ASUSTeK Computer WL335G POCKET WIRELESS ACCESS POINT User Manual Draft 1 00
ASUSTeK Computer Inc POCKET WIRELESS ACCESS POINT Draft 1 00
USERS MANUAL
User Guide WL-335G IEEE 802.11g/b WLAN AP, Client, Repeater, P2P, PMP Table of Contents Table of Contents .......................................................... 3 1. Introduction … .......................................................................................... 2. Quick Start … ... … … … … … … … … … … . .................................................... 3. Operating Modes............................................... … … … … … … … … … . .... 3.1 Introduction to Operating Modes … ................................................ 3.1.1 Traveler’s AP Mode............................................................. 6 3.1.2 Repeater Mode… … . ............................................................ 7 3.1.3 Point-to-Point (P2P) Mode … ............................................... 8 3.1.4 Point-to-Multipoint (PMP) Mode.......................................... 3.1.5 Client Mode … ...................................................................... 10 4. Wireless Security Support...................................................................... 11 5. Mode Selection ....................................................................................... 12 6. AP Setup................................................................................................... 13 6.1 Basic Setup.................................................................................... 13 6.2 Security Setup … . ........................................................................... 14 6.3 Advanced Settings......................................................................... 16 6.3.1 6.4 Adding a Repeater … ............................................................ 18 Access Filter … ............................................................................... 18 7. Repeater Setup...................................................................................... 21 7.1 Basic Setup.................................................................................. 21 7.2 Security Setup. … ........................................................................... 22 7.3 Advanced Settings......................................................................... 23 7.4 Access Filter … ............................................................................... 23 8. Point-to-Point (P2P) Setup...................................................................... 24 8.1 Basic Setup ................................................................................... 24 8.2 Security Setup ............................................................................ 25 8.3 Advanced Settings ......................................................................... 25 9. Point-to-Multipoint (PMP) Setup ............................................................ 26 9.1 Basic Setup ...................................................................................... 26 9.2 Security Setup .................................................................................. 27 9.3 Advanced Settings ........................................................................... 27 10. Client Mode Setup ................................................................................. 28 10.1 Basic Setup .................................................................................... 28 10.2 MAC Cloning .................................................................................. 29 11. Status Page ............................................................................................ 30 12. Admin Page............................................................................................. 30 12.1 Firmware Upgrade ......................................................................... 31 12.2 Update Password............................................................................ 31 12.3 Reboot … … … … . . ............................................................................ 31 12.4 Reset to Default.............................................................................. 31 13. Lan Page................................................................................................. 32 14. Utility....................................................................................................... 34 14.1 Configuration Utility ........................................................................ 34 14.2 Firmware Restoration ..................................................................... 34 15. Telnet Management................................................................................ 36 15.1 Telnet step by step ......................................................................... 36 Appendix … … … … … … … … … … … … … … … … … … … … … … … … … … … … . . 37 1. Introduction This document is the user manual for the SMC WTK-G product.. 2. Quick Start The default IP address of the WTK-G is 192.168.2.25. The login is “admin” and password is “smcadmin”. 1. Connect the SMC WTK-G to a PC using an ethernet cable. 2. Plug in the 5V power supply. 3. Make sure the PC has a IP address on the 192.168.2.xxx subnet, such as 192.168.2.100. 4. Open your web browser and navigate to 192.168.2.25. 5. Type “admin” for the login field and “smcadmin” for the password. 6. The default out-of-box operating mode is Access Point (AP) mode. To switch to Repeater, P2P, PMP or Client mode, go to the Mode page and select the desired mode. Click Apply. The board will reboot into the desired mode. 7. After the board reboots, go to the Mode page and click Setup. Configure the applicable properties for that mode, such as security, SSID, channel, etc. 8. The SMC WTK-G should now be ready to use. 3. Operating Modes 3.1 Introduction to Operating Modes 3.1.1 Traveler’s AP Mode The Access Point (AP) mode is by default the out-of-box operational mode. When the user resets the system to the default manufacturing settings, the operational mode also reverts to AP mode. In the AP mode, the system functions as a standard AP, where wireless clients connected to the AP can then connect to other wireless clients or to the wired network. For example, when traveling to a hotel that has high speed internet access, the user can connect to the Internet through the AP which is connected to an ethernet cable in the room. Note that the SMC WTK-G AP acts only as a layer 2 bridge and does not act as a DHCP server. In other words, it does not supply dynamic IP addresses and instead relies on the network to supply them. Figure 1: AP Mode Wireless Client SMC WTK-G AP Mode Wireless Client 3.1.2 Repeater Mode Repeater mode extends the range of a wireless network. Repeater nodes retransmit the signal of an AP or wireless router to effectively extend the range of that AP or wireless router. Wireless clients can associate with the repeater. Figure2 shows the network with one repeater, and the repeater allowing wireless clients to associate. To configure the SMC WTK-G as a Repeater, please ensure the following: • Enter the MAC address of the Parent AP or wireless router in the Remote AP MAC address field in the SMC WTK-G Repeater. • Enter the MAC address of the SMC WTK-G (Repeater mode) in the Repeater MAC adddress field in the Parent AP or wireless router. Figure 2: One Wireless Repeater Node 3.1.3 Point-to-Point (P2P) Mode Two SMC WTK-G devices, each in Point-to-Point (P2P) mode, can establish a wireless connection between two wired networks, as shown in Figure3. The two SMC WTK-G devices operating in P2P mode do not allow client associations. To configure the SMC WTK-G deivces to establish a P2P wireless bridge, please ensure the following: • Enter the MAC address of SMC WTK-G P2P_2 device in the P2P MAC address field in the SMC WTK-G P2P_1 device. • Enter the MAC address of SMC WTK-G P2P_1 device in the P2P MAC address field in the SMC WTK-G P2P_2 device. Figure 3: P2P Wireless Bridge 3.1.4 Point-to-Multipoint (PMP) Mode A SMC WTK-G device operating in Point-to-Multipoint (PMP) mode can wirelessly connect two or more wired networks, as shown in Figure4. The root SMC WTK-G device (LAN 1) operates in PMP mode, and the other SMC WTK-G devices (LAN 2, LAN 3) must operate in P2P mode. When operating in PMP mode, the SMC WTK-G device does not allow client associations. The user must enter the MAC addresses of each (up to six) SMC WTK-G P2P device into the PMP system's table of Remote AP addresses. Figure 4: PMP Wireless Bridge 3.1.5 Client Mode When set to Client mode, the SMC WTK-G device will associate to an AP within its range in infrastructure mode, as shown in Figure5or join with another SMC WTK-G device in Client mode in an ad-hoc network, as shown in Figure6. The Client behaves like a normal wireless client. Figure 5: Client in Infrastructure Mode Figure 6: Client in Ad-Hoc Mode SMC WTK-G SMC WTK-G Client Mode Client Mode 4. Wireless Security Support The SMC WTK-G will support WEP encryption and WPA/PSK encryption as shown in Table1. Table 1: Wireless Security Mode WEP WPA/PSK Comments Access Point Yes Yes In AP mode, the WTK-G acts like a regular AP. Supports WEP and WPA/PSK. Repeater Yes No (for The link between the Repeater and wireless clients will Repeater- support both WEP or WPA/PSK. However, the link AP link) between the Repeater and the AP will support only WEP Yes (for in the initial release. Future releases will support WPA/ Repeater- PSK. Client link) Point-to-Point Yes No (P2P) The link between WTK-G devices in P2P and/or PMP mode support only WEP in the initial release. Future releases will support WPA/PSK. Point-to-Multipoint Yes No (PMP) The link between WTK-G devices in P2P and/or PMP mode will support only WEP in the initial release. Future releases will support WPA/PSK. Client Yes Yes In Client mode, the WTK-G acts like a regular wireless client, so it will support WEP and WPA/PSK when connecting with an AP in infrastructure mode or WEP when connecting to an Ad-Hoc network. 5. Mode Selection The first step in using the SMC WTK-G is selecting the operating mode. The default operating mode is the AP mode. To view the device’s web page, go to 192.168.2.25 (default IP address of the device) in your web browser. The default username is “admin” and the password is “smcadmin.” To select a mode, click the Mode tab. Click the radio button next to the desired mode and click the Apply button. The device will reboot in the selected mode. After the board reboots, click the Setup button to begin configuring the device. Figure 7:Mode Page 6. AP Setup 6.1 Basic Setup To configure the AP, select AP from the Mode page and click Setup. The following table shows the basic setup options. Figure 8:AP Setup Page Table 2: AP Setup Field Description Mode Selects 802.11g/b mode: 802.11g only, 802.11b only, or Mixed SSID Wireless Network Name Association Wireless clients association table SSID Broadcast Enable/disable the SSID broadcast feature. RF Channel Selects the channel Security Selects the option to disable security or to use WEP or WPA security. If using WEP or WPA, click the Setup button to enter the key(s). Advanced Settings Click Setup to configure advanced settings. Access Filter Click Setup to configure the access filter 6.2 Security Setup To enable security, select the desired security mode (WEP or WPA) from the AP setup page and click Setup to enter the keys. Figure 9: WEP Configuratiom The following tables describe the security setup options in more detail. Table 3: WEP Setup Field Description WEP Length Selects the WEP key length Mode Selects the WEP key format, ASCII or Hex Passphrase Passphrase used to generate the WEP keys. Click the Generate button to generate the keys. Key 1-4 WEP keys Default Tx key Selects the default WEP key (1-4) Figure 10: WPA Configuration Table 4: WPA Setup Field Description Authentication Selects Pre-Shared Key (PSK) only. Method Passphrase WPA key Group Re-Key Time Group Re-Key interval (seconds) 6.3 Advanced Settings The Advanced Settings page allows you to configure advanced Radio settings as well as extend the SMC WTK-G (AP mode) range by wirelessly linking it to a SMC WTK-G (Repeater mode). Figure 11: Advanced Settings The following table describes the setup options in detail. Table 5: AP Advanced Settings Field Description Beacon Interval Beacon interval (in milliseconds) RTS Threshold RTS threshold (in bytes) DTIM Interval DTIM interval Protection Mode Allows user to force 802.11g protection (RTS/CTS) mode off. Transmit Rate Selects the transmit rate: Auto or a fixed rate Preamble Type Selects short preamble, long preamble, or Auto Connect Repeater Enables/Disables the use of a Repeater Repeater MAC MAC address of the Repeater, if used Address 6.3.1 Adding a Repeater If a Repeater is used along with the Access Point, go to the Advanced Settings page. Select Enable for the “Connect Repeater” field. Enter the MAC address of the Repeater in the “Repeater MAC address” field. 6.4 Access Filter The Access Filter page allows you to configure the AP to allow or deny association to the AP based on the client’s MAC address. Up to 32 MAC addresses can be added to the list. Figure 12: Access Filter Settings The following table describes the setup options in detail. Table 6: AP Access Filter Settings Field Description MAC filtering Enables/Disables MAC filtering mode Filter List Provides the option to allow or deny clients with MAC addresses listed Filter MAC Up to 32 MAC addresses can be listed, but only 16 can be viewed/modified at a time. This pulldown menu selects which group of 16 to view/modify. MAC addresses List of MAC addresses to filter 7. Repeater Setup 7.1 Basic Setup To configure the Repeater, select Repeater from the Mode page and click Setup. The following table shows the basic setup options To set up the Repeater, you must enter the MAC address of the AP or AP/Router you want to connect to the Repeater. Figure 13: Repeater Setup Table 7: Repeater Setup Field Description AP/Router MAC MAC address of AP/Router that this Repeater is connected to. Address Mode Selects 802.11g/b mode: 802.11g only, 802.11b only, or Mixed SSID Broadcast Enable/disable the SSID broadcast feature. Channel Selects the channel Security Selects the option to disable security or to use WEP or WPA security. If using WEP or WPA, click the Setup button to enter the key(s). Advanced Settings Click Setup to configure advanced settings. Access Filter Click Setup to configure the access filter 7.2 Security Setup To enable security, select the desired security mode (WEP or WPA) from the setup page and click Setup to enter the keys. The following tables describe the security setup options in more detail. Table 8: WEP Setup Field Description WEP Length Selects the WEP key length Mode Selects the WEP key format, ASCII or Hex Passphrase Passphrase used to generate the WEP keys. Click the Generate button to generate the keys. Key 1-4 WEP keys Default Tx key Selects the default WEP key (1-4) Table 9: WPA Setup Field Description Authentication Selects Pre-Shared Key (PSK) or 802.1x mode Method Passphrase WPA key Group Re-Key Time Group Re-Key interval (seconds) 7.3 Advanced Settings The Advanced Settings page allows you to configure advanced Radio settings. The following table describes the setup options in detail. Table 10: Repeater Advanced Settings Field Field Description Beacon Interval Beacon interval (in milliseconds) RTS Threshold RTS threshold (in bytes) DTIM Interval DTIM interval Protection Mode Allows user to force 802.11g protection (RTS/CTS) mode off. Transmit Rate Selects the transmit rate: Auto or a fixed rate Preamble Type Selects short preamble, long preamble or Auto 7.4 Access Filter The Access Filter page allows you to configure the Repeater to allow or deny assocation to the Repeater based on the client’s MAC address. Up to 32 MAC addresses can be added to the list. The following table describes the setup options in detail. Table 11: Repeater Access Filter Settings Field Description MAC filtering Enables/Disables MAC filtering mode Filter List Provides the option to allow or deny clients with MAC addresses listed Filter MAC Up to 32 MAC addresses can be listed, but only 16 can be viewed/modified at a time. This pulldown menu selects which group of 16 to view/modify. MAC addresses List of MAC addresses to filter 8. Point-to-Point (P2P) Setup 8.1 Basic Setup To configure the P2P Bridge, select P2P from the Mode page and click Setup. The following table shows the basic setup options. To set up the P2P bridge, you must enter the MAC address of the other P2P bridge you want to connect to this P2P bridge. Figure 14: P2P Setup 8.2 Security Setup To enable security, select WEP from the setup page and click Setup to enter the keys. The following tables describe the security setup options in more detail. Table 13: WEP Setup Field Description WEP Length Selects the WEP key length Mode Selects the WEP key format, ASCII or Hex Passphrase Passphrase used to generate the WEP keys. Click the Generate button to generate the keys. Key 1-4 WEP keys Default Tx key Selects the default WEP key (1-4) 8.3 Advanced Settings The Advanced Settings page allows you to configure advanced Radio settings. The following table describes the setup options in detail. Table 14: P2P Advanced Settings Field Description RTS Threshold RTS threshold (in bytes) DTIM Interval DTIM interval Protection Mode Allows user to force 802.11g protection (RTS/CTS) mode off. Transmit Rate Selects the transmit rate: Auto or a fixed rate Preamble Type Selects short preamble, long preamble or Auto 9. Point-to-Multipoint (PMP) Setup 9.1 Basic Setup To configure the PMP Bridge, select PMP from the Mode page and click Setup. The following table shows the basic setup options To set up the PMP bridge, you must enter the MAC address(es) of the P2P bridge(s) you want to connect to this PMP bridge. Figure 15: PMP Setup Table 15: PMP Setup Field Description AP MAC Address MAC address(es) of the P2P bridges that are connected to this (1-6) PMP bridge Mode Selects 802.11g/b mode: 802.11g only, 802.11b only, or Mixed Channel Selects the channel Security Selects the option to disable security or to use WEP security. If using WEP, click the Setup button to enter the key(s). Advanced Settings Click Setup to configure advanced settings. 9.2 Security Setup To enable security, select WEP from the setup page and click Setup to enter the keys. The following tables describe the security setup options in more detail. Table 16: WEP Setup Field Description WEP Length Selects the WEP key length Mode Selects the WEP key format, ASCII or Hex Passphrase Passphrase used to generate the WEP keys. Click the Generate button to generate the keys. Key 1-4 WEP keys Default Tx key Selects the default WEP key (1-4) 9.3 Advanced Settings The Advanced Settings page allows you to configure advanced Radio settings. The following table describes the setup options in detail. Table 17: PMP Advanced Settings Field Description RTS Threshold RTS threshold (in bytes) DTIM Interval DTIM interval Protection Mode Allows user to force 802.11g protection (RTS/CTS) mode off. Transmit Rate Selects the transmit rate: Auto or a fixed rate Preamble Type Selects short preamble, long preamble or Auto 10. Client Mode Setup 10.1 Basic Setup To configure the Client, select Client from the Mode page and click Setup. The following table shows the basic setup options. Figure 16: Client Bridge Setup Field Description Station Mode Selects 802.11g/b mode: 802.11b only or 802.11g/b SSID Wireless Network Name. You can enter it directly in this field or click the Site Survey button to select from a list of available networks. Table 18: AP Setup (Continued) Field Description Channel Selects the channel (Ad-Hoc network only) Operation Mode Selects Ad-Hoc or Infrastructure mode Security Selects the option to disable security or to use WEP or WPA security. If using WEP or WPA, click the Setup button to enter the key(s). Preamble Type Selects short or long preamble Transmit Rate Selects the transmit rate: a fixed rate or Auto 10.2 MAC Cloning To enable MAC cloning mode, go to the MAC Cloning field on the LAN page and select Enabled. MAC cloning clones all the MAC addresses of the devices connected to the ethernet (wired) port to a single MAC address sent out wirelessly to an AP or Repeater. 11. Status Page The status page reports relevant status information for the device, for both the ethernet and wireless interfaces. Figure 17: Status Page 12. Admin Page The admin page lets you upgrade the device’s firmware or change the password. Figure 18: Admin Page 12.1 Firmware Upgrade To upgrade the firmware, click the Browse button and select the image file. Click Apply to upgrade. 12.2 Update Password To change the password, enter the new password in the New Password and Reconfirm Password fields and click Apply. 12.3 Reboot To reboot, check the reboot radio and click Apply. 12.4 Reset to Default Setting To reboot, check the reset to default radio and click Apply. 13. LAN Page The LAN page lets you set the device’s IP address. The device can be configured to use an automatic (DHCP) address or a fixed IP address. The default IP address is 192.168.2.25. When the device is in Client mode, the LAN page also provides the MAC cloning option. It is important that before you configure the SMC WTK-G device (regardless of the mode it is in) to Automatic IP, you should know how to determine the SMC WTK-G device’s IP address from the device it is connected to. Figure 19: LAN Page 14. Utility 14.1 Configuration Utility The Configuration utility is a disvocovery tool for an SMC WTK-G. This utility is available in the support CD that came with the SMC WTK-G package. Use the Configuration utility to find and condfig a SMC WTK-G near you. Figure 20: Configuration Utility 14.2 Firmware Restoration The Firmware Restoration utility is a rescue tool for an SMC WTK-G that failed during a previous firmware upload. This utility is available in the support CD that came with the SMC WTK-G package. A failed firmware upgrade causes the ASUS Pocket Wireless AP to enter a failure mode. Use the Firmware Restoration utility to find and upload a new firmware for the SMC WTK-G. To restore the firmware: 1. Visit the SMC website to download the latest firmware for the device. 2. Launch the Firmware Restoration utility from the Windows desktop by clicking Start > All ® Programs > SMC 802.11g Wireless Traveler’s Kit > Firmware Restoration. 3. The Firmware Restoration window appears. 4. Click the Browse button to locate the firmware file. 5. After selecting the firmware file, click the Upload button to begin the firmware restoration. Figure 21: Rescue Utility The restoration process takes about 3 to 4 minutes to finish. During restoration, the Power, and Wireless LEDs remain lit, while the Ethernet LED flashes slowly. If you have problems uploading a firmware while using a network hub, try connecting your computer directly to the LAN port. 15. Telnet Management 15.1 telnet step by step Step1: telnet to SMCWTK-G Step2: fill in the login information. Step3: type help for HELP. Step4: type command by command reference table. Table 19: Command Reference Table Type Get command Command Format Example Get all Get all Get ssid Get ssid Get channel Get channel Get security Get security Get defaultkey Get defaultkey Get wepkey Get wepkey Get wpakey Get wpakey Get mode Get mode Get site Get site Set command Other command Set ssid Set ssid MYSMC_AP0 (SSID: “MYSMC_AP0”) Set Channel Set channel 12 (Channel: 12) Set Security Set Security 0 (0 is for Disable) Set defaultkey Set defaultkey 1 (Default WEP Key: 1) Set wepkey Set wepkey 1 1234567890 (Wepkey1: 1234567890) Set wpakey Set wpakey smcisgood! (Wepkey: “smcisgood!”) Set mode Set mode 2 (SMCWTK-G change to Repeater mode) Logout Quit the telnet management. Save Save the configuration to the flash Finish Save and reboot APPENDIX Federal Communications Commission Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This manufacture is not responsible for any radio or TV interference caused by unauthorized modification to this equipment. Such modification could void the user’s authority to operate the equipment. This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter. To maintain compliance with FCC’s RF exposure guidelines, this equipment should be installed and operated with minimum distance 20cm between the radiator and your body. Use on the supplied antenna. Declaration of Conformity for R&TTE directive 1999/5/EC Essential requirements – Article 3 Protection requirements for health and safety – Article 3.1a Testing for electric safety according to EN 60950 has been conducted. These are considered relevant and sufficient. Protection requirements for electromagnetic compatibility – Article 3.1b Testing for electromagnetic compatibility according to EN 301 489-1 and EN 301 489-17 has been conducted. These are considered relevant and sufficient. Effective use of the radio spectrum – Article 3.2 Testing for radio test suites according to EN 300 328-2 has been conducted. These are considered relevant and sufficient.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Create Date : 2004:10:13 09:22:25Z Modify Date : 2004:10:28 13:59:22+08:00 Page Count : 39 Creation Date : 2004:10:13 09:22:25Z Author : Weng Producer : Acrobat PDFWriter 5.0 for Windows Mod Date : 2004:10:28 13:59:22+08:00 Metadata Date : 2004:10:28 13:59:22+08:00 Title : User Manual Draft 1.00.doc Creator : WengEXIF Metadata provided by EXIF.tools