base TX adapter       Configure the computer with a static IP address of 192 168 1 x  as the default IP address of IEEE  802 11N WIRELESS OUTDOOR        is 192 168 1 1   X cannot be 0  1         255      e    Web browser on PC for configuration such as Microsoft Internet Explorer 6 0 or above     Netscape or Firefox     How to Login the Web based Interface    The IEEE 802 11N WIRELESS OUTDOOR CPE provides you with user friendly Web based  management tool    amp  Open Web browser and enter the IP address  Default  192 168 1 1  of IEEE 802 11N WIRELESS    OUTDOOR CPE into the address field  You will see the login page as below        int       Name            password                  Figure 12 Login Page  Chapter 3 Basic Settings Page 15      Enter the username  Default  admin  and password  Default  password  respectively and click   Login  to login the main page of IEEE 802 11N WIRELESS OUTDOOR         As you can see   this management interface provides five main options in the black bar above  which are Status     System  Wireless  Management and Tools     
9.  of something unexpected  If  tragedy hits your device  you may have an access to restore the important files by the backup  All these  can be done by the local or remote computer     Open    Configuration File  in    Management    as below     Chapter 5 Management Page 40    Logout       Status Wireless                            SNMP Configuration         Configuration File    This page allows you to save current settings to a file or load the settings from the file which was  saved previously  Besides  you could reset the current configuration to factory default or reboot    Password Settings          Firmware Upload the device   Configuration File  gt  gt  Save Settings to File       Load Settings from File            Upload  Reset Settings to Default  Reboot The Device     Figure 35 Backup Retrieve Settings    Backup Settings  By clicking    Save     a dialog box will pop up  Save it  then the configuration file like ap cfg will be  saved to your local computer     Retrieve Settings  By clicking    Browse     a file selection menu will appear  select the file you want to load  like ap cfg     Click  Upload  to load the file  After automatically rebooting  new settings are applied     Restore Factory Default Settings    The IEEE 802 11N WIRELESS OUTDOOR CPE provides two ways to restore the factory default  settings     Restore factory default settings via Web  From  Configuration File   clicking  Reset  will eliminate all current settings and reboot your device   then def
10.  set SNMP settings   Firmware Upload    Configuration File RER SNAP    Protocol Version  va M    Server Port 161         Get Community  public          Set Community  private       Trap Destination  0 0 0 0          Trap Community  public       Configure SNMPv3 User Profile       Figure 31 SNMP Configuration    Enable SNMP  Check this box to enable SNMP settings     Protocol Version  Select the SNMP version  and keep it identical on the IEEE 802 11N WIRELESS OUTDOOR CPE  and the SNMP manager     Server Port  Change the server port for a service if needed  however you have to use the same port to use that  service for remote management     Get Community    Specify the password for the incoming Get and GetNext requests from the management station  By  Chapter 5 Management Page 37    default  it is set to public and allows all requests     Set Community  Specify the password for the incoming Set requests from the management station  By default  it is  set to private   e Trap Destination  Specify the IP address of the station to send the SNMP traps to     Trap Community  Specify the password sent with each trap to the manager  By default  it is set to public and allows all    requests     Configure SNMPv3 User Profile    For SNMP protocol version 3  you can click  Configure SNMPv3 User Profile  in blue to set the details  of SNMPv3 user  Check  Enable SNMPv3 Admin User    in advance and make further configuration   Loue     Status Wireless                         SNMP Configurati
11.  some specific channels and or operational frequency bands are country  dependent and are firmware programmed at the factory to match the intended destination  The    firmware setting is not accessible by the end user     Warranty    Standard hardware warranty is for one  1  year from date of shipment from Distributor  Warrants that  hardware will conform to the current relevant published specifications and will be free from material    defects in material and workmanship under normal use and service     IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY  DIRECT  INDIRECT  GENERAL  SPECIAL  INCIDENTAL  CONSEQUENTIAL  EXEMPLARY OR  OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT  INCLUDING   WITHOUT LIMITATION  DAMAGES FOR LOSS OF BUSINESS PROFITS  BUSINESS  INTERRUPTION  LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS  OR  FROM ANY BREACH OF WARRANTY  EVEN IF DISTRIBUTOR HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGES  IN NO CASE SHALL DISTRIBUTOR LIABILITY EXCEED    THE AMOUNT YOU PAID FOR THE PRODUCT                       Chapter 1 Introduction  u uu                                                                               1  Introduction  gay eS do ER nU INE LE 1                       c d 2  Key Feat  resxua saurus Mie tact P E nid Le nis rst oU    are 2  Typical Applicati  fis                  ce o danse                 ERE ERE HR ER RE Ai 3   Chapter 2 Hardware Installation                                       
12.  your IEEE    802 11N WIRELESS OUTDOOR CPE     Enter the new password respectively in    New Password    and    Confirm Password     fields  click    Apply  to save settings     Logout       System Wireless Management    SNMP Configuration d  Password Settings    Password Settings  gt  gt       4  Use this page to set the password of this Access Point     Firmware Upload       New Password   Configuration File     Confirm Password          Figure 33 Password    Chapter 5 Management Page 39                           password is case sensitive and its length can not be exceed 19 characters     Upgrade Firmware    Open  Firmware Upload  in  Management  and follow the steps below to upgrade firmware locally or    remotely through IEEE 802 11N WIRELESS OUTDOOR CPE s Web      Logout  5    Status Wireless Management       SNMP Configuration i  Upgrade Firmware    This page allows you upgrade the device firmware to a new version  Please do not power off the  device during the upload because it may crash the system     Password Settings          Configuration File Select File          Figure 34 Upgrade Firmware    Click  Browse  to select the firmware file you would like to load     Click  Upload  to start the upload process     e    Wait a moment  the system will reboot after successful upgrade     Note     e Do NOT cut the power off during upgrade  otherwise the system may crash     Backup  Retrieve Settings    It is strongly recommended you back up configuration information in case
13. 1N WIRELESS OUTDOOR CPE is able to  give stable and efficient wireless performance  while designed with IEEE 802 11n draft 2 0 standard  and high output power makes it possible to deliver several times faster data rate than normal wireless    device and higher bandwidth with longer range for outdoor applications   The IEEE 802 11N WIRELESS OUTDOOR CPE supports four wireless communication connectivity   AP  Wireless Client  WDS and AP Repeater   allowing for various application requirements thus    helping to find the key to the  last mile  with least effort     With high output power and reliable performance  the IEEE 802 11N WIRELESS OUTDOOR CPE is    an ideal wireless broadband solution for wireless Internet service providers and system integrators     Chapter 1 Introduction Page 1                             we    WIRELESS    CPE    Figure 1 IEEE 802 11N WIRELESS OUTDOOR CPE    Key Features    e Compliant with IEEE 802 11b g and IEEE 802 11n draft 2 0 as well      Support Power Through Ethernet which is supplied with 12V      High reliable watertight housing endures almost any harsh environments     Four operating modes including AP  Wireless Client  WDS and AP Repeater       Support 64 128 152 bit WEP and 802 1    WPA  WPA2  WPA amp WPA2 WPA PSK  WPA2 PSK          WPA PSK amp WPA2 PSK etc       User friendly Web and SNMP based management interface    Chapter 1 Introduction Page 2    Typical Application    This section describes the typical applications of IEEE 802 11N WIR
14. 4  What if        not access the Web based management interface     Please check the followings     e Check whether the power supply is OK  Try to power on the unit again     Chapter 7 Troubleshooting Page 49    e Check whether the IP address of PC is correct  in the same network segment as the unit    e Login the unit via other browsers such as Firefox     e Hardware reset the unit     Q 5  What if the wireless connection is not stable after associating with an AP under wireless    client mode     e Since the IEEE 802 11N WIRELESS OUTDOOR CPE comes with a built in directional  antenna  it is recommended make the IEEE 802 11N WIRELESS OUTDOOR CPE face to the  direction where the AP is to get the best connection quality    e In addition  you can start    Site Survey  in  Wireless Basic Settings  to check the signal  strength  If it is weak or unstable  The smaller the number is  the weaker the signal strength    is    please join other available AP for better connection     Chapter 7 Troubleshooting Page 50    Appendix     ASCII    WEP can be configured with a 64 bit  128 bit or 152 bit Shared Key  hexadecimal number or ACSII    As defined  hexadecimal number is represented by 0 9  A F or a f  ACSII is represented by 0 9  A F     a f or punctuation  Each one consists of two digit hexadecimal        Table 2 ACSII  ASCII        ASCII Hex ASCII        SCII         Character Equivalent Equivalent   Character   Equivalent haracter   Equivalent    58       Appendix A  ASCII Page 51 
15. E via its    wired port  for WAN is on wireless port and LAN is on wired port when device is set to    Chapter 3 Basic Settings Page 19    Router mode    e Bridge mode and AP Repeater mode are similar to AP mode when device is set to  Router mode  WAN is on wired port and LAN is on wireless port  Thus users must also  connect IEEE 802 11N WIRELESS OUTDOOR CPE with another wireless device  before it is set to Router mode and access IEEE 802 11N WIRELESS OUTDOOR    CPE via the connected wireless device     RADIUS Settings    RADIUS  Remote Authentication Dial In User Service  is a server for remote user authentication and  accounting  playing a central role in the network in providing the capabilities of authenticating   authorizing  accounting  auditing  alarming and etc  It allows an organization to maintain user profiles  in a central database that all remote servers can share     Open  RADIUS Settings  in  System  to make RADIUS configuration     Logout     Status System Wireless Management       Basic Settings    RADIUS Settings    IP Settings Bridge  gs ge  Use this page to set the radius server settings     IP Settings Router   Authentication RADIUS Server              IP Address  0 0 0 0  Time Settings Port 1812  Firewall Settings Shared Secret         Reauthentication Time    3600 Seconds    L  Global Key Update    every   Seconds    every x1000 Packets    Figure 1715 RADIUS Settings    Authentication RADIUS Server  This is for RADIUS authentication       can communica
16. ELESS OUTDOOR CPE  By  default  it is set to AP mode which allows it to establish a wireless coverage  besides  it is also able to    join any available wireless network under wireless client mode  The IEEE 802 11N WIRELESS    OUTDOOR CPE is able to deliver stable and efficient broadband connectivity for various applications        Figure 2 Typical Application    Besides  the IEEE 802 11N WIRELESS OUTDOOR CPE can also be applied into the following   environments        Cost effectively provide long distance backhaul for remote areas  e g  village  oil well  island   mountain and etc        Establish local backhaul for campus  farm and factory    Provide and access for video streaming or surveillance for industrial and mining enterprises    Chapter 1 Introduction Page 3    Chapter 2 Hardware Installation    This chapter describes safety precautions and product information you have to know and check before    installing IEEE 802 11N WIRELESS OUTDOOR CPE     Preparation before Installation    Professional Installation Required    Please seek assistance from a professional installer who is well trained in the RF installation and    knowledgeable in the local regulations     Safety Precautions    1  To keep you safe and install the hardware properly  please read and follow these safety  precautions    2  If you are installing IEEE 802 11N WIRELESS OUTDOOR        for the first time  for your safety  as well as others   please seek assistance from a professional installer who has re
17. GENERAL PUBLIC  LICENSE Version 2    GNU GENERAL PUBLIC  LICENSE Version 2    GNU GENERAL PUBLIC  LICENSE Version 2    GNU GENERAL PUBLIC  LICENSE Version 2    GNU GENERAL PUBLIC  LICENSE Version 2    GNU GENERAL PUBLIC  LICENSE Version 2  GNU LIBRARY  GENERAL PUBLIC  LICENSE Version 2       rg licenses old li  censes gpl 2 0 ht  ml    http   www gnu o  rg licenses old li   censes gpl 2 0 ht          http   www gnu o  rg licenses old li   censes gpl 2 0 ht          http   www gnu o  rg licenses old li   censes gpl 2 0 ht          http   www gnu o  rg licenses old li  censes gpl 2 0 ht          http   www gnu o  rg licenses old li   censes gpl 2 0 ht          http   www gnu o  rg licenses old li  censes gpl 2 0 ht        http   www gnu o  rg licenses old li  censes library ht  ml    Page 54       vsftpd Author  Chris Evans ftp   vsftpd   GNU GENERAL PUBLIC   http   www gnu o   beasts or   LICENSE Version 2 rg licenses old li  g users ce censes gpl 2 0 ht  vans vsftp ml  d 1 1 2 tar   gz   linux ftp   ftp ker   GNU GENERAL PUBLIC   http   www gnu o  nel org pu   LICENSE Version 2 rg licenses old li  b linux ker censes gpl 2 0 ht  nel v2 6 lin ml  ux 2 6 20 3        tar bz2    Appendix B  GPL Declamation Page 55    
18. IEEE 802 11N  WIRELESS OUTDOOR CPE    User s Manual    V2 0 June 2010    Copyright    Copyright    2010 all rights reserved  No part of this publication may be reproduced  adapted  stored in  a retrieval system  translated into any language  or transmitted in any form or by any means without    the written permission of the supplier     About This Manual    This user manual is intended to guide professional installer to install the IEEE 802 11N WIRELESS  OUTDOOR CPE Wireless CPE and how to build the infrastructure centered on it  It includes    procedures to assist you in avoiding unforeseen problems     Conventions    For your attention on important parts  special characters and patterns are used in this manual                     e    This indicates an important note that you must pay attention to     A  Warning         This indicates a warning or caution that you have to abide     Bold  Indicates the function  important words  and so on     Federal Communication Commission Interference Statement   This equipment has been tested and found to comply with the limits for a Class B digital device   pursuant to Part 15 of the FCC Rules  These limits are designed to provide reasonable protection  against harmful interference in a residential installation  This equipment generates uses and can  radiate radio frequency energy and  if not installed and used in accordance with the instructions  may  cause harmful interference to radio communications  However  there is no guarantee th
19. R CPE is able to obtain IP settings    automatically from that DHCP server     Note  When the IP address of the IEEE 802 11N WIRELESS OUTDOOR CPE is changed  the    clients on the network often need to wait for a while or even reboot before they can access the    new IP address  For an immediate access to the bridge  please flush the netbios cache on the    client computer by running the  nbtstat          command before using the device name of the IEEE    802 11N WIRELESS OUTDOOR CPE to access its Web Management page     Use Fixed IP Address  Check this option  You have to specify a static IP address  subnet mask   default gateway and DNS server for IEEE 802 11N WIRELESS OUTDOOR CPE manually  Make  sure the specified IP address is unique on your network in order to prevent IP conflict    Spanning Tree  Spanning Tree Protocol  STP  is a link management protocol for AP which  provides path redundancy while preventing loops in a network  STP allows only one active path  at a time between the access points but establish the redundant link as a backup if the initial link  fails    e     Settings  Router     This is available only under Router mode  Open    IP Settings  Router   in  System  below to  Chapter 3 Basic Settings Page 18    configure the parameters of IEEE 802 11N WIRELESS OUTDOOR        for accessing the    Internet      IGI ITO     Status System Wireless Management    Basic             Router IP Settings    5 z Use this page to configure the parameters for accessing 
20. at  interference will not occur in a particular installation  If this equipment does cause harmful  interference to radio or television reception  which can be determined by turning the equipment off and    on  the user is encouraged to try to correct the interference by one of the following measures       A Reorient or relocate the receiving antenna      Increase the separation between the equipment and receiver      Connect the equipment into an outlet on a circuit different from that to which the receiver is  connected       Consult the dealer or an experienced radio TV technician for help     This device complies with Part 15 of the FCC Rules  Operation is subject to the following two  conditions   1  This device may not cause harmful interference  and  2  this device must accept any    interference received  including interference that may cause undesired operation     FCC Caution  Any changes or modifications not expressly approved by the party responsible for    compliance could void the user s authority to operate this equipment     FCC Radiation Exposure Statement    This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment   To avoid the possibility of exceeding radio frequency exposure limits  you shall beep a distance of at  least 100cm between you and the antenna of the installed equipment  This transmitter must not be    co located or operating in conjunction with any other antenna or transmitter     The availability of
21. ault settings are applied     Logout o    System Wireless                      Tools       SNMP Configuration      T  Configuration File        This page allows you to save current settings to a file or load the settings from the file which was  saved previously  Besides  you could reset the current configuration to factory default or reboot  Firmware Upload the device     Password Settings             Configuration File    Save Settings to File       Load Settings from File    IST        Upload    Reset Settings to Default   Reboot The Device     Figure 21 Restore Settings  Chapter 5 Management Page 41      Restore factory default settings via Reset Button  If software in IEEE 802 11N WIRELESS OUTDOOR CPE is unexpectedly crashed and no longer  reset the unit via Web  you may do hardware reset via the reset button  Press and hold the button    for at least 5 seconds and then release it until the PWR LED gives a blink     Reboot    You can reboot your IEEE 802 11N WIRELESS OUTDOOR CPE from  Configuration File  in   Management  as below   Click  Reboot  and hit  Yes  upon the appeared prompt to start reboot process  This takes a few    minutes     Logout o    Status System Wireless                            SNMP Configuration       Configuration File    This page allows you to save current settings to a file or load the settings from the file which was  saved previously  Besides  you could reset the current configuration to factory default or reboot    Password Settings       
22. ceived safety  training on the hazards involved    3  Keep safety as well as performance in mind when selecting your installation site  especially  where there are electric power and phone lines    4  When installing IEEE 802 11N WIRELESS OUTDOOR         please note the following things      Do not use    metal ladder     Do not work on a wet or windy day     Wear shoes with rubber soles and heels  rubber gloves  long sleeved shirt or jacket   5  When the system is operational  avoid standing directly in front of it  Strong RF fields are present    when the transmitter is on     Chapter 2 Hardware Installation Page 4    Installation Precautions    To keep the IEEE 802 11N WIRELESS OUTDOOR CPE well while you are installing it  please read    and follow these installation precautions     1  Users MUST use a proper and well installed surge arrestor with the IEEE 802 11N WIRELESS  OUTDOOR CPE  otherwise  a random lightening could easily cause fatal damage to IEEE  802 11N WIRELESS OUTDOOR                 Lightning DAMAGE IS NOT COVERED  UNDER WARRNTY    2  Users MUST use the  Power cord  amp  PoE Injector  shipped in the box with the IEEE 802 11N  WIRELESS OUTDOOR CPE  Use of other options will cause damage to the IEEE 802 11N  WIRELESS OUTDOOR CPE    3  Users MUST power off the IEEE 802 11N WIRELESS OUTDOOR CPE first before connecting  the external antenna to it  Do not switch from built in antenna to the external antenna from WEB  management without physically attaching the ext
23. d middle enterprise as well as residential  network   WPA2 PSK  As a new version of WPA  only all the clients support WPA2  can it be available  If it is  selected  the data encryption can only be AES and the passphrase is required   WPA PSK amp WPA2 PSK  It provides options of WPA  TKIP  or WPA2  AES  encryption for the  client  If it is selected  the data encryption can only be TKIP   AES and the passphrase is  required      Data Encryption  If data encryption is enabled  the key is required and only sharing the same key with other  wireless devices can the communication be established   None  Available only when the authentication type is open system   64 bits WEP  It is made up of 10 hexadecimal numbers   128 bits WEP  It is made up of 26 hexadecimal numbers   152 bits WEP  It is made up of 32 hexadecimal numbers   TKIP  Temporal Key Integrity Protocol  which is a kind of dynamic encryption  is co used with  WPA PSK  etc   AES  Advanced Encryption Standard  it is usually co used with WPA2 PSK  WPA  WPA2  etc     TKIP   AES  It allows for backwards compatibility with devices using TKIP                   e We strongly recommend you enable wireless security on your network     Only setting the same Authentication  Data Encryption and Key in the IEEE 802 11N    WIRELESS OUTDOOR CPE and other associated wireless devices  can the    communication be established     Chapter 4 Advanced Settings Page 34    Access Control    The Access Control appoints the authority to wireless cli
24. e License  SCSL    6  the Sun Industry Source License  SISL   and  7  the Apache Software    license   2     Limited Use    Any Public Software provided under the agreement shall be subject to the licenses  terms and    Appendix B  GPL Declamation Page 52    conditions of its model  Licensee hereby agrees to comply with the terms and conditions applicable    to any such Public Software  as set forth in its presentation on website     3  Limited Liability  The supplier hereby express that the supplier shall have no liability for any costs  loss or damages  resulting from Licensee s breach of the terms and conditions applicable to use  conversion or    combination of the licensed software with or into Public Software     4  NO WARRANTY   This program or licensed software is distributed in the hope that it will be useful  but WITHOUT ANY  WARRANTY  THE PROGRAM  AS IS  WITHOUT WARRANTY OF ANY KIND  EITHER EXPRESSED  OR IMPLIED  INCLUDING  BUT NOT LIMITED TO  THE IMPLIED WARRANTIES OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE  THE ENTIRE RISK AS TO    THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH LICENSEE     5  Public Software Name and Description    Table 3 Public Software Name and Description    Program Copy Right Description   Origin Licenses or Distribution   License Terms  Name Sour Code   Models or its special   Website  license terms Reference  Redboot   Copyright      1998    ftp   ftp ge   eCos License http   sources re  1999  2000  2001  2002    s redha
25. e remote server     Site Survey    Logout     Only available under Wireless Client mode  site survey allows you to scan all the APs within coverage     Open    Site Survey        Tools  as below and select the desired AP to connect     Chapter 5 Management    Page 43    Wireless Broadband Access Point              Status System Wireless Management       System Log       Wireless Site Survey    This page provides tool to scan the wireless network  If any Access Point or IBSS is found  you  could choose to connect it manually when client mode is enabled                                Ping Watchdog       MISVOIP   1     00 60 b3 35 92 59   big  68   WEP  O  Trus  11                            bg          NONE  o   sirius   11    0021  003 4  0   big  95 WPA                  10   00 07 40 e8 ae 8e   big  69   NONE         siis   1   0021003530   big  98 WPA       Ping Watch Dog         you mess your connection up and cut off your ability the log in to the unit  the ping watchdog has a    chance to reboot due to loss of connectivity     Wireless Broadband Access Point   769509    Status System Wireless Management       System Log a    Ping Watchdog    Site Survey       This page provides    tool to configure the Ping Watchdog  If the failcount of the Ping reaches to     specified value  the watchdog will reboot the device   Ping Watchdog  gt  gt        Enable Ping Watchdog                                     IP Address to Ping 192 168 1 10   Ping Interval 300 seconds  Startup Dela
26. ent on accessing IEEE 802 11N WIRELESS  OUTDOOR         thus a further security mechanism is provided  This function is available only under  AP mode     Open    Access Control    in  Wireless  as below     Logout    O    Status Wireless Management    Basic Settings     Wireless Access Control  Security Settings     9 If you choose  Allowed Listed   only those clients whose wireless MAC addresses are in the access  2 control list will be able to connect to your Access Point  When  Deny Listed  is selected  these  Advanced Settings wireless clients on the list will not be able to connect the Access Point     Access Control  gt  gt     Access Control Mode  Disable M    WDS Settings MAC Address                          Figure 20 Access Control     Access Control Mode  If you select  Allow Listed   only those clients whose wireless MAC addresses are in the access  control list will be able to connect to your AP  While when  Deny Listed  is selected  those  wireless clients on the list will not be able to connect the AP      MAC Address  Enter the MAC address of the wireless client that you would like to list into the access control list   click    Apply    then it will be added into the table at the bottom      Delete Selected All  Check the box before one or more MAC addresses of wireless client s  that you would like to    cancel  and click  Delete Selected  or    Delete All    to cancel that access control rule     Chapter 4 Advanced Settings Page 35    WDS Settings    Extend 
27. ere doeet gesta amd t dae rettet PR et 8  Figure 6 Connect to PoE Injector           8  Fig  re Z Gomplet   Set rie e ederet e ie ee d de rs a eec 9  Figure 8 Pole Mounting     Step 1                 10  Figure 9 Pole Mounting     Step 2                 10  Figure 10 Pole Mounting     Step 3                   I U eene nnnm 11               11 Move the Rubber        1  etin          e E Coe Deo eee             12  Figure 12  login Page  u rt De I bre D D EE i te y      eed 15  Fig  re 13          Page      i EE        e Np een deitas 16  Figure 14 Basic System Settings    nennt remm nennen 17  Fig  r   15 1P Settings   Bridge   i  c Ee itte b tren e o ESL sede LR E D eR Te PER dg 17  Figure 16 IP Settings  Router  issue 18  Figure  17  RADIUS  Settings          RE eei e ERU ir etia es 20  Figure  18 Time Setlings                          net                      te 20  Figure 19 Source IP Filtering sise 21  Figure 20 Destination IP Filtering sise 22  Figure 21 Source Port Filtering         7   2 uu u aaa rhe        22  Figure 22 Destination Port Filtering ss 23  Figure 23 Port Forwarding uva          Lita Oh eed      ee Ava cus 23  Figure 24 DMZ L iacet diete beetles cde                             Dub cosi addis 24  Figure 25 Basic Wireless Settings sise 26  Fig  re 26 Site               uuu ashe ed dem En PUER e en mt died eee 29  Figure 27 Advanced Wireless Settings nr 30  Figure 28 S  curity  Settinigs       cu es  i vet ER dirette    eee 33    Fig  r   29 Access Contr  le
28. ering Apply Changes Cancel       Src Port Filtering CurrentFilter Table         Dest Port Range Protocol         Port Forwarding       Figure 22 Destination Port Filtering    Port Forwarding  The port forwarding allows you to automatically redirect common network services  to a specific machine behind the NAT firewall  These settings ne are only necessary if you wish to host  some sort of server like a web server or mail server on the private local network behind IEEE 802 11N    WIRELESS OUTDOOR CPE s NAT firewall     Chapter 3 Basic Settings Page 24    Logout  2    Status System Wireless Management       Basic Settings Port Forwarding    IP Settings Bridge  Entries in this table allow you to automatically redirect common network services to a specific  machine behind the NAT firewall  These settings are only necessary if you wish to host some sort  of server like a web server or mail server on the private local network behind your Gateway s   IP Settings Router  NAT firewall        RADIUS Settings         Enable Port Forwarding                                        Time Settings IP Address    Protocol  Both  Firewall Settings  Port Range   Src IP Filtering Comment        Dest IP Filtering        Src Port Filtering    Current Port Forwarding Table   Dest Port Filtering                      7    Figure 23 Port Forwarding  DMZ  A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access  to its local private network  Typically  the DMZ hos
29. ernal antenna onto the IEEE 802 11N  WIRELESS OUTDOOR CPE  otherwise  damage might be caused to the IEEE 802 11N    WIRELESS OUTDOOR CPE itself     Product Package    The product package you have received should contain the following items  If any of them are not    included or damaged  please contact your local vendor for support       IEEE 802 11N WIRELESS OUTDOOR CPE X1      Pole Mounting Ring X1  e Power Cord  amp  PoE Injector x1     Quick Installation Guide X1    Product CD x1    Note       Product CD contains Quick Installation Guide and User Manual     Chapter 2 Hardware Installation Page 5    Pole Mounting Ring       A  Warning        Users MUST use the    Power           amp  PoE Injector    shipped in the box with the IEEE    802 11N WIRELESS OUTDOOR CPE  Use of other options will cause damage to the    IEEE 802 11N WIRELESS OUTDOOR CPE     Chapter 2 Hardware Installation Page 6    Hardware Installation    Connect up    1  The bottom of the IEEE 802 11N WIRELESS OUTDOOR CPE is a movable cover  Grab the    cover and pull it back harder to take it out as the figure shown below            lt            Figure 3 Move the Cover    y gt  2s       e       2  Plug a standard Ethernet cable into the RJ45 port        Figure 4 Cable Connection    Chapter 2 Hardware Installation Page 7    3  Slide the cover back to seal the bottom of the IEEE 802 11N WIRELESS OUTDOOR             r         k     a                 Figure 5 Seal the Bottom    4  Plug the power cord into the DC po
30. f 2346 is  recommended       Beacon Interval  Specify the frequency interval to broadcast packets  Enter a value between 20 and 1024      DTIM Interval  DTIM  which stands for Delivery Traffic Indication Message  is contained in the data packets  It is  for enhancing the wireless transmission efficiency  The default is set to 1  Enter a value between 1  and 255      Preamble Type  It defines some details on the 802 11 physical layer   Long  and  Short  are available      IGMP Snooping  IGMP snooping is the process of listening to IGMP network traffic  By enabling IGMP snooping   the AP will listen to IGMP membership reports  queries and leave messages to identify the ports  that are members of multicast groups  Multicast traffic will only be forwarded to ports identified as  members of the specific multicast group or groups      Wireless Separation  Wireless separation is an ideal way to enhance the security of network transmission  Under the  mode except wirless client mode  enable    Wireless Separation    can prevent the communication  among associated wireless clients      RIFS  RIFS  Reduced Interframe Spacing  is a means of reducing overhead and thereby increasing    network efficiency     Chapter 4 Advanced Settings Page 31      Link Integration  Available under AP Bridge AP repeater mode  it monitors the connection on the Ethernet port by  checking  Enabled   It can inform the associating wireless clients as soon as the disconnection  OCCUIS    e Max  Station Num  Ava
31. from  Status  to check the information of associated wireless    clients  All is read only  Click  Refresh  at the bottom to view the current association list               C    Status Wireless                      Tools       Information    Association List    This table shows the MAC Address IP Address and RSSI for each associated wireless client        Network Flow                IMAC Address 1   Address RSSI Association Time  Bridge Table LS               I            00 60 b3 cd fr 2 192168116  44  2000 2 49 16 59 40  ARP Table  DHCP Client List       Figure 23 Connection    Chapter 6 Status Page 45    View Network Flow Statistics    Open  Network Flow  in  Status  to check the data packets received on and transmitted from the    wireless and Ethernet ports  Click  Refresh  to view current statistics     Logout     Status System Wireless Management Tools       Information  This page shows the packet counters for transmission and reception regarding to wireless and    Connections Ethernet networks                          Network  Elow Bd Poll Interval    5  0 685534  sec  Bridge Table Wireless LAN           Received Transmitted  ARP Table   Unicast Packets   121 0          DHCP Client List   Broadcast Packets 116 2      Multicast Packets 264 0   4    Total Packets 501 2        Total Bytes   50332 170085  Ethernet  Received   Transmitted    Total Packets  468                 Total Bytes 387447 998514    d       Figure 24 Network Flow Statistics    e Poll Interval    Speci
32. fy the refresh time interval in the box beside    Poll Interval  and click    Set Interval  to save    settings   Stop  helps to stop the auto refresh of network flow statistics     View Bridge Table    Open  Bridge Table  in  Status  as below  Click  Refresh  to view current connected status      Chapter 6 Status Page 46    Logout  5    Status Wireless       Management    Information  Bridge Table    This table shows bridge table     Connections    Network Flow                              MAC Address Ageing              Bridge Table    r  00 0c 76 59 86 e2   0 00  ARP Table   00 19 70 20 fa be Bridge              00 60 b3 cd  ff2 LAN   3147  DHCP Client List       Figure 42 Bridge Table    View ARP Table    Open    ARP Table    in    Status    as below  Click    Refresh    to view current table     Logout     Status Wireless       Management    Information ARP Table    Connections       This table shows ARP table        Network Flow                                      IPA dd Lee  Bridge Table                    192 168 1 2 00 60 B3 CD FF F   ARP Table    192 168 0 254 00 00 00 00 00 00 eth0  DHCP Client List  Figure 43 ARP Table  Chapter 6 Status    Page 47    View Active DHCP Client Table    Open  DHCP Client List  in  Status  as below to check the assigned IP address  MAC address and    time expired for each DHCP leased client  Click  Refresh  to view current table     Logout  2    Status Wireless Management       Information       Active DHCP Client Table    This table 
33. gure 19 Security Settings   e Network Authentication  Open System  It allows any device to join the network without performing any security check   Shared Key  Data encryption and key are required for wireless authentication   Legacy 802 1x  As an IEEE standard for port based Network Access Control  it provides the  rights to access the wireless network and wired Ethernet  With User and PC identity  centralized  authentication as well as dynamic key management  it controls the security risk of wireless  network to the lowest  To serve the 802 1x  at least one EAP type should be supported by the  RADIUS Server  AP and wireless client   WPA with RADIUS  With warrant  username  password and etc   offered by user  this kind of  authentication can be realized with specific RADIUS server  This is the common way to be    adopted in large enterprise network     Chapter 4 Advanced Settings Page 33    WPA2 with RADIUS  As a new version of WPA  only all the clients support WPA2  can it be  available  If it is selected  AES encryption and RADIUS server is required   WPA amp WPA2 with RADIUS  It provides options of WPA  TKIP  or WPA2  AES  for the client  If it is  selected  the data encryption type must be TKIP   AES and the RADIUS server must be set   WPA PSK  It is a simplified WPA mode with no need for specific authentication server  In this  so called WPA Pre Shared Key  all you have to do is just pre enter a key in each WLAN node and  this is the common way to be adopted in large an
34. ilable only under AP mode  it defines the maximum amount of wireless clients allowed to be  connected      Space      Meter ACK Timeout  To decrease the chances of data retransmission at long distance  the IEEE 802 11N WIRELESS  OUTDOOR CPE can automatically adjust proper ACK timeout value by specifying distance of the  two nodes      Flow Control  It allows the administrator to specify the incoming and outgoing traffic limit by checking    Enable    Traffic Shaping     This is only available in Router mode   a  Note       We strongly recommend you leave most advanced settings at their defaults except   Distance in Meters  adjusted the parameter for real distance  any modification on them    may negatively impact the performance of your wireless network     Chapter 4 Advanced Settings Page 32    Wireless Security Settings    To prevent unauthorized radios from accessing data transmitting over the connectivity  the IEEE    802 11N WIRELESS OUTDOOR CPE provides you with rock solid security settings     Security Settings    Open  Security Settings  in  Wireless  as below     TS                     Status System Wireless Management    Basic Settings   x  Security Settings  Custom WLAN s security profile settings     Advanced Settings  Network Authentication  Open System v   Access Control        Data Encryption    None v   WDS Settings Key Type   Default Tx Key        WEP Passphrase           Encryption Key 1   Encryption Key 2   Encryption Key 3        Encryption Key 4        Fi
35. n      HT protect O Enabled  9 Disabled  Channel Number   e        Wireless _      Antenna     Internal  8 dBi     External  N Type   Output Power   Full      Data Rate  Auto       Channel mode  20MHZ       Extension channel protection  mo de           None             Figure 16 Basic Wireless Settings     Disable Wireless LAN Interface  Check this option to disable WLAN interface  then the wireless module of IEEE 802 11N  WIRELESS OUTDOOR CPE will stop working and no wireless device can connect to it      Wireless Mode  Four operating modes are available on IEEE 802 11N WIRELESS OUTDOOR CPE   Wireless Client  The IEEE 802 11N WIRELESS OUTDOOR CPE is able to connect to the AP  and thus join the wireless network around it   AP  The IEEE 802 11N WIRELESS OUTDOOR CPE establishes a wireless coverage and  receives connectivity from other wireless devices   Bridge  The IEEE 802 11N WIRELESS OUTDOOR CPE establishes wireless connectivity with  other APs by keying in remote MAC address  Please refer to the  WDS Setting  for detailed  configuration   AP Repeater  The IEEE 802 11N WIRELESS OUTDOOR CPE servers as AP and Bridge  concurrently  In other words  the IEEE 802 11N WIRELESS OUTDOOR CPE can provide  connectivity services for CPEs under WDS mode       Wireless Network Name  SSID   Chapter 3 Basic Settings Page 26    This wireless network name is shared among all associated devices in your wireless network   Keep it identical on all those devices  Note that the SSID is case sensiti
36. on       Password Settings MEnable SNMPv3Admin    Firmware Upload User Name   SNMPv3Admin       Password  00           Configuration File Confirm Password  0000000    Access Type   Read Write      Authentication Protocol  MDS             Privacy Protocol  None v      MEnable SNMPv3User    User Name   SNMPv3User         Password                        Confirm Password  eee          Access Type   Read Only  M    Authentication Protocol  MDS M              Figure 32 Configure SNMPv3 User Profile    User           Specify a user name for the SNMPv3 administrator or user  Only the SNMP commands carrying this  user name are allowed to access the IEEE 802 11   WIRELESS OUTDOOR CPE     Password    Specify a password for the SNMPv3 administrator or user  Only the SNMP commands carrying this    Chapter 5 Management Page 38    password are allowed to access the IEEE 802 11N WIRELESS OUTDOOR             Confirm Password  Input that password again to make sure it is your desired one     Access Type  Select  Read Only  or  Read and Write  accordingly     Authentication Protocol  Select an authentication algorithm  SHA authentication is stronger than MD5 but is slower      Privacy Protocol  Specify the encryption method for SNMP communication  None and DES are available   None  No encryption is applied     DES  Data Encryption Standard  it applies a 58 bit key to each 64 bit block of data     Password    From    Password Settings    in    Management     you can change the password to manage
37. outer Mode  For details  please refer to    IP Settings  Router       Device Name  Specify the device name  which is composed of no more than 15 characters with   0 9       2       2  or       Country Region  The availability of some specific channels and or operational frequency bands  is country dependent     amp  IP Settings  Bridge   This is available only under Bridge network mode  Open    IP Settings                   in  System  as  below to configure the parameters for LAN which connects to the LAN port of IEEE 802 11N  WIRELESS OUTDOOR CPE  In this page  users may change the settings for IP Address  Subnet    Mask  and DHCP Server     Chapter 3 Basic Settings Page 17         n    _ L               o    Status System Wireless Management    Basic Settings    Bridge IP Settings    Use this page to configure the parameters for local area network which connects to the LAN port  of your Access Point  Here you may change the setting for IP address  subnet mask  DHCP   IP Settings Router     RADIUS Settings IP Address Assignment    Time Settings    Obtain IP Address Automatically     Use Fixed IP Address  Firewall Settings IP Address   192 168 1 1           Subnet Mask   255 255 255 0  Gateway Ip Address    0 0 0 0           DNS 1 0 0 0 0    DNS 2  0 0 0 0       Spanning Tree     Enabled    Disabled       Figure 15 IP Settings  Bridge   Obtain IP Address Automatically  If    DHCP server exists in your network  you can check this  option  thus the IEEE 802 11N WIRELESS OUTDOO
38. r eee bees evn re ant ni odes PAU o e eee 35    Fig  re 30 WDS Settings      aeos             o pear ep                                              Tee      34    Figure 31 SNMP Management                         35  Figure 32 Configure SNMPv3 User Profile    36  Figure  39  PaSSWO G        ics gp ib HERE NECI Een        te tue Per a        37  Figure  34 Upgrade Firmware   gt     u uu u Eee cR HERE ERE RR               bh      38  Figure 35 Backup Retrieve Settings ss 39  Figure 36 Restore Settings                 edat                    41  Figure 39 Basic Information u uuu tet tere Rr                Ye een A 45  Figure 40 Connection  uuu un dete eR eder Pa aia e dat epe b a e us 45  Figure 41 Network Flow Statistics    ss 46  Fig  re 42 Bridge Table          toscano n b e DH E rte ER          Ebr nets ua Uus 44  Fig  re 43 ARP Table           ie etd anodes Petra nent hier 44  Figure 44 Active DHCP Client Table sise 45    Fig  re 45                      do eed          ee        dean 49                  Table 1 IEEE 802 11N WIRELESS OUTDOOR       Table 2 ACSI   rs dettes    Table 3 Public Software Name and Description    CPE Factory Default Settings                                       Chapter 1 Introduction    Introduction    Designed for outdoor environment application  the IEEE 802 11N WIRELESS OUTDOOR CPE is a  high performance last mile broadband solution that provides reliable wireless network coverage  As an  IEEE 802 11b g compliant wireless device  the IEEE 802 1
39. rt Filtering       Dest Port Filtering    Port Forwarding       Figure 19 Source IP Filtering    Destination IP Filtering  The destination IP filtering gives you the ability to restrict the computers in  LAN from accessing certain websites in WAN according to specified IP addresses  Check the     Enable Source IP Filtering    checkbox and enter the IP address of the clients to be restricted  Hit    Apply to make the setting take effect     Chapter 3 Basic Settings Page 22       Logout o    Status System Wireless Management    Basic Settings    Destination IP Filtering    Entries in this table are used to restrict the computers in LAN from accessing certain websites in  WAN according to IP address     IP Settings Bridge     IP Settings Router     RADIUS Settings Enable Destination IP Filtering  Destination IP Address               Time Settings       Comment           Firewall Settings  Src IP Filtering    Dest IP Filtering  gt  gt  Current Filter Table        Src Port Filtering  Dest Port Filtering    Port Forwarding       Figure 20 Destination IP Filtering    Source Port Filtering  The source port filtering enable you to restrict certain ports of data packets  from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE  Use of such    filters can be helpful in securing or restricting your local network     Logout 0     Status System Wireless Management       Basic Settings       Source Port Filtering    Entries in this table are used to restrict certain por
40. rt of the PoE injector as the following right picture shows     Pua  Jaan    D  8     a  3       Figure 6 Connect to                            Chapter 2 Hardware Installation Page 8    5  Plug the other side of the Ethernet cable as shown      Step 3 into the PoE port of the PoE injector    and get the complete set ready     WIRELESS  CPE       Figure 7 Complete Set    Chapter 2 Hardware Installation Page 9    Pole Mounting    1  Turn the IEEE 802 11N WIRELESS OUTDOOR CPE over  Put the pole mounting ring through  the middle hole of it  Note that you should unlock the pole mounting ring with a screw driver  before putting it through IEEE 802 11N WIRELESS OUTDOOR CPE as the following right    picture shows        Figure 8 Pole Mounting   Step 1    2  Mount IEEE 802 11N WIRELESS OUTDOOR CPE steadily to the pole by locking the pole    mounting ring tightly        Figure 9 Pole Mounting   Step 2    Chapter 2 Hardware Installation Page 10    3  Now you have completed the hardware installation of IEEE 802 11N WIRELESS OUTDOOR    CPE        Figure 10 Pole Mounting     Step 3    Chapter 2 Hardware Installation Page 11    Using the External Antenna    If you prefer to use the external antenna with N type connector for your application instead of the  built in directional antenna  please follow the steps below   1  Grab the black rubber on the top of IEEE 802 11N WIRELESS OUTDOOR CPE  and slightly pull    it up  The metal N type connector will appear        Figure 11 Move the Rubber   
41. shows the assigned IP address  MAC address and time expired for each DHCP leased  client     Connections       Network Flow                   Bridge Table   IPAddess   MAC Address   Time Expired s       192168116   00 60 b3 cd ff f2   431995    ARP Table  DHCP Client List       Figure 44 DHCP Client Table    Chapter 6 Status Page 48    Chapter 7 Troubleshooting    This chapter provides troubleshooting procedures for basic problems with the IEEE 802 11N  WIRELESS OUTDOOR CPE  For warranty assistance  contact your service provider or distributor for    the process   Q 1  How to know the MAC address of IEEE 802 11N WIRELESS OUTDOOR CPE     MAC Address distinguishes itself by the unique identity among network devices  There are two   ways available to know it    e Each device has a label posted with the MAC address  Please refer below   MAC 0060B3 XXXXXX    Bar code       XXXXXXXXXXXXXXX    Figure 25 MAC Address  e On the IEEE 802 11N WIRELESS OUTDOOR CPE Web based management interface  you    can view the MAC Address from  View IEEE 802 11N WIRELESS OUTDOOR CPE Basic    Information    Q 2  What if    would like to reset the unit to default settings   You may restore factory default settings in  Configuration File  from    Management      Q 3  What if    would like to backup and retrieve my configuration settings     You may do the backup by generating a configuration file or retrieve the settings you have backed    up previously in  Configuration File  from    Management      Q 
42. sion power  The higher the output power is  the wider the signal can    cover  but the power consumption will be greater accordingly  Usually    Full    is preferred     Chapter 3 Basic Settings Page 27      Data Rate  Usually    Auto    is preferred  Under this rate  the IEEE 802 11N WIRELESS OUTDOOR CPE will  automatically select the highest available rate to transmit  In some cases  however  like where  there is no great demand for speed  you can have a relatively low transmit rate for compromise of  a long distance       Channel Mode  Four levels are available  5MHz  10MHz  20MHz and 40MHz  The last one can enhance data  throughput  but it takes more bandwidth  thus it might cause potential interference      Extension Channel Protection Mode  This is to avoid conflict with other wireless network and boost the ability of your device to catch all  802 11g transmissions  However  it may decrease wireless network performance  Compared to  CTS Self  the transmission amount of CTS RTS is much lower      Enable MAC Clone  Available only under wireless client mode  it hides the MAC address of the AP while displays the    one of associated wireless client or the MAC address designated manually     Site Survey    Under wireless client mode  the IEEE 802 11N WIRELESS OUTDOOR CPE is able to perform site  survey  through which  information on the available access points will be detected    Open  Basic Settings  in  Wireless   by clicking the  Site Survey  button beside  Wireless Mode 
43. t      2  minis sine gt Sn nn ee het A nn 37  Configure SNMPv3 User Profile                                              ss 38  PASSWOIG    kaa aha kam a de sr a kaa ee ras err A ta Andenne den 39  LDJporade Firirlwarez  os u a d te On Pen tto E i Sees 40  Backup  Retrieve Settings    sise 40  Restore Factory Default Settings sise 41                      eh aeu                    42  System         cerne e rii eek    Eee Pa nat       vui dur 42  IESU                                                 ur ete 43  Ping  Watch  Dog pcc 44  Chapter 6 Status fm 45  View IEEE 802 11N WIRELESS OUTDOOR CPE Basic                                                                    45  View  Association Elst 423 uirtute E RUD i eL E Hefe oti ste Dre en ete ua  45  View Network Flow Statistics    nennen nennen nennen nennen nennen 46  Miew Bridge Table         ni tado et pene uri end 46  View  ARP Table ua cie a e e e Ere ege me ER ub ee dote do eee ede edge diet ane 47  View Active DHCP Client Table its 48  Chapter 7       0                   2 2    nicer                    sc ob      49  AppendbcA  ASCII              eire      51    Appendix B  GPL Declamation                    52    FIGURE    Figure 1 IEEE 802 11N WIRELESS OUTDOOR CPE    inner 2  Fig  re 2 Typical Application  e        lente tee d          pee tp 3               3 Move the GOV6F      iit b e e Fe era EE ERRARE    aed tiene 7  Fig  re 4 Cable Connectlon sic  erem ede e Dep a eed ded A cease 7  Figuire 5 Seal the Bottom ae 
44. t c dhat com ecos e  2003 Red Hat  Inc  om private cos license                   5  cale 03042  2 redboot i  ntel xscale   030630 tar  2  http   www   GNU GENERAL PUBLIC   http   www gnu o   busybox    LICENSE Version 2 rg licenses old li  net downl censes gpl 2 0 ht  oads busy ml  box 1 01 ta  r bz2       Copyright      2000   http   nchc   GNU GENERAL PUBLIC   http   www gnu o    Appendix B  GPL Declamation Page 53    dropbear    hostapd    wpa sup    plicant    mtdutil    ntpclient    procps    Lennert Buytenhek    Copyright  c   2002 2006 Matt  Johnston   Portions copyright  c   2004 Mihnea  Stoenescu   Copyright  c   2002 2006   Malinen    Jouni     lt jkmaline cc hut fi gt   and   contributors   Copyright  c   2003 2005  Jouni  Malinen   lt jkmaline cc hut fi gt   and   contributors    Copyright 1997  1999     2000   Doolittle    2003 Larry    Author  Albert Cahalan   Michael  Jim Warner  etc     K  Johnson        Appendix B  GPL Declamation     dl sourcef    orge net s  ourceforg  e bridge br  idge utils     1 0 6 tar gz    http   matt   ucc asn au   dropbear   dropbear   0 51 tar bz  2    http   host    ap epitest   fi releases   hostapd 0   4 8 tar gz    http   host    ap epitest   fi releases   wpa suppl  icant 0 4 7   tar gz    ftp   ftp uk     linux org p  ub people   dwmw2 mt  d cvs mtd   util     http   dooli    ttle icarus   com ntpcli  ent ntpclie  nt 2003 1  94 tar gz    http   proc    ps sourcef  orge net p  rocps 3 2    7 tar gz    LICENSE Version 2    GNU 
45. t contains devices accessible to the Internet traffic     such as Web  HTTP  servers  FTP servers  SMTP  e mail  servers and DNS servers     Logout  2    Status System Wireless Management Tools       Basic Settings    DMZ    A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access     to its local private network  Typically  the DMZ host contains devices accessible to Internet traffic   IP Settings Router  such as Web  HTTP   servers  FTP servers  8        e mail  servers        DNS servers     IP Settings Bridge        RADIUS Settings     Enable DMZ       DMZ Host IP Address   oo            Time Settings       Firewall Settings          g    Src IP Filtering       Dest IP Filtering    Src Port Filtering    Dest Port Filtering       Port Forwarding       Figure 24 DMZ    Chapter 3 Basic Settings Page 25    Basic Wireless Settings    Open    Basic Settings  in  Wireless  as below to make basic wireless configuration     Logout  2    Status System Wireless Management    Basic Settings  gt  gt     Wireless Basic Settings    Use this page to configure the parameters for wireless LAN clients which may connect to your  Access Point  Here you may change wireless mode as well as wireless network parameters     Security Settings  Advanced Settings    Access Control      Disable Wireless LAN Interface  W  ssem Wireless Mode   AP MI  ettings       3 Wireless Network Name   SSID      Broadcast SSID   9 Enabled    Disabled  802 11 Mode   802 11b g 
46. te with RADIUS through IP Address  Port         Shared Secret   IP Address  Enter the IP address of the Radius Server     Port  Enter the port number of the Radius Server     Chapter 3 Basic Settings Page 20    Shared Secret  This secret  which is composed of no more than 31 characters  is shared by the  IEEE 802 11N WIRELESS OUTDOOR CPE and RADIUS during authentication   Re authentication Time  Set the time interval between two authentications    Global Key Update  Check this option and specify the time interval between two global key    updates     Time Settings    Compliant with NTP  the IEEE 802 11N WIRELESS OUTDOOR CPE is capable of keeping its time in  complete accord with the Internet time  Make configuration in  Time Settings  from  System   To use  this feature  check  Enable NTP Client Update  in advance     Logout     Status Wireless Management       Basic Settings    Time Settings    IP Settings Bridge                You can synchronize System Log s time stamp with a public time server over the Internet        IpisetingBousg Current Time        2000 monfi Joay  Hrfo     wn z4  sec ss            RADIUS Settings Time Zone Select     GMT Greenwich Mean Time  Dublin  Edinburgh  Lisbon  London                     Enable        client update    93  gt  NTP server     Firewall Settings Manual IP   poco      Figure 18 Time Settings     Current Time  Display the present time in Yr  Mon  Day  Hr  Min and Sec A    Time Zone Select  Select the time zone from the dropdown list
47. ter  g   R  0 100000m     ACK Timeout   100    100 767 microsecond        Figure 18 Advanced Wireless Settings            Support  WMM  Wi Fi Multimedia  is a subset of 802 11e  It allows wireless communication to define a  priority limit on the basis of data type under AP mode only  thus those time sensitive data  like  video audio data  may own a higher priority than common one  To enable WMM  the wireless  client should also support it      A MPDU A MSDU Aggregation  The data rate of your AP except wireless client mode could be enhanced greatly with this option  enabled  however  if your wireless clients don t support A MPDU A MSDU aggregation  it is not  recommended to enable it      Short GI    Under 802 11n mode  enable it to obtain better data rate if there is no negative compatibility issue     Chapter 4 Advanced Settings Page 30      RTS Threshold  The          802 11N WIRELESS OUTDOOR CPE sends RTS  Request to Send  frames to certain  receiving station and negotiates the sending of a data frame  After receiving an RTS  that STA  responds with a CTS  Clear to Send  frame to acknowledge the right to start transmission  The  setting range is 0 to 2346 in byte  Setting it too low may result in poor network performance   Leave it at its default of 2346 is recommended      Fragmentation Length  Specify the maximum size in byte for a packet before data is fragmented into multiple packets   Setting it too low may result in poor network performance  Leave it at its default o
48. the range of your network without having to use cables to link the Access Points by using the  Wireless Distribution System  WDS   Simply put  you can link the Access Points wirelessly  Open       WDS Settings  in  Wireless  as below     Logout       Status Wireless Management    Basic Settings      WDS Settings    Wireless Distribution System uses wireless media to communicate with other APs  like the  Ethernet does  To do this  you must set these APs in the same channel and set MAC addresses of  Advanced Settings other APs which you want to communicate with in the table and then enable the WDS This function     can work only in Bridge and AP Repeater mode     Security Settings    Access Control  Local MAC Address   Remote AP MAC Address1   Remote AP MAC Address2   Remote AP MAC Address3   Remote      MAC Address4              Figure 30 WDS Settings  Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and    click  Apply  to save settings                         WDS Settings is available only under Bridge and AP Repeater Mode     Chapter 4 Advanced Settings Page 36    Chapter 5 Management    SNMP Management    The IEEE 802 11N WIRELESS OUTDOOR CPE supports SNMP for convenient remote management   Open  SNMP Configuration  in  Management  shown below  Set the SNMP parameters and obtain  MIB file before remote management     Logout  5    Status Wireless Management Tools    SNMP Configuration    Password Settings 3 N  Use this page to
49. to the Internet  Here you may change the  IP Settings Bridge  access method to Static IP  DHCP  PPPOE     WAN Settings     RADIUS Settings WAN Access Type  Static IP       Time Settings IP Address    192 168 0 99 ccm           Subnet Mask    255 255 255 0      Firewall Settings      Default Gateway    192 168 0 254    DNS 1   0 0 0 0       DNS 2   0 0 0 0    LAN Settings     IP Address    192 168 1 1  Subnet Mask   255 255 255 0 J  DHCP Server   Disabled v            Figure 16 IP Settings  Router   WAN Settings  Specify the Internet access method to Static IP  DHCP or PPPOE  Users must  enter WAN IP Address  Subnet Mask  Gateway settings provided by your ISPs   LAN Settings  When DHCP Server is disabled  users can specify IP address and subnet mask  for IEEE 802 11N WIRELESS OUTDOOR CPE manually  Make sure the specified IP address is  unique on your network in order to prevent IP conflict  When DHCP Server is enabled  users may  specify DHCP IP Address Range  DHCP Subnet Mask  DHCP Gateway and Lease Time     15 44640 minutes      A  Warning        In AP mode  IEEE 802 11N WIRELESS OUTDOOR CPE must establish connection  with another wireless device before it is set to Router mode  In Router mode  it is  impossible for users to access device via wired port  for WAN is on wired port and LAN  is on wireless port  Users can access device through the wireless device connected  with IEEE 802 11N WIRELESS OUTDOOR CPE    e In CPE mode  users can access IEEE 802 11N WIRELESS OUTDOOR CP
50. ts of data packets from your local network to  Internet through the Gateway  Use of such filters can be helpful in securing or restricting your  IP Settings Router  local network     IP Settings Bridge     RADIUS Settings        Enable Source Port Filtering    Time Settings Port Range                                      Protocol   Both  Firewall Settings  Comment   Src IP Filtering  Dest IP Filtering Dp g  Src Port Filtering  gt  gt  Current Filter Table    T Rd   SourcePortRange   Protocol     select Eat  Dest Port Filtering  Port Forwarding Delete Selected Delete A    DM7       Figure 21 Source Port Filtering    Chapter 3 Basic Settings Page 23    Destination Port Filtering  The destination port filtering enables you to restrict certain ports of data  packets from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE  Use    of such filters can be helpful in securing or restricting your local network     Logout     Status   System   Wireless                      Tools    Basic Settings             Destination Port Filtering  Entries in this table are used to restrict certain ports of data packets from your local network to    Internet through the Gateway  Use of such filters can be helpful in securing or restricting your  IP Settings Router  local network     IP Settings Bridge     RADIUS Settings      Enable Destination PortFiltering    Time Settings Port Range   E    Protocol   Bot    Comment     Firewall Settings       Src IP Filtering    Dest IP Filt
51. ve and can not exceed  32 characters      Broadcast SSID  Under AP mode  hiding network name is necessary when you are in a wireless environment that  may have potential risk  By disabling broadcast SSID  the STA can not scan and find IEEE  802 11N WIRELESS OUTDOOR CPE  so that malicious attack by some illegal STA could be  avoided      802 11 Mode  The IEEE 802 11N WIRELESS OUTDOOR CPE can communicate with wireless devices of  802 11b g or 802 11b g n  You can also select Auto and make it work under an appropriate  wireless mode automatically      HT Protect  Enable HT  High Throughput  protect to ensure HT transmission with MAC mechanism  Under  802 11n mode  wireless client can be divided into HT STA and Non HT STA  among which the one  with HT protect enabled gets higher throughput       Channel Number  Channel varies much as the available band differs from country to country  Select a proper  operating channel in the drop down list according to your situation    e Antenna  By default  IEEE 802 11N WIRELESS OUTDOOR CPE uses its built in antenna for directional  transmission  however  if you prefer to use an external antenna for your case dependent    applications  you can switch from    Internal  8 dBi     to External  N Type                         You are able to choose  External  N Type     only when you have well done installing the  external antenna  otherwise  it might damage IEEE 802 11N WIRELESS OUTDOOR    CPE itself       Output Power  Specify the signal transmis
52. y 100 seconds  Failure Count To Reboot 300   rz      Ping Watchdog  Enable Ping Watchdog  To activate ping watchdog  check this checkbox   IP Address to Ping  Specify the IP address of the remote unit to ping   Ping Interval  Specify the interval time to ping the remote unit   Startup Delay  Specify the startup delay time to prevent reboot before the IEEE 802 11N  WIRELESS OUTDOOR CPE is fully initialized   Failure Count To Reboot  If the ping timeout packets reached the value  the IEEE 802 11N    WIRELESS OUTDOOR CPE will reboot automatically   Chapter 6 Status Page 44    Chapter 6 Status    View IEEE 802 11N WIRELESS OUTDOOR CPE  Basic Information    Open  Information  in  Status  to check the basic information of IEEE 802 11N WIRELESS OUTDOOR    CPE  which is read only  Click  Refresh  at the bottom to have the real time information        Logout o    Management    system  Wireless    Information    This page shows the current status and some basic settings of the device     Connections       Network Flow   System Information  Bridge Table  Model Name  ARP Table Device Name ap20fabc  w        Address 00 19 70 20fa bc   DHCP Client List Country Region United States   Firmware Version 2 0 1    LAN Settings    IP Address 192 168 1 1  Subnet Mask 255 255 255 0  Gateway IP Address 0 0 0 0   MAC Address 00 19 70 20 fa bc    Wireless Settings    Operation Mode    Wireless Mode       Figure 22 Basic Information    View Association List    Open  Association List    in  Connection  
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
c a rre llo  Yamaha 2006 Royal Star Tour Deluxe Owner's Manual  Cameras IR TIR Gamme bâtiment    Elipar FreeLight Curing Light  BBDB User Manual    JVC AV-20NX3 User's Manual  Alpin Z 300 - Lehner Lifttechnik    Copyright © All rights reserved. 
   Failed to retrieve file