Home
IEEE 802.11N WIRELESS OUTDOOR CPE User's Manual
Contents
1. NTP Server Select the time server from the NTP Server dropdown list or manually input the IP address of available time server into Manual IP Hit Apply to save settings Chapter 3 Basic Settings Page 21 Firewall Settings The firewall is a system or group of systems that enforce an access control policy between two networks It may also be defined as a mechanism used to protect a trusted network from un trusted network IEEE 802 11N WIRELESS OUTDOOR CPE has capabilities of Source IP Filtering Destination IP Filtering Source Port Filtering Destination Port Filtering Port Forwarding as well as DMZ This is available only under Router Mode Source IP Filtering The source IP filtering gives users the ability to restrict certain types of data packets from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE Use of such filters can be helpful in securing or restricting your local network Wireless Management Basic Settings Source IP Filtering IP Settings Bridge Entries in this table are used to restrict certain types of data packets from your local network to h Internet through the Gateway Use of such filters can be helpful in securing or restricting your IP Settings Router local network RADIUS Settings Enable Source IP Filtering Time Settings Local IP Address Comment Firewall Settings Dest IP Filtering Current Filter Table Local IP Address Src Po
2. Appendix GPL Declamation PUBLIC SOFTWARE DECLAMATION In the software we delivered there may contains some public software if it is please read below carefully 1 Definition Public Software when applicable shall mean that portion of the Licensed Software in source code form set forth in the below Table and provided under the terms set forth in the Section 5 the indicated website the complete license terms can be found Public Software shall mean each of a any computer code that contains or is derived in any manner in whole or in part from any computer code that is distributed as open source software e g Linux or similar licensing or distribution models and b any software that requires as a condition of use modification and or distribution of such software that such software or other software incorporated into derived from or distributed with such software i be disclosed or distributed in source code form ii be licensed for the purpose of making derivative works or iii be redistributable at no charge Public Software includes without limitation software licensed or distributed under any of the following licenses or distribution models or licenses or distribution models similar to any of the following 1 GNU s General Public License GPL or Lesser Library GPL LGPL 2 the Artistic License e g PERL 3 the Mozilla Public License 4 the Netscape Public License 5 the Sun Community Sourc
3. Firmware Upload the device Configuration File gt gt Save Settings to File Load Settings from File ICT upload Reset Settings to Default Reboot The Device Figure 37 Reboot System Log System log is used for recording events occurred on the IEEE 802 11N WIRELESS OUTDOOR CPE including station connection disconnection system reboot and etc Open System Log in Tools as below Chapter 5 Management Page 42 Wireless Broadband Access Point Status System System Log gt gt Site Survey Ping Watchdog L Enable Remote Syslog System Log Use this page to set remote log server and show the system log Wireless Remote Syslog Server Management IP Address Port 5 E Time Source Message 1 00 00 18 00 19 70 27 EB E7 WLAN service stopped 2 00 00 18 00 19 70 27 EB E7 WLAN service started 3 00 00 48 00 19 70 27 EB E7 WLAN service stopped 4 00 00 48 00 19 70 27 EB E7 WLAN service started 5 00 00 18 00 19 70 27 EB E7 WLAN service stopped 6 00 00 19 00 19 70 27 EB E7 WLAN service started 7 00 00 19 00 19 02 99 5 1 Station associated 8 00 00 19 00 19 D2 99 5E 1A Station disassociated Figure 38 System Log Remote Syslog Server Enable Remote Syslog Enable System log to alert remote server IP Address Specify the IP address of the remote server Port Specify the port number of th
4. Logout 0 Status System Wireless Management Tools Information This page shows the current status and some basic settings of the device Connections Network Flow System Information Bridge Table Model Name ARP Table Device Name ap20fabc MAC Address 00 19 70 20 fa bc DHCP Client List Country Region United States Firmware Version 2 0 1 LAN Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway IP Address 0 0 0 0 MAC Address 00 19 70 20 fa bc Wireless Settings Operation Mode Wireless Mode Figure 13 Main Page Note e The username and password are case sensitive and the password should be no more than 19 characters Chapter 3 Basic Settings Page 16 Basic System Settings For users who use the IEEE 802 11N WIRELESS OUTDOOR CPE for the first time it is recommended that you begin configuration from Basic Settings in System shown below Logout O System Wireless Management Basic Settings IP Settings Bridge seems IP Settings Router Network Modes Bridge v RADIUS Settings Device ap20fabc 15 characters and no spaces Time Settings Country Region United States Firewall Settings Figure 14 Basic System Settings Basic Settings Network Mode Specify the network mode including Bridge and Router It is easy to configure parameters in Bridge Mode however users must pay extra attention to the way they configure the device when it is set to R
5. U u uuu u uu uuu uuu uuu 4 Preparation before Installation ss 4 Professional Installation Required sn 4 Saltety Preca tlons ada et eese etie ds 4 Installation Pr cautions 2 rd CR EE eC PE ro 5 Product Package ie ESI raten fe Gein erdt 5 Hardware Installation frere opere eec uc ed de ende pt rere ee ug e 7 Conrnectup au s ne PI tr p en de er Ud eR 7 Pol Mo rititig iota e aar lette he ia 10 Using the External Antenna eet een Rec osten tire einen 12 Chapter 3 Basic Setti S u u eere eben Idae 14 Factory Default Settings x op Ed te dre tei aat pL e Eie eee 14 System Requirements ho repe intet ee P ERI Le e etie eta 15 How to Login the Web based Interface 15 Basic System Settings su oda tt b mre sa itr dens 17 RADIUS Settings nicer ee cepto idm e ate em e e e ie td aay 20 Time Settlhgs ri den ne he ede eee dp eC elt te 21 Firewall Settirigs i dei Rie tete 22 Basic Wireless Setllngs oti ee ea pd rid di ees 26 Site Survey iine eade re e n menia fein ea ieee a 28 Chapter 4 Advanced Settings 30 Advanced Wireless Settings ser 30 Wireless Security Settings eee 33 Security Settlrigs i debe end bab E RE 33 AGCeSS C I nes A t ME 35 WDS Settings 2s RR ieget enit ee 36 Chapter 5 Manageme t u 37 SNMP Managemlen
6. option the wireless site survey window will popup with a list of available wireless networks around Select the AP you would like to connect and click Selected to establish connection The wireless site survey window can also be viewed by opening the Site Survey page in Tools Chapter 3 Basic Settings Page 28 Wireless Site Survey Windows Internet Explorer Wireless Site Survey This page provides tool to scan the wireless network If any Access Point or IBSS is found you could choose to connect it manually when client mode is enabled Z Com W32 204 00 15 eb 00 02 04 06 15 eb 00 02 04 b g Figure 17 Site Survey Chapter 3 Basic Settings Page 29 Chapter 4 Advanced Settings Advanced Wireless Settings Open Advanced Settings in Wireless to make advanced wireless settings Logout Status Wireless Management Basic Settings WMM Support Enabled Disabled A MPDU aggregation Enabled Disabled A MSDU aggregation Enabled Disabled Short GI 9 Enabled Disabled RTS Threshold 2346 1 2346 Security Settings Access Control Fragment Threshold 2346 256 2346 WDS Settings Beacon Interval Bo 20 1024 ms DTIM Interval 41255 Preamble Type Long Short IGMP Snooping 9 Enabled Disabled Wireless Separation Enabled Disabled RIFS 9 Enabled O Disabled Link Intergration O Enabled 9 Disabled Station Num 32 0 32 Space In Me
7. 2 Connect your antenna with the N type connector on the top of IEEE 802 11N WIRELESS OUTDOOR CPE e f you are going to use external antenna on IEEE 802 11N WIRELESS OUTDOOR CPE get some cable in advance Be aware of the force you use while connecting to the N type connector inappropriate force may damage the N type connector Ah Warning Users MUST power off the IEEE 802 11N WIRELESS OUTDOOR CPE first before connecting the external antenna to it Do not switch from built in antenna to the external antenna from WEB management without physically attaching the external Chapter 2 Hardware Installation Page 12 antenna onto the IEEE 802 11N WIRELESS OUTDOOR CPE otherwise damage might be caused to the IEEE 802 11N WIRELESS OUTDOOR CPE itself Chapter 2 Hardware Installation Page 13 Chapter 3 Basic Settings Factory Default Settings We ll elaborate the IEEE 802 11N WIRELESS OUTDOOR CPE factory default settings You can re acquire these parameters by default If necessary please refer to the Restore Factory Default Settings Table 1 IEEE 802 11N WIRELESS OUTDOOR CPE Factory Default Settings Features Factory Default Settings Wireless Device Name apXXXXXX X represents the last 6 ee digits of Ethernet MAC address Data Rate Auto IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway 0 0 0 0 Primary DNS Server 0 0 0 0 Secondary DNS Server 0 0 0 0 Spanning Tree Enable 100 Ful
8. Space in Meter 0 Flow Control by AP Disable Security Open System Chapter 3 Basic Settings Page 14 Encryption Wireless Separation Disable Access Control Disable Enable Disable Enable Read Community Name Public Write Community Name Private IP Address System Requirements Before configuration please make sure your system meets the following requirements computer coupled with 10 100 Base TX adapter Configure the computer with a static IP address of 192 168 1 x as the default IP address of IEEE 802 11N WIRELESS OUTDOOR is 192 168 1 1 X cannot be 0 1 255 e Web browser on PC for configuration such as Microsoft Internet Explorer 6 0 or above Netscape or Firefox How to Login the Web based Interface The IEEE 802 11N WIRELESS OUTDOOR CPE provides you with user friendly Web based management tool amp Open Web browser and enter the IP address Default 192 168 1 1 of IEEE 802 11N WIRELESS OUTDOOR CPE into the address field You will see the login page as below int Name password Figure 12 Login Page Chapter 3 Basic Settings Page 15 Enter the username Default admin and password Default password respectively and click Login to login the main page of IEEE 802 11N WIRELESS OUTDOOR As you can see this management interface provides five main options in the black bar above which are Status System Wireless Management and Tools
9. of something unexpected If tragedy hits your device you may have an access to restore the important files by the backup All these can be done by the local or remote computer Open Configuration File in Management as below Chapter 5 Management Page 40 Logout Status Wireless SNMP Configuration Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously Besides you could reset the current configuration to factory default or reboot Password Settings Firmware Upload the device Configuration File gt gt Save Settings to File Load Settings from File Upload Reset Settings to Default Reboot The Device Figure 35 Backup Retrieve Settings Backup Settings By clicking Save a dialog box will pop up Save it then the configuration file like ap cfg will be saved to your local computer Retrieve Settings By clicking Browse a file selection menu will appear select the file you want to load like ap cfg Click Upload to load the file After automatically rebooting new settings are applied Restore Factory Default Settings The IEEE 802 11N WIRELESS OUTDOOR CPE provides two ways to restore the factory default settings Restore factory default settings via Web From Configuration File clicking Reset will eliminate all current settings and reboot your device then def
10. set SNMP settings Firmware Upload Configuration File RER SNAP Protocol Version va M Server Port 161 Get Community public Set Community private Trap Destination 0 0 0 0 Trap Community public Configure SNMPv3 User Profile Figure 31 SNMP Configuration Enable SNMP Check this box to enable SNMP settings Protocol Version Select the SNMP version and keep it identical on the IEEE 802 11N WIRELESS OUTDOOR CPE and the SNMP manager Server Port Change the server port for a service if needed however you have to use the same port to use that service for remote management Get Community Specify the password for the incoming Get and GetNext requests from the management station By Chapter 5 Management Page 37 default it is set to public and allows all requests Set Community Specify the password for the incoming Set requests from the management station By default it is set to private e Trap Destination Specify the IP address of the station to send the SNMP traps to Trap Community Specify the password sent with each trap to the manager By default it is set to public and allows all requests Configure SNMPv3 User Profile For SNMP protocol version 3 you can click Configure SNMPv3 User Profile in blue to set the details of SNMPv3 user Check Enable SNMPv3 Admin User in advance and make further configuration Loue Status Wireless SNMP Configurati
11. some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user Warranty Standard hardware warranty is for one 1 year from date of shipment from Distributor Warrants that hardware will conform to the current relevant published specifications and will be free from material defects in material and workmanship under normal use and service IN NO EVENT SHALL DISTRIBUTOR BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT INDIRECT GENERAL SPECIAL INCIDENTAL CONSEQUENTIAL EXEMPLARY OR OTHER DAMAGE RISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT INCLUDING WITHOUT LIMITATION DAMAGES FOR LOSS OF BUSINESS PROFITS BUSINESS INTERRUPTION LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS OR FROM ANY BREACH OF WARRANTY EVEN IF DISTRIBUTOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO CASE SHALL DISTRIBUTOR LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT Chapter 1 Introduction u uu 1 Introduction gay eS do ER nU INE LE 1 c d 2 Key Feat resxua saurus Mie tact P E nid Le nis rst oU are 2 Typical Applicati fis ce o danse ERE ERE HR ER RE Ai 3 Chapter 2 Hardware Installation
12. your IEEE 802 11N WIRELESS OUTDOOR CPE Enter the new password respectively in New Password and Confirm Password fields click Apply to save settings Logout System Wireless Management SNMP Configuration d Password Settings Password Settings gt gt 4 Use this page to set the password of this Access Point Firmware Upload New Password Configuration File Confirm Password Figure 33 Password Chapter 5 Management Page 39 password is case sensitive and its length can not be exceed 19 characters Upgrade Firmware Open Firmware Upload in Management and follow the steps below to upgrade firmware locally or remotely through IEEE 802 11N WIRELESS OUTDOOR CPE s Web Logout 5 Status Wireless Management SNMP Configuration i Upgrade Firmware This page allows you upgrade the device firmware to a new version Please do not power off the device during the upload because it may crash the system Password Settings Configuration File Select File Figure 34 Upgrade Firmware Click Browse to select the firmware file you would like to load Click Upload to start the upload process e Wait a moment the system will reboot after successful upgrade Note e Do NOT cut the power off during upgrade otherwise the system may crash Backup Retrieve Settings It is strongly recommended you back up configuration information in case
13. 1N WIRELESS OUTDOOR CPE is able to give stable and efficient wireless performance while designed with IEEE 802 11n draft 2 0 standard and high output power makes it possible to deliver several times faster data rate than normal wireless device and higher bandwidth with longer range for outdoor applications The IEEE 802 11N WIRELESS OUTDOOR CPE supports four wireless communication connectivity AP Wireless Client WDS and AP Repeater allowing for various application requirements thus helping to find the key to the last mile with least effort With high output power and reliable performance the IEEE 802 11N WIRELESS OUTDOOR CPE is an ideal wireless broadband solution for wireless Internet service providers and system integrators Chapter 1 Introduction Page 1 we WIRELESS CPE Figure 1 IEEE 802 11N WIRELESS OUTDOOR CPE Key Features e Compliant with IEEE 802 11b g and IEEE 802 11n draft 2 0 as well Support Power Through Ethernet which is supplied with 12V High reliable watertight housing endures almost any harsh environments Four operating modes including AP Wireless Client WDS and AP Repeater Support 64 128 152 bit WEP and 802 1 WPA WPA2 WPA amp WPA2 WPA PSK WPA2 PSK WPA PSK amp WPA2 PSK etc User friendly Web and SNMP based management interface Chapter 1 Introduction Page 2 Typical Application This section describes the typical applications of IEEE 802 11N WIR
14. 4 What if not access the Web based management interface Please check the followings e Check whether the power supply is OK Try to power on the unit again Chapter 7 Troubleshooting Page 49 e Check whether the IP address of PC is correct in the same network segment as the unit e Login the unit via other browsers such as Firefox e Hardware reset the unit Q 5 What if the wireless connection is not stable after associating with an AP under wireless client mode e Since the IEEE 802 11N WIRELESS OUTDOOR CPE comes with a built in directional antenna it is recommended make the IEEE 802 11N WIRELESS OUTDOOR CPE face to the direction where the AP is to get the best connection quality e In addition you can start Site Survey in Wireless Basic Settings to check the signal strength If it is weak or unstable The smaller the number is the weaker the signal strength is please join other available AP for better connection Chapter 7 Troubleshooting Page 50 Appendix ASCII WEP can be configured with a 64 bit 128 bit or 152 bit Shared Key hexadecimal number or ACSII As defined hexadecimal number is represented by 0 9 A F or a f ACSII is represented by 0 9 A F a f or punctuation Each one consists of two digit hexadecimal Table 2 ACSII ASCII ASCII Hex ASCII SCII Character Equivalent Equivalent Character Equivalent haracter Equivalent 58 Appendix A ASCII Page 51
15. E via its wired port for WAN is on wireless port and LAN is on wired port when device is set to Chapter 3 Basic Settings Page 19 Router mode e Bridge mode and AP Repeater mode are similar to AP mode when device is set to Router mode WAN is on wired port and LAN is on wireless port Thus users must also connect IEEE 802 11N WIRELESS OUTDOOR CPE with another wireless device before it is set to Router mode and access IEEE 802 11N WIRELESS OUTDOOR CPE via the connected wireless device RADIUS Settings RADIUS Remote Authentication Dial In User Service is a server for remote user authentication and accounting playing a central role in the network in providing the capabilities of authenticating authorizing accounting auditing alarming and etc It allows an organization to maintain user profiles in a central database that all remote servers can share Open RADIUS Settings in System to make RADIUS configuration Logout Status System Wireless Management Basic Settings RADIUS Settings IP Settings Bridge gs ge Use this page to set the radius server settings IP Settings Router Authentication RADIUS Server IP Address 0 0 0 0 Time Settings Port 1812 Firewall Settings Shared Secret Reauthentication Time 3600 Seconds L Global Key Update every Seconds every x1000 Packets Figure 1715 RADIUS Settings Authentication RADIUS Server This is for RADIUS authentication can communica
16. ELESS OUTDOOR CPE By default it is set to AP mode which allows it to establish a wireless coverage besides it is also able to join any available wireless network under wireless client mode The IEEE 802 11N WIRELESS OUTDOOR CPE is able to deliver stable and efficient broadband connectivity for various applications Figure 2 Typical Application Besides the IEEE 802 11N WIRELESS OUTDOOR CPE can also be applied into the following environments Cost effectively provide long distance backhaul for remote areas e g village oil well island mountain and etc Establish local backhaul for campus farm and factory Provide and access for video streaming or surveillance for industrial and mining enterprises Chapter 1 Introduction Page 3 Chapter 2 Hardware Installation This chapter describes safety precautions and product information you have to know and check before installing IEEE 802 11N WIRELESS OUTDOOR CPE Preparation before Installation Professional Installation Required Please seek assistance from a professional installer who is well trained in the RF installation and knowledgeable in the local regulations Safety Precautions 1 To keep you safe and install the hardware properly please read and follow these safety precautions 2 If you are installing IEEE 802 11N WIRELESS OUTDOOR for the first time for your safety as well as others please seek assistance from a professional installer who has re
17. GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU GENERAL PUBLIC LICENSE Version 2 GNU LIBRARY GENERAL PUBLIC LICENSE Version 2 rg licenses old li censes gpl 2 0 ht ml http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes gpl 2 0 ht http www gnu o rg licenses old li censes library ht ml Page 54 vsftpd Author Chris Evans ftp vsftpd GNU GENERAL PUBLIC http www gnu o beasts or LICENSE Version 2 rg licenses old li g users ce censes gpl 2 0 ht vans vsftp ml d 1 1 2 tar gz linux ftp ftp ker GNU GENERAL PUBLIC http www gnu o nel org pu LICENSE Version 2 rg licenses old li b linux ker censes gpl 2 0 ht nel v2 6 lin ml ux 2 6 20 3 tar bz2 Appendix B GPL Declamation Page 55
18. IEEE 802 11N WIRELESS OUTDOOR CPE User s Manual V2 0 June 2010 Copyright Copyright 2010 all rights reserved No part of this publication may be reproduced adapted stored in a retrieval system translated into any language or transmitted in any form or by any means without the written permission of the supplier About This Manual This user manual is intended to guide professional installer to install the IEEE 802 11N WIRELESS OUTDOOR CPE Wireless CPE and how to build the infrastructure centered on it It includes procedures to assist you in avoiding unforeseen problems Conventions For your attention on important parts special characters and patterns are used in this manual e This indicates an important note that you must pay attention to A Warning This indicates a warning or caution that you have to abide Bold Indicates the function important words and so on Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee th
19. R CPE is able to obtain IP settings automatically from that DHCP server Note When the IP address of the IEEE 802 11N WIRELESS OUTDOOR CPE is changed the clients on the network often need to wait for a while or even reboot before they can access the new IP address For an immediate access to the bridge please flush the netbios cache on the client computer by running the nbtstat command before using the device name of the IEEE 802 11N WIRELESS OUTDOOR CPE to access its Web Management page Use Fixed IP Address Check this option You have to specify a static IP address subnet mask default gateway and DNS server for IEEE 802 11N WIRELESS OUTDOOR CPE manually Make sure the specified IP address is unique on your network in order to prevent IP conflict Spanning Tree Spanning Tree Protocol STP is a link management protocol for AP which provides path redundancy while preventing loops in a network STP allows only one active path at a time between the access points but establish the redundant link as a backup if the initial link fails e Settings Router This is available only under Router mode Open IP Settings Router in System below to Chapter 3 Basic Settings Page 18 configure the parameters of IEEE 802 11N WIRELESS OUTDOOR for accessing the Internet IGI ITO Status System Wireless Management Basic Router IP Settings 5 z Use this page to configure the parameters for accessing
20. at interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures A Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment To avoid the possibility of exceeding radio frequency exposure limits you shall beep a distance of at least 100cm between you and the antenna of the installed equipment This transmitter must not be co located or operating in conjunction with any other antenna or transmitter The availability of
21. ault settings are applied Logout o System Wireless Tools SNMP Configuration T Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously Besides you could reset the current configuration to factory default or reboot Firmware Upload the device Password Settings Configuration File Save Settings to File Load Settings from File IST Upload Reset Settings to Default Reboot The Device Figure 21 Restore Settings Chapter 5 Management Page 41 Restore factory default settings via Reset Button If software in IEEE 802 11N WIRELESS OUTDOOR CPE is unexpectedly crashed and no longer reset the unit via Web you may do hardware reset via the reset button Press and hold the button for at least 5 seconds and then release it until the PWR LED gives a blink Reboot You can reboot your IEEE 802 11N WIRELESS OUTDOOR CPE from Configuration File in Management as below Click Reboot and hit Yes upon the appeared prompt to start reboot process This takes a few minutes Logout o Status System Wireless SNMP Configuration Configuration File This page allows you to save current settings to a file or load the settings from the file which was saved previously Besides you could reset the current configuration to factory default or reboot Password Settings
22. ceived safety training on the hazards involved 3 Keep safety as well as performance in mind when selecting your installation site especially where there are electric power and phone lines 4 When installing IEEE 802 11N WIRELESS OUTDOOR please note the following things Do not use metal ladder Do not work on a wet or windy day Wear shoes with rubber soles and heels rubber gloves long sleeved shirt or jacket 5 When the system is operational avoid standing directly in front of it Strong RF fields are present when the transmitter is on Chapter 2 Hardware Installation Page 4 Installation Precautions To keep the IEEE 802 11N WIRELESS OUTDOOR CPE well while you are installing it please read and follow these installation precautions 1 Users MUST use a proper and well installed surge arrestor with the IEEE 802 11N WIRELESS OUTDOOR CPE otherwise a random lightening could easily cause fatal damage to IEEE 802 11N WIRELESS OUTDOOR Lightning DAMAGE IS NOT COVERED UNDER WARRNTY 2 Users MUST use the Power cord amp PoE Injector shipped in the box with the IEEE 802 11N WIRELESS OUTDOOR CPE Use of other options will cause damage to the IEEE 802 11N WIRELESS OUTDOOR CPE 3 Users MUST power off the IEEE 802 11N WIRELESS OUTDOOR CPE first before connecting the external antenna to it Do not switch from built in antenna to the external antenna from WEB management without physically attaching the ext
23. d middle enterprise as well as residential network WPA2 PSK As a new version of WPA only all the clients support WPA2 can it be available If it is selected the data encryption can only be AES and the passphrase is required WPA PSK amp WPA2 PSK It provides options of WPA TKIP or WPA2 AES encryption for the client If it is selected the data encryption can only be TKIP AES and the passphrase is required Data Encryption If data encryption is enabled the key is required and only sharing the same key with other wireless devices can the communication be established None Available only when the authentication type is open system 64 bits WEP It is made up of 10 hexadecimal numbers 128 bits WEP It is made up of 26 hexadecimal numbers 152 bits WEP It is made up of 32 hexadecimal numbers TKIP Temporal Key Integrity Protocol which is a kind of dynamic encryption is co used with WPA PSK etc AES Advanced Encryption Standard it is usually co used with WPA2 PSK WPA WPA2 etc TKIP AES It allows for backwards compatibility with devices using TKIP e We strongly recommend you enable wireless security on your network Only setting the same Authentication Data Encryption and Key in the IEEE 802 11N WIRELESS OUTDOOR CPE and other associated wireless devices can the communication be established Chapter 4 Advanced Settings Page 34 Access Control The Access Control appoints the authority to wireless cli
24. e License SCSL 6 the Sun Industry Source License SISL and 7 the Apache Software license 2 Limited Use Any Public Software provided under the agreement shall be subject to the licenses terms and Appendix B GPL Declamation Page 52 conditions of its model Licensee hereby agrees to comply with the terms and conditions applicable to any such Public Software as set forth in its presentation on website 3 Limited Liability The supplier hereby express that the supplier shall have no liability for any costs loss or damages resulting from Licensee s breach of the terms and conditions applicable to use conversion or combination of the licensed software with or into Public Software 4 NO WARRANTY This program or licensed software is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH LICENSEE 5 Public Software Name and Description Table 3 Public Software Name and Description Program Copy Right Description Origin Licenses or Distribution License Terms Name Sour Code Models or its special Website license terms Reference Redboot Copyright 1998 ftp ftp ge eCos License http sources re 1999 2000 2001 2002 s redha
25. e remote server Site Survey Logout Only available under Wireless Client mode site survey allows you to scan all the APs within coverage Open Site Survey Tools as below and select the desired AP to connect Chapter 5 Management Page 43 Wireless Broadband Access Point Status System Wireless Management System Log Wireless Site Survey This page provides tool to scan the wireless network If any Access Point or IBSS is found you could choose to connect it manually when client mode is enabled Ping Watchdog MISVOIP 1 00 60 b3 35 92 59 big 68 WEP O Trus 11 bg NONE o sirius 11 0021 003 4 0 big 95 WPA 10 00 07 40 e8 ae 8e big 69 NONE siis 1 0021003530 big 98 WPA Ping Watch Dog you mess your connection up and cut off your ability the log in to the unit the ping watchdog has a chance to reboot due to loss of connectivity Wireless Broadband Access Point 769509 Status System Wireless Management System Log a Ping Watchdog Site Survey This page provides tool to configure the Ping Watchdog If the failcount of the Ping reaches to specified value the watchdog will reboot the device Ping Watchdog gt gt Enable Ping Watchdog IP Address to Ping 192 168 1 10 Ping Interval 300 seconds Startup Dela
26. ent on accessing IEEE 802 11N WIRELESS OUTDOOR thus a further security mechanism is provided This function is available only under AP mode Open Access Control in Wireless as below Logout O Status Wireless Management Basic Settings Wireless Access Control Security Settings 9 If you choose Allowed Listed only those clients whose wireless MAC addresses are in the access 2 control list will be able to connect to your Access Point When Deny Listed is selected these Advanced Settings wireless clients on the list will not be able to connect the Access Point Access Control gt gt Access Control Mode Disable M WDS Settings MAC Address Figure 20 Access Control Access Control Mode If you select Allow Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your AP While when Deny Listed is selected those wireless clients on the list will not be able to connect the AP MAC Address Enter the MAC address of the wireless client that you would like to list into the access control list click Apply then it will be added into the table at the bottom Delete Selected All Check the box before one or more MAC addresses of wireless client s that you would like to cancel and click Delete Selected or Delete All to cancel that access control rule Chapter 4 Advanced Settings Page 35 WDS Settings Extend
27. ere doeet gesta amd t dae rettet PR et 8 Figure 6 Connect to PoE Injector 8 Fig re Z Gomplet Set rie e ederet e ie ee d de rs a eec 9 Figure 8 Pole Mounting Step 1 10 Figure 9 Pole Mounting Step 2 10 Figure 10 Pole Mounting Step 3 I U eene nnnm 11 11 Move the Rubber 1 etin e E Coe Deo eee 12 Figure 12 login Page u rt De I bre D D EE i te y eed 15 Fig re 13 Page i EE e Np een deitas 16 Figure 14 Basic System Settings nennt remm nennen 17 Fig r 15 1P Settings Bridge i c Ee itte b tren e o ESL sede LR E D eR Te PER dg 17 Figure 16 IP Settings Router issue 18 Figure 17 RADIUS Settings RE eei e ERU ir etia es 20 Figure 18 Time Setlings net te 20 Figure 19 Source IP Filtering sise 21 Figure 20 Destination IP Filtering sise 22 Figure 21 Source Port Filtering 7 2 uu u aaa rhe 22 Figure 22 Destination Port Filtering ss 23 Figure 23 Port Forwarding uva Lita Oh eed ee Ava cus 23 Figure 24 DMZ L iacet diete beetles cde Dub cosi addis 24 Figure 25 Basic Wireless Settings sise 26 Fig re 26 Site uuu ashe ed dem En PUER e en mt died eee 29 Figure 27 Advanced Wireless Settings nr 30 Figure 28 S curity Settinigs cu es i vet ER dirette eee 33 Fig r 29 Access Contr le
28. ering Apply Changes Cancel Src Port Filtering CurrentFilter Table Dest Port Range Protocol Port Forwarding Figure 22 Destination Port Filtering Port Forwarding The port forwarding allows you to automatically redirect common network services to a specific machine behind the NAT firewall These settings ne are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind IEEE 802 11N WIRELESS OUTDOOR CPE s NAT firewall Chapter 3 Basic Settings Page 24 Logout 2 Status System Wireless Management Basic Settings Port Forwarding IP Settings Bridge Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s IP Settings Router NAT firewall RADIUS Settings Enable Port Forwarding Time Settings IP Address Protocol Both Firewall Settings Port Range Src IP Filtering Comment Dest IP Filtering Src Port Filtering Current Port Forwarding Table Dest Port Filtering 7 Figure 23 Port Forwarding DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ hos
29. ernal antenna onto the IEEE 802 11N WIRELESS OUTDOOR CPE otherwise damage might be caused to the IEEE 802 11N WIRELESS OUTDOOR CPE itself Product Package The product package you have received should contain the following items If any of them are not included or damaged please contact your local vendor for support IEEE 802 11N WIRELESS OUTDOOR CPE X1 Pole Mounting Ring X1 e Power Cord amp PoE Injector x1 Quick Installation Guide X1 Product CD x1 Note Product CD contains Quick Installation Guide and User Manual Chapter 2 Hardware Installation Page 5 Pole Mounting Ring A Warning Users MUST use the Power amp PoE Injector shipped in the box with the IEEE 802 11N WIRELESS OUTDOOR CPE Use of other options will cause damage to the IEEE 802 11N WIRELESS OUTDOOR CPE Chapter 2 Hardware Installation Page 6 Hardware Installation Connect up 1 The bottom of the IEEE 802 11N WIRELESS OUTDOOR CPE is a movable cover Grab the cover and pull it back harder to take it out as the figure shown below lt Figure 3 Move the Cover y gt 2s e 2 Plug a standard Ethernet cable into the RJ45 port Figure 4 Cable Connection Chapter 2 Hardware Installation Page 7 3 Slide the cover back to seal the bottom of the IEEE 802 11N WIRELESS OUTDOOR r k a Figure 5 Seal the Bottom 4 Plug the power cord into the DC po
30. f 2346 is recommended Beacon Interval Specify the frequency interval to broadcast packets Enter a value between 20 and 1024 DTIM Interval DTIM which stands for Delivery Traffic Indication Message is contained in the data packets It is for enhancing the wireless transmission efficiency The default is set to 1 Enter a value between 1 and 255 Preamble Type It defines some details on the 802 11 physical layer Long and Short are available IGMP Snooping IGMP snooping is the process of listening to IGMP network traffic By enabling IGMP snooping the AP will listen to IGMP membership reports queries and leave messages to identify the ports that are members of multicast groups Multicast traffic will only be forwarded to ports identified as members of the specific multicast group or groups Wireless Separation Wireless separation is an ideal way to enhance the security of network transmission Under the mode except wirless client mode enable Wireless Separation can prevent the communication among associated wireless clients RIFS RIFS Reduced Interframe Spacing is a means of reducing overhead and thereby increasing network efficiency Chapter 4 Advanced Settings Page 31 Link Integration Available under AP Bridge AP repeater mode it monitors the connection on the Ethernet port by checking Enabled It can inform the associating wireless clients as soon as the disconnection OCCUIS e Max Station Num Ava
31. from Status to check the information of associated wireless clients All is read only Click Refresh at the bottom to view the current association list C Status Wireless Tools Information Association List This table shows the MAC Address IP Address and RSSI for each associated wireless client Network Flow IMAC Address 1 Address RSSI Association Time Bridge Table LS I 00 60 b3 cd fr 2 192168116 44 2000 2 49 16 59 40 ARP Table DHCP Client List Figure 23 Connection Chapter 6 Status Page 45 View Network Flow Statistics Open Network Flow in Status to check the data packets received on and transmitted from the wireless and Ethernet ports Click Refresh to view current statistics Logout Status System Wireless Management Tools Information This page shows the packet counters for transmission and reception regarding to wireless and Connections Ethernet networks Network Elow Bd Poll Interval 5 0 685534 sec Bridge Table Wireless LAN Received Transmitted ARP Table Unicast Packets 121 0 DHCP Client List Broadcast Packets 116 2 Multicast Packets 264 0 4 Total Packets 501 2 Total Bytes 50332 170085 Ethernet Received Transmitted Total Packets 468 Total Bytes 387447 998514 d Figure 24 Network Flow Statistics e Poll Interval Speci
32. fy the refresh time interval in the box beside Poll Interval and click Set Interval to save settings Stop helps to stop the auto refresh of network flow statistics View Bridge Table Open Bridge Table in Status as below Click Refresh to view current connected status Chapter 6 Status Page 46 Logout 5 Status Wireless Management Information Bridge Table This table shows bridge table Connections Network Flow MAC Address Ageing Bridge Table r 00 0c 76 59 86 e2 0 00 ARP Table 00 19 70 20 fa be Bridge 00 60 b3 cd ff2 LAN 3147 DHCP Client List Figure 42 Bridge Table View ARP Table Open ARP Table in Status as below Click Refresh to view current table Logout Status Wireless Management Information ARP Table Connections This table shows ARP table Network Flow IPA dd Lee Bridge Table 192 168 1 2 00 60 B3 CD FF F ARP Table 192 168 0 254 00 00 00 00 00 00 eth0 DHCP Client List Figure 43 ARP Table Chapter 6 Status Page 47 View Active DHCP Client Table Open DHCP Client List in Status as below to check the assigned IP address MAC address and time expired for each DHCP leased client Click Refresh to view current table Logout 2 Status Wireless Management Information Active DHCP Client Table This table
33. gure 19 Security Settings e Network Authentication Open System It allows any device to join the network without performing any security check Shared Key Data encryption and key are required for wireless authentication Legacy 802 1x As an IEEE standard for port based Network Access Control it provides the rights to access the wireless network and wired Ethernet With User and PC identity centralized authentication as well as dynamic key management it controls the security risk of wireless network to the lowest To serve the 802 1x at least one EAP type should be supported by the RADIUS Server AP and wireless client WPA with RADIUS With warrant username password and etc offered by user this kind of authentication can be realized with specific RADIUS server This is the common way to be adopted in large enterprise network Chapter 4 Advanced Settings Page 33 WPA2 with RADIUS As a new version of WPA only all the clients support WPA2 can it be available If it is selected AES encryption and RADIUS server is required WPA amp WPA2 with RADIUS It provides options of WPA TKIP or WPA2 AES for the client If it is selected the data encryption type must be TKIP AES and the RADIUS server must be set WPA PSK It is a simplified WPA mode with no need for specific authentication server In this so called WPA Pre Shared Key all you have to do is just pre enter a key in each WLAN node and this is the common way to be adopted in large an
34. ilable only under AP mode it defines the maximum amount of wireless clients allowed to be connected Space Meter ACK Timeout To decrease the chances of data retransmission at long distance the IEEE 802 11N WIRELESS OUTDOOR CPE can automatically adjust proper ACK timeout value by specifying distance of the two nodes Flow Control It allows the administrator to specify the incoming and outgoing traffic limit by checking Enable Traffic Shaping This is only available in Router mode a Note We strongly recommend you leave most advanced settings at their defaults except Distance in Meters adjusted the parameter for real distance any modification on them may negatively impact the performance of your wireless network Chapter 4 Advanced Settings Page 32 Wireless Security Settings To prevent unauthorized radios from accessing data transmitting over the connectivity the IEEE 802 11N WIRELESS OUTDOOR CPE provides you with rock solid security settings Security Settings Open Security Settings in Wireless as below TS Status System Wireless Management Basic Settings x Security Settings Custom WLAN s security profile settings Advanced Settings Network Authentication Open System v Access Control Data Encryption None v WDS Settings Key Type Default Tx Key WEP Passphrase Encryption Key 1 Encryption Key 2 Encryption Key 3 Encryption Key 4 Fi
35. n HT protect O Enabled 9 Disabled Channel Number e Wireless _ Antenna Internal 8 dBi External N Type Output Power Full Data Rate Auto Channel mode 20MHZ Extension channel protection mo de None Figure 16 Basic Wireless Settings Disable Wireless LAN Interface Check this option to disable WLAN interface then the wireless module of IEEE 802 11N WIRELESS OUTDOOR CPE will stop working and no wireless device can connect to it Wireless Mode Four operating modes are available on IEEE 802 11N WIRELESS OUTDOOR CPE Wireless Client The IEEE 802 11N WIRELESS OUTDOOR CPE is able to connect to the AP and thus join the wireless network around it AP The IEEE 802 11N WIRELESS OUTDOOR CPE establishes a wireless coverage and receives connectivity from other wireless devices Bridge The IEEE 802 11N WIRELESS OUTDOOR CPE establishes wireless connectivity with other APs by keying in remote MAC address Please refer to the WDS Setting for detailed configuration AP Repeater The IEEE 802 11N WIRELESS OUTDOOR CPE servers as AP and Bridge concurrently In other words the IEEE 802 11N WIRELESS OUTDOOR CPE can provide connectivity services for CPEs under WDS mode Wireless Network Name SSID Chapter 3 Basic Settings Page 26 This wireless network name is shared among all associated devices in your wireless network Keep it identical on all those devices Note that the SSID is case sensiti
36. on Password Settings MEnable SNMPv3Admin Firmware Upload User Name SNMPv3Admin Password 00 Configuration File Confirm Password 0000000 Access Type Read Write Authentication Protocol MDS Privacy Protocol None v MEnable SNMPv3User User Name SNMPv3User Password Confirm Password eee Access Type Read Only M Authentication Protocol MDS M Figure 32 Configure SNMPv3 User Profile User Specify a user name for the SNMPv3 administrator or user Only the SNMP commands carrying this user name are allowed to access the IEEE 802 11 WIRELESS OUTDOOR CPE Password Specify a password for the SNMPv3 administrator or user Only the SNMP commands carrying this Chapter 5 Management Page 38 password are allowed to access the IEEE 802 11N WIRELESS OUTDOOR Confirm Password Input that password again to make sure it is your desired one Access Type Select Read Only or Read and Write accordingly Authentication Protocol Select an authentication algorithm SHA authentication is stronger than MD5 but is slower Privacy Protocol Specify the encryption method for SNMP communication None and DES are available None No encryption is applied DES Data Encryption Standard it applies a 58 bit key to each 64 bit block of data Password From Password Settings in Management you can change the password to manage
37. outer Mode For details please refer to IP Settings Router Device Name Specify the device name which is composed of no more than 15 characters with 0 9 2 2 or Country Region The availability of some specific channels and or operational frequency bands is country dependent amp IP Settings Bridge This is available only under Bridge network mode Open IP Settings in System as below to configure the parameters for LAN which connects to the LAN port of IEEE 802 11N WIRELESS OUTDOOR CPE In this page users may change the settings for IP Address Subnet Mask and DHCP Server Chapter 3 Basic Settings Page 17 n _ L o Status System Wireless Management Basic Settings Bridge IP Settings Use this page to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP address subnet mask DHCP IP Settings Router RADIUS Settings IP Address Assignment Time Settings Obtain IP Address Automatically Use Fixed IP Address Firewall Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway Ip Address 0 0 0 0 DNS 1 0 0 0 0 DNS 2 0 0 0 0 Spanning Tree Enabled Disabled Figure 15 IP Settings Bridge Obtain IP Address Automatically If DHCP server exists in your network you can check this option thus the IEEE 802 11N WIRELESS OUTDOO
38. r eee bees evn re ant ni odes PAU o e eee 35 Fig re 30 WDS Settings aeos o pear ep Tee 34 Figure 31 SNMP Management 35 Figure 32 Configure SNMPv3 User Profile 36 Figure 39 PaSSWO G ics gp ib HERE NECI Een te tue Per a 37 Figure 34 Upgrade Firmware gt u uu u Eee cR HERE ERE RR bh 38 Figure 35 Backup Retrieve Settings ss 39 Figure 36 Restore Settings edat 41 Figure 39 Basic Information u uuu tet tere Rr Ye een A 45 Figure 40 Connection uuu un dete eR eder Pa aia e dat epe b a e us 45 Figure 41 Network Flow Statistics ss 46 Fig re 42 Bridge Table toscano n b e DH E rte ER Ebr nets ua Uus 44 Fig re 43 ARP Table ie etd anodes Petra nent hier 44 Figure 44 Active DHCP Client Table sise 45 Fig re 45 do eed ee dean 49 Table 1 IEEE 802 11N WIRELESS OUTDOOR Table 2 ACSI rs dettes Table 3 Public Software Name and Description CPE Factory Default Settings Chapter 1 Introduction Introduction Designed for outdoor environment application the IEEE 802 11N WIRELESS OUTDOOR CPE is a high performance last mile broadband solution that provides reliable wireless network coverage As an IEEE 802 11b g compliant wireless device the IEEE 802 1
39. rt Filtering Dest Port Filtering Port Forwarding Figure 19 Source IP Filtering Destination IP Filtering The destination IP filtering gives you the ability to restrict the computers in LAN from accessing certain websites in WAN according to specified IP addresses Check the Enable Source IP Filtering checkbox and enter the IP address of the clients to be restricted Hit Apply to make the setting take effect Chapter 3 Basic Settings Page 22 Logout o Status System Wireless Management Basic Settings Destination IP Filtering Entries in this table are used to restrict the computers in LAN from accessing certain websites in WAN according to IP address IP Settings Bridge IP Settings Router RADIUS Settings Enable Destination IP Filtering Destination IP Address Time Settings Comment Firewall Settings Src IP Filtering Dest IP Filtering gt gt Current Filter Table Src Port Filtering Dest Port Filtering Port Forwarding Figure 20 Destination IP Filtering Source Port Filtering The source port filtering enable you to restrict certain ports of data packets from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE Use of such filters can be helpful in securing or restricting your local network Logout 0 Status System Wireless Management Basic Settings Source Port Filtering Entries in this table are used to restrict certain por
40. rt of the PoE injector as the following right picture shows Pua Jaan D 8 a 3 Figure 6 Connect to Chapter 2 Hardware Installation Page 8 5 Plug the other side of the Ethernet cable as shown Step 3 into the PoE port of the PoE injector and get the complete set ready WIRELESS CPE Figure 7 Complete Set Chapter 2 Hardware Installation Page 9 Pole Mounting 1 Turn the IEEE 802 11N WIRELESS OUTDOOR CPE over Put the pole mounting ring through the middle hole of it Note that you should unlock the pole mounting ring with a screw driver before putting it through IEEE 802 11N WIRELESS OUTDOOR CPE as the following right picture shows Figure 8 Pole Mounting Step 1 2 Mount IEEE 802 11N WIRELESS OUTDOOR CPE steadily to the pole by locking the pole mounting ring tightly Figure 9 Pole Mounting Step 2 Chapter 2 Hardware Installation Page 10 3 Now you have completed the hardware installation of IEEE 802 11N WIRELESS OUTDOOR CPE Figure 10 Pole Mounting Step 3 Chapter 2 Hardware Installation Page 11 Using the External Antenna If you prefer to use the external antenna with N type connector for your application instead of the built in directional antenna please follow the steps below 1 Grab the black rubber on the top of IEEE 802 11N WIRELESS OUTDOOR CPE and slightly pull it up The metal N type connector will appear Figure 11 Move the Rubber
41. shows the assigned IP address MAC address and time expired for each DHCP leased client Connections Network Flow Bridge Table IPAddess MAC Address Time Expired s 192168116 00 60 b3 cd ff f2 431995 ARP Table DHCP Client List Figure 44 DHCP Client Table Chapter 6 Status Page 48 Chapter 7 Troubleshooting This chapter provides troubleshooting procedures for basic problems with the IEEE 802 11N WIRELESS OUTDOOR CPE For warranty assistance contact your service provider or distributor for the process Q 1 How to know the MAC address of IEEE 802 11N WIRELESS OUTDOOR CPE MAC Address distinguishes itself by the unique identity among network devices There are two ways available to know it e Each device has a label posted with the MAC address Please refer below MAC 0060B3 XXXXXX Bar code XXXXXXXXXXXXXXX Figure 25 MAC Address e On the IEEE 802 11N WIRELESS OUTDOOR CPE Web based management interface you can view the MAC Address from View IEEE 802 11N WIRELESS OUTDOOR CPE Basic Information Q 2 What if would like to reset the unit to default settings You may restore factory default settings in Configuration File from Management Q 3 What if would like to backup and retrieve my configuration settings You may do the backup by generating a configuration file or retrieve the settings you have backed up previously in Configuration File from Management Q
42. sion power The higher the output power is the wider the signal can cover but the power consumption will be greater accordingly Usually Full is preferred Chapter 3 Basic Settings Page 27 Data Rate Usually Auto is preferred Under this rate the IEEE 802 11N WIRELESS OUTDOOR CPE will automatically select the highest available rate to transmit In some cases however like where there is no great demand for speed you can have a relatively low transmit rate for compromise of a long distance Channel Mode Four levels are available 5MHz 10MHz 20MHz and 40MHz The last one can enhance data throughput but it takes more bandwidth thus it might cause potential interference Extension Channel Protection Mode This is to avoid conflict with other wireless network and boost the ability of your device to catch all 802 11g transmissions However it may decrease wireless network performance Compared to CTS Self the transmission amount of CTS RTS is much lower Enable MAC Clone Available only under wireless client mode it hides the MAC address of the AP while displays the one of associated wireless client or the MAC address designated manually Site Survey Under wireless client mode the IEEE 802 11N WIRELESS OUTDOOR CPE is able to perform site survey through which information on the available access points will be detected Open Basic Settings in Wireless by clicking the Site Survey button beside Wireless Mode
43. t 2 minis sine gt Sn nn ee het A nn 37 Configure SNMPv3 User Profile ss 38 PASSWOIG kaa aha kam a de sr a kaa ee ras err A ta Andenne den 39 LDJporade Firirlwarez os u a d te On Pen tto E i Sees 40 Backup Retrieve Settings sise 40 Restore Factory Default Settings sise 41 eh aeu 42 System cerne e rii eek Eee Pa nat vui dur 42 IESU ur ete 43 Ping Watch Dog pcc 44 Chapter 6 Status fm 45 View IEEE 802 11N WIRELESS OUTDOOR CPE Basic 45 View Association Elst 423 uirtute E RUD i eL E Hefe oti ste Dre en ete ua 45 View Network Flow Statistics nennen nennen nennen nennen nennen 46 Miew Bridge Table ni tado et pene uri end 46 View ARP Table ua cie a e e e Ere ege me ER ub ee dote do eee ede edge diet ane 47 View Active DHCP Client Table its 48 Chapter 7 0 2 2 nicer sc ob 49 AppendbcA ASCII eire 51 Appendix B GPL Declamation 52 FIGURE Figure 1 IEEE 802 11N WIRELESS OUTDOOR CPE inner 2 Fig re 2 Typical Application e lente tee d pee tp 3 3 Move the GOV6F iit b e e Fe era EE ERRARE aed tiene 7 Fig re 4 Cable Connectlon sic erem ede e Dep a eed ded A cease 7 Figuire 5 Seal the Bottom ae
44. t c dhat com ecos e 2003 Red Hat Inc om private cos license 5 cale 03042 2 redboot i ntel xscale 030630 tar 2 http www GNU GENERAL PUBLIC http www gnu o busybox LICENSE Version 2 rg licenses old li net downl censes gpl 2 0 ht oads busy ml box 1 01 ta r bz2 Copyright 2000 http nchc GNU GENERAL PUBLIC http www gnu o Appendix B GPL Declamation Page 53 dropbear hostapd wpa sup plicant mtdutil ntpclient procps Lennert Buytenhek Copyright c 2002 2006 Matt Johnston Portions copyright c 2004 Mihnea Stoenescu Copyright c 2002 2006 Malinen Jouni lt jkmaline cc hut fi gt and contributors Copyright c 2003 2005 Jouni Malinen lt jkmaline cc hut fi gt and contributors Copyright 1997 1999 2000 Doolittle 2003 Larry Author Albert Cahalan Michael Jim Warner etc K Johnson Appendix B GPL Declamation dl sourcef orge net s ourceforg e bridge br idge utils 1 0 6 tar gz http matt ucc asn au dropbear dropbear 0 51 tar bz 2 http host ap epitest fi releases hostapd 0 4 8 tar gz http host ap epitest fi releases wpa suppl icant 0 4 7 tar gz ftp ftp uk linux org p ub people dwmw2 mt d cvs mtd util http dooli ttle icarus com ntpcli ent ntpclie nt 2003 1 94 tar gz http proc ps sourcef orge net p rocps 3 2 7 tar gz LICENSE Version 2 GNU
45. t contains devices accessible to the Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers Logout 2 Status System Wireless Management Tools Basic Settings DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to Internet traffic IP Settings Router such as Web HTTP servers FTP servers 8 e mail servers DNS servers IP Settings Bridge RADIUS Settings Enable DMZ DMZ Host IP Address oo Time Settings Firewall Settings g Src IP Filtering Dest IP Filtering Src Port Filtering Dest Port Filtering Port Forwarding Figure 24 DMZ Chapter 3 Basic Settings Page 25 Basic Wireless Settings Open Basic Settings in Wireless as below to make basic wireless configuration Logout 2 Status System Wireless Management Basic Settings gt gt Wireless Basic Settings Use this page to configure the parameters for wireless LAN clients which may connect to your Access Point Here you may change wireless mode as well as wireless network parameters Security Settings Advanced Settings Access Control Disable Wireless LAN Interface W ssem Wireless Mode AP MI ettings 3 Wireless Network Name SSID Broadcast SSID 9 Enabled Disabled 802 11 Mode 802 11b g
46. te with RADIUS through IP Address Port Shared Secret IP Address Enter the IP address of the Radius Server Port Enter the port number of the Radius Server Chapter 3 Basic Settings Page 20 Shared Secret This secret which is composed of no more than 31 characters is shared by the IEEE 802 11N WIRELESS OUTDOOR CPE and RADIUS during authentication Re authentication Time Set the time interval between two authentications Global Key Update Check this option and specify the time interval between two global key updates Time Settings Compliant with NTP the IEEE 802 11N WIRELESS OUTDOOR CPE is capable of keeping its time in complete accord with the Internet time Make configuration in Time Settings from System To use this feature check Enable NTP Client Update in advance Logout Status Wireless Management Basic Settings Time Settings IP Settings Bridge You can synchronize System Log s time stamp with a public time server over the Internet IpisetingBousg Current Time 2000 monfi Joay Hrfo wn z4 sec ss RADIUS Settings Time Zone Select GMT Greenwich Mean Time Dublin Edinburgh Lisbon London Enable client update 93 gt NTP server Firewall Settings Manual IP poco Figure 18 Time Settings Current Time Display the present time in Yr Mon Day Hr Min and Sec A Time Zone Select Select the time zone from the dropdown list
47. ter g R 0 100000m ACK Timeout 100 100 767 microsecond Figure 18 Advanced Wireless Settings Support WMM Wi Fi Multimedia is a subset of 802 11e It allows wireless communication to define a priority limit on the basis of data type under AP mode only thus those time sensitive data like video audio data may own a higher priority than common one To enable WMM the wireless client should also support it A MPDU A MSDU Aggregation The data rate of your AP except wireless client mode could be enhanced greatly with this option enabled however if your wireless clients don t support A MPDU A MSDU aggregation it is not recommended to enable it Short GI Under 802 11n mode enable it to obtain better data rate if there is no negative compatibility issue Chapter 4 Advanced Settings Page 30 RTS Threshold The 802 11N WIRELESS OUTDOOR CPE sends RTS Request to Send frames to certain receiving station and negotiates the sending of a data frame After receiving an RTS that STA responds with a CTS Clear to Send frame to acknowledge the right to start transmission The setting range is 0 to 2346 in byte Setting it too low may result in poor network performance Leave it at its default of 2346 is recommended Fragmentation Length Specify the maximum size in byte for a packet before data is fragmented into multiple packets Setting it too low may result in poor network performance Leave it at its default o
48. the range of your network without having to use cables to link the Access Points by using the Wireless Distribution System WDS Simply put you can link the Access Points wirelessly Open WDS Settings in Wireless as below Logout Status Wireless Management Basic Settings WDS Settings Wireless Distribution System uses wireless media to communicate with other APs like the Ethernet does To do this you must set these APs in the same channel and set MAC addresses of Advanced Settings other APs which you want to communicate with in the table and then enable the WDS This function can work only in Bridge and AP Repeater mode Security Settings Access Control Local MAC Address Remote AP MAC Address1 Remote AP MAC Address2 Remote AP MAC Address3 Remote MAC Address4 Figure 30 WDS Settings Enter the MAC address of another AP you wirelessly want to connect to into the appropriate field and click Apply to save settings WDS Settings is available only under Bridge and AP Repeater Mode Chapter 4 Advanced Settings Page 36 Chapter 5 Management SNMP Management The IEEE 802 11N WIRELESS OUTDOOR CPE supports SNMP for convenient remote management Open SNMP Configuration in Management shown below Set the SNMP parameters and obtain MIB file before remote management Logout 5 Status Wireless Management Tools SNMP Configuration Password Settings 3 N Use this page to
49. to the Internet Here you may change the IP Settings Bridge access method to Static IP DHCP PPPOE WAN Settings RADIUS Settings WAN Access Type Static IP Time Settings IP Address 192 168 0 99 ccm Subnet Mask 255 255 255 0 Firewall Settings Default Gateway 192 168 0 254 DNS 1 0 0 0 0 DNS 2 0 0 0 0 LAN Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 J DHCP Server Disabled v Figure 16 IP Settings Router WAN Settings Specify the Internet access method to Static IP DHCP or PPPOE Users must enter WAN IP Address Subnet Mask Gateway settings provided by your ISPs LAN Settings When DHCP Server is disabled users can specify IP address and subnet mask for IEEE 802 11N WIRELESS OUTDOOR CPE manually Make sure the specified IP address is unique on your network in order to prevent IP conflict When DHCP Server is enabled users may specify DHCP IP Address Range DHCP Subnet Mask DHCP Gateway and Lease Time 15 44640 minutes A Warning In AP mode IEEE 802 11N WIRELESS OUTDOOR CPE must establish connection with another wireless device before it is set to Router mode In Router mode it is impossible for users to access device via wired port for WAN is on wired port and LAN is on wireless port Users can access device through the wireless device connected with IEEE 802 11N WIRELESS OUTDOOR CPE e In CPE mode users can access IEEE 802 11N WIRELESS OUTDOOR CP
50. ts of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your IP Settings Router local network IP Settings Bridge RADIUS Settings Enable Source Port Filtering Time Settings Port Range Protocol Both Firewall Settings Comment Src IP Filtering Dest IP Filtering Dp g Src Port Filtering gt gt Current Filter Table T Rd SourcePortRange Protocol select Eat Dest Port Filtering Port Forwarding Delete Selected Delete A DM7 Figure 21 Source Port Filtering Chapter 3 Basic Settings Page 23 Destination Port Filtering The destination port filtering enables you to restrict certain ports of data packets from your local network to Internet through IEEE 802 11N WIRELESS OUTDOOR CPE Use of such filters can be helpful in securing or restricting your local network Logout Status System Wireless Tools Basic Settings Destination Port Filtering Entries in this table are used to restrict certain ports of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your IP Settings Router local network IP Settings Bridge RADIUS Settings Enable Destination PortFiltering Time Settings Port Range E Protocol Bot Comment Firewall Settings Src IP Filtering Dest IP Filt
51. ve and can not exceed 32 characters Broadcast SSID Under AP mode hiding network name is necessary when you are in a wireless environment that may have potential risk By disabling broadcast SSID the STA can not scan and find IEEE 802 11N WIRELESS OUTDOOR CPE so that malicious attack by some illegal STA could be avoided 802 11 Mode The IEEE 802 11N WIRELESS OUTDOOR CPE can communicate with wireless devices of 802 11b g or 802 11b g n You can also select Auto and make it work under an appropriate wireless mode automatically HT Protect Enable HT High Throughput protect to ensure HT transmission with MAC mechanism Under 802 11n mode wireless client can be divided into HT STA and Non HT STA among which the one with HT protect enabled gets higher throughput Channel Number Channel varies much as the available band differs from country to country Select a proper operating channel in the drop down list according to your situation e Antenna By default IEEE 802 11N WIRELESS OUTDOOR CPE uses its built in antenna for directional transmission however if you prefer to use an external antenna for your case dependent applications you can switch from Internal 8 dBi to External N Type You are able to choose External N Type only when you have well done installing the external antenna otherwise it might damage IEEE 802 11N WIRELESS OUTDOOR CPE itself Output Power Specify the signal transmis
52. y 100 seconds Failure Count To Reboot 300 rz Ping Watchdog Enable Ping Watchdog To activate ping watchdog check this checkbox IP Address to Ping Specify the IP address of the remote unit to ping Ping Interval Specify the interval time to ping the remote unit Startup Delay Specify the startup delay time to prevent reboot before the IEEE 802 11N WIRELESS OUTDOOR CPE is fully initialized Failure Count To Reboot If the ping timeout packets reached the value the IEEE 802 11N WIRELESS OUTDOOR CPE will reboot automatically Chapter 6 Status Page 44 Chapter 6 Status View IEEE 802 11N WIRELESS OUTDOOR CPE Basic Information Open Information in Status to check the basic information of IEEE 802 11N WIRELESS OUTDOOR CPE which is read only Click Refresh at the bottom to have the real time information Logout o Management system Wireless Information This page shows the current status and some basic settings of the device Connections Network Flow System Information Bridge Table Model Name ARP Table Device Name ap20fabc w Address 00 19 70 20fa bc DHCP Client List Country Region United States Firmware Version 2 0 1 LAN Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Gateway IP Address 0 0 0 0 MAC Address 00 19 70 20 fa bc Wireless Settings Operation Mode Wireless Mode Figure 22 Basic Information View Association List Open Association List in Connection
Download Pdf Manuals
Related Search
Related Contents
c a rre llo Yamaha 2006 Royal Star Tour Deluxe Owner's Manual Cameras IR TIR Gamme bâtiment Elipar FreeLight Curing Light BBDB User Manual JVC AV-20NX3 User's Manual Alpin Z 300 - Lehner Lifttechnik Copyright © All rights reserved.
Failed to retrieve file