Compex WP54AG User Manual

ii
© Copyright 2007 Compex Systems Pte Ltd
All Rights Reserved This document contains information, which is protected by copyright. Reproduction, adaptation or translation without prior permission is prohibited, except as allowed under the copyright laws.
Trademark Information
Compex® is a registered trademark of Compex, Inc. Microsoft Windows and the Windows logo are the trademarks of Microsoft Corp. NetWare is the registered trademark of Novell Inc. All other brand and product names are trademarks or registered trademarks of their respective owners. Notice: Copyrights © 2007 by Compex, Inc. All rights reserved. Reproduction, adaptation, or translation without prior permission of Compex, Inc. is prohibited, except as allowed under the copyright laws. Manual Revision by Daniel Manual Number: U-0524-V1.3 Version 1.3January 2007
Disclaimer
Compex, Inc. provides this manual without warranty of any kind, expressed or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose. Compex, Inc. may make improvements and/or changes to the product and/or specifications of the product described in this manual, without prior notice. Compex, Inc will not be liable for any technical inaccuracies or typographical errors found in this guide. Changes are periodically made to the information contained herein and will be incorporated into later versions of the manual. The information contained is subject to change without prior notice.
Your Feedback
We value your feedback. If you find any errors in this user’s manual, or if you have suggestions on improving, we would like to hear from you. Please contact us at:
Fax: (65) 62809947 Email:
feedback@compex.com.sg
FCC NOTICE
This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio or television reception, the user is encouraged to try to correct the interference by one or more of the following measures:
! Reorient or relocate the receiving antenna. ! Connect the computer into an outlet on a circuit different from that to
which the receiver is connected.
! Increase the separation between the computer and receiver. ! Consult the dealer or an experienced radio/TV technician for help.
Caution: Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment.
FCC Compliance Statement: This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation.
Products that contain a radio transmitter are labelled with FCC ID and may also carry the FCC logo.
Caution: Exposure to Radio Frequency Radiation.
To comply with the FCC RF exposure compliance requirements, the following antenna installation and device operating configurations must be satisfied: a. For configurations using the integral antenna, the separation distance
between the antenna(s) and any person’s body (including hands, wrists, feet and ankles) must be at least 2.5cm (1 inch).
b. For configurations using an approved external antenna, the separation
distance between the antenna and any person’s body (including hands, wrists, feet and ankles) must be at least 20cm (8 inch).
The transmitter shall not be collocated with other transmitters or antennas.
iii
ICES 003 Statement This Class B digital apparatus complies with Canadian ICES-003.
Declaration of Conformity
Compex, Inc. declares the following: Product Name: Wireless Access Point with PoE Model No.: WP54AG conforms to the following Product Standards: This device complies with the Electromagnetic Compatibility Directive (89/336/EEC) issued by the Commission of the European Community. Compliance with this directive implies conformity to the following European Norms (in brackets are the equivalent international standards.)
Electromagnetic Interference (Conduction and Radiation) Electromagnetic Immunity Low Voltage Directive:
1996+A11: 1997.
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following the provisions of the EC directive.
Compex, Inc. also declares that: The wireless card in this product complies with the R&TTE Directive (1999/5/EC) issued by the Commission of the European Community. Compliance with this directive implies conformity to the following:
EMC Standards:
(Section 15.247); CE: EN 300 328-2, EN 300 826 (EN 301 489-17)
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following the provisions of the EC directive.
FCC: 47 CFR Part 15, Subpart B, 47 CFR Part 15, Subpart C
: EN 55024 (IEC61000-4-2, 3,4,5,6,8,11)
EN 60 950: 1992+A1: 1993+A2: 1993+A3: 1995+A4:
: EN 55022 (CISPR 22)
iv
Technical Support Information
Contact the technical support centre that services your location.
U.S.A., Canada, Latin America and South America
Write
Compex, Inc. 840 Columbia Street, Suite B Brea, CA 92821, USA
! Call
Fax
Tel: Tel: Fax:
+1 (714) 482-0333 (8 a.m.-5 p.m. Pacific time) +1 (800) 279-8891 (Ext.122 Technical Support) +1 (714) 482-0332
Asia, Australia, New Zealand, Middle East and the rest of the World
Write
Compex Systems Pte Ltd 135, Joo Seng Road #08-01, PM Industrial Building Singapore 368363
! Call
Tel: Tel: Fax:
(65) 6286-1805 (8 a.m.-5 p.m. local time) (65) 6286-2086 (Ext.199 Technical Support) (65) 6283-8337
Internet access/
E-mail: FTPsite:
support@compex.com.sg ftp.compex.com.sg
Website: http://www.cpx.com or http://www.compex.com.sg
Fax
The warranty information and registration form are found in the Quick Install Guide.
For technical support, you may contact Compex or its subsidiaries. For your convenience, you may also seek technical assistance from the local distributor, or from the authorized dealer/reseller that you have purchased this product from. For technical support by email, write to
Refer to the table below for the nearest Technical Support Centres:
support@compex.com.sg.
Technical Support Centres
v
About This Document
The product described in this document, Wireless Access Point with PoE, WP54AG is a licensed product of Compex Systems Pte Ltd. This document contains instructions for installing, configuring and using Access point. It also gives an overview of the key applications and the networking concepts with respect to the product.
This documentation is for both Network Administrators and the end user who possesses some basic knowledge in the networking structure and protocols.
It makes a few assumptions that the host computer has already been installed with TCP/IP and already up & running and accessing the Internet. Procedures for Windows 98SE/ME/2000/XP operating systems are included in this document. However, for other operating system, you may need to refer to your operating system’s documentation for networking.
How to Use this Document
This document may become superseded, in which case you may find its latest version at:
The document is written in such a way that you as a user will find it convenient to find specific information pertaining to the product. It comprises of chapters that explain in details on the installation and configuration of WP54AG.
http://www.compex.com.sg
Firmware
This manual is written based on Firmware version 1.5
vi
Conventions
NOTE
This section will consist of important features or instructions
CAUTION
This section concerns risk of injury, system damage or loss of data
WARNING
This section concerns risk of severe injury
References on Menu Command, Push Button, Radio Button, LED and Label appear in Bold. For example, “Click on Ok.”
In this document, special conventions are used to help and present the information clearly. The Wireless Access Point with PoE is often referred to as WP54AG or access point or AP in this document. Below is a list of conventions used throughout.
vii
Copyrights © 2007 Compex Systems Pte Ltd ................................................................ i
Trademark Information ..................................................................................................... i
Disclaimer............................................................................................................................ i
Your Feedback................................................................................................................... i
FCC NOTICE ........................................................................................................................ii
Declaration of Conformity ...............................................................................................ii
Technical Support Information .......................................................................................iii
About This Document...................................................................................................... iv
How to Use this Document............................................................................................. iv
Firmware ............................................................................................................................ iv
Conventions...................................................................................................................... iv
CHAPTER 1: PRODUCT OVERVIEW..............................................1
Introduction...............................................................................................................1
Features and Benefits..............................................................................................2
When to use which mode ......................................................................................4
Access Point Mode............................................................................................4
Access Point Client Mode ................................................................................5
Point to Point Mode ...........................................................................................6
Point to Multiple point Mode ...........................................................................7
Wireless Routing Client Mode ..........................................................................8
Gateway Mode.................................................................................................. 9
Wireless Adapter Mode ..................................................................................11
CHAPTER 2: HARDWARE INSTALLATION...................................12
Setup Requirements ..............................................................................................12
Hardware Installation ............................................................................................12
OPTION One: Using power adapter to supply power to the unit............12
OPTION Two: Using PoE to supply power to the unit..................................14
Optional: Mounting on the Wall....................................................................17
CHAPTER 3: ACCESS TO WEB-BASED INTERFACE ...................18
Access to the Web interface with uConfig.......................................................18
Manual access to web-based interface via Internet Explorer......................22
CHAPTER 4: COMMON CONFIGURATION ..............................27
Management Port Setup......................................................................................27
viii
Setting up your LAN .........................................................................................28
To view the active DHCP leases....................................................................31
To reserve specific IP addresses for predetermined DHCP clients..........32
WLAN Setup ............................................................................................................35
To configure the Basic setup of the wireless mode ................................... 36
To configure the Security setup of the wireless mode...............................52
To configure the Advanced setup of the wireless mode .........................52
Statistics..............................................................................................................54
WAN Setup ..............................................................................................................61
Telnet/SSH Setup.....................................................................................................69
TELNET Command Line Interface ..................................................................72
Secure Shell Host Command Line Interface ...............................................73
WEB Mode...............................................................................................................75
SNMP Setup.............................................................................................................76
STP Setup..................................................................................................................77
MAC Filtering...........................................................................................................83
Add a MAC address to the MAC Address List............................................83
Delete a MAC address from all access points. .......................................... 87
Delete a MAC address from individual access point................................89
Edit MAC address from the MAC Address List. ...........................................91
CHAPTER 5: WLAN SECURITY .....................................................93
How to set up WEP.................................................................................................94
How to set up WPA-Personal................................................................................96
How to set up 802.1x/RADIUS...............................................................................98
How to set up WPA Enterprise............................................................................100
CHAPTER 6: WIRELESS EXTENDED FEATURES ..........................103
Access Control – The Wireless Pseudo VLAN...................................................103
Wireless Pseudo VLAN Per Node .................................................................104
Wireless Pseudo VLAN Per Group................................................................107
Wireless Setup - The Wireless Distributed System.......................................111
Long Distance Parameters...........................................................................117
CHAPTER 7: ADVANCED CONFIGURATION ..........................120
Routing...................................................................................................................120
To configure Static Routing ..........................................................................122
NAT..........................................................................................................................123
To configure Virtual Servers based on De-Militarized Zone Host ...........124
To configure Virtual Servers based on Port Forwarding ..........................126
ix
To configure Virtual Servers based on IP Forwarding ..............................129
Bandwidth Control...............................................................................................130
To enable or disable Bandwidth Control...................................................130
To configure WAN Bandwidth Control Setting .........................................131
To configure LAN Bandwidth Control Setting ...........................................132
Remote Management........................................................................................134
To set up Remote Management.................................................................134
Parallel Broadband..............................................................................................135
To enable Parallel Broadband.....................................................................136
Email Notification .................................................................................................137
Static Address Translation...................................................................................139
DNS Redirection ...................................................................................................141
To enable/disable DNS Redirection............................................................143
Dynamic DNS Setup ............................................................................................143
To enable/disable Dynamic DNS Setup.....................................................144
To manage Dynamic DNS List......................................................................144
CHAPTER 8: SECURITY CONFIGURATION ...............................150
Packet Filtering .....................................................................................................150
To configure Packet Filtering........................................................................150
URL Filtering ...........................................................................................................154
To configure URL Filtering..............................................................................154
Firewall Configuration .........................................................................................155
To configure SPI Firewall................................................................................155
Firewall Logs ..........................................................................................................159
To view Firewall Logs......................................................................................159
CHAPTER 9: SYSTEM UTILITIES ...................................................160
Using the SYSTEM TOOLS Menu..........................................................................160
Ping Utility.........................................................................................................160
Syslog................................................................................................................161
System Identity................................................................................................164
System Clock Setup .......................................................................................165
Firmware Upgrade .........................................................................................166
Backup or Reset Settings ..............................................................................168
Reboot System................................................................................................171
Change Password..........................................................................................172
Logout ..............................................................................................................173
Using the HELP menu ...........................................................................................174
Get Technical Support ..................................................................................174
About System..................................................................................................175
x
APPENDIX I: FIRMWARE RECOVERY .......................................176
APPENDIX II: TCP/IP CONFIGURATION...................................178
For Windows 95/98/98SE/ME/NT ..................................................................178
For Windows XP/2000.....................................................................................181
APPENDIX III: PANEL VIEWS & DESCRIPTIONS........................184
APPENDIX IV: COMMAND LINE INTERFACE COMMANDS...187
APPENDIX V: TECHNICAL SPECIFICATIONS ...........................192
xi
CChhaapptteerr11::PPrroodduuccttOOvveerrvviieew
w
I
NNTTRROODDUUCCTTIIOON
I
The Wireless Access Point is a high-performance access point (AP) that is designed for enterprise and public access applications. Embedded with the Atheros chipset, it boasts network robustness, stability and wider network coverage. Based on 802.11g and 802.11a, the access point supports high­speed data transmission of up to 54Mbps in the 2.4GHz and 5GHz frequency band.
The access point is capable of operating in 7 modes: Access Point, Access Point Client, Point-to-Point, Point-to-Multi Point, Wireless Routing Client, Gateway and Wireless Adapter. Which makes it suitable for a wide variety of wireless applications, including long-distance deployments.
Equipped with an SMA connector for external antenna support, the access point provides a wider coverage for your network. Moreover, its integrated Power over Ethernet (PoE) allows the access point to be used in areas where power outlets are not readily available.
To protect your security and privacy, the access point is armed with many enhanced wireless security features such as Wi-Fi Protected Access (WPA), WPA2 (with Advanced Encryption Standard encryption) MAC Address Filtering, IEEE 802.1x Authentication and 64/128-bit WEP (Wired Equivalent Privacy) to ensure privacy for the heterogeneous mix of users within the same wireless network.
The access point also incorporates a unique set of advanced features such as: Wireless Distribution System (WDS) to wirelessly link associated access points together and extend network coverage, Long-Range parameter fine-tuning which provide the access point with the ability to auto-calculate parameters such as slot time, ACK time-out and CTS time-out to achieve a longer range; Spanning Tree Protocol (STP) which provides extra redundancy and the ability to auto-reconfigure when there are changes in the network topology; Pseudo VLAN which enables the creation of wireless isolated nodes or workgroups of wireless clients to enhance security in a public access wireless network; HTTPS which feature additional authentication and encryption; and Telnet which allows remote connection; and SSH which provides a secure host connection.
N
1
F
EEAATTUURREESSAANND
F
The access point has been designed for high performance and offers a rich suite of features, with which you should acquaint yourself to be able to exploit your access point’s full potential.
D
B
EENNEEFFIITTS
B
S
!!WWiirreelleessssDDiissttrriibbuuttiioonnSSyysstteemm((WWDDSS)
This feature allows linking of several access points, virtually creating a larger network infrastructure that allows mobile users to roam wirelessly, while still being able to access network resources.
P
!!WWiirreelleessssP
The unique Wireless Pseudo VLAN technology is a feature that allows wireless clients to be segmented individually or into workgroups, thus blocking access to another user’s/group’s PCs, and enhancing the privacy of the wireless clients. This is especially useful in public hotspot deployment.
!!HHiigghhllyySSeeccuurreeddWWiirreelleessssNNeettwwoorrk
The access point supports the highest available wireless security standard: Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-Personal for SOHO users and WPA2-Enterprise for Enterprise users. The access point also supports IEEE 802.1x for secure and centralized user-based authentication. Wireless clients are thus required to authenticate through highly secure methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to the network.
!SSmmaarrttSSeelleecctt
!
This feature will automatically scan and recommend the best channel that the access point can utilize.
!!uuCCoonnffiiggUUttiilliitty
The exclusive uConfig utility allows users to access the user-friendly Web configuration interface of the access point without having to change the TCP/IP setup of the workstation.
sseeuuddooVVLLAAN
y
N
)
k
P
!!SSTTP
Spanning-Tree Protocol provides path redundancy while preventing undesirable loops in the network. It forces certain redundant data paths into a standby (blocked) state. If one network segment in the Spanning-Tree Protocol becomes unreachable, or if Spanning-Tree Protocol costs change, the spanning-tree algorithm reconfigures the spanning-tree topology and re-establishes the link by activating the standby path.
2
!!HHTTTTPPS
S
The access point supports HTTPS (SSL) in addition to the standard HTTP. HTTP (SSL) features additional authentication and encryption for secure communication.
!!TTeellnneet
!!SSSSH
t
Telnet allows a computer to remotely connect to the access point CLI (Command Line Interface) for control and monitoring.
H
SSH (Secure Shell Host) establishes a secure host connection to the access point CLI for control and monitoring.
3
W
In the example above, the wireless users will be able to access the file server connected to the switch through the access point in Access Point mode.
HHEENNTTOOUUSSEEWWHHIICCHHMMOODDE
W
The access point is versatile in the sense that it may operate in six different types of modes: Access Point Mode, Client Mode, Point to Point, Point to Multiple Point, Wireless Routing Client and Gateway.
This section presents a brief outline of the different network applications that can be accommodated through the different modes of the access point.
E
A
CCCCEESSS
A
This is the default mode of your access point. The Access Point mode enables you to bridge wireless clients to access the wired network infrastructure and to communicate with each other.
P
S
P
OOIINNT
M
T
M
OODDE
E
4
A
In the example above, the workgroup PCs will be able to access the printer connected to the access point in Access Point Client mode.
CCCCEESSS
A
In Access Point Client mode, the device acts as a wireless client. When connected to an access point, it will create a network link between the Ethernet network connected at this client device, and the wireless and Ethernet network connected at the access point.
In this mode it can only connect with an access point. Other wireless clients cannot connect with it directly unless connected to the same access point ­allowing them to communicate with all devices connected at the Ethernet port of the access point.
P
S
P
OOIINNT
C
T
C
LLIIEENNT
M
T
M
OODDE
E
5
P
In the example above, you may configure two access points (AP) to perform transparent bridging between two buildings
OOIINNTTTTO
P
In Point to Point mode, the access point allows point-to-point communication between different buildings. It enables you to bridge wireless clients that are kilometres apart while unifying the networks.
P
O
P
OOIINNT
M
T
M
OODDE
E
6
P
The above illustration describes how this mode operates.
OOIINNTTTTO
P
In Point to Multiple Point mode, this mode is similar to that of the Point-to-Point mode. But the access point located at one facility is able to connect to up to 8 access points (AP) installed in any direction from that facility.
M
O
UULLTTIIPPLLEEPPOOIINNT
M
M
T
M
OODDE
E
7
W
The above illustration describes how this mode operates.
IIRREELLEESSS
W
An application of this mode would be for the Ethernet port of the Wireless Routing Client to be used for connection with other devices on the network
while access to the Internet would be achieved through wireless communication with wireless ISP.
R
S
R
OOUUTTIINNG
C
G
C
LLIIEENNT
M
T
M
OODDE
E
8
G
Static IP address
Use this type of connection if you have subscribed to a fixed IP address or to a range of fixed IP addresses from your Internet Service Provider.
Dynamic IP address
When powered using this type of connection, the access point requests for an IP address which will be automatically assigned to it by your Internet Service Provider.
This type of connection applies for instance to:
! Singapore Cable Vision subscribers ! @HOME Cable Service users
AATTEEWWAAY
G
Or put it more simply, Broadband Internet sharing in a wireless network!
Since the access point supports several types of broadband connections, the first step in setting up the access point as a Broadband Internet Gateway is to identify the type of broadband Internet access you are subscribed to.
M
Y
M
OODDE
E
9
PPP over Ethernet (PPPoE)
Select this type of connection if you are using ADSL services in a country utilising standard PPP over Ethernet for authentication.
For instance: If you are in Germany which uses T-1 connection or If you are using SingNet Broadband or Pacific Internet Broadband in Singapore.
PPTP
Select this type of connection if you are using ADSL services in a country utilising PPTP connection and authentication.
L2TP
Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best features of two other tunneling protocols: PPTP from Microsoft and L2F from Cisco Systems.
10
W
IIRREELLEESSS
W
Similarly to the Access Point Client mode, the access point used in this mode, is able to communicate wirelessly with another access point to perform transparent bridging between two networks.
However here, the Wireless Adapter connects a single wired workstation only. No client software or drivers are required while using this mode.
A
S
A
DDAAPPTTEER
M
R
M
OODDE
E
11
12
CChhaapptteerr22::HHaarrddwwaarreeIInnssttaallllaattiioon
n
S
S
EETTUUP
P
R
R
EEQQUUIIRREEMMEENNTTS
S
Before starting, please verify that the following is available:
! CAT5/5e networking cable ! At least one computer is installed with a Web browser and a wired or
wireless network interface adapter
! TCP/IP protocol is installed and IP address parameters are properly
configured on all your network’s nodes
H
H
AARRDDWWAARRE
E
I
I
NNSSTTAALLLLAATTIIOON
N
The access point can be powered using either the power adapter provided or a PoE Injector. The installation process for both options is described below.
OOPPTTIIOONNO
O
NNE
E
::U
U
SSIINNGGPPOOWWEERRAADDAAPPTTEERRTTOOSSUUPPPPLLYYPPOOWWEERRTTOOTTHHEEUUNNIIT
T
SStteepp11:
:
Connect the external antenna to the SMA connector of the access point.
SStteepp33:
:
Attach the power adapter to the main electrical supply, and connect the power plug into the socket of the access point.
SStteepp44:
:
Turn ON the power supply and power ON your PC. Notice that the LEDs: Power and Port 1 or 2 (depending on which port you have connected the RJ45 Ethernet cable to) have lighted up. This indicates that connection has been established successfully between your access point and your PC.
PC
SStteepp22:
Insert one end of the Ethernet cable to any of the Ethernet ports on your access point, and the other end of the cable to your PC’s Ethernet network adapter.
:
13
T
SStteepp22:
:
Use an RJ45 Ethernet cable to connect one end of the cable to the LAN OUT port of the Injector and the other end to Ethernet port 1 of the access point.
U
O
OOPPTTIIOONNT
The access point is fully compatible with a Power-Over-Ethernet (PoE) kit. A PoE accessory supplies operational power to the wireless AP via the Ethernet cable connection.
Users who have already purchased a PoE and who wish to use it to supply power to the access point may follow the installation procedures shown below:
WWO
::U
SSIINNG
P
E
G
O
O
TTOOSSUUPPPPLLYYPPOOWWEERRTTOOTTHHEEUUNNIIT
P
E
T
SStteepp11:
Connect the external antenna to the SMA connector of the access point.
:
14
SStteepp33:
SStteepp44:
:
Connect the power adapter supplied in the PoE kit to the main electrical supply and the power plug into the socket of the injector.
Note:
The voltage and current supplied to the power adapter and the PoE kit power adapter are different. Do not interchange the power adapters.
Next, connect the RJ45 Ethernet cable attached to the PoE Injector to your PC’s Ethernet network adapter.
Once you have finished configuring your access point, you can connect the PoE Injector’s RJ45 Ethernet cable to your network device, such as to a switch or hub.
:
15
SStteepp55:
Turn on your power supply. Notice that the Power LED has lighted up. This indicates that the access point is receiving power through the PoE Injector. Notice also that the corresponding port LEDs have lighted up. This indicates that connection between your access point and your PC has been established.
:
16
O
SStteepp22:
:
Align the unit and mount to the wall. Use the mount as a guide, make 2 marks and drill 2 holes into the wall.
SStteepp33:
:
Next, secure the unit and mount to the wall.
PPTTIIOONNAAL
O
M
L
OOUUNNTTIINNGGOONNTTHHE
::M
W
E
L
AALLL
W
SStteepp11:
Screw the mount onto the unit.
:
17
CChhaapptteerr33::AAcccceessssttooWWeebb--bbaasseed
d
U
e
C
C
G
OONNFFIIG
IInntteerrffaacce
There are two methods to access to the web-based Interface of your access point:
!!TThhrroouugghhoouurrUUttiilliittyy––uuCCoonnffiig
You can access to the web-based interface directly without the need to assign a different IP address to your PC.
t
!!BByyeenntteerriinnggt
EExxpplloorreer
You need to assign an IP address to your PC, such as 192.168.168.x, where x can take any value from 2 to 254, so that it is in the same subnet as Access point.
A
CCCCEESSSSTTOOTTHHE
A
The powerful uConfig utility has been designed to give you direct access to the Web interface.
SStteepp11:
Insert the Product CD into your CD-ROM drive. The CD will run automatically.
SStteepp22:
From the UUttiilliittiieess section, select to install the uuCCoonnffiigg utility to your hard disk.
:
:
hheeIIPPaaddddrreessssooffAAcccceessssppooiinnttiinntthheeaaddddrreessssbbaarrooffIInntteerrnneet
r
E
W
EEBBIINNTTEERRFFAACCEEWWIITTHHU
W
g
t
18
SStteepp33:
SStteepp44:
:
Select the access point in the products list and click on the OOppeennWWeebb button. To retrieve and display the latest device(s) in the list, click on the RReeffrreesshh button.
When the utility has been installed, double-click on the uuCCoonnffiigg icon. The following screen will appear, click on the
:
s button to proceed.
YYees
19
Loading...
+ 175 hidden pages