background image

11b/g Wireless Outdoor Multi-Client Bridge/AP 

 

 

                                       Version 1.0 

 

 

 53 

 

Appendix C – Index 

 

128-bit, 4, 22, 23, 38, 39 

802.11b, 4, 21, 38, 50 
802.11d, 24 
802.11g, 4, 21, 38, 50 
802.1x, 4, 40 

ACK Timeout, 22, 38 
Ad-hoc, 6, 21 
Administrator Settings, 12, 17, 31, 35 
Advanced Wireless Settings, 24 
Applications, 6 
ASCII, 22, 24, 38, 40 

Beacon Period, 42 
Bridge Name, 13, 25 
Broadcast, 46 

Channel, 20, 21, 38 
Client Bridge Mode, 10, 50 
Community Name, 26, 43 

DHCP, 4, 10, 26, 27, 30, 44, 45, 46, 50 
dipole antenna, 5, 50 
DITM Interval, 42 
DNS, 45 

Features & Benefits, 4 
Filter, 30, 47 
Firmware Upgrade, 16, 33, 50 
Fragment Threshold, 25, 42 

Grounding Cable, 5, 50 

Hardware Installation, 8 
HEX, 22, 38 

Infrastructure, 6, 7, 21, 50 
Infrastructure Mode, 7 
IP Address Configuration, 8 

LAN Settings, 26 

Logging In, 10, 30 
Logs, 29, 30, 48 

MAC Address, 20, 41, 43, 46, 47 
mounting, 5, 50 

Network Configuration, 6 
NIC, 8 

Open, 5, 23, 39 
operation mode, 20 

Package Contents, 5 
Password, 10, 30 
PoE, 5, 8, 50 
Power Injector, 5, 50 
Privacy, 20, 22, 23, 38, 39, 40 

RADIUS, 40, 41, 50 
Restore Settings to Default, 17, 18, 35 
Restore the Configuration from a File, 14, 33 
RTS Threshold, 25, 42 

Save Configuration to a File, 14, 32 
Shared Key., 23, 39 
Signal, 20 
site survey, 8 
SNMP, 20, 25, 26, 43, 50 
SSID, 4, 11, 20, 21, 38, 50 
Static, 26, 27, 44 
Statistics, 10, 28, 30, 49 
subnet mask, 9 
Switch from Bridge to AP Mode, 15 
System, 5, 10, 12, 16, 17, 18, 30, 31, 33, 35, 37, 43 
System Requirements, 5 

Transmission Rate, 21, 38 
Transmit Power, 25, 43 
Trap, 26, 43 

User Name, 10, 30 

WDS, 4, 42, 43, 50 
Wireless Network Settings, 20, 38 
Wireless Security, 22 
WPA, 4, 20, 22, 23, 24, 38, 39, 40, 41, 43, 50 

 

Summary of Contents for 11b/g Wireless Outdoor Multi-Client Bridge/AP

Page 1: ...________ 11b g Wireless Outdoor Multi Client Bridge AP User s Manual Version 1 0...

Page 2: ...S NETWORK SETTINGS 21 3 3 2 INFRASTRUCTURE AD HOC MODE 22 3 3 3 WIRELESS SECURITY 23 3 3 3 1 1 WEP WIRED EQUIVALENT PRIVACY 23 3 3 3 1 2 WPA PERSONAL WI FI PROTECTED ACCESS 24 3 3 4 ADVANCED WIRELESS...

Page 3: ..._______ Table of Contents 4 4 LAN 45 4 5 DHCP SERVER 46 4 6 MAC ADDRESS FILTER 48 4 7 LOGS 49 4 8 STATISTICS 50 APPENDIX A SPECIFICATIONS 51 APPENDIX B FCC INTERFERENCE STATEMENT 52 APPENDIX C INDEX 5...

Page 4: ...________ Revision History Version Date Notes 1 0 August 12 2007 Initial Version...

Page 5: ...etwork This chapter describes the features benefits package contents applications and network configuration 1 1 Features Benefits Features Benefits High Speed Data Rate Up to 54Mbps Capable of handlin...

Page 6: ...oor Wireless Client Bridge unit 48V 0 375A AC DC adapter with wall plug power code One 5dBi SMA dipole antenna Inline Power Injector PoE 1 8m Grounding Cable User manual CD disc Wall mounting kit Mast...

Page 7: ...ng sites where frequently rearrange the workplace e Small Office and Home Office SOHO networks SOHO users need a cost effective easy and quick installation of a small network f Wireless extensions to...

Page 8: ...The image below depicts a network in ad hoc mode b Infrastructure Mode The infrastructure mode requires the use of an access point AP In this mode all wireless communication between two computers has...

Page 9: ...r into the port labeled DC IN and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 IP Address Configuration This device can be configured as a Bridge...

Page 10: ...ur PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Exam...

Page 11: ...will graphical user interface GUI of the bridge The navigation drop down menu on left is divided into six main sections 1 System This menu includes the administrator settings Also included are other...

Page 12: ...firmware LAN IP address and MAC address and the wireless settings such as the radio status MAC address SSID RF channel and security General o Displays firmware version and system date LAN o Displays t...

Page 13: ...password to access this device from the web browser You can also specify a name for the bridge as well as backup and restore the system settings The first part of this page gives you the option to sa...

Page 14: ...ame for this device as well as save or restore a configuration Click on the Save Settings button to store the changes Bridge Name Specify a name for this bridge Web Idle Timeout Specify a time in minu...

Page 15: ...n in the dialog box 3 2 1 2 Restore the Configuration from a File This option allows you to restore a backup configuration from a file to the device Click on the Browse button to select the file and t...

Page 16: ...ss Point mode Click on the Switch Device to AP Mode and then you will see a confirmation dialog box Click on the OK button to continue Please wait while the system is rebooting Note Do no un plug the...

Page 17: ...nsure that you have downloaded the appropriate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface...

Page 18: ...ttings Therefore you may need to restore a configuration from a file Refer to Administrator Settings for details 3 2 3 System Reboot and Restore Settings to Default Click on the System link under the...

Page 19: ...current settings will be lost 3 2 4 System Time Configuration Click on the Time link under the System menu This feature allows you to configure update and maintain the correct time on the device s int...

Page 20: ...ect your time zone from the drop down list Set the Date and Time Select a date and time from the drop down list or do to use computer s time and date click on the Copy Your Computer s Time Settings bu...

Page 21: ...and cannot exceed 32 characters Channel The channel used to communicate on the wireless network Mode Frequency and IEEE 802 11 operation mode b only g only or b g Privacy The type of security used on...

Page 22: ...l on all points of the wireless network and cannot exceed 32 characters Channel Select a channel from the drop down list The channels available are based on the country s regulation When selecting Inf...

Page 23: ...the WEP radio button if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless netwo...

Page 24: ...sting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is...

Page 25: ...egotiates the cipher type with the access point and uses AES when available Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for I...

Page 26: ...change Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 65535 The default value is 2346 RTS Thre...

Page 27: ...s Send SNMP Trap Select Enable if you would like to receive SNMP traps Send Trap To Specify the IP address that would receive the SNMP traps Trap Community Name Specify the password for the SNMP trap...

Page 28: ...r DHCP server If you select the Static radio button you must enter the IP address subnet mask and default gateway IP Address Enter an IP address for this device Subnet Mask Enter the subnet mask for t...

Page 29: ...ue to errors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collision...

Page 30: ...on the system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the...

Page 31: ...and password configured by default therefore please leave user name and password field blank and then click on the Login button After logging in you will graphical user interface GUI of the Access Po...

Page 32: ...ime Each option is described below 4 2 1 Administrator Settings Click on the Administrator Settings link under the System menu This page allows you to configure the password to access this device from...

Page 33: ...4 2 1 1 Save Configuration to a File This option allows you to save the current configuration of the device into a file Click on the Save Configuration button to begin Save the file on your local dis...

Page 34: ...stem then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no un plug the device during this p...

Page 35: ...interface Click on the Browse button to select the firmware and then click on the Upload button The above dialog box requests you to confirm the upgrade process Click on the OK button to continue Onc...

Page 36: ...reboot the device using the current settings or restore all the settings to the factory defaults 4 2 3 1 System Reboot Click on the Reboot the Device button to reboot the device using its current sett...

Page 37: ...f the device is 192 168 1 2 in Access Point mode This section will describe the steps to switch from Access Point to Bridge mode Click on the Switch Device to Bridge Mode and then you will see a confi...

Page 38: ...em clock as well as configure the time zone The date and time of the device can be configured manually or by copying the time on the PC that it is wired to Note If the device losses power for any reas...

Page 39: ...the wireless network will be using only IEEE 802 11g clients then it is recommended to select 802 11g only instead of Mixed 802 11g and 802 11b which will reduce the performance of the wireless networ...

Page 40: ...d challenge text string to any device attempting to communicate with the AP The device requesting authentication encrypts the challenge text and sends it back to the access point If the challenge text...

Page 41: ...n It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are...

Page 42: ...type with the access point and uses AES when available Group Key Update Interval Specify the number of seconds before the group key used for broadcast and multicast data is changed Authentication Time...

Page 43: ...346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value be...

Page 44: ...the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel number WDS AP MAC Address Specify one half of the WDS link The other AP must also...

Page 45: ...following fields Choose Static IP Manual if your router does not support DHCP or if for any other reason you need to assign a fixed address to this device Note You cannot choose DHCP Dynamic if you ha...

Page 46: ...a DHCP Server DHCP IP Address Range Enter the first and last IP address of the range Make sure that the range is on the same subnet as the device These two IP values from and to define a range of IP...

Page 47: ...o all clients thereby working around the problem at the cost of increased broadcast traffic on the LAN Click on the Save Settings button once you have modified the settings Enable DHCP Reservation You...

Page 48: ...tting from the drop down list When only allow listed machines is selected only computers with MAC addresses listed in the MAC Address List are granted network access When only deny listed machines is...

Page 49: ...e system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the appro...

Page 50: ...errors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collisions The...

Page 51: ...bps 95dBm Available transmit power Typical 2 412 2 472G 802 11g 27dBm 6 24Mbps 25dBm 36Mbps 24 dBm 48Mbps 23dBm 54Mbps 2 412 2 472G 802 11b 28 dBm 1 2 5 5 and 11Mbps RF Connector SMA Female Reverse Ty...

Page 52: ...following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which...

Page 53: ...structure Mode 7 IP Address Configuration 8 L LAN Settings 26 Logging In 10 30 Logs 29 30 48 M MAC Address 20 41 43 46 47 mounting 5 50 N Network Configuration 6 NIC 8 O Open 5 23 39 operation mode 20...

Reviews: