All Rights Reserved
This document contains information, which is protected by copyright.
Reproduction, adaptation or translation without prior permission is prohibited,
except as allowed under the copyright laws.
Compex, Inc. provides this manual without warranty of any kind, expressed or
implied, including but not limited to the implied warranties of merchantability
and fitness for a particular purpose. Compex, Inc. may make improvements
and/or changes to the product and/or specifications of the product described
in this manual, without prior notice. Compex, Inc will not be liable for any
technical inaccuracies or typographical errors found in this guide. Changes are
periodically made to the information contained herein and will be
incorporated into later versions of the manual. The information contained is
subject to change without prior notice.
Your Feedback
We value your feedback. If you find any errors in this user’s manual, or if you
have suggestions on improving, we would like to hear from you. Please contact
us at:
Fax: (65) 62809947
Email:
feedback@compex.com.sg
FCC NOTICE
This device has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This device generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
device does cause harmful interference to radio or television reception, the
user is encouraged to try to correct the interference by one or more of the
following measures:
! Reorient or relocate the receiving antenna.
! Connect the computer into an outlet on a circuit different from that to
which the receiver is connected.
! Increase the separation between the computer and receiver.
! Consult the dealer or an experienced radio/TV technician for help.
Caution: Any changes or modifications not expressly approved by the grantee
of this device could void the user's authority to operate the equipment.
FCC Compliance Statement: This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
This device may not cause harmful interference, and
This device must accept any interference received, including interference that
may cause undesired operation.
Products that contain a radio transmitter are labelled with FCC ID and may also
carry the FCC logo.
Caution: Exposure to Radio Frequency Radiation.
To comply with the FCC RF exposure compliance requirements, the following
antenna installation and device operating configurations must be satisfied:
a. For configurations using the integral antenna, the separation distance
between the antenna(s) and any person’s body (including hands, wrists,
feet and ankles) must be at least 2.5cm (1 inch).
b. For configurations using an approved external antenna, the separation
distance between the antenna and any person’s body (including hands,
wrists, feet and ankles) must be at least 20cm (8 inch).
The transmitter shall not be collocated with other transmitters or antennas.
iii
ICES 003 Statement
This Class B digital apparatus complies with Canadian ICES-003.
Declaration of Conformity
Compex, Inc. declares the following:
Product Name: Wireless Access Point with PoE
Model No.: WP54AG conforms to the following Product Standards:
This device complies with the Electromagnetic Compatibility Directive
(89/336/EEC) issued by the Commission of the European Community.
Compliance with this directive implies conformity to the following European
Norms (in brackets are the equivalent international standards.)
Electromagnetic Interference (Conduction and Radiation)
Electromagnetic Immunity
Low Voltage Directive:
1996+A11: 1997.
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following
the provisions of the EC directive.
Compex, Inc. also declares that:
The wireless card in this product complies with the R&TTE Directive (1999/5/EC)
issued by the Commission of the European Community. Compliance with this
directive implies conformity to the following:
EMC Standards:
(Section 15.247); CE: EN 300 328-2, EN 300 826 (EN 301 489-17)
Therefore, this product is in conformity with the following regional standards:
FCC Class B: following the provisions of FCC Part 15 directive, CE Mark: following
the provisions of the EC directive.
FCC: 47 CFR Part 15, Subpart B, 47 CFR Part 15, Subpart C
: EN 55024 (IEC61000-4-2, 3,4,5,6,8,11)
EN 60 950: 1992+A1: 1993+A2: 1993+A3: 1995+A4:
: EN 55022 (CISPR 22)
iv
Technical Support Information
Contact the technical support centre that services your location.
U.S.A., Canada, Latin America and South America
Write
Compex, Inc.
840 Columbia Street, Suite B
Brea, CA 92821, USA
Website:http://www.cpx.com or http://www.compex.com.sg
Fax
The warranty information and registration form are found in the Quick Install
Guide.
For technical support, you may contact Compex or its subsidiaries. For your
convenience, you may also seek technical assistance from the local distributor,
or from the authorized dealer/reseller that you have purchased this product
from. For technical support by email, write to
Refer to the table below for the nearest Technical Support Centres:
support@compex.com.sg.
Technical Support Centres
v
About This Document
The product described in this document, Wireless Access Point with PoE,
WP54AG is a licensed product of Compex Systems Pte Ltd. This document
contains instructions for installing, configuring and using Access point. It also
gives an overview of the key applications and the networking concepts with
respect to the product.
This documentation is for both Network Administrators and the end user who
possesses some basic knowledge in the networking structure and protocols.
It makes a few assumptions that the host computer has already been installed
with TCP/IP and already up & running and accessing the Internet. Procedures
for Windows 98SE/ME/2000/XP operating systems are included in this document.
However, for other operating system, you may need to refer to your operating
system’s documentation for networking.
How to Use this Document
This document may become superseded, in which case you may find its latest
version at:
The document is written in such a way that you as a user will find it convenient
to find specific information pertaining to the product. It comprises of chapters
that explain in details on the installation and configuration of WP54AG.
http://www.compex.com.sg
Firmware
This manual is written based on Firmware version 1.5
vi
Conventions
NOTE
This section will consist of important features or instructions
CAUTION
This section concerns risk of injury, system damage or loss of data
WARNING
This section concerns risk of severe injury
References on Menu Command, Push Button, Radio Button, LED and Label
appear in Bold. For example, “Click on Ok.”
In this document, special conventions are used to help and present the
information clearly. The Wireless Access Point with PoE is often referred to as
WP54AG or access point or AP in this document. Below is a list of conventions
used throughout.
The Wireless Access Point is a high-performance access point (AP) that is
designed for enterprise and public access applications. Embedded with the
Atheros chipset, it boasts network robustness, stability and wider network
coverage. Based on 802.11g and 802.11a, the access point supports highspeed data transmission of up to 54Mbps in the 2.4GHz and 5GHz frequency
band.
The access point is capable of operating in 7 modes: Access Point, Access Point Client, Point-to-Point, Point-to-Multi Point, Wireless Routing Client, Gateway
and Wireless Adapter. Which makes it suitable for a wide variety of wireless
applications, including long-distance deployments.
Equipped with an SMA connector for external antenna support, the access
point provides a wider coverage for your network. Moreover, its integrated
Power over Ethernet (PoE) allows the access point to be used in areas where
power outlets are not readily available.
To protect your security and privacy, the access point is armed with many
enhanced wireless security features such as Wi-Fi Protected Access (WPA),
WPA2 (with Advanced Encryption Standard encryption) MAC Address Filtering,
IEEE 802.1x Authentication and 64/128-bit WEP (Wired Equivalent Privacy) to
ensure privacy for the heterogeneous mix of users within the same wireless
network.
The access point also incorporates a unique set of advanced features such as:
Wireless Distribution System (WDS) to wirelessly link associated access points
together and extend network coverage, Long-Range parameter fine-tuning
which provide the access point with the ability to auto-calculate parameters
such as slot time, ACK time-out and CTS time-out to achieve a longer range;
Spanning Tree Protocol (STP) which provides extra redundancy and the ability
to auto-reconfigure when there are changes in the network topology; Pseudo
VLAN which enables the creation of wireless isolated nodes or workgroups of
wireless clients to enhance security in a public access wireless network; HTTPS
which feature additional authentication and encryption; and Telnet which
allows remote connection; and SSH which provides a secure host connection.
N
1
F
EEAATTUURREESSAANND
F
The access point has been designed for high performance and offers a rich
suite of features, with which you should acquaint yourself to be able to exploit
your access point’s full potential.
This feature allows linking of several access points, virtually creating a larger
network infrastructure that allows mobile users to roam wirelessly, while still
being able to access network resources.
P
!!WWiirreelleessssP
The unique Wireless Pseudo VLAN technology is a feature that allows wireless
clients to be segmented individually or into workgroups, thus blocking
access to another user’s/group’s PCs, and enhancing the privacy of the
wireless clients. This is especially useful in public hotspot deployment.
The access point supports the highest available wireless security standard:
Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-Personal for
SOHO users and WPA2-Enterprise for Enterprise users. The access point also
supports IEEE 802.1x for secure and centralized user-based authentication.
Wireless clients are thus required to authenticate through highly secure
methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to
the network.
!SSmmaarrttSSeelleecctt
!
This feature will automatically scan and recommend the best channel that
the access point can utilize.
!!uuCCoonnffiiggUUttiilliitty
The exclusive uConfig utility allows users to access the user-friendly Web
configuration interface of the access point without having to change the
TCP/IP setup of the workstation.
sseeuuddooVVLLAAN
y
N
)
k
P
!!SSTTP
Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data paths into
a standby (blocked) state. If one network segment in the Spanning-Tree
Protocol becomes unreachable, or if Spanning-Tree Protocol costs change,
the spanning-tree algorithm reconfigures the spanning-tree topology and
re-establishes the link by activating the standby path.
2
!!HHTTTTPPS
S
The access point supports HTTPS (SSL) in addition to the standard HTTP.
HTTP (SSL) features additional authentication and encryption for secure
communication.
!!TTeellnneet
!!SSSSH
t
Telnet allows a computer to remotely connect to the access point CLI
(Command Line Interface) for control and monitoring.
H
SSH (Secure Shell Host) establishes a secure host connection to the access
point CLI for control and monitoring.
3
W
In the example above, the wireless users will be able to access the file server
connected to the switch through the access point in Access Point mode.
HHEENNTTOOUUSSEEWWHHIICCHHMMOODDE
W
The access point is versatile in the sense that it may operate in six different types
of modes: Access Point Mode, Client Mode, Point to Point, Point to Multiple Point, Wireless Routing Client and Gateway.
This section presents a brief outline of the different network applications that
can be accommodated through the different modes of the access point.
E
A
CCCCEESSS
A
This is the default mode of your access point. The Access Point mode enables
you to bridge wireless clients to access the wired network infrastructure and to
communicate with each other.
P
S
P
OOIINNT
M
T
M
OODDE
E
4
A
In the example above, the workgroup PCs will be able to access the printer
connected to the access point in Access Point Client mode.
CCCCEESSS
A
In Access Point Client mode, the device acts as a wireless client.
When connected to an access point, it will create a network link between the
Ethernet network connected at this client device, and the wireless and Ethernet
network connected at the access point.
In this mode it can only connect with an access point. Other wireless clients
cannot connect with it directly unless connected to the same access point allowing them to communicate with all devices connected at the Ethernet port
of the access point.
P
S
P
OOIINNT
C
T
C
LLIIEENNT
M
T
M
OODDE
E
5
P
In the example above, you may configure two access points (AP) to perform
transparent bridging between two buildings
OOIINNTTTTO
P
In Point to Point mode, the access point allows point-to-point communication
between different buildings. It enables you to bridge wireless clients that are
kilometres apart while unifying the networks.
P
O
P
OOIINNT
M
T
M
OODDE
E
6
P
The above illustration describes how this mode operates.
OOIINNTTTTO
P
In Point to Multiple Point mode, this mode is similar to that of the Point-to-Point
mode. But the access point located at one facility is able to connect to up to 8
access points (AP) installed in any direction from that facility.
M
O
UULLTTIIPPLLEEPPOOIINNT
M
M
T
M
OODDE
E
7
W
The above illustration describes how this mode operates.
IIRREELLEESSS
W
An application of this mode would be for the Ethernet port of the Wireless
Routing Client to be used for connection with other devices on the network
while access to the Internet would be achieved through wireless
communication with wireless ISP.
R
S
R
OOUUTTIINNG
C
G
C
LLIIEENNT
M
T
M
OODDE
E
8
G
Static IP address
Use this type of connection if you have subscribed to a fixed IP address or to a
range of fixed IP addresses from your Internet Service Provider.
Dynamic IP address
When powered using this type of connection, the access point requests for an
IP address which will be automatically assigned to it by your Internet Service
Provider.
This type of connection applies for instance to:
!Singapore Cable Vision subscribers
!@HOME Cable Service users
AATTEEWWAAY
G
Or put it more simply, Broadband Internet sharing in a wireless network!
Since the access point supports several types of broadband connections, the
first step in setting up the access point as a Broadband Internet Gateway is to
identify the type of broadband Internet access you are subscribed to.
M
Y
M
OODDE
E
9
PPP over Ethernet (PPPoE)
Select this type of connection if you are using ADSL services in a country utilising
standard PPP over Ethernet for authentication.
For instance:
If you are in Germany which uses T-1 connection or
If you are using SingNet Broadband or Pacific Internet Broadband in Singapore.
PPTP
Select this type of connection if you are using ADSL services in a country utilising
PPTP connection and authentication.
L2TP
Short for Layer Two (2) Tunneling Protocol, an extension to the PPP protocol that
enables ISPs to operate Virtual Private Networks (VPNs). L2TP merges the best
features of two other tunneling protocols: PPTP from Microsoft and L2F from
Cisco Systems.
10
W
IIRREELLEESSS
W
Similarly to the Access Point Client mode, the access point used in this mode, is
able to communicate wirelessly with another access point to perform
transparent bridging between two networks.
However here, the Wireless Adapter connects a single wired workstation only.
No client software or drivers are required while using this mode.
Before starting, please verify that the following is available:
! CAT5/5e networking cable
! At least one computer is installed with a Web browser and a wired or
wireless network interface adapter
! TCP/IP protocol is installed and IP address parameters are properly
configured on all your network’s nodes
H
H
AARRDDWWAARRE
E
I
I
NNSSTTAALLLLAATTIIOON
N
The access point can be powered using either the power adapter provided or
a PoE Injector. The installation process for both options is described below.
Connect the external antenna to the SMA connector of the access point.
SStteepp33:
:
Attach the power adapter to the main electrical supply, and connect the
power plug into the socket of the access point.
SStteepp44:
:
Turn ON the power supply and power ON your PC. Notice that the LEDs: Power
and Port 1 or 2 (depending on which port you have connected the RJ45
Ethernet cable to) have lighted up. This indicates that connection has been
established successfully between your access point and your PC.
PC
SStteepp22:
Insert one end of the Ethernet cable to any of the Ethernet ports on your
access point, and the other end of the cable to your PC’s Ethernet network
adapter.
:
13
T
SStteepp22:
:
Use an RJ45 Ethernet cable to connect one end of the cable to the LAN OUT
port of the Injector and the other end to Ethernet port 1 of the access point.
U
O
OOPPTTIIOONNT
The access point is fully compatible with a Power-Over-Ethernet (PoE) kit. A PoE
accessory supplies operational power to the wireless AP via the Ethernet cable
connection.
Users who have already purchased a PoE and who wish to use it to supply
power to the access point may follow the installation procedures shown below:
WWO
::U
SSIINNG
P
E
G
O
O
TTOOSSUUPPPPLLYYPPOOWWEERRTTOOTTHHEEUUNNIIT
P
E
T
SStteepp11:
Connect the external antenna to the SMA connector of the access point.
:
14
SStteepp33:
SStteepp44:
:
Connect the power adapter supplied in the PoE kit to the main electrical
supply and the power plug into the socket of the injector.
Note:
The voltage and current supplied to the power adapter and the PoE kit power
adapter are different. Do not interchange the power adapters.
Next, connect the RJ45 Ethernet cable attached to the PoE Injector to your
PC’s Ethernet network adapter.
Once you have finished configuring your access point, you can connect the
PoE Injector’s RJ45 Ethernet cable to your network device, such as to a switch
or hub.
:
15
SStteepp55:
Turn on your power supply. Notice that the Power LED has lighted up. This
indicates that the access point is receiving power through the PoE Injector.
Notice also that the corresponding port LEDs have lighted up. This indicates
that connection between your access point and your PC has been
established.
:
16
O
SStteepp22:
:
Align the unit and mount to the wall.
Use the mount as a guide, make 2 marks and drill 2 holes into the wall.
You can access to the web-based interface directly without the need to
assign a different IP address to your PC.
t
!!BByyeenntteerriinnggt
EExxpplloorreer
You need to assign an IP address to your PC, such as 192.168.168.x, where x
can take any value from 2 to 254, so that it is in the same subnet as Access
point.
A
CCCCEESSSSTTOOTTHHE
A
The powerful uConfig utility has been designed to give you direct access to the
Web interface.
SStteepp11:
Insert the Product CD into your CD-ROM drive. The CD will run automatically.
SStteepp22:
From the UUttiilliittiieess section, select to install the uuCCoonnffiigg utility to your hard disk.
Select the access point in the products list and click on the OOppeennWWeebb button.
To retrieve and display the latest device(s) in the list, click on the RReeffrreesshh
button.
When the utility has been installed, double-click on the uuCCoonnffiigg icon. The
following screen will appear, click on the
:
s button to proceed.
YYees
19
SStteepp55:
SStteepp66:
:
At the login page, press the LLOOGGIINN!! button to enter the configuration page.
The default password is “password”.
Do not exit the uConfig program while accessing to the web-based interface.
This will disconnect you from the device. Click on the
:
K button to proceed.
OOK
20
SStteepp77:
You will then reach the home page of your access point’s web-based
interface.
:
21
M
AANNUUAALLAACCCCEESSSSTTOOWWEEB
M
E
XXPPLLOORREER
E
For this method, you need to assign an IP address to your PC so that it belongs
to the same subnet as your access point. In this example, we are using Windows
XP for illustration. For Windows 98/98SE/2000/NT/ME, kindly refer to Appendix II
“TCP/IP Configuration”.
R
B
-
BBAASSEEDDIINNTTEERRFFAACCEEVVIIA
-
A
I
NNTTEERRNNEET
I
T
SStteepp11:
Go to your desktop, right-click on MMyyNNeettwwoorrkkPPllaacceess icon and select
PPrrooppeerrttiiees
SStteepp22:
Go to your network adapter icon, right click and select PPrrooppeerrttiieess.
:
s.
:
22
SStteepp33:
SStteepp44:
:
Select the radio button for UUsseetthheeffoolllloowwiinnggIIPPaaddddrreessss. Enter the IP Address
and Subnet Mask as 192.168.168.x and 255.255.255.0, where x can be any
number from 2 to 254, except 1. In this example, we are using 192.168.168.160
as the static IP Address.
Highlight IInntteerrnneettPPrroottooccooll((TTCCPP//IIPP)) and click on the PPrrooppeerrttiieess button.
:
23
SStteepp55:
Your PC is now ready to configure your access point.
SStteepp77:
:
Launch your Web browser. Under the TToooollss tab, select IInntteerrnneettOOppttiioonnss.
Click on the OOKK button to close all windows.
:
SStteepp66:
Next, in order to check if the IP address has been correctly assigned to your
PC, go to
command ipconfig/all.
:
t menu, AAcccceessssoorriieess, select CCoommmmaannddPPrroommpptt and type the
SSttaarrt
24
SStteepp88:
Open the CCoonnnneeccttiioonnss tab and in the LLAANNSSeettttiinnggss section, disable all the
option boxes. Click on the
:
K button to update the changes.
OOK
SStteepp99:
At the AAddddrreessss bar, enter http://192.168.168.1 and press EEnntteerr on your
keyboard.
SStteepp1100:
At the login page, click on the LLOOGGIINN!! button to enter the configuration
pages.
:
:
25
26
You will then reach the home page of your access point’s Web interface.
This section shows you how to customize the parameters of your access point to
suit the needs of your network. It also explains how to make use of the built-in
DHCP server of your access point.
p
P
t
p
y
r
iitty
g
liiggnnmmeenntt
T
P
OORRT
P
T
S
S
EETTUUP
P
the
27
S
SStteepp22:
:
Click on the AAppppllyy button to save your new parameters.
EETTTTIINNGGUUPPYYOOUUR
S
You can opt to adjust the default values of your access point and customize
them to your network settings.
R
N
LLAAN
SStteepp11:
Click on MMaannaaggeemmeennttPPoorrtt from the CCOONNFFIIGGUURRAATTIIOONN menu.
In the MMaannaaggeemmeennttPPoorrttSSeettuupp page, refer to the table below to replace the
default settings of Access point with appropriate values to suit the needs of
your network.
:
28
This table describes the parameters that can be modified in the Management
Description
IP Address When the DHCP server of the access point is enabled (unless you
set a different DHCP Gateway IP Address), this LAN IP Address
would be allocated as the Default Gateway of the DHCP client.
The IP address of your Access point is set by default to
192.168.168.1.
Network Mask The Network Mask serves to identify the subnet in which your
Access point resides. The default network mask is 255.255.255.0.
Management
Gateway IP
(Optional) As a bridge Access Point, the access point does not
usually communicate with devices on other IP subnets. However,
the Management Gateway here acts as the equivalent of the
Default Gateway of a PC, to allow the access point to
communicate with devices on different subnets. For instance, if
you want to access the access point from the Internet or from a
router on the LAN, enter the router IP address in the
Management Gateway IP field.
The Management Gateway IP address of your access point is set
to nil by default.
The next two fields (DHCP Start IP Address and DHCP End IP Address) allow you to define
the range of IP addresses from which the DHCP Server can assign an IP address to the
LAN.
DHCP Start IP
Address
This is the first IP address that the DHCP server will assign. The
value that you input here should belong to the same subnet as
your access point. For example, if the IP address and network
mask of your access point are 192.168.168.1 and 255.255.255.0
respectively, the DHCP Start IP Address should be 192.168.168.X,
where X can take any value from 2 to 254. It is pre-set to
192.168.168.100.
DHCP End IP
Address
This is the last IP address that the DHCP server can assign. It
should also belong to the same subnet as your access point. For
instance, if the IP address and network mask of your access point
are 192.168.168.1 and 255.255.255.0 respectively, the DHCP End
IP Address should be 192.168.168.X, where X can take any value
from 2 to 254. It is pre-set as 192.168.168.254.
Port Setup page.
Parameters
29
Description
DHCP Gateway IP
Address
Though usually, the DHCP server also acts as the Default
Gateway of the DHCP client, the access point gives you the
option to define a different Gateway IP Address, which will be
allocated as the Default Gateway IP of the DHCP client. The
DHCP client will thus receive its dynamic IP address from the
access point but will access to the Internet or to the other LAN
through the Default Gateway defined by the DHCP Gateway IP
Address.
For instance, if the access point is used in Access Point Client
mode and connects to an Internet gateway,
X, a PC wired to
the access point will be unable to obtain a dynamic IP address
directly from
X. But if you can enable the DHCP server of the
access point and set the IP address of
X as the DHCP Gateway IP
Address, the PC will then obtain its IP address from the access
point and access the Internet through
X.
Always use these
DNS servers
Enable this checkbox if you want the access point to only use
the DNS server(s) you have specified below.
Primary DNS IP
Address
Your ISP usually provides the IP address of the DNS server.
Secondary DNS IP
Address
This optional field is reserved for the IP address of a secondary
DNS server.
DHCP Server If you disable the DHCP server, you will need to manually
configure the TCP/IP parameters of each computer in your
network.
Parameters
30
T
The DHCP Active Leases table displays:
!The Host Name of the DHCP client
!The IP Address that has been allocated to the DHCP client
!Its Hardware (MAC) Address
!The Lease Expired Time.
NOTE
Invalid date and time displayed in the Lease Expired Time column
indicates that the clock of your access point has not been properly
set. Please refer to the SYSTEM TOOLS section for more details on
how to set the system clock.
OOVVIIEEWWTTHHEEAACCTTIIVVE
T
The following will guide you to a page display of the active IP address leases
that have been allocated by the built-in DHCP server of Access point.
E
DDHHCCP
P
LLEEAASSEES
S
SStteepp11:
Click on MMaannaaggeemmeennttPPoorrtt from the CCOONNFFIIGGUURRAATTIIOONN menu.
SStteepp22:
Go to the AAddvvaanncceeddDDHHCCPPSSeerrvveerrOOppttiioonnss section, click on the SShhoowwAAccttiivvee
DDHHCCPPlleeaasse
:
:
e
s button.
s
31
T
SStteepp22:
:
Click on AAdddd button.
OORREESSEERRVVEESSPPEECCIIFFIIC
T
Making an IP address reservation lets you inform the DHCP server to exclude
that specific address from the pool of free IP addresses it draws on for dynamic
IP address allocation.
For instance, if you set up a publicly accessible FTP/HTTP server within your
private LAN, while that server would require a fixed IP address, you would still
want the DHCP server to dynamically allocate IP addresses to the rest of the
PCs on the LAN.
The following shows you how to reserve a particular IP address.
P
C
AADDDDRREESSSSEESSFFOORRPPRREEDDEETTEERRMMIINNEED
IIP
D
DDHHCCP
P
CCLLIIEENNTTS
S
SStteepp11:
From the AAddvvaanncceeddDDHHCCPPSSeerrvveerr Options section, click on the DDHHCCPPSSeerrvveerr
RReesseerrvvaattiioonns
:
s button.
32
SStteepp33:
The DDHHCCPPSSeerrvveerrRReesseerrvvaattiioonnss page will then be refreshed to illustrate the
currently reserved IP addresses.
Fill in:
The host portion of the IP Address to reserve.
The Hardware Address, in pairs of two hex values
:
Press the
y button to make your new entry effective.
AApppplly
33
D
SStteepp22:
:
Click on the DDeelleettee button.
The DDHHCCPPSSeerrvveerrRReesseerrvvaattiioonnss table will then be refreshed to reflect your
changes.
E
EELLEETTE
D
If you do not need the DHCP server to reserve an IP address anymore, you
can delete the DHCP Server Reservation.
DDHHCCPPS
S
EERRVVEERRRREESSEERRVVAATTIIOON
N
SStteepp11:
Click on the reserved IP address that you wish to delete, e.g. 192.168.168.20.
:
34
P
S
WWLLAANNS
This section shows how to perform the following functions:
Basic
This function performs a basic setup of the wireless modes of operation: Access
Point mode, Access Point Client mode and other operating modes.
EETTUUP
:
Security
This function performs data encryption and protection for the access point.
Kindly refer to Chapter 5 on WLAN Security for details.
Advanced
This function furthers the basic configuration of the access point by setting the
system’s additional parameters: Wireless Pseudo VLAN, WDS Configuration and
Long Distance Parameters.
Kindly refer to Chapter 6 on Wireless Extended Features for details.
Statistics
This function uses the Scan Feature to monitor and interpret the statistics data
collected.
MAC Filtering
MAC Filtering acts as a security measure by restricting the users accessing to
the network through their MAC address.
Antenna Alignment
It is a tool for aligning outdoor antenna between 2 access points over long
distances. The signal level can be checked from the web page and also from
the DIAG LED indicator.
:
:
:
(only applicable to Access Point mode):
:
35
T
OOCCOONNFFIIGGUURREETTHHE
T
The following will guide you to configure the basic setup of the wireless mode
you have selected.
If you wish to change the current mode of your access point, click on
CChhaanngge
access the setup page of your selected mode. Then you are prompted to
reboot the access point so as to effect the mode setting.
e, select your OOppeerraattiioonnMMooddee and click on the AAppppllyy button to
)
37
SStteepp33:
If you wish to set the access point in the PPooiinntt--ttoo--PPooiinntt mode, click on CChhaannggee
to select PPooiinnttttooPPooiinntt, and then you will see the page below.
Enter the parameters in their respective fields, click on the AAppppllyy button and
reboot your device to let your changes take effect.
:
Note that the
that of the Access Point mode.
WWLLAANNBBaassiiccSSeettuup
p page for the Client mode is different from
38
If you wish to set the access point in the PPooiinnttttooMMuullttiipplleePPooiinntt mode, click on
To create a new peer MAC, click on the PPeeeerrMMAACCLLiisstt button. The page will
appear. ( Please take note that PtMP stands for Point to Multiple Point ).
Click on AAdddd, and then you are prompted to key in HHaarrddwwaarreeAAddddrreessss and
CCoommmmeennt
t.
CChhaanngge
below.
e to select PPooiinnttttooMMuullttiipplleePPoo
t, and then you will see the page
iinnt
39
This table describes the parameters that can be modified in the WWLLAANNBBaassiicc
Description
The Current Mode The default operating mode of the access point is the
Access Point mode. The access point can operate in 6
modes:
! Access Point
! Client
! Point to Point
! Point to Multiple Point
! Wireless Routing Client
! Gateway
! Wireless Adapter
You can toggle the mode by clicking on the CChhaannggee
button.
ESSIDEnter a preferred name for the wireless network. Your
wireless clients must be configured with the same ESSID.
This case-sensitive entry can consist of a maximum of 32
characters.
Site Survey
A list of wireless devices that are detected by your
access point in the WLAN. Information such as MAC
address, channel, SSID, algorithm and signal strength can
be found in the listing.
This feature is supported by the Access Point Client and
Wireless Routing Client modes.
Wireless Profile A selection of network environment types in which to
operate the access point:
!!880022..1111aaoonnlly
y
This mode supports wireless A clients with data rates of up
to 54Mbps in the frequency range of 5.4GHz.
!!880022..1111bboonnlly
y
This mode supports wireless B clients with data rates of up
to 11Mbps in the frequency range of 2.4GHz.
p page.
SSeettuup
Parameters
40
!!880022..1111bb//ggmmiixxeed
This mode supports both wireless B and G clients.
d
!!880022..1111ggoonnlly
This mode supports wireless-G clients that offer
transmission rates of up to 54Mbps in the 2.4GHz
frequency band.
Peer Mac ( Only in
Point-to-Point
mode )
Peer MACs (Only
in Point-toMultiple Point
mode)
CountryChoose the Country where you are located.
ChannelThis option allows you to select a frequency channel for
This mode can support more than one access point. This
feature allows you to create a new peer MAC for
another access point so that the router operating in the
access point mode can connect to another access
point.
This mode can support multiple access points. This
feature allows you to create multiple peer MAC
addresses so that the router can connect to multiple
access points.
the wireless communication. This parameter is only
available in the Access Point, Point to Point and Point to
Multiple Point modes.
Select SmartSelect to automatically scan and
recommend the best channel that the access point can
utilize.
y
Tx Rate Allow you to choose the rate of data transmission from
1Mbps to Fully Auto.
Closed System The access point will not broadcast its WLAN name
(ESSID) when Closed system is enabled. By default
Closed system is disabled.
Channel Survey
A list of channels that are detected by your access point
in the WLAN. Information such as frequency, channel,
MyQuality, NeighQuality, APCount and
Recommendation can be found in the listing.
The Access Point and Gateway modes support this
feature.
41
S
The SSiitteeSSuurrvveeyy provides a list of the MMAACCaaddddrreesssseess((BBSSSSIIDD)) andSSSSIIDD of
neighbouring access points detected, the
CChhaan
n (channels), AAuutthh
(Authentication), AA
l
lgg (Algorithm) used, and the strength of the SSiiggnnaall
received.
CCAANNFFOOR
S
O
Y
NNLLY
((O
S
S
R
E
IITTE
S
F
C
R
OOR
F
C
UURRVVEEY
S
LLIIEENNT
M
T
M
Y
OODDEEAANND
D
W
IIRREELLEESSS
W
R
S
R
OOUUTTIINNG
C
M
G
C
LLIIEENNT
T
M
OODDE
)
E
)
SStteepp11:
In the MMooddeeSSeettuupp page, click on the SSiitteeSSuurrvveeyy button.
:
42
SStteepp22:
Description
BssidIn an infrastructure wireless network, the BSSID refers to
the wireless MAC address of the access point.
SSIDRefers to the network name that uniquely identifies the
network to which the access point is connected.
ChanRefers to the channel being used for transmission.
AuthRefers to the types of authentication, such as WPA, WPA-
Personal, etc being used by the access point.
AlgRefers to the types of algorithm, such as WEP, TKIP, etc
being used by the access point.
SignalDescribes the strength of the signal received in
percentage.
To connect the client to one of the access points detected:
Select the radio button corresponding to the access point you want to
connect to.
:
SStteepp33:
Click on the AAppppllyy button to effect the change and return to the setup
page.
SStteepp44:
Click on the RReeffrreesshh button to update this screen.
This table describes the read-only parameters of neighbouring access points
that can be viewed from the Site Survey page.
Parameters
:
:
43
NOTE
The purpose of using Site Survey is to scan and display all access
points based on the current security setting of your access point.
For instance, the following information supplied by the Site Survey
according to the security setting is explained:
!If the security mode is set to None or WEP, the scan will show
all available access points that have no security or WEP
security
!If the security mode is set to WPA-Personal, the scan will show
all available access points having all types of security from no
security, WEP security to WPA-Personal security.
44
S
TheLLiinnkkIInnffoorrmmaattiioonn table illustrates the following data:
HHOOW
S
O
((O
W
NNLLY
L
IINNK
L
F
Y
OOR
F
I
K
NNFFOORRMMAATTIIOON
I
C
R
T
LLIIEENNT
C
M
OODDEEAANND
M
N
W
D
W
IIRREELLEESSS
R
S
R
OOUUTTIINNG
C
G
C
LLIIEENNTTMMOODDE
)
E
)
SStteepp11:
To view the connection status when the client is linked to another access
point, click on the
:
SShhoowwLLiinnkkIInnffoorrmmaattiioon
n button.
45
This table describes the parameters that can be viewed from the LLiinnkk
Description
StateRefers to the MAC address of the BSS (AP to which the
client is connected).
Current Channel The channel that is being presently used for transmission.
Tx Rate The rate of data transmission in Mbps.
Signal Strength Given in percentage, showing the intensity of the signal
received.
IInnffoorrmmaattiioon
Parameters
n page.
46
S
The CChhaannnneellSSuurrvveeyy provides a list of the FFrreeqq (frequency) and CChhaannnneell of
the access point detected, the
AAPPCCoouunntt,MMyyQQuuaalliitty
y (your access point’s
interference from your access point’s channel signal) received and
NNeeiig
g
hhQQuuaalliitty
y (interference from the neighbouring access points’ channel
signals) received.
CCAANNFFOOR
S
(
AAVVAAIILLAABBLLE
(
Channel Survey provides a list of all channels that are supported by the access
point. This feature will show relative interference of all channels and
recommend the least congested channel.
When the users want to scan for and find the best channel, they can use
Channel Survey.
R
E
C
HHAANNNNEEL
C
F
OOR
F
R
A
CCCCEESSS
A
S
L
S
UURRVVEEY
P
S
P
Y
OOIINNT
M
T
M
OODDEEAANND
D
G
AATTEEWWAAY
G
M
M
OODDE
)
E
)
Y
SStteepp11:
In the MMooddeeSSeettuupp page, click on the CChhaannnneellSSuurrvveeyy button.
:
47
The values indicate the level of interference.
The higher the value, the higher the interference.
If the value is zero, there is no interference.
SStteepp55:
:
To connect the client to one of the channels detected, select the radio
button corresponding to the channel you want to connect to.
SStteepp66:
:
Click on the AAppppllyy button to effect the change and return to the setup
page.
SStteepp77:
:
Click on the RReeffrreesshh button to update this screen.
48
This table describes the read-only parameters of all channels that can be
Description
FreqRefers to the frequency of the channel at which your
access point is operating.
ChannelRefers to the channel of the access point being used for
transmission depending on its origin of country.
MyQuality
Indicates the interference level of the respective channel
with this AP.
The lower the value, the less interference.
APCountRefers to the total number of access points operating at
the current channel.
NeighQuality
Indicates the interference level with those discovered
APs at those respective channels.
The lower the value, the less interference.
Recommendation
Indicates the best channel for the AP device to use in its
current environment.
viewed from the Channel Survey page.
Parameters
49
A
SStteepp22:
:
If you wish to specify the MAC address of the remote AP, key in the field next
to
RReemmootteeAAPPAAddddrreessss((ooppttiioonn)
), followed by executing the SSttaarrtt button. Then
the pop-up status screen will show up, allowing you to monitor the signal
strength received from the remote access points.
If there is no specified AP with
its MAC address you have
keyed in, the screen below will
show on the right. To abort or
key in the MAC address of the
other available remote AP,
click on the
SSttoop
p button.
NNTTEENNNNA
A
(
AAVVAAIILLAABBLLE
(
The Antenna Alignment feature in the access point is designed to precisely
align the antenna over such a long distance so that the connectivity
communication between your access point and another remote or
neighbouring access point could be improved as indicated by higher signal
strength.
A
A
A
F
E
LLIIGGNNMMEENNT
A
R
L
OOR
LLL
F
A
M
M
T
OODDEES
)
S
)
SStteepp11:
Click on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the submenus expanded under WWLLAANNSSeettuupp. Click on AAnntteennnnaaAAlliiggnnmmeenntt. The
AAnntteennnnaaAAlliiggnnmmeennt
communication with a remote device. The remote AP MAC Address is
preset to all zeros by default.
:
t page can act as a diagnostic tool to check the
50
NOTE
If no MAC address is entered, the Antenna Alignment tool will
make use of the SSID to align the antenna. Please make sure that
the correct SSID is entered. If more than one access point (AP)
share the same SSID, the Antenna Alignment tool will show the
strongest signal AP.
The DIAG LED indicates the signal strength as described below:
Signal Strength
(RSSI Value)
Status of DIAG LED
Above 20 Stays turned ON
Between 19 and 17 Flashes 6 times
Between 17 and 14 Flashes 3 times
Between 13 and 10 Flashes ONCE
Below 10 Turns OFF
NOTE
The signal strength of below RSSI of 10 is not recommended for
outdoor long distance connection.
!
NOTE: To ensure proper functionality of the device, select to
Stop after performing antenna alignment.
Alternatively, you may also reboot the device.
51
T
OOCCOONNFFIIGGUURREETTHHE
T
Kindly refer to Chapter 5 on WLAN Security for details on setting the different
security modes of the access point.
beacon transmissions. A beacon is a guidance signal
sent by the access point to announce its presence to
other devices in the network.
Before a client enters the power-save mode, it needs the
beacon interval to know when to wake up to receive the
beacon (and learn whether there are buffered frames at
the access point).
Data Beacon Rate
(DTIM)
(Only in Access
Point mode)
The Data Beacon Rate (DTIM) determines how often the
beacon contains a delivery traffic indication message
(DTIM). The DTIM identifies which clients (in power-save
mode) have data frames waiting for them in the access
point’s buffer.
If the beacon period is set at 100 (default value), and the
data beacon rate is set at 1 (default value), then the
access point sends a beacon containing a DTIM every
100 K"secs (1 K"sec equals 1,024 "sec).
RTS/CTS Threshold The RTS/CTS Threshold value determines the minimum size
of a packet in bytes that would trigger the RTS/CTS
mechanism.
Frag Threshold The Frag Threshold value indicates the maximum size that
a packet can reach without being fragmented.
This value extends from 256 to 2346 bytes, where a value
of 0 indicates that all the packets should be transmitted
using RTS.
Transmit Power The Transmit Power drop-down list lets you pick from a
range of transmission power.
Radio Off When
Ethernet Link
Down
The Radio Off When Ethernet Link Down function detects
when the Ethernet link is down and disables the radio card
automatically.
This table describes the parameters that can be modified in the WWLLAANN
AAddvvaanncceeddSSeettuup
p page.
Parameters
53
Antenna Control
NOTE
The values illustrated in the examples are suggested values for
their respective parameters.
S
S
TTAATTIISSTTIICCS
S
The following shows you the information on the wireless device that is
connected to the WLAN.
I
I
N
N
A
A
CCCCEESSS
S
P
P
OOIINNTTMMOODDE
E
SStteepp11:
:
Click on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the submenus expanded under
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
Wireless clients that are connected to the WLAN are shown in the WLAN
Station List.
SStteepp22:
:
Click on the RReeffrreesshh button to get the latest information on the availability of
wireless clients in the wireless network.
The Antenna Control function allows you to control whether to
use the:
!Main antenna
!Aux (auxiliary) antenna
!Auto (Default), to monitor the signal from each
antenna and automatically switch to the one with
better signal
54
SStteepp33:
To check the details on individual wireless client, click on the MAC Address in
the WLAN Station List.
The following screen will show the statistics of the selected wireless client.
:
55
I
In CClliieenntt mode, you are not allowed to view other wireless clients’ statistics. To
view other wireless clients information, you need to change to Access Point
mode.
C
N
N
I
C
LLIIEENNTTMMOODDE
E
Click on
WWLLAANNSSeettuup
menus expanded under
p from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
56
I
N
N
I
P
OOIINNTTTTO
P
P
O
OOIINNTTMMOODDE
P
E
Click on
WWLLAANNSSeettuup
p from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-
menus expanded under
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
57
I
N
N
I
PPOOIINNTTTTOOMMUULLTTIIPPLLEEPPOOIINNT
T
MMOODDE
E
Click on
WWLLAANNSSeettuup
p from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-
menus expanded under
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
58
I
W
N
N
I
W
IIRREELLEESSS
R
S
R
OOUUTTIINNG
C
G
LLIIEENNTTMMOODDE
C
E
Click on
WWLLAANNSSeettuup
p from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-
menus expanded under
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
59
I
To view the statistics information if a wireless client connected to the AP, click
on the MAC address of that client.
G
N
N
AATTEEWWAAYYMMOODDE
I
G
E
Click on
WWLLAANNSSeettuup
p from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-
menus expanded under
WWLLAANNSSeettuup
p. Click on SSttaattiissttiiccss.
60
P
The access point is pre-configured to support a WAN type that dynamically
obtains an IP address from the ISP. However, you may verify the WAN settings with
the following steps:
Step 1: Under
CCOONNFFIIGGUURRAATTIIOON
N on the command menu, click on WWAANN
SSeettuup
p.
SStteepp22:
:
On the WWAANNDDyynnaammiiccSSeettuupp screen that follows, verify that the WWAANNTTyyppee reads
DDyynnaammiicc((DDHHCCPP)
) in red colour. Otherwise, click on the CChhaannggee button.
S
WWAANNS
(only supported by Wireless Routing Client and Gateway)
A correct WAN Setup allows you to successfully share your Internet connection
among the wired and wireless clients of the access point. To do so, you need to
identify the type of broadband Internet access you are subscribed to. If you are
using :
!Cable Internet where the ISP dynamically assigns a WAN IP address to you,
!Cable Internet where your ISP provides you with a fixed WAN IP address (or
!ADSL Internet that requires standard PPP over Ethernet (PPPoE) for
!ADSL Internet that requires standard Point-to-Point Tunneling Protocol (PPTP)
WAN Setup - Cable Internet with Dynamic IP Assignment
EETTUUP
refer to WAN Setup - Cable Internet with Dynamic IP Assignment.
a range of fixed IP addresses), refer to WAN Setup - Cable Internet with
Static IP Assignment.
authentication, refer to WAN Setup - ADSL Internet using PPP over Ethernet
(PPPoE).
for authentication, refer to WAN Setup – ADSL Internet using Point-to-Point
Tunneling Protocol (PPTP).
61
Step 3:
Note:
Additional configuration might be required before your ISP will allocate an IP
address to the access point.
Certain ISPs require authentication through a DHCP Client ID before releasing a
public IP address to you. The access point uses the System Name in the System
Identity as the DHCP Client ID.
Therefore, if this is the case, refer to your ISP for the correct DHCP Client ID
to be set and follow steps 4 - 5 to accomplish the setup.
SStteepp44:
:
Steps 4 - 5 are for those who need to
set up the
SSyysstteemmNNaamme
e in SSyysstteemm
IIddeennttiitty
y so that your ISP can
authenticate it as a valid DHCP Client
ID.
Simply select DDyynnaammiiccIIPPAAddddrreessss
and hit the AAppppllyy button.
Please remember to click
m under SSYYSSTTEEMMTTOOOOLL
SSyysstteem
the
t button to let the settings
RReebboooot
S and hit
S
RReebboooot
t
take effect.
62
Click on SSyysstteemmIIddeennttiittyy under the
SSYYSSTTEEMMTTOOOOLLS
S command menu.
Step 5:
On the following screen, key in the
your ISP assigned DHCP Client ID as
the
SSyysstteemmNNaamme
to key in a preferred
person and the SSyysstteemmLLooccaattiioonn of
the access point). Click the
button to complete.
e (You may also like
SSyysstteemmssCCoonnttaacct
AApppplly
y
t
Please remember to click
m under SSYYSSTTEEMMTTOOOOLLSS and hit
SSyysstteem
the
take effect.
t button to let the settings
RReebboooot
RReebboooot
t
63
64
WAN Setup - Cable Internet with Static IP Assignment
If you have an ISP that leases a static WAN IP for your subscription, you will need
to configure your access point’s WAN type accordingly. For example, if the ISP
provided you with the following setup information, you can set up your WAN as
described below:
IP Address : 203.120.12.240
Network Mask : 255.255.255.0
Gateway IP Address : 203.120.12.2
Step 1:
Under CCOONNFFIIGGUURRAATTIIOONN on the command menu, click on WWAANNSSeettuupp.
Step 2:
Access the SSeelleeccttWWAANNTTyyppee page
and choose
SSttaattiiccIIPPAAddddrreesss
s before
clicking the
AApppplly
y button. You will
then be brought to the following
page requiring your inputs.
Step 3:
Fill in the information provided by
your ISP in the
IIPPAAddddrreessss,,NNeettwwoorrk
k
MMaassk
k andGGaatteewwaayyIIPPAAddddrreessss
fields, before clicking the AAppppllyy
button.
Please remember to click
RReebboooot
t
SSyysstteem
m under SSYYSSTTEEMMTTOOOOLLSS and hit
the
RReebboooot
t button to let the settings
take effect.
WAN Setup - ADSL Internet using PPP over Ethernet (PPPoE)
If you subscribe to an ADSL service using PPP over Ethernet (PPPoE)
authentication, you can set up your access point’s WAN type as follows. For
example, you may configure an account whose username is ‘guest’ as
described below:
Step 1:
Under CCOONNFFIIGGUURRAATTIIOONN on the
command menu, click on
WWAANNSSeettuup
p.
Step 2:
Access the SSeelleeccttWWAANNTTyyppee page
and choose
PPPPPPoovveerrEEtthheerrnneet
t before
clicking the
AApppplly
y button. You will
then be brought to the following
page requiring your inputs.
Step 3:
ForUUsseerrnnaammee, key in your ISP
assigned account name (e.g. guest
for this example), followed by your
account
PPaasssswwoorrd
d.
Step 4:
Select AAllwwaayyss--OOnn if you want your
access point to always maintain a
connection with the ISP. Otherwise,
you may select
OOnn--DDeemmaannd
d. The
access point will then connect to the
ISP automatically when it receives
Internet requests from the PCs in your
network.
The IIddlleeTTiimmeeoouutt setting is associated with the OOnn--DDeemmaanndd option, allowing you
to specify the value (in seconds) after which the access point will disconnect
from the ISP after the last Internet activity. A value of “0” will disable idle timeout.
RReeccoonnnneeccttTTiimmeeFFaaccttoor
r is associated with the AAllwwaayy
s
s--oonn option and specifies
the maximum time the access point will wait before re-attempting to connect
with your ISP. Hit the
AApppplly
y button and RReebboooott the access point.
65
You can limit the maximum size a packet can be in a network by setting the MMTTUU
TheMMTTUUVVaalluuee has a range of 1 to 1492.
Enter the
MMTTUUVVaalluue
e and click AAppppllyy.
(Maximum Transmissible Unit).
Click the
U Button in AAddvvaanncceeddWWAANNOOppttiioonnss.
MMTTU
66
WAN Setup – ADSL Internet using PPTP
If you subscribe to an ADSL service using Point-to-Point Tunneling Protocol (PPTP)
authentication, you can set up your access point’s WAN type from the steps
that follow. For example, if the ISP provided you with the following set up
information, you can set up your WAN as described below:
IP Address : 203.120.12.47
Network Mask : 255.255.255.0
VPN Server : 203.120.12.15
Step 1:
Under CCOONNFFIIGGUURRAATTIIOONN on the command menu, click on WWAANNSSeettuupp.
Step 2:
Access the SSeelleeccttWWAANNTTyyppee page and
choose
PPPPTTP
P before clicking the AAppppllyy
button. You will then be brought to the
following page requiring your inputs.
Step 3:
Fill in the information provided by
your ISP in the
IIPPAAddddrreessss,
,
NNeettwwoorrkkMMaasskk,VVPPNNSSeerrvveer
r, and
DDHHCCP
P fields, followed by clicking
the
AApppplly
y button.
Please remember to click
RReeb
boooott
SSyysstteem
m under SSYYSSTTEEMMTTOOOOLLSS and
hit the
RReebboooot
t button to let the
settings take effect.
The
IIddlleeTTiimmeeoouut
t setting allows
you to specify the value (in
seconds) after which the access
point will disconnect from the ISP
after the last Internet activity. A
value of “0” will disable idle
timeout.
67
WAN Setup – L2TP
If you’re using Layer 2 Tunneling Protocol (L2TP) authentication, you can set up
your access point’s WAN type from the steps that follow. For example, if the ISP
provided you with the following set up information, you can set up your WAN as
described below:
IP Address : 203.120.12.47
Network Mask : 255.255.255.0
VPN Server : 203.120.12.15
Step 1:
Under CCOONNFFIIGGUURRAATTIIOONN on the command menu, click on WWAANNSSeettuupp.
Step 2:
Access the SSeelleeccttWWAANNTTyyppee page and
choose
LL22TTP
P before clicking the AAppppllyy
button. You will then be brought to the
following page requiring your inputs.
Step 3:
Fill in the information provided by
your ISP in the
IIPPAAddddrreessss,
,
NNeettwwoorrkkMMaasskk,VVPPNNSSeerrvveer
r, and
DDHHCCP
P fields, followed by clicking
the
AApppplly
y button.
Please remember to click
RReeb
boooott
SSyysstteem
m under SSYYSSTTEEMMTTOOOOLLSS and
hit the
RReebboooot
t button to let the
settings take effect.
The
IIddlleeTTiimmeeoouut
t setting allows
you to specify the value (in
seconds) after which the access
point will disconnect from the ISP
after the last Internet activity. A
value of “0” will disable idle
timeout.
68
T
Telnet allows a computer to remotely connect to the access point CLI
(Command Line Interface) for control and monitoring.
SSH (Secure Shell Host) establishes a secure host connection to the access point
CLI for control and monitoring.
Telnet/SSH Setup
Click Telnet/SSH Setup from the CONFIGURATION menu.
1. To enable Telnet Server: Select Telnet Server Enable and enter the Port Number.
2. To enable SSH server: Select SSH Server Enable and enter the Port Number.
Click
Apply.
1
2
EELLNNEET
T
T
//SSSSHHS
S
EETTUUP
P
69
70
To add user:
1. Click Add button.
2. In Add User Entry Page, enter User Name, Password, and specify whether user is
granted permission to Read Only or Read/Write.
3. Click Apply.
To Delete User:
1. Select which user to Delete.
2. Click Delete.
3
71
User Management list refreshes to update users.
To Refresh User Management list:
Click Refresh to refresh User Management list.
C
The user may connect to the CLI (Command Line Interface) via a TELNET session
to the default IP, 192.168.168.1. This section uses Microsoft TELNET command for
instruction. You may use any TELNET client.
Connecting to CLI (Command Line Interface) via TELNET
1. Connect to CLI (Command Line Interface) with the following
command at DOS prompt. The TELNET application will then be launched and connect.
C:\WINDOWS\TELNET 192.168.168.1
2. At the login prompt, type in “password” (default password) and press
the <ENTER> key, as shown in Figure 2.4c. You will then login to the CLI.
TTEELLNNEETTC
Telnet CLI (Command Line Interface)
OOMMMMAANND
L
L
IINNE
I
E
NNTTEERRFFAACCE
I
E
D
72
S
SSH is designed and created to provide the best security when
accessing another computer remotely. Not only does it encrypt the
session, it also provides better authentication facilities and features that
increase the security of other protocols. It can use different forms of
encryption and ciphers.
The first diagram below shows a telnet session.
The second diagram below shows how an encrypted connection like
SSH is not viewable on the network. The server still can read the
information, but only after negotiating the encrypted session with the
client.
EECCUURRE
S
SSH CLI (Secure Shell Host Command Line Interface)
S
H
E
L
HHEELLL
S
H
OOSST
C
T
OOMMMMAANND
C
L
L
IINNE
I
E
NNTTEERRFFAACCE
I
E
D
73
SSH CLI has a command line interface like shown below for example.
74
WWEEBBM
The access point supports HTTPS (SSL) in addition to the standard HTTP.
HTTPS (SSL) features additional authentication and encryption for secure
communication.
Web Management Setup
Select Web Management Setup from the CONFIGURATION menu.
1. Select whether to set web server to HTTP or HTTPS (SSL) mode.
2. Click
Apply.
Changes will be effected after reboot.
1
2
M
OODDE
E
75
76
SSNNMMPPS
S
EETTUUP
P
Simple Network Management Protocol (SNMP) is a set of communication
protocols that separates the management architecture from the architecture
of the hardware devices.
Step 1:
Click on SSNNMMPP from the CCOONNFFIIGGUURRAATTIIOONN menu.
Step 2:
Select EEnnaabbllee from the SSNNMMPPSSttaattee drop-down list.
The default
RReeaaddPPaasssswwoorrd
d is set to public while the default RReeaadd//WWrriittee
PPaasssswwo
orrdd is private.
Step 3:
Click on the AAppppllyy button.
P
S
SSTTPPS
(Only available in Access Point, Point to Point and Point to Multiple Point
modes)
EETTUUP
Spanning Tree Protocol (STP) is a link management
prevent undesirable loops occurs in the network. For an Ethernet network to
function properly, only one active path can exist between two stations. If a
loop exists in the network topology, duplication of messages will occur and this
might confuse the forwarding algorithm and allow duplicate frames to be
forwarded.
protocol that helps to
77
78
In short, the main purpose of activating STP is to prevent looping when you
have redundant paths in the network. Without activating STP, redundant
topology will cause broadcast storming.
To establish path redundancy, STP creates a
tree that spans all of the devices in
an extended network, forcing redundant paths into a standby, or blocked,
state, but establishing the redundant links as a backup in case the active link
should fail. If STP costs change, or if one network segment in the STP becomes
unreachable, the spanning tree algorithm reconfigures the spanning tree
topology and re-establishes the connection by activating the standby path.
Without spanning tree in place, it is possible that more than one connection
may be simultaneously live, which could result in an endless loop of traffic on
the
LAN.
Spanning-Tree Protocol operation is transparent to end stations, which are
unaware whether they are connected to a single LAN segment or a switched
LAN of multiple segments.
79
The path with the smallest cost will be used and extra redundant paths will be
disabled.
To explain the effect of STP & Pseudo VLAN on the wireless clients, we will
compare 3 separate scenarios.
Scenario #1
– (No STP, No Pseudo VLAN)
Referring to the illustration below, if the Spanning Tree Protocol (STP) and
Pseudo VLAN are not implemented in a network, all clients (Notebook#1, #2,
#3 & #4,) can access to one another, resulting in low level of data security. Due
to the redundant paths found in this network, broadcast packets will be
duplicated and forwarded endlessly resulting in a broadcast storm.
80
Scenario #2 – (With STP, No Pseudo VLAN)
When STP is enabled, extra redundant network paths between APs will be
disabled, hence preventing multiple active network paths in-between any two
APs.
If one of the APs is down, the STP algorithm will reactivate one of the redundant
paths so that the network connection will not be lost.
All wireless users will be able to communicate with each other if they are
associated to the APs that are in the same WDS zone.
81
Scenario #3 – (With STP and Pseudo VLAN)
In this example, both STP and Pseudo VLAN Per Node are implemented in this
network. When Pseudo VLAN Per Node is activated, the wireless users will be
unable to access one another.
82
SStteepp11:
:
Click on SSTTPPSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu.
SStteepp22:
:
Select EEnnaabbllee from the SSTTPPSSttaattuuss radio button, fill in the fields, and click on
the
AApppplly
y button to update the changes.
Priority: (Default: 32768, Range: 0 – 65535)
This is the relative priority.
The lowest priority will be elected as the root.
Hello Time: (Default: 2, Range: 1 – 10)
This is the hello time.
Every (this number) seconds, a hello packet is sent out by.
Hello packets are used to communicate information about the topology
throughout the entire STP network.
Forward Delay: (Default: 15, Range: 4 – 30)
The forward delay is the time that is spent in the listening and learning state.
Max Age: (Default: 20, Range: 6 – 40)
The max age timer controls the maximum length of time that passes before a
port saves its configuration information.
F
g
will not filter any MAC address
from Ethernet port.
MMAACCF
MAC Filtering acts as a security measure by controlling the users accessing to
the network through their MAC address. Each WLAN or radio card supports up
to 16 virtual access points and has its own MAC address listing. The client MAC
addresses entries can be set apply to all, or to only selected virtual access
points.
IILLTTEERRIINNG
G
NOTE:MAC Filterin
!
83
Add a MAC address to the MAC Address List.
MAC Filtering set to EEnnaabbllee with Policy to AAcccceepptt
only the MAC addresses in the MAC Filter Address
List and deny all other MAC addresses.
MAC Filtering set to EEnnaabbllee with Policy to DDeennyy all
the MAC addresses in the MAC Filter Address List
and accept all other MAC addresses.
MAC Filtering set to DDiissaabbllee. Whether Policy is set to
EEnnaabblle
e or DDeennyy does not matter.
MAC Filtering set to DDiissaabbllee. Whether Policy is set to
EEnnaabblle
e or DDeennyy does not matter.
ClickEEddiitt.
(This displays the MAC Address List of individual virtual access points.)
SStteepp11:
SelectMMAACCFFiilltteerriinngg from WWLLAANNSSeettuupp((aa//bb//gg)).
MAC Address Filtering page displays.
:
In this page you may also set the MAC Filtering Status to
for access points and set the Policy to either AA
addresses.
EEnnaabblle
t orDDeennyy MAC
cccceeppt
e orDDiissaabbllee
84
SStteepp22:
SStteepp33:
:
Add MAC Address page displays.
MAC Filter Address List page displays.
:
Click the
AAddd
d button.
85
SStteepp44:
SStteepp55:
:
MAC Filter Address List page displays with updated MAC Address List.
Enter the MAC Address of the client in the format xx-xx-xx-xx-xx-xx, where x
can take any value in the range 0-9 or a-f.
Enter the Comment. This describes the MAC Address you have entered.
:
To apply to all virtual access points: Check
To apply to specific virtual access point: Select the checkbox of the corresponding
AP.
Click the
AApppplly
y button.
AAppppllyyttooAAlll
l.
86
NOTE
Please reboot to effect all changes and new MAC address
entries.