background image

11b/g Wireless Outdoor Multi-Client Bridge/AP 

 

 

                                       Version 1.0 

 

 

 23 

 

 

ACK Timeout

: You may specify a value for the acknowledge timeout.  However, it is 

recommended to use the default setting: 48. 

 

Click on the 

Save Settings

 button once you have modified the settings. 

 

3.3.3 Wireless Security 

 

Click on the 

Wireless_Setting

 link under the 

Wireless

 menu. The third part of this 

page allows you to configure the security settings of this device.  To protect your 
privacy this mode supports two types of wireless security: WEP and WPA-Personal. 
WEP is the original wireless encryption standard. WPA provides a higher level of 
security. WPA-Personal does not require an authentication server.  

 

Select the 

None

 radio button in order to disable security.  

 

 

 
 
 

3.3.3.1.1 

WEP (Wired Equivalent Privacy) 

 

Select the 

WEP

 radio button if your wireless network uses WEP encryption. WEP is 

an acronym for Wired Equivalent Privacy, and is a security protocol that provides the 
same level of security for wireless networks as for a wired network. 

 

WEP is not as secure as WPA encryption. To gain access to a WEP network, you 
must know the key. The key is a string of characters that you create. When using 
WEP, you must determine the level of encryption. The type of encryption determines 
the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys 
are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) 
or ASCII (American Standard Code for Information Interchange - alphanumeric 
characters) format. ASCII format is provided so you can enter a string that is easier 
to remember. The ASCII string is converted to HEX for use over the network. Four 
keys can be defined so that you can change keys easily. A default key is selected for 
use on the network. 

 
 
 
 
 
 
 
 
 
 
 
 

 
 
 

Summary of Contents for EOC-3610s-EXT

Page 1: ...________ 11b g Wireless Outdoor Multi Client Bridge AP User s Manual Version 1 0 ...

Page 2: ...SS NETWORK SETTINGS 21 3 3 2 INFRASTRUCTURE AD HOC MODE 22 3 3 3 WIRELESS SECURITY 23 3 3 3 1 1 WEP WIRED EQUIVALENT PRIVACY 23 3 3 3 1 2 WPA PERSONAL WI FI PROTECTED ACCESS 24 3 3 4 ADVANCED WIRELESS SETTINGS 25 3 3 5 SNMP 26 3 4 LAN SETTINGS STATIC DHCP 27 3 5 STATISTICS 29 3 6 LOGS 30 4 ACCESS POINT MODE WEB CONFIGURATION 31 4 1 LOGGING IN 31 4 2 SYSTEM 32 4 2 1 ADMINISTRATOR SETTINGS 32 4 2 1 ...

Page 3: ...________ Table of Contents 4 4 LAN 45 4 5 DHCP SERVER 46 4 6 MAC ADDRESS FILTER 48 4 7 LOGS 49 4 8 STATISTICS 50 APPENDIX A SPECIFICATIONS 51 APPENDIX B FCC INTERFERENCE STATEMENT 52 APPENDIX C INDEX 53 ...

Page 4: ...________ Revision History Version Date Notes 1 0 August 12 2007 Initial Version ...

Page 5: ...network This chapter describes the features benefits package contents applications and network configuration 1 1 Features Benefits Features Benefits High Speed Data Rate Up to 54Mbps Capable of handling heavy data payloads such as MPEG video streaming EIRP up to 33dB with 5dBi Antenna Gain Spreads the operation distance and reduce the roaming between APs to get more stability wireless connection E...

Page 6: ...door Wireless Client Bridge unit 48V 0 375A AC DC adapter with wall plug power code One 5dBi SMA dipole antenna Inline Power Injector PoE 1 8m Grounding Cable User manual CD disc Wall mounting kit Mast mounting kit 1 3 Bridge AP Description 1 4 System Requirements The following are the minimum system requirements in order configure the device PC AT compatible computer with a Ethernet interface Ope...

Page 7: ...ing sites where frequently rearrange the workplace e Small Office and Home Office SOHO networks SOHO users need a cost effective easy and quick installation of a small network f Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves extensions to networks and other changes with wireless LANs g Wired LAN backup Network managers im...

Page 8: ... The image below depicts a network in ad hoc mode b Infrastructure Mode The infrastructure mode requires the use of an access point AP In this mode all wireless communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater whi...

Page 9: ...er into the port labeled DC IN and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 IP Address Configuration This device can be configured as a Bridge Router or Access Point The default IP address of the device is 192 168 1 1 Client Bridge mode 192 168 1 2 Access Point mode In order to log into this device you must first configure the TCP IP setti...

Page 10: ...our PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example Device IP address 192 168 1 1 192 168 1 2 PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Page 11: ...u will graphical user interface GUI of the bridge The navigation drop down menu on left is divided into six main sections 1 System This menu includes the administrator settings Also included are other system related settings such as firmware upgrade reset to factory defaults and system date time configuration 2 Wireless This menu includes the settings such as network type infrastructure ad hoc dat...

Page 12: ... firmware LAN IP address and MAC address and the wireless settings such as the radio status MAC address SSID RF channel and security General o Displays firmware version and system date LAN o Displays the MAC address IP address and subnet mask of the LAN interface Wireless LAN o Displays the status MAC address SSID RF channel and security settings of the wireless interface ...

Page 13: ...e password to access this device from the web browser You can also specify a name for the bridge as well as backup and restore the system settings The first part of this page gives you the option to save the changes that were made on this page Click on the Save Settings button once you have configured the administrator settings The second part of this page allows you to configure the user name and...

Page 14: ...name for this device as well as save or restore a configuration Click on the Save Settings button to store the changes Bridge Name Specify a name for this bridge Web Idle Timeout Specify a time in minutes If there is no activity on the configuration pages then web page will close the session at the specified time ...

Page 15: ...on in the dialog box 3 2 1 2 Restore the Configuration from a File This option allows you to restore a backup configuration from a file to the device Click on the Browse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the sy...

Page 16: ...ess Point mode Click on the Switch Device to AP Mode and then you will see a confirmation dialog box Click on the OK button to continue Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage Once the device has restarted you may need to access the management page through a different IP address The default IP address for Access...

Page 17: ...Ensure that you have downloaded the appropriate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface Click on the Browse button to select the firmware and then click on the Upload button The above dialog box requests you to confirm the upgrade process Click on the OK button to continue Once you clic...

Page 18: ...ettings Therefore you may need to restore a configuration from a file Refer to Administrator Settings for details 3 2 3 System Reboot and Restore Settings to Default Click on the System link under the System menu This page allows you to reboot the device using the current settings or restore all the settings to the factory defaults 3 2 3 1 System Reboot Click on the Reboot the Device button to reb...

Page 19: ... current settings will be lost 3 2 4 System Time Configuration Click on the Time link under the System menu This feature allows you to configure update and maintain the correct time on the device s internal system clock as well as configure the time zone The date and time of the device can be configured manually or by copying the time on the PC that it is wired to Note If the bridge losses power f...

Page 20: ...lect your time zone from the drop down list Set the Date and Time Select a date and time from the drop down list or do to use computer s time and date click on the Copy Your Computer s Time Settings button Click on the Save Settings button once you have modified the settings ...

Page 21: ... and cannot exceed 32 characters Channel The channel used to communicate on the wireless network Mode Frequency and IEEE 802 11 operation mode b only g only or b g Privacy The type of security used on this network It may be disabled WEP WPA etc Type Wireless configuration mode such as Ad Hoc or AP Signal The wireless signal strength Signal quality can be reduced by distance by interference from ot...

Page 22: ...al on all points of the wireless network and cannot exceed 32 characters Channel Select a channel from the drop down list The channels available are based on the country s regulation When selecting Infrastructure mode a channel is not required however when selecting Adhoc mode you must select the same channel on all points Transmission Rate Select a transmission rate from the drop down list It is ...

Page 23: ...t the WEP radio button if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network WEP is not as secure as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create When using WEP you must deter...

Page 24: ...esting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Click on the Save Settings button once you have modified the settings 3 3 3 1 2 WPA Personal Wi Fi Protected Access Se...

Page 25: ...negotiates the cipher type with the access point and uses AES when available Pre Shared Key The key is entered as a pass phrase of up to 63 alphanumeric characters in ASCII American Standard Code for Information Interchange format at both ends of the wireless connection It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a common...

Page 26: ...t change Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 65535 The default value is 2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 1 and...

Page 27: ...ss Send SNMP Trap Select Enable if you would like to receive SNMP traps Send Trap To Specify the IP address that would receive the SNMP traps Trap Community Name Specify the password for the SNMP trap community Click on the Save Settings button once you have modified the settings 3 4 LAN Settings Static DHCP Click on the LAN link on the navigation drop down menu This feature allows you to configur...

Page 28: ...or DHCP server If you select the Static radio button you must enter the IP address subnet mask and default gateway IP Address Enter an IP address for this device Subnet Mask Enter the subnet mask for this IP address Default Gateway Enter the IP address of the default gateway Click on the Save Settings button once you have modified the settings Note If you change the IP address here you may need to...

Page 29: ...due to errors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause l...

Page 30: ... on the system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the appropriate box Then click on the Apply Log Settings Now button Log Details The events are logged in this section Click on the Refresh button to refresh the events or click on the Clear button to cle...

Page 31: ...e and password configured by default therefore please leave user name and password field blank and then click on the Login button After logging in you will graphical user interface GUI of the Access Point The navigation drop down menu on left is divided into seven main sections 1 System This menu includes system related settings such as firmware upgrade reset to factory defaults system date time c...

Page 32: ...Time Each option is described below 4 2 1 Administrator Settings Click on the Administrator Settings link under the System menu This page allows you to configure the password to access this device from the web browser You can also backup and restore the system settings Specify a user name and password and then re type it once again for verification Click on the Save Settings button to store the ch...

Page 33: ...3 4 2 1 1 Save Configuration to a File This option allows you to save the current configuration of the device into a file Click on the Save Configuration button to begin Save the file on your local disk by using the Save or Save to Disk button in the dialog box ...

Page 34: ...ystem then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage 4 2 2 Firmware Upgrade Click on the Firmware link under the System menu This page allows you to upgrade the firmware of the device in order to improve the fu...

Page 35: ...s interface Click on the Browse button to select the firmware and then click on the Upload button The above dialog box requests you to confirm the upgrade process Click on the OK button to continue Once you click on the OK button you will return to the previous page which indicates that the upgrade process may take up to one minute After a few seconds the firmware will start to re program the devi...

Page 36: ... reboot the device using the current settings or restore all the settings to the factory defaults 4 2 3 1 System Reboot Click on the Reboot the Device button to reboot the device using its current settings Once the dialog box appears click on the OK button to confirm the action 4 2 3 2 Restore Settings to Default Click on the Restore all Settings to Factory Defaults button This option restores al ...

Page 37: ...of the device is 192 168 1 2 in Access Point mode This section will describe the steps to switch from Access Point to Bridge mode Click on the Switch Device to Bridge Mode and then you will see a confirmation dialog box Click on the OK button to continue Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage ...

Page 38: ...tem clock as well as configure the time zone The date and time of the device can be configured manually or by copying the time on the PC that it is wired to Note If the device losses power for any reason it will not be able to keep its clock running and will not display the correct time once the device has been restarted Therefore you must re enter the correct date and time Time Zone Select your t...

Page 39: ... the wireless network will be using only IEEE 802 11g clients then it is recommended to select 802 11g only instead of Mixed 802 11g and 802 11b which will reduce the performance of the wireless network Click on the Save Settings button once you have modified the settings ACK Timeout You may specify a value for the acknowledge timeout However it is recommended to use the default setting 48 4 3 1 1...

Page 40: ...ed challenge text string to any device attempting to communicate with the AP The device requesting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Click on the Save Settings...

Page 41: ...on It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Click on the Save Settings button once you have modified the settings 4 3 1 3 WPA Enterprise Wi Fi Protected Access 802 1x Select the WPA Enterprise radio button if y...

Page 42: ... type with the access point and uses AES when available Group Key Update Interval Specify the number of seconds before the group key used for broadcast and multicast data is changed Authentication Timeout Specify the number of minutes after which the client will be required to re authenticate RADIUS Server IP Address Specify the IP address of the RADIUS server RADIUS Server Port Specify the port n...

Page 43: ...2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Specify a value between 1 and 65535 The default value is 2346 Beacon Period Beacons are packets sent by a wireless Access Point to synchronize wireless devices Specify a Beacon Period value between 20 and 1000 The def...

Page 44: ... the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel number WDS AP MAC Address Specify one half of the WDS link The other AP must also have the MAC address of this AP to create the WDS link back to this AP Click on the Save Settings button once you have modified the settings 4 3 3 SNMP Click on the SNMP link under the Wireless menu ...

Page 45: ... following fields Choose Static IP Manual if your router does not support DHCP or if for any other reason you need to assign a fixed address to this device Note You cannot choose DHCP Dynamic if you have enabled the DHCP Server option on the DHCP page this device cannot be both a DHCP client and a DHCP server IP Address Enter an IP address for this device Subnet Mask Enter the subnet mask for this...

Page 46: ...s a DHCP Server DHCP IP Address Range Enter the first and last IP address of the range Make sure that the range is on the same subnet as the device These two IP values from and to define a range of IP addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network Any addresses that are outside of this range are not managed by the DHCP Server these ...

Page 47: ...to all clients thereby working around the problem at the cost of increased broadcast traffic on the LAN Click on the Save Settings button once you have modified the settings Enable DHCP Reservation You may use this feature to reserve a specific IP address for a specific MAC address node Place a check in this box to enable this feature IP Address Specify the IP address MAC Address Specify the MAC a...

Page 48: ...etting from the drop down list When only allow listed machines is selected only computers with MAC addresses listed in the MAC Address List are granted network access When only deny listed machines is selected any computer with a MAC address listed in the MAC Address List is refused access to the network Filter Wireless Clients Place a check in this box if you would like to filter wireless clients...

Page 49: ...he system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the appropriate box Then click on the Apply Log Settings Now button Log Details The events are logged in this section Click on the Refresh button to refresh the events or click on the Clear button to clear th...

Page 50: ...o errors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss o...

Page 51: ...Mbps 95dBm Available transmit power Typical 2 412 2 472G 802 11g 27dBm 6 24Mbps 25dBm 36Mbps 24 dBm 48Mbps 23dBm 54Mbps 2 412 2 472G 802 11b 28 dBm 1 2 5 5 and 11Mbps RF Connector SMA Female Reverse Type Networking Topology Ad Hoc Infrastructure Operation Mode Point to Point Point to Multipoint Bridge AP Client Bridge WDS Interface One 10 100 RJ 45 port One console RS 232 port Security IEEE802 1x ...

Page 52: ...e following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance co...

Page 53: ...astructure Mode 7 IP Address Configuration 8 L LAN Settings 26 Logging In 10 30 Logs 29 30 48 M MAC Address 20 41 43 46 47 mounting 5 50 N Network Configuration 6 NIC 8 O Open 5 23 39 operation mode 20 P Package Contents 5 Password 10 30 PoE 5 8 50 Power Injector 5 50 Privacy 20 22 23 38 39 40 R RADIUS 40 41 50 Restore Settings to Default 17 18 35 Restore the Configuration from a File 14 33 RTS Th...

Reviews: