Home
User Manual
Contents
1. Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries from the list Delete All Flush the list Reset Clear the settings 33 4 1 3 WDS Access Point It acts as the main base station for a Wireless Distribution System mesh network Operation Mode Mode Access Point Client WDS Access Point WDS Client AP Router Wireless ISP Radio Access Point Client WDS Access Point WDS Client Access Point Wireless ISP Ethernet Port LAN LAN LAN LAN LAN LAN LAN LAN WAN LAN LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Message from webpage Eh You need to press Save and Restart button if you change the operation mode Continue ca Press OK to continue then below page is displayed 34 Operation Mode WDS Access Point Fields Operation Mode Settings Regulatory Domain United States Network ID SSID Loopcomm Site Survey Y Enable Wireless Disable SSID Broadcasting Enable Iso
2. LED Indicator Status Description 1 ON The LP 2596K is powered ON OFF The LP 2596K is powered OFF Secondary ON Port linked OFF No connection Blink Data is being transmitted or received on the Secondary Ethernet port Main ON Port linked OFF No connection Blink Data is being transmitted or received on the Main Ethernet port Signal Strength AP Station mode Low Medium High It stands for connection quality of Station mode or AP mode 10 1 5 4 1 0 Interface Earth Ground Main Ethernet Port a gt 6 Reset Secondary Ethernet Port Fields Description It mainly used as Power over Ethernet PoE port which allows the router powered up by PoE adapter when the connection is established by RJ 45 Cat 5 cable It Main supports auto sensing on 10 100M speed half full duplex and complies with IEEE 802 3 802 3u respectively The Secondary Ethernet port allows users to connect to another device through RJ 45 Cat 5 cable It supports auto sensing on 10 100M speed half full duplex and Secondary complies with IEEE 802 3 802 3u respectively Note In Operation mode the AP router s secondary port will be WAN Port by default Press continually the reset button at least 5 seconds to reset the configuration Reset Button parameters to factory defaults It used to connect the metal line to ground in order to avoid the device from Earth Ground external electric
3. Save and Restart It saves the new settings and restarts 27 Site Survey You could configure AP Client parameters here MAC Address Security C0 C1 C0 62 3C 15 WPA WPA2 TKIP CCMP PSK J_RTA15_5 0 00 E0 4C 88 88 01 WPANMPA2 CCMP PSK dlink 5GHz D3D2 78 54 2E FA D3 D2 WPA WPA2 TKIP CCMP PSK Loopcomm 00 1A EF AB 00 06 ASSOCIATE Click Rescan to browse more networks then select the SSID and press associate then close the page Note Enter the SSID Password if necessary Security Settings Security settings allow you to use encryption to secure your data There are 4 Encryption Modes in Security Settings They are WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption WEP Mi Authentication Open System Shared Key Auto Key Length 64 bit 128 bit Key Format ASCII 5 Characters Encryption Key Cancel 28 Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Key Length Open System Open system authentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard curren
4. Fields WAN connection Type Description Select PPPoE from pull down menu User Name Password Verify Password login the PPPoE server provided by ISP the PPPoE server provided by ISP Enter the same password again for verification If you select the PPPoE support on WAN interface Enter the user name to If you select the PPPoE support on WAN interface Enter the password to login Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 72 Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Dynamic DNS Settings Dynamic DNS Provider Account Password DDNS Cancel Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registered Password Password assigned by the DDNS service provider DDNS Enter the domain name that you registered Save Click Save to change the new settings Cancel Click cancel to clear the entered settings Remote Management Remote Management Settings Remote management via WAN Disable v Ping from WAN Enable Save Cancel Fields Description Remote Management Select Enable or Disable for remote management function Ping from WAN Select Disable or E
5. RTS CTS Threshold Determines the packet size of a transmission and through the use of an AP helps control traffic flow The range is 0 2347 bytes Beacon Interval DTIM Delivery Traffic Indication Map Beacons are the packets sending by Access point to synchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A Gl is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity t
6. Fields Description Regulatory Domain Select the country from pull down menu Remote AP SSID Select Site Survey option then it will Scan amp displays the SSID List Choose one SSID from the list Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Lock to AP Mac Enter MAC address of the access point to which the client will be locked amp connected Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K and other device for accurate transmission performance DFS Control Dynamic Frequency Selection Enable the feature to access DFS Domain Select the DFS Domain from pull down menu
7. RSN Reauthorization Disable WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel Fields Description RADIU Server IP Address Enter the RADIU Server s IP Address provided by your ISP RADIU Server Port RADIU Server Password Enter the RADIUS Server s port number provided by your ISP Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization Period EAP Session timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security it varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 68 Advanced Settings Advanced Wireless Settings RTSI CTS Threshold Beacon Interval DTIM Fragment Size Short GI Aggregation Aggregated Frames Number Maximum Aggregated Size Tx ChainMask Rx ChainMask WiFi Multimedia bytes range 0 100 milliseconds range 20 1 2346 400ns 800ns Enable 32 Disable 50000 2 Chain 2 Chain WMM Capable Enable Disable WMM Configuration Cancel Fields Description
8. 42 3 Password EA Ri 80 4 2 4 System Management onin eaa E E anes EEEE dues ETE E satan 81 Ae DATING OS aiii a E 82 A E TEO 83 4 2 T SAC MA RESTO LE iss sos ti ii A E A A AA E 83 4 2 8 Factory Deval iii aan o adds vies cogaea A D i aeo 84 429 REDONDA di tend a a aE a AE S aS 84 A o ana a a e a a a a a e a a a Mah aealee micas 85 ASNO O ia 85 4 3 2 NetWork Traceroute omic tii aiii desa aloa E S 86 A A Device Slade dba lanas diia 87 4 4 1 Device Informations dia a 87 4 4 2 Wireless InformatiON cocccnconnonnonnnonocnnnnnnnnononononnonononnnononononcononnnn ono e aai 88 44 3EAN Informatii aiii 88 4 4 4 Wireless Client Table iii tra 89 44 SSysten LOG fos hotii a a et a i Aae oreore E eS ten 89 5 Compliance O 90 1 Introduction Thank you for purchasing Loopcomm product At loopcomm we strive to provide you with the highest quality products through innovation and advanced technology We pride ourselves on delivering products that outperform the competition and go beyond your expectations If you have any questions please feel free to contact us We d love to hear from you and thank you for your support Email support loopcomm com Website www loopcomm com Notice This document is issued to guide users how to install and operate LP 2596K Outdoor Long Range 802 11a n Wireless AP CPE Bridge Please read the document carefully to avoid any damage which is caused by inappropriate use excluding from the warranty e Loopcomm
9. 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 00 13 Warning kernel Built 1 zonelists in Zone order mobili Notice kernel Kernel command line mem 64M console tty Warning kernel PID hash table entries 256 order 8 Informational kernel Dentry cache hash table entries Informational kernel Inode cache hash table entries 4 Warning kernel Primary instruction cache 64kB VIPT 4 Warning kernel Primary data cache 32kB 4 way VIPT c Informational kernel PPPoL2TP kernel driver V1 0 Informational kernel SLIP version 0 8 4 NET3 019 NEWT Informational kernel console netcon0 enabled Informational kernel netconsole network logging start Notice kernel 6 cmdlinepart partitions found on MTD de Notice kernel Creating 6 MTD partitions on ath nore Notice kernel 0x 00000000000 0x000000040008 u boot Notice kernel 0x 00000040000 0x 00000050008 u boot Notice kernel 0x 00000050000 0x000000e50008 rootfs Notice kernel 0x 00000e50000 0x 00000fbO000 ulmage Notice kernel 0x 00 00fbO000 0xe00000FFO000 config Notice kernel 0x 00000fFO008 0x2000001080008 ART Warning kernel Module gpio version is 1 0 Warning kernel gpio Flag 1 Warning kernel u32 classifier Warning kernel Actions configured Warning kernel Netfilter messages via NETLINK 7 4 5 LOGOUT Pl
10. A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings 48 Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet Access Control Settings This feature allows you lo define a list of MAC addresses thal are authonzed to access or denied from acces
11. Select Encryption WPA y Pre Authentication 2 Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES Auto Pre Shared Key Cancel Fields Select Encryption Pre Authentication Description Select the Encryption Mode from the pull down menu Select Pre Authentication as Personal or Enterprise Encryption Type Pre shared Key TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement User can enter Maximum number of Key Length The format can be passphrase or any characters Security Settings Select Encryption Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RADIU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds RSN Reauthorization Disable Y WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel 53 Fields Description RADIU Server IP Address Enter the RADIU Server s IP Address provided by your ISP RADIU Server Port Enter the RADIUS Server s port number
12. Technology Inc reserves the right to revise update the content of LP 2596K user manual without advance notice 1 1 Product Introduction Loopcomm LP 2596K is an Outdoor Long Range 5GHz Wireless AP CPE Bridge that provides wide coverage of network connection in existing environment It can operate up to 300Mbps data rate by supporting IEEE 802 11a n standard and with full WEP WPA WPA2 data security Wireless LAN Access Control List and TKIP AES encryption It keeps the data transmission safe in any network connection mode Moreover it supports different operation modes for any user s applications like point to point network and IP surveillance Product Outline 00 lampami 1 2 Package Content The package content includes the following items shown from left to right as figure e LP 2596K e DC 24V 1A Power adapter e Power cord e User Manual CD e Cable Tie e Quick Installation Guide QIG Wireless Router Power cord PoE Adapter O e E Quick Installation Guide CD Cable Tie 1 3 Product Features e Wireless Standards IEEE 802 11a n e Data transmission rate up to 300 Mbps at 40 MHz bandwidth e Operation Mode Access Point Client WDS Access Point WDS Client AP Router Wireless ISP e Reliable data security including WEP WPA WPA2 WPA PSK RADIUS and WPA2 PSK RADIUS with TKIP AES encryption e DFS Dynamic Frequency Selection Channel supported e Support SNMP V2 management SSH NTP and Telnet e Support Q
13. The range is 0 2347 bytes Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds DTIM Delivery Traffic Indication Map Fragment Size Short GI Guard Interval A large data frame is fragmented into several fragments each of size equal This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes A Glis a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive 47 Aggregation
14. WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption WEP Authentication Open System Shared Key Auto Key Length 64 bit 128 bit Key Format ASCII 5 Characters Encryption Key Cancel Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Open System Open system authentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key Length Select the Key length Key Format Encryption Key When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Characters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character User can enter the characters based on selected Key Length amp Key Format The format can be passphrase or characters 52 Security Settings
15. host this host is reachable Network Ping is commonly used to provide a basic picture of where a specific networking problem may exist For example if an Internet connection is down at an office the ping utility can be used to figure out whether the problem exists within the office or within the network of the Internet provider Network Ping Please assign an IP address to run Ping function against Destination IP Address Ping Number 4 default 4 Ping Packet Size 56 Bytes default 56 Bytes Stop Ping Result Fields Description Destination IP Address Enter the IP address to be Pinged Ping Number Number of times to be pinged Ping Pack Size Ping Data packet size Ping Result It displays the result Ping Click it to start to ping Stop Stop the ping 85 4 3 2 Network Traceroute Once the Network Ping has been used to determine basic connectivity the Network traceroute can used to determine more specific information about the path to the destination host including the route the packet takes and the response time of these intermediate hosts If you execute the Traceroute command on a source device it sends IP packets toward the destination with Time To Live TTL values that increment up to the maximum specified hop count This is 30 by default on most systems Network Traceroute Please assign an IP address to run Traceroute function against 9 Destination IP Address Max hop 30 defaul
16. not respond or in case the system has locked up Software watchdog timer is used to provide the last option so in very rare cases caused by hardware malfunction it can lock up by itself There is a hardware watchdog device available in all Router BOARD PowerPC which can reboot the system in any case O Ping Watchdog The Ping Watchdog will ping the specified IP address for connection status If the remote IP address does not respond to Ping the device will power reboot Ping Watchdog Enable Disable IP Address 1 192 168 1 1 Ping Frequency 120 Seconds 10 to 999 default is 120 Failed tries 2 default is 2 tries Action Power Reboot NOTE Watchdog will take effect 10 minutes after startup when filled IP Address 1 must fail to respond for watchdog to take action Save Fields Description Ping Watchdog Enable Disable the function to access IP Address 1 Enter the IP address to be pinged Ping Frequency Set the number of seconds to be Pinged Failed Tries Enter the number of permitted times for the ping to be failed before power reboot For example 2 means the CPE will reconnect if the PING doesn t respond for 120Seconds Action If the remote IP address does not respond to Ping the device will power reboot Save It saves the changed settings When you set the Ping Frequency to every 120 seconds and Fail Tries to 2 It means the User will ping every 120 seconds after the second failure
17. s IP Address provided by your ISP RADIU Server Port Enter the RADIUS Server s port number provided by your ISP RADIU Server Password Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization Period EAP Session timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization WPA Group Rekey Interval Enable Disable the function to access A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 46 Advanced Settings Advanced Wireless Settings RTS CTS Threshold Beacon Interval DTIM Fragment Size Short GI Aggregation Aggregated Frames Number Maximum Aggregated Size Tx ChainMask Rx ChainMask WiFi Multimedia bytes range 0 2347 100 milliseconds range 2 1 range 1 255 default 1 2346 bytes range 256 400ns 800ns Enable Disable 32 range 1 32 50000 range 2 2 Chain 2 Chain WMM Capable Disable WMM Configuration Cancel Fields Description RTS CTS Threshold Determines the packet size of a transmission and through the use of an AP helps control traffic flow
18. specific MAC address to be denied Comment Make a comment for the filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address Bandwidth Control Settings Quality of Service Disable Type IP Address Local IP Address MAC address Uplink BandWidth Kbps Downlink BandWidth Kbps Comment Add y Fields Description Quality of Service Enable Disable the function Type Local IP Address connected to the router The two type options are IP Address and Mac address If you select IP Address then Enter the IP Address of the device PC MAC Address connected to the router If you select MAC Address then Enter the MAC Address of the device PC Uplink Bandwidth Kbps Downlink Bandwidth Kbps Enter the limit for uplink bandwidth Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Click Add to change the new settings Cancel Click cancel to clear the entered settings 77 4 2 System Configuration Select the System Configuration menu from the top of your screen to access IP The system configuration includes Device IP Settings Time Settings Password Settings System Mana
19. Capable Enable Disable WMM Configuration Cancel Fields Description RTS CTS Threshold Determines the packet size of a transmission and through the use of an AP helps control traffic flow The range is 0 2347 bytes Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds DTIM Delivery Traffic Indication Map This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size Short GI Guard Interval A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes A Gl is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400
20. GQ Loopcomm User Manual Outdoor Long Range 802 11a n 5GHz Wireless AP CPE Bridge 2T2R LP 2596K Table of Contents LENTO UCA AS A AAA A Lae RIE ah BT el RA oe 4 1 1 PROGUCE introducida 5 tZ Package Content adi stats a ias ata a 6 1 3 Product RE QUIROS sli lis 7 TA AD PliCatlON cl A cas Odia 7 1 4 1 Wireless ISP WISP Mode a baa nia al Lana eeend le ean nied ine 7 VAD Brid Se Mode o e o e IIS GREEN LTA NAS NE BO Red 8 1 5 Product Outline Introduction ocoonooonocncnccncnnanonancnonocnoncnnnnnnonononcononnnnn a A a Ri 9 A c 2555 ee Sues A Bee Osa sae AT Ga vagus a Weeden SUT ov bape asda eo 9 1 52 BACK VIEW cura ddr rc 9 13 WED IMdicatio Missen ian n a Seances Seen Cis R cnet pai daeans eee das 10 A e i 11 TSS Mounting OPTIONS viii lr 12 2 Hardware lnstallatio M eian a ata a a a a a Ea 13 2 A CONNECLIONIOVERVIEW sortni a a a a ea eataa E aa E Aaa ESNS 13 A os A A A T enna O 13 2 3 1P SUPVetllan ce coi a A A E 15 SADA CON e a es e de a e S 16 3 1 System Required 16 A O E EE O o 16 3 3 Get started With LP 25960K a a ei AA A 17 Ay SoftWare Fearless ai E A T A a Gear aed alee aa asians 18 4 l Operation Mode e e a O 18 AM ASA CCOSS POMO 18 A A CET Au LED E DUE E ROE aT ROA 26 413 WiDS Access Pontes ions Ponce e a 34 A A OR A 42 Ass SA PROUUEE O AO 50 41 60 Wireless ISP iaa oia 64 4 2 System Configuration via dinar beds 78 4 2 1 Deyice IP CUA S eto 78 A 22 A ta cai a E sa aa aaa a bing T E lade eae Pav aa seas 79
21. IU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds RSN Reauthorization Disable Y WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel Fields Description RADIU Server IP Address Enter the RADIU Server s IP Address provided by your ISP RADIU Server Port Enter the RADIUS Server s port number provided by your ISP RADIU Server Password Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization Period RSN Reauthorization EAP Session timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 37 Advanced Settings Advanced Wireless Settings RTSI CTS Threshold Beacon Interval DTIM Fragment Size Short GI Aggregation Aggregated Frames Number Maximum Aggregated Size Tx ChainMask Rx ChainMask WiFi Multimedia bytes range 0 100 milliseconds range 20 1 2346 400ns 800ns Enable Disable 32 50000 2 Chain 2 Chain WMM
22. Key length Key Format When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Characters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character Encryption Key User can enter the characters based on selected Key Length amp Key Format The format can be passphrase or characters Security Settings Select Encryption WPA a Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto Pre Shared Key 36 Fields Description Select Encryption Select the Encryption Mode from the pull down menu Pre Authentication Select Pre Authentication as Personal or Enterprise Encryption Type TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The format can be passphrase or any characters Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RAD
23. Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address Bandwidth Control Settings Quality of Service Disable Type IP Address y Local IP Address MAC address XX XXXX XX XX XX Uplink BandWidth Kbps Downlink BandWidth Kbps Commert Add i Cancel connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Fields Description Quality of Service Enable Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address then Enter the IP Address of the device PC Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Click Add to change the new settings Cancel Click cancel to clear the entered settings 63 4 1 6 Wireless ISP A Wireless Internet Service Provider WISP is an internet Service Provider with a network based on wireless networking Operation Mode Mode Radio Ethernet Port Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireless ISP Wireless ISP LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled autom
24. address are in the access control list will be able to connect or disconnect the internet Access Control Settings This feature allows you to define a list of MAC addresses thal are authonzed to access or denied from accessing the wireless network Wireless Access Control Mode Disable id Mac Address XXIXXIXXIXXIXX XX Comment Apply Changes Fields Description Wireless Access Control Mode The Selections are Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries
25. al damage Note LP 2596K built in PoE pass through function on Secondary Ethernet port It means the Secondary Ethernet port is able to provide 24V power for a secondary device if this function enabled on Web Configuration Please refer to the statement on Advanced Setting of Radio menu 1 5 5 Mounting Options Pole Mount Use cable tie and make it pass through the one of middle holes to fix and tie on the pole eE N Wall Mount Please fix the screws into the wall and hang LP 2596K on the corresponding screws lt 12 2 Hardware Installation 2 1 Connection overview 2 2 Installation Steps 1 Take off the water proof sliding cover 2 Connect the Main Ethernet port of LP 2596K with a RJ 45 cable Note LP 2596K built in PoE pass through function on Secondary Ethernet port It means the Secondary Ethernet port is able to provide 24V power for a secondary device if this function enabled on Web Configuration 13 3 Make the water proof sliding cover well installed Connect Power cord to power outlet Connect other end of Power cord to PoE Adapter of 24V 1A PoE port Connect other end of Main Ethernet port to PoE Adapter LAN port Connect Ethernet cable from PoE Adapter to your computer laptop for Web configuration 8 Reset button It allows user to remotely reset the system of LP 2596K JUANA Note 1 There is no software driver or util
26. atically Press setup then below Screen is displayed Message from webpage You need to press Save and Restart button if you change the operation mode Continue Press OK to continue then below page is displayed 64 5 Operation Mode Wireless ISP Operation Mode Settings Regulatory Domain United States v Loopcomm Site Survey Remote AP SSID Y Enable Wireless Disable SSID Broadcasting Enable Isolated Lock to AP MAC 00 00 00 00 00 00 Radio Mode 5G 11NA HT40 v Channel Auto Channel vw Data Rate Auto v Security Setting Setup Transmit Power 27 dbm v Transmit Distance 1Km v TDMA Disable v DFS Control Enable v DFS Domain FCC M Advanced Settings Setup Access Control Setup WAN Port Settings Setup Dynamic DNS Settings Setup Remote Management Setup DHCP Server Settings Setup DMZ Settings Setup Virtual Server Settings Setup IP Filtering Settings Setup Port Filtering Settings Setup Mac Filtering Settings Setup Bandwidth Control Setup Save amp Restart Fields Regulatory Domain Remote AP SSID Description Select the country from pull down menu Select Site Survey option then it will Scan amp displays the SSID List Choose one SSID from the list Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this netw
27. atically to fulfill client s requirement User can enter Maximum number of Key Length The format can be passphrase or any characters 29 Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RADIU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds RSN Reauthorization Disable WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel Fields Description RADIU Server IP Address Enter the RADIU Server s IP Address provided by your ISP RADIU Server Port RADIU Server Password Enter the RADIUS Server s port number provided by your ISP Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization Period EAP Session timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is the better the security it varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 30 Advanced Settings Advanced Wireless Se
28. ce Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 74 Virtual Server Settings Virtual server feature allows users to make servers on your LAN accessible to internet users Normally Internet users would not be able to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Virtual Server Settings This allows you to specify one or more applications running on server computers on the LAN that may be accessed by any Internet user Internet data destined for the specified public port will be directed to the specified private port number on the LAN client with the specified private IP address Virtual Server Disable Protocol Both IP Address Port Range Comment Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP amp UDP TCP or UDP IP Address Enter the IP Address to which the data packets can be forwarded from WAN This IP address should be hosted in LAN behind the NAT Firewall Port Range Enter the port range to which data packets can be forwarded Comment Make a comment for the Virtual Server policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings IP Filtering Settings The IP filtering featu
29. cked and connected Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K and other device for accurate transmission performance DFS Control Dynamic Frequency Selection Enable the feature to access DFS Domain Save and Restart Select the DFS Domain from pull down menu It saves the new settings and restarts 43 Site Survey You could configure AP Client parameters here MAC Address Cisco04517 5G C0 C1 C0 62 3C 15 J_RTA15_5 0 00 E0 4C 88 88 C1 ASSOCIATE Click Rescan to browse more networks then select the SSID and press associate then close the page Note Enter the SSID Password if necessary Security Settings Security settings allow you to use encryption to secure your data There are 4 Encrypti
30. cters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character Encryption Key User can enter the characters based on selected Key Length amp Key Format The format can be passphrase or characters Security Settings Select Encryption Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES Auto Pre Shared Key Fields Description Select Encryption Select the Encryption Mode from the pull down menu Pre Authentication Encryption Type Select Pre Authentication as Personal or Enterprise TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The format can be passphrase or any characters 67 Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RADIU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds
31. d other device for accurate transmission performance DFS Control DFS Domain Save and Restart Dynamic Frequency Selection Enable the feature to access Select the DFS Domain from pull down menu It saves the new settings and restarts 35 Security Settings Security settings allow you to use encryption to secure your data There are 4 Encryption Modes in Security Settings They are WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption Authentication Open System Shared Key Auto Key Length 2 64 bit 128 bit Key Format ASCII 5 Characters Y Encryption Key Cancel Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Open System Open system authentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key Length Select the
32. ease make sure to Logout after you finish all settings 89 5 Compliance Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help FCC Caution This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that
33. eed to press Save and Restart button if you change the operation mode Continue Conc Press OK to continue then below page is displayed Note In Operation mode the AP router s secondary port will be WAN Port by default 18 Operation Mode System Configuration Tools Device status Logout Operation Mode Access Point Operation Mode Settings Regulatory Domain United States Network ID SSID Loopcomm Site Survey Y Enable Wireless Disable SSID Broadcasting Enable Isolated Radio Mode 5G 11NA HT40 v Channel 36 5180MHz v Data Rate Auto MM Security Setting Setup Transmit Power 27 dbm Y Transmit Distance 1Km Y TDMA Disable DFS Control Enable DFS Domain FCC y Advanced Settings Setup Access Control Setup Bandwidth Control Setup Save amp Restart Fields Description Regulatory Domain Select the country from pull down menu Network SSID It is the wireless network name User can use the default SSID or change it Special characters cannot be used Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines t
34. electing 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A Glis a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive 22 Aggregation A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectra
35. er Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Click Add to change the new settings Cancel Click cancel to clear the entered settings 25 4 1 2 Client It acts as a wireless client to connect a remote segment to an existing WLAN O Operation Mode Mode Radio Ethernet Port Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireless ISP Wireless ISP LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed GE You need to press Save and Restart button if you change the operation mode Continue Press OK to continue then below page is displayed 26 Operation Mode Client 9 Operation Mode Settings Regulatory Domain United States Y Remote AP SSID Loopcomm Site Survey Y Enable Wireless Disable SSID Broadcasting Enable Isolated Lock to AP MAC 00 00 00 00 00 00 Radio Mode 5G 11NAHT40 Channel Auto Channel Data Rate Auto M Security Setting Setup Transmit Power 27 dbm Y Transmit Distance 1Km Y TDMA Disable DFS Control Enable v DFS Domain FCC M Advanced Settings Setup Access Control Setup Save amp Restart
36. es together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings 55 Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet Access Control Settings This feature allows you to define a list of MAC addresses thal are aulhonzed to access or denied from accessing the wireless network Wireless Access Control Mode Disable bd Mac Address XXEXXIXXIXXIXX XX Commen
37. from the list Delete All Flush the list Reset Clear the settings 40 Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address Bandwidth Control Settings Quality of Service Disable Type IP Address y Local IP Address MAC address XX XX XX XX XX XX Uplink BandWidth Kbps Downlink BandWidth Kbps Comment Add Cancel Fields Description Quality of Service Enable Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address then Enter the IP Address of the device PC connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Click Add to change the new settings Cancel Click cancel to clear the entered settings 41 4 1 4 WDS Client It acts as a remote base station in a Wireless Distribution System mesh network O Operation Mode Mode Radio Ethernet Port Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireles
38. gement Ping Watchdog Firmware Upgrade Configuration Save and Restore Factory Default Reboot System 4 2 1 Device IP Settings All settings besides Wireless and WAN functions are in this category Device IP Settings O Device IP Settings O Time Settings IP Address 192 1168 Ai 200 IP Subnet Mask 255 255 10 0 O Password Settings Gateway IP Address 192 1168 silt 200 system Management Primary DNS Server 192 1168 1 1200 Secondary DNS Server 8 18 8 8 O Ping Watchdog Save 4 Restart O Firmware Upgrade NOTE Changes to this page will not take effect until you click Save amp Restart on the save config page Configuration Save and Restore Factory Default O Reboot System Fields Description IP Address Enter the IP Address for the Device IP Subnet Mask Enter the Subnet Mask as 255 255 0 0 Gateway IP Address Enter the Gateway IP Address for the Device DNS Server The Domain Name System DNS is a server on the Internet that translates logical names such as www yahoo com to IP addresses like 66 218 71 80 In order to do this a query is made by the requesting device to a DNS server to provide the necessary information If your system administrator requires you to manually enter the DNS Server addresses you should enter them here Primary DNS Server Enter the Primary DNS Server Secondary DNS Server Enter the Secondary DNS Server Save amp Resta
39. he data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K and other device for accurate transmission performance TDMA Time Division Multiple Access Enable Disable the function to access DFS Control Dynamic Frequency Selection Enable the feature to access DFS Domain Select the DFS Domain from pull down menu Save and Restart It saves the new settings and restarts 19 Security Settings Security settings allow you to use encryption to secure your data There are 4 Encryption Modes in Security Settings They are WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption Authentication Open System Shared Key Auto Key Length 64 bit 128 bit Key Format ASCII 5 Characters Y Encryption Key Cancel Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Open System Open system au
40. ient MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries from the list Delete All Flush the list Reset Clear the settings 24 Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address Router can use bandwidth control to limit the Internet connection speed of IP address or MAC address Bandwidth Control Settings Quality of Service Disable Type IP Address Local IP Address MAC address XXCXX XX XX XX XX Uplink BandWidth Kbps Downlink BandWidth Kbps Comment Add Cancel Fields Description Quality of Service Enable Disable the function Type The two type options are IP Address and Mac address Local IP Address If you select IP Address Type then Enter the IP Address of the device PC connected to the router MAC Address If you select MAC Address Type then Enter the MAC Address of the device PC connected to the rout
41. iodically The shorter the interval is the better the security it varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings 21 Advanced Settings Advanced Wireless Settings RTSI CTS Threshold Beacon Interval DTIM Fragment Size Short GI Aggregation Aggregated Frames Number Maximum Aggregated Size Tx ChainMask Rx ChainMask WiFi Multimedia bytes range 0 100 milliseconds range 20 1 2346 400ns 800ns Enable Disable 32 50000 2 Chain 2 Chain WMM Capable Enable Disable WMM Configuration Cancel Fields Description RTS CTS Threshold Determines the packet size of a transmission and through the use of an AP helps control traffic flow The range is 0 2347 bytes Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds DTIM This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example s
42. ion Mode Mode Radio Ethernet Port Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point s WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireless ISP Wireless ISP LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Message from webpage You need to press Save and Restart button if you change the operation mode Continue Press OK to continue then below page is displayed 50 Operation Mode 2 Operation Mode Settings AP Router Regulatory Domain United States v Network ID ssip ES9Pcomm Site Survey Y Enable Wireless Disable SSID Broadcasting Enable Isolated Radio Mode 5G 11NA HT40 v Channel 36 5180MHz v Data Rate Auto v Security Setting Setup Transmit Power 27 dbm Transmit Distance 1Km v TDMA Disable v DFS Control Enable v DFS Domain FCC v Advanced Settings Setup Access Control Setup WAN Port Settings Setup Dynamic DNS Settings Setup Remote Management Setup DHCP Server Settings Setup DMZ Settings Setup Virtual Server Settings Setup IP Filtering Settings Setup Port Filtering Settings Setup Mac Filtering Settings Setup Bandwidth Control Setup Save amp Restart Fields Description Regulatory Domain Select the country from pull down menu Network SSID It is the wireless
43. it will reconnect 82 4 2 6 Firmware Upgrade System Configuration gt Firmware Upgrade Upgrade the device firmware to obtain new functionality It takes about 1minute to upload new version Click the Browse button to select the path and filename for the firmware and then click the UPGRADE button to upgrade firmware Firmware Upgrade Select the firmware file by clicking Browse and click UPGRADE WARNING Don t use wireless connection to upload the firmware To avoid system crashes Browse UPGRADE NOTE 1 Do not power off the router while upgrading the firmware 2 Some browsers would fail to locate the firmware file when there is any localized character in the firmware file path Note Please do not off the power or remove the Ethernet cable connected to LP 2596K when firmware upgrade is in process Otherwise it will probably cause system crash Caution A corrupted file will hang up the System 4 2 7 Save and Restore System Configuration gt Configuration Save and Restore You can save system configuration settings to a file and later download it back to the LP 2596K by following the steps Configuration Save and Restore Click SAVE to save the configuration to a management host Select the text configure file by clicking Browse then click RESTORE Browse Save Press Save button to save the current configuration settings of the device to the Management Host or click the Browse button to l
44. ity installation needed 2 RJ 45 8P8C Ethernet cable is required 3 It takes about 60 seconds to complete the boot up sequence after LP 2596K powered up 14 2 3 IP Surveillance Example Scenario for IP surveillance The following figure indicates the basic setup to implement IP surveillance with a pair of LP 2596K The remote monitoring image can be delivered to local NVR via the high powered long distance transmission by LP 2596K Dr o IP CAM LP 2596K K y LP 2596K LPC 2001R F 2 l RST R Switch 1 S 1 I l 1 LP 5308C A N SES a lt ll ne 15 3 Software Configuration 3 1 System Requirements Microsoft Windows XP Vista 7 8 Mac iOS Linux A Web Browser supports HTTP such as Internet Explorer Google Chrome Safari and Mozilla Firefox etc 3 2 Easy Installation Network Connection Setup The default IP of LP 2596K is 192 168 1 200 You have to make sure your computer is on the same network segment as LP 2596K before connecting to LP 2596K Configuration Example In the Windows 7 operating system Press Start and enter ncpa cpl in search bar You will see network connection page Select your network interface card and Right click to set Properties Double click Internet Protocol Version 4 TCP IPv4 Select Specify an IP address and enter the IP address IP Address 192 168 1 x x can be any number between 1 to 254 except for 200 pun Subnet Mask 255 255 255 0 Defa
45. l Settings This feature allows you to define a list of MAC addresses that are authorized to access or denied from accessing the wireless network Wireless Access Control Mode Disable Mac Address XX XX XX XX XX XX Comment Apply Changes Delete Selected Delete All 70 Fields Description Wireless Access Control Mode The Selections are Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries from the list Delete All Flush the list Rese
46. l channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Wi Fi Multimedia Enable the feature to access WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings 23 Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet Access Control Settings This feature allows you to define a list of MAC addresses that are authorized to access or denied from accessing the wireless network Wireless Access Control Mode Disable Mac Address XX XX XX XX XX XX Comment Apply Changes Delete Selected Delete All Fields Description Wireless Access Control The Selections are Mode Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter cl
47. lated Radio Mode 5G 11NA HT40 Channel 36 5180MHz Data Rate Auto v Security Setting Setup Transmit Power 27 dbm Transmit Distance 1Km v TDMA Disable v DFS Control Enable v DFS Domain FCC v Advanced Settings Setup Access Control Setup Bandwidth Control Setup Save amp Restart Description Regulatory Domain Select the country from pull down menu Network SSID It is the wireless network name User can use the default SSID or change it Special characters cannot be used Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K an
48. le to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Virtual Server Settings This allows you to specify one or more applications running on server computers on the LAN that may be accessed by any Internet user Internet data destined for the specified public port will be directed to the specified private port number on the LAN client with the specified private IP address Virtual Server Disable v Protocol Both v IP Address Port Range Comment Add Cancel 60 Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP amp UDP TCP or UDP IP Address Enter the IP address to which the data packets can be forwarded from WAN The IP address should be hosted in LAN behind the NAT firewall Port Range Enter the port range to which data packets can be forwarded Comment Make a comment for the Virtual Server policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings IP Filtering Settings The IP filtering feature allows you to deny specific IP address which cannot connect to internet IP Filtering Settings Filtering Disable v Protocol Both v IP Address Comment Cancel Fields Description Filtering Enable Disable the function to IP Filte
49. may cause undesired operation RF Radiation Exposure and Hazard Statement To ensure compliance with FCC RF exposure requirements this device must be installed in a location such that the antenna of the device will be greater than 0 6 m away from all persons Using higher gain antennas and types of antennas not covered under the FCC certification of this product is not allowed Installers of the radio and end users of the product must adhere to the installation instructions provided in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter Non modification Statement Use only the integral antenna supplied by the manufacturer when operating this device Unauthorized antennas modifications or attachments could damage the TI Navigator access point and violate FCC regulations Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment Copyright 2014 Loopcomm Technology Inc All rights reserved 90
50. n WAN Connection Type Select DHCP from pull down menu Host Name Enter the Host Name of DHCP server The default value is empty Save Click Save to change the new settings Cancel Click cancel to clear the entered settings e Static Mode fixed IP WAN Port Settings WAN Connection Type Static Mode fixed IP IP Address Assigned by Your ISP IP Subnet Mask 0 0 0 0 0 0 0 0 ISP Gateway IP Address 0 0 0 0 Primary DNS Server 8 8 4 4 Secondary DNS Server 8 8 8 8 Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the IP address of Domain Name Server 2 Save Click Save to change the new settings Cancel Click cancel to clear the entered settings 57 e PPPoE ADSL WAN Port Settings WAN Connection Type PPPOE ADSL User Name Password Verify Password tance Fields Description WAN connection Type Select PPPoE from pull down menu User Name If you select the PPPoE support on WAN interface Enter the user name to login the PPPoE server Provided by ISP Password If you select the PPPoE support on WAN interface Enter the password t
51. nable for Ping permit from WAN Save Click Save to change the new settings Cancel Click cancel to clear the entered settings 73 DHCP Server Settings DHCP Server Settings DHCP Server Server v Assigns IP addresses to wired and wireless clients from the following range Lease Time 864000 Seconds From 192 168 1 1 To 192 168 1 100 Cancel Fields Description DHCP Server Select Server to access the feature Lease Time The Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start address of the DHCP Client address range To Enter End address of the DHCP Client address range Save Click Save to change the new settings Cancel Click cancel to clear the entered settings DMZ Settings You may setup a De Militarized DMZ to separate internal network and internet DMZ Settings DMZ Settings Disable v DMZ IP Address anes Fields Description DMZ Settings Enable or Disable the DMZ function DMZ IP Address To support DMZ in your firewall design Enter IP address of DMZ host that can be access from the WAN interfa
52. nd incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The format can be passphrase or any characters Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RADIU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds RSN Reauthorization Disable WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel Fields Description RADIU Server IP Address Enter the RADIU Server s IP Address provided by your ISP RADIU Server Port Enter the RADIUS Server s port number provided by your ISP RADIU Server Password Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization EAP Session timeout interval for 802 1x re authorization setting Session timeout Period interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key per
53. network name User can use the default SSID or change it Special characters cannot be used Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices 51 Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance DFS Control Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K and other device for accurate transmission performance Dynamic Frequency Selection Enable the feature to access DFS Domain Select the DFS Domain from pull down menu Save and Restart It saves the new settings and restarts Security Settings Security settings allow you to use encryption to secure your data There are 4 Encryption Modes in Security Settings They are
54. networks then select the SSID and press associate then close the page Note Enter the SSID Password if necessary Security Settings Security settings allow you to use encryption to secure your data There are 4 Encryption Modes in Security Settings They are WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption WEP Authentication Open System Shared Key Auto 64 bit 128 bit ASCII 5 Characters Y Key Length Key Format Encryption Key Cancel 66 Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Open System Open system authentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key Length Select the Key length Key Format When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Chara
55. ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive 38 Aggregation A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable WMM Configuration Enable the feature to access or Disable it Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings 39 Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC
56. o access or Disable it Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings 32 Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet Access Control Settings This feature allows you to define a list of MAC addresses that are aulhonzed to access or denied from accessing the wireless network Wireless Access Control Mode Disable Mac Address XX XXIXXIXXIXX XX Comment Apply Changes Delete Selected Fields Description Wireless Access Control Mode The Selections are Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control
57. o login the PPPoE server Provided by ISP Verify Password Enter the same password again for verification Save Cancel Click Save to change the new settings Click cancel to clear the entered settings Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Dynamic DNS Settings Dynamic DNS Provider Account Password DDNS Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registered Password Password assigned by the DDNS service provider DDNS Enter the domain name that you registered Save Click Save to change the new settings Cancel Click cancel to clear the entered settings 58 Remote Management Remote Management Settings Remote management via WAN Disable v Ping from WAN Enable Save Cancel Fields Description Remote Management Select Enable or Disable for remote management function Ping from WAN Select Disable or Enable for Ping permit from WAN Save Cancel Click Save to change the new settings Click cancel to clear the entered settings DHCP Server Settings DHCP Server Settings DHCP Server Server v Assigns IP addresses to wired and wireless clients from the following
58. o propagation delays echoes and reflections to which digital data is normally very sensitive 69 Aggregation A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings Access Control This page allows administrator to have Access Control by entering MAC address of client stations When this function is Enabled MAC address can be added into access control list and only those clients whose wireless MAC address are in the access control list will be able to connect or disconnect the internet Access Contro
59. oS bandwidth control e MAC Access Control e Built in Web based management and firmware upgrade e PoE pass through available on Secondary Ethernet port Configurable via Web UI e Remotely enable system reset by PoE Injector 1 4 Application 1 4 1 Wireless ISP WISP Mode LP 2596K can operate as station client in WISP mode to remotely receive broadband signal from WISP outdoor AP base station of Internet Service Provider ISP Internet ur Wireless Gateway LP 2596K WISP 1 4 2 Bridge Mode Since the antenna characteristics for LP 2596K is directional with high gain design it can transmit RF signal for several miles Based on this point LP 2596K is greatly used to bridge at long distance transmission for point to point applications like IP surveillance networking company Internet LP 2596K LP 2596K AP Station ADSL2 MODEM Router LP 8696PW WDS AP WDS Station gt iP IP CAM LPC 2001R F Switch LP 5308C tg gt IP CAM LPC 20011D F LP 2596K LP 2596K 1 5 Product Outline Introduction 1 5 1 Front view High Power 600mW 5GHz Amplifiers e ee 14dBi Directional PCB Antenna Waterproof Sliding cover 1 5 2 Back view ta Serial Number label UIC LED Indicator Secondary Main ci n TA TA TE Wall mount holes gt Pole mount won Product label A 1 5 3 LED Indication ih Secondary Maln
60. ocate the configuration file Restore click the RESTORE button to restore the system configuration from the specified file 83 4 2 8 Factory Default System Configuration gt Factory Default This Feature is used to reset the current configuration setting to the factory default configuration settings Factory Default Do you really want to restore the configuration to factory defaults YES CAUTION Restoring factory default settings will erase all your previous settings Click YES to go ahead and restore the configuration to the factory default 4 2 9 Reboot Whenever you use the Web configuration to change system settings the changes are initially placed in temporary storage These changes will be lost if the device is reset or turn off Reboot System Do you really want to reboot the Loopcomm Wireless Broadband Router IMPORTANT Do not turn off or press the Reset button while this procedure is in progress 84 4 3 Tools There are two features in Tools they are Network Ping amp Network Traceroute 4 3 1 Network Ping Network Ping is used to provide a basic connectivity test between the requesting host and a destination host This is done by using the Internet Control Message Protocol ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host Simply stated if the requesting host receives a response from the destination
61. ode Operation Mode P Mode Radio Ethernet Port Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireless ISP Wireless ISP LAN LAN 17 4 Software Features 4 1 Operation Mode In Operation Mode you will find wireless and WAN settings The LP 2596K wireless settings are dependent on the wireless operation mode you choose To access wireless settings click on the Setup button In Operation Mode there are 6 types they are 4 1 1 Access Point It Connects to an internal network LAN and broadcasts a wireless network connection WLAN When operating in the Access Point mode LP 2596K becomes the center hub of the wireless network All wireless cards and clients connect and communicate through the device Operation Mode System Configuration Tools Device Status Logout Operation Mode Operation Mode Select the Operation Mode by clicking on Setup button and then configure the Wireless Settings Mode Radio Ethernet Port e Access Point Access Point LAN LAN Client Client LAN LAN WDS Access Point WDS Access Point LAN LAN WDS Client WDS Client LAN LAN AP Router Access Point WAN LAN Wireless ISP Wireless ISP LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed y You n
62. of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes 31 Short GI Guard Interval A Gl is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive Aggregation A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining frames together into one larger frame It creates the larger frame by combining smaller frames with the same physical source destination end points and traffic class QoS into one large frame with a common MAC header Aggregated Frames Number Determines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable WMM Configuration Enable the feature t
63. on Modes in Security Settings They are WEP WPA WPA2 and WPA Mixed Functions are same for all Modes below example is for WEP and WPA Encryption Security Settings Select Encryption WEP ey Authentication Open System Shared Key Auto Key Length 8 64 bit D 128 bit Key Format ASCII 5 Characters Encryption Key Cancel 44 Fields Description Select Encryption Select the Encryption Mode from the pull down menu Authentication Open System Open system authentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key Length Select the Key length Key Format When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Characters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character Encryption Key User can enter the characters based on selected Key Length amp Ke
64. ork User cannot Ping Radio Mode Select the Mode of 5G 11NA HT20 or 5G 11NA HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu 65 Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance DFS Control Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2596K and other device for accurate transmission performance Dynamic Frequency Selection Enable the feature to access DFS Domain Select the DFS Domain from pull down menu Save and Restart It saves the new settings and restarts Site Survey You could configure AP Client parameters here dlink 5GHz D3D2 SSID Cisco04517 5G J_RTA15_5 0 Loopcomm MAC Address C0 C1 C0 62 3C 15 Channel Signal Strength 36 65 dBm Security WPA WPA2 TKIP CCMP PSK 00 E0 4C 88 88 C1 48 dBm WPAIWPA2 CCMP PSK Di 78 54 2E FA D3 D2 WPA WPA2 TKIP CCMP PSK 00 1A EF AB 00 06 CO ASSOCIATE Click Rescan to browse more
65. provided by your ISP RADIU Server Password Enter the RADIUS Server s Password provided by your ISP EAP Reauthorization Period EAP Session timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization WPA Group Rekey Interval Enable Disable the function to access A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Seconds Save Cancel Click Save to change the new settings Click cancel to clear the entered settings Advanced Settings Advanced Wireless Settings RTS CTS Threshold bytes range Beacon Interval DTIM Fragment Size Short GI Aggregation 100 milliseconds range 20 1 2346 bytes range 256 400ns 800ns Enable Disable Aggregated Frames Number 32 range 1 Maximum Aggregated Size 50000 range 2346 65536 default 50000 Tx ChainMask Rx ChainMask WiFi Multimedia WMM Capable 2 Chain 2 Chain Enable Disable WMM Configuration Cancel 54 Fields Description RTS CTS Threshold Determines the packet size of a transmission and through the use of an AP helps control traffic flow The range is 0 2347 bytes Beacon Interval Beacons are the packets sending by Access point to s
66. r Protocol Specify protocol TCP amp UDP TCP or UDP IP Address Enter the specific IP Address to be denied Comment Make a comment for the IP Filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings 61 Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet Port Filtering Settings Filtering Disable v Protocol Both v Port Range Comment Cancel Fields Description Filtering Enable Disable the function to Port Filter Protocol Specify the protocol TCP amp UDP TCP or UDP Port Range Enter the specific Port range to be denied Comment Make a comment for the Port Filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings MAC Filtering Settings The MAC filtering feature allows you to deny MAC address which cannot connect to internet Mac Filtering Settings Filtering Disable v Mac Address Comment Cancel Fields Description Filtering Select Enable Disable the Mac Filtering function Mac Address Enter the specific MAC address to be denied Comment Make a comment for the filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings Bandwidth Control Bandwidth controls the transmission speed of IP address and MAC address
67. r your current password and then the new password twice Current Password New Password Re enter New Password Save amp Change Fields Description Current Password Enter the password of the device New Password Enter your new password to which you want to change Re enter New Password For confirmation enter the new password again Save amp Change It saves and changes to New Password 80 4 2 4 System Management System Configuration gt System Management In this page administrator can change the management parameters and disable enable management interface System Management Device Name loopcomm POE Pass Through Enable POE Pass Through UPnP Enable UPnP Syslog Y Enable Syslog IGMP Y Enable IGMP Save amp Start Fields Description Device Name Enter the Device Name POE Pass Through It allows Secondary Ethernet port to provide 24V power for a secondary device when it s enabled UPnP Administrator can enable or disable the UPnP function Syslog This option enables the registration routine of system log syslog messages IGMP Internet Group Management Protocol Enable disable the IGMP function for the multiple bridged ports Save amp Start It saves the settings and starts 81 4 2 5 Ping Watchdog System Configuration gt Ping Watchdog This menu allows to configure system to reboot on kernel panic when an IP address does
68. range Lease Time 864000 Seconds From 192 168 1 1 To 192 168 1 100 Save if Cancel Fields Description DHCP Server Select Server to access the feature Lease Time The Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start Address of the DHCP Client address range To Enter End Address of the DHCP Client address range Save Click Save to change the new settings Cancel Click cancel to clear the entered settings 59 DMZ Settings You may setup a De Militarized DMZ to separate internal network and internet DMZ Settings DMZ Settings Disable v DMZ IP Address Fields Description DMZ Settings DMZ IP Address Enable or Disable the DMZ function To support DMZ in your firewall design Enter IP address of DMZ host that can be access from the WAN interface Save Cancel Click Save to change the new settings Click cancel to clear the entered settings Virtual Server Settings Virtual server feature allows users to make servers on your LAN accessible to internet users Normally Internet users would not be ab
69. re allows you to deny specific IP address which cannot connect to internet IP Filtering Settings Filtering Disable v Protocol Both v IP Address Comment Cancel 75 Fields Description Filtering Enable Disable the function to IP Filter Protocol Specify protocol TCP amp UDP TCP or UDP IP Address Enter the specific IP Address to be denied Comment Make a comment for the IP Filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet Port Filtering Settings Filtering Disable Protocol Both v Port Range Comment Cancel Fields Description Filtering Enable Disable the function to Port Filter Protocol Specify the protocol TCP amp UDP TCP or UDP Port Range Enter the specific Port range to be denied Comment Make a comment for the Port Filtering policy Add Click Add to change the new settings Cancel Click cancel to clear the entered settings MAC Filtering Settings The MAC filtering feature allows you to deny MAC address which cannot connect to internet Mac Filtering Settings Filtering Disable v Mac Address Comment Cancel Fields Description Filtering Select Enable or Disable the Mac Filtering function Mac Address Enter the
70. ress 00 02 03 04 05 06 Network ID SSID Loopcomm Band 11NAHT40 Radio Channel 36 Wireless Encryption NONE Transmit Power 27 dBm WLAN Statistics Bytes Packets Errors Received 940 20 0 Transmitted 2581 19 0 4 4 3 LAN Information This page shows the LAN information of LP 2596K device such as Physical Address IP Address Network Mask Default Gateway and DHCP details O LAN Information Physical Address 00 02 03 04 05 06 IP Address 192 168 1 200 Network Mask 255 255 0 0 Default Gateway 192 168 1 200 DHCP Server Disabled DHCP Start IP Address 192 168 1 100 DHCP Finish IP Address 192 168 1 200 LAN Statistics Bytes Packets Errors Received 204732 1489 0 Transmitted 832821 1725 0 88 4 4 4 Wireless Client Table This feature displays the currently connected MAC address of Wi Fi clients Wireless Client Table 5472 459 1128 4 4 5 System LOG This page is used to view system logs The System Log displays the system activities login and system error report System Log 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 1970 01 01 4 1970 01 01 SSSSSSSSSSSSSSSSSSSSSESE 1970 01 01 00 00 13 Informational syslogd syslogd started 00 13 00 13 00 13 00 13 00
71. rt It saves the settings and restarts 78 4 2 2 Time Settings System Configuration gt Time Settings It synchronizes the date amp time of PC to device Enable NTP Network time protocol for clock synchronization to device If NTP is not enabled then user must enter the date and time manually Time Settings Enable NTP Please select a type for accessing NTP server Server name time nist gov NTP request interval 24 hours range 1 300 default 24 Local time zone GMT 11 00 Midway Island Samoa Local date and time Jan Sync with PC Save amp Start Fields Description Enable NTP Enable NTP so that time amp date will be updated correctly even after reboot Server Name Enter the NTP server Name NTP request interval NTP updating time interval By default its 24 Local Time Zone Select the Time zone of your country from pull down menu Local date and time Enter the month date year hours Minutes and seconds AM PM Manually to set date and time Sync with PC It Synchronizes the new settings of date and time to your computer Save amp Start It Saves the settings and starts 79 4 2 3 Password Settings This settings helps to change password to restrict from unauthorized access To change password please go to System Configuration gt Password Settings menu Password Settings Change Password To change your administrative password ente
72. s ISP Wireless ISP LAN LAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Messag e from webpag spat e n You need to press Save and Restart button if you change the operation mode Continue Press OK to continue then below page is displayed 42 Operation Mode System Configuration Tools Device Status Logout Operation Mode WDS Client Operation Mode Settings Regulatory Domain United States Y Remote AP SSID Loopcomm Site Survey Y Enable Wireless Disable SSID Broadcasting Enable Isolated Lock to AP MAC 00 00 00 00 00 00 Radio Mode 5G 11NA HT40 Y Channel Auto Channel Data Rate Auto vY Security Setting Setup Transmit Power 27 dbm Y Transmit Distance 1Km Y TDMA Disable DFS Control Enable v DFS Domain FCC y Advanced Settings Setup Access Control Setup Save amp Restart Fields Description Regulatory Domain Select the country from pull down menu Remote AP SSID Select Site Survey option then it will Scan amp displays the SSID List Choose one SSID from the list Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Lock to AP Mac Enter MAC address of the access point to which the client will be lo
73. sing the wireless network Wireless Access Control Mode Disable X Mac Address XX XXIXXIXXIKX XX Comment Apply Changes Delete Selected Fields Description Wireless Access Control Mode The Selections are Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries from the list Delete All Flush the list Reset Clear the settings 49 4 1 5 AP Router It connects an external network WAN with an internal network LAN WLAN to allow cross communication Operat
74. t Apply Changes Fields Description Wireless Access Control Mode The Selections are Disable Disable the wireless ACL feature Allow Listed When this option is selected no wireless clients except those whose MAC addresses are in the current access control list will be able to connect to internet Deny Listed When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Click to add this entry into the Access Control List The Access Control List lists the client MAC addresses Any wireless client with its MAC address listed in this access control list will be able to connect to the device You can select the entries at the Select column and apply to the following function buttons Delete Selected Delete the selected entries from the list Delete All Flush the list Reset Clear the settings 56 WAN Port Settings There are three options DHCP Static Mode PPPoE for Internet connection on WAN port e DHCP Auto Config WAN Port Settings WAN Connection Type DHCP Auto Config v Host Name optional Save Cancel Fields Descriptio
75. t 30 hops Traceroute Stop Result Fields Description Destination IP Address Enter the IP address to which you like to know the trace route Max Hop Maximum number of routes Result It displays the result Traceroute Click it to trace the route Stop Stop the Traceroute 86 4 4 Device Status Click on the Device Status on the top menu bar It is used to monitor the status of the device It provides information on device status wireless information LAN Information wireless client table and system log 4 4 1 Device Information Device Status gt Device Information It presents the status of LP 2596K Firmware devices memory utilization and ARP Table Device Information Firmware Version 1 1 1 Sep 18 2014 Device IP 192 168 1 200 Device MAC 00 02 03 04 05 06 Gateway IP 192 168 1 200 DNS IP 192 168 1 200 Wireless MAC 00 02 03 04 05 06 Uptime dd hh mm ss 0 day 0 3 50 CPU Loading Memory Information Total Available 47820KB 65536KB Used 9212KB 47820KB Free 38608KB 47820KB Buffers OKB 9212KB Cached 1824KB 9212KB ARP Table IP Address 87 4 4 2 Wireless Information This page shows the wireless information of LP 2596K device such as current operation mode wireless traffic error packets device SSID Band channel and encryption used Transmit Power Wireless Information Operation Mode Access Point Physical Add
76. t Clear the settings WAN Port Settings There are three options DHCP Static Mode PPPOE for Internet connection on WAN port DHCP Auto Config WAN Port Settings WAN Connection Type DHCP Auto Config Host Name optional Fields WAN Connection Type Description Select DHCP from pull down menu Host Name Enter the Host Name of DHCP server The default value is empty Save Click Save to change the new settings Cancel Click cancel to clear the entered settings 71 e Static Mode fixed IP Fields WAN Port Settings WAN Connection Type Static Mode fixed IP IP Address Assigned by Your ISP IP Subnet Mask 0 0 0 0 0 0 0 0 ISP Gateway IP Address 0 0 0 0 Primary DNS Server 8 8 4 4 Secondary DNS Server 8 8 8 8 ama Description WAN Connection Type IP Address Select Static Mode from pull down menu Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the IP address of Domain Name Server 2 Save Cancel Click Save to change the new settings Click cancel to clear the entered settings e PPPoE ADSL WAN Port Settings WAN Connection Type PPPOE ADSL User Name Password Verify Password cance
77. thentication provides identification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key Length Select the Key length Key Format When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Characters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character Encryption Key User can enter the characters based on selected Key Length amp Key Format The format can be passphrase or characters Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto Pre Shared Key Cancel 20 Fields Description Select Encryption Select the Encryption Mode from the pull down menu Pre Authentication Select Pre Authentication as Personal or Enterprise Encryption Type TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method a
78. tly assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Select the Key length Key Format When Key Length is selected as 64 bites then Input ASCII 5 Characters or Hex 10 Characters When Key Length is selected as 128 bits then Input ASCII 13 Characters or Hex 128 Character Encryption Key User can enter the characters based on selected Key Length amp Key Format The format can be passphrase or characters Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto Pre Shared Key Cancel Fields Description Select Encryption Pre Authentication Select the Encryption Mode from the pull down menu Select Pre Authentication as Personal or Enterprise Encryption Type Pre shared Key TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change autom
79. ttings RTS CTS Threshold Beacon Interval DTIM Fragment Size Short GI Aggregation Aggregated Frames Number Maximum Aggregated Size Tx ChainMask Rx ChainMask WiFi Multimedia bytes range 100 milliseconds range 20 1 range 1 255 default 1 2346 bytes range 2 400ns 800ns o Enable Disable 32 range 1 32 default 50000 range 2346 2 Chain 2 Chain WMM Capable Enable Disable WMM Configuration Save Cancel Fields RTS CTS Threshold Description Determines the packet size of a transmission and through the use of an AP helps control traffic flow The range is 0 2347 bytes Beacon Interval Beacons are the packets sending by Access point to synchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds DTIM Delivery Traffic Indication Map This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each
80. ult Gateway 192 168 1 200 5 Click OK to complete the IP setting ES aT Internet Protocol Version 4 TCP IPv4 Properties SA General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Ml Obtain an IP address automatically o Use the following IP address IP address 192 168 1 100 ly Subnet mask PA O 2 al 2D h Default gateway 192 168 1 200 Obtain DNS server address automatically O Use the following DNS server addresses Preferred DNS server Alternate DNS server _ Validate settings upon exit Advanced a 16 3 3 Get started with LP 2596K 1 Open Web browser and enter 192 168 1 200 in the URL field of Web browser 2 http 192 168 1 200 pr 2 Enter admin as default user name and admin as default password r 4 Windows Security The server 192 168 1 200 at requires a username and password Warning This server is requesting that your username and password be sent in an insecure manner basic authentication without a secure connection Cia daa User name F Password Remember my credentials a Ga After successful login you can see the Loopcomm web page C Loopcomm Operation Mode System Configuration Tools Device Status Logout a Operation M
81. y Format The format can be passphrase or characters Select Encryption Pre Authentication Security Settings 2 Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto Pre Shared Key Cancel Fields Description Select Encryption Select the Encryption Mode from the pull down menu Pre Authentication Select Pre Authentication as Personal or Enterprise Encryption Type TKIP Temporal Key Integrity Protocol TKIP for data Encryption TKIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilized a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The format can be passphrase or any characters 45 Security Settings Select Encryption WPA Pre Authentication Personal Pre Shared Key Enterprise RADIUS Encryption Type TKIP AES 2 Auto RADIU Server IP Address RADIU Server Port RADIU Server Password EAP Reauthorization Period Seconds 300 3600 Seconds RSN Reauthorization Disable WPA Group Rekey Interval Seconds 300 3600 Seconds Cancel Fields Description RADIU Server IP Address Enter the RADIU Server
82. ynchronize the wireless network The beacon interval is the time interval between beacons sending by this unit in AP or AP WDS operation The default and recommended beacon interval is 100 milliseconds DTIM Delivery Traffic Indication Map This is the Delivery Traffic Indication Map It is used to alert the clients that multicast and broadcast packets buffered at the AP will be transmitted immediately after the transmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A Gl is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two guard intervals 400ns short and 800ns long Support of the 400ns Gl is optional for transmit and receive The purpose of a guard interval is to introduce immunity to propagation delays echoes and reflections to which digital data is normally very sensitive Aggregation A part of the 802 11n standard that allows sending multiple frames per single access to the medium by combining fram
Download Pdf Manuals
Related Search
Related Contents
Bigaole 3G-A ジャイロ取扱説明書 infinity® prelude® forty altavoz de suelo guia del Operator`s Manual Qualidade, rendimento, Life cycle costs Copyright © All rights reserved.
Failed to retrieve file