Home
LevelOne WAP-6102 WLAN access point
Contents
1. Channel 11 ESSID LevelOne Security Disable BS5ID 00 02 6F 061 FB 14 22 Basic This page allows you to define Mode Band Multiple ESSID You can also set up a static wireless channel or make Wireless device move to a clean Wireless Channel automatically Mode WDS MAC Address 1 000000000000 MAC Address 2 000000000000 MAC Address 3 000000000000 MAC Address 4 000000000000 WDS Data Rate 300M Apply gt Radio To enable disable radio frequency Y Mode WDS mode allows you to interlink with other AP devices Setting MAC address and encryption algorithm gt Band Configure the device into different wireless modes v 2 4 GHz B v 2 4 GHz N v 2 4 GHz B G v 2 4 GHz G v 2 4 GHz B G N gt Enabled SSID The device allows you to add up to 4 unique SSID gt ESSID Description of each configured SSID gt Channel You can manually configure a channel to be used gt MAC Address 1 4 To specify MAC address of other AP devices A MAC address will only shows when configured in WDS AP mode gt WDS Data Rate select a data rate from the drop down list gt Bet Security Please refer to Security for encryption configuration 23 Advanced These settings are only for expert user who is familiar with Wireless LAN procedure Do not change these settings unless vou know what effect the changes will have on your AP Incorrect settings might reduce wireless per
2. FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator amp your body We declare that the product is limited in CH1 CH11 by specified firmware controlled in the USA This transmitter must not be co located or operating in conjunction with any other antenna or transmitter 48 Appendix C IC Interference Statement Industry Canada statement This device complies with RSS 210 of the Industry Canada Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may Cause undesired operation IMPORTANT NOTE Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator amp your body This device has been designed to operate with an antenna having a maximum gain of 2 dBi Antenna having a higher gain is strictly prohibited per regulations of Industry Canada The required antenna impedance is 50 ohms 49
3. 2 3 1 Status View the current wireless connection status and related information LAN Settings IP Address 192 168 1 1 Subnet Mask 255 255 255 0 MAC Address 00 02 6F 61 FB 14 36 2 3 2 LAN You can enable the devices DHCP server to dynamically allocate IP Addresses to your LAN client PCs The device must have an IP Address for the Local Area Network static IP ll IP Address 192 168 1 1 IF Subnet Mask 255 255 255 0 Default Gateway Static First DNS Address 192 168 1 1 second DNS Address 0000 802 1d Spanning Tree Disabled DHCP Server AP Mode Only DHCP Server Disabled Lease Time Forever ka 192 168 1 100 Start IP End IP 192 166 1 200 Domain Name wap 6102 First DNS Address Second DNS Address 3l Y Yv VV Y Y Y Y V Bridge Type Select Static IP or Dynamic IP from the drop down list If you select Static IP you will be required to specify an IP address and subnet mask If Dynamic IP is selected then the IP address is received automatically from the external DHCP server IP Address Specify an IP address IP Subnet Mask Specify a subnet mask for the IP address Default Gateway Specify the router IP address which is used to route TCP IP traffic destined to other network subnet addresses not listed in local routing table DNS Type Select Dynamic for automatic retrieve DNS IP address or select Static for manually defined F
4. S 5 L z a z L z a E T i x S x 5 x E x 2 E x S x x E E x A x D x 5 x 5 x E x 5 x a B x 2 x p a x 3 x S x E x G E x x S Z x E x S E S 10 12 14 16 18 0 Z Maximum Average Current OBfsec OBfsec OB sec 0 B sec 0OBfsec OB sec WLAN Daily Graph 5 Minute Average Bytes per Second Rx 4 0 TT a K s S s L E S y s L a s e s L s s L s e T a a e A cn a S S 5 E S E S 5 a S S S z S 3 U O ETT THT L s S L a L a i x le N S x o a x 5 K x S R N S z N o a N 5 S N o S S S z Z x S x E S x x E x S x a E x S S x x S x A x E S x x S A x 2 x S x i P E S F E E S E S S E S 2 0 boo ods Aree Seen e o ennai s E s i E s L a s 3 a s L F s S E s D s a a s E S 5 x 5 x E E x 2 S x 5 x z S x E s x S L i U U U U a x 9 3 x o E x g E x S E x p E x b z x S x a E T T a AE tea 1 0 DTD TTT TTT L S S E E E a E 3 E E E a S Ra tt S T T T E A ee T 5 0 A E EE O E a a E U E U isi U k s a s 10 i 14 16 10 0 22 Maximum Average Current n Rfcar n Aigar n Afear gt Detail Click into detail to see historical record Detail Detail Ethernet Daily Graph 5 Minute Average WLAN Daily Graph 5 Minute Average _ 4 0 lan 01 2009 00 03 4 0 lan 01 2008 00 03 POU eae Bah p 8
5. To enable daylight savings time 44 2 5 2 Power Saving Only work with AP Mode You can use the power page to save energy for WLAN interfaces Power Saving Mode CATE Enable Disable Apply Cancel 2 5 3 Diagnosis Check whether a network destination is reachable with ping service This page can diagnose the current network status Address to Ping Ping Frequency e 45 2 5 4 LED Control You can use the LED control page to control LED on off for Power LAN interface and WLAN interface LED Control Power LED Enable Disable LAN LED 9 Enable Disable 2 6 Logout This page is used to logout this device 46 Appendix A SPECIFICATIONS Frequency Band Media Access Protocol Modulation Technology Operating Channels Receive Sensitivity Typical Available transmit power Antenna 2 2 400 2 484 GHz Carrier sense multiple access with collision avoidance CSMA CA OFDM BPSK QPSK 16 QAM 64 QAM DBPSK DQPSK CCK 11 for North America 14 for Japan 13 for Europe JEEE802 11n MCS8 90dBm MCS15 70dBm IEEE802 11 6Mbps 92dBm 54Mbps 72dBm IEEE802 11b 1Mbps 93dBm 11Mbps 89dBm Maximum 16dBm Directional internal antenna TNC type Peak Gain 4dBi 47 Appendix B FCC INTERFERENCE STATEMENT Federal Communication Commission Interference Statement This equipment has been tested and found to c
6. associate with the access point only if the access point is also set to use only AES RADIUS Server IP Address Specify the IP address of the RADIUS server RADIUS Server Port Specify the port number of the RADIUS server the default port is 1812 RADIUS Server Password Specify the pass phrase that is matched on the RADIUS Server 18 Filter Using MAC Address Filtering could prevent unauthorized MAC Address to associate with the AP Enable Wireless MAC Filtering Description Description Delete Selected Delete All WPS Enable Wi Fi Protected Setup Information WPS Current Status Configured Self Pin Code 64212685 19 VV Y Y Y Y WPS Current Status Display current configuration is configured or un configured The default setting will display un configured status but if any of following occur will display configured status 1 Configuration by an external registrar 2 Automatic configuration by internal registrar 3 Manual configuration by user Self Pin Code Pin code is unique and automatically generated SSID Display wireless network name Authentication Mode Display wireless network authentication types Passphrase Key Display wireless network authentication password WPS Via Push Button Start WPS function from webpage WPS Via PIN Specify wireless client s PIN code to start WPS function 20 Client List WLAN Client Table This WLAN Client Table shows client MAC address ass
7. different WEP keys from below Encryption Key 1 4 You may enter four different WEP keys Enable 802 1x Authentication Place a check in this box if you would like to use RADIUS authentication This option works with a RADIUS Server to authenticate wireless clients Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through this Gateway Furthermore it may be necessary to configure the RADIUS Server to allow this Gateway to authenticate users You will then be required to specify the RADIUS Server s IP address port and password 16 gt Encryption WPA pre shared key This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption Keys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne Broadcast ESSID Enable lt Enable WPA pre shared key WPA TKIP WPA2 AES O WPA2 Mixed Pre shared Key Type Passphrase Pre shared Key Apply Cancel gt ESSID Selection As this device supports multiple SSIDs it is possible to configure a different security mode for each SSID profile Select an SSID from the drop down list gt Broadcast SSID Select Enable or Disable from the drop down list This is the SSID broadcast feature When this option is set to Enable your wireless network name is broadcast to anyone within the range of your signa
8. list gt Broadcast SSID Select Enable or Disable from the drop down list This is the SSID broadcast feature When this option is set to Enable your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When this is disabled you must enter the Wireless Network Name SSID on the client manually to connect to the network gt WMM Choose to Enable or Disable WMM This is the Quality of Service QoS feature for prioritizing voice and video applications gt Encryption Select WPA pre shared key from the drop down list gt WPA Type Select TKIP AES or WPA2 Mixed The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES gt Pre shared Key Type The Key Type can be passphrase or Hex format gt Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known ph
9. 097255338 Kernel Version 1 0 0 Application Version 1 0 0 WLAN Settings Channel 11 SSID_1 ESSID LevelOne Secunty Disable BSSID 00 02 6F 61 FB 14 gt System Basic information of the device gt WLAN Settings WLAN channel gt SSID_1 SSID information 2 1 3 DHCP DHCP Client Table This DHCP Client Table shows client IP address assigned by the DHCP Server IP Address MAC Address Expiration Time ie Palir gt 2 db L P Wher PT Phot on You can assign an IP address to the specific MAC address Enable Static DHCP IP IP Address MAC Address Current Static DHCP Table IP Address MAC Address Delete Selected 2 1 4 Schedule You can use the Schedule page to Start Stop the Services regularly The Schedule will start to run when it get GMT Time from Time Server Please set up the Time Server correctly in Toolbox The services will start at the time in the following Schedule Table or it will stop Enabled Schedule Table up to 10 Description Service Delete Selected Delete All 2 1 5 Event Log View the system operation information day day day day day day day day day day day day day day M KA KM M Ka M PP M KM ka kM ps ka 00 00 05 00 00 04 00 00 04 00 00 04 00 00 04 00 00 03 00 00 03 00 00 03 00 00 02 00 00 02 00 00 02 00 00 02 00 00 02 00 00 02 SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTE
10. B 15 Logout 11 ESSID LevelOne Security Disable BSSID 00 02 6F 61 FB 14 To configure Repeater Mode please select Universal Repeater in System Operation Mode Please refer to 2 1 1 Operation Mode 27 Status View the current wireless connection status and related information WLAN Repeater Information l Connection Status Fail ES5SID Secunty BSSID 00 02 6F 61 FB 15 Channel 11 ESSID LevelOne Secunty Disable BSSID 00 02 6F 61 FB 14 Basic This page allows you to define Mode Band Multiple ESSID You can also set up a static wireless channel or make Wireless device move to a clean Wireless Channel automatically Radio Enable Disable 24 Giz GN Enabled SSID dr HE Site Survey 28 Site eiia BSSID__ Encryption Authentication Signal WBR 6022TSD 00 11 6B 50 EC 40 NONE 1 1 OPEN 29 11b g n gt Radio To enable disable radio frequency Y Mode Universal Repeater gt Band Configure the device into different wireless modes v 2 4 GHz B v 2 4 GHz NI v 2 4 GHz B G v 2 4 GHz G Y 2 4 GHz B G N Y VV WV Advanced Enabled SSID The device allows you to add up to 4 unique SSID ESSID Description of each configured SSID Channel You can manually configure a channel to be used Site Survey List out all connected devices These settings are only for expert user who is familiar with W
11. B Be 8 2h 2 g D J o V J H T L U 7 T 2 0 PE D K EL A a L ET ITE y a a 0 0 B 10 12 14 16 18 20 22 Ethernet Weekly Graph 30 Minute Average WLAN Weekly Graph 30 Minute Average 4 0 4 0 Jan 01 a 00 00 Jan 04 2009 00 00 T MA AN a a cacao cis ais aa aaa T T T E S T PES L my E orgorgodocontodveco Doro erotedaccanasonsdnas Bytes per Second Bytes per Second Ethernet Monthly Graph 2 Hour Average WLAN Monthly Graph 2 Hour Average 40 Jan 01 2009 00 00 40 Jan 01 2009 00 00 K i D J o 3 0 o 3 0 L U K 20 KL 2 0 a a D 1 0 D 1 0 E a a 7 EU a a Y 0 0 v s Y 0 0 s Week 50 Week 51 Week 52 Week 54 Week 51 Week 52 Maximum Average Current Maximum Average Current RX OB sec OB sec OB sec Tx 0OB sec 0B sec 0B sec OB sec OB sec 0B sec OB sec OB sec OB sec 9 E UPTIME 3 min 49 sec 2 2 Wireless 2 2 1 Access Point Configuration Please click System Operation Mode and Select Access Point before you start the configuration AP Mode WAP 6102 300Mbps N_Max Wireless Ceiling PoE Access Point Access Point Mode System You can use the Status page to monitor the connection status for WLAN LAN interfaces firmware and hardware version numbers Wireless Operation Mode Status System Time 2009 01 01 01 15 17 System Up Time 1 hours 14 min 46 sec Basic Advanced Hardware Version 1 0 0 Security Filter Serial Number 097255338 WPS Kernel Vers
12. Change current login password of the device It is recommended to change the default password for security reasons You can change the password that you use to access the device this is not you ISP account password Old Password New Password Repeat New Password Idle Timeout 10 1 10 minutes Apply Reset 40 2 4 2 SNMP Allows you to assign the contact details location community name and trap settings for SNMP This is a networking management protocol used to monitor network attached devices SNMP allows messages called protocol data units to be sent to various parts of a network Upon receiving these messages SNMP compatible devices called agents return data stored in their Management Information Bases SNMP is used in network management systems to monitor network attached devices for conditions that warrant administrative attention SNMP Active SNMP Version Read Community Set Community System Location System Contact Trap Active Trap Manager IP Trap Community gt gt gt gt access VV VV WV Enabled All public LevelOne LevelOne Enabled 0 0 0 0 public SNMP Active Choose to enable or disable the SNMP feature SNMP Version You may select a specific version or select All from the drop down list Read Community Specify the password for access the SNMP community for read only access Set Community Specify the password for acc
13. D lt D D WAP 6102 300Mbps N_Max Wireless Ceiling PoE Access Point User Manual Notice FCC Warning Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation The user s manual or instruction manual for an intentional or unintentional radiator shall caution the user that changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be d
14. INTERFERENCE STATEMENT 20 A a 48 Appendix C TC Interference tatemento ci A A ts 49 M 1 Introduction WAP 6102 is a powerful and multi functioned 11n Access Point and it can act three modes AP WDS Universal Repeater Smoke detector appearance will minimize visibility So this model can work properly at Hotel or public area WAP 6102 is a Wireless Network device that delivers up to 6x faster soeeds and 7x extended coverage than 802 11g devices Product s RF performance is finely tuned so it will bring best wireless signal for each client WAP 6102 supports home network with superior throughput performance and unparalleled wireless range To protect data during wireless transmissions WAP 6102 encrypts all wireless transmissions through WEP data encryption and supports WPA WPA2 Its MAC address filter allows users to select stations with access to connect network WAP 6102 thus is the best product to ensure network quality for hotspots 1 1 Features and Benefits Features Benefits High Speed Data Rate Up to 300Mbps Capable of handling heavy data payloads such as MPEG video streaming IEEE 802 11n draft Compliant and Fully compatible with IEEE 802 11b g n devices backward compatible with 802 11b g Multi modes selectable Allowing users to select AP WDS Universal Repeater mode in various application Point to point Point to multipoint Allowing to transfer data from buildings to buildings Wireless Connectivity WDS Wireless Distributed S
15. M SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM Clear Refresh WLAN start LLTD TELNETD start Telnet cli Server HTTPS start HTTP start SHMP start SNMP server NTP start NIP Client DHCP DHCP Server Stoping WLAN 2 26 Channel 11 LAN IP address 192 168 1 1 LAN start BR start 313 Kernel Version 1 0 0 SYS Application Version 1 0 0 Start Log Message Service 2 1 6 Monitor The device will record the router transmission status in a time span Ethernet Daily Graph 5 Minute Average Bytes per Second e ane S x Q x o k x 5 s x S E x o s x o a x 5 a x S x a o S a S D a a 2 E D S D S a S a E 9 E a o a a E S a U oem COOP 0000 00 00 0 007 000000000 0070000000000 UO OOo oO 000000 On E Oooo oe me a a S ES S 5 E a a 5 S E S 5 A a S D 5 E o a E S a o a o x 5 x o S x 5 E x o R x 5 x x S a x 5 S x o a x o S E a o E o E S 3 E 3 o E o a S E 5 o 5 S i a 5 3 o a S S a 5 z 0 AO sassa RRR RR Rm RR RN RRR RR RR RR RN RR RR RR R RR RN RR RR RR RR RR RN RR RR RR RR RR RN RR RR RR Rm RR RN RR RR RR Rm RR R 5 S o a S o a S S 2 E a S a S o S a E a a E D S o E D E a S 2 5 o x S x P a x E x 3 E N S z x E a x s x 3 S N a E x S x E x E x z S x S x E x E a x 6 x 1 U O HIHHH HIHHHOH L me E E x
16. and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES gt Pre shared Key Type The Key Type can be passphrase or Hex format gt Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client 26 2 2 3 Universal Repeater Configuration Please click System gt Operation Mode and Select Universal Repeater Before you start the configuration Repeater Mode S56 sx level WAP 6102 300Mbps N_Max Wireless Ceiling PoE Access Point Universal Repe ater Mode You can use the Status page to monitor the connection status for WLAN LAN interfaces firmware and hardware version numbers System Wireless Operation Mode Universal Repeater Status System Time 2009 01 01 00 01 04 as E System Up Time 19 sec Advanced aay te sien eee Kernel Version 1 0 0 Filter Application Version 1 0 0 WPS Client List Connection Status Fail Network Channel Management ay Tools PE BSSID 00 02 6F 61 F
17. between client users 13 Security gt Encryption Disabled This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption Keys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne Broadcast ESSID Enable WMM Enable Encryption Disable Enable 302 1x Authentication Cancel Enable 802 1x Authentication RADIUS Server IP Address RADIUS Server Port 1812 RADIUS Server Shared Secret 14 gt Encryption WEP ESSID Selection Broadcast ESSID Authentication Type Open System Shared Key Auto Key Type ASCII 5 characters Encryption Key 1 Encryption Key 2 Encryption Key 3 Encryption Key 4 Enable 802 1x Authentication RADIUS Server IP Address RADIUS Server Port 1812 RADIUS Server Shared Secret 15 Y ESSID Selection As this device supports multiple SSIDs it is possible to configure a different security mode for each SSID profile Select an SSID from the drop down list Broadcast SSID Select Enable or Disable from the drop down list This is the SSID broadcast feature When this option is set to Enable your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When this is disabled you must enter
18. ccess Point Access Point ST WDS Bridge Cancel Universal Repeater AP WDS Universal Repeater Access Point In AP Access Point mode your device acts as a communication hub for users with a wireless device to connect to a wired LAN WAN Please refer to Chapter 2 2 1Access Point Configuration Page 9 for operation under AP Mode WDS Bridge You can only connect to the device via Wireless Client WDS Wireless Distribution System allows AP to communicate with one another wirelessly This capability is critical in providing a seamless experience for roaming clients and for managing multiple wireless networks Please refer to Chapter 2 2 2 WDS Bridge Configuration Page 22 for operation under WDS Mode Universal Repeater Repeater is used to regenerate or replicate signals that are weakened or distorted by transmission over long distances and through areas with high levels of electromagnetic interference EMI Universal Repeater AP mode on one radio channel is usually configured along with Universal Repeater STA mode on another radio channel Please refer to Chapter 2 2 3 Universal Repeater Configuration Page 27 for operation under Repeater Mode 2 1 2 Status You can use the Status page to monitor the connection status for WLAN LAN interfaces firmware and hardware version numbers Operation Mode Access Point System Time 2009 01 01 00 02 07 System Up Time 19 sec Hardware Version 1 0 0 Senal Number
19. ck to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Key Length Select a 64 bit or 128 bit WEP key length from the drop down list Key Type Select a key type from the drop down list 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember Default Key You may choose one of your 4 different WEP keys from below Encryption Key 1 4 You may enter four different WEP keys 32 gt Encryption WPA pre shared key This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption Keys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne lt Broadcast ESSID Enable lt Encryption WFA pre shared key WPA Type WPA TKIP WPA2 AES Pre shared Key Type Passphrase Pre shared Key Apply Cancel gt ESSID Selection As this device supports multiple SSIDs it is possible to configure a different security mode for each SSID profile Select an SSID from the drop down
20. curity Disabled This page allows you setup the WDS bridge security The value depends on your WDS Security settings Disable x gt Encryption WEP This page allows you setup the WDS bridge security The value depends on your WDS Security settings Encryption WEF Key Length b4 bit Key Format ASCI 5 chances lt Default key Eeyl Encryption Key 1 Encryption Key 2 Encryption Key 3 Encryption Key 4 ra gt Key Length Select a 64 bit or 128 bit WEP key length from the drop down list gt Key Format Select a key type from the drop down list 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember gt Default Tx Key You may choose one of your 4 different WEP keys from below gt Encryption Key 1 4 You may enter four different WEP keys 25 gt Encryption WPA pre shared key This page allows you setup the WDS bridge security The value depends on your WDS Security settings Yara gt 9 WPA TKIP WPA2 AES e Bey Reet gt WPA Type Select TKIP AES or WPA2 Mixed The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation
21. ess to the SNMP community with read write System Location Specify the location of the device System Contact Specify the contact details of the device Trap Active Choose to enable or disable the SNMP trapping feature Trap Manager IP Specify the password for the SNMP trap community Trap Community Specify the name of SNMP trap community 4 2 4 3 Firmware Allows you to upgrade the firmware of the device in order to improve the functionality and performance You can upgrade the firmware of the device in this page Ensure the firmware you want to use is on the local hard drive of your computer Click on Browse to browse and locate the firmware to be used for your update Apply Cancel A Ensure that you have downloaded the appropriate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded with wireless interface 2 4 4 Configure This allows you to restore to factory default setting or backup restore your current setting The current system settings can be saved as a file onto the local hard drive The saved file can be loaded back on the device To reload a system settings file click on BROWSE to locate the system file to be used You may also reset the device back to factory default settings by clicking RESET Restore To Factory Default Backup Settings Restore Settings 42 2 4 5 Reset This will only reset you devices
22. etermined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna O Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help FCC RF Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator amp your body For product available in the USA Canada market only channel 1 11 can be operated Selection of other channels is not possible The antenna s used for this transmitter must not be co located or operating in conjunction with any other antenna or transmitter Shielded interface cables must be used in order to comply with emission limits CE Statement LEVEL ONE hereby declares that this device is in compliance with the essential requirement and other relevant provisions of the R amp TTE Directive 1999 5 EC This device will be sold in the following EEA countries Austria Italy Belgium Liechtenstein Denmark Luxembourg Finland Netherlands France Norway Germany Portugal Greece Spain Iceland Sweden Ireland United Kingdom Cyprus Czech Republic Estonia Hunga
23. eys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne lt Broadcast ESSID Enable Enable Encryption WPA RADIUS ka WPA Type 9 WPA TKIP WPA2 AES WPA2 Mixed RADIUS Server IP Address RADIUS Server Port 1812 RADIUS Server Shared Secret Y Apply Cancel ESSID Selection As this device supports multiple SSIDs it is possible to configure a different security mode for each SSID profile Select an SSID from the drop down list Broadcast SSID Select Enable or Disable from the drop down list This is the SSID broadcast feature When this option is set to Enable your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When this is disabled you must enter the Wireless Network Name SSID on the client manually to connect to the network WMM Choose to Enable or Disable WMM This is the Quality of Service QoS feature for prioritizing voice and video applications Encryption Select WPA RADIUS from the drop down list WPA Type Select TKIP AES or WPA2 Mixed The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can
24. formance Fragment Threshold 2346 256 2346 RTS Threshold 2347 1 2347 N Data Rate Auto F Channel Bandwidth Auto 20 40 MHZ 20 MHZ Preamble Type Long Preamble 9 Short Preamble CTS Protection Auto Always None 100 Apply Cancel Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 2346 The default value is 2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 0 and 2347 The default value is 2347 N Data Rate You may select N data rate from the drop down list however it is recommended to select auto Channel Bandwidth Select channel bandwidth Preamble Type Select a short or long preamble For optimum performance it is recommended to also configure the client device as the same preamble type CTS Protection CTS Clear to Send can be always enabled auto or disabled By enabled CTS the Access Point and clients will wait for a clear signal before transmitting It is recommended to select auto Tx Power You may control the transmit output power of the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network 24 Security gt Encryption Se
25. ing the performance Specify a value between 0 and 2347 The default value is 2347 Beacon Interval Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Interval value between 24 and 1024 The default value is set to 100 milliseconds DTIM Period A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Period value Wireless clients detect the beacons and awaken to receive the broadcast and multicast messages The default value is 1 Valid settings are between 1 and 10 N Data Rate You may select N data rate from the drop down list however it is recommended to select auto Channel Bandwidth Select channel bandwidth Preamble Type Select a short or long preamble For optimum performance it is recommended to also configure the client device as the same preamble type CTS Protection CTS Clear to Send can be always enabled auto or disabled By enabled CTS the Access Point and clients will wait for a clear signal before transmitting It is recommended to select auto Tx Power You may control the transmit output power of the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network Isolation Protect the private network
26. ion 1 0 0 Client List Application Version 1 0 0 gt VLAN WLAN Settings Network Channel 11 Management ESSID LevelOne Security Disable BSSID 00 02 6F 61 FB 14 Tools Logout To configure AP Mode please select Access Point in System Operation Mode Please refer to 2 1 1 Operation Mode in Page 3 Status View the current wireless connection status and related information Channel 11 OoOo Sa ESSID LevelOne Securty Disable BSSID 00 02 6F 61 FB 14 Basic This page allows you to define Mode Band Multiple ESSID You can also set up a static wireless channel or make Wireless device move to a clean Wireless Channel automatically Radio 9 Enable Disable AP gt 24 Giz pels Enabled SSID Enable Disable 11 10 gt Radio To enable disable radio frequency gt Mode Select and define your device in AP mode or WDS mode v Mode AP To define your AP as a regular AP v Mode WDS AP WDS To define your device work in WDS AP function this mode is to interlink this device with other AP devices in Wireless Distribution System Once you select this mode the table as below will shows up MAC Address 1 000000000000 MAC Address 2 000000000000 MAC Address 3 000000000000 MAC Address 4 000000000000 WDS Data Rate 300M You are allowed to set MAC address and encryption algorithm gt Set Security Please refer to Security in Page 25 for encryp
27. ireless LAN procedure Do not change these settings unless you know what effect the changes will have on your AP Incorrect settings might reduce wireless performance Fragment Threshold RTS Threshold Beacon Interval DTIM Period N Data Rate Channel Bandwidth Preamble Type CTS Protection Tx Power 2346 256 2346 2347 1 2347 100 20 1024 ms 1 1 255 Auto ka Auto 20 40 MHZ 20 MHZ O Long Preamble 9 Short Preamble Auto Always None 100 29 Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 2346 The default value is 2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 0 and 2347 The default value is 2347 Beacon Interval Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Interval value between 25 and 1000 The default value is set to 100 milliseconds DTIM Period A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Period value Wireless clients detect the beacons and a
28. irst DNS Address Specify the primary DNS IP address Second DNS Address Specify the secondary DNS IP address 802 1d Spanning Tree Select Enable or Disable from the drop down list Enabling Spanning tree will avoid redundant data loops DHCP server You may Enable of Disable DHCP server Lease Time Define the maximum usage Start IP Specify the first IP address for the DHCP range End IP Specify the last IP address for the DHCP range Domain Name Specify the last IP address for DHCP range First DNS Address Specify the primary DNS IP address for DHCP server Second DNS Address Specify the secondary DNS IP address for DHCP server 38 Dynamic IP Only work with AP Mode You can enable the device s DHCP server to dynamically allocate IP Addresses to your LAN client PCs The device must have an IP Address for the Local Area Network Dynamic 802 1d Spanning Tree Disabled gt Bridge Type Select Static IP or Dynamic IP from the drop down list If you select Static IP you will be required to specify an IP address and subnet mask If Dynamic IP is selected then the IP address is received automatically from the external DHCP server gt DNS Type Select Dynamic to automatic retrieve DNS IP address or select Static for manually defined gt 802 1d Spanning Tree Select Enable or Disable from the drop down list Enabling spanning tree will avoid redundant data loops 39 2 4 Management 2 4 1 Admin
29. l If you re not using encryption then they could connect to your network When this is disabled you must enter the Wireless Network Name SSID on the client manually to connect to the network gt WMM Choose to Enable or Disable WMM This is the Quality of Service QoS feature for prioritizing voice and video applications gt Encryption Select WPA pre shared key from the drop down list gt WPA Type Select TKIP AES or WPA2 Mixed The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES gt Pre shared Key Type The Key Type can be passphrase or Hex format gt Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection lt cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client 17 gt Encryption WPA RADIUS This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption K
30. ociate to this device elMAC Address Rx Tx Signal Connected Time idle Time VLAN A virtual LAN commonly known as a VLAN is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire regardless of their physical location D Enable Disable 100 1 4094 A Only Available in AP mode gt Virtual LAN Choose to Enable or Disable the VLAN features gt SSID1 Tag Specify the VLAN tag 21 2 2 2 WDS Bridge Configuration A You can only connect to the device via Wireless Client Please click System Operation Mode and Select WDS Bridge before you start the configuration WDS Mode ases os i A WAP 6102 300Mbps N_Max Wireless Ceiling PoE Access Point WDS Bridge Mode You can use the Status page to monitor the connection status for WLAN LAN interfaces firmware and hardware version numbers System Wireless Operation Mode E Status System Time 2009 01 01 00 00 49 System Up Time 42sec Basic Advanced Network Hardware Version 1 0 0 Serial Number 097255338 Management Kernel Version 1 0 0 Tools Application Version 1 0 0 Logout Channel 11 ESSID LevelOne Security Disable BSSID 00 02 6F 61 FB 14 To configure WDS Mode please select WDS Bridge in System Operation Mode Please refer to 2 1 1 Operation Mode in Page 3 Status View the current wireless connection status and related information WLAN Settings
31. omply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IMPORTANT NOTE
32. on Type Open System O Shared Key Key Length 64 bt Key Type ASCII 5 characters Default Key Key 1 Encryption Key 1 Encryption Key 2 Encryption Key 3 Encryption Key 4 31 ESSID Selection As this device supports multiple SSIDs it is possible to configure a different security mode for each SSID profile Select an SSID from the drop down list Broadcast SSID Select Enable or Disable from the drop down list This is the SSID broadcast feature When this option is set to Enable your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When this is disabled you must enter the Wireless Network Name SSID on the client manually to connect to the network WMM Choose to Enable or Disable WMM This is the Quality of Service QoS feature for prioritizing voice and video applications Encryption Select WEP from the drop down list Authentication Type Select Open System Shared Key or auto Authentication method from the drop down list An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted without encryption Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP The device requesting authentication encrypts the challenge text and sends it ba
33. rase This phrase is used to generate session keys that are unique for each wireless client 33 Filter Using MAC Address Filtering could prevent unauthorized MAC Address to associate with the AP Enable Wireless MAC Filtering Description MAC Address Only the following MAC Addresses can use network Description MAC Address Delete Selected Delete All WPS Y Enable Wi Fi Protected Setup Information WPS Current Status Configured Self Pin Code 64212685 34 gt WPS Current Status Display current configuration is configured or un configured The default setting will display un configured status but if any of following occur will display configured status 1 Configuration by an external registrar 2 Automatic configuration by internal registrar 3 Manual configuration by user Self Pin Code Pin code is unique and automatically generated SSID Display wireless network name Authentication Mode Display wireless network authentication types Passphrase Key Display wireless network authentication password WPS Via Push Button Start WPS function from webpage WPS Via PIN Specify wireless client s PIN code to start WPS function VV VV V Y Client List WLAN Client Table This WLAN Client Table shows client MAC address associate to this device MAC Address Rx Tx Signal Connected Time Idle Time No client connecting to the device Refresh 35 2 3 Network
34. ry Latvia Lithuania Malta Slovakia Poland Slovenia Bulgaria Romania Preface This guide is for the experienced user who installs and manages the N_Max WAP 6010 product hereafter referred to as the device To use this guide you should have experience working with the TCP IP configuration and be familiar with the concepts and terminology of wireless local area networks II Table of Content B A O O OA l ls CALE SVAN Benci issia is l Za Paek COMCMIS ponia 2 Ls e 15 2 e TET 55T 11 TTT 2 Za WWE COMO AC OM eects aa E a eaecaa ce oom eenne eee 3 Pele O 3 ZEN Operation Modena es 3 S eT 4 2 1 3 DE A O O O A 5 2 1 4 A coe I A A ear cg A E 5 2 1 5 Event A o ue saadquitmet da aonseaehedatiedeatavantannanetesaands 6 2 1 6 MOTOT onae caos 7 DD s Tea SS ts a eo ea etter ee ead esse eee eee ee ee 9 22 1 INC CESS POM COM IVS UT ANON T 9 22 2 WDS Bride Coni UraliOn iaa 22 223 Universal Repeater Configuration nesramen iinei a i 21 a N NNO a E E R E ERE TT 36 E A rn E AEE a A T E 36 E a ETT 37 Za Mana Oia 40 2 4 1 IE E E E 40 2 4 2 SAM O 41 2 4 3 TREAN ANS AE A N E E E E E E A E tases 42 2 4 4 CONSULTE rt AA AA a a a N 42 2 4 5 EAE S E E E E E EAE E 43 S TOO T 44 2 31 DATS S61 i e ds scmscadaoiseadeataseataustaetiades 44 Za Dada POWer Savall dai 45 2 95 DA SINC TT 45 2 5 4 LEDC ONTO e mene E A A E Nena eae 46 ZO LOPO in E is 46 Appendix A SPECIFICATIONS opi A a a 47 Appendix B FCC
35. the Wireless Network Name SSID on the client manually to connect to the network WMM Choose to Enable or Disable WMM This is the Quality of Service QoS feature for prioritizing voice and video applications Encryption Select WEP from the drop down list Authentication Type Select Open System Shared Key or auto Authentication method from the drop down list An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted without encryption Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP The device requesting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Key Length Select a 64 bit or 128 bit WEP key length from the drop down list Key Type Select a key type from the drop down list 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember Default Key You may choose one of your 4
36. tion configuration gt Band Configure the device into different wireless modes v 2 4 GHz B v 2 4 GHz N v 2 4 GHz B G v 2 4 GHz G v 2 4 GHz B G N Enabled SSID The device allows you to add up to 4 unique SSID ESSID Description of each configured SSID Auto Channel To enable disable devices auto detect channel used Y V V Y Check Cannel Time Channel When Auto Channel is enabled you can configure the channel detection interval When Auto Channel is disabled you can manually configure a channel to be used 11 Advanced These settings are only for expert user who is familiar with Wireless LAN procedure Do not change these settings unless you know what effect the changes will have on your AP Incor settings might reduce wireless performance Fragment Threshold 2346 256 2346 RTS Threshold 2347 1 2347 Beacon Interval 100 20 1024 ms TIM Period 1 1 255 N Data Rate Auto lt Channel Bandwidth Auto 20 40 MHZ 20 MHZ Long Preamble Short Preamble Auto Always None 100 D Enable 2 Disable 12 Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 2346 The default value is 2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrad
37. waken to receive the broadcast and multicast messages The default value is 1 Valid settings are between 1 and 10 N Data Rate You may select N data rate from the drop down list however it is recommended to select auto Channel Bandwidth Select channel bandwidth Preamble Type Select a short or long preamble For optimum performance it is recommended to also configure the client device as the same preamble type CTS Protection CTS Clear to Send can be always enabled auto or disabled By enabled CTS the Access Point and clients will wait for a clear signal before transmitting It is recommended to select auto Tx Power You may control the transmit output power of the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network 30 Security gt Encryption Disabled This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption Keys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne Enable lt Enable Disable Apply gt Encryption WEP This page allows you setup the wireless security You can turn on WEP or WPA by using Encryption Keys besides you can enable 802 1x Authentication or RADIUS to coordinate with RADIUS server ESSID Selection LevelOne Broadcast ESSID Enable Enable Encryption WEP Authenticati
38. with current configuration unaffected In the event the system stops responding correctly or stops functioning you can perform a reset Your settings will not be changed To perform the reset click on the APPLY button You will be asked to confirm your decision The reset will be completed when the LED Power light stops blinking 43 2 5 Tools 2 5 1 Time Setting This feature allows you to configure update and maintain the correct time on the device s internal system clock as well as configure the time zone The date and time of the device can be configured manually or by synchronizing with a time server A If the device losses power for any reason it will not be able to keep its clock running and will not display the correct time once the device has been restarted Therefore you must re enter the correct date and time The device reads the correct time from NTP servers on the Internet and sets its system clock accordingly The Daylight Savings option merely advances the system clock by one hour The time zone setting is used by the system clock when displaying the correct time in schedule and the log files Time Zone GMT Greenwich Mean Time Dublin Edinburgh Lisbon London lt NTP Time Server Enable From January 1 To January 1 Daylight Saving Apply Reset gt Time Zone Select time zone gt NTP Time Server Specify the NTP server s IP address for time synchronization gt Daylight Saving
39. ystem Making wireless AP and Bridge mode simultaneously as a wireless repeater Universal Repeater The easiest way to your wireless network s coverage Support Multi SSID function 4 Allowing clients to access different networks through a SSID in AP mode single access point and to assign different policies and functions for each SSID by manager WPA2 WPA Powerful data security MAC address filtering in AP mode Ensuring secure network connection User isolation support AP mode Protecting the private network between client users Helping administrators to remotely configure or manage Management the Access Point easily Enhancing user performance and density 1 1 2 Package Contents The package contains the following items In case of return please keep the original box set and the complete box set must be included for full refund gt 1 WAP 6102 gt 112V 1A 100V 240V Power Adapter gt 1 CD ROM with User s Manual gt 1 Quick Installation Guide gt 1 Cats UTP Cable gt 2 Mounting Bracket gt 2 Screws 1 3 System Requirement The following are the minimum system requirements in order to configure the device gt PC AT compatible computer with an Ethernet interface gt Operating system that supports HTTP web browser 2 Web Configuration 2 1 System 2 1 1 Operation Mode You are allowed to configure WAP 6102 into different modes AP WDS Bridge and Universal Repeater Operation Mode Operation Mode A
Download Pdf Manuals
Related Search
Related Contents
opa103VTech.fr Mini-souris mémoire 800 avec mémoire Flash 8.5 cm 8.5 cm Patrick Declerck (Decomo) - Union Wallonne des Entreprises AX100700 Elo Touch Solution X3-15 Mise en page 1 User manual . 取扱説明書 N706iⅡ Viticoltura Copyright © All rights reserved.
Failed to retrieve file