3Com Corporation reserves the right to revise this documentation and to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited
rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is
applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not
be registered in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows
NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of
Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively
through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are
associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we
are committed to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized
environmental standards. Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is
fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and
the inks are vegetable-based with a low heavy-metal content.
CONTENTS
ABOUT THIS GUIDE
Conventions2
Related Documentation2
Accessing Online Documentation3
Product Registration and Support4
1INTRODUCTION
Product Features5
Security5
Wireless Network Standards6
Network Configuration and Planning7
Example Configurations8
2INSTALLINGTHE BRIDGE
Unpacking the Bridge9
Observing Safety Precautions10
Deciding Where to Place the Bridge11
Wall-Mounting the Bridge11
Installing the Locking Bar12
Placing the Bridge on a Flat Surface13
Connecting the Bridge14
Connecting to a Serial Device14
Connecting to an Ethernet Device15
About the Client List15
Connecting to a Hub15
Connecting to a Network Printer16
Connecting to a Computer16
Checking the LED Indicators17
Attaching An External Antenna18
Determining if you Need to Configure the Bridge18
Using the 3Com Installation CD21
3CONFIGURINGTHE BRIDGE
Using Secure Web Server Connection23
Using the 3Com Wireless Infrastructure Device Manager24
Using the Configuration Management System27
Clearing and Applying System Configuration Settings28
Changing System Properties29
Setting IP Network Properties30
Setting Wireless Network Properties31
Manually Select Radio Channels33
Setting Up an Ad-Hoc Network34
Changing Wireless Security Settings35
Changing RADIUS Settings37
Changing SNMP Settings38
Using the Access Control List39
Serial Port40
Resetting the Bridge42
Restoring the Bridge to Factory Defaults43
Upgrading the System44
Changing the Administration Login Name and Password45
Backing up a Configuration45
Restoring a Configuration46
Logging Out46
Clearing the Ethernet Client List46
Viewing Connection Status47
Viewing System Summary47
4TROUBLESHOOTING
Diagnosing Problems49
Disconnecting the Bridge51
Uninstalling Software and Documentation51
Upgrading Bridge Firmware52
AOBTAINING SUPPORTFORYOUR 3COM PRODUCT
Register Your Product to Gain Service Benefits53
Solve Problems Online53
Purchase Extended Warranty and Professional Services54
Access Software Downloads54
Contact Us54
Telephone Technical Support and Repair55
END USER LICENSE AGREEMENT
REGULATORY INFORMATION
ABOUT THIS GUIDE
This guide provides all the information you need to install and use the
3Com 11a/b/g Wireless Workgroup Bridge in its default state.
The guide is intended for use by IT managers and experienced network
installation and administration professionals who have a basic knowledge
of current networking concepts.
If the information in the release notes that are shipped with your product
differ from the information in this guide, follow the instructions in the
release notes.
Most user guides and release notes are available in Adobe Acrobat
Reader Portable Document Format (PDF) or HTML on the 3Com
World Wide Web site:
http://www.3com.com/
2ABOUT THIS GUIDE
ConventionsTable 1 and Table 2 list conventions that are used throughout this guide.
Tab le 1 Notice Icons
IconNotice TypeDescription
Information noteInformation that describes important features or
instructions.
CautionInformation that alerts you to potential loss of data or
potential damage to an application, system, or device.
WarningInformation that alerts you to potential personal
injury.
Tab le 2 Text Conventions
ConventionDescription
Screen displaysThis typeface represents information as it appears on the
SyntaxThe word “syntax” means that you must evaluate the syntax
The words “enter”
and “type”
Keyboard key namesIf you must press two or more keys simultaneously, the key
Words in italicsItalics are used to:
screen.
provided and then supply the appropriate values for the
placeholders that appear in angle brackets. Example:
To change your password, use the following syntax:
system password <password>
In this example, you must supply a password for <password>.
When you see the word “enter” in this guide, you must type
something, and then press Return or Enter. Do not press
Return or Enter when an instruction simply says “type.”
names are linked with a plus sign (+). Example:
Press Ctrl+Alt+Del
■ Emphasize a point.
■ Denote a new term at the place where it is defined in the
text.
■ Identify menu names, menu commands, and software
button names. Examples:
From the Help menu, select Contents.
Click OK.
Related
Documentation
In addition to this guide, each Bridge documentation set includes the
following:
Accessing Online Documentation3
■Quick Start Guide—printed guide that describes basic installation.
■Online Help—product help systems that describe how to use the
Configuration Management System and 3Com Wireless Infrastructure
Device Manager.
■Release Note—printed note that describes important product
information.
■README.TXT file—text file located on the 3Com Installation CD that
describes last-minute product information.
Accessing Online
Documentation
The CD supplied with your Bridge contains the following online
documentation:
■3Com 11a/b/g Wireless Workgroup Bridge User Guide
■3Com Wireless Infrastructure Device Manager Online Help
1 Insert the 3Com Installation CD supplied with your Bridge in the CD-ROM
drive.
The setup menu appears. If it does not appear, you can start the setup
menu from the Windows Start menu. For example: Start > Run > d:setup.exe.
2 In the menu, click View the Documentation to view the Bridge User
Guide.
To view the online help, install and launch the Wireless Infrastructure
Device Manager or Configuration Management System. See Chapter 3
for instructions.
4ABOUT THIS GUIDE
Product
Registration and
Support
To register your product with 3Com, go to the following Web page:
http://esupport.3com.com
For support information, see “Obtaining Support for your 3Com
Product” on page 53 or log on to the 3Com Web site at
http://www.3com.com and navigate to the product support page.
INTRODUCTION
1
3Com wireless technology has all of the benefits of a local area network
(LAN) without the constraints and expense of network wiring.
3Com 11a/b/g Wireless LAN products provide easy, affordable, flexible
ways to extend wireless networks to more users. This guide shows how
you can use the 3Com 11a/b/g Wireless Workgroup Bridge in your office
or classroom to connect groups of wired Ethernet client devices to your
wireless LAN.
Product FeaturesThe 3Com 11a/b/g Wireless Workgroup Bridge includes a robust suite of
standards-based security features, and supports wireless network
standards including 802.11a and 802.11g.
SecurityTo protect sensitive data broadcast over the radio, 3Com supports
Wireless Equivalent Privacy (WEP) RC4 64-bit, 128-bit and 152-bit
shared-key encryption. 3Com strengthens this basic security mechanism
with additional security features, including:
■MAC address access control lists
■IEEE 802.1x per-port user authentication with RADIUS server
authentication support
■Temporal Key Integrity Protocol (TKIP)
■Advanced Encryption Standard (AES)
■WiFi Protected Access (WPA)
■Extensible Authentication Protocol (EAP) support: EAP-TTLS and PEAP
6CHAPTER 1: INTRODUCTION
Wireless Network
Standards
Understanding the characteristics of the 802.11a and 802.11g standards
can help you
make the best choice for your wireless implementation plans.
802.11a
Ratified in 2002, 802.11a is IEEE’s more recent wireless standard. It
operates at the 5
GHz band and supports data rates at up to 54 Mbps.
Because there are fewer devices in the 5 GHz band, there’s less potential for
RF interference. However, because it is at an entirely different radio
spectrum, it is not compatible with 802.11g.
The higher spectrum provides about 50 m (164 ft) of coverage—about
what 802.11g offers.
half
Consider 802.11a when you need high throughput in a confined space
and you are:
■Running high-bandwidth applications like voice, video, or multimedia
over a wireless network that can benefit from a five-fold increase in
data throughput.
■Transferring large files like computer-aided design files, preprint
publishing documents or graphics files, such as MRI scans for medical
applications, that demand additional bandwidth.
■Supporting a dense user base confined to a small coverage area.
Because 802.11a has a greater number of non-overlapping channels,
you can pack more wireless devices in a tighter space.
802.11g
802.11g operates in the 2.4 GHz band at up to 54 Mbps. Ratified in
2003, it supports
the widest coverage—up to 100 m (328 ft). However, is
subject to a greater risk of radio interference because it operates in the more
popular 2.4 GHz band.
802.11b operates at up to 11 Mbps and supports coverage up to 100 m
(328 ft).
Network Configuration and Planning7
Consider 802.11g when you need wider coverage and vendor
compatibility and you are:
■Maintaining support for existing 802.11b users and the existing
wireless investment while providing for expansion into 802.11g.
■Implementing a complete wireless LAN solution, including bridges,
gateways, access points and clients; Wi-Fi certification guarantees
compatibility among vendors.
■Providing access to hot spots in public spaces such as coffee shops or
university cafeterias.
Network
Configuration and
Planning
The Bridge can operate in either infrastructure or ad-hoc mode, and can
support a stand-alone wireless network configuration or an integrated
configuration with 10/100 Mbps Ethernet LANs.
Operating in infrastructure mode and connected to an Ethernet hub, a
single Bridge can combine up to 16 client devices—such as computers
with network adapters and printers—into a multiclient workgroup. The
workgroup associates with the wired network through a wireless LAN
access point such as the 3Com 11a/b/g Wireless LAN Access Point.
Infrastructure configurations extend your wireless LAN to devices that
would otherwise have to be connected to the wired network.
Operating in ad-hoc mode, two or more Bridges can associate among
themselves and communicate with one another at close range without an
access point. You may wish to set up an ad-hoc network, for example, if
a group is working away from the office, or if a group in the office needs
to share files apart from the wired LAN.
8CHAPTER 1: INTRODUCTION
POWER
ETHERN
ET
W
I
RELESS
PO
W
ER
ETHERN
ET
W
IRE
LE
SS
Example
Configurations
The following examples illustrate ways you can use the Bridge to
configure Ethernet client devices into workgroups. (Details for setting up
specific configurations are in “Installing the Bridge” on page 9.)
Wireless Infrastructure Network
You can connect several computers, including those with non-Windows
operating systems, and network printers, as shown in Figure 1.
Figure 1 Wireless Infrastructure Network
H
oup
irele
B
ub
ss
r
idg
e
a
1
1
.
g
1
1
.
0
0
1
.
0
1
.
A
ccess
P
oint
11a/b/g W
ET
ET
N
N
R
R
E
E
S
S
R
R
H
H
E
E
LES
LES
ET
ET
W
W
E
E
O
O
R
I
IR
P
P
W
W
W
orkgr
Workgroup Ad-Hoc Network
You can provide flexible wireless network association for small groups in
areas that cannot be wired, as shown in Figure 2.
Figure 2 Workgroup Ad-Hoc Network
H
ub
11a/b/g W
W
11a/b/g W
W
orkgr
orkgr
oup
oup
irele
irele
ss
B
r
id g
e
a
1
1
.
g
1
1
.
00
1
.
0
1
.
ss
B
r
id g
e
a
1
1
.
g
1
1
.
0
0
1
.
0
1
.
H
ub
2
INSTALLINGTHE BRIDGE
This chapter contains the information you need to install and set up the
Bridge. It covers the following topics:
■Unpacking the Bridge
■Observing Safety Precautions
■Deciding Where to Place the Bridge
■Connecting the Bridge
■Checking the LED Indicators
■Attaching An External Antenna
■Determining if you Need to Configure the Bridge
■Using the 3Com Installation CD
Unpacking the
Bridge
Make sure that you have the following items, which are included with the
Bridge:
■Locking bar (used for securing a wall-mounted installation).
■Rubber feet (four; used for a flat-surface installation).
■3Com Installation CD.
For wall-mounting installations, you need the following items, which
are not included with the Bridge:
■Mounting screws.
■Plastic anchors (for drywall mounting).
To secure the Bridge using the locking bar, you need a lock (not
supplied).
10CHAPTER 2: INSTALLINGTHE BRIDGE
Figure 3 shows the front view of the Bridge, including the LEDs and
connecting ports. It also shows the cradle, which is used to mount the
Bridge to a wall or to install the Bridge on a flat surface.
Figure 3 Bridge
Observing Safety
Precautions
11a/b/g W
W
orkgr
P
ower
S
erial
E
oup
P
ort
therne
irele
ss
B
r
idg
e
P
ort
t
P
ort
C
radl
e
This equipment must be installed in compliance with local and national
building codes,
regulatory restrictions, and FCC rules. For the safety of
people and equipment, only professional network personnel should
install the Bridge.
WARNING: To comply with FCC radio frequency (RF) exposure limits, a
minimum body-to-antenna distance of 20 cm (8 in.) must be maintained
when the Bridge is operational.
WARNING: To avoid possible injury or damage to equipment, you must
use either the provided power supply or power supply equipment that is
safety certified according to UL, CSA, IEC, or other applicable national or
international safety requirements for the country of use. All references to
power supply in this document refer to equipment meeting these
requirements.
CAUTION: The 3Com power supply (part number 61-0107-000) input
relies on a 16A rated building fuse or circuit protector for short circuit
protection of the line to neutral conductors.
Deciding Where to Place the Bridge11
Deciding Where to
Place the Bridge
Wall-Mounting the
Bridge
Place the Bridge in a dry, clean location near the hub, computer, or
printer that will be connected to the Bridge. The location must have a
power source and be within the following distance of a Wi-Fi compliant
wireless LAN access point or ad-hoc wireless station:
■For 802.11a compatibility, place the Bridge within 50 m (164 ft) of a
Wi-Fi compliant wireless LAN access point.
■For 802.11b/g compatibility, place the Bridge within 100 m (328 ft) of
a Wi-Fi compliant wireless LAN access point.
The location should be away from transformers, heavy-duty motors,
fluorescent lights, microwave ovens, refrigerators, or other equipment
that could cause radio signal interference.
The Bridge comes with a cradle for mounting on a wall. For additional
security, the Bridge also comes with a locking bar, which can be used
with a security lock (not provided) to lock the Bridge to the cradle after
the Bridge is mounted to a wall.
To wall-mount the bridge:
1 Screw the cradle to a wall,
Figure 4 Wall-Mounting the Bridge
as shown in Figure 4.
C
radl
e
12CHAPTER 2: INSTALLINGTHE BRIDGE
2 Route the power and Ethernet cables through the large opening in the cradle.
Figure 5 shows a cable being routed under the cradle.
Figure 5 Routing Cable Under the Cradle
3 Connect the power and Ethernet cables to the ports on the Bridge.
4 Snap the Bridge onto the cradle.
Installing the
Locking Bar
For additional security, install the locking bar in the cradle after the Bridge
is mounted to the wall. Use your own lock to secure it in place.
To install the locking bar:
1 Insert the locking bar through the opening in the side of the cradle, as
shown in Figure 6.
Figure 6 Inserting the Locking Bar
.11a
.11g
.100
.10
Deciding Where to Place the Bridge13
2 Push the locking bar through the opening until the hole on the locking
bar is exposed.
3 Insert a lock through the hole on the locking bar, and then close the lock
to secure it in place, as shown in Figure 7.
Figure 7 Securing the Locking Bar
.10
.100
.11g
.11a
Placing the Bridge on
a Flat Surface
The Bridge comes with four rubber feet that can be used to install the
Bridge on a flat surface such as a table or desktop.
CAUTION: Do not place the Bridge on any type of metal surface. Select a
location that is clear of obstructions and provides good reception.
Remove the backing from the rubber feet and attach them to the bottom
of the cradle. After the rubber feet are installed, place the Bridge on a flat
surface.
14CHAPTER 2: INSTALLINGTHE BRIDGE
Connecting the
Bridge
Connecting to a
Serial Device
The Bridge has power, Ethernet, and serial ports, as shown in Figure 8.
Before connecting the Bridge to an Ethernet device, connect the power.
Figure 8 Connecting the Power
P
ower
C
able
E
therne
t
C
able
The Bridge can also be connected to a serial device, as shown in Figure 9.
Serial cables come with a variety of connector sizes. If your connector is
large and prevents the cradle from being attached to the Bridge, remove
the end cap on the cradle. This allows the connector to extend through
the cradle.
Figure 9 Connecting a Serial Cable
S
erial
C
able
Connecting the Bridge15
POWER
ETHERNET
WIRE
LE
SS
Connecting to an
Ethernet Device
The Bridge is designed to be connected to an Ethernet client device such
as a hub, computer, or printer.
CAUTION:
To avoid the possibility of a transmission loop situation between
the Bridge and an access point, which could disrupt network operation, do
not connect a Bridge that is set in Wireless Client (Infrastructure) mode
directly to the LAN (for example, through a wall port or through a hub that is
connected directly to the LAN).
About the Client ListThe Bridge supports up to 16 specific Ethernet client devices. It uses a
client list of MAC addresses to keep track of specific devices that have
been connected.
After 16 different devices have been connected, the client list is full, and
you must clear it before the next new device can associate with the
network through the Bridge.
To clear the list, you must access the Bridge’s Configuration Management
System. Details are in “Clearing the Ethernet Client List” on page 46.
Connecting to a HubYou can supply network connections for up to 16 devices, such as
computers and network printers, by connecting the Bridge to an Ethernet
hub, as shown in Figure 10.
Figure 10 Connecting to a Hub
H
A
ccess
P
oint
NET
R
E
S
R
S
H
E
LE
ET
W
E
O
P
WIR
ub
a
1
1
.
g
1
1
.
0
0
1
.
0
1
.
11a/b/g W
W
orkgr
oup
U
plin
irele
B
r
k
ss
id g
P
ort
e
You can directly connect the Bridge to a hub that does not have an uplink
(MDIX) port, without the need of an Ethernet crossover cable.
Loading...
+ 49 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.