background image

www.lanpro.com

Wireless - Equipment - 2.4 GHz - LP-1522 User Manual 

33

4

Frequently Asked Questions (FAQ)

What and how to fi nd my PC’s IP and MAC address?

IP address is the identifi er for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route 

messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written 

as four numbers separated by periods. Each number can be zero to 255. For example, 191.168.1.254 could be an IP 

address.

The MAC (Media Access Control) address is your computer’s unique hardware number. (On an Ethernet LAN, it’s the 

same as your Ethernet address.) When you’re connected to the Internet from your computer (or host as the Internet 

protocol thinks of it), a correspondence table relates your IP address to your computer’s physical (MAC) address on 

the LAN.

To fi nd your PC’s IP and MAC address:

- Open the Command program in the Microsoft Windows.

- Type in ipconfi g /all then press the Enter button.

- Your PC’s IP address is the one entitled IP Address and your PC’s MAC address is the one entitled PhysicalAddress.

4.1

What is Wireless LAN?

A wireless LAN (WLAN) is a network that allows access to Internet without the need for any wired connections to the 

user’s machine.

What are ISM bands?

ISM stands for Industrial, Scientifi c and Medical; radio frequency bands that the Federal Communications Commission 

(FCC) authorized for wireless LANs. The ISM bands are located at 915 +/- 13 MHz, 2450 +/- 50 MHz and 5800 +/- 75 MHz.

How does wireless networking work?

The 802.11 standard defi ne two modes: infrastructure mode and ad hoc mode. In infrastructure mode, the wireless 

network consists of at least one access point connected to the wired network infrastructure and a set of wireless end 

stations. This confi guration is called a Basic Service Set (BSS). An Extended Service Set (ESS) is a set of two or more 

BSSs forming a single subnetwork. Since most corporate WLANs require access to the wired LAN for services (fi le

servers, printers, Internet links) they will operate in infrastructure mode.

Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 

wireless stations that communicate directly with one another without using an access point or any connection to a 

wired network. This mode is useful for quickly and easily setting up a wireless network anywhere that a wireless 

infrastructure does not exist or is not required for services, such as a hotel room, convention center, or airport, or 

where access to the wired network is barred (such as for consultants at a client site).

What is BSSID?

A  six-byte  address  that  distinguishes  a  particular  a  particular  access  point  from  others.  Also  know  as  just  SSID. 

Serves as a network ID or name.

4.2

4.3

4.4

4.5

What is ESSID?

The Extended Service Set ID (ESSID) is the name of the network you want to access. It is used to identify different 

wireless networks.

4.6

Summary of Contents for LP-1522

Page 1: ...gh Speed Long Range 802 11b g 54Mbps Wireless Broadband AP and Router High Power 800mW with External Antenna LP1522_UM_ENB02W LP 1522 User Manual High Speed Long Range 802 11b g 54Mbps Wireless Broadb...

Page 2: ...use harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following...

Page 3: ...ons Commission FTP File Transfer Protocol IEEE Institute of Electrical and Electronic Engineers IKE Internet Key Exchange IP Internet Protocol ISM Industrial Scienti c and Medical LAN Local Area Netwo...

Page 4: ...t ready for eld installation The Wireless LAN Broadband LanPro 1522 Router is an affordable IEEE 802 11b g wireless LAN broadband router solution setting SOHO and enterprise standard for high performa...

Page 5: ...2 Installation 1 2 1 3 Package contents The package of the LP 1522 WLAN Broadband Router includes the following items The LP 1522 WLAN Broadband Router The AC to DC power adapter The Documentation CD...

Page 6: ...og box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IP Address 192 168...

Page 7: ...wing example IP Address 192 168 1 1 IP address within the range of 192 168 1 1 to 192 168 1 253 is used to connect the WLAN AP Router IP Subnet Mask 255 255 255 0 7 For Microsoft Windows NT 1 Click th...

Page 8: ...e of WLAN AP Router and haredamong its service area so all device sat tempts to join the samewireless network can identify it Channel Number It shows the wireless channel connected currently Encryptio...

Page 9: ...in IP by PPPoE PPTP connection IP Address It shows the IP address of WAN interface of WLAN AP Router Subnet Mask It shows the IP subnet mask of WAN interface of WLAN AP Router Default Gateway It shows...

Page 10: ...Zone Setting This page is used to enable and con gure NTP client Screen snapshot Time Zone Settings III LAN Interface Setup Screen snapshot LAN Interface Setup 10 IV WAN Interface Setup This page is...

Page 11: ...and Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client Screen snapshot Wireless Basic Settings VI Wireless Security Setup This page is used to con gure wireless security Scr...

Page 12: ...Screen snapshot Wireless Basic Settings Item Description Disable Wireless LAN Interface Click on to disable the wireless LAN data transmission Band Click to select 2 4GHz B 2 4GHz G 2 4GHz B G Mode Cl...

Page 13: ...Interval Data Rate Select the transmission data rate from pull down menu Data rate can be auto select 11M 5 5M 2M or IMbps Preamble Type Click to select the Long Preamble or Short Preamble support on...

Page 14: ...ode with Enterprise RADIUS or Personal Pre Shared Key Refer to 4 15 What is Wi Fi Protected Access WPA Pre Shared Key Format While Encryption is selected to be WPA Select the Pre shared key format fro...

Page 15: ...ant text ASCII and hexadecimal HEX code Default Tx Key Set the default secret key for WEP security function Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security encryption...

Page 16: ...bility Comment Fill in the comment tag for the registered client Apply Changes Click the Apply Changes button to register the client to new con guration setting Reset Click the Reset button to abort c...

Page 17: ...ty Click button to con gure wireless security like WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None Show Statistics It shows the TX RX packets rate statistics Delete Selected Click to delete the selec...

Page 18: ...ge is used to view or con gure other APs near yours Screen snapshot Wireless Site Survey Item Description SSID It shows the SSID of AP BSSID It shows BSSID of AP Channel It show the current channel of...

Page 19: ...able window that shows the active clients with their assigned IP address MAC address and time expired information Server mode only 802 Id Spanning Tree Select to enable or disable the IEEE 802 Id Span...

Page 20: ...data packets DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in t...

Page 21: ...f Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Refer to 4 24 What is Clone MAC Address Enabl...

Page 22: ...button manually and clicking the Disconnect button manually Idle Time If you select the PPPoE and Connect on Demand connection type ll in the idle time for auto disconnect function Value can be betwe...

Page 23: ...er MTU Size Fill in the mtu size of MTU Size The default value is 1400 Refer to 4 23 What is Maximum Transmission Unit MTU Size Attain DNS Automatically Click to select getting DNS address for PPTP su...

Page 24: ...ck to enable the port ltering security function Port Range Protocol Comments To restrict data transmission from the local network on certain ports ll in the range of start port and end port and the pr...

Page 25: ...also put your comments on it Apply Changes Click the Apply Changes button to register the ports to port ltering list Reset Click the Reset button to abort change and recover the previous con guration...

Page 26: ...d the NAT rewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s NAT rewall Screen snapsho...

Page 27: ...lick the Reset button to abort change and recover the previous con guration setting 3 3 16 Firewall DMZ A Demilitarized Zone is used to provide Internet services without sacri cing unauthorized access...

Page 28: ...nterface Wireless LAN Sent Packets It shows the statistic count of sent packets on the Ethernet WAN interface Wireless LAN Received Packets It shows the statistic count of received packets on the Ethe...

Page 29: ...ve and enable NTP client service Reset Click the Reset button to abort change and recover the previous con guration setting Refresh Click the refresh the current time shown on the screen Management Lo...

Page 30: ...t change and recover the previous con guration setting Management Save Reload Settings This page allows you save current settings to a le or reload the settings from the le that was saved previously B...

Page 31: ...t login control Con rmed Password Because the password input is invisible so please ll in the password again for con rmation purpose Apply Changes Clear the User Name and Password elds to empty means...

Page 32: ...down it to select There are three types of priority level High Medium and Low Note If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the...

Page 33: ...mmunications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz How does wireless networking work The 802 11 standard de ne two modes infra...

Page 34: ...rame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes The determination of an ef cient fragment th...

Page 35: ...at is Wi Fi Protected Access WPA Wi Fi s original security mechanism Wired Equivalent Privacy WEP has been viewed as insuf cient for securing con dential business communications A longer term solution...

Page 36: ...programming language and wired wireless connection 4 22 What is Maximum Transmission Unit MTU Size Maximum Transmission Unit MTU indicates the network stack of any packet is larger than this value wi...

Reviews: