Aceex Powerline 200M Wireless-G Extender User Manual

User’s Manual
Powerline 200M
Wireless-G Extender
Index
FCC Part 68....................................................................................................................................................... 3
FCC Part 15....................................................................................................................................................... 4
Chapter 1 Introduction ....................................................................................................................................... 5
1.1 Overview ..................................................................................................................................... 5
1.2 Features...................................................................................................................................... 5
1.3 System Requirements ................................................................................................................. 6
Chapter 2 Installation ......................................................................................................................................... 7
2.1 Checklist ..................................................................................................................................... 7
2.2 The Front LEDs ........................................................................................................................... 8
2.3 The Rear Ports ............................................................................................................................ 8
2.4 The Bottom Port .......................................................................................................................... 9
Chapter 3 Configuration ................................................................................................................................... 10
3.1 Determine your connection settings ........................................................................................... 10
3.2 Connecting the Powerline Extender to your network .................................................................. 10
3.3 Configuring with Web Browser................................................................................................... 10
3.3.1 Management IP .......................................................................................................................11
3.4.1 Wireless Basic Settings .......................................................................................................... 12
3.4.2 Wireless Advance Settings ..................................................................................................... 13
3.4.3 Wireless Security.................................................................................................................... 15
3.4.4 Wireless MAC ACL ................................................................................................................. 18
3.5.1 System Information................................................................................................................. 19
3.5.2 Packet Statistics ..................................................................................................................... 20
3.5.3 System Log ............................................................................................................................ 21
3.6.1 Admin Account........................................................................................................................ 22
3.6.2 System Log Settings............................................................................................................... 23
3.6.3 Config .................................................................................................................................... 24
3.6.4 Firmware Update .................................................................................................................... 25
3.7.1 Logout .................................................................................................................................... 26
3.7.2 Reboot ................................................................................................................................... 27
3.7.3 TCP/IP Settings for Windows Operating System ..................................................................... 28
Chapter 4. Powerline Networking Utility............................................................................................................ 35
4.1 Configuration Utility Setup ......................................................................................................... 35
4.1.1 Installation of the Utility ........................................................................................................... 35
4.2 Windows Configuration Utility .................................................................................................... 36
4.3 User Interface............................................................................................................................ 37
4.3.1 Main Screen ........................................................................................................................... 37
4.3.2 Privacy Screen ....................................................................................................................... 41
4.4 Diagnostics Screen ................................................................................................................... 43
4.4.1 About Screen.......................................................................................................................... 45
4.4.2 Preferences............................................................................................................................ 45
4.5 Troubleshooting ........................................................................................................................ 46
4.5.1 When the remote Powerline devices can not connect or access?............................................ 46
Appendix A Glossary........................................................................................................................................ 48
Appendix B Cabling / Connection..................................................................................................................... 55
FCC Part 68
This equipment complies with Part 68 of the FCC Rules. On the bottom of this equipment is a label that contains
the FCC Registration Number and Ringer Equivalence Number (REN) for this equipment. You must provide this
information to the telephone company upon request.
The REN is useful to determine the quantity of devices you may connect to the telephone line and still have those
entire devices ring when your number is called. In most, but not all areas, the sum of the REN of all devices
connected to one line should not exceed five (5.0). To be certain of the number of devices you may connect to
your line, as determined by the REN, you should contact your local telephone company to determine the
maximum REN for your calling area.
If the modem causes harm to the telephone network, the telephone company may discontinue your service
temporarily.
If possible, they will notify you in advance. But if advance notice isn't practical, you will be notified as soon as
possible.
You will be advised of your right to file a complaint with the FCC.
The telephone company may make changes in its facilities, equipment, operations, or procedures that could
affect the proper operation of your equipment. If they do, you will be notified in advance to give you an opportunity
to maintain uninterrupted telephone service.
If you experience trouble with this modem, please contact your dealer for repair/warranty information. The
telephone company may ask you to disconnect this equipment from the network until the problem has been
corrected or you are sure that the equipment is not malfunctioning.
This equipment may not be used on coin service provided by the telephone company. Connection to party lines is
subject to state tariffs.
FCC Part 15
The modem generates and uses radio frequency energy. If it is not installed and used properly in strict
accordance with the user's manual, it may cause interference with radio and television reception. The modem has
been tested and found to comply with the limits for Class B computing devices in accordance with the
specifications in Subpart B, Part 15 of the FCC regulations. These specifications are designed to provide
reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. FCC regulations require that shielded interface cables be
used with your modem.
If interference does occur, we suggest the following measures be taken to rectify the problem:
1) Move the receiving antenna.
2) Move the modem away from the radio or TV.
3) Plug the modem into a different electrical outlet.
4) Discuss the problem with a qualified radio / TV technician.
CAUTION:
Changes or modifications not expressly approved by the party responsible for compliance to the FCC Rules could
void the user's authority to operate this equipment.
Cable connections:
All equipment connected to this modem must use shielded cable as the interconnection means.
Notes:
Operation is subject to the following two conditions:
1) This device may not cause harmful interference, and
2) This device must accept any interference received including interference that may cause undesired
operation.
Chapter 1 Introduction
Congratulations on your purchase of an Instant Powerline 200M 11n Extender. The Powerline Extender is the
perfect option to connect a small group of PCs or small wireless clients. Integrated Wireless to Powerline
networks, the device can extend large coverage and less dead space for your home network.
1.1 Overview
Integrated with 3 10/100M ports, it will very easy to use as a switch, and combine the wireless and Powerline
function inside. Using Powerline and wireless benefit, you can connect the pc to internet in anywhere of your
home..
1.2 Features
Internet Access
TCP/IP, UDP, ICMP, ARP, RARP, Static IP assignment
Standard
IEEE 802.3, 802.3u Ethernet standards
HomePlug AV
IEEE 802.11b/g Wireless standards
QoS
Prioritized random access, contention-free access and segment bursting
Eight levels of prioritized random access, contention-free access, and segment bursting
Powerline Modulation
OFDM (Orthogonal Frequency Division Multiplexing) with patented signal processing
techniques for high data reliability in noisy media conditions
Supports QAM 256/64/16, DQPSK, DBPSK and ROBO modulation schemes
Security
Provide 128-bit AES link encryption for Powerline network
Wireless Features
Support 802.11b/g and n Wireless Access Point, WDS and AP Client
Support 128-Bit and 64-Bit WEP encryption , 802.1x, WPA, WPA2
Support Wireless operation mode as AP, AP client and WDS
Other
High-Speed Powerline adapter with Ethernet interface for fast data transfer over the
existing household power supply
The high-speed transfer rates of 200Mbps even make it possible to transmit video in DVD quality
No need new wires and use at any power socket with up to ranges of 200 meters
HTTP Web-Based Management
Firmware upgrade by UI
Password protected access
1.3 System Requirements
1) Personal computer (PC)
2) Pentium II 233 MHz processor minimum
3) 32 MB RAM minimum
4) 20 MB of free disk space minimum
5) Ethernet Network Interface Controller (NIC) RJ45 Port
6) Internet Browser
Chapter 2 Installation
This chapter offers information about installing your router. If you are not familiar with the hardware or software
parameters presented here, please consult your service provider for the values needed.
2.1 Checklist
Check the shipping box carefully to ensure that the contents include the items you ordered. If any of the items are
missing or damaged, contact your local distributor. The contents of your carton may vary depending on your
service provider.
Contents description
1) Powerline 200M Wireless-N Extender for home/office use
2) Powerline 200M Wireless-N Extender Installation and Operation Guide (this publication)
3) Power Cord
4) Ethernet cable Ethernet category 5 twisted pair cable (6 ft)
Application for this device
2.2 The Front LEDs
LED State Description
POWER ON Press the button to power one the router.
OP Flashing The router running well.
PL Flashing When the device detect other Powerline devices
ON Link
Flashing TX or RX activity
LAN
No Link
LAN (Local Area Network) port is where you will connect networked device, such as
OFF
PC, print server remote hard drive, and anything else you want to put on your
network.
ON Wireless On
WLAN
Flashing Data transfer between AP and wireless clients
OFF No link.
2.3 The Rear Ports
Connector Description
POWER Connect to power cord.
LAN
Router is successfully connected to a device through the corresponding port.
If the LED is flashing, the Router is actively sending or receiving data over that port.
Secure Button can auto secure and group the Powerline devices.
Antenna There are one detachable antenna with SMA connecter.
2.4 The Bottom Port
Connector Description
Reset Switch
1. Press 2 sec to enable the WPS function.
2. Press 10 sec to reboot the router and restore default settings.
10
Chapter 3 Configuration
3.1 Determine your connection settings
Before you configure the router; you need to know the connection information supplied by your service provider.
3.2 Connecting the Powerline Extender to your network
Unlike a simple hub or switch, the setup of the Powerline Extender consists of more than simply plugging
everything together.
3.3 Configuring with Web Browser
It is advisable to change the administrator password to safeguard the security of your network.
To configure the router, open your browser, type 'http://192.168.16.168' into the address bar and click 'Go' to get
to the login page. Save this address in your Favorites for future reference.
At the Password prompt, the User name is 'admin' and the password is ’admin’. You can change these later if
you wish. Click 'OK' to login.
11
3.3.1 Management IP
You can set IP address at this page.
12
3.4.1 Wireless Basic Settings
WLAN
User can enable or disable the wireless function.
Wireless Mode
Support 802.11b/g/n Mixed, 802.11b/g Mixed, 802.11b, 802.11g, and 802.11n modes.
WLAN Frequency
The channel number is used for wireless network. The channel setting of the wireless devices within a network
should be the same.
WLAN SSID
The identifier set for the wireless network. You can change the SSID. Only devices with the same SSID can
interconnect.
WLAN MAC
You can change the MAC address in this column.
13
3.4.2 Wireless Advance Settings
Hide SSID: Hide SSID to secure your network. Default is disable.
Beacon Period: Choosing beacon period for improved response time for wireless http clients.
DTIM Period: The DTIM period indicated how many beacon frames can transmit before another DTIM is
transmitted.
RTS Threshold: RTS stands for “Request to Send”. This parameter controls what size data packet the low level
RF protocol issues to an RTS packet. Default is 2347.
Fragment Threshold: When transmitting a packet over a network medium, sometimes the packet is broken into
several segments, if the size of packet exceeds that allowed by the network medium. The Fragmentation
Threshold defines the number of bytes used for the fragmentation boundary for directed messages.
Tx Power: TX Power measurement. Default is 100%.
b/g Protection: A protection mechanism prevents collisions among 802.11b/g nodes.
Overlapping Legacy BSS: It’s an option to enable/disable Overlapping Legacy BSS Condition Protection(OLBC)
Short Slot: When short slot is enabled, the wireless device uses the short slot time only when all clients
associated to the 802.11g, 2.4GHz radio supports short slot time. Short slot time is an 802.11g only feature and
does not apply to 802.11a radios.
14
Tx Burst: Enable the transmitted time slot can increase transmission throughput.
Tx Short Preamble: Specify the Preamble type is short preamble or long preamble.
Packet Aggregation: The parameter can be used to increase the delivered bandwidth in community networks
including fixed and mobile stations.
WMM Support: Enable/disable the WMM support.
802.11h Support: Enable/disable the 802.11h support.
Channel Switch Period: If you enable 802.11h Support, specify the channel in beacon value.
HT Operation Mode: Mixed mode operation: In this mode, both the MIMO-OFDM systems and the legacy
systems shall co-exist. The MIMO system should have the capability to generate legacy packets for the legacy
systems and high throughput packets for MIMO-OFDM systems. So, the burst structure should be decodable to
legacy systems and should provide better performance to MIMO-systems.
Green field mode operation: This mode is similar to mixed mode where the transmission happens only between
the MIMO-OFDM systems in the presence of legacy receivers. However, the MIMO-OFDM packets transmitted in
this mode will have only MIMO specific preambles and no legacy format preambles are present.
HT Channel Bandwidth: Specify the channel bandwidth.
HT Guard Interval: Guard-interval is used to reduce interference of multi-path channel. Specify the guard interval
is 400 ns or 800 ns to increase throughput.
HT TX Aggregate MSDU: This option allows aggregation of multiple MSDUs in one MPDU.
15
3.4.3 Wireless Security
In this page not only the authentication mode, but also WDS and AP client can set at here.
This function allows you setup the wireless security. Turn on WEP or WPA by selecting Authentication mode could
prevent any unauthorized access to your wireless network.
WEP
WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from
one end point to another. However, it has been found that WEP is not as secure as once believed.
Select Authentication Mode as Open, Shared, or WEP Auto; and then Specify Encryption. Type as “WEP” can
prompt the setting page.
Default Key ID: Specify which key is used for encryption.
Key1 to Key4: Enter the key value depending on selected ASCII or Hexadecimal.
WPA/WPA2
Wi-Fi Protected Access(WPA and WPA2) is a class of systems to secure wireless computer networks. WPA is
designed to work with all wireless network interface cards, but not necessarily with first generation wireless
access points. WPA2 implements the full standard, but will not work with some older network cards. Both provide
good security, with two significant issues:
16
Ether WPA or WPA2 must be enabled and chosen in preference to WEP. WEP is usually presented as the first
security choice in most installation instructions.
In the “Personal” mode, the most likely choice for homes and small offices, a pass phrase is required that, for full
security, must be longer than the typical 6 to 8 character passwords users are taught employ.
WPA2 Personal
Encryption Type: Select the encryption type (TKIP or AES) for data encryption.
WPA/WPA2 Pre-Shared Key: Pre-shared key mode (PSK, alos known as personal mode) is designed for home
and small office networks that cannot afford the cost and complexity of an 802.1x authentication server. Each user
must enter a pass phrase to access the network. It can be a password like “jeanY-13i”, a pass phrase like “Idaho
hung gear id gene”, or a hexadecimal string like “65E4 E556 8622 EEE1”. A pre shared key is a password which
is entered to access a secure WiFi system sing WEP or WPA. Both the wireless access point (AP) and the client
share the same key.
WPA ReKey Method: Specify the ReKey method (by Time or by Packet). Default is disable.
WPA PeKey Interval: If you enable WPA ReKey method, then specify the interval.
Pairwise Master Key Cache Interval: In the Fast Roaming section, you can configure Pairwise Master Key
(PMK) caching and pre-authentication options. PMK Cache Interval: The number of minutes before deletion (and
renewal) of the Pairwise Master Key used for authentication.
Pre-Authentication Support: According to some of the preferred embodiments, a method for proactively
establishing a security association between a mobile node in a visiting network and an authentication agent in
another network to which the mobile node can move includes: negotiating pre-authentication using a flag in a
message header that indicates security association; and one of the mobile node and the authentication agent
initiating pre-authentication by transmitting a message with the flag set in its message header, and the other of the
mobile node and the authentication agent responding with the flags set in its message header only if it supports
the pre-authentication. Enable/disable pre-authentication support. Default is disable.
WPA/WPA2 Enterprise
Encryption Type: Select the encryption type (TKIP or AES) for data encryption.
WPA ReKey Method: Specify the ReKey method (by Time or by Packet). Default is disable.
WPA PeKey Interval: If you enable WPA ReKey method, then specify the interval.
Pairwise Master Key Cache Interval: In the Fast Roaming section, you can configure Pairwise Master Key
(PMK) caching and pre-authentication options. PMK Cache Interval: The number of minutes before deletion (and
renewal) of the Pairwise Master Key used for authentication.
Pre-Authentication Support: According to some of the preferred embodiments, a method for proactively
establishing a security association between a mobile node in a visiting network and an authentication agent in
another network to which the mobile node can move includes: negotiating pre-authentication using a flag in a
message header that indicates security association; and one of the mobile node and the authentication agent
initiating pre-authentication by transmitting a message with the flag set in its message header, and the other of the
Loading...
+ 39 hidden pages