CHAPTER 6 STATUS ....................................................................................................................................................25
10.1.1 Static IP ........................................................................................................................................................
Access Point Mode. In this mode,
within range can connect to the
an example of an
The secti
ons
OM2P V2
operating in
that follow the figure below describe how to configure your
Access
OM2P V2
ngs.
Please
read the information in thi
it can impact performance and affect
nue, be sure you selected the appropriate operati
ngs.
For
to
more information,
users
access
the
WLAN. The
see
Chapter 12.
with a
wireless
following figure
client device
shows
Access Point Mode.
OM2P V2
for
s
ng
Point M
ode.
Wireless Mode
Channel HT Mode
Extension Channel
Auto
AP Detection
Current
Profile
Configure up to four different
Wireless
The
mode supports
802.11
b/g/
n mixed modes.
default channel bandwidth is 40 MHz.
The
larger the cha
nnel,
the better the transmission quality and speed.
Select upper or lower cha
channel function.
Check
AP
nearby
this option to enable auto-channel selection.
Detection can select the best channel to
areas
for
Access Points.
nnel. Your
selection may affect the
SSIDs.
accessing
groups.
the network,
Click Edit
you can arrange the
to configure the profile and check whether yo
use
by scanning
If many client
devices
devices
into SSI
Aut
o
will be
D
u
want to enable extra SSID.
Profile Isolation
A
ccept / Cancel
Clicking Accept
section 4.1).
Restricted Client to communicate with different VID by Selecting
the radio
Click Accept
return previous setti
does not apply the
button.
to confirm the
changes.
To apply them, use Status
ngs.
changes
or Cancel to
> Save/Load (see
cancel
and
SSID
Specify
the
SSID
for the current
profile.
VLAN ID
Suppressed
SSID
Station Separation
Wireless Security
Save / Cancel
Specify
Check
SSID
Click
communication between client devices.
See
Click Save
previous setti
the
VLAN
this option to hide the
will not appear in the site survey.
tag for the current
SSID
from clients.
profile.
the appropriate radio button to allow or preve
the
Wireless Security
to accept the
section.
changes
or Cancel to
ngs.
If checked, the
nt
cancel
and retur
n
8.1.2 Client
Bridge
Mode
Client Bridge Mode lets you connect two LAN
on the
reach all machines.
computers
The
Point/Wireless R
same physical network.
As a result, DHCP
as
though the clients resided on one
following figure
shows
outer, such
Since
the computers are on the
information generated by the
an example of an
as
the EnGenius E
The secti
ons
that follow the figure below describe how to configure your
Bridge Mode.
Wireless Mode
Wireless
mode supports
segments
via a
wireless
link
as
though they are
same subnet, broadcasts w
physical network.
OM2P V2
communicating with an Access
server
will reach all client
OA7530, operating in Client Bridge Mode.
802.11
b/g/
n mixed modes.
OM2P V2
for Client
ill
SSID
Site Survey
Specify
you select an
Scans
the
SSID
if known.
Access Point in the Site
nearby locations for
This
field is completed automatically if
Survey.
Access Points.
You
can select a
Prefer BSSID
WDS Client
Wireless Security
A
ccept / Cancel
Clicking Accept
section 4.1).
Profile
If you used the Site
discovered
Enter the MAC
the Site
Click
the appropriate radio button to enable or disable WD
Client.
See
section
Click Accept
return previous setti
does not apply the
Access Point to establish a connection.
address
Survey,
this field is completed automatically.
8.2
for information.
to confirm the
if known. If you select an
changes
or Cancel to
ngs.
changes.
To apply them, use Status
Survey,
the Web Configurator
Access Point in
S
cancel
and
> Save/Load (see
shows
nearby
Wireless Security
Refresh
If the
Access Point
has
been configured to
and must be completed ma
Access Points. To connect to an
Point’s
See
Click Refresh to
BSSID.
the
Wireless Security
scan
again.
suppress
section.
its
SSID,
nually.
Access Point,
the
SSID
click the Access
section will be bla
nk
8.1.3 WDS Bridge
Mode
Unlike traditional bridging.
linking
areas,
The
communicating with
t
he
that
several wireless access
where pulling wires is cost prohibitive,
following figure
shows
each other.
figure
connect to other
behaves as
a standard bridge that forwards traffic between the
OM2P V2 WDS bri
The secti
WDS
Wireless Mode
ons
that follow the figure below describe how to configure your
Bridge Mode.
WDS
Bridge Mode allows you to create large
points with
an example of three
In this configuration, the
Wireless
mode supports
WDS links. WDS
restricted or
dges).
OM2P V2
802.11
wireless
networks by
is normally used in large, open
physically im
configured for
OM2P V2
b/g/
n mixed modes.
possible.
WDS
Bridge Mode
device on the left side of
WDS
links (links
OM2P V2
for
Channel HT Mode
Extension Channel
A
ccept / Cancel
Clicking Accept
does not apply the
The
default channel bandwidth is 40 MHz.
The
larger the cha
nnel,
the better the transmission quality and speed.
Select upper or lower cha
channel function.
Click Accept
return previous setti
changes.
to confirm the
ngs.
To apply them, use Status
nnel. Your
changes
selection may affect the
or Cancel to
cancel
and
> Save/Load (see
Aut
o
section 4.1).
MAC Address
Enter the MAC
address
of the
Access Point to which you want to
Mode
A
ccept / Cancel
extend
Select Disable or Enable
Click Accept
wireless connectivity.
to confirm the
return previous setti
1.
Clicking Accept
does not apply the
changes.
section 4.1).
2. The Access Point to which you want to extend
V2’s
MAC
t
he
Access Point.
address
Not all
into its configuration.
Access Point supports this feature.
For
more information, refer to the documentation for
to disable or enable WDS.
changes
or Cancel to
ngs.
To apply them, use Status
wireless
connectivity must enter the
cancel
and
> Save/Load (see
OM2P
8.1.4 Client Router
In Client
Router Mode, the
t
he
that
Router Mode, you can
OM2P V2
can be configured to turn off the
only stations that have the
Mode
OM2P V2
LAN
64/128/152-bit
as
well
as TKIP/AES
secure tr
ansmission.
WEP
encryption security, WPA/WPA2, and WPA-
encryption security. It also supports
The
following figure
(WISP) Access Point in Client
how to
configure your
Wireless Mode
shows
OM2P V2
access
can
access
SSID
can be connected.
an
example
Router Mode.
for Client
Wireless
mode supports
the Internet
wirelessly
with the support of a
the Internet via a cable or
wireless
network name
The OM2P V2
VPN
pass-through for sensitive data
of an
OM2P V2
The sections
communicating with a
that follow the figure below
Router Mode.
802.11
b/g/
DSL modem.
(SSID)
also provides
WISP.
In this mode,
broadcast,
In AP
so
wireless
PSK/WPA2-PSK authentication,
Wireless ISP
describe
n mixed modes.
SSID
Site Survey
Specify
you select an
Scans
discovered
the
SSID
if known.
Access Point in the Site
nearby locations for
This
field is completed automatically if
Survey.
Access Points.
Access Point to establish a connection.
You
can select a
Prefer BSSID
Wireless Security
A
ccept / Cancel
Clicking Accept
section 4.1).
Profile
If you used the Site
Enter the MAC
the Site
See
section 10.2.
Click Accept
return previous setti
does not apply the
address
Survey,
this field is completed automatically.
to confirm the
changes.
if known. If you select an
changes
or Cancel to
ngs.
To apply them, use Status
Survey,
the Web Configurator
Access Point in
cancel
and
> Save/Load (see
shows
nearby
Wireless Security
Refresh
If the
completed ma
Access Point
nually.
Access Points. To connect to an
Point’s
See
the
Click Refresh to
has
been configured to
BSSID.
Wireless Security
scan
suppress
section.
again.
its
Access Point,
SSID,
the
click the Access
SSID
section must be
8.2
Wireless Security Settings
The Wireless Security Settings
section lets you configure the EOH200’s
security modes: WEP
,
WPA-PSK, WPA2recommend you
8.2.1 WEP
Security
Mode
PSK, WPA-
use WPA2-
PSK
PSK.
Select
Mixed,
WEP
WPA, WPA2,
and
WPA Mixed.
We st
rongl
y
from the drop-down list to begin the configuration.
Auth Type
Input
Type
Key Length
Default
Key
default.
Key1
Key2
Key3
Key4
Select Open System
or Shared.
Select an input type of Hex or ASCII.
Level
of
WEP
encryption applied to all
Select a 64/
Specify
128/152-bit
which of the four
Specify a password
typed character is
Specify a password
typed character is
Specify a password
typed
character
is
Specify a password
typed character is
WEP keys. Choices
password le
WEP keys
ngths.
the
OM2P V2 uses as
for security key index No.1.
masked
by a dot
(
l
).
for security key index No.2.
masked
by a dot
(
l
).
for security key index No.3.
masked
by a dot
(
l
).
for security key index No.4.
masked
by a dot
(
l
).
are
its
For security, each
For security, each
For security, each
For security, each
802.11
will drop from
n does not allow WEP/WPA-
802.11
8.2.2 WPA-PSK
Security
Mode
n to
802.11g.
Select
PSK/WPA-PSK TKIP
WPA-PSK
from the drop-down list to begin the
security mode.
The
connection mode
Encryption
Passphrase
Group Key Update
Interval
802.11
will drops from
n does not allow WEP/WPA-
802.11
c
onfiguration.
Select Both,
• Both =
•
•
Specify
is
masked
Specify
n to
802.11g.
TKIP,
uses TKIP
TKIP
= automatic encryption with WPA-
pass
phrase.
AES
= automatic encryption with WPA2-
pass
phrase.
the security
by a dot
how often, in
PSK/WPA-PSK TKIP
or
AES as
and AES.
the encryption type.
password. For security,
(
l
).
seconds,
the group key cha
security mode.
PSK; requires
PSK; requires
each
typed character
nges.
The
connection mode
8.2.3
WPA2-PSK
Security
Mode
Select WPA2-PSK from the drop-down list to begin the
c
onfiguration.
Encryption
Passphrase
Group Key Update
Interval
802.11
n does not allow WEP/WPA-
will change from
802.11
Select Both,
• Both =
•
•
Specify
is
masked
Specify
n to
802.11g.
TKIP,
TKIP
= automatic encryption with WPA-
pass
phrase.
AES
= automatic encryption with WPA2-
pass
phrase.
the security
by a dot
how often, in
PSK/WPA-PSK TKIP
or
uses TKIP
password. For security,
(
AES as
the encryption type.
and AES.
l
).
seconds,
security mode.
the group key cha
PSK; requires
PSK; requires
each
typed character
nges.
The
connection mode
8.2.4
WPA-PSK Mixed
Security
Mode
Encryption
Passphrase
Group Key Update
Interval
WPA-PSK
Mixed can allow multiple security modes at the
Select
c
WPA-PSK
onfiguration.
Select Both,
• Both =
•
TKIP
= automatic encryption with WPA-
pass
phrase.
•
AES
= automatic encryption with WPA2-
pass
phrase.
Specify
is
Specify
the security
masked
how often, in
by a dot
Mixed
TKIP,
or
uses TKIP
(
from the drop-down list to begin the
AES as
and AES.
the encryption type.
PSK; requires
PSK; requires
password. For security,
l
).
seconds,
the group key cha
each
typed character
nges.
same time.
802.11
n does not allow WEP/WPA-
will change from
802.11
n to
PSK/WPA-PSK TKIP
802.11g.
security mode.
The
connection mode
8.2.5
WPA
Security
Mode
Select WPA from the drop-down list to begin the configuration.
Encryption
Radius Server
Radius Port
Radius Secret
Group Key Updat
Interval
802.11
n does not allow WEP/WPA-
will drops from
e
802.11
Select Both,
• Both =
•
TKIP
•
AES
Specify
Specify
TKIP,
or
uses TKIP
AES as
and AES.
the encryption type.
= automatic encryption with WPA-
= automatic encryption with WPA2-
the
IP address
of the
RADIUS server.
the port number that your
authentication. Default port is
Specify RADIUS secret furnished by the
n to
Specify
802.11g.
how often, in
seconds,
PSK/WPA-PSK TKIP
security mode.
PSK.
PSK.
RADIUS server uses for
1812.
RADIUS server.
the group key cha
The
connection mode
nges.
8.2.6
WPA2
Security
Mode
Select WPA2 from the drop-down list to begin the configuration.
Encryption
Radius Server
Radius Port
Radius Secret
Group Key Updat
Interval
802.11
from
n does not allow WEP/WPA-
802.11
n to
e
802.11g.
Select Both,
• Both =
•
TKIP
•
AES
Specify
Specify
authentication. Default port is
TKIP,
or
uses TKIP
AES as
and AES.
the encryption type.
= automatic encryption with WPA-
= automatic encryption with WPA2-
the
IP address
the port number that your
of the
RADIUS server.
RADIUS server uses for
1812.
Specify RADIUS secret furnished by the
Specify
how often, in
seconds,
PSK/WPA-PSK TKIP
the group key cha
security mode.
PSK.
PSK.
RADIUS server.
nges.
The
date rate will
drop
8.2.7
WPA Mixed
Security
Mode
Select WPA
c
onfiguration.
Mixed
from the drop-down list to begin the
Encryption
Radius Server
Radius Port
Radius Secret
Group Key Updat
Interval
802.11
n does not allow WEP/WPA-
will change from
e
802.11
Select Both,
• Both =
•
TKIP
•
AES
Specify
Specify
authentication. Default port is
TKIP,
or
uses TKIP
AES as
and AES.
the encryption type.
= automatic encryption with WPA-
= automatic encryption with WPA2-
the
IP address
of the
RADIUS server.
the port number that your
1812.
Specify RADIUS secret furnished by the
Specify
n to
802.11g.
how often, in
seconds,
PSK/WPA-PSK TKIP
the group key cha
security mode.
PSK.
PSK.
RADIUS server uses for
RADIUS server.
nges.
The
connection mode
8.4 Wireless
Adva
nced
Settings
Data Rate
Select a data rate from the drop-down list. The
data rate affects
RTS/CTS
Distance
Threshold
Antenna Selection
Short GI
Aggregation
Merges data packets
thro
ugh
put. If you select a low data rate value, for
example, the
throughput is reduced but the transmission distance increases.
Specify
causes RTS/CTS packets
more ba
Specify
distances
Specify
Sets
before sampling data.
increase through
installations due to
reflecti
the threshold
package size
to be sent more often and consumes
ndwidth.
the distance between
Access Points
may drop high-speed connections.
the internal antenna type.
the time that the
receiver
waits for
Using a short
put, but can also
ons. Select
increased
the option that works best for your installation.
sensitivity to radio-frequency
into one packet. This
for RTC/CTS. A small number
RF
(400ns)
increase
and clients.
reflections to settle
guard interval can
error rate in some
option
Longer
reduces the
out
Wireless Traffic
Shaping
Incoming Traffic Limit
Outgoing Traffic Limit
A
ccept / Cancel
1.
Changing
Wireless
accept all default setti
2.
Clicking Accept
does not apply the
section 4.1).
number of packets, but
Check
this option to enable
increases
shaping regulates the flow of packets
deliver improved Quality of Service.
Specify
Specify
Click Accept
return previous setti
Advanced Settings may
ngs,
unless
the
the
wireless
wireless
transmission speed used for
transmission speed used for
to confirm the
ngs.
adversely
you are familiar with the
changes.
To apply them, use Status
packet sizes.
wireless traff
leaving an interface to
changes
affect
or Cancel to
wireless performance. Pleas
wireless options.
ic shaping. Traffic
downloading.
uploading.
cancel
and
> Save/Load (see
e
8.5 Wireless
MAC F
ilter
Wireless
MAC Filters
are used to allow or deny network
access
to
wireless
clients according to
their MAC
access
ACL
Mode Determines whether network
addresses. You
OM2P V2.
MAC Address Filter
can manually add a MAC
The
default setting is
clients whose MAC
on this page. Choices
Allow
Enter the MAC
MAC
address
Disable Wireless
addresses
are Disable, Deny MAC
in the list.
address
of the device.
to restrict the permission to
MAC Filters.
access
is granted or denied to
appear in the MAC Address table
in the list, or
0.
Add
Apply
Click
Add to add the MAC
Click
Apply
to apply the cha
address
nges.
to the MAC Address table.
8.6 WDS
Link Settings
Using
WDS
Link Settings,
you can create a
wireless
backbone link between multiple access
points that are part of the
expanded using multiple
is traditionally required.
MAC Address
same wireless network. This
Access Points
Enter the
without the need for a wired backbone to link them,
Access Point’s
allows a
MAC
address
wireless
network to be
to which you want to
as
Mode
A
ccept / Cancel
extend the
Select Disable or Enable
Click Accept
wireless area.
to confirm the
return previous setti
Clicking Accept
section 4.1).
does not apply the
changes.
The Access Point to which you want to extend
MAC
address
Access Point.
into its configuration.
Not all
Access Point supports this feature.
For
more information, refer to the documentation for the
from the drop-down list.
changes
or Cancel to
ngs.
To apply them, use Status
wireless
connectivity must enter the
cancel
and
> Save/Load (see
OM2P V2’s
Chapter 9
LAN
Setup
This
chapter
describes
9.1 IP Settings
This
section is only
the
available
OM2P V2 Local
for
Non-Router Mode.
Area Network
IP
(LAN) setti
ngs.
settings lets you configure the
OM2P
V2 LAN port
IP Netw
ork Setting
IP address.
Select whether the
OM2P V2 IP address
will
use
the static
IP
IP Address
V2. IP Suet
Default Gateway
gateway.
Secondary DNS
DNS.
A
ccept / Cancel
Mask
Primary
DNS Enter the
If you change the LAN
Apply.
address specif
automatically
DHCP server .
Enter the
Enter the
Enter the
IP address
OM2P V2
OM2P V2
OM2P V2
Enter the
OM2P V2 secondary
Click Accept
return previous setti
IP address,
you will be directed to the new
ied in the IP Address field or be obtained
when the
OM2P V2
connects to a device that
of the
subnet mask
OM2P
.
default
primary DN
to confirm the
S.
changes
or Cancel to
cancel
ngs.
IP address
after you click
has
and
a
9.2 Spann
ing Tree
Settings
Spanning
Tree Status
Enable or disable the
OM2P V2
Spanning
Tree function.
Bridge Hello Time
Bridge
Bridge
Priority
A
ccept / Cancel
Max Age
Forward
Specify
often the
i
nformati
Local
Area Network
Specify
spanning tree does not send a hello packet for a long period of
time,
it is
Delay Specify
is the time spent in
before the Forwa
that when a new bridge comes onto a busy network,
some traffic before participating.
Specify
Click Accept
return previous setti
Bridge Hello
OM2P V2 sends
on
about the topology throughout the entire Bridged
Bridge Max Age,
assumed
Bridge Forward
Time,
in
seconds. This
hello packets
in
seconds.
If another bridge in the
to be dead.
Delay,
each
in
seconds. Forwa
of the Listening and Learning states
rding state is entered.
value determine how
to communicate
rding delay time
This
delay is provided so
the Priority number.
to confirm the
Smaller
changes
number
has
or Cancel to
greater priority.
cancel
ngs.
it looks at
and
Clicking Accept
section 4.1).
does not apply the
changes.
To apply them, use Status
> Save/Load (see
Chapter 10 Router Settings
This
section is only
available
for AP Router Mode and Client Router Mode.
10.1 WAN Settings
This
chapter
c
onnections:
- Static IP
- DHCP
-
PPPoE
describes
the
OM2P V2
WAN settings.
There
are four types of WAN
-
PPTP
Please
contact your
10.1.1 Static IP
Select Static
address,
IP for your WAN connection if your
subnet
ISP
mask,
to find out which settings you should choose..
ISP
provided information about which IP
default gateway, primary
DNS,
and
secondary DNS
to
use.
Internet Connection
Type
Account Name
Domain
Name
MTU
IP Address
Subnet Mask
Gateway
Primary
Secondary DNS
Discard
IP Address
DNS
Ping on WAN
Select Static
Enter the account name provided by your ISP.
Enter the domain name provided by your ISP.
Specify
IP to begin configuration of the Static IP connection.
the Maximum Transmit Unit
size.
It is recommended you
accept the default setting of Auto. Otherwise, packets
fragmented downstream if the MTU is set too high or too low
which impacts network performance. In extreme
setting that is too low can prevent the
OM2P V2
cases,
from
establishing some connections.
Enter the WAN port
Enter the WAN
Enter the WAN gateway
Enter the primary
Enter the
Check
secondary DNS IP a
to Enable to recognize pings on the
IP address.
IP
subnet mask
IP address
DNS IP address
IP
.
.
.
ddress.
OM2P V2
will be
,
an MTU
WAN
A
ccept / Cancel
Clicking Accept
section 4.1).
interface or Disable to block pings on the
interface. Note: Pi
by
hackers to
test whether the
extra security from hackers.
Click Accept
return previous setti
does not apply the
nging IP addresses
IP address
to confirm the
changes.
To apply them, use Status
ngs.
OM2P V2
WAN
is a common method used
is valid. Blocking pings provides some
changes
or Cancel to
cancel
and
> Save/Load (see
10.1.2 DHCP (Dynamic
Select
need to enter account name
Internet Connection
Type
DHCP as
your WAN connection type to obtain an
IP)
as
your hostname and, optionally,
Select
DHCP
to begin configuration of the
IP address automatically.
DNS information.
DHCP connection.
You will
Account Name
Domain
Name
MTU
Enter the account name provided by your ISP.
Enter the domain name provided by your ISP.
Specify
the Maximum Transmit Unit
size.
accept the default setting of Auto. Otherwise, packets
It is recommended you
will be
fragmented downstream if the MTU is set too high or too low
which impacts network performance. In extreme
setting that is too low can prevent the
OM2P V2
cases,
from
an MTU
establishing some connections.
,
Get Automatically
From ISP
Use These
Discard
A
ccept / Cancel
Clicking Accept
DNS Servers Click
Ping on WAN
does not apply the
Click
this radio button to obtain the
DNS
DHCP server.
the radio button to set up the
Primary DNS
DNS servers manually.
Check
to Enable to recognize pings on the
interface or Disable to block pings on the
interface. Note: Pi
by
hackers to
test whether the
nging IP addresses
IP address
is a common method used
is valid. Blocking pings provides some
extra security from hackers.
Click Accept
return previous setti
to confirm the
changes.
To apply them, use Status
ngs.
changes
or Cancel to
automatically from the
and Secondary
OM2P V2
OM2P V2
WAN
WAN
cancel
and
> Save/Load (see
section 4.1).
10.1.3
PPPoE (Point-to-P
oint Protocol
over Ethernet)
Select Point to Point Protocol over Ethernet (PPPoE)
Your ISP
DSL services. Remove
not work with your
will provide you with a
your
PPPoE
OM2P
username
and
password. This
software from your com
V2.
Internet Connection
Select
PPPoE
to begin configuration of the
Type
if
your
ISP uses a PPPoE connection.
selection is typically used for
puter,
as
it is not needed and will
PPPoE connection.
MTU
Specify
accept the default setting of Auto. Otherwise, packets
the Maximum Transmit Unit
size.
It is recommended you
will be
fragmented downstream if the MTU is set too high or too low
which impacts network performance. In extreme
cases,
an MTU
,
Login
Password
Service Name
C
onnect
Keep
on Demand
Alive
Get Automatically
From ISP
Use These
Discard
DNS Servers Click
Ping on WAN
setting that is too low can prevent the
OM2P V2
from
establishing some connections.
Enter the Username provided by your ISP.
Enter the Password provided by your ISP.
Enter the Service
Name provided by your ISP.
Select the radio button to specify the maximum idle time.
Internet connection will disconnect when it reach the maxim
idle time, but it will automatically connect when user tries to
access
Select whether to keep the Internet connection
the network.
always on, or
enter a redial period once the internet lose connection.
Select whether to obtain the
server.
the radio button to set up the
DNS
automatically from the DHCP
Primary DNS
and Secondary
DNS servers manually.
Check
to Enable to recognize pings on the
OM2P V2
WAN
um
A
ccept / Cancel
Clicking Accept
section 4.1).
interface or Disable to block pings on the
interface. Note: Pi
by
hackers to
test whether the
extra security from hackers.
Click Accept
return previous setti
does not apply the
nging IP addresses
IP address
to confirm the
changes.
To apply them, use Status
ngs.
OM2P V2
WAN
is a common method used
is valid. Blocking pings provides some
changes
or Cancel to
cancel
and
> Save/Load (see
10.1.4 PPTP
Select
(PPTP)
(optional)
PPTP
connection. You will
WAN
!il
Use
DNS
Settings
These
(Point-to-Point Tunneling Protocol)
as your
WAN
connection type
if
your ISP uses a Point-to-Point-Tunneling
need to provide the IP address subnet
(optional) server
IPusername
and password provided by your ISP.
DNSServe
Protocol
maskdefault gateway
Home
Resel
WAN Ping
I
Apply
PingonWAN
I
Internet Connection
Type
|o
!。I
o
!。I
o
!。I
Select PPTP to begin config uration of the
o
PPTP
connection.
MTU
IP Address
Subnet Mask
Gateway
IP Address
PPTP Server
Username
Password
C
onnect
Keep
on Demand If you want the
Alive
If you want the
Specify
accept the default setting of Auto. Otherwise, packets
fragmented downstream if the MTU is set too high or too low
which impacts network performance. In extreme
setting that is too low can prevent the
the Maximum Transmit Unit
size.
It is recommended you
cases,
OM2P V2
from
will be
,
an MTU
establishing some connections.
Enter the WAN port
Enter the WAN
Enter the WAN gateway
Enter the
Enter the
Enter the
IP address
username
password
IP address.
IP
subnet mask
.
IP address
of the
PPTP server.
provided by your ISP.
provided by your ISP.
OM2P V2
to end the Internet connection after it
IP
.
has been inactive for a period of time, select this option and enter
t
he
number of minutes you want that period of inactivity to last.
OM2P V2
to periodically check your Internet
Get Automatically
From ISP
Use These
Discard
A
ccept / Cancel
DNS Servers Click
Ping on WAN
c
onnection, select this option. Then specify how often you wa
the
OM2P V2
to check the Internet connection. If the
connection is
down, the
Obtains the
OM2P V2
DNS
automatically re-establishes your connectio
automatically from
the radio button to set up the
DHCP server.
Primary DNS
and Secondary
DNS servers manually.
Check
interface or Disable to block pings on the
interface. Note: Pi
by
test whether the
to Enable to recognize pings on the
nging IP addresses
hackers to
IP address
is valid. Blocking pings provides some
OM2P V2
OM2P V2
WAN
WAN
is a common method used
extra security from hackers.
Click Accept
return previous setti
to confirm the
ngs.
changes
or Cancel to
cancel
and
nt
n
Clicking Accept
section 4.1).
does not apply the
changes.
To apply them, use Status
> Save/Load (see
10.2
LAN Settings (Router Mode
)
IP Address Enter
the LAN port
IP address
.
IP Subnet
WINS Server
Use Router As DHCP
Mask Enter
IP Enter
Server
Starting IP Address
Ending
WINS Server
A
ccept / Cancel
IP Address
IP
Check
Specify
private
subnet
specif
IP Address.
Specify
private
subnet
specif
IP Address.
Enter the
Click Accept
the LAN
the
WINS Server IP.
IP
subnet mask
this option to enable the
the starting
IP addresses. The
as
the ending
IP address
starting
IP address;
ied here must be the
the ending
IP addresses. The
as
the starting
IP address
ending
IP address;
ied here must be the
IP address
of the
WINS server.
to confirm the
.
OM2P V2
internal
DHCP server.
range for the pool of allocated for
IP address
must be on the same
that is the first three octet
same as
the first three octets in End
range for the pool of allocated for
IP address
must be on the same
that is the first three octets
same as
changes
the first three octets in Star
or Cancel to
cancel
and
s
t
Clicking Accept
section
4.1).
does not apply the
return previous setti
changes.
To apply them, use Status
ngs.
> Save/Load (see
10.3
VPN
Pass Through
VPN Passt
hrough
allows a
secure
virtual private network
(VPN)
connection between tw
o
computers. Enabling the options on this page opens a
pass
through the
OM2P V2
without
interruption.
PPTP Pass
L2TP Pass
IPSec Pass
A
ccept / Cancel
Through
Through
Through
Check
Check
Check
this option to enable
this option to enable
this option to enable
Click Accept
to confirm the
VPN
port and
PPTP
pass-through mode
L2TP
pass-through mode
IPSec
pass-through mode.
changes
enables
or Cancel to
connections to
.
.
cancel
and
Clicking Accept
section 4.1).
return previous setti
does not apply the
changes.
ngs.
To apply them, use Status
> Save/Load (see
10.4
Port Forwarding
Port
forwarding can be used to open a port or range of ports to a device on your networ
k
Using port forwarding, you can set up public
Internet make certain re
computers equipped to handle the re
(HTTP)
forwarded to
Add Entry
A
to be forwarded to
ccept
192.168.1.2.
quests on your network,
quests. If,
IP address 192.168.1.2,
Click
Add Entry
Click Accept
to confirm the cha
services
for
on your network.
the
OM2P V2
example,
all
HTTP re
When
can forward those re
you set the port number 80
quests from outside
to add port forwarding rules.
nges.
users
users
from the
quests to
are
Clicking Accept
section 4.1).
does not apply the
changes.
To apply them, use Status
> Save/Load (see
Service Name
Enter a name for the port forwarding rule.
Protocol
Select a protocol for the application: Choices
UDP.
Starting Port
Enter a starting port number.
Ending Port Enter
starting and ending ports will forward
specif
IP Address
Enter the
where
Save / Cancel
Click Save
settings.
are Both, TCP,
and
an ending port number. All ports numbers between the
users
to the
IP
address
ied in the IP Address field.
IP address
users
will be re
to apply the
of the
server
directed.
changes
computer on the LAN networ
or Cancel to return previous
k
10.5
DMZ
If you have a computer that cannot run Internet applications properly from behind the
OM2P
V2, you can allow the computer to have unrestricted Internet
that
computer
client to the DMZ may
a last resort.
DMZ Hosting
DMZ Address
A
ccept / Cancel
as
a Demilitarized Zone (DMZ) host with unrestricted Internet
expose
that computer to a variety of security
Enables
Enter an
Internet
or
IP address
access.
Click Accept
disables
the
OM2P V2
of the computer that will have
to confirm the
changes
access. Enter
risks,
so
DMZ function.
or Cancel to
the
IP address
access.
use
unlimited
cancel
of
Adding a
this option as
and
Clicking Accept
section 4.1).
return previous setti
does not apply the
changes.
ngs.
To apply them, use Status
> Save/Load (see
Chapter 11 Management Settings
The Management
section lets you configure administration, management
VLAN, SNMP
settings, backup/restore setti
chapter
11.1 Administration
Click
password
and the default
c
onfiguratio
describes
these setti
the Administration
used to log on to the
password
n settings from being
link under the Management
ngs, firmware upgrade, time setti
ngs, and log setti
ngs.
menu to change the user name and
OM2P V2
Web Configurator
. The
default user name is admin
is admin. Changing these settings protects the
accessed
by unauthorized
users.
ngs. This
OM2P V2
Name
Password
Confirm Password
Remote Management
Remote Upgrade
Remote Management
Port
Enter a new
Enter a new
Re-enter
Enable or disable remote management.
Specify
If remote management is enabled, enter the port number to be
used for remote management. For
port number
username
password
the new
whether the
for logging in to the Web Configurator.
for logging in to the Web Configurat
password
OM2P V2
8080, enter http://<IP
for confirmation.
firmware can be upgraded remotely.
example:
If you specify the
address>:8080 to access
or
the
OM2P V2
Web Configurator.
Save/Apply / Cancel
Clicking Save/Apply
Click Save/Apply to apply the
previous setti
changes
the settings immediately. You
ngs.
changes
or Cancel to retur
cannot undo the action.
n
11.2
Mana
geme
nt VLAN
Click
the Management
VLAN link under the Management
menu to
assign a VLAN
tag to the
packets.
so that they
VLAN
A
VLAN
is a group of computers on a network whose software
behave as
do not have to be
if they were on a separate
physically
located next to one another on the LAN
Local
Area Network
has
(LAN).
been configured
Computers on
Management VLAN ID If your network includes VLANs and if tagged packets need to
pass through the Access Point,
enter the VLAN
ID. Otherwise
click No VLAN tag .
,
A
ccept / Cancel
Click Accept
return previous setti
1.
If you reconfigure the Management
V2. Verify that the
the
2.
Clicking Accept
OM2P V2
DHCP server
using the new
does not apply the
IP address.
section 4.1).
to confirm the
changes
ngs.
VLAN ID,
you may lose your connection to the
supports the reconfigured
changes.
To apply them, use Status
or Cancel to
VLAN
cancel
and
OM2P
ID and then reconnect to
> Save/Load (see
11.3
SNMP
Settings
Click
the SNMP Settings
link under the Management
menu to monitor network-attache
d
devices
using the Simple Network Management Protocol
(SNMP). SNMP
(called “protocol data unit’s) to be sent to various parts of a network.
messages,
Information Bases.
SNMP Enable/Disable
SNMP-compatible devices
Enable or disable the
(called agents) return data stored in their Management
OM2P V2 SNMP
allows messages
Upon receiving these
f
uncti
on. Contact
Location
C
ommunity
C
ommunity
Name
Name
Trap Destination IP
Address
Trap Destination
C
ommunity Name
Save/Apply / Cancel
Enter the contact details of the device
Enter the location of the device.
Enter the
read-only
Enter the
and write
Enter the
password
access.
password
access.
IP address
for
accessing
for
accessing
where
SNMP
Enter the
password
of the
SNMP
Click Save/Apply to apply the
previous setti
ngs.
Clicking Save/Apply change the setting immediately. You
.
the
the
SNMP
SNMP
community for
community for read
traps are to be sent.
trap community.
changes
or Cancel to retur
cannot undo the action.
n
11.4
Backup/Restore Settings
Click
V2’s
the Backup/Restore Setting
link under the Management
menu to
save
the
OM2P
current settings in a file on your local disk or load settings onto the device from a local
disk. This
feature is particularly convenient administrators who have
devices that need to be configured with the
This
page also lets you return the
this procedure,
Save
A Copy of Current
any
changes
Settings Restore Saved
Settings
from a File
Click
To restore settings that have been previously backed up,
OM2P V2
made to the
Backup to
several OM2P V2
same setti
ngs.
to its factory default settings. If you perform
OM2P V2
save
default settings will be lost.
the current configured setti
ngs.
click
Revert
to Factory
Default Settings
Browse, select the file,
Click
this button to restore the
default setti
ngs.
and click Restore.
OM2P V2
to its factory
11.5
Firmw
are Upgrade
Click
the Firmware Upgrade link under the Management
menu to upgrade the firmware
of
the device. To perform this procedure,
downloaded the appropriate firmware from your
vendor.
The firmware upgrade procedure can take few mi
the
firmware upgrade,
restarts automatically after the
as
it
can cause
the
device
upgrade completes.
nutes.
to
crash
Do
not
power
or
become unusable. The OM2P V2
off the
OM2P V2 during
11.6
Time
Settings
Click
the Time Settings link under the Management
menu to configure the
OM2P V2
system time. You can enter the time manually or,
OM2P V2 with
Network Time Protocol
Manually Set Date and
(NTP) server.
Manually specify the date and time.
Tim
e
Automatically Ge
t
Select a time zone from the drop-down list and check
to
ensure accuracy, synchronize
the
whethe
r
Date and Time
Save/Apply / Cancel
Clicking Save/Apply
you want to enter the
default
NTP server.
Click Save/Apply to apply the
previous setti
changes
the setting immediately. You
ngs.
IP address
changes
of an
NTP server
or
use the
or Cancel to retur
cannot undo the action.
n
11.7
Log
Click
the Log link under the Management
menu to display a list of events that are triggere
d
on the
e
rror
OM2P V2 Ethernet
occurs
department
for debugging
Syslog
on the system
pur
poses.
and
wireless
interfaces.
or when a report
Enable or disable the
You can consult this log if an unknown
needs
to be sent to the technical support
OM2Psyslog function.
Log Server
IP Address Enter
Local Log
Save/Apply / Cancel
Clicking Save/Apply
the
IP address
of the log server.
Enable or disable the local log service.
Click Save/Apply to apply the
previous setti
changes
the settings immediately. You
ngs.
changes
or Cancel to retur
cannot undo the action.
n
11.8
Diagnostics
Click
the Diagnostics link under the Management
menu to ascertain connection quality and
trace the routing table to the target.
Target
IP
Enter the
IP address
you would like to search.
Ping Packet Size
Number
Start
of
Ping
Pings
Traceroute Target
Start Traceroute
Enter the packet
Enter the number of times you want to ping.
size
of
each ping.
Click Start Ping to begin pinging.
Enter an
IP address
Click Start Tr
or domain name you want to tr
aceroute
ace.
to begin the trace route operation.
Chapter 12 Network Conf
igu
ration Examples
This
chapter provides step-by-step descriptions for using the
The
Access Point Mode’s default configuration allows the
OM2P V2’s
OM2P V2
operating modes.
to act
as
a central unit of
a WLAN or
are
reserved
12.1
Access Point
Access Point
Ste
Ste
Ste
Ste
Ste
as
a root device of a wired envir
for future confi
guration.
onment. Repeater mode and Mesh network mode
p1 Log in to the Web Configurator with your browser by entering
the default
p2
p3
p4
Use
site
Select channel with
Specify
configure multiple
p5 Verify the
IP address
survey
the
SSID
VLAN
192.168.1.1
to
scan channels available
less
interferences.
for your broadcast
SSID
at the
SSID
same time.
in nearby areas
and you can also
identif ier to separate services
.
among clients
Ste
Ste
For
p6
p7
more
Set the authentication setti
Click
Apply
advanced setti
ngs
.
to
save
all cha
nges.
ngs, refer to the previous chapters.
Wireless
Client
Ste
p1
Ste
p2
Select the
Use
site
survey
Access Point to which you want to connect, or enter the
manually.
Ste
p3 Configure the
Ste
p4
Select the appropriate authentication type and password.
Access Point Mode does not provide
must be configured manually using the
12.2 Client
Client Bridge Mode functions like a
Router
to join the network.
Bridge
Mode
wireless
Refer
to Chapter 13 to check the
Client Bridge
wireless
to
VLAN
same Local
dongle.
Access Point’s c
mode with which you want to associate.
scan
nearby
ID in your
DHCP server,
Area Network subnet.
It must connect to an
Access Point and either select the
wireless
device if available.
so the
Wireless
Client
Access Point/
onfiguration.
SSID
IP
address
AP
Ste
p1 Log in to the Web Configurator with the default
192.168.1.1
Ste
p2
For Operation Mode, select Client
Properties.
Use
site
Step3
areas.
Step4
Step5
Select the
Set up the authentication settings that match the
settings.
Step6
The
Client Bridge
Click
Apply
IP
Bridge
survey
to
scan Access Points that are
Access Point with which you want to associate.
to
save
all cha
settings must match the
nges.
Access Point’s subnet.
IP
address
from System
available
Access Point’
in nearby
s
12.3
WDS
Bridge
Mode
Use
this feature to link multiple
Access Points
in a network.
All clients associated
with any
Access Points
WDS Bridge
Ste
Ste
Ste
Step4
Ste
Step6
Ste
Channel,
and Security Setting.
can communicate with
each
other in an ad-hoc manner.
p1 Log in to the Web Configurator with the default
p2
p3
p5
192.168.1.1
For Operation Mode, select
Properties.
Select the channel you want to
Set up the authentication settings
Set up
Specify
WDS
Link Settings.
the MAC
address
WDS
of the
use
Bridge
.
from System
Access Point with which you want
to connect.
p7
Each WDS
Click
Apply
to
bridge device must
save
use
all cha
the
nges.
same Subnet, Wireless Mode, Wireless
IP
address
12.4
Client Router
In Client
Router Mode, the
OM2P V2’s
internal
DHCP server
allows
LANs
to automaticall
y
generate an
and connect to
Client Router
Ste
Ste
Ste
Step4
IP address
LANs
Refer
to
share
the
same Internet. Connect an
using a wired connection.
to Chapter 13 to check the
Access Point’s c
Access Point/WISP wirelessly
onfiguration.
p1 Log in to the Web Configurator with the default
p2
p3
192.168.1.1
For Operation Mode, select Client Router from System
Properties.
Change
your Local
Area Netw
ork
setting to Obtain
Address Automatically.
Use
site
areas.
survey
to
scan Access Points
that are
available
IP
address
an IP
in nearby
Step5
Step6
Ste
p7
Select the
Set up authentication settings that match the
settings.
Access Point with you want to associate.
Set your WAN connection type using the WAN settings provide
by your ISP.
Step8
Chapter 13
Client
Building
Router’s IP
Click
Apply
to
save
all cha
setting must match to the
a Wireless Network
With its ability to operate in various operating modes,
Access Point’
nges.
Access Point’s subnet.
your
OM2P V2
s
d
is the ideal device
around
which you can build your
around yo
ur
OM2P V2
using he
WLAN. This
device’s
appendix
operating modes.
describes
how to build a
WLAN
13.1
Access
Poin
t Mode
In
Access Point Mode,
OM2P V2 behaves
likes a central connection for stations or clients tha
t
support
SSID
at the same
IEEE
802.11
and security
time for
b/g/n networks. Stations
password
secure
to associate with the
guest
access.
and client must be conf
13.2
The OM2P V2 Access Point Mode also supports
allows
the MAC
settings. WDS
Not every
Access Point Mode
wireless
addresses
connections to the
in both
supports eight
Access Points
AP
Access Point device supports
with
WDS Function
OM2P V2
to enlarge the
MAC addresses.
WDS
using
in
igured to
OM2P V2. The OM2P V2
WDS functionality. This
WDS tec
Access Point Mode.
hnol
ogy. In this mode, conf
wireless area
As a result, to
use
supports four
operating mode
by enabling
the same
SSIDs
igure
WDS
Link
use WD
S,
we recommend you
use
the
OM2P V2.
13.3
Client Bridge
Mode
In Client Bridge Mode, the
OM2P V2 behaves
like a
wireless
client that connects to an Access
Point wirelessly
the
OM2P V2
V2
SSID and security password accordingly to associate with the
c
onfiguratio
and allows
Site
Survey
n,
the station
users
to surf the Internet whenever they want.
to
scan
for
has
a wired Ethernet
Access Points
connection to the
within ra
nge. Then configure the
13.4 WDS Bridge
In
WDS
Bridge Mode, the
MAC
address
LANs located a small distance apart want to communicate with
is to
use
WDS
Bridge Mode can establish 16
and security settings of
the
OM2P V2
Mode
OM2P V2
to
wirelessly
can
wirelessly
each OM2P V2 device.
connect two wired
WDS links,
connect different
LANs, as
creating a star-like network.
In this mode, use
Access Point.
OM2P V2
LANs
Use
this mode when two wired
each other. The
In this
LAN
port.
by configuring the
best solution
shown in the following fi
OM2P
gure.
WDS
Bridge Mode is unlike
frequency cha
aware
to avoid loop in your
nnel,
more
Access Point. Access Points
Access Points
connected together may lower throughput. Please
linked by
WDS
are using the same
wireless connection, otherwise enable Spanning Tree Functi
on.
be
13.5
Client Router
Mode
In Client
Router Mode, the
OM2P V2’s
internal
DHCP server
allows a number of
LANs to
automatically generate
AP/WISP wirelessly
13.6 RADIUS Connect
Remote
configuring the
have a
Authentication Dial In
OM2P V2 wireless advanced
RADIUS server. WPA(TKIP), WPA2(AES),
IP addresses
and connect to
ions
User Service (RADIUS)
to
share
LANs
the
same Internet. In this mode, connect an
via a wired connection.
authentication is
settings
and
(see
WPA2
supported.
The
following figure
shows
an example of a
RADIUS configuration, where two
devices installed at different locations communicate with
c
onfiguration,
one
OM2P V2
is configured for
Access Point Mode and connected to a
Chapter
available
8). Use
this feature if you
when
Mixed encryption types are also
OM2P V2
each
other
wirelessly.
In this
RADIUS
server
RADIUS server
via a switch, while the other
uses an authentication
identification, along with, opti
user's network
privileges.
Reject (user
additional information fr
Access
Accept
address
The RADI
US
or
phone number, account status and specif ic network
server
is denied access to all requested network
om
(user
is granted access).
OM2P V2
scheme
is configured for Client Bridge Mode.
such
as PAP
or
CHAP
onally, other information related to the re
then returns one of three
responses
to the
resources), Access Challenge (requests
the user such
as a secondary password),
to verify a
user's
quest, such
service access
OM2P V2 : Access
PIN,
token or
The
as
the
card),
or
Appendix A – Troubleshootin
This
appendix provides problem-solving
troubleshoot your
A.1 Problem Solvin
Question
How
do I reset the
OM2P V2.
g
OM2P V2?
It
also includes
g
information
you may
find
useful
in
information about contacting technical s
Answer
There are
hardware method and a software method. Both
methods
default configuration.
To use
on
the bottom
the Reset button
object
two
ways
to reset the
return the
the
hardware method, open
panel
OM2P V2
of the
(see section 2.1). Using a
such as a pencil, press
case you need to
upport.
OM2P V2,
to its factory
a
the cover
OM2P V2 and
find
flat
the Reset button
Why do
OM2P V2
What is
I
plugged
on
on,
I not
to
the
the
the
back
how come?
default
of
When I install
V2, what kind
see
traffic
pass
a PoE switch?
IP address
PoE
to the
OM2P V2
second Ethernet port
but the unit
the
PoE co
of
PoE should I use?
nnection
after I connect the
of the
OM2P V2? The
is
not
to the
OM2P
for approximately
pressing.
To use
the software method,
10 seconds
and then st
click Restore to
Factory Default in the Management
The OM2P V2 uses a
and will not
compliant
default
You need
PoE
injector
work
IP address is
to
plug
to the
secondary Ethernet
LAN
as IP
port for
camera
regular Ethernet connection such
The OM2P V2 uses a
and will not
compliant
work
proprietary
with standard
192.168.1.1
the Ethernet
main LAN
port
is
just an
proprietary
with standard
PoE
802.3af
cable co
port. The
additional
PoE
802.3af
op
menu.
injector
-
nnect t
injector
-
o
I
want
to
use higher gain ante
OM2P V2,
I
want
OM2P V2,
antenna
but I don’t
to
buy a high-gain ante
but I don’t
know what ante
know what type
and RF connector to buy.
nnas
nna
on
the
nna is
for the
of
Use
the ante
(2.4 GHz)
Use an antenna
c
onnect
85
nna appropriate
with a SMA connector t
to the
OM2P V2.
for the frequency.
o
A.2 Contacting
Technical Support
If you encounter issues that cannot be resolved using this manual, please contact your vendor where you
purchase the device. If you cannot contact your vendor, you may also contact EnGenius Customer Service
department in the region where you purchased the device.
Before you contact your local EnGenius office, please prepare the following information:
Product model name and serial number
The place where you purchased the product
Warranty information
The date when you received the product
A brief description about the issue and the attempts you tried to resolve it
To contact EnGenius Customer Service office in the United States, please use either of the following methods:
A base station in a WLAN that act as a central transmitter and receiver of WLAN radio signals.
Ad Hoc
Network
A short-term WLAN framework created between two or more WLAN adapters, without going
through an Access Point. An ad hoc network lets computers send data directly to and from one
another. For an ad hoc network to work, each computer on the network needs a WLAN card
installed configured for Ad Hoc mode.
Antenna
A device that sends and receives radio-frequency (RF) signals. Often camouflaged on existing
buildings, trees, water towers or other tall structures, the size and shape of antennas are generally
determined by the frequency of the signal they manage.
Authentication
A process that verifies the identity of a wireless device or end-user. A common form of
authentication is to verify identities by checking a user name and password to allow network
access.
Bac
kbone
A high-speed line
or
series
of connections
that form
a major pathway within a network.
Bandwidth
The
part of the
has a center frequency and
carry
the
is called
the bandwidth.
frequency spectrum required
additional
transmitted information.
to
transmit
desired
frequencies above and below this
The range
of
frequencies
from the lowest to the highest
information.
carrier frequency
Each radio
channel
that
used
Bridge
A wireless device that connects multiple networks that are physically separate or use different
media, but which use similar standards.
Bridge
An Access Pointy in
segments. The peer device also must
e
CHAP
Challenge Handshake
Mode
quivalent
bridge mode can operate as a WLAN bridge
be
in
bridge mode. This wireless bridge connection is
to
a Wireless Distribution System (WDS).
Authentication Protocol.
An alternative
that connects
protocol
that
two
uses
wired
a
network
chall
Co
llision
enge/res
ponse technique instead
of
sending passwords over
the wire.
Interference resulting from two network devices sending data at the same time. The network
detects the collision of the two transmitted packets and discards both of them.
Coverage
The region within which a paging receiver can reliably receive the transmission of paging signals.
Coverage
Area
The geographical area that can be served by a mobile communications network or system.
Coverage
Hole
An area within the radio coverage footprint of a wireless system where the RF signal level is
below the design threshold. Physical obstructions such as buildings, foliage, hills, tunnels, and
indoor parking garages are usually the cause of coverage holes.
Cyclic
Redundancy Check (CRC)
A common techni
Dynamic Host Configuration Protocol (
que
for detecting data transmission errors.
DHCP)
A protocol that assigns temporary IP addresses automatically to client stations logging onto an IP
network, so the IP addresses do not have to be assigned manually. The OM2P V2 contains an
internal DHCP server that automatically allocates IP address using a user-defined range of IP
addresses.
Dead Spot
An area within the coverage area of a WLAN where there is no coverage or transmission falling
off. Electronic interference or physical barriers such as hills, tunnels, and indoor parking garages
are usually the cause of dead spots. See also coverage area.
802.11
A category of WLAN standards defined by the Institute of Electrical and Electronics Engineers
(IEEE).
802.11a
An IEEE standard for WLANs that operate at 5 GHz, with data rates up to 54 Mbps.
802.11b
An IEEE standard for WLANs that operate at 2.4 GHz, with data rates up to 11 Mbps.
802.11g
An IEEE standard
standard also raises
data
rate.
Encryption
for
WLANs
the
that operates at
encryption bar
2.4 GHz,
to
WPA2. The 40 HT
with data
option
rate
of
300 Mbps. The
can be added
to
increase
new
Translates data into a secret code to achieve data security. To read an encrypted file, you must
have a secret key or password for decryption. Unencrypted data is referred to as plain text;
encrypted data is referred to as cipher text
ESS
ID
The
unique identifier
same group must
for
have
an ESS.
the
same ESSID.
All Access Points
and
their associated wireless stations in the
Footprint
Geographical areas where an
entity
is licensed
to broadcast its signal.
the
Gateway
A computer system
different com
munication protocols, data
HT mode
or other
device
that acts as a
translator between two systems that us
formatting structures,
languages,
e
and/or architecture.
In the
Physical Layer, Mixed Mode, and Green Field.
channels are used. The larger 40 MHz bandwidth can provide
802.11n system, two
new formats,
called High Throug
If a system
runs 40 HT,
hput
(HT), are defined
two adjacent
better
transmit quality and speed.
Keys
Like passwords, keys open (decrypt) and close (encrypt) messages. While many
algorithms
Local-Area
A small data
c
onnect workstations
as
well
Media
Address associated
its own specific MAC address. This
used
that
have
Network
are commonly known and public,
Network (L
network
as data. LANs also
Access Control
to
provide security for
their
MAC addresses added
AN)
covering a
or
personal computers.
facilitate communication through e-mail
(MAC) Address
with
every hardware device
WLANs. When a
Address Translation (NAT)
the
limited
area, such as a building
unique identifier
network
to that net
key must
LANs
let
on the
is hard-coded
uses a MAC table, only
work's
be kept secret.
or
group
of
many users share devices such as printer
or chat sessions.
network.
Every 802.11 wireless device has
into the
device and can
MAC table can access
for the
20 MH
encryption
buildings.
the
802.11
Most LANs
radios
the network.
z
s
be
An Internet standard
set
of
addresses
Network
A protocol
123 by
Time Protocol (NTP)
that lets devices synchronize
default.
that lets a LAN use one set of
for external traffic.
their time with a time
Passphrase
A
text string that automatically generates WEP keys
Power Over Ethernet (PoE)
A PoE
provides power
need
for
a power source.
to
PoE-enabled devices using an 8-pin
Preamble
S
ynchronizes transmissions
Redundancy Check block
in
a WLAN. The preamble
for communication between a device and roaming wireless stations.
Protected Extensible Authentication Protocol (PE
Authentication protocol
802.11 WL
Quality
ANs.
of Service
(QoS)
of
IEEE
802.1x used
to
send
IP addresses
for
server. NTP uses
on
wireless
client adapters.
CAT 5 Ethernet
type
AP)
defines
the length
authentication data
internal
traffic
and passwords
and a second
TCP
or
UDP port
cable, eliminating the
of the Cyclic
over
A net
work’s
methods used
Remote Authentication
Networking
management
ability
to
deliver data with
to
provide bandwidth
Dial-In User Service (RADIUS)
protocol
that
for computers
provides centralized authentication, authorization, and
and ubiquitous nature, the
access
to the
Internet
or
internal net
to co
nnect and use a
RADIUS
protocol
minimum delay.
for
real-time multimedia
network
is
often
used by ISPs and enterprises
works,
WLANs, and integrated e-mail services.
QoS
also refers
applications.
service. Because
to the networking
accounting
of its
broad support
to manage
Service Set
Name
each
Simple
An Internet-sta
S
nooping
Passively watching a network
Temporal Key
An encryption protocol
the
authentication
key never being used
Identifier (SSID)
of
a WLAN. All wireless devices on a WLAN must
other.
Network Management Protocol (SNMP)
ndard protocol
for
managing devices
for data, such as passwords,
Integrity Protocol (TKIP)
that
uses
server.
TKIP
regularly changes and rotates
128-bit
keys. Keys
twice.
use
on
IP net
are dynamically generated
Transmission Control Protocol/Internet Protocol (TCP/IP)
A protocol
Internet
Weighted
WFQ services queues are based on
more service
that
allows co
mmunicati
communications.
Fair Queuing (WFQ)
than
queues
ons over and between networks. TCP/IP
priority
with
smaller weights. This
and queue weight.
highly efficient
the
same SSID
works.
that
can be used
encryption keys,
Queues
queuing mechanism divides
to communicate wit
to
benefit a
and distributed by
with
an
is
the
basis for
with
larger weights get
h
hacker.
encryption
available bandwidth
Wired Equivalent
Security protocol
across
different
Privacy (WEP)
that
provides a WLAN
traffic queues.
with
a level
of security and privacy comparable
a wired LAN. WEP encrypts data sent between wired and WLANs
Wireless Local-Area
WLANs use RF technology
Network (WLAN)
to
send and receive data wirelessly
in a certain area. This lets users
small zone send data and share resources such as printers without
c
onnect each
Wi-Fi Protected
A subset of the
Protocol
Temporal Key
data.
See
Wi-Fi
MultiMedia (WMM)
Part of the
for
multimedia applications in WL
Wireless Client Supplicants
computer.
Access (WPA
IEEE
(EAP)
to authenticate
802.11i standard.
)
wireless clients using an external RADIUS database.
Integrity Protocol (TKIP), Message
also
WPA-PSK (WPA -Pre-Shared K
IEEE
802.11e QoS en
hancement
ANs.
WPA applies
Integrity
ey).
to the
IEEE
802.1x and Extensible
Check (MIC), and
Wi-Fi standard that
to
keep transmissions
using cables
to physically
Authentication
IEEE
802.1x
ensures
quality
to that of
private.
WPA use
to encrypt
of
service
in a
s
Software that
WPA -Pre-Shared
WPA-PSK
and wireless client. A client
WPA2
runs
on
an
operating system, instructing the
Key (WPA-PSK)
requires a single (identical)
is granted
A wireless security standard that
management than
WPA.
It
includes
password entered
access
defines stro
two data
to
nger
encryption algorithms, Temporal Key
a WLAN
wireless
into
each Access Point,
if the
client how
passwords
match.
encryption, authentication, and
to
use WPA.
wireless
key
Integrity
gateway,
Protocol
(TKIP)
and Advanced Encryption Standard (AES)in
chaining Message
Wireless
A technology that lets
WLAN.
Distribution
authentication
System (WDS)
Access
Points
Code Protocol (CCMP).
communicate
with one another to extend the range of a
the Counter mode with Cipher
block
Appendix D –
FCC Interference Statemen
t
Federal Communication Commission Interference Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣΚΑΙΤΙΣΛΟΙΠΕΣΣΧΕΤΙΚΕΣΔΙΑΤΑΞΕΙΣΤΗΣΟΔΗΓΙΑΣ1999/
[nom dufabricant]
essentielles et aux autresdispositionspertinentesdeladirective1999/5/CE.
[nome del
essenziali ed alle altre disposizionipertinentistabilitedalladirettiva1999/5/CE.
[name of manufacturer
atbilst Direktīvas 1999/5/EKbūtiskajāmprasībāmuncitiemartosaistītajiemnoteikumiem.
[manufacturer name]
1999/5/EB Direktyvos nuostatas.
[naamvandefabrikant]
essentiële eisen en de andererelevantebepalingenvanr
m
essenzjali u ma provvedimentioħrajnrelevantilihemmfid
és az 1999/5/EC irányelvegyébelõírásainak
[nazwa producenta]
oraz pozostałymi stosownymipostanowieniamiDyrektywy1999/5/EC.
declaraqueeste
e outras disposições daDi
izjavlja,dajeta
določili direktive 1999/5/ES.
týmto vyhlasuje,že
ustanovenia Smernice 1999/5/ES.
manufacturer]
tyyppinen laite on direktiivin1999/5/EYoleellistenvaatimustenj
[företag]
egenskapskrav och övrigarelevantabestämmelsersomframgåravdirektiv1999/5/EG.
[seadmetüüp=typeofequipment]
Ü põhinõuetele ja nimetatud direktiivist tulenevateleteisteleasjakohastele
is in compliancewiththe
[clase de equipo]
a otras disposiciones aplicables o exigiblesdelaDirectiva1999/5/CE.
[type of equipment]
estconformeauxexigences
[tipo di apparecchio]
pe ofequipment/iekārtastips]
atitinka esminiusreikalavimusirkitas
inovereenstemmingismetde
ichtlijn 1999/5/EG.
jikkonformamal
Dirrettiva 1999/5/EC.
megfelel a vonatkozó alapvetõkövetelményeknek
jest zgodny z zasadniczymiwymogami
está conformecomosrequisitosessenciais
v skladu z bistvenimi zahtevamiinostalimirelevantnimi
spĺňa základné požiadavkyavšetkypríslušné
[type of equipment = laitteentyyppimerkintä]
a sitä koskeviendirektiivinmuiden
står I överensstämmelsemeddeväsentliga
Eesti
[Estonian]
English
Español
[Spanish]
Ελληνική
[Greek]
Français
[French]
Italiano
[Italian]
Latviski
[Latvian]
Käesolevaga kinnitab
sätetele.
Hereby,
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ
Par la présente
Con la presente
Ar šo
name of manufacturer] seadme
, declares that this [type of equipment]
[nombre del fabricante] declara que el
ΔΗΛΩΝΕΙ ΟΤΙ
déclare que l'appareil [type d'appareil]
costruttore] dichiara che questo
/ izgatavotāja nosaukums] deklarē, ka [ty
cumple con los
ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ
5/ΕΚ.
è conforme ai requisiti
Lietuvių
[Lithuanian]
Nederlands
[Dutch]
Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
Português
[Portuguese]
Slovensko
[Slovenian]
Šiuo
Hierbij verklaart
Hawnhekk, [isem tal-
Alulírott, [gyártó neve]
Niniejszym
[Nome do fabricante]
[Ime proizvajalca]
deklaruoja, kad šis [equipment type]
dat het toestel [type van toestel]
anifattur], jiddikjara li dan [il-mudel tal-prodott]
-
nyilatkozom, hogy a [... típus]
.
oświadcza, że [nazwa wyrobu]
[tipo de equipamento]
rectiva 1999/5/CE.
[tip opreme]
-ħtiġijiet
Slovensky
[Slovak]
Suomi
[Meno výrobcu]
[Valmistaja =
vakuuttaa täten että
[typ zariadenia]
[Finnish]
ehtojen mukainen.
Svenska
Härmed intygar
att denna [utrustningstyp]
[Swedish]
Industry Canada statement:
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject
to the following two conditions: (1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may
cause undesired operation.
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux
appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions
suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce
dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de
provoquer un fonctionnement indésirable.
Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance
20cm between the radiator & your body.
Déclaration d'exposition aux radiations:
Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies
pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un
minimum de 20 cm de distance entre la source de rayonnement et votre corps.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.