CHAPTER 8.REGULATORY COMPLIANCE INFORMATION ........ 51
1.1 Introducing the SF-3000
The SF-3000 is a fully interoperable with IEEE 802.11b compliant Outdoor
Wireless Last-mile product. The SF-3000 operates in remote bridge mode,
and connects SendFar RB-8110 Outdoor Wireless Router Bridge to
construct point-to-point as well as point-to-multipoint topologies, for
maximum flexibility in configuring building-to-building networks to WISP.
1.2 Product Features
9 Outdoor enclosure in compliance with IP67
9 RF transmit power 100mW (20dBm) with -85dBm Rx sensitivity
@ 11Mbps data rate
9 Embedded 9dBi patch directional antenna
9 Support 24VDC 0.8A Power-over-Ethernet
9 NAT/NAPT and Virtual Server Mapping support
9 MIB-II and Private MIB support
9 MAC address based access control
1.3 Package Contents
The product package contains the following items.
1. One (1) SF-3000 Outdoor Wireless Client Bridge unit
2. One (1) 100~240VAC, 50~60Hz AC/DC adapter with wall-
mount plug and DC plug power cord
3. One (1) 24VDC, 830mA Inline Power Injector (PoE)
4. One (1) 30m RJ-45 CAT-5 Ethernet cable
5. One (1) 1.8m RS-232 null modem console cable
6. One (1) 1.8m grounding wire
7. One (1) User manual CD-disc
8. One (1) wall/mast mounting kit, including one (1) band clamp
Version 1.01
1.4 System Requirements
Installation of the Outdoor Wireless Client Bridge requires the following:
ii
Version 1.01
1
1. A Windows-based PC/AT compatible computer or Ethernet
data device with an available RJ-45 Ethernet port to run the
configuration program or with TCP/IP connection to the
Ethernet network.
2. A 10/100Base-T Ethernet RJ-45 Ethernet cable is connected to
Ethernet network.
3. A RS-232 consol port cable is connected to PC/AT compatible
computer.
4. An AC power outlet (100~240V, 50~60Hz) supplies the power.
Chapter 2. Installation and Basic Configuration
This chapter describes the procedures of installing the SF-3000.
2.1 Before You Start
After unpacking the system, make sure the following items are present and
in good condition.
1.5 Inline Power Injector (PoE)
The SF-3000 is equipped with an Inline Power Injector module. The Inline
Power Injector (PoE) delivers both data and power to SF-3000 unit via a
signal Ethernet cable, and gives the following benefits to improve the
performance vs. installation cost ratio.
1. This works great in areas where you may not have power
and/or Ethernet easily accessible, like house roof.
2. This also allows you to place the SF-3000 unit closer to the
antenna, more easily thus reducing signal loss over antenna
cabling.
3. Ethernet signal travels well over CAT 5 cable but 2.4GHz
signal doesn't do as well over antenna cabling.
4. Ethernet cabling is much cheaper than Antenna cabling.
1. SF-3000 Outdoor Wireless Client Bridge unit
2. AC/DC adapter 100~240VAC, 50~60Hz with wall-mount plug
and DC plug power cord
3. Inline Power Injector (PoE) 24VDC, 830mA
4. RJ-45 CAT-5 Ethernet cable 30m
5. RS-232 null modem console cable 1.8m
6. Grounding wire 1.8m
7. User manual CD-disc
8. Wall/mast mounting kit, including one (1) band clamp
Version 1.01
2
Version 1.01
3
2.2 Locate the SF-3000 and Inline Power Injector
Ports
Interface on the SF-3000 Unit
9 Ethernet Port1
cable.
9RS-232 Console Port2
modem console cable.
Interface on the Inline Power Injector
9 Data Input Port3
PC or straight Ethernet cable to Hub Switch Router.
9 110~240VAC, 50~60Hz AC/DC power adapter DC Input Port
4
9Power & Data Output Port5 for connecting the 30m RJ-45
CAT-5 Ethernet Cable.
9 Grounding Port 6
NOTE: The cross-over or straight type Ethernet cable is not provided in SF-
3000 shipping package as an accessory. User can find one from
computer store in accordance with the length required for indoor
deployment.
for connecting the 30m RJ-45 CAT-5 Ethernet
for connecting the 1.8m RS-232 null
for connecting cross-over Ethernet Cable to
.
Mount SF-3000 on A Wall/Pole
The SF-3000 can be mounted on the wall, you can use the Wall Mount kit
to mount the SF-3000 as shown in Figure 2.2.1.
Figure 2.2.1
You can also mount the SF-3000 to the mast as shown in Figure 2.2.2.
3
Version 1.01
2
5
4
1
Figure 2.2.2
6
4
Version 1.01
5
2.3 Preparing Installation
Before installing SF-3000 for the outdoor application in a hard-to-reach
location, we recommend to configure and test all the devices first.
NOTE: This connection is required for setting up initial configuration
information. After configuration is completed, the RS-232 null
modem console cable shall be removed, and run a cross-over
Ethernet cable from Data Input Port to PC, or a straight Ethernet
cable to LAN connection, e.g. Hub.
For configuring the SF-3000, please follow the quick steps below to power
up the SF-3000.
Step 1:
Console Port
Connection
Step 4
Step 5
Step 2
Step 3
Step 1 Attach the 1.8m RS-232 null modem console cable to the Console
Port on the SF-3000 unit (refer to page 4), and the other end (DB9
female type) to a terminal or a PC running a terminal emulation
program.
Step 5Attachone straight Ethernet cable to the Power & Data Output
Port on the Inline Power Injector(refer to page 5).
Step 6Plug the other end of the straight Ethernet cable to the Ethernet
Port (refer to page 5) on the SF-300.
When the SF-3000 receives power over the Ethernet cable, the SF-3000
will start its boot sequence and the Active LED on the Inline Power Injector
will light up.
You can configure the SF-3000 via HTML browser, such as Microsoft
Internet Explorer or Netscape Navigator from a remote host or PC.
2.4 Basic Configuration
2.4.1 What you need to know
The SF-3000 can be configured into two operation roles, including
Wireless Client Bridge and Wireless Client Router.
The SF-3000 is shipped with default configuration to function as a client
bridge between an Ethernet and Wireless network by attaching SF-3000 to
the wired LAN simply. If user would configure SF-3000, please refer to the
following procedures.
Step 2
Plug the DC plug of the AC/DC power adapter into the DC Input
Port of Inline Power Injector and the wall-mount plug into a power
outlet or power strip (refer to page 4). The Power LED on the Inline
Power Injector will light up.
Step 3 Run the cross-over type uplink Ethernet cable from Data Input
Port (refer topage 4) to the Ethernet port on a PC.
Version 1.01
2.4.2 Basic Configuration Steps
This section describes a five-step configuration procedure to setup SF3000 workable upon your topology requirement.
Step 1 Select an operation mode for SF-3000 on the web page “/General
Config/System/”, and click
6
Version 1.01
FINISH to refresh this page.
7
Step 2 Modify the factory-default parameters on the web page “/General
Config/System/”, and click
FINISH to save the changes.
Step 3 Run a terminal emulation program on PC, such as Hyper
Terminal, and set the following connection properties.
Step 3 Modify the factory-default parameters on the web page “/General
Config/Wireless/”, and click
FINISH to save the changes.
Step 4 (Optional) Modify other parameters on the web page “/General
Config/”, and click
Step 5 Move to page “/Utility/Administration/”, select the
FINISH to save the changes.
Save
then Restart and then click FINISH to take effect on the previous
configuration changes.
2.4.3 Logging into the Web Interface
The SF-3000 supports access to the configuration system through the use
of an HTTP Interface.
Web Configuration
Before configuring SF-3000, user needs to know the IP Address assigned
to the unit. When shipped from the factory, the IP Address 192.168.5.99
was assigned to the SF-3000 by default. To start a web connection, use
http://192.168.2.1
Identify the IP Address assigned to the unit
However, user may change the IP Address later and cannot connect the
unit by using the default IP Address. In this case, it is a must to identify the
SF-3000 current IP Address before configuring. To identify the IP Address,
user can use the serial port (refer to page 4) to gain access of the current
network status.
Step 3.1 Click the Start icon > Program > Accessories >
Communication > Terminal.
Step 3.2 Create a new connection file, and select a Com Port
<COM1, COM2, etc., depending on PC> with
115200bps / 8-bits / 1-stop.
Step 3.3 Click the properties icon in the Tool Bar > setting >
select Emulation terminal VT100 > ok.
Step 4 Reboot SF-3000.
Step 5 When the SF-3000 is powered up, the “Current Network Status”
will be displayed as shown below.
To start a Serial Port connection by following the steps below.
Step 1 Attach the RS-232 null modem console cable (refer to page 4 and
page 6) to the RS-232 Console Port on SF-3000. Connect the
other end to a terminal or a PC running a terminal emulation
program.
Step 2 Set the terminal to 115200 baud rate, None Parity, 8 data bits, 1
Stop bit, and ANSI compatible.
Version 1.01
Web Access Procedures
Once you identify the IP Address assigned to SF-3000, use web browser to
configure SF-3000 through the HTTP Interface. The following procedure
explains how to configure each item.
Step 1 Open your browser and enter the IP Address
8
Version 1.01
9
Step 2 Press <ENTER> key and the SF-3000 Login screen appears as
shown below.
Step 3 Enter “root” in the User Name and the Password fields, and click
OK to enter the web configuration user interfacescreen as shown
below.
▽ General Configuration
● System
● TCP/IP
- Virtual Server
- SNMP
● Wireless
● Security
- MAC Filter
▽ Running Status
● System Info
● Statistic Info
● Wireless Link Info
▽ Utility
● Software Upgrade
● Administration
Move through the tree by clicking on an icon to expand or collapse the tree.
The nodes on the tree represent web pages that allow viewing and
modifying the parameters.
2.4.4 Set Operating Mode, IP Address, Subnet Mask,
Default Route IP, DNS Server IP of SF-3000
Web Configuration Structure
The web configuration user interface is grouped into a tree structure, and
contains the following settings or information.
Version 1.01
10
Operation Mode
When setting up SF-3000, you have to decide which Operation Mode in
which SF-3000 will function. This option is available in the “/General
Config/System/” page as shown below.
Version 1.01
11
Host Information
The Host Name is not an essential setting, but it helps to identify the device
in network. Use this setting to assign a name to the device.
Bridge IP Address Information
Use this setting to assign or change the SF-3000 IP address.
2.4.5 Set Wireless Encryption for Wireless Interface
The SF-3000 supports 64-bit and 128-bit WEP encryption.
For 64-bit WEP encryption, an encryption key is 10 hexadecimal characters
(0-9 and A-F) or 5 ASCII characters.
For 128-bit WEP encryption, an encryption key is 26 hexadecimal
characters or 13 ASCII characters.
Modify the WEP encryption parameters on the web page “/General
Config/Woreless/”. Enter 1~15 characters into the WEP Key field, and
KeyGen to generate the WEP64 or WEP128 key patterns.
click
2.4.6 Change Supervisor Account & Password
Enter the Utility > Administration page. The figure below shows the
Utility/ Administration page.
Bridge Subnet Mask
Enter an IP subnet mask to identify the sub network so the IP address can
be recognized on the LAN.
Default Route IP
Enter the default Gateway IP Address.
DNS Server IP
Enter the Primary/Secondary DNS Server IP Address, and click
the bottom of this page to complete the modification of this page.
Version 1.01
FINISH at
12
Supervisor Account
Change the supervisor’s user name and password in the Supervisor
Account field, and click
changes.
Version 1.01
FINISH to take effect on the previous configuration
13
Apply the New Settings
Step 1 Enter the Utility > Administration page, select the Save then
Restart to apply the new configuration settings.
Step 2 Click
Hint: It takes about 10 seconds, to complete the restart process.
FINISH to take effect on the previous configuration changes.
2.4.7 Upgrade the Firmware
Setup your TFTP Server
The Trivial File Transfer Protocol (TFTP) Server allows you to transfer files
across a network. You can download the firmware files for SF-3000
upgrades.
After the TFTP Server is installed, make sure you have the proper TFTP
Server IP address, the proper SF-3000 firmware files, and the TFTP Server
is operational.
Update the Firmware using the TFTP method
Step 1 Enter the Utility > Software Upgrade page as shown in the figure
below, and can use TFTP to upgrade SF-3000. Here, user must
specify the TFTP server IP and select which file you want to
upgrade it (Program image, Web image), then click
start the TFTP upgrade process.
OK button to
Upgrade the Firmware using RS-232 console
Please refer to Provision 2.4.3 that introduces how to use RS-232 console
port.
Identify the IP Address assigned to the unit.
Step 1 If the connection is normal, when the SF-3000 is powered up, the
“Current Network Status” will be displayed as shown below.
Step 2 If the upgrade process is success, the SF-3000 will apply the new
settings and start rebooting right away.
Hint: You must set up a TFTP Server and this server must contain the
latest new image files.
Version 1.01
14
Version 1.01
15
Step 2 Press <Esc> keystroke to reboot the SF-3000. Press <x> key
during the boot process, and it will display prompt character
NetARM> as the figure shown in the next page.
Step 3 Press “h” keystroke, it will display related commands as the figure
shown below.
Step 4 Select “F -- upgrade Flash memory” and it will display upgrade
items for selection as the figure shown below.
Step 5 Select “3: SOHO” and select “4: WEBIMG” to update the firmware
files one by one.
Version 1.01
16
Step 6 While the window starts to display “C” character continuously, click
Transfer and select the new firmware files <soho.bin> file, press“OK” to start to transfer file to SF-3000.
Step 7 Select “4” to upgrade WEBIMG file. The procedures are the same
with upgrading SOHO file (go back to step 5), but should select
<pfs.img> file correctly for WEBIMG file upgrade.
Step 8 After the upgrade completes, remember to press “R” keystroke to
reboot the system.
Note: The default transfer protocol is using “Xmodem”, so please make
sure you select correct protocol to download/upload files when you
try to upgrade the SF-3000’s firmware files.
Version 1.01
17
2.4.8 Back-up the SF-3000’s Configuration Files
After configuring SF-3000, user can back-up the configuration files. User
can upload the latest back-up files and recover the SF-3000 configuration
to the settings specified in the back-up files.
Downloading Configuration Files
Just being the same with firmware upgrade procedures. After the prompt
character NetARM> is displayed, select “S – Save image to file”, and then
select “6: CONFIG” to back-up the SF-3000 configuration as the figure
shown below. The back-up file will be saved as <CONFIG.IMG> file.
Note: Remember to press “R” to reboot the system after you upload the
configuration file to the SF-3000.
Uploading Configuration Files
To upload an configuration file to SF-3000, user should select “F -upgrade Flash memory” and then select “6: CONFIG”. While the window
starts to display “C” character continuously, click Transfer and select the
preferred <CONFIG.IMG>, then press OK to start transferring file to SF-
3000.
Version 1.01
18
Version 1.01
19
Chapter 3. Network Topologies
This chapter describes several main types of installations implemented by
using the Outdoor Wireless System commonly. This is by no means
intended to be an exhaustive list of all possible configurations, but rather
shows examples of some of the more common implementations. The SF3000 can only be configured into Wireless Client Router/Bridge to
accomplish the broadband wireless point-to-point, point-to-multipoint
systems with SendFar RB-8110 (as the figure shown below).
3.1 Wireless Client Bridge-to-Central Wireless
Bridge
Step 1 Set the Central Outdoor Unit *1 (hereinafter, “COU”) to perform a
bridge (bridge IP address: 192.168.2.1).
Step 2 Set Wireless parameters on COU: Channel (1) and SSID
(wireless)
The SF-3000 performs in either router or bridge mode. In a Point-toMultipoint topology, all communication between network systems is done
through a centralized agent. Among the Outdoor Wireless Router/Bridge
products, the centralized agent is Central Router or Central Bridge
(SendFar RB-8110) and the individual network notes may be Wireless
Client Router or Bridge (SendFar SF-3000).
To show the available Point-to-Multipoint topologies, the following examples
are provided.
Step 4 Set Wireless parameters on ROU: Channel (1) and SSID
(wireless), and these parameters must be the same with COU.
Step 5 Set the DHCP server service on the ROU and apply it on Ethernet
Interface.
Step 6 The ROU assigns IP addresses to PC1 and PC2.
The operator can also disable NAT behavior on COU and enable NAT
behavior on ROU (enable NAT on Wireless Interface). In this case, any
outgoing packets will transfer to 192.168.1.2.
Version 1.01
24
Version 1.01
25
Chapter 4. Network Parameters
4.1 IP Configuration
The IP Configuration method is different in each Operating Mode. User
could refer to the following descriptions for details.
Wireless Client Bridge
Step 1 Select the Wireless Client Bridge mode, and enter the IP Address
manually into the Bridge IP Address field.
Step 2 Use Bridge IP Address setting to assign or change the bridge’s IP
address.
4.2 Virtual Server
Sometimes, the operator might expose the internal servers on the local
intranet to the public Internet. For this, you must create the Virtual Server
Mapping for these invisible internal servers.
Step 1 Select the “/General Config/ TCP/IP/Virtual Server”, and then the
Virtual Server screen appears. The figure below shows the currentvirtual server entry table. (The Virtual Server Mapping pool is
empty as default)
Step 3 Click
FINISH at the bottom of this page to complete the
modification of IP address.
Wireless Client Router
In this mode, user can assign a Wireless and Ethernet IP address to the
SF-3000 manually.
The NAPT function allows home users and small businesses to connect
their network to the Internet cost-effectively and efficiently. User has to
enable it to allow the subscribers to connect to the Internet in this mode.
Click
FINISH at the bottom of this page to complete the IP address
modifications after enabling NAPT function.
Step 2 Click Add, and the Virtual Server Entry Edit page appears as the
figure shown below.
Version 1.01
26
Version 1.01
27
Step 4 Click OK. The Virtual Server Entry Table appears with the entries
list.
Step 5 To modify or delete a virtual server entry, click the select button
beside the entry index number and click
Step 6 To add another entry to the Virtual Server Mapping Pool, repeat
step 1 through step 3.
Modify or Delete.
Step 3 To edit the Virtual Server Entry, specify all the entry fields to allow
Internet user to access the internal servers.
9Service Name. Alias name of this internal server, such as
FTP.
9Protocol. Indicate which protocol (TCP/UDP) user wants
to translate from outside to internal server, such as TCP.
9Access Interface. Indicate the translation occurs on which
interface (Wireless interface / Ethernet interface), such as
Ethernet.
Step 7 When user has included all the entries preferred, click
FINISH.
Version 1.01
9Public Access Port number. Indicate which socket port (1
~ 65535) user wants to translate from outside to internal
server, such as 21.
9Virtual Server IP address. Specify the private IP address
of the internal server, such as 192.168.1.100.
9Virtual Server Port number. Specify the socket port (1 ~
65535) of the internal server, such as 21.
28
Version 1.01
29
4.3 Configure SNMP
Select the “/General Config/ TCP/IP/SNMP”, and the SNMP screen
appears. The figure below shows the current SNMP community pool and
trap host pool.
2. Specify the Validity, Access Right and Community field.
9Validity. Select Enable or Disable to control this
community.
9Access Right. Select a command from the pull down menu
for this field.
4.3.1 Configure Community Pool
The SNMP Community Pool has five entries.
1. To modify the entry, click the select button beside the entry
index number and click
appears as the figure shown below.
Version 1.01
Modify. The configuration page
30
3. Click
4. To modify another community entry to the current community
5. When you have modified all the entries preferred, click
Version 1.01
9Community. Enter the password related the Access Right
in this field.
OK to refresh the current community pool.
pool, repeat step 1 through step 3.
FINISH.
31
4.3.2 Configure Trap Host Pool
4. To modify another trap host entry to the current trap host pool,
repeat step 1 through step 3.
The Trap Host Pool has five entries.
1. To modify a entry, click the select button beside the entry index
number and click
Modify . The configuration page appears as
following figure.
5. When you have modified all the entries preferred, click
FINISH.
2. Specify the Version, IP Address and Community field.
3. Click
Version 1.01
9Version. Select Disable, Version 1 or Version 2 to control
this trap host.
9 IP Address. Enter the Trap Host IP Address.
9 Community. Enter the password in this field.
OK to refresh the current trap host pool.
32
Version 1.01
33
4.4 Configure Wireless related parameters
The following gives more info about the parameters set in the Wireless LAN
information page to users.
Step 1 Select “/General Config/Wireless” and the Wireless LAN
information page appears as the figure shown below.
Step 2 In the Wireless LAN information page, set the following parameters
The setting determines the packet size, ranging from 0 to 2339 bytes, at
which the bridge issues a request to send (RTS) before sending the packet.
A low RTS Threshold setting can be useful in areas where many client
devices are associating with the access point, or in areas where the clients
are far apart and can detect only the bridge and not each other.
frag Threshold
The setting determines the size, ranging from 256 to 2338 bytes, at which
packets are fragmented (sent as several pieces instead of as one block).
Use a low setting in areas where communication is poor or where there is a
great deal of radio interference.
SSID
The Service Set ID (SSID)
from 2 to 32 characters long. This string functions as a password to join the
radio network.
can be any alphanumeric, case-sensitive entry
Hide SSID
Use this setting to decide whether devices that do not specify an SSID are
allowed to associate with the access point or not. With “Yes” selected, the
SSID used by other devices must match exactly the AP’s SSID.
Deny Any
Use this setting to decide whether devices that specify the well define
SSID keyword ‘ANY’ or ‘any’ are allowed to associate with the access
point or not. With “Yes” selected, the SSID ‘ANY’ or ‘any’used by other
devices are not allowed to associate with the access point
Station Name
Enter any alphanumeric, case-sensitive entry.
Step 3 Click radio button to disable WEP or enable 64/128 bit WEP
services (default parameter: disable). If WEP is enabled, inputcorresponded Default Key index and WEP Key and then click
KeyGen to generate the WEP64 & WEP128 key patterns.
Step 4 Click
Version 1.01
FINISH at the bottom of this page to complete the
modification.
34
WEP Key
Enter 1~15 characters for 64 and 128 bits WEP KEY encryption, and then
KeyGen to generate the WEP64 & WEP128 key patterns
click
automatically.
WEP
User can Disable or enable 64/128 bit WEP services here.
Version 1.01
35
Default Key
Select an encryption key from the pull down menu.
4.5 Security
WEP64 Key1~4 & WEP128 Key1~4
The keys in these fields can be generated automatically by
function. For 40-bit encryption, enter 10 hexadecimal digits; for 128-bit
encryption, enter 26 hexadecimal digits. Hexadecimal digits include the
numbers 0 through 9 and the letters A through F. The 40-bit WEP keys
can contain any combination of 10 of these characters; the 128-bit WEP
keys can contain any combination of 26 of these characters. The letters are
not case-sensitive.
KeyGen
4.5.1 MAC based Access Control
Click General Config, select MAC Filter page, and choice the MAC Filter
services is Enable or Disable as the figure shown below.
User can specify the MAC address of a wireless client station. All MAC
entries in the MAC address table are permitted to connect to the SF-3000.
User can also click ADD, DELETE, MODIFY button to maintain this MAC
address table. After that, click
complete the modification of this page.
FINISH at the bottom of this page to
Version 1.01
36
Version 1.01
37
4.6 Utility
4.6.1 Software Upgrade
Step 1 Click Utility, select Software Upgrade page as the figure shown
below, and then use TFTP to upgrade AP. In the Utility – Software
Upgrade page, user must specify the TFTP server IP and selectby which file to upgrade (Program image, Web image), then click
OK button to start the TFTP upgrade process.
Step 2 If the upgrade process is success, the AP will apply the new
settings and start rebooting right away.
Hint: You must set up a TFTP server and this server must contain one
latest new image.
4.6.2 Administration
Step 1 Click Utility, Administration. The following figure shows the
Utility – Administration page.
9Supervisor Account. Change the supervisor’s user name
& password in the Supervisor Account field, and Click
FINISH to take effect on the previous configuration
changes.
Version 1.01
38
9 Apply the New Settings. Click Utility, Administration,
select the
Save then Restart to apply the new
configuration settings.
Step 2 Click
FINISH to take effect on the previous configuration changes.
Hint: It takes about 10 seconds, to complete the restart process.
Version 1.01
39
Chapter 5. Monitor Information
User can find the system running status and other information on this
window. Click the Running Status link on the left window, use can choose
which function that he wants to monitor.
5.1 System Information
By selecting “Running Status/System Info”, enter the System
Information page as the figure shown below.
9 Web Version
9 AP Firmware version
9 System Uptime
General System Status
The following information can be found in this block.
TCP/IP
NAT/NAPT
DHCP Client
Virtual Server Mapping (NAT inbound server)
802.1d Transparent Bridging
64-/128-bit WEP encryption
MAC address based access control
User authentication in Web-based Manager
Web-based Manager
Telnet configuration
Console (RS-232) configuration
SNMP v1
SNMP MIB-II
Private MIB
TFTP (Trivial FTP)
Xmodem, 1K Xmodem
Zmodem
Chapter 7. Default Settings
7.1 General Configuration
7.1.1 System
ParameterDescriptionDefault Value
Host Name Host name for the RBHWLAN
Operation Mode
Bridge IP Address
Bridge Subnet Mask
Wireless Interface
Address
NAPT Interface
Default Route IP
Primary DNS Server IP192.168.2.254
Second DNS Server IP
1. Wireless Client Bridge
2. Wireless Client Router
For Wireless Client Bridge with
Operation Mode
IP Address
Subnet Mask
1. Enable
2. Disable
IP address of the gateway for
default route when TCP/IP
filtering
IP addresses of the DNS
Servers of your Local ISP
Wireless Client
Bridge
192.168.2.1
255.255.255.0
192.168.1.1
255.255.255.0
Disable
192.168.2.254
Version 1.01
46
7.1.2 Virtual Server
ParameterDescriptionDefault Value
Service Name
Protocol
Public Access
Virtual Server
Note: (Maximum Entry: 10, Maximum Port Number: 32767)
Version 1.01
Specify the service for public
access
Select a protocol for public
access
InterfaceNULL
Port NumberNULL
IP addressNULL
Port NumberNULL
NULL
NULL
47
7.1.3 SNMP
Index 5
---
7.1.3.1 Table of SNMP Community Pool
ParameterDescriptionDefault Value
Index 1Enable
Index 2
Index 3
Index 4
Index 5
Index 1Read
Index 2
Index 3
Index 4
Index 5
Index 1public
Index 2
Index 3
Index 4
Index 5
Validity
Access
Right
Community
Enable or disable the function
of the corresponding community
index
Select the access right
(Deny/Read/Write/Create) for
SNMP Manager
Specify the type of community
(public or private) for SNMP
Manager
Enable
Disable
Disable
Disable
Write
---
---
---
private
---
---
---
7.1.3.2 Table of SNMP Trap Community Host Pool
ParameterDescriptionDefault Value
Index 1Version1
Index 2
Index 3
Index 4
Index 5
Index 1192.168.2.100
Index 2
Index 3
Index 4
Index 5
Index 1public
Index 2
Index 3
Index 4
Version 1.01
Version
IP Address
Community Specify the type of community
Select or disable the SNMP
Version
Version 1: MIB1
Version 2: MIB2
Specify the IP address of the
SNMP Manager for SNMP Trap
Report
(public or private) for SNMP
Manager
Version2
---
---
---
192.168.2.100
---
---
---
public
---
---
48
7.1.4 Wireless LAN
ParameterDescriptionDefault Value
RTS Threshold
Fragmentation
Threshold
SSID
Hide SSID Yes or NoNo
Deny ANY Yes or NoNo
Station Name Show the name of the APap
WEP Key
WEP
Default Key
Key Panel
Set RTS (Request To Send)
threshold value
Set fragmentation threshold
value
Wireless LAN service area
identifier of the RB (case
sensitive)
Push the “KeyGen” button to
generate the WEP key patterns
automatically
1. WEP128
2. WEP64
3. Disable
Select a WEP key to encrypt
each frame transmitted from
the radio using one the of the 4
Keys from the Key Panel
When you use WEP to
communicate with the other
wireless clients, all the wireless
devices in this network must
have the same encryption key
or pass phrase.
Note: each key must consist
of hex digits, it means that
only digit 0 -9 and letters A-F
are valid entries. If entered
incorrectly, program will not
write keys to a driver.
1600
1600
wireless
wepkey
Disable
1
7.2
Version 1.01
49
7.3 Utility
7.3.1 Software Upgrade
ParameterDescriptionDefault Value
TFTP Server IP
Address
Upgrade Filename
Specify the IP address of the
TFTP server to upgrade the
firmware of the RB
Program Imagesoho.bin
Web Imagepfs.img
7.3.2 Administration
ParameterDescriptionDefault Value
Supervisor ID Supervisor’s identity coderoot
Supervisor Password Supervisor’s passwordroot
Password Confirm Confirm the password againroot
192.168.2.100
Chapter 8. Regulatory Compliance Information
Radio Frequency Interference Requirements
This device complies with Part 15 of FCC Rules and Canada RSS-210.
Operation is subject to the following conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference
that may cause undesired operation.
Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated
with minimum distance 20 cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any
other antenna of transmitter.
Interference Statement
This equipment has been tested and found to comply with the limits for a
Class C digital device pursuant to Part 15 of the FCC Rules and Regulation.
These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses,
and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to
nearby TV’s, VCR’s, radio, computers, or other electronic devices. To
minimize or prevent such interference, this equipment should not be placed
or operated near these devices. If interference is experienced, moving the
equipment away from them will often reduce or eliminate the interference.
Version 1.01
50
However, there is no guarantee that interference will not occur in a
particular installation. If the equipment does cause harmful interference to
radio or television reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
Re-orient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that which
the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Version 1.01
51
Professional Installation
Per the recommendation of the FCC, the installation of high gain directional
antenna to the system, which are intended to operated solely as a point-topoint system and whose total power exceeds +30dBm EIRP, require
professional installation. It is the responsibility of the installer and the end
user that the high power systems are operated strictly as a point-to-point
system.
Systems operating as a point-to-multipoint system or use non directional
antennas cannot exceed +30dBm EIRP power requirement under any
circumstances and do not require professional installation.
Information to User
The user manual or instruction manual for an intentional or unintentional
radiator shall caution the user that changes or modifications not expressly
approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
Complies with Part 15 Class C of the FCC rules. Operation is subject
to the following two conditions: (1) this device may not cause harmful
interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
Version 1.01
52
European Community – CE Notice
Marking by the symbol:
Indicates compliance with the essential requirements of Directive1999/5/EC. Such marking is indicative that this equipment meets or
exceeds the following technical standards:
9 EN 300 328-2
9 EN 301 489-1
9 EN 301 489-17
9 EN 60950
Marking by the symbol:
Indicates compliance with the essential requirements of R&TTE Directive99/5/EC, and the product is permitted to be used in the following EC
countries, including Germany, UK, The Netherlands, Belgium, Norway,
Version 1.01
53
Sweden, Denmark, Finland, France, Italy, Spain, Austria, Iceland,
Ireland, Portugal, Switzerland, Greece and Luxembourg.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference
in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct
the interference by one of the following measures:
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate
this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement: This equipment complies with FCC
radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) This device may not cause harmful
Version 1.01
54
Version 1.01
55
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.