ZTE ZXR10W140A Users Manual

ZXR10 WAS (V1.0) IP Wireless Access System
W140A Outdoor Wi reless Access
Point/Bridge
User’s Manual
ZTE CORPORATION
ZXR10 WAS (V1.0) IP Wir eless Access System W140A Outdoor Wireless Access Point/Bridge User’s Manual
Manual Version 20040325-R1.0 Product Version V1.0
Copyright © 2003 ZTE Corporation All rights reserved. No part of this documentation may be excerpted, reproduced, translated, annotated or
duplicated, in any form or by any means without the prior written permission of ZTE Corporation.
ZTE CORPORATION
ZTE Plaza, Keji Road South, Hi-Tech Industrial Park, Nanshan District, Shenzhen, P.R.China
Website: http://www.zte.com.cn
Postcode: 518057
Customer Support Center: (+86755) 26771900 800-9830-9830
Fax: (+86755) 26770801
Email: support@zte.com.cn
* * * *
S.N.: sjzl20040367
FAX:+86-755-26770160
Suggestions and Feedback
To improve the quality of ZTE product documentation and offer better services to our customers, we hope
you can give us your suggestions and comments on our documentation and fax this form to
rd
+86-755-26770160; or mail to “Marketing center 3
Park, Nanshan District, Shenzhen, P. R. China”. Our postcode is 518057.
floor ZTE Plaza, Keji Road South, Hi-Tech Industrial
Document name
Product version
Equipment installation time
Your information
Name
Postcode
Telephone
Your evaluation
of this
documentation
ZXR10 WAS (V1.0) IP Wireless Access System W140A Outdoor Wireless Access Point/Bridge
User’s Manual
V1.0
Presentation: How is information presented? (Introductions, procedures, illustrations, others)
Good □ Fair □Average □ Poor □Bad
Accessibility: Can you find the information you want? (Table of contents, Index, headings,
numbering, others)
Good Fair Average □ Poor Bad
Intelligibility: Can you understand it when you find it? (Language, vocabulary, readability, others)
Good □ Fair □Average □ Poor □Bad
Presentation:
Document version 20040325-R1.0
Company
Company address
E-mail
Your suggestions
for improvement
of this
documentation
Your other
suggestions on
ZTE product
documentation
Accessibility:
Intelligibility:
Preface
About This Manual
This manual is applicable to the ZXR10 WAS (V1.0) IP Wireless Access System
W140A Outdoor Wireless Access Point/Bridge (W140A for short below).
The ZXR10 WAS IP wireless access system is a proprietary product of ZTE
Corporation. It consists of a series of wireless access network products, such as
wireless network card, wireless Access Point (AP), wireless router, DSL 2-in-1 wireless
router and outdoor wireless access point/bridge.
This manual introduces the function features, installation, operation, use and
maintenance of the W140A, so it serves as instructions to the W140A. This manual
consists of 6 chapters and 2 appendixes.
Chapter 1, Safety Precautions, introduces the safety precautions of this product and
safety symbols used in this manual.
Chapter 2, Overview, presents functions, features and technical parameters of the
W140A.
Chapter 3, Structure and Principle, describes structure and principle of W140A.
Chapter 4, Installation and Debugging, deals with the installation and debugging
methods of the W140A.
Chapter 5, Command Line Configuration, covers the command line configurations of
the W140A.
Chapter 6: WEB configuration, presents the web configurations of W140A.
Chapter 7, Maintenance, puts forward the daily maintenance and version upgrade
methods of the W140A.
Appendix A, Packing, Transportation and Storage, outlines the packaging method,
storage conditions and transportation precautions of the W140A.
Appendix B, Making of Ethernet cables, introduces the power supply mode of W140A
Ethernet and making of Ethernet cables.
Conventions
Four striking symbols are used throughout this manual to emphasize important and
critical information during operation:
Danger, Warnin g, Caution and Note statements are
used throughout this manual to emphasize important and critical information. You must
read these statements to help ensure safety and to prevent product damage. The
statements are defined below.
Statement: The actual product may differ from what is described in this manual due to frequent update of ZTE products and fast development of technologies. Please contact the local ZTE office for the latest updating information of the product.
Contents
1 Safety Precautions...................................................................................................................................1-1
1.1 Safety Precautions..........................................................................................................................1-1
1.2 Symbol Description........................................................................................................................1-2
2 Overview..................................................................................................................................................2-1
2.1 Preface............................................................................................................................................2-1
2.2 Functions and Features...................................................................................................................2-1
2.3 Technical Characteristics and Parameters ......................................................................................2-2
3 Structure and Principle...........................................................................................................................3-1
3.1 Structure and Working Principle .................................................................................................... 3-1
3.1.1 Hardware Structure .............................................................................................................3-1
3.1.2 Software Structure...............................................................................................................3-1
3.2 Units/Components..........................................................................................................................3-2
3.3 Networking Modes.........................................................................................................................3-3
4 Installation and Debugging ....................................................................................................................4-1
5 Command Line Configuration...............................................................................................................5-1
5.1 Overview........................................................................................................................................ 5-1
5.2 User Mode...................................................................................................................................... 5-3
5.3 Privileged Mode ............................................................................................................................. 5-4
5.3.1 Command to Test Network Connectivity............................................................................ 5-4
5.3.2 Command to Save Configurations to Flash.........................................................................5-4
5.3.3 Command to Reset Software...............................................................................................5-4
5.3.4 Command to Enter Configure Mode...................................................................................5-5
5.3.5 Command to Exit Privileged Mode..................................................................................... 5-5
-i-
5.3.6 Command to Exit TELNET Configuration......................................................................... 5-5
5.4 Configure Mode............................................................................................................................. 5-5
5.4.1 Commands to Configure Wireless Access-Bridge.............................................................. 5-5
5.4.2 Command to Configure Bridge Information....................................................................... 5-6
5.4.3 Commands to Configure DHCP Server .............................................................................. 5-7
5.4.4 Discover commands............................................................................................................ 5-8
5.4.5 Commands to Configure 802.1X Parameters ..................................................................... 5-9
5.4.6 Command to Set User Password in Privileged Mode ....................................................... 5-12
5.4.7 Command to Delete Filtration Rules ................................................................................ 5-12
5.4.8 Command to Exit Configuration Mode ............................................................................ 5-13
5.4.9 Commands to Configure IAPP (Load-balance) ................................................................ 5-13
5.4.10 Interface Skip.................................................................................................................. 5-14
5.4.11 Commands to Configure Layer 2 Isolation..................................................................... 5-15
5.4.12 Commands to Configure IP network Parameters............................................................ 5-15
5.4.13 Command to Configure Log Print Information .............................................................. 5-16
5.4.14 Command to Configure MAC Filter............................................................................... 5-17
5.4.15 Command to Configure MAC Address Authentication.................................................. 5-18
5.4.16 Command to Configure Users ........................................................................................ 5-18
5.4.17 Commands to Configure Radius Server ......................................................................... 5-19
5.4.18 Command to Configure SNMP Module ......................................................................... 5-21
5.4.19 Command to Manage Telnet Idle Timeout ..................................................................... 5-25
5.4.20 Commands to Upload/download TFTP Files.................................................................. 5-25
5.4.21 Commands to Configure VLAN ..................................................................................... 5-26
5.4.22 Show Commands ............................................................................................................5-27
5.5 Ethernet Interface Configuration Mode .......................................................................................5-33
5.5.1 Configurations in the Ethernet Interface Mode................................................................. 5-33
-ii-
5.5.2 Command to Exit the Ethernet Interface Configuration Mode ......................................... 5-33
5.5.3 Command to Configure Ethernet interface IP addresses...................................................5-33
5.5.4 Command to Configure MAC filter for the Ethernet Interface......................................... 5-34
5.6 Wireless Interface Configuration Mode .......................................................................................5-34
5.6.1 Command to Configure 80211b-related Parameters for the Wireless Interface................5-34
5.6.2 Command to Exit Wireless Interface Configuration Mode...............................................5-36
5.6.3 Command to Enable Link Integrity Detection .................................................................. 5-37
5.6.4 WEP Configuration of the Wireless Interface ...................................................................5-37
5.6.5 Command to Configure MAC Filter in Wireless Interface Configuration........................ 5-38
5.6.6 Command to Configure Authentication Mode in Wireless Interface Configuration.........5-39
6 WEB Configuration ................................................................................................................................6-1
6.1 Overview........................................................................................................................................ 6-1
6.2 Opening the login WEB page......................................................................................................... 6-2
6.3 Main menu of WEB configuration................................................................................................. 6-4
6.3.1 Home page (basic product information)..............................................................................6-4
6.3.2 Stations page ....................................................................................................................... 6-5
6.3.3 Statistics Page...................................................................................................................... 6-6
6.3.4 Load Balance page .............................................................................................................. 6-6
6.3.5 SNMP page ......................................................................................................................... 6-7
6.3.6 Security page..................................................................................................................... 6-12
6.3.7 Save page .......................................................................................................................... 6-15
6.3.8 Reboot page.......................................................................................................................6-15
6.3.9 Advanced options page .....................................................................................................6-16
6.3.10 Accounts page .................................................................................................................6-23
6.4 Interfaces page ............................................................................................................................. 6-23
6.4.1 Ethernet Interface page .....................................................................................................6-24
-iii-
6.4.2 Wireless Interface page..................................................................................................... 6-25
6.5 Data submission flow for WEB configuration............................................................................. 6-27
7 Maintenance............................................................................................................................................7-1
7.1 Maintenance Descriptions ............................................................................................................. 7-1
7.2 Daily Maintenance......................................................................................................................... 7-2
7.3 Version Loading and Upgrade ....................................................................................................... 7-2
7.3.1 TFTP File Loading Commands........................................................................................... 7-3
Appendix A Package, Transportation and Storage................................................................................ A-1
A.1 Package ........................................................................................................................................ A-1
A.2 Transportation.............................................................................................................................. A-1
A.3 Storage ......................................................................................................................................... A-2
Appendix B Making of Ethernet Cable ...................................................................................................B-1
B.1 W140A System Application Modes..............................................................................................B-1
B.2 Making of Ethernet Cables ...........................................................................................................B-2
B.2.1 Making of Straight Through Ethernet Cables (RJ45).........................................................B-2
B.2.2 Making of Straight Through Power Supply Ethernet Cables (C-RJ45-001)......................B-2
B.2.3 Making of Crossover Ethernet Cables (RJ45J) ..................................................................B-3
B.2.4 Ethernet Cable Label..........................................................................................................B-4
-iv-
A List of Figures
Fig. 3.1-1 Appearance of W140A .....................................................................................................3-1
Fig. 3.1-2 W140A Software Structure...............................................................................................3-2
Fig. 3.2-1 W140A Rear Control Panel ..............................................................................................3-2
Fig. 3.3-1 Building Small Wireless LAN ..........................................................................................3-3
Fig. 3.3-2 Building Internet Wireless Access Network with AC, Indoor AP and Outdoor Bridge....3-4
Fig. 3.3-3 Wireless Bridge Mode ...................................................................................................... 3-5
Fig. 4.1-1 Telnet to W140A ..............................................................................................................5-3
Fig. 5.1-1 Path diagram of WEB configuration ................................................................................6-2
Fig. 5.2-1 Login page for WEB configuration ..................................................................................6-3
Fig. 5.2-2 Alert box for prompting that someone has already logged in for WEB configuration..... 6-3
Fig. 5.2-3 Alert box for prompting that the entered user name and password are incorrect.............6-4
Fig. 5.3-1 Home page (basic product information) ...........................................................................6-5
Fig. 5.3-2 Stations page.....................................................................................................................6-5
Fig. 5.3-3 Statistics page ...................................................................................................................6-6
Fig. 5.3-4 Load Balance page ...........................................................................................................6-7
Fig. 5.3-5 Submenu for SNMP configuration ................................................................................... 6-8
Fig. 5.3-6 Access mode configuration page of the SNMP module...................................................6-8
Fig. 5.3-7 Access host configuration page of the SNMP module .....................................................6-9
Fig. 5.3-8 Community configuration page of the SNMP module ...................................................6-10
Fig. 5.3-9 System information configuration page of the SNMP module.......................................6-10
Fig. 5.3-10 Trap configuration page of the SNMP module............................................................. 6-11
Fig. 5.3-11 Trap sink configuration page of the SNMP module .....................................................6-12
Fig. 5.3-12 Submenu of security configuration............................................................................... 6-12
-i-
Fig. 5.3-13 MAC authentication configuration page...................................................................... 6-13
Fig. 5.3-14 MAC filter rule configuration page.............................................................................. 6-14
Fig. 5.3-15 Stations Isolation page ................................................................................................. 6-14
Fig. 5.3-16 Save page ..................................................................................................................... 6-15
Fig. 5.3-17 Reboot page.................................................................................................................. 6-16
Fig. 5.3-18 Submenu of advanced options configuration ............................................................... 6-16
Fig. 5.3-19 Submenu of DHCP module.......................................................................................... 6-17
Fig. 5.3-20 DHCP server configuration page ................................................................................. 6-17
Fig. 5.3-21 IP pool page.................................................................................................................. 6-18
Fig. 5.3-22 802.11x configuration page.......................................................................................... 6-19
Fig. 5.3-23 Submenu of RADIUS server configuration ................................................................. 6-19
Fig. 5.3-24 ISP configuration page ................................................................................................. 6-20
Fig. 5.3-25 Authentication Server configuration page.................................................................... 6-21
Fig. 5.3-26 Accounting Server configuration page......................................................................... 6-21
Fig. 5.3-27 DNS configuration page............................................................................................... 6-22
Fig. 5.3-28 VLAN configuration Page ........................................................................................... 6-22
Fig. 5.3-29 Account configuration page .........................................................................................6-23
Fig. 5.4-1 Submenu for interface configuration.............................................................................. 6-23
Fig. 5.4-2 Submenu for Ethernet interface configuration............................................................... 6-24
Fig. 5.4-3 IP address configuration page of Ethernet interface....................................................... 6-24
Fig. 5.4-4 Submenu for wireless interface configuration ............................................................... 6-25
Fig. 5.4-5 802.11b parameter configuration page of wireless interface.......................................... 6-25
Fig. 5.4-6 WEP configuration page of wireless interface ............................................................... 6-26
Fig. 5.4-7 Link integrity configuration page of wireless interface ................................................. 6-27
Fig. 5.5-1 The page for entering the password of privileged user .................................................. 6-28
Fig. 5.5-2 The page indicating that the privileged user password is incorrect................................ 6-28
-ii-
Fig. 5.5-3 A message indicating successful data submission ..........................................................6-29
Fig. 5.5-4 A message indicating failure in data submission ............................................................ 6-29
Figure B.1-1 W140A System Application........................................................................................ B-1
Figure B.2-1 Straight through Ethernet label ...................................................................................B-4
Figure B.2-2 Label of the Straight Through Power Supply Ethernet Cable..................................... B-4
Figure B.2-3 Crossover Ethernet Cable Label ................................................................................. B-5
-iii-
A list of Tables
Table 1.2-1 Safety Symbols and Descriptions................................................................................... 1-3
Table 2.3-1 W140A Technical Indices .............................................................................................. 2-3
Table B.2-1 Connections of Straight Through Ethernet Cables (RJ45) ........................................... B-2
Table B.2-2 Connections of Straight Through Power Supply Ethernet Cables (C-RJ45-001)......... B-3
Table B.2-3 Connections of Crossover Ethernet Cables (RJ45J)..................................................... B-3
-i-
1 Safety Precautions
This chapter introduces the safety precautions of this product and safety symbols used
in this manual.
1.1 Safety Precautions
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1)This device may not cause harmful interference,and
(2)
this device must accept any interference received, including interference that
may cause undesired operation.
To assure continued compliance, (example – use only shielded interface cables when
connecting to computer or peripheral devices). Any changes or modifications not
expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
NOTE: This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This equipment is with high temperature and voltage, so only the professional
1-1
ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
personnel who had passed the training can install, operate and maintain it.
ZTE assumes no responsibility for consequences resulting from violation of general
specifications for safety operations or of safety rules for design, production and use of
equipment.
1.2 Symbol Description
See Table 1.2-1 for the safety symbols used in this manual, which serves to remind the
readers of the safety precautions to be taken when the equipment is installed, operated
and maintained.
1-2
Chapter Error! Style not defined. Error! Style not defined.
Table 1.2-1 Safety Symbols and Descriptions
Safety Symbol Meaning
Call for notice
Call for antistatic measures
Warn against electric shock
Caution against scald
Warn against laser
Caution against microwave
Four types of safety levels are available: danger, warning, caution and note. To the
right of a safety symbol is the text description of its safety level. Under the symbol is
the detailed description about its contents. The formats are as follows.
Danger:
Indicates an imminently hazardous situation which, if not avoided, will result in death
or serious injury. This signal word is to be limited to the most extreme situations.
Warning:
Indicates a potentially hazardous situation which, if not avoided, could result in death
or serious injury.
Caution:
Indicates a potentially hazardous situation which, if not avoided, could result in minor
or moderate injury. It may also be used to alert against unsafe practices.
1-3
ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
Note:
A Note statement is used to notify people of installation, operation, or maintenance
information that is important, but not hazard-related.
Tips:
Indicates a suggestion or hint to make things easier or more productive for the reader
1-4
2 Overview
This chapter presents functions, features, technical characteristics and parameters of
the W140A.
2.1 Preface
The W140A outdoor AP/bridge of ZXR10 WAS (V1.0) IP wireless access system is
developed by ZTE and its design totally complies with the international standards.
The W140A uses customized antennas on the roof or a special pole for wide coverage,
enabling wireless cellular roaming in a large area.
2.2 Functions and Features
W140A complies with IEEE 802.11b Standard and is compatible with wireless network
adapters and APs complying with this standard. The features of the W140A are as
follows:
The maximum access rate is 11 Mbps. At most 100 Stations can be accessed.
The radio transmission power can be adjusted up to 200 mW.
Transparent bridge connection provides packet transfer between Basic Service
Set (BSS) and Distributed System (DS). The maximum transfer rate is not less
than 10 Mbps.
The load balance adopts the access balance with multiple APs in the same area
provided by the internal protocol.
It provides seamless roaming to enable users to access network easily.
It provides link integrity function, thus enhancing equipment reliability.
ESSID provides network authentication to prevent illegal users from accessing
the network.
Static MAC filtration can filter MAC addresses set by users. Up to 100 filtration
groups can be set and each of them can be set with 64 MAC address filtration
rules.
2-1
ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
It provides data authentication and security management, supports 64-bit and
128-bit WEP encryption, provides mixed encryption for more flexible security.
Automatic consistent correction system provides Automatic Scale Back
Functionality (ASBF) to automatically correct WLAN to the best connection
quality.
High interoperability: the uplink interface is 10/100M adaptive Ethernet
interface, which can be connected through a network cable to the 10/100 Mbps
Ethernet in compliance with IEEE 802.3 network protocol.
The uplink Ethernet interface provides VLAN trunk function, wireless access
users can be grouped into VLAN through MAC addresses, and W140As can be
grouped under the management VLAN.
The version upgrade function upgrades the W140A software version and
supports remote online version loading.
The embedded SNMP Agent supports SNMP v1/v2 to implement MIB II,
IEEE802dot11-MIB, IF-MIB, EtherLike-MIB and private MIB.
Command line and WEB configuration modes are available for W140A
configuration, supporting remote uploading and downloading of configuration
files.
Integrated management server is provided to monitor and manage ZTE wireless
network equipment, including W140A, in the distributed environment.
The reliability design complies with IEC 60529 Standard, waterproof
performance reaches level 8, and dustproof performance reaches level 6.
There is a dedicated lightning protection board the input terminal. For the
Ethernet part, the lightning strike surge tolerance is 2 kV between line and
ground and 1 kV between line and line. For the power supply part, the surge
tolerance should be 4 kV between line and ground and 2 kV between line and
line.
2.3 Technical Characteristics and Parameters
The technical indices of W140A are shown in Table 2.3-1.
2-2
Chapter Error! Style not defined. Error! Style not defined.
Table 2.3-1 W140A Technical Indices
Items Technical Indices
Standard 802.11b, 802.1d, 802.3u
Working band 2,400 MHz ~ 2,483.5 MHz
Spreading mode DSSS
Modulation mode CCK, DQPSK, DBPSK
BER 10-5
Data rate Adaptive 1 Mbps, 2 Mbps, 5.5 Mbps and 11 Mbps
Distance (m)
External interfaces RJ45 connector and wireless interface
Encryption type 64/128-bit WEP encryption
Channel quantity EU countries, 13; US and Canada: 11; France: 4; Japan: 14
Recommended number of users/maximum
number of users
MAC address capacity 1024
SNMP agent
Antenna System
Power supply mode
Total power consumption < 10 W
Dimensions 360 mm × 300 mm × 80 mm (L × W × H)
Weight 6 kg
Working temperature: -35 °C ~ +60 °C
Storage temperature -40 °C ~ +70 °C
Working humidity 5% ~ 95%
Storage humidity 10% ~ 100%
Outdoor AP and 100 m~700 m;
Outdoor bridge, 25 km at the farthest
30/100
Supporting SNMP v1/v2, implementing MIB II, IEEE802dot11-MIB,
IF-MIB, EtherLike-MIB and private MIB
Outdoor AP: 8 dBi omni-directional, 8.5 dBi directional and 14 dBi
directional are available;
Outdoor bridge: 8 dBi omni-directional, 8.5 dBi directional, 14 dBi
directional and 21 dBi directional are available
PoE 48V Ethernet power supply. The remote supply distance is 100m when
the Ethernet interface works at 100 Mbps, and the distance is 280m when the
Ethernet interface works at 10 Mbps
2-3
3 Structure and Principle
This chapter introduces the structure and principle of W140A, covering software and
hardware structure and principle, interfaces and networking modes.
3.1 Structure and Working Principle
3.1.1 Hardware Structure
With a standard waterproof and dustproof structure, W140A can be installed on the
roof, outside the window or on a special pole. The physical appearance of W140A is
shown in Fig. 3.1-1.
CPU is the core of W140A, and its memory may be 512K BOOT, 4M FLASH and
16M SDRAM.
3.1.2 Software Structure
The software function structure of W140A is given in Fig. 3.1-2.
Fig. 3.1-1 Appearance of W140A
3-1
ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
RADIUS Client
DHCP Server
TFTP
IAPP
SNMP
TCP/UDP
IP
802.1x STP Other L2 protocol
Layer-2 supporting system
DB
R01
802.11 driver RS232 driver Ethernet driver BSP
Fig. 3.1-2 W140A Software Structure
HTTP
TELNET
Security system
OMS
The software of W140A comprises the basic service subsystem and network
management subsystem.
The basic service subsystem consists of these items: 802.11b AP drive, 802.3
Ethernet drive, transparent bridge connection, load balance, TCP/IP protocol
stack, dynamic address distribution, static MAC address filtration, and VLAN.
The network management subsystem consists of SNMP Agent, telnet command
line configuration module, WEB page configuration module, and GUI integrated
management module.
3.2 Units/Components
W140A Rear Control Panel is shown in Fig. 3.2-1
To
antenna
12
Ethernet cable and feeder To the ground
Fig. 3.2-1 W140A Rear Control Panel
3-2
The interfaces on the rear control panel are described as follows:
1. Chassis transfer interface 1: Ethernet
2. Chassis transfer interface 2: Antenna interface for antenna installation
3. Chassis grounding interface
3.3 Networking Modes
W140A provides both outdoor wireless access and Wi-Fi bridge function. The
operation modes of W140A are as follows.
1. Building small wireless LAN
Chapter Error! Style not defined. Error! Style not defined.
Wired LAN
W140A W140A
PC Lap-top Computer PC Lap-top Computer
Fig. 3.3-1 Building Small Wireless LAN
3-3
ZXR10 WAS (V1.0) W140A Outdoor Wireless Access Point / Bridge User’s Manual
2. Building Internet wireless access network together with AC, indoor AP and
outdoor bridge.
Internet
PC
W110B
W110B
W140A
PC Lap-top Computer
UAS2500E
Ethernet
W200A
PC Lap-top Computer
AAA
File server
W140A
PC Lap-top Computer
Fig. 3.3-2 Building Internet Wireless Access Network with AC, Indoor AP and Outdoor Bridge
3. Implementing bridge function
If two areas are far from each other or there are some obstacles between them,
W140A can be used for bridging. as shown Fig. 3.3-3, the two W140As work in
Bridge Server and Bridge Client modes respectively to provide a wireless bridge
between LAN1 and LAN2. The bandwidth of the bridge is decided by the
Bridge server. The Bridge Server may serve several Bridge Clients at the same
time. Considering the performance of wireless connection, Bridge server had
better not serve more than four Bridge clients.
3-4
Chapter Error! Style not defined. Error! Style not defined.
Bridge Server
Bridge
Client
LAN1
Bridge
Client
LAN2
Fig. 3.3-3 Wireless Bridge Mode
3-5
Loading...
+ 87 hidden pages