EnGenius 11N Wireless Gigabit Multi-Function Client Bridge User Manual

11N Wireless Gigabit
Multi-Function Client Bridge
User’s Manual
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
2
Table of Contents
1 INTRODUCTION................................................................................................................................... 5
1.1 F
EATURES AND BENEFITS ...........................................................................................................5
1.2 P
ACKAGE CONTENTS .................................................................................................................6
1.3 S
AFETY GUIDELINES ..................................................................................................................7
1.4 S
YSTEM REQUIREMENTS............................................................................................................7
1.5 A
PPLICATIONS...........................................................................................................................7
1.6 N
ETWORK CONFIGURATION.........................................................................................................8
2 UNDERSTANDING THE HARDWARE................................................................................................. 9
2.1 H
ARDWARE INSTALLATION...........................................................................................................9
2.2 IP
ADDRESS CONFIGURATION .....................................................................................................9
3 WEB CONFIGURATION......................................................................................................................11
3.1 L
OGGING IN.............................................................................................................................11
3.2 S
YSTEM..................................................................................................................................12
3.2.1 S
TATUS...................................................................................................................................13
3.2.2 S
CHEDULE ..............................................................................................................................13
3.2.3 E
VENT LOG.............................................................................................................................14
3.2.4 S
TATISTICS..............................................................................................................................15
3.2.5 W
IRELESS OPERATING MODES..................................................................................................16
3.2.5.1 S
WITCHING BETWEEN OPERATING MODES..................................................................................16
3.2.5.2 A
CCESS POINT OPERATING MODE ............................................................................................17
3.2.5.2.1 S
TATUS...................................................................................................................................17
3.2.5.2.2 B
ASIC.....................................................................................................................................17
3.2.5.2.3 A
DVANCED..............................................................................................................................19
3.2.5.2.4 W
IRELESS SECURITY MODE...................................................................................................... 20
3.2.5.2.4.1 S
ECURITY DISABLED................................................................................................................20
3.2.5.2.4.2 WEP
(WIRED EQUIVALENT PRIV ACY).........................................................................................21
3.2.5.2.4.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY...............................................................22
3.2.5.2.4.4 WPA
RADIUS (802.1X)..........................................................................................................23
3.2.5.2.5 WPS
(WI-FI PROTECTED SETUP) .............................................................................................24
3.2.5.2.6 C
LIENT LIST ............................................................................................................................26
3.2.5.2.7 VLAN ....................................................................................................................................26
3.2.5.2.8 WMM
(WIRELESS MULTIMEDIA)................................................................................................26
3.2.5.3 C
LIENT BRIDGE OPERATING MODE............................................................................................28
3.2.5.3.1 S
TATUS...................................................................................................................................28
3.2.5.3.2 B
ASIC.....................................................................................................................................28
3.2.5.3.3 W
IRELESS SECURITY MODE...................................................................................................... 30
3.2.5.3.3.1 S
ECURITY DISABLED................................................................................................................30
3.2.5.3.3.2 WEP
(WIRED EQUIVALENT PRIV ACY).........................................................................................30
3.2.5.3.3.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY...............................................................32
3.2.5.3.3.4 WPA
RADIUS (802.1X)..........................................................................................................33
3.2.5.3.4 AP
PROFILE............................................................................................................................34
3.2.5.3.5 C
LIENT LIST ............................................................................................................................35
3.2.5.3.6 WMM
(WIRELESS MULTIMEDIA)................................................................................................35
3.2.5.4 WDS
OPERATING MODE ..........................................................................................................37
3.2.5.4.1 S
TATUS...................................................................................................................................37
3.2.5.4.2 B
ASIC.....................................................................................................................................37
3.2.5.4.3 A
DVANCED..............................................................................................................................39
3.2.5.4.4 W
IRELESS SECURITY MODE...................................................................................................... 40
3.2.5.4.4.1 S
ECURITY DISABLED................................................................................................................40
3.2.5.4.4.2 WEP
(WIRED EQUIVALENT PRIV ACY).........................................................................................41
3.2.5.4.4.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY...............................................................42
3.2.5.4.4.4 WPA
RADIUS (802.1X)..........................................................................................................43
3.2.5.4.5 C
LIENT LIST ............................................................................................................................44
3.2.5.4.6 WMM
(WIRELESS MULTIMEDIA)................................................................................................45
3.2.5.5 R
EPEATER OPERATING MODE...................................................................................................45
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
3
Table of Contents
3.2.5.5.1 STATUS...................................................................................................................................46
3.2.5.5.2 B
ASIC.....................................................................................................................................46
3.2.5.5.3 A
DVANCED..............................................................................................................................47
3.2.5.5.4 W
IRELESS SECURITY MODE...................................................................................................... 49
3.2.5.5.4.1 S
ECURITY DISABLED................................................................................................................49
3.2.5.5.4.2 WEP
(WIRED EQUIVALENT PRIV ACY).........................................................................................49
3.2.5.5.4.3 WPA
(WI-FI PROTECTED ACCESS) / PRE-SHARED KEY...............................................................51
3.2.5.5.4.4 WPA
RADIUS (802.1X)..........................................................................................................52
3.2.5.5.5 C
LIENT LIST ............................................................................................................................53
3.2.5.5.6 WMM
(WIRELESS MULTIMEDIA)................................................................................................53
3.3 N
ETWORK ...............................................................................................................................54
3.3.1 S
TATUS...................................................................................................................................54
3.3.2 LAN
/ DHCP CLIENT, SERVER..................................................................................................55
3.3.3 WAN
(BRIDGE/ROUTER)..........................................................................................................56
3.3.3.1 WAN
STATIC IP ADDRESS ......................................................................................................56
3.3.3.2 WAN
DYNAMIC IP ADDRESS...................................................................................................57
3.3.3.3 WAN
PPPOE ......................................................................................................................58
3.3.3.4 WAN
PPTP.........................................................................................................................59
3.4 M
ANAGEMENT .........................................................................................................................60
3.4.1 A
DMIN ....................................................................................................................................60
3.4.2 SNMP ...................................................................................................................................61
3.4.3 F
IRMWARE UPGRADE ...............................................................................................................61
3.4.4 R
ESTORE TO FACTORY DEFAULT ............................................................................................... 62
3.4.5 B
ACKUP SETTINGS...................................................................................................................63
3.4.6 R
ESTORE SETTINGS.................................................................................................................63
3.5 T
OOLS....................................................................................................................................64
3.5.1 T
IME ZONE..............................................................................................................................64
3.5.2 P
OWER SAVING .......................................................................................................................65
3.5.3 D
IAGNOSIS..............................................................................................................................65
3.5.4 R
ESET....................................................................................................................................65
APPENDIX A – SPECIFICATIONS............................................................. ............. .................... ...... ............66
H
ARDWARE SUMMARY..................................................................................................................................66
R
ADIO SPECIFICATIONS ................................................................................................................................66
S
OFTWARE FEATURES..................................................................................................................................67
M
ANAGEMENT .............................................................................................................................................68
E
NVIRONMENT & PHYSICAL...........................................................................................................................68
APPENDIX B – FCC INTERFERENCE STATEMENT...................................................................................69
INDEX............................................................................................................................................................70
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
4
Revision History
Version Date Notes
1.0 July 12, 2008 Initial Version
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
5
1 Introduction
The Multi-function Gigabit Wireless-N Client Bridge is an 802.11n-draft compliant device that delivers up to 6x faster speeds than 802.11g while staying backward compatible with
802.11g and 802.11b devices. The Wireless Client Bridge, Access Point, and Repeater/WDS built into the device uses
advanced MIMO (Multi-Input, Multi-Output) technology to transmit multiple steams of data in a single wireless channel. The robust signal travels farther, maintaining wireless connections up to 3 times further than standard 802.11g, eliminates dead spots and extends network range.
To protect the data and privacy, the device can encode all wireless transmissions with 64/128-bit encryption as well as serves as your network's DHCP Server, In addition, the device also provides easy configuration through the web-browser.
The incredible speed and QoS function of 802.11n (draft2.0) makes it ideal for media­centric applications like streaming video, gaming, and VoIP telephony. It is designed to run multiple media-intense data streams through the network at the same time, with no degradation in performance.
This chapter describes the features & benefits, package contents, applications, and network configuration.
1.1 Features and Benefits
Features Benefits
High Speed Data Rate Up to 300Mbps
Capable of handling heavy data payloads such as MPEG video streaming
IEEE 802.11n draft Compliant and backward compatible with
802.11b/g
Fully interoperable with IEEE 802.11b/g/n devices
IEEE 802.11b/g Compliant Fully Interoperable with IEEE 802.11b/IEEE802.11g
compliant devices Multi-Function Users can use different mode in various environment Point-to-point, Point-to-
multipoint Wireless Connectivity
Let users transfer data betw een two bu ildin gs or
multiple buildings WDS (Wireless Distributed
System)
Make wireless AP and Bridge mode simultaneously
as a wireless repeater Universal Repeater The easiest way to expand your wireless network's
coverage Support Multi-SSID function (4 Multiple SSIDs serve as multiple APs which allow
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
6
SSID) in AP mode administrator to assign different policies for specific
user groups. WP A2/WPA/ IEEE 802.1x
support
Powerful data security
802.1x Supplicant support (CB mode)
More powerful data security in Client Bridge mode
MAC address filtering in AP mode
Ensures secure network connection
User isolation support (AP mode)
Protect the private network between client users.
PPPoE function support (CR mode)
Easy to access internet via ISP service
authentication Power-over-Ethernet
(IEEE802.3af)
Flexible Access Point locations and cost savings
Keep personal setting Keep the latest setting when firmware upgrade
Support RSSI indicator bar (CB mode)
Users can select the best signal to co nnect with AP
easily SNMP Remote Configuration
Management
Help administrators to remotely configure or manage
the Access Point easily . QoS (WMM) support Allow administrators to control connection bandwidth
and quality based on various rules.
1.2 Package Contents
Open the package carefully, and make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped in its original package.
h One Wireless N Multi-function Client Bridge h One
12V/1.25A 90V~240V Power Adapter
h
Three 2dBi 2.4GHz Dipole Antennas
h One CD-ROM with User’s Manual h One Quick Guide
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
7
1.3 Safety Guidelines
In order to reduce the risk of fire, electric shock and injury, please adhere to the following safety guidel ines.
h Carefully follow the instructions in this manual; also follow all instruction labels
on this device.
h Except for the power adapter supplied, this device should not be connected to
any other adapters.
h Do not spill liquid of any kind on this device. h Do not place the unit on an unstable stand or table. This unit may drop and
become damaged.
h Do not expose this unit to direct sunlight. h Do not place any hot devices close to this unit, as they may degrade or cause
damage to the unit.
h Do not place any heavy objects on top of this unit. h Do not use liquid cleaners or aerosol cleaners. Use a soft dry cloth for cleaning.
1.4 System Requirements
The following are the minimum system requirements in order configure the device.
h PC/AT compatible computer with a Ethernet interface. h Operating system that supports HTTP web-browser
1.5 Applications
The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:
a) Difficult-to-wire environments
There are many situations where wires cannot be laid easily. Historic buildings, older buildings, open areas and across busy streets make the installation of LANs either impossible or very expensive.
b) Temporary workgroups
Consider situations in parks, athletic arenas, exhibition centers, disaster­recovery, temporary offices and construction sites where one wants a temporary WLAN established and removed.
c) The ability to access real-time information
Doctors/nurses, point-of-sale employees, and warehouse workers can access real-time information while dealing with patients, serving customers and processing information.
d) Frequently changed environments
Show rooms, meeting rooms, retail stores, and manufacturing sites where frequently rearrange the workplace.
e) Small Office and Home Office (SOHO) networks
SOHO users need a cost-effective, easy and quick installation of a small network.
f) Wireless extensions to Ethernet networks
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
8
Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs.
g) Wired LAN backup
Network managers implement wireless LANs to provide backup for mission­critical applications running on wired networks.
h) Training/Educational facilities
Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning.
1.6 Network Configuration
To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as:
a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs. b) Infrastructure for enterprise LANs.
a) Ad-hoc (peer-to-peer) Mode
This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they are within range of one another. In ad-hoc mode, each client is peer-to-peer, would only have access to the resources of the other client and does not require an access point. This is the easiest and least expensive way for the SOHO to set up a wireless network. The image depicts a network in ad-hoc mode.
b) Infrastructure Mode
The infrastructure mode requires the use of an access point (AP). In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand­alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations. The image below depicts a network in infrastructure mode.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
9
2 Understanding the Hardware
2.1 Hardware Installation
1. Place the unit in an appropriate location after conducting a site survey.
2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook.
3. Plug one end of another Ethernet cable to WAN port of the device and the other end into you cable/DSL modem (Internet)
4. Insert the DC-inlet of the power adapter into the port labeled “DC-IN” and the other end into the power socket on the wall.
This diagram depicts the hardware configuration
2.2 IP Address Configuration
This device can be configured as a Bridge/Router or Access Point. The default IP address of the device is 192.168.0.1 In order to log into this device, you must first configure the TCP/IP settings of your PC/Notebook.
1. In the control panel, double click Network Connections and then double click on the connection of your Network Interface Card (NIC). You will then see the following screen.
Client Bridge/AP
PC, Cable/DSL Modem
Power Outlet
Ethernet
AC/DC cable
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
10
2. Select Internet Protocol (TCP/IP) and then click on the Properties button. This will allow you to configure the TCP/IP settings of your PC/Notebook.
3. Select Use the following IP Address radio button and then enter the IP address and subnet mask. You may follow the example below. Please Ensure that the IP address and subnet mask are on the same subnet as the device. For Example: Device IP address: 192.168.0.1(this is confusing; remove it) PC IP address: 192.168.0.10 PC subnet mask: 255.255.255.0
4. Click on the OK button to close this window, and once again to close LAN properties window.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
11
3 Web Configuration
3.1 Logging In
To configure the device through the web-browser, enter the IP address of the Bridge
(default: 192.168.0.1) into the address bar of the web-browser and press Enter.
Make sure that the device and your computers are configured on the same subnet.
Refer to Chapter 2 in order to configure the IP address of your computer.
After connecting to the IP address, the web-browser will display the login page.
Enter admin for both the user name and password.
After logging in you will see the graphical user interface (GUI) of the device. The
navigation drop-down menu on left is divided into five main sections:
1. System: This menu includes the status, schedule, event log, and monitor.
2. Wireless: This menu includes status, basic, advanced, security, WPS, Client list,
VLAN, and WMM. Through this section, you can also change the device operating mode, such as Access Point, Client Bridge, WDS, or repeater.
3.
Network: This menu includes status, LAN, and WAN. .
4.
Management: This menu includes the admin setup, SNMP, firmware upgrade, and save/restore backup.
5.
Tools: Displays the time zone, power saving, diagnostics, and device reset.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
12
3.2 System
Click on the System link on the navigation drop-
down menu. You will then see four options: Status, Schedule, Event Log, and Monitor. Each option is described in detail below.
I
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
13
3.2.1 Status
Click on the Status link under the System drop-down menu. The status page
displays a summary of current system settings. Information such as operating mode, system up time, firmware version, serial number, kernel version and application version are displayed in the ‘System’ section. LAN IP address, subnet mask, and MAC address are displayed in the ‘LAN’ section. In the ‘WLAN’ section, the frequency, channel is displayed. Since this device supports multiple-SSIDs, the details of each SSID, such as ESSID and its security settings are displayed in the ‘SSID_#’ section.
3.2.2 Schedule
Click on the Schedule link in the navigation menu. Prior to setting schedule, time
zone must be set in the Tools menu. Schedules can be created to specify the
occasions to enforce the rules.
For example, if you want enable power saving on Mon-Fri from 3pm to 8pm, you
could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
14
Click on the Add button to add a new schedule. .
Schedule Description: Specify a name for the schedule.  Service: Select a service.  Days: Select the days at which you would like the schedule to be effective.  Time of Day: Place a check in the All Day box if you would like the schedule to be
active for 24 hours. If you do not use the 24 hours option, you may specify a start time and end time.
Click on the Apply button to add this schedule into the list.
3.2.3 Event Log
Click on the Event Log link on the navigation menu. The device automatically
records important events in its internal memory. Order records will be over-written by the latest ones when it is out of internal memory.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
15
Save: Click on the Save button to save the log into a text file on your computer.  Clear: Click on the Clear button to clear the log on the screen.  Refresh: Click on the Refresh button to refresh the log.
3.2.4 Statistics
Click on the Statistics link in the navigation drop-down menu. This page displays the
transmitted and received packet statistics of the wired (LAN & WAN) and wireless interface. You may change the auto-refresh time by selecting the number of seconds from the drop- down list.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
16
3.2.5 Wireless Operating Modes
Click on the Wireless link on the navigation drop-down menu. In this section you
may select the operating mode of the device. Options available are: Access Point, Client Bridge, WDS, or Repeater. Each operating mode is described in detail below.
3.2.5.1 Switching between Operating Modes
Each of the operating modes offers different features. In order to switch the operating
mode, select it from the drop down list.
A dialog box will appear to notify you that the system will restart in order for the
change to take effect. Click on the OK button to continue.
Please wait while the device counts down and restarts into the new operating mode.
Each of the operating modes is described in detail in this chapter. Refer to the
following sections for each operating mode:
o 3.2.5.2 Access Point Operating Mode o 3.2.5.3 Client Bridge Operating Mode o 3.2.5.4 WDS Bridge Operating Mode o 3.2.5.5 Repeater Operating Mode
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
17
3.2.5.2 Access Point Operating Mode
In order to configure the device as an Access
Point, select Access Point from the Operating Mode drop-down list.
A dialog box will appear to notify you that the
system will restart in order for the change to take effect. Click on the OK button to continue.
Please wait while the device counts down and
restarts into the new operating mode.
Once the device has restarted into Access Point
mode, you will see a new drop-down menu with eight options which are: Status, Basic, Advanced, Security, WPS, Client List, VLAN, and WMM. Each of the options is described in detail below.
3.2.5.2.1 Status
Click on the Status link under the Wireless drop-down menu. This page will display
the current wireless settings such as SSID, Channel, Security and BSSID (MAC address)
3.2.5.2.2 Basic
Click on the Basic link under the Wireless drop-down menu. This page will display
the current wireless settings such as SSID, Channel, Security and BSSID (MAC address).
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
18
Radio: Choose to Enable or Disable the wireless radio.
Band: Select the IEEE 802.11 mode from the drop-down list. For example, if you are
sure that the wireless network will be using only IEEE 802.11g clients, then it is recommended to select 802.11g only instead of 2.4 GHz B+G which will reduce the performance of the wireless network. You may also select 802.11B+G+N. If all of the wireless devices you want to connect with this router can connect in the same transmission mode, you can improve performance slightly by choosing the appropriate "Only" mode. If you have some devices that use a different transmission mode, choose the appropriate "Mixed" mode.
Mode: This drop-down list is fixed to AP as this is the Access Point operating mode.
ESSID#: This device allows up for four SSIDs, select the SSID# that you would like to
configure from the drop-down list.
ESSID: The SSID is a unique named shared amongst all the points of the wireless
network. The SSID must be identical on all points of the wireless network and cannot exceed 32 characters.
Auto Channel: The device can automatically select the clearest channel in the
environment. If auto channel is disabled, then you must select a channel from the drop-down list.
Channel: Select a channel from the drop-down list. The channels available are
based on the country’s regulation. A wireless network uses specific channels in the wireless spectrum to handle communication between clients. Some channels in your area may have interference from other electronic devices. Choose the clearest channel to help optimize the performance and coverage of your wireless network.
Click on the Apply button to save the changes.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
19
3.2.5.2.3 Advanced
Click on Advanced link under the Wireless drop-down menu. This page allows you
to configure the fragmentation threshold, RTS threshold, beacon period, transmit power, DTIM interval, etc.
Fragment Threshold: Packets over the specified size will be fragmented in order to
improve performance on noisy networks. Specify a value between 256 and 65535. The default value is 2346.
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to
maintain performance in noisy networks and preventing hidden nodes from degrading the performance. Specify a value between 1 and 65535. The default value is 2346.
Beacon Period: Beacons are packets sent by a wireless Access Point to
synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. The default value is set to 100 milliseconds.
DITM Interval: A DTIM is a countdown informing clients of the next window for
listening to broadcast and multicast messages. When the wireless Access Point has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages. The default value is 1. Valid settings are between 1 and 255.
Data Rate: You may select a data rate from the drop-down list, however, it is
recommended to select auto. This is also known as auto-fallback.
N Data Rate: You may select a data rate for 802.11n from the drop-down list,
however, it is recommended to select auto. This is also known as auto-fallback.
Channel Bandwidth: You may select a channel bandwidth in order to improve the
efficiency of the network, however, it is recommended to select Auto 20/40MHz. This is also known as auto-fallback.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
20
Preamble Type: Select a short or long preamble. For optimum performance it is
recommended to also configure the client device as the same preamble type.
CTS Protection: CTS (Clear to Send) can be always ena bled, auto, or d isabled. By
enabled CTS, the Access Point and clients will wait for a ‘clear’ signal before transmitting. It is recommended to select auto.
Tx Power: You may control the transmit output power of the device by selecting a
value from the drop-down list. This feature can be helpful in restricting the coverage area of the wireless network.
Click on the Apply button to save the changes.
3.2.5.2.4 Wireless Security Mode
Click on the Security link under the Wireless drop-down menu. To protect your
privacy this mode supports several types of wireless security: WEP WPA, WPA2, and 802.1x RADIUS. WEP is the original wireless encryption standard. WPA provides a higher level of security. The following section describes the security configuration in detail.
3.2.5.2.4.1 Security Disabled
Click on the Security link under the Wireless drop-down menu.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down list.
Broadcast SSID: Select Enable or Disable from the dr op-down list. This is the SSID
broadcast feature.
When this option is set to Enable, your wireless network name is
broadcasted of your signal coverage
. If encryption is set to NONE, users will be able to access the AP without authentication. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop-down menu.
Encryption: Select Disable from the drop-down list.  Click on the Apply button to save the changes.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
21
3.2.5.2.4.2 WEP (Wired Equivalent Privacy)
Click on the Security link under the Wireless drop-down menu. WEP is an acronym for Wired Equivalent Privacy, and is a security protocol that
provides the same level of security for wireless networks as for a wired network.
WEP is less secure as compares to WPA encryption. To gain access to a WEP
network, you must know the key. The key is a string of characters that you use for password. When using WEP, you must determine the level of encryption.
The type of encryption determines the key length. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is automatically generated when WEP is enabled.
ESSID Selection: As this device supports multiple SSIDs, it is possible to configure
a different security mode for each SSID (profile). Select an SSID from the drop-down list.
Broadcast SSID: Select Enable or Disable from the dr op-down list. This is the SSID
broadcast feature.
When this option is set to Enable, your wireless network name is
broadcast to anyone within the range of your signal
. If you're not using encryption then they could connect to your network. When this is disabled, you must enter the Wireless Network Name (SSID) on the client manually to connect to the network.
WMM: Choose to Enable or Disable WMM. This is the Quality of Service (QoS)
feature for prioritizing voice and video applications. This option can be further configured in WMM under the Wireless drop-down menu.
Multi-Function Gigabit Wireless-N Client Bridge Version 1.0
22
Encryption: Select WEP from the drop-down list.  Authentication Type: Select Open, or Shared Key. Authentication method from the
drop-down list. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP. The device requesting authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used.
Key Length: Select a 64-bit or 128-bit WEP key length from the drop-down list.  Key Type: Select a key type from the drop-down list. 128-bit encryption requires a
longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange - alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember.
WEP Key 1-4: You may enter four different WEP keys.  Enable 802.1x Authentication: Place a check in this box if you would like to use
RADIUS authentication. This option works with a RADIUS Server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Serv er through this Gateway. Furthermore, it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users. You will then be required to specify the RADIUS Server’s IP address, port, and password.
Click on the Apply button to save the changes.
3.2.5.2.4.3 WPA (Wi-Fi Protected Access) / Pre-shared Key
Click on the Security link under the Wireless drop-down menu. WPA (Wi-Fi Protected Access) is designed to improve upon the security features of
WEP (Wired Equivalent Privacy). The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. WPA provides improved data encryption through the Temporal Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven’t been tampered with.
Loading...
+ 49 hidden pages