Home

LevelOne WAB-7400 WLAN access point

image

Contents

1. voice applications by prioritizing data traffic Bandwidth control Enables operators to specify the maximum line bandwidth that a particular transfer operation can use Support SNMP v1 v2c v3 Allow users to operate with existing network management tools Centralized management software Easy to manage volume Mesh AP via central control system to save the management cost 1 2 Package Contents Open the package carefully and make sure that none of the items listed below are missing Do not discard the packing materials in case of return the unit must be shipped in its original package VV VV WAB 7400 Dual Radio PoE Mesh Access Point PoI 2000 Power over Ethernet Injector CD manual Utility Mounting kit 1 3 Safety Guidelines In order to reduce the risk of fire electric shock and injury please adhere to the following safety guidelines gt Carefully follow the instructions in this manual also follow all instruction labels on this device Except for the power adapter supplied this device should not be connected to any other adapters Do not spill liquid of any kind on this device Do not place the unit on an unstable stand or table This unit may drop and become damaged Do not place any heavy objects on top of this unit Do not use liquid cleaners or aerosol cleaners Use a soft dry cloth for cleaning 1 4 WAB 7400 Description j i A 1 WLAN 2 connector i 2 WLAN 1 connector 3 Ethernet 10 1
2. random back off wait time is determined a Data type Integer in the range of 0 to 255 e CWMAX Maximum contention window Maximum Contention Window The value specified here in the Maximum Contention Window is the upper limit in milliseconds for the doubling of the random backoff value a Data type Integer in the range of 0 to 255 e AIFS The Arbitration Inter Frame Spacing Number specifies a wait time in milliseconds for data frames a Data type Integer in the range of 0 to 255 45 aj TX OP LIMIT Transmission Opportunity is an interval of time when a WME AP station has the right to initiate transmissions onto the wireless medium WM This value specifies in milliseconds the Transmission Opportunity TXOP that is the interval of time when the WMM AP station as the right to initiate transmissions on the wireless network Data type Integer in the range of 0 to 65535 ACM Enable or disable Admission Control NO ACK POLICY Enable or disable No acknowledgement Best Effort AP side low priority high throughput Bulk data that requires maximum throughput and is not time sensitive is sent to this queue Best Effort BSS Station side low priority high throughput Bulk data that requires maximum throughput and 1s not time sensitive is sent to this queue Background AP side medium priority medium throughput and delay Most traditional IP data 1s sent to this queue Background BSS Station side medium pr
3. 3600 TCP Finished Wait Timeout 120 TCP Last ACK Timeout 30 TCP SYN Recerve Timeout TCP SYN Sent Timeout 120 TCP Time Wait Timeout 120 UDP Timeout oS La i co UDP Stream Timeout Wireless Radio 1 distance m 400 Country Outdoor Mode External Channel Mode Disable Save changes Figure 4 2 1 Advance configuration page Advance configuration has the following parameters e Maximum Session maximum connection tracking session a higher value is desired to support large number of local users e Generic Timeout generic timeout for a connection tracking instance e ICMP Timeout ICMP timeout e TCP Close Timeout TCP close timeout e TCP Close Wait Timeout TCP close wait timeout e TCP Established Timeout TCP established timeout 22 e TCP Finished Wait Timeout TCP finished wait timeout e TCP Last Ack Timeout Last acknowledgement timeout e TCPSYN Receive Timeout TCP SYN receive timeout e TCPSYN Sent Timeout TCP SYN sent timeout e TCP Time Wait Timeout TCP Time wait timeout e UDP Timeout UDP timeout e UDP Stream Timeout UDP stream timeout e Radio 1 distance Desired operating distance for radio 1 usually refer to mesh radio e Radio 2 distance Desired operating distance for radio 2 usually refer to client access radio e Regulatory Domain Display the regulatory domain of the wireless interface e Country List of supported country available from the wireless interface
4. 255 Max packet size 1400 600 1400 DHCRELAY List Server Interface Extra Comment Active Configure Interface atho Enabled New Entry Figure 7 1 1 DHCP Relay Settings DHCP Relay contains the following parameters Active Enable or disable DHCP Relay feature Port Port to listen for DHCP packet Default value is 67 Hop count Number of hop the DHCP discover packet can travel before it is dropped by this device Default value 1s 10 Max packet size Maximum packet size of the DHCP discover packet Normally specify a large number of packet size is recommended Default value is 1400 Apply button to save any changes made Please reboot to enable new settings Modify button to edit current selection Remove button to delete current selection New Entry button to add server IP or Interface 40 Figure 7 1 2 illustrates to add or edit configuration page Type Interface Interface Name Comments Active Figure 7 1 2 Server or Interface configuration page The add or edit configuration page contains the following parameters e Type Server IP or interface list e Interface Name Once the type drop down menu is changed to interface interface name selection drop down menu will appear for the users to make selection on the interface where the DHCP server can be reach The interface also must include the interface where the client can be reach e IP Specify the IP addres
5. e Outdoor Mode Enable or disable use of outdoor mode on the wireless interface e External Channel Mode Enable or disable use of external channel mode of the wireless interface e Save Changes button to save any changes made New settings are active after reboot 3 1 3 System gt Restart amp Backup Under this configuration menu you can perform the following action Backup configuration settings Figure 4 3 1 Advance configuration page e Backup Click on the Backup button to begin e Save the file on your local disk by using the Save or Save to Disk button in the dialog box 23 File Download Do you want to open or save this file Mame config chg Type Microsoft Office Outlook Configuration File From 172 20 215 1 Always ask before opening this type of file harm your computer IF you do not trust the source do not open or C While files from the Internet can be useful some files can potentially save this file What s the risk Figure 4 3 2 Advance configuration page Restore Factory Settings Figure 4 3 3 Advance configuration page e Click on the Reset link on the navigation drop down menu This option allows you to restore the device back to the factory default settings Click on the Default button Restore configuration Select a configuration file to restore config cfg Figure 4 3 4 Advance configuration page e Click on the Restore link on the navigation drop down
6. 0 224 0 0 0 0 0 0 0 240 0 0 0 U 0 0 0 Figure 11 3 1 Route page Route page contains the following parameters e Route button to display output of route command e Qutput text area display result of the route command 61 Iface vlanO atho lo ixpO 3 8 4 Tools gt TFTP Figure 11 4 1 illustrates the TFTP page Use TFTP to get or put file to a remote TFTP server Setting of firmware will result in firmware upgrade follow by system reboot Setting of config will result in configuration upgrade TFTF to Operation put v File Name Type of File config v Figure 11 4 1 TFTP page TFTP contains the following parameters TFTP to Enter the destination IP address of remote TFTP server Operation Select put get or get and reboot file to remote TFTP server File Name Enter the File Name to put or get Type of File Select config firmware Ipsec x509 local Ipsec x509 remote or Ipsec rsa file Execute button to perform directed action 62 3 9 Status 3 9 1 Status gt System Click on the Status link on the navigation drop down menu This option displays the system uptime CPU speed free RAM and firmware version Figure 12 1 1 illustrates the system status page System Uptime 0 days 23 hrs 9 minutes CPU Speed O27 oo Average CPU usage 18 39 Yo Since boot Average CPU usage 25 93 Vo Last two seconds Free RAM 46878
7. 255 Mask 255 0 0 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 0 errors 0 dropped 0 overruns 0 frame 0 TX packets 3209 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 0 RX bytes 0 0 0 B TX bytes 211914 206 9 KiB athi Link encap Ethernet HWaddr 00 02 6F 49 45 32 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 70222 errors 0 dropped 0 overruns 0 frame 0 TX packets 3913 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 0 RX bytes 1266675 1 2 MiB TX bytes 3465761 3 3 MiB ixpO Link encap Ethernet HWaddr 00 22 33 00 08 77 UP BROADCAST MULTICAST MTU 1500 Metric 1 RX packets 0 errors 0 dropped 0 overruns 0 frame 0 TX packets 219 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 256 RX bytes 0 0 0 B TX bytes 129210 126 1 KiB ixpl Link encap Ethernet HWaddr 00 22 33 00 08 78 UP BROADCAST MULTICAST NTU 1500 Metric 1 Figure 11 2 1 Ifconfig page Ifconfig page contains the following parameters e TIfconfig button to call ifconfig command e QOutput text area to display the output of the command 3 8 3 Tools gt Route lt Route page is used to collect information about device s routing table Figure 11 3 1 illustrates the route page Output Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use a ATA D Aa 5 0 0 0 0 0 Fala Raley Paha U 0 0 0 LO 707850 G305030 255 0 0 0 U 0 0 0 T2740 5050 0 0 0 0 259000 U 0 0
8. 7 2 1 illustrates the Linux kernel watchdog configuration page Active Enable Interval save changes Figure 7 2 1 System watchdog configuration page Linux kernel watchdog configuration page contains the following parameters e Active Enable or disable this service e Interval Specify the interval watchdog will pool for system status e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 4 3 Services gt SSHD SSHD provides remote management using command line interface CLI Figure 7 3 1 illustrates the SSHD configuration page Active Enable save changes Figure 7 3 1 SSHD configuration page 42 SSHD configuration page contains the following parameters e Active Enable or disable this service e Port Specify the TCP IP port that the SSHD will listen for incoming connection e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 43 3 5 QoS 3 5 1 QoS gt WMM Wireless Multimedia Extensions WME also known as Wi Fi Multimedia WMM is a Wi Fi Alliance interpretability certification based on the IEEE 802 11e draft standard It provides basic Quality of service QoS features to IEEE 802 11 networks WMM prioritizes traffic according to 4 AC Access Categories however it does not provide guaranteed throughput It is suitable for simple applications th
9. Supports security Authentication is performed to ensure that rights are being protected Access Anytime Anywhere Network access is assured at all times and from all locations No missed E mails and increase productivity due to constant connectivity Emergencies Rapidly deployable and robust communications between each member when emergencies are involved in difficult operations inside buildings towers or surrounded in forest fires Military Usage Soldiers in a battlefield are exchanging information about their position and giving and receiving orders or the instructions Metropolitan Area Mesh Network Topology Enterprise ISP Mesh Network Backbone Network Access Point Gateway Relay End User Device WiFi Phone End User Device WiFi PDA 14 End User Device NoteBook Gateway connection to WAN IP Network Wireless Mesh Backhaul link End User Device WiFi NotePad 2 1 b c d e Understanding the Hardware Hardware Installation Plug one end of the Ethernet cable into the AP port of the PoE Injector and the other end into the Bridge AP Place one end of another Ethernet cable into the Network port of the PoE injector and another end into your PC Notebook Insert the DC inlet of the power adapter into the port DC IN and the other end into the power socket on the wall The DHCP server function is enabled on the device and your PC will receive an IP address from the
10. menu This option allows you to restore the configuration from a file that is stored on a local disk 24 Restart device Figure 4 3 5 Configuration page e Click on the Reboot link on the navigation drop down menu This option allows you to reboot the device in order for the current settings to take effect 25 3 2 Network 3 2 1 Network gt WLAN This device will form a wireless mesh network with other device provided the correct configuration Figure 5 1 1 illustrates the wireless settings of the mesh MAC address 00 02 6f 4f c5 64 Mode ADHOC v Band 802 11a ESSID Frequency 100 5 500 GHz Beacon Interval 100 RTS Threshhold 2346 Fragmentation Threshhold 2346 DTIM interval 1 Datarate auto bel Diversity Card Default Tx antenna Card Default Rx antenna Card Default Base Datarate Max Tx Power dBm 18 Current Datarate Max Tx Power dBm 18 Security Open al Figure 5 1 1 Network WLAN configuration page e MAC Displays the MAC address of the wireless interface e Mode WLAN 1 defined as ADHOC mode ADHOC mode will bring the wireless device to adhoc mode where no AP is required The connection is established for the duration of one session by discovering others device within range WLAN 2 defined as AP mode AP mode will bring the wireless device to Access Point mode Under this mode it can connect multiple wireless communication devices together to form a wireless network can relay data
11. 00 RJ45 port ao 2 3 WLAN 1 defined as ADHOC mode WLAN 2 defined as AP mode 1 5 Mounting Install Guide Make sure the following accessories are included in your WAB 7400 package Q Option 1 Pole Mounting Step 1 Fix the U type clip holder as picture 1 amp 2 Step 3 Mount the WAB 7400 equipped with the holder on the pole shown as 7 9 Option 2 Pole Mounting Step 2 Equip the metal plate on the bottom case of WAB 7400 shown as Step 3 Assemble the holder to the bottom enclosure shown as 7 1 6 System Requirements The following are the minimum system requirements in order configure the device gt PC AT compatible computer with a Ethernet Wireless interface gt Operating system that supports HTTP web browser 1 7 Applications The wireless LAN products are easy to install and highly efficient The following list describes some of the many applications made possible through the power and flexibility of wireless LANs a Difficult to wire environments There are many situations where wires cannot be laid easily Historic buildings older buildings open areas and across busy streets make the installation of LANs either impossible or very expensive b Temporary workgroups Consider situations in parks athletic arenas exhibition centers disaster recovery temporary offices and construction sites where one wants a temporary WLAN established and removed c The ability to acc
12. 720 byte Firmware Release Version layer2 3 1 0 Figure 12 1 1 System Status page 3 9 2 Status gt Interfaces Click on the Interfaces link on the navigation drop down menu This option displays the details of the WAN MESH and VLANO interface Figure 12 2 1 illustrates the interface page Active interface will be listed under the interface page Interface WAN Get Details Interface MESH _Get Details Interface yvland Get Details Figure 12 2 1 Interface page Click on the Get Details button for the WAN interface This section displays the hardware MAC address IP type IP address broadcast address netmask MTU and Tx Rx packet information Figure 12 2 2 illustrates the WAN interface page 63 Hardware Address O0 22 355 00 04 77 IP Type IF Address dhcp Broadcast Address Netmask MTU Rx bytes Tx bytes Rx packets Rx errors Rx dropped 1500 ofo 0 B 134520 131 3 KiB 0 0 0 Figure 12 2 2 WAN Interface page Click on the Get Details button for the MESH and VLANO interface This section displays the hardware MAC address IP type IP address broadcast address netmask MTU and Tx Rx packet information On the wireless interface it displays the ESSID 802 11 band frequency MAC address data rate tx output power encryption key and QoS Figure 12 2 3 illustrates the MESH and VLANO interface page Hardware Address 00 02 6F 49 45 351 IP Type static IF Address 10 20 215 1 Broadca
13. Class High Power Get more coverage and distance to save the installation Technology fee Lightning Protector in both antenna ports and Prevent a lightning stroke to damage the internal Ethernet port equipments Wide temperature range and robust mechanical Delivers reliable top performance in the most design IP65 demanding environments to Avoid water invaded and weather corroded Power over Ethernet PoE Easy installation and cost effective OLSR protocol OLSR protocol provides optimized path of routing Supports NAT Network Address Shares single Internet account and provides a type of Translation NAPT firewall by hiding internal IP addresses for keeping hacker out Static Route Support Forwarding data in a network via a fixed path in multi subnet Support Multiple SSID for client access mode Distinguish separate networks within the same wireless space to provide secure connection Support VLAN Wired Wireless Reduce the size of each broadcast domain which in turn reduces network traffic and increases network security Support 802 1x EAP TLS TTLS SIM PEAP Provide mutual authentication Client and dynamic 802 111 WPA WPA2 AES VPN pass thru encryption keys to enhance security mechanisms Hide SSID Avoids unallowable users sharing bandwidth increases efficiency of the network Support MAC Address access control list Ensures secure network connection Support WMM Extension Improve the user experience for audio video and
14. Community ssease VeEFSION 2c Comments ver Jc Active Enable save changes Figure 9 5 2 Trap server add or edit page Trap server add or edit page contain the following parameter e IP Enter destination IP to send trap e Community Enter community of trap e Reconfirm Community Re enter community to confirm tt e Version SNMP Version e Comments Enter Trap comments e Active Enable or disable this entry e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 6 6 System Management gt Configuration Click on the Configuration link in the navigation menu This section allows you to upload a web certificate to the device and manage the IPSec RSA and X509 certificates Figure 9 6 1 illustrates the system configuration page for uploading a web certificate 54 Upload New Webserver Certificate Upload certificate as PEM file pem 3 Browse IPSEC Management Figure 9 6 1 Configuration Upload new webserver page Upload New Webserver Certificate Click on the Browse button to select the certificate and then click on the Upload button Manage RSA Click on the Manage RSA button to upload a private RSA key Figure 9 6 2 illustrates the Manage RSA configuration page Existing Public Key Local Public RSA Key in RFC 2537 Format Upload Key Pair Please select a Private RSA key to upload Browse Figure 9 6 2 Configu
15. D lt 0 LevelOne User Manual WAB 7400 Dual Radio PoE Mesh Access Point Ver 1 0 0 1021 Table of Content Table of Content 1 1 Introduction 4 Lt Features amp Benefits 5 l2 Package Contents 6 1 3 Safety Guidelines 6 1 4 WAB 7400 Description 6 1 5 Mounting Install Guide T 1 6 System Requirements 10 1 7 Applications 10 1 8 Network Configuration 12 2 Understanding the Hardware 15 2 1 Hardware Installation 15 a IP Address Configuration 16 3 LevelOne Mesh Web based Interface 18 3 1 System 21 3 1 1 SV SECIS V SIC IN 25 orcas ssa icse ease ah sau neat ahaa aeescar eens Maus ic aaa 21 FIZ OVSENE AAN T coer ree TA N T TA NR 22 3 1 3 Dystein Restart Qo BackUp cecer ieee ie eee TEE 23 3 2 Network 26 322 NEIWO K WLA Nsan ann 26 S22 TNS COE SN NS saree sansa ee etn etcetera E A 29 3 23 Network ROUNO ijt ee eee dee eee eae ds 32 3 3 Security 34 3 3 1 Securite MS rol Beene a CR ee RRR eee RCE 34 3232 SCU WIA C ACCESS rrn rE ueteaaaninl aera E AE 36 3 3 3 Secun y VLAN a a aR Pe PP A Pe PY eR PO A 38 3 4 Services 40 3 4 1 Service DHCP Rel V iccacccccssatsecstdatcbesseatarstaratebesseateusnedatebessen tars tasakebecseateecnesares 40 342 SENICE 2 SLCHI Wae O Ena aR ana ARN ARTN eae 42 3 4 3 DELVICES SSH Drean ea a sue ee ee Gees 42 3 5 QoS 44 3 5 1 QoS WMM oro A 44 3 6 System Management 47 3 6 1 System Management HTTPD seccare irie e EE AiE 47 3 6 2 Syston Managemen SNMP ebrar aa r 48 3 6 3 Sy
16. Klog Disable Level Notice x EE A Disable Remote Server Address Save changes Figure 9 3 1 SysLog Server configuration page e Active Choose to enable or disable this feature e Klog Choose to enable or disable this feature e Level Select a logging level from the drop down list e Remote Syslog Choose enable to remotely control the syslog feature e Remote Server Address Specify the IP address of the remote syslog server e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 6 4 System Management gt Firmware Click on the Firmware link in the navigation menu This page allows you to upgrade the firmware of the device in order to improve the functionality and performance 51 This page also displays the current firmware version and its release date Figure 9 4 1 illustrates the Firmware upgrade configuration page Caution Do not switch off the device while upgrading the firmware Current Version layer2 3 1 0 Select a firmware to upgrade Figure 9 4 1 Firmware configuration page e Ensure that you have downloaded the appropriate firmware from the vendor s website e Click on the Browse button to select the firmware and then click on the Upload button Note Please do not power off the device during the firmware upgrade as they may cause permanent damage to the device 3 6 5 System Management gt Trap Tr
17. URL Location field You will see an authentication page display as shown in Figure 3 1 1 Connect to 192 168 0 1 The server 192 166 0 1 at EnGenius Web UI requires a username and password Password TTET Remember my password Cancel Figure 3 1 1 Windows authentication page Type admin in User Name and Password field then click OK button LevelOne Mesh page has nine main menus System Network Security Services QoS System Management Login Setup Tools and Status Each main menu also will have its submenu System System Advance Restart amp Backup Network WLAN WAN Routing Security MSSID MAC Access VLAN Services DHCP Relay System Watchdog SSHD QoS WMM System Management System settings Advance tuning Restart amp Backup settings WLAN settings WAN settings Routing settings MSSID settings Filter MAC address VLAN settings DHCP relay settings System watchdog settings SSHD Configuration WMM settings HTTPD SNMP Syslog Server Firmware Trap Configuration NMS Addresses Login Setup RADIUS Tools Ping Ifconfig Route TFTP Status System Interfaces Services System Log Neighbor Help Internal webserver settings SNMP settings Syslog Server settings Firmware maintenance Trap settings Configuration management Network Management System notifying settings RADIUS settings Ping Ifconfig Route IFIP System status Interfa
18. US Server List Name Type Port Comments Active 172 20 215 11 1 2365 radius Enabled CHiram Tz 2 2365 radiis Enabled Action Add Ww Save changes Figure 10 1 1 RADIUS client configuration page RADIUS client configuration page contains the following parameters e Active Enable or disable RADIUS client e NAS ID Enter the NAS ID e Called Station ID Enter the Called Station ID e NAS Port Enter the NAS Port number e NAS Port Type Enter the NAS Port Type e Interim Update Interval Enter the value of Interim Update Interval e Add button to add entry to the RADIUS server list 58 e Edit button to edit current selection e Delete button to edit current selection e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect Figure 10 1 2 illustrates the add or edit page for RADIUS entry Server Name 1 2 20 215 11 Server Type Authenticate v Server Port 2365 Server Secret seneee Reconfirm Server Secret aeaeeee Comments radius Active Enable save changes Figure 10 1 2 RADIUS server add or edit page RADIUS server add or edit page contain the following parameter e Server Name Enter the RADIUS server name e Server Type Click on Server Type drop down menu to select Authenticate or Accounting server type e Server Port Enter the number of Server Port e Server Secret Enter the Server Sec
19. ap used to report an alert or other asynchronous event about managed system Figure 9 5 1 illustrates the trap configuration page 52 Active Disable Configuration Enable Security Enable Wireless Enable Operational Enable Flash Enable Titp Enable w Image Enable_ Guth failure Enable x Trap Server List Yersion Trap to Comments Active O 3 i772 202154 ver 3 Enabled E fee re aaie ver 3 Enabled Action Add save changes Figure 9 5 1 Trap configuration page Trap configuration page contains the following parameters Active Enable or disable trap report Configuration Enable or disable report on configuration issue Security Enable or disable security trap report Wireless Enable or disable wireless trap report Operational Enable or disable operational trap report Flash Enable or disable flash trap report Tftp Enable or disable tftp trap report Image Enable or disable image trap report Auth failure Enable or disable authentication failure trap report Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect Add button to add entry to trap server list Edit button to edit current selection 53 e Delete button to edit current selection Figure 9 5 2 illustrates the configuration page for add or delete trap server IP azz o as f Community TILLI Recontirm
20. at require QoS such as Wi Fi Voice over IP VoIP phone Figure 8 1 1 illustrates the WME configuration page WME List Interface Comments Active ath default adhoc Enabled vlang default AP Enabled Action Add save changes Figure 8 1 1 WME configuration page WME configuration page contains the following parameters e Edit button to edit the current selection of the active wireless interface list Figure 8 1 2 illustrates the edit page for WME parameters 44 Interface athO Comments default adhoc Active Enable wal Access Class CwWhMIN Cu M aa AIFS Ts OP LIMIT ALM WO ACK POLICY Best Effort Iho fe 2048 Enable Enable Best Effort BSS 3 ao z 3008 Background 4 io I2 i2 Enable Enable Background BSS 9 4 2 3008 Video 4 lo IE 0 Enable w Enable video BSS 2 3 Ie 1504 Voice 4 10 iR io Enable Enable Voice BSS 2 IE J2 1504 Figure 8 1 2 WME edit page WME edit page contains the following parameters e Interface Specify the interface for WMM e Comments Optional comments for this entry e Active Enable or disable WME e CWMIN Minimum contention window This parameter is input to the algorithm that determines the initial random backoff wait time window for retry of a transmission The value specified here in the Minimum Contention Window is the upper limit in milliseconds of a range from which the initial
21. between wireless and wired devices 26 Band Select a wireless band from the drop down list 802 1la 802 11b or 802 11 ESSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters Frequency Select a frequency channel from the drop down list The channels available are based on the country s regulation A wireless network uses specific channels in the wireless spectrum to handle communication between clients Some channels in your area may have interference from other electronic devices Choose the clearest channel to help optimize the performance and coverage of your wireless network Beacon Period Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 1 and 65535 The default value is 2346 Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 65535 The default value is 2346 DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multica
22. bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII 35 format is provided so you can enter a string that is easier to remember The ASCII string is converted to HEX for use over the network Four keys can be defined so that you can change keys easily A default key is selected for use on the network e WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with e WPA Type The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Use AES only AES Advanced Encryption Standard is a very secure block based encryption Note that 1f the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES TKIP and AES The bridge negotiates the cipher type with the access point and uses AES when available e 802 1x Select true of false from the d
23. ces statistics Services status System logging Mesh node status 20 3 1 System 3 1 1 System gt System WAB 7400 is a layer 2 mesh network that supports gateway and relay operation mode Figure 4 1 1 illustrates the system information configuration page Name E Location Contact Name Unknown Contact Email Contact Phone Description Object ID 1 3 6 1 4 1 14125 1 Operation Mode Layer 2 Relay Figure 4 1 1 System Information Configuration page System Information Configuration page contains the following parameters Name Name of the device Location Location name that device located Contact Name Name of the contact person for consulting about the device Contact Email Email address of the contact person Contact Phone Phone number of the contact person Description Description of the device Object ID Display SNMP MIB object identification OID of the device Operation Mode Type of operation mode such as Layer 2 Gateway amp Layer 2 Relay Save Changes button to save any changes made New settings are active after the device reboot 21 3 1 2 System gt Advance In this advance feature networking conntrack and some wireless fine tune done Figure 4 2 1 illustrates the advance configuration page Networking CONNTRACK Maximum session Generic Timeout 30 ICMP Timeout Soo TCP Close Timeout TCP Close Wait Timeout TCP Established Timeout
24. control e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect e Add button to add entry to the access control table e Edit button to edit current selection e Delete button to edit current selection The default value for SNMP V2 Read Community public V2 Read Write Community Private V3 Read Username snmpv3rouser V3 Read Write Username snmpv3rwuser Password snmpv3password Passphrase snmpv3passphrase Figure 9 2 2 illustrates the access control configuration page for SNMP Device Using Save changes Figure 9 2 2 SNMP Access Control add or edit page SNMP Access Control add or edit page contains the following parameters 50 e Device Click on Device drop down menu to select device For example WAN MESH VLANO e Using Click on Using drop down menu to select Device or Network e Comments Enter comments for this entry e Active Click on Active drop down menu to enable or disable this entry e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 6 3 System Management gt SysLog Server This device can automatically send system logs to a SysLog server On this page you may configure the SysLog notice and server IP address Figure 9 3 1 illustrates the Syslog server configuration page Actie Enable v
25. d Enter the certificate password e Reconfirm Certificate Password Re enter certificate password to confirm it e Access Control Enable or disable access control 47 Apply button to save any changes made Please reboot to enable new settings Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect Add button to add entry to the access control table Edit button to edit current selection Delete button to edit current selection Figure 9 1 2 illustrates the HTTPD access control configuration page Device MESH imal Using Device Enable Camments Active Figure 9 1 2 HTTPD Access Control add or edit page HTTPD Access Control page contains the following parameters 3 6 2 Device Click on Device drop down menu to select device For example WAN MESH VLANO Using Click on Using drop down menu to select using Device or Network Comments Enter comments for this entry Active Enable or disable this entry Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect System Management gt SNMP Simple Network Management Protocol SNMP used to monitor devices for conditions that warrant administrative attention Figure 9 2 1 illustrates the SNMP configuration page 48 Active version Port ve Read C
26. device Ensure that the TCP IP settings on your computers are configured as Obtain IP address automatically Place the unit in an appropriate place after conducting a site survey Refer to the mounting instructions in the user s manual This diagram depicts the hardware configuration PoE Injector Data Out AC DC cable Power Outlet 2 2 IP Address Configuration Data In This device can be configured as a Bridge or Access Point The default IP address of the device is 192 168 0 1 In order to log into this device you must first configure the TCP IP settings of your PC Notebook a In the control panel double click Network Connections and then double click on the connection of your Network Interface Card NIC You will then see the following screen Local Area Connection Properties General Authentication Advanced Connect using E9 Intel 8255x based PCI Ethernet Adap This connection uses the following items Client for Microsoft Networks File and Printer Sharing for Microsoft Networks E QoS Packet Scheduler Internet Protocol TCP IP Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Notify me when this connection has limited or no connectivity b Select Internet Protocol TCP IP and then click on t
27. es the Mesh network offers a cost effective last mile connection LevelOne WAB 7400 Dual Radio PoE Mesh AP provides wireless connection over self adaptation mesh backhaul SGHz The mesh AP can operate at both 2 4GHz for long range and 5GHz to reduce the frequency interference The detachable antenna design allows users to use various antennas for different deployment The advanced OLSR Optimal Link State Routing protocol is the industry and scalable mesh routing algorithm It allows data to be transferred with the optimal path Included is WAN interface for Internet connection with Gateway mode Power over Ethernet for both Gateway mode and Relay mode LevelOne WAB 7400 Dual Radio PoE Mesh AP provides the highest security mechanism to protect data information over wireless The security feature include AES backhaul link WPA2 client access SSL for web management To simplify the administration task throughout the large area this product also provides centralized management software This software is built based on SNMP protocol and can be installed in computer 1 1 Features amp Benefits Features Benefits Dual Radio for independent Backhaul and local Allow operators to set up at both 2 4GHz for long access range and SGHz to reduce the frequency interference Self Configuration and Healing Automatically search and link with gateway AP and other nearest node Mesh AP for Ease of Deployment amp Management LevelOne Business
28. es made New settings are active after the device reboot Network Time Protocol NTP is a protocol for synchronizing the system clocks over data networks Figure 5 2 2 illustrates the NTP configuration page Active Enable Time Zone TW Asia Taipei NTP Servers Server Min Poll Max Poll Comment Active 0 asia pool ntp org 4 10 Default Server 1 Enabled 1 asia pool ntp org 4 10 Default Server 2 Enabled Action Add Y Figure 5 2 2 NTP configuration page NTP configuration page contains the following parameters e Active Enable or disable NTP feature e Time Zone Select the correct time zone e Save changes button to save any changes made e Add button to add new entry to the NTP e Edit button to edit current selection e Delete button to delete current selection Figure 5 2 3 illustrates the configuration page for add or edit NTP server settings 30 Min Poll 4 Max Poll 10 Active Enable Save changes Figure 5 2 3 NTP add or edit page NTP add or edit page contains the following parameters Server Specify the name of IP address of the NTP server Min Poll Specify the minimum number of times that the device should poll the server Max Poll Specify the maximum number of times that the device should poll the server Comments You may include comments or a description Active Choose to enable or disable the NTP Server entry Click on the Save Changes b
29. ess real time information Doctors nurses point of sale employees and warehouse workers can access real time information while dealing with patients serving customers and processing information d Frequently changed environments Show rooms meeting rooms retail stores and manufacturing sites where frequently rearrange the workplace e Small Office and Home Office SOHO networks SOHO users need a cost effective easy and quick installation of a small network f Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves extensions to networks and other changes with wireless LANs g Wired LAN backup Network managers implement wireless LANs to provide backup for mission critical applications running on wired networks h Training Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information information exchanges and learning 11 1 8 Network Configuration To better understand how the wireless LAN products work together to create a wireless network it might be helpful to depict a few of the possible wireless LAN PC card network configurations The wireless LAN products can be configured as a Ad hoc or peer to peer for departmental or SOHO LANs b Infrastructure for enterprise LANs c Wi Fi Mesh Networks a Ad hoc peer to peer Mode This is the simplest network configuration
30. figure the SSID beacon interval RTS threshold fragmentation threshold DTIM interval data rate security type and 802 1x Figure 6 2 1 and Figure 6 2 2 illustrate the MSSID configuration page Please create specific VLANs in the Security gt VLAN Menu before editing the MSSID Active Virtual AP ESSID Security Comments LevelOne MESH open WAPI Figure 6 1 1 MSSID configuration page e Click on the Edit button to modify the default values ESSID LevelOne MESH Broadcast SSID Beacon Interval RTS Threshhold DTIM interval Datarate Security Save changes Figure 6 1 2 MSSID configuration page e ESSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters e Broadcast SSID Select enable visible or disable invisible This is the SSID broadcast feature When this option is set to Visible your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When Invisible 34 mode is enabled you must enter the Wireless Network Name SSID on the client manually to connect to the network Beacon Interval Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds RTS Thres
31. he Properties button This will allow you to configure the TCP IP settings of your PC Notebook 16 Internet Protocol TCP IP Properties General ou can get IF settings assigned automatically if your network supports this capability Othersize you need to ask your network administrator for the appropriate IF settings Obtain an IP address automatically Qu e the following IF address IP address 192 168 0 10 Subnet mask 255 255 255 l Default gateway Use the following DNS server addresses Preferred OMS server Alternate DNS server c Select Internet Protocol TCP IP and then click on the Properties button This will allow you to configure the TCP IP settings of your PC Notebook d Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example Device IP address 192 168 0 1 PC IP address 192 168 0 10 PC subnet mask 255 255 255 0 e Click on the OK button to close this window and once again to close LAN properties window 17 3 LevelOne Mesh Web based Interface Web based configuration interface is accessible with computer with TCP IP capability and web browser e g Mozilla or IE To access web based configuration interface enter https 192 168 0 1 In the browser
32. hold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 1 and 65535 The default value is 2346 Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 65535 The default value is 2346 DTIM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients 1t sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Valid settings are between 1 and 255 Data rate Select a transmission rate from the drop down list It 1s recommended to use the automatic option Security Select WEP or WPA 1 amp 2 WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network WEP is not as secure as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64
33. imits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver 1s connected e Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation IMPORTANT NOTE FCC Radiation E
34. iority medium throughput and delay Most traditional IP data is sent to this queue Video AP side high priority minimum delay Time sensitive video data is automatically sent to this queue Video BSS Station side high priority minimum delay Time sensitive video data is automatically sent to this queue Voice AP side high priority Time sensitive data like VoIP and streaming media are automatically sent to this queue Voice BSS Station side high priority Time sensitive data like VoIP and streaming media are automatically sent to this queue 46 3 6 System Management 3 6 1 System Management gt HTTPD Web based configuration management is done through the secure HTTP Figure 9 1 1 illustrates the HTTPD server configuration page Active Enable Port 445 Username admin Password ILLT Recontirm Password LETI Certificate Password TILLI Reconfirm Certificate Fassword as a a a Aocess Control Enable ka Access Control List Device Subnet Netmask Comments Active MESH Mesh Enabled O WAN why Oh Enabled gt VLONO YLAN Enabled raa Action Edi G Figure 9 1 1 HTTPD server configuration page HTTPD server configuration page contains the following parameters e Active Enable or disable HTTPD server e Port Enter the HTTPD port number e Username Enter the HTTPD username e Password Enter the HTTPD password e Reconfirm Password Re enter password to confirm it e Certificate Passwor
35. ipher type with the access point and uses AES when available 802 1x This option works with a RADIUS Server to authenticate wireless clients Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway Furthermore it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users Encryption Key Specify the WPA encryption key Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 2 2 Network gt WAN Figure 5 2 1 illustrates the network configuration page Primary DNS o Secondary oNs o 0 po Domain Gateway Figure 5 2 1 Network configuration page Network contains the following parameters Primary DNS Primary Domain Name Server used to translates domain names to IP addresses Edit this field to match your ISP DNS address or leave it unchanged to use received DNS address from your ISP Secondary DNS Secondary Domain Name Server used to translates domain names to IP addresses A backup DNS address to primary DNS Specify the 29 Secondary DNS address e Domain Specify the Domain name of network e Gateway IP address of router or nodes that serves as an entrance to another network and vice versa Edit this field to match your ISP settings or leave it unchanged to use defaults from your ISP e Save Changes button to save any chang
36. n using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember The ASCII string is converted to HEX for use over the network Encryption Key Specify the WEP encryption key WPA Security You may select WEP or WPA security WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with WPA Type The encryption algorithm used to secure the data communication 28 TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES The device negotiates the c
37. ommunity Reconfirm v2 Read Community ve Read write Community Recontirm v2 Read write Community 3 Read Username v3 Read write Username 3 Password Reconfirm 3 Password wo Passphrase Reconfirm v3 Passphrase Aecess Control Enable all w 161 eesece eosece TELLIT TLLLLI snmpv3rouser snmpv rwuser eececececscece eecececceccecs eececeseeeceseee Enable Access Control List Device Subnet Netmask Comments Active MESH O WAN O vLano acionlAdd E Mesh Enabled WAR Enabled VLAN Enabled Figure 9 2 1 SNMP configuration page SNMP configuration page contains the following parameters Active Enable or disable SNMP management Version Select vl or v2c v3 or all SNMP version Port Enter the SNMP port number v2 Read Community Enter the v2 Read Community Reconfirm v2 Read Community Re enter v2 Read Community to verify v2 Read write Community Enter the v2 Read write Community Reconfirm v2 Read write Community Re enter v2 Read write Community for verification 49 e v3 Read Username Enter the v3 Read Username e v3 Read write Username Enter the v3 Read write Username e v3 Password Enter the v3 Password e Reconfirm v3 Password Re enter v3 Password for verification e v3 Passphrase Enter the v3 Passphrase e Reconfirm v3 Passphrase Re enter v3 Passphrase for verification e Access control Enable or disable SNMP access
38. or May 16 00 26 44 engenius daemon crit parse O asia pool ntp org Name or May 16 00 26 44 engenius daemon crit parse Lllasia pool ntp arg Name oar ntpd lisi Bervice not ntpd lisi Bervice not ntpd 1lisi Bervice not ntpod 11i31 Bervice not ntpodl1lisi Bervice not ntpd 1131 Bervice not ntpd 1131 Service not could known could known could known could known could known could known could known not not not not not not not LE Figure 12 4 1 System Log page 3 9 5 Status gt Neighbor Neighbor status page will show the mesh node status It show neighbor with details such as rate rssi timeout Figure 12 5 1 illustrates the neighbor status page 65 List of Neighbors MAC Address Rate Mbps RSSI dBm Timeout Seconds Mac Table 00 02 6f 4f c5 64 36M D 0 Figure 12 5 1 Neighbor Status page Neighbor Status page contains the following parameters e List of Neighbors display a list of connected neighbor e lt View hyperlink gt display the MAC table of the selected entry e View All Macs display all the MAC currently visible to the device 66 3 10 Help Help page provide links to specific help related to configuration and some description according to each submenu of the configuration 67 4 Appendix A FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the l
39. ration Manage RSA page Upload Key Pair Click on the Browse button to select the certificate and then click on the Upload button Manage X509 Click on the Manage X509 button to upload a local and remote certificate from the CA Certification Authority Figure 9 6 3 illustrates the Manage X509 configuration page 33 Local Certificate Existing local certificate Mone Existing root certificate authority Mone Upload certificate as PECS 12 file Extension p1 Browse Remote Certificate This certificate is required as it will be used to authenticate the server Existing Certificate None Upload remote certificate as PEM file Extension pem Browse Upload Figure 9 6 3 Configuration Manage X509 page e Local Certificate Click on the Browse button to select the certificate and then click on the Upload button e Remote Certificate Click on the Browse button to select the certificate and then click on the Upload button 3 6 7 System Management gt NMS Addresses NMS address is used for the system to report back to Network Management System located outside of the network Figure 9 7 1 illustrates the NMS server address configuration page NMS Address List Address Port Interval Comments Active 192 168 1 60 8188 60 Enabled Action Add Save changes Figure 9 7 1 NMS Address List 56 NMS address configuration page contains the following parameters e NMS Addre
40. ret e Reconfirm Server Secret Re enter the Server Secret to confirm tt e Comments Enter RADIUS server comments e Active Enable or disable this entry e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 59 3 8 Tools 3 8 1 Tools gt Ping Figure 11 1 1 illustrates the ping page Number of pings 5 Output PING 172 20 215 1 172 20 215 1 56 data bytes 64 bytes from 172 20 215 1 icmp seq 0 ttl 64 time 1 1 ms 64 bytes from 172 20 215 icmp seq 1l ttl 64 time 0 7 ms 64 bytes from 172 20 215 icmp seq 2Z ttl 64 time 0 9 ms 64 bytes from 172 20 215 icmp seq 3 ttl 64 time 0 7 ms 64 bytes from 172 20 215 icmp seq 4 ttl 64 time 0 7 ms PReEP He 172 20 215 1 ping statistics 5 packets transmitted 5 packets received 0 packet loss round trip min avg max 0 7 0 8 1 1 ms Figure 11 1 1 Ping page Ping page contains the following parameters e Ping Enter the IP address to ping e Number of pings Enter the number of pings to send e Ping button to ping and display output of ping command e Output text area display result of the ping command 3 8 2 Tools gt ifconfig Ifconfig page is used to collect verbose information about device network interfaces Figure 11 2 1 illustrates the ifconfig page 60 top H Output athoO Link encap Ethernet HWaddr 00 02 6F 49 45 31 inet addr 10 20 215 1 Beast 10 255 255
41. rop down list to enable or disable 802 1x e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 3 3 2 Security gt MAC access MAC Access provides another level of security by filtering the packets coming into the device Figure 6 2 1 and Figure 6 2 2 illustrate the MAC Access configuration page 36 Tyee Save changes MAC Access List MAC Type Comments Active Action Save changes Figure 6 2 1 MAC access configuration page Active Choose to enable or disable the MAC address filter feature Type Choose to allow or deny access for the MAC addresses Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect MAC Access List Click on the Add button to insert a MAC address 8 Save changes Figure 6 2 2 MAC access configuration page MAC Specify the MAC address Type Select Allow or Deny Comments You may include comments or a description Active Choose to enable or disable the filter on this MAC address Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 37 3 3 3 Security gt VLAN A Virtual LAN is a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN VLANs are configured thro
42. s of the backend DHCP server e Comments Additional comments on this entry e Active Enable or disable this entry e Apply button to save any changes made Please reboot to enable new settings Example How to setting DHCP Relay in the WAB 7400 Mesh AP Click New Entry button in the DHCP Relay page 2 Select Type Interface Interface Name VLANO Comments DHCP Server MAC address Active Enable and then click Apply 3 Click New Entry button in the DHCP Relay page Select Type Server Server IP DHCP Server IP address Comments DHCP Server MAC address and then click Apply button 5 When finished the steps then reboot the WAB 7400 Type interface Interface Heme VLANO l Comments O00 184dceJb3a a active Enable w Act Apply Apply 41 Connection specific DHS Suffix amp Description lt NETGEAR WGOlliv2 S4Abps Wireless USE 2 0 Adapter Physical Address a e BA 18 4D CE 358 ThA Yes Dhep Enabled sale aus fiutoconfiguration Enabled Yes IP Address a 2 2 nasa ow ew a 1992 168 18 281 r Are pubnet Hassk s rar 2 gt ar 255 255 255 8 3 4 2 Service gt System Watchdog Linux kernel watchdog will constantly monitor the integrity of the system During system locked up kernel watchdog will trigger a system reboot to recover the system from failure Figure
43. ss List List of NMS server e Add button to add entry to the NMS address list e Edit button to edit current selection e Delete button to edit current selection e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect Figure 9 7 2 illustrates the NMS address configuration page for add or edit Address Port 8188 Interval 60 60 300000s Comments Active Enable Figure 9 7 2 NMS Addresses add or edit page NMS Address add page contain the following parameter e Address Enter the IP address of the NMS server e Port Enter the port of the NMS server which is waiting for the report e Interval Enter the interval of report to NMS server e Comments Enter comments for the entry e Active Enable or disable this entry e Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 57 3 7 Login Setup 3 7 1 Login Setup gt RADIUS Remote Authentication Dial In User Service RADIUS is an AAA Authentication Authorization and Accounting protocol for applications such as network access or IP mobility RADIUS client will verify authentication push by RADIUS server Figure 10 1 1 illustrates the RADIUS client configuration page Active Enable NAS ID Called Station ID NAS Port 1 MAS Port Type 19 Interim Update Interval 300 Save changes RADI
44. st Address 10 255 255 255 Netmask 255 000 MTU 1500 Rx bytes 0 0 0 B Tx bytes 219722 214 5 KiB Rx packets Oo Rx errors 0 Rx dropped 0 Wireless Information ESSID LevelOne Backhaul Band eO2 114 Frequency 5 26 GHz Cells O2 02 6F 49 45 31 Rate auto Max Tx Power 18 dBm Encryption Key off Figure 12 2 3 MESH and VLANO Interface page 3 9 3 Status gt Services Click on the Services link on the navigation drop down menu This option displays 64 the current status of the following services NTP client SSHD SNMP server Syslog server and web servers Figure 12 3 1 illustrates the status of each service running in the device Status Service Status NTP Client O k SoHD O k SNMP Server O k Syslog Server O k Webservers O k Figure 12 3 1 Services page 3 9 4 Status gt System Log Click on the System Log link on the navigation drop down menu This option displays the list of events by date and time Click on the Get Log button to view the output Figure 12 4 1 illustrates the system log page Output May 18 00 23 44 engenius daemon crit parse i lasia pool ntp org Name or May 18 00 24 44 engenius daemon crit parse OQ lasia pool ntp org Name or May 18 00 24 44 engenius daemon crit parse llasia pool ntp org Name or May 16 00 25 44 engenius daemon crit parse O lasia pool ntp org Name or May 16 00 25 44 engenius daemon crit parse llasia pool ntp org Name
45. st messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients 1t sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Data rate Select a data rate from the drop down list or select auto Diversity A method for improving the reliability of a message signal by utilizing two or more communication channels with different characteristics 2 in order to combat fading and interference Click on Diversity drop down button to select Card Default Enable or Disable Tx Antenna Click on Tx antenna drop down button to select Diversity Card Default Port 1 or Port 2 Rx antenna Click on Rx antenna drop down button to select Diversity Card Default Port 1 or Port 2 Base Datarate max Tx power Default output power of the device Current Datarate max Tx power You may control the output power of the device by selecting a value from the drop down list Security You may select WEP or WPA security WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network WEP is not as secure as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create Whe
46. stem Management gt SysLog Servet cccccccccccccceceeeceessseeseeeeeeeeeeeeeeeeeeeaaas 51 3 6 4 Syste Management Pin Wale paan r nain nR RAAR 51 3 6 5 System Manacement gt Trapwcavincdeiicn thn eds 32 3 6 6 System Management gt Configuration eseseseeeeeeeeeeereseerrerrrrrrrerrrrrrrrrrrrerreree 54 3 6 7 System Management gt NMS Addresses cccccccccccccccessseseceeeeeeeeeeeeeeeeeeeeseeeeeees 56 3 7 3 7 1 3 8 3 8 1 3 8 2 3 8 3 3 8 4 3 9 3 9 1 3 9 2 3 9 3 3 9 4 3 9 5 3 10 Login Setup Losin Setup RADIUS ost ses a cosets on cass sit Seees eases Sees Tools Tool cd 10 e eee eee Took eon eos eee ete need ee Took RU gt arene cere eR Talk IN a I Sarre er A Status Status Dyte Miests a a a as olats Wf e 1 6 lt 1 een AS Sery CES a n varsagsocgonnavicaraaedissisieseassaaiaes Status Systemi LOP ecsiocsirnicni a a paws IN C1 DOP erien Help Appendix A FCC Interference Statement Appendix B GPL Software Agreement 58 58 60 60 60 61 62 63 63 63 64 65 65 67 66 68 Revision History 2008 10 21 Initial Version 1 Introduction LevelOne WAB 7400 Dual Radio PoE Mesh AP is designed with IEEE802 11a b g standards and addressed on providing high performance mesh network The product encased in the IP 65 protection enclosure and delivers the maximum scalability high reliability at outdoor environment Compared with expensive T1 E1 leased lin
47. ugh software rather than hardware which make them extremely flexible One of the biggest advantages of VLANs is that when a computer is physically moved to another location it can stay on the same VLAN without any hardware reconfiguration Figure 6 3 1 and Figure 6 3 2 illustrate the VLAN configuration page Active VLAN ID Name IP Netmask Comments 0 vlanO 192 166 0 1 255 255 255 0 Default VLAN Inactive VLAN Figure 6 3 1 VLAN configuration page e Click on the Edit button to modify the existing VLAN Routed Routable address Comments Default VLAN Active Enable Save changes Figure 6 3 2 VLAN configuration page e ID Specify the VLAN tag ID e Type Select the VLAN type from the drop down list e IP Specify the IP address for the VLAN tag 38 Netmask Specify the subnet mask for the IP address Routed Select if the VLAN is routed through the routing table or NAT Comments You may include comments or a description Active Choose to enable or disable this VLAN entry Click on the Save Changes button to store and changes and then reboot the device in order for the changes to take effect 39 3 4 Services 3 4 1 Service gt DHCP Relay For a dynamic network WAB 7400 is able to forward the DHCP request to a backend DHCP server when operating in layer 2 mode Figure 7 1 1 illustrates the configuration page for DHCP Relay Active E Port 67 a 65535 Hop count 10 1
48. utton to store and changes and then reboot the device in order for the changes to take effect 31 3 2 3 Network gt Routing Routing refers to selecting paths in a network along which to send data Figure 5 3 1 illustrates the route configuration page Routes List IP Netmask Using Comments Active 0 0 0 0 0 0 0 0 MESH Enabled Action Add Save changes Figure 5 3 1 Routing configuration page Route contains the following parameters e Routes List Display list of routes e Add button to add new entry to the routes e Edit button to edit current selection e Delete button to delete current selection Figure 5 3 2 illustrates the add or edit page for route entry Direct Direct Device Save changes Figure 5 3 2 Routing add or edit page Routes add page contain the following parameter e Subnet Enter the IP address of destination subnet e Netmask Enter the IP address of destination subnet network mask e Direct Click on Direct drop down menu to select Direct or Indirect route e Device Click on Device drop down menu to select device For example MESH VLANO VLANI 32 e Comments Enter the interface comments e Active Enable to disable this interface e Save Changes button to save any changes made Please reboot to enable new settings 33 3 3 Security 3 3 1 Security gt MSSID In this section you may con
49. with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another In ad hoc mode each client 1s peer to peer would only have access to the resources of the other client and does not require an access point This is the easiest and least expensive way for the SOHO to set up a wireless network The image below depicts a network in ad hoc mode Wireless LAN Client Wireless LAN Client Wireless LAN Client b Infrastructure Mode The infrastructure mode requires the use of an access point AP In this mode all wireless communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater which effectively doubles the distance between wireless stations The image below depicts a network in infrastructure mode Wireless LAN Client Wireless LAN Client Access Point Wireless LAN Client c Wi Fi Mesh Networks A Wireless Mesh Network constructed from WiFi Technology alleviates a number of roaming challenges from laptops IP phones PDAs and IP base devices No geographical limitations User can take a handheld or laptop computer anywhere without losing the connection in their home No physical connection required Mobile IP connects automatically and obtains local IP router information
50. xposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This device complies with FCC RF Exposure limits set forth for an uncontrolled environment under 47 CFR 2 1093 paragraph d 2 66 This transmitter must not be co located or operating in conjunction with any other antenna or transmitter 67 5 Appendix B GPL Software Agreement This product incorporates open source code into the software and therefore falls under the guidelines governed by the General Public License GPL agreement Adhering to the GPL requirements the open source code and open source license for the source code are available for free download at http global levell com If you would like a copy of the GPL or other open source code in this software on a physical CD medium LevelOne Digital Data Communications offers to mail this CD to you upon request for a price of US 9 99 plus the cost of shipping

Download Pdf Manuals

image

Related Search

Related Contents

  Catalogue installation entretien pompes série 3068  User Manual Version 2 - LegUp by Chopper Design  アクアハート - 株式会社エミヤ  Samsung LED Business Moniteur 24"  osaka - tsf300  Lotus M111ELISE User's Manual  PDF  2-Megapixel Digital Camera with Color LCD User Manual  ColorTrend HT User's Manual  

Copyright © All rights reserved.
Failed to retrieve file