All Rights Reserved
This document contains information, which is protected by copyright.
Reproduction, adaptation or translation without prior permission is prohibited,
except as allowed under the copyright laws.
Compex, Inc. provides this manual without warranty of any kind, expressed or
implied, including but not limited to the implied warranties of merchantability
and fitness for a particular purpose. Compex, Inc. may make improvements
and/or changes to the product and/or specifications of the product described
in this manual, without prior notice. Compex, Inc will not be liable for any
technical inaccuracies or typographical errors found in this guide. Changes are
periodically made to the information contained herein and will be
incorporated into later versions of the manual. The information contained is
subject to change without prior notice.
Your Feedback
We value your feedback. If you find any errors in this user’s manual, or if you
have suggestions on improving, we would like to hear from you. Please contact
us at:
Fax: (65) 62809947
Email:
feedback@compex.com.sg
FCC NOTICE
This device has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This device generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
device does cause harmful interference to radio or television reception, the
user is encouraged to try to correct the interference by one or more of the
following measures:
! Reorient or relocate the receiving antenna.
! Connect the computer into an outlet on a circuit different from that to
which the receiver is connected.
! Increase the separation between the computer and receiver.
! Consult the dealer or an experienced radio/TV technician for help.
Caution: Any changes or modifications not expressly approved by the grantee
of this device could void the user's authority to operate the equipment.
FCC Compliance Statement: This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
This device may not cause harmful interference, and
This device must accept any interference received, including interference that
may cause undesired operation.
Products that contain a radio transmitter are labelled with FCC ID and may also
carry the FCC logo.
Caution: Exposure to Radio Frequency Radiation.
To comply with the FCC RF exposure compliance requirements, the following
antenna installation and device operating configurations must be satisfied:
a. For configurations using the integral antenna, the separation distance
between the antenna(s) and any person’s body (including hands, wrists,
feet and ankles) must be at least 2.5cm (1 inch).
b. For configurations using an approved external antenna, the separation
distance between the antenna and any person’s body (including hands,
wrists, feet and ankles) must be at least 20cm (8 inch).
The transmitter shall not be collocated with other transmitters or antennas.
iii
ICES 003 Statement
This Class B digital apparatus complies with Canadian ICES-003.
Declaration of Conformity
Compex, Inc. declares the following:
Product Name: Wireless Access Point with PoE
Model No.: WP54AG conforms to the following Product Standards:
This device complies with the Electromagnetic Compatibility Directive
(89/336/EEC) issued by the Commission of the European Community.
Compliance with this directive implies conformity to the following European
Norms (in brackets are the equivalent international standards.)
Electromagnetic Interference (Conduction and Radiation)
Electromagnetic Immunity
Low Voltage Directive:
1996+A11: 1997.
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following
the provisions of the EC directive.
Compex, Inc. also declares that:
The wireless card in this product complies with the R&TTE Directive (1999/5/EC)
issued by the Commission of the European Community. Compliance with this
directive implies conformity to the following:
EMC Standards:
(Section 15.247); CE: EN 300 328-2, EN 300 826 (EN 301 489-17)
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following
the provisions of the EC directive.
FCC: 47 CFR Part 15, Subpart B, 47 CFR Part 15, Subpart C
: EN 55024 (IEC61000-4-2, 3,4,5,6,8,11)
EN 60 950: 1992+A1: 1993+A2: 1993+A3: 1995+A4:
: EN 55022 (CISPR 22)
iv
Technical Support Information
Contact the technical support centre that services your location.
U.S.A., Canada, Latin America and South America
Write
Compex, Inc.
840 Columbia Street, Suite B
Brea, CA 92821, USA
Website:http://www.cpx.com or http://www.compex.com.sg
Fax
The warranty information and registration form are found in the Quick Install
Guide.
For technical support, you may contact Compex or its subsidiaries. For your
convenience, you may also seek technical assistance from the local distributor,
or from the authorized dealer/reseller that you have purchased this product
from. For technical support by email, write to
Refer to the table below for the nearest Technical Support Centres:
support@compex.com.sg.
Technical Support Centres
v
About This Document
The product described in this document, Wireless Access Point with PoE,
WP54AG is a licensed product of Compex Systems Pte Ltd. This document
contains instructions for installing, configuring and using Access point. It also
gives an overview of the key applications and the networking concepts with
respect to the product.
This documentation is for both Network Administrators and the end user who
possesses some basic knowledge in the networking structure and protocols.
It makes a few assumptions that the host computer has already been installed
with TCP/IP and already up & running and accessing the Internet. Procedures
for Windows 98SE/ME/2000/XP operating systems are included in this document.
However, for other operating system, you may need to refer to your operating
system’s documentation for networking.
How to Use this Document
This document may become superseded, in which case you may find its latest
version at:
The document is written in such a way that you as a user will find it convenient
to find specific information pertaining to the product. It comprises of chapters
that explain in details on the installation and configuration of WP54AG.
http://www.compex.com.sg
Firmware
This manual is written based on Firmware version 1.5
vi
Conventions
NOTE
This section will consist of important features or instructions
CAUTION
This section concerns risk of injury, system damage or loss of data
WARNING
This section concerns risk of severe injury
References on Menu Command, Push Button, Radio Button, LED and Label
appear in Bold. For example, “Click on Ok.”
In this document, special conventions are used to help and present the
information clearly. The Wireless Access Point with PoE is often referred to as
WP54AG or access point or AP in this document. Below is a list of conventions
used throughout.
The Wireless Access Point is a high-performance access point (AP) that is
designed for enterprise and public access applications. Embedded with the
Atheros chipset, it boasts network robustness, stability and wider network
coverage. Based on 802.11g and 802.11a, the access point supports highspeed data transmission of up to 54Mbps in the 2.4GHz and 5GHz frequency
band.
The access point is capable of operating in 7 modes: Access Point, Access Point Client, Point-to-Point, Point-to-Multi Point, Wireless Routing Client, Gateway
and Wireless Adapter. Which makes it suitable for a wide variety of wireless
applications, including long-distance deployments.
Equipped with an SMA connector for external antenna support, the access
point provides a wider coverage for your network. Moreover, its integrated
Power over Ethernet (PoE) allows the access point to be used in areas where
power outlets are not readily available.
To protect your security and privacy, the access point is armed with many
enhanced wireless security features such as Wi-Fi Protected Access (WPA),
WPA2 (with Advanced Encryption Standard encryption) MAC Address Filtering,
IEEE 802.1x Authentication and 64/128-bit WEP (Wired Equivalent Privacy) to
ensure privacy for the heterogeneous mix of users within the same wireless
network.
The access point also incorporates a unique set of advanced features such as:
Wireless Distribution System (WDS) to wirelessly link associated access points
together and extend network coverage, Long-Range parameter fine-tuning
which provide the access point with the ability to auto-calculate parameters
such as slot time, ACK time-out and CTS time-out to achieve a longer range;
Spanning Tree Protocol (STP) which provides extra redundancy and the ability
to auto-reconfigure when there are changes in the network topology; Pseudo
VLAN which enables the creation of wireless isolated nodes or workgroups of
wireless clients to enhance security in a public access wireless network; HTTPS
which feature additional authentication and encryption; and Telnet which
allows remote connection; and SSH which provides a secure host connection.
N
1
F
EEAATTUURREESSAANND
F
The access point has been designed for high performance and offers a rich
suite of features, with which you should acquaint yourself to be able to exploit
your access point’s full potential.
This feature allows linking of several access points, virtually creating a larger
network infrastructure that allows mobile users to roam wirelessly, while still
being able to access network resources.
P
!!WWiirreelleessssP
The unique Wireless Pseudo VLAN technology is a feature that allows wireless
clients to be segmented individually or into workgroups, thus blocking
access to another user’s/group’s PCs, and enhancing the privacy of the
wireless clients. This is especially useful in public hotspot deployment.
The access point supports the highest available wireless security standard:
Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-Personal for
SOHO users and WPA2-Enterprise for Enterprise users. The access point also
supports IEEE 802.1x for secure and centralized user-based authentication.
Wireless clients are thus required to authenticate through highly secure
methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to
the network.
!SSmmaarrttSSeelleecctt
!
This feature will automatically scan and recommend the best channel that
the access point can utilize.
!!uuCCoonnffiiggUUttiilliitty
The exclusive uConfig utility allows users to access the user-friendly Web
configuration interface of the access point without having to change the
TCP/IP setup of the workstation.
sseeuuddooVVLLAAN
y
N
)
k
P
!!SSTTP
Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data paths into
a standby (blocked) state. If one network segment in the Spanning-Tree
Protocol becomes unreachable, or if Spanning-Tree Protocol costs change,
the spanning-tree algorithm reconfigures the spanning-tree topology and
re-establishes the link by activating the standby path.
2
!!HHTTTTPPS
S
The access point supports HTTPS (SSL) in addition to the standard HTTP.
HTTP (SSL) features additional authentication and encryption for secure
communication.
!!TTeellnneet
!!SSSSH
t
Telnet allows a computer to remotely connect to the access point CLI
(Command Line Interface) for control and monitoring.
H
SSH (Secure Shell Host) establishes a secure host connection to the access
point CLI for control and monitoring.
3
W
In the example above, the wireless users will be able to access the file server
connected to the switch through the access point in Access Point mode.
HHEENNTTOOUUSSEEWWHHIICCHHMMOODDE
W
The access point is versatile in the sense that it may operate in six different types
of modes: Access Point Mode, Client Mode, Point to Point, Point to Multiple Point, Wireless Routing Client and Gateway.
This section presents a brief outline of the different network applications that
can be accommodated through the different modes of the access point.
E
A
CCCCEESSS
A
This is the default mode of your access point. The Access Point mode enables
you to bridge wireless clients to access the wired network infrastructure and to
communicate with each other.
P
S
P
OOIINNT
M
T
M
OODDE
E
4
A
In the example above, the workgroup PCs will be able to access the printer
connected to the access point in Access Point Client mode.
CCCCEESSS
A
In Access Point Client mode, the device acts as a wireless client.
When connected to an access point, it will create a network link between the
Ethernet network connected at this client device, and the wireless and Ethernet
network connected at the access point.
In this mode it can only connect with an access point. Other wireless clients
cannot connect with it directly unless connected to the same access point allowing them to communicate with all devices connected at the Ethernet port
of the access point.
P
S
P
OOIINNT
C
T
C
LLIIEENNT
M
T
M
OODDE
E
5
P
In the example above, you may configure two access points (AP) to perform
transparent bridging between two buildings
OOIINNTTTTO
P
In Point to Point mode, the access point allows point-to-point communication
between different buildings. It enables you to bridge wireless clients that are
kilometres apart while unifying the networks.
P
O
P
OOIINNT
M
T
M
OODDE
E
6
P
The above illustration describes how this mode operates.
OOIINNTTTTO
P
In Point to Multiple Point mode, this mode is similar to that of the Point-to-Point
mode. But the access point located at one facility is able to connect to up to 8
access points (AP) installed in any direction from that facility.
M
O
UULLTTIIPPLLEEPPOOIINNT
M
M
T
M
OODDE
E
7
W
The above illustration describes how this mode operates.
IIRREELLEESSS
W
An application of this mode would be for the Ethernet port of the Wireless
Routing Client to be used for connection with other devices on the network
while access to the Internet would be achieved through wireless
communication with wireless ISP.
R
S
R
OOUUTTIINNG
C
G
C
LLIIEENNT
M
T
M
OODDE
E
8
G
Static IP address
Use this type of connection if you have subscribed to a fixed IP address or to a
range of fixed IP addresses from your Internet Service Provider.
Dynamic IP address
When powered using this type of connection, the access point requests for an
IP address which will be automatically assigned to it by your Internet Service
Provider.
This type of connection applies for instance to:
!Singapore Cable Vision subscribers
!@HOME Cable Service users
AATTEEWWAAY
G
Or put it more simply, Broadband Internet sharing in a wireless network!
Since the access point supports several types of broadband connections, the
first step in setting up the access point as a Broadband Internet Gateway is to
identify the type of broadband Internet access you are subscribed to.
M
Y
M
OODDE
E
9
PPP over Ethernet (PPPoE)
Select this type of connection if you are using ADSL services in a country utilising
standard PPP over Ethernet for authentication.
For instance:
If you are in Germany which uses T-1 connection or
If you are using SingNet Broadband or Pacific Internet Broadband in Singapore.
PPTP
Select this type of connection if you are using ADSL services in a country utilising
PPTP connection and authentication.
L2TP
Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that
enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best
features of two other tunneling protocols: PPTP from Microsoft and L2F from
Cisco Systems.
10
W
IIRREELLEESSS
W
Similarly to the Access Point Client mode, the access point used in this mode, is
able to communicate wirelessly with another access point to perform
transparent bridging between two networks.
However here, the Wireless Adapter connects a single wired workstation only.
No client software or drivers are required while using this mode.
Before starting, please verify that the following is available:
! CAT5/5e networking cable
! At least one computer is installed with a Web browser and a wired or
wireless network interface adapter
! TCP/IP protocol is installed and IP address parameters are properly
configured on all your network’s nodes
H
H
AARRDDWWAARRE
E
I
I
NNSSTTAALLLLAATTIIOON
N
The access point can be powered using either the power adapter provided or
a PoE Injector. The installation process for both options is described below.
Connect the external antenna to the SMA connector of the access point.
SStteepp33:
:
Attach the power adapter to the main electrical supply, and connect the
power plug into the socket of the access point.
SStteepp44:
:
Turn ON the power supply and power ON your PC. Notice that the LEDs: Power
and Port 1 or 2 (depending on which port you have connected the RJ45
Ethernet cable to) have lighted up. This indicates that connection has been
established successfully between your access point and your PC.
PC
SStteepp22:
Insert one end of the Ethernet cable to any of the Ethernet ports on your
access point, and the other end of the cable to your PC’s Ethernet network
adapter.
:
13
T
SStteepp22:
:
Use an RJ45 Ethernet cable to connect one end of the cable to the LAN OUT
port of the Injector and the other end to Ethernet port 1 of the access point.
U
O
OOPPTTIIOONNT
The access point is fully compatible with a Power-Over-Ethernet (PoE) kit. A PoE
accessory supplies operational power to the wireless AP via the Ethernet cable
connection.
Users who have already purchased a PoE and who wish to use it to supply
power to the access point may follow the installation procedures shown below:
WWO
::U
SSIINNG
P
E
G
O
O
TTOOSSUUPPPPLLYYPPOOWWEERRTTOOTTHHEEUUNNIIT
P
E
T
SStteepp11:
Connect the external antenna to the SMA connector of the access point.
:
14
SStteepp33:
SStteepp44:
:
Connect the power adapter supplied in the PoE kit to the main electrical
supply and the power plug into the socket of the injector.
Note:
The voltage and current supplied to the power adapter and the PoE kit power
adapter are different. Do not interchange the power adapters.
Next, connect the RJ45 Ethernet cable attached to the PoE Injector to your
PC’s Ethernet network adapter.
Once you have finished configuring your access point, you can connect the
PoE Injector’s RJ45 Ethernet cable to your network device, such as to a switch
or hub.
:
15
SStteepp55:
Turn on your power supply. Notice that the Power LED has lighted up. This
indicates that the access point is receiving power through the PoE Injector.
Notice also that the corresponding port LEDs have lighted up. This indicates
that connection between your access point and your PC has been
established.
:
16
O
SStteepp22:
:
Align the unit and mount to the wall.
Use the mount as a guide, make 2 marks and drill 2 holes into the wall.
You can access to the web-based interface directly without the need to
assign a different IP address to your PC.
t
!!BByyeenntteerriinnggt
EExxpplloorreer
You need to assign an IP address to your PC, such as 192.168.168.x, where x
can take any value from 2 to 254, so that it is in the same subnet as Access
point.
A
CCCCEESSSSTTOOTTHHE
A
The powerful uConfig utility has been designed to give you direct access to the
Web interface.
SStteepp11:
Insert the Product CD into your CD-ROM drive. The CD will run automatically.
SStteepp22:
From the UUttiilliittiieess section, select to install the uuCCoonnffiigg utility to your hard disk.
Select the access point in the products list and click on the OOppeennWWeebb button.
To retrieve and display the latest device(s) in the list, click on the RReeffrreesshh
button.
When the utility has been installed, double-click on the uuCCoonnffiigg icon. The
following screen will appear, click on the
:
s button to proceed.
YYees
19
Loading...
+ 175 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.