Arcadyan Technology WA4001AARC SpeedTouch 180 Wireless Access Point User Manual 00

Arcadyan Technology Corporation SpeedTouch 180 Wireless Access Point 00

User Manual

WA4001A-BT
SpeedTouch 180
Wireless Access Point
iii
C
OMPLIANCES
Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment
does cause harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the interference by
one of the following measures:
- Reorient or relocate the receiving antenna
- Increase the separation between the equipment and receiver
- Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected
- Consult the dealer or an experienced radio/TV technician for help
This device complies with Part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible
for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna
or transmitter.
The equipment version marketed in US is restricted to usage of the channels 
1- 11 only.
C
OMPLIANCES
iv
EC Conformance Declaration - Class B
This information technology equipment complies with the requirements of the Council
Directive 89/336/EEC on the Approximation of the laws of the Member States relating to
Electromagnetic Compatibility and 73/23/EEC for electrical equipment used within certain
voltage limits and the Amendment Directive 93/68/EEC. For the evaluation of the
compliance with these Directives, the following standards were applied:
RFI
Emission: Limit class B according to EN 55022:1998
Limit class B for harmonic current emission according to
EN 61000-3-2/1995
Limitation of voltage fluctuation and flicker in low-voltage supply
system according to EN 61000-3-3/1995
Immunity: Product family standard according to EN 55024:1998
Electrostatic Discharge according to EN 61000-4-2:1995
(Contact Discharge: ±4 kV, Air Discharge: ±8 kV)
Radio-frequency electromagnetic field according to
EN 61000-4-3:1996 (80 - 1000 MHz with 1 kHz AM 80%
Modulation: 3 V/m)
Electrical fast transient/burst according to EN 61000-4-4:1995
(AC/DC power supply: ±1 kV, Data/Signal lines: ±0.5 kV)
Surge immunity test according to EN 61000-4-5:1995
(AC/DC Line to Line: ±1 kV, AC/DC Line to Earth: ±2 kV)
Immunity to conducted disturbances, Induced by radio-frequency
fields:
EN 61000-4-6:1996 (0.15~80 MHz with 1 kHz AM 80%
Modulation: 3 V/m)
Power frequency magnetic field immunity test according to
EN 61000-4-8:1993 (1 A/m at frequency 50 Hz)
Voltage dips, short interruptions and voltage variations immunity
test according to EN 61000-4-11:1994 (>95% Reduction @10
ms, 30% Reduction @500 ms, >95% Reduction @5000 ms)
LVD: EN 60950 (A1/1992; A2/1993; A3/1993; A4/1995; A11/1997)
C
OMPLIANCES
v
Safety Compliance
Wichtige Sicherheitshinweise (Germany)
1. Bitte lesen Sie diese Hinweise sorgfältig durch.
2. Heben Sie diese Anleitung für den späteren Gebrauch auf.
3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Verwenden Sie keine
Flüssigoder Aerosolreiniger. Am besten eignet sich ein angefeuchtetes Tuch zur
Reinigung.
4. Die Netzanschlu ßsteckdose soll nahe dem Gerät angebracht und leicht zugänglich sein.
5. Das Gerät ist vor Feuchtigkeit zu schützen.
6. Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten. Ein Kippen oder Fallen
könnte Beschädigungen hervorrufen.
7. Die Belüftungsöffnungen dienen der Luftzirkulation, die das Gerät vor Überhitzung
schützt. Sorgen Sie dafür, daß diese Öffnungen nicht abgedeckt werden.
8. Beachten Sie beim Anschluß an das Stromnetz die Anschlußwerte.
9. Verlegen Sie die Netzanschlußleitung so, daß niemand darüber fallen kann. Es sollte auch
nichts auf der Leitung abgestellt werden.
10. Alle Hinweise und Warnungen, die sich am Gerät befinden, sind zu beachten.
11. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom Stromnetz
trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.
12. Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das
Gerät gelangen. Dies könnte einen Brand bzw. elektrischen Schlag auslösen.
13. Öffnen sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen Sicherheit
nur von authorisiertem Servicepersonal geöffnet werden.
14. Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von
einer qualifizierten Servicestelle zu überprüfen:
a. Netzkabel oder Netzstecker sind beschädigt.
b. Flüssigkeit ist in das Gerät eingedrungen.
c. Das Gerät war Feuchtigkeit ausgesetzt.
d. Wenn das Gerät nicht der Bedienungsanleitung entsprechend funktioniert oder Sie mit
Hilfe dieser Anleitung keine Verbesserung erzielen.
e. Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.
f. Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
15. Zum Netzanschluß dieses Gerätes ist eine geprüfte Leitung zu verwenden. Für einen
Nennstrom bis 6 A und einem Gerätegewicht größer 3 kg ist eine Leitung nicht leichter
als H05VV-F, 3G, 0.75 mm2 einzusetzen.
Der arbeitsplatzbezogene Schalldruckpegel nach DIN 45 635 Teil 1000 beträgt 70 dB(A) oder
weniger.
C
OMPLIANCES
vi
vii
T
ABLE
OF
C
ONTENTS
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
About the SpeedTouch 180 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
2 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Hardware Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Aerial View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Rear View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
3 Configuring the SpeedTouch 180 . . . . . . . . . . . . . . . . 3-1
Using the Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Password Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Operating Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Language Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
LAN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
LAN Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Basic Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
WEP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
WPA Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Client List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Basic Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
WEP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Repeater Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
T
ABLE
OF
C
ONTENTS
viii
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Client Bridge (Infrastructure) Configuration . . . . . . . . . . . . . . . . . . . . 3-30
Client Bridge (AdHoc) Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
A Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-1
B Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .B-1
Ethernet Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
Wiring Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
RJ-45 Port Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2
Pin Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
C Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-1
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1-1
C
HAPTER
1
I
NTRODUCTION
The SpeedTouch 180 is an IEEE 802.11b/g Wireless LAN Access Point
with switchable repeater mode and Ethernet client mode. It provides
transparent, wireless high-speed data communications between the wired
LAN (and/or within the wireless network) and fixed, portable or mobile
devices equipped with an 802.11b/g wireless adapter employing the same
radio modulation.
About the SpeedTouch 180
The SpeedTouch 180 offers fast, reliable wireless connectivity with
considerable cost savings over wired LANs (which include long-term
maintenance overhead for cabling). New technology provides wireless
security via Wired Equivalent Privacy (WEP) encryption, Wi-Fi Protected
Access (WPA), and MAC address filtering.
Features and Benefits
Wireless connection using IEEE 802.11b/g technology
When working in Client Bridge mode, the SpeedTouch 180 allows the
wired Ethernet equipped device work wirelessly at 54Mbps
DHCP for dynamic IP configuration, and DNS for domain name
mapping
Easy setup through a web browser on any operating system that
supports TCP/IP
WDS (Wireless Distribution System) is supported.
I
NTRODUCTION
1-2
Applications
SpeedTouch 180 provides great networking features:
Remote access to corporate network information
Email, file transfer, and terminal emulation.
Difficult-to-wire environments
Historical or old buildings, asbestos installations, and open areas where
wiring is difficult to employ.
Frequently changing environments
Retailers, manufacturers, and banks that frequently rearrange the
workplace or change location.
Temporary LANs for special projects or peak times
Trade shows, exhibitions and construction sites which need temporary
setup for a short time period. Retailers, airline and shipping companies
that need additional workstations for a peak period. Auditors who
require workgroups at customer sites.
Access to databases for mobile workers
Doctors, nurses, retailers, or white-collar workers who need access to
databases while being mobile in a hospital, retail store, or an office
campus.
SOHO users
SOHO (Small Office and Home Office) users who need easy and
quick installation of a small computer network.
• Security
The SpeedTouch 180 supports security features that deny Internet
access to specified PCs, or filter all requests for specific services that
might affect your network security. WEP (Wired Equivalent Privacy),
WPA (Wi-Fi Protected Access), and MAC filtering provide security
over the wireless network.
2-1
C
HAPTER
2
I
NSTALLATION
Before installing the SpeedTouch 180, verify that you have all the items
listed under the Package Contents list. If any of the items are missing or
damaged, contact your local distributor. Also be sure that you have all the
necessary cabling before installing the wireless gateway. After installing the
SpeedTouch 180, refer to “Configuring the SpeedTouch 180” on page 3-1.
Package Contents
After unpacking the SpeedTouch 180 box, check the contents to be sure
you have received the following components:
SpeedTouch 180
Power adapter
Documentation CD
Immediately inform your dealer in the event of any incorrect, missing, or
damaged parts. If possible, please retain the carton and original packing
materials in case there is a need to return the product.
I
NSTALLATION
2-2
System Requirements
Your system must meet the following minimum requirements:
A PC using a fixed IP address or dynamic IP address assigned via
DHCP, as well as a gateway server address and DNS server address
from your service provider.
An A/C power outlet (100~240 V, 50~60 Hz) which will supply
power for the device.
A computer equipped with a 10/100 Mbps Ethernet network interface
card, or a USB-to-Ethernet converter or an IEEE 802.11b/g wireless
network adapter.
TCP/IP network protocols installed on each PC that will access the
Internet.
A Java-enabled web browser, such as Microsoft Internet Explorer 5.5
or above installed on one PC at your site for configuring the wireless
gateway.
Hardware Description
The SpeedTouch 180 connects to the Internet or to a remote site using its
RJ-45 WAN port. It can be connected directly to your PC or to a local area
network using the 10/100 Mbps LAN port.
The data transmission speed between wired devices connected to your
local area network can run at up to 100 Mbps. Wireless connections can
run up to 54 Mbps with 11g wireless network.
H
ARDWARE
D
ESCRIPTION
2-3
Aerial View
Rear View
Item Description
Power Inlet Connect the included power adapter to this inlet.
Warning: Using the wrong type of power adapter may damage
your adapter.
LAN Port Fast Ethernet port (RJ-45). Connect device (such as a PC, hub or
switch) on your local area network to this port.
This RJ-45 port can auto-negotiate the operating speed to
10/100 Mbps, the mode to half/full duplex, and the pin signals
to MDI/MDI-X (i.e., allowing these ports to be connected to
any network device with straight-through cable).
8mm
8mm
speedtouch
I
NSTALLATION
2-4
Note: If you use the RELOAD button at the bottom of the device, the
SpeedTouch 180 performs a power reset. Unplug the device, and
press the RELOAD button. Power the device again while holding
the RELOAD button down. Releasing the RELOAD button five
seconds after reboot, all the LEDs will illuminate and the factory
settings will be restored.
H
ARDWARE
D
ESCRIPTION
2-5
LED Indicators
The LED indicators are illustrated in the following figure and table.
Figure 2-1. LEDs
LED Status Description
WLAN Green Connection has been established.
Blinking The WLAN port is sending or receiving data.
Off Wireless feature has been disabled from the user
interface. The "Enable Wireless Networking" check
box has been de-selected.
LAN Green The connection is established at 100 Mbps.
Yellow The connection is established at 10 Mbps.
Blinking The indicated LAN port is sending or receiving data.
Off There is no traffic on the port.
Power Green The SpeedTouch 180 is receiving power.
Blinking Device is rebooting.
Off Power off or failure.
Power
Ethernet
Link/Activity
Wireless
Link/Activity
I
NSTALLATION
2-6
System Requirements
Before you install the Wireless Access Point, be sure you can meet the
following requirements:
A/C power outlet (100~240 V, 50~60 Hz) which will supply power
for the access point
802.11b or 802.11g compliant wireless Ethernet adapters with TCP/IP
compatible protocol installed
Web browser for configuration
3-1
C
HAPTER
3
C
ONFIGURING
THE
S
PEED
T
OUCH
180
This chapter describes how to configure your SpeedTouch 180. For the
initial connection to the Internet, you firstly need to configure the
SpeedTouch 180. The SpeedTouch 180 can be configured by a web
browser, which is Internet Explorer 5.5 or above.
To access the SpeedTouch 180’s management interface, enter the default
IP address into your web browser: http://10.0.0.140. The default IP
address is a static IP address. Enter the default password (admin), and click
LOGIN to access the management interface.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-2
Using the Management Interface
The following items on the menu may be configured: System, LAN,
Wireless, and Tools. To apply configuration changes, click Apply, and if
you want to clear your setting changes, click Cancel. If you wish to view the
previous screen, press Back.
Note: To ensure proper screen refresh after a command entry, be sure
that Internet Explorer 5.5, or above, is configured as follows:
Under the menu Tools/Internet Options/General/Temporary
Internet Files/Settings, the setting for “Check for newer versions
of stored pages” should be “Every visit to the page.”
Status
This is the SpeedTouch 180’s management interface menu homepage.
S
YSTEM
3-3
System
The System menu allows the user choose:
Password Settings
Operating Mode
Language Settings
Password Settings
Click System, Password Settings to set the password for administrative
access to the SpeedTouch 180.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-4
Please refer to the table below for a description of the password settings.
Note: If your password is lost, or you cannot gain access to the
management interface, unplug the power and then press the
RELOAD button. Restore the factory defaults by holding down
the RELOAD button for at least five seconds while powering up
the device. (The default password is admin.)
Parameter Description
Current
password
Enter the original password. (Default: admin)
New password Enter the new password.
New password
(confirmation)
Confirm the new password.
Idle time
(in minutes)
The maximum period of time (in minutes) for which the
login session is maintained during inactivity. If the
connection is inactive for longer than the maximum idle time,
it will perform a system logout, and you have to log in again
to access the management interface. (Default: 2 minutes)
(Range 1-99 minutes)
S
YSTEM
3-5
Operating Mode
The SpeedTouch 180 functions in four different modes:
Access Point - provides simple, wireless access to the Internet
Client Bridge (Infrastructure) - enables a wireless infrastructure
connection to a wired ethernet device
Client Bridge (AdHoc) - enables a wireless ad hoc connection to a wired
ethernet device
Repeater - extends the range of your network
Click System, Operating Mode, and choose the desired mode.
Choose the required mode from the drop-down menu. Highlight the
selected mode and click Apply. The device will reboot and ask the user to
log in again. After mode selection, the configuration settings will vary
depending on which mode you are in.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-6
Please refer to the table below for a description of these differences.
Reset
If at any time the SpeedTouch 180 becomes unresponsive, it may be
necessary to perform a reset. To perform a system reset, unplug the power
and depress the RELOAD button. Restore the factory defaults by holding
down the RELOAD button for at least five seconds while powering up the
device. (The default password is admin.)
Language Settings
The SpeedTouch 180 offers a choice of the following languages:
English
German
Spanish
French
Italian
Dutch
Mode Description
Access Point
Mode
Contains extra security features. These features - WPA, and
802.1x are described in detail the Wireless, Access Point
Mode section on page 3-10.
Client Bridge
(Infrastructure)
Mode
To enable a wireless connection to your ethernet device,
for example an Xbox, please refer to the configuration page
3-30.
Client Bridge
(AdHoc) Mode
Play head-to-head games using Client Bridge (Ad Hoc)
mode. This process is described on page 3-31.
Repeater Mode In Repeater mode the user must configure the additional
Repeater Settings. Refer to page 3-21.
S
YSTEM
3-7
Click System, Language Settings, and choose the language desired.
Choose the required language from the drop-down menu. Highlight the
selected language and click Apply. The device will change languages
instantly, without rebooting.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-8
LAN
You can configure the LAN settings from here.
LAN Settings
Access Point Mode
Use the LAN Settings page to configure the LAN IP address. In Access
Point Mode, you may choose to use a static address or to enable the
DHCP server for dynamic client address allocation.
The device will automatically start up with its default static IP address,
10.0.0.140. DNS (Domain Name Servers) map numerical IP addresses to
the equivalent domain name (e.g., www.somesite.com). Your ISP should
provide the IP address of one or more domain name servers.
LAN
3-9
See the table below for a list of the LAN features supported.
LAN Settings
Client Bridge Mode
Use the LAN Settings page to configure the LAN IP address. In Client
Bridge Mode, you may only use a static address.
The device will automatically start up with its default static IP address,
10.0.0.140. DNS (Domain Name Servers) map numerical IP addresses to
the equivalent domain name (e.g., www.somesite.com). Your ISP should
provide the IP address of one or more domain name servers.
Parameter Description
AP name Name of the access point. (This naming feature is optional.)
IP Settings Selects a dynamic or fixed IP address.
IP address The IP address of the SpeedTouch 180.
Subnet mask The subnet mask of the network.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-10
See the table below for a list of the LAN features supported.
Wireless
Basic Setting
Access Point Mode
Click on Wireless, Basic Setting to set the channel, Service Set ID (SSID),
and transmit speed for your wireless network.
Parameter Description
AP name Name of the access point. (This naming feature is optional.)
IP address The IP address of the SpeedTouch 180.
Subnet mask The subnet mask of the network.
W
IRELESS
3-11
The SSID should be set to the same value as other wireless devices on your
network. It is case-sensitive and can consist of up to 32 alphanumeric
characters. The access point can be configured for roaming clients by
setting the service set identifier (SSID), wireless channel, and other
advanced options.
The wireless settings are listed in the table below.
Parameter Description
Enable Wireless
Networking
Enables/disables wireless networking.
Channel The radio channel used for the SpeedTouch 180 to
communicate with the wireless clients. The SpeedTouch
180 will automatically assign itself a radio channel, or you
may select one manually.
The available channel settings are limited by local
regulations.
SSID The Service Set ID. This should be set to the same value as
other wireless devices on your network.
The SSID is case sensitive and can consist of up to 32
alphanumeric characters.
SSID broadcast Allows the user to show/hide the SSID. (Default: Enabled)
Transmit Rate The transmit rate is automatically adjusted based on the
receiving data error rate. Usually the connection quality will
vary depending on the distance between the wireless router
and wireless clients. You can also select a lower
transmission rate to maximize the radio communication
range. (Default: Automatic)
Turbo mode Enables/disables turbo mode. The turbo mode
implemented with the Wireless Access Point can
dramatically boost your wireless connectivity with speeds of
up to 108 Mbps.(Default: Enabled)
Wireless mode Select the type of wireless network. The SpeedTouch 180
can support a mixed mode of 11b and 11g, 11g only, and
11g Turbo.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-12
WEP Configuration
Access Point Mode
Click on Wireless, WEP Configuration to configure your WEP parameters.
Wired Equivalent Privacy (WEP) is implemented on this device to prevent
unauthorized access to your wireless network. For network devices that do
not support WPA, it is recommended that you use WEP to protect your
network. If WEP is in use, all clients on the network must use the same
WEP key settings in order to communicate with each other. The device
supports key lengths of the standard 64-bit and industry standard 128-bit.
The bit key can be in alphanumeric characters or hexadecimal numerals
(0~9, A~F, e.g., D7 0A 9C 7F E5). (Default: Disabled)
W
IRELESS
3-13
•WEP Mode
Select the level of WEP encryption you wish to use, 64-bit 10 hex digits or
128-bit 26 hex digits, manual or automatic. Higher encryption levels offer
higher levels of security, but due to the complexity of the encryption, they
may decrease network performance.
64-bit/128-bit manually
If you are not using a Passphrase, then manually enter a set of values.Using
this mode, the user must manually enter keys as 10 hexadecimal digits (0 to
9 and A to F) for 64 bit keys, or 26 hexadecimal digits for 128 bit keys. If
you are using 64-bit WEP encryption, then the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit WEP encryption,
then the key must be exactly 26 hexadecimal characters in length.
64-bit/128-bit automatically
Instead of manually entering WEP keys, you can enter a Passphrase. This
Passphrase is used to generate one or more WEP keys.
Note:
All devices in your network must use the same Passphrase or WEP
key.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-14
WPA Configuration
Access Point Mode only
Click on Wireless, WPA Configuration to configure your WPA settings.
WPA is a stronger wireless security solution than WEP. It uses a
combination of 802.1x authentication and broadcast/session keys.
Pre-Shared Key/Passphrase
If there is no authentication server on your SOHO network, you can issue
the Pre-Shared Key to the clients that connect to the Wireless Access
Point. Be sure to use the same key for the Wireless Access Point and the
connected clients.
WPA-PSK (manually)
W
IRELESS
3-15
WPA-PSK (automatically)
Notes: 1. Manual Pre-Shared Key supports up to 64-Hex characters.
2. Type 8~63 Hex characters for the Pre-Shared Passphrase.
3. Do not use a key that is too long and complex for your clients to type
accurately.
4. A Hex (hexadecimal) digit is a number or letter in the
range 0-9 or A-F.
For enterprise deployment, WPA requires a RADIUS authentication server
to be configured on the wired network. The 802.1x client and RADIUS
server should use an appropriate EAP type - such as EAP-TLS (Transport
Layer Security), EAP-TTLS (Tunneled TLS), or PEAP (Protected EAP) -
for strongest authentication. Working together, these protocols provide
"mutual authentication" between a client, the access point, and a RADIUS
server that prevents users from accidentally joining a rogue network. Only
when a RADIUS server has authenticated a user’s credentials will
encryption keys be sent to the access point and client.
Note: To implement WPA on wireless clients requires a WPA-enabled
network card driver and 802.1x client software that supports
theEAP authentication type that you want to use. Windows XP
provides native WPA support, other systems require additional
software.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-16
• WPA-802.1X
The Wireless Access Point allows you to use 802.1x authentication for an
enterprise network environment with a RADIUS server installed.
RADIUS is a logon authentication protocol that uses software running on
a central server to control access to RADIUS-compliant devices on the
network. It allows a wireless access point to send the connection
parameters to a RADIUS server. There are two parts to the logon process:
getting user credentials and authentication. Credentials are composed of a
user name, a password, and sometimes a domain. Authentication is the
process of verifying that the users really are who they say they are, based
on the password.
In 802.1x mode, access will be checked against the authentication database
stored on the Wireless Access Point. You must specify the authentication
period, and the corresponding parameters in the RADIUS Server
Parameters field for the remote authentication protocol.
Parameter Default Description
RADIUS
Server
0.0.0.0 The IP address of the RADIUS server.
RADIUS
Server Port
1812 UDP port is used for RADIUS authentication
messages.
RADIUS Key None Defines a text string on both the RADIUS client
and server to secure RADIUS traffic. The
RADIUS server requires MD5 Message-
Authenticator attribute for all access request
messages. The 802.1x authentication scheme is
supported by using the Extensible Authentication
Protocol (EAP) over the RADIUS server.
W
IRELESS
3-17
Client List
The Client List screen displays the MAC address and connection speed of
the associated clients.
Click the Refresh button to update the list of clients.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-18
Connection Control
This section provides MAC filtering configuration information.
To use MAC address filtering, you must enter a list of allowed client MAC
addresses into the filtering table. When enabled only the MAC addresses
entered will have access to your network. All other devices will be denied
access to your network.
W
IRELESS
3-19
Basic Setting
Client Bridge Mode
Click on Wireless, Basic Setting to set the Service Set ID (SSID) for your
wireless network.
The SSID should be set to the same value as the wireless network that you
wish to connect to. It is case-sensitive and can consist of up to 32
alphanumeric characters.
In Client Bridge ad hoc mode, the SSID of both devices needs to be
consistent.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-20
WEP Configuration
Client Bridge Mode
Click on Wireless, WEP Configuration to set the WEP Mode and
Authentication Type.
Wired Equivalent Privacy (WEP) is implemented on this device to prevent
unauthorized access to your wireless network. For network devices that do
not support WPA, it is recommended that you use WEP to protect your
network. If WEP is in use, all clients on the network must use the same
WEP key settings in order to communicate with each other. The device
supports key lengths of the standard 64-bit and industry standard 128-bit.
The bit key can be in alphanumeric characters or hexadecimal numerals
(0~9, A~F, e.g., D7 0A 9C 7F E5).
The user must also choose the authentication type. Open System
essentially means no security. Using the Shared Key setting, users on both
ends of the wireless link have a secret shared key.
R
EPEATER
C
ONFIGURATION
3-21
Repeater Configuration
Repeater Mode
Using the device as a Repeater, you can extend the range of your network.
In Repeater mode, the SpeedTouch 180 uses Wireless Distribution System
(WDS) to extend the coverage of your wireless network. The following
illustration depicts two WDS-enabled devices communicating via WDS.
The user must check the box corresponding to the source device (the 11g
WDS-enabled device in the sketch) in the configuration table of the
repeater (the SpeedTouch 180 in the sketch), in order for the two devices
to communicate.
This page configures the Repeater Settings. Use the Repeater mode to
serve client devices that do not require high throughput. Repeaters extend
the coverage area of your wireless LAN, but they drastically reduce
throughput.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-22
In Repeater mode, the SpeedTouch 180 sends out a signal to check for
other devices on the network. Check the box to enable WDS. Click
Refresh to display all available devices. The above table allows you to
configure the Repeater to repeat the signal of another device. Check the
box corresponding to the device that you want to connect to. Enter a name
that is easy to remember if required, and click Apply. The SpeedTouch 180
can support up to a maximum of four devices in this mode. The user will
receive an error message if this number is exceeded.
Note:
Ensure that both the source and repeating devices are using the same
channel. The check box becomes available only when the channel of
the SpeedTouch 180 and the source is the same. To change the
channel, go to the Basic Setting screen in the Wireless section.
11g WDS-enabled Device (Source)
WDS Link
SpeedTouch 180 (Repeater)
ADSL Modem
R
EPEATER
C
ONFIGURATION
3-23
Note:
Both the source device and the repeating device must be configured
properly to make use of the Repeater mode.
Note: You cannot have a loop in the configuration. A loop will cause a
broadcast storm which will result in high activity on the network
and then all devices will shut down. Please refer to the following
sketch.
Wireless
Network
In a situation like this,
a broadcast storm will
occur
11g WDS-enabled Device
SpeedTouch 180
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-24
Tools
Use the Tools menu to back up the current configuration, update the
firmware, reboot the SpeedTouch 180, import a profile, or view the
configuration status of the devide.
T
OOLS
3-25
Configuration
Use the Configuration screen to save the current configuration parameters.
Backup Settings - Saves the SpeedTouch 180 ’s configuration to a file.
Restore Settings - Restores settings from a previously saved backup
configuration file.
Restore to Factory Defaults - Restores the SpeedTouch 180 settings
back to the original factory defaults.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-26
Firmware Upgrade
The Firmware Upgrade page allows the user to upgrade the firmware
using the web management tools.
Firstly, save the new code locally on your hard drive. Then, on the
Firmware Upgrade page, click Browse... to locate the firmware. After
locating the code, click OK to begin the download. The SpeedTouch 180
will automatically reboot after the firmware has been downloaded, and the
user will be asked to log in again. The firmware version displays on the
Status page, for example, 1.00.00.
T
OOLS
3-27
Reboot
The Reboot screen allows the user to reset the device.
Click Apply and then OK on the two confirmation messages to reboot the
SpeedTouch 180. Your settings will not be changed. The reboot will be
complete after 30 seconds.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-28
Profile
On the Profile page, you can import the standard Thomson configuration
settings, or profile.
Using this profile, you will not have to configure your wireless PCs
manually. Click Save to save the profile to your hard disk, and Load to load
the profile.
T
OOLS
3-29
Status
Click Status on the Tools menu to access the Status page.
The Status screen displays the hardware and firmware version numbers,
LAN connection status, and wireless settings of the SpeedTouch 180.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-30
Client Bridge (Infrastructure) Configuration
Click on System, Operating Mode, and select Client Bridge
(Infrastructure). Click Apply, and the device will reboot and ask the user to
log in again. Unplug the RJ-45 cable and connect the SpeedTouch 180 to
your ethernet device for example PC, or gaming console, making your
SpeedTouch 180 function as a wireless adapter. The default IP address of
the SpeedTouch 180 is 10.0.0.140. Assign your ethernet device an IP
address statically within the same subnet, for example, 10.0.0.100, so that
you can open the browser and reach the configuration page by typing the
default IP address 10.0.0.140.
Note: Only one ethernet device may be connected to
the SpeedTouch 180.
Ensure that both the SpeedTouch 180 and the 11g WDS-enabled gateway
are using the same SSID.
If you want to use the SpeedTouch 180 as a wireless adapter connected to
your PC, you must remember to release the IP, and set TCP/IP settings to
"Obtain an IP address automatically" after you finish configuring the
SpeedTouch 180. The SpeedTouch 180 will then obtain the IP from the
gateway for your ethernet device (for example, your Xbox), using DHCP.
C
LIENT
B
RIDGE
(A
D
H
OC
) C
ONFIGURATION
3-31
Client Bridge (AdHoc) Configuration
Click on System, Operating Mode, and select Client Bridge (AdHoc) from
the drop-down menu. Click Apply, and the device will reboot and ask the
user to log in again. The SSID on both devices must be the same in order
for the two devices to communicate.
Note: Only one ethernet device may be connected to
the SpeedTouch 180.
Home
Click on Home to return to the homepage.
Logout
Click on Logout to exit the web management interface.
C
ONFIGURING
THE
S
PEED
T
OUCH
180
3-32
A-1
A
PPENDIX
A
T
ROUBLESHOOTING
This section describes common problems you may encounter and possible
solutions to them. The SpeedTouch 180 can be easily monitored through
panel indicators to identify problems.
Troubleshooting Chart
Problem Action
LED Indicators
Power LED is
Off
Check connections between the SpeedTouch 180, the
external power supply, and the wall outlet.
If the power indicator does not light when the power
cord is plugged in, you may have a problem with the
power outlet, power cord, or external power supply.
However, if the unit powers off after running for a
while, check for loose power connections, power
losses, or surges at the power outlet.
If you still cannot isolate the problem, then the
external power supply may be defective. In this case,
contact Technical Support for assistance.
T
ROUBLESHOOTING
A-2
LED Indicators
LAN LED is
Off
Verify that the SpeedTouch 180 and attached device
are powered on.
Be sure the cable is plugged into both the SpeedTouch
180 and the corresponding device.
Verify that the proper cable type is used and that its
length does not exceed the specified limits.
Be sure that the network interface on the attached
device is configured for the proper communication
speed and duplex mode.
Check the adapter on the attached device and cable
connections for possible defects. Replace any
defective adapter or cable if necessary.
Network Connection Problems
Cannot ping the
SpeedTouch 180
from the
attached LAN
Verify that the IP addresses are properly configured.
For most applications, you should use the
SpeedTouch 180’s DHCP function to dynamically
assign IP addresses to hosts on the attached LAN.
However, if you manually configure IP addresses on
the LAN, verify that the same network address
(network component of the IP address) and subnet
mask are used for both the SpeedTouch 180 and any
attached LAN devices.
Be sure the device you want to ping (or from which
you are pinging) has been configured for TCP/IP.
Troubleshooting Chart
Problem Action
T
ROUBLESHOOTING
A-3
Management Problems
Cannot connect
using the web
browser
Be sure that you have configured the SpeedTouch 180
with a valid IP address, subnet mask, and default
gateway.
Check that you have a valid network connection to the
SpeedTouch 180 and that the port you are using has
not been disabled.
Check the network cabling between the management
station and the SpeedTouch 180.
Forgot or lost
the password
If your password is lost, or you cannot gain access to
the management interface, unplug the power and then
press the reset button. Restore the factory defaults by
holding down the reset button for at least five seconds
while powering up the device. (The default password
is admin.)
Troubleshooting Chart
Problem Action
T
ROUBLESHOOTING
A-4
Wireless Problems
A wireless PC
cannot associate
with the device.
Make sure the wireless clients use the same SSID
settings as the SpeedTouch 180.
You need to have the same security settings on the
clients and the SpeedTouch 180.
The wireless
network is often
interrupted.
Move your wireless clients closer to the SpeedTouch
180 to find a better signal. If the signal is still weak,
change the angle of the antenna.
There may be interference, possibly caused by
microwave ovens or cordless phones. Change the
location of the interference sources or of the
SpeedTouch 180.
Change the wireless channel on the 11g WDS-enabled
device.
Check that the antenna, connectors, and cabling are
firmly connected.
The
SpeedTouch 180
cannot be
detected by a
wireless client.
The distance between the SpeedTouch 180 and
wireless clients is too far.
Make sure the wireless clients use the same SSID,
channel, and security settings as the SpeedTouch
180.
In Repeater
mode, a loop has
been detected.
A broadcast storm has resulted from incorrect set up.
Please refer to page 3-23.
Troubleshooting Chart
Problem Action
B-1
A
PPENDIX
B
C
ABLES
Ethernet Cable
Caution: Do not plug a phone jack connector into any RJ-45 port. Use
only twisted-pair cables with RJ-45 connectors that conform
with FCC standards.
Specifications
Wiring Conventions
For Ethernet connections, a twisted-pair cable must have two pairs of
wires. Each wire pair is identified by two different colors. For example,
one wire might be red and the other, red with white stripes. Also, an RJ-45
connector must be attached to both ends of the cable.
Cable Types and Specifications
Cable Type Max. Length Connector
10BASE-T Cat. 3, 4, 5 100-ohm UTP 100 m (328 ft) RJ-45
100BASE-TX Cat. 5 100-ohm UTP 100 m (328 ft) RJ-45
C
ABLES
B-2
Each wire pair must be attached to the RJ-45 connectors in a specific
orientation. The following figure illustrates how the pins on an Ethernet
RJ-45 connector are numbered. Be sure to hold the connectors in the same
orientation when attaching the wires to the pins.
Figure B-1. RJ-45 Ethernet Connector Pin Numbers
RJ-45 Port Connection
Use the straight-through CAT-5 Ethernet cable provided in the package to
connect the Barricade to your PC. When connecting to other network
devices such as an Ethernet switch, use the cable type shown in the
following table.
Attached Device Port Type Connecting Cable Type
MDI-X Straight-through
MDI Crossover
E
THERNET
C
ABLE
B-3
Pin Assignments
With 100BASE-TX/10BASE-T cable, pins 1 and 2 are used for
transmitting data, and pins 3 and 6 for receiving data.
Straight-Through Wiring
If the port on the attached device has internal crossover wiring (MDI-X),
then use straight-through cable.
RJ-45 Pin Assignments
Pin Number Assignment1
1Tx+
2Tx-
3Rx+
6Rx-
1: The “+” and “-” signs represent the polarity of the wires
that make up each wire pair.
Straight-Through Cable Pin Assignments
End 1 End 2
1 (Tx+) 1 (Tx+)
2 (Tx-) 2 (Tx-)
3 (Rx+) 3 (Rx+)
6 (Rx-) 6 (Rx-)
C
ABLES
B-4
Crossover Wiring
If the port on the attached device has straight-through wiring (MDI), use
crossover cable.
Crossover Cable Pin Assignments
End 1 End 2
1 (Tx+) 3 (Rx+)
2 (Tx-) 6 (Rx-)
3 (Rx+) 1 (Tx+)
6 (Rx-) 2 (Tx-)
C-1
A
PPENDIX
C
S
PECIFICATIONS
General Specifications
Maximum Channels
IEEE 802.11 compliant
11 channels (US, Canada)
13 channels (ETSI)
14 channels (Japan)
LAN Interface
1 RJ-45 10 BASE-T/100 BASE-TX port
Auto-negotiates the connection speed to 10 Mbps Ethernet or 100 Mbps
Fast Ethernet, and the transmission mode to half duplex or full duplex.
Indicator Panel
PWR (Power), LAN (Ethernet Link/Activity), WLAN (Wireless Link/
Activity)
Network Management
HTML Web-browser interface, Windows 98/Me/NT/2000/XP utility
Operating Systems
Windows 98/Me/NT/2000/XP
Dimensions
136 x 89 x 16 (mm)
Weight
150 g
Current Consumption
5V, 1 A maximum
S
PECIFICATIONS
C-2
AC Input
220V ~ 240 AC
DC Output
5V DC
Output Current
2.4 A maximum
Management
Web management
Advanced Features
Dynamic IP Address Configuration – DHCP
Internet Standards
RFC 826 ARP, RFC 791 IP, RFC 792 ICMP, RFC 768 UDP, RFC 793 TCP,
RFC 1483 AAL5 Encapsulation, RFC 1661 PPP, RFC 1866 HTML,
RFC 2068 HTTP, RFC 2364 PPP over ATM
Temperatur e
Operating 0 to 55 °C (32 to 131 °F)
Storage -20 to 70 °C (-4 to 158 °F)
Humidity
5% to 90% (non-condensing)
Glossary-1
G
LOSSARY
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of
Category 3, 4, or 5 UTP cable.
100BASE-TX
IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of
Category 5 UTP cable.
Access Point (AP)
An interface between the wireless network and a wired network. Access
points combined with a distribution system (e.g. Ethernet) support the
creation of multiple radio cells (BSSs) that enable roaming throughout a
facility.
Ad Hoc
An ad hoc wireless LAN is a group of computers, each with LAN adapters,
connected as an independent wireless LAN.
Authentication
The process a station uses to announce its identify to another station.
IEEE 802.11 specifies two forms of authentication: open system and
shared key.
Backbone
The core infrastructure of a network. The portion of the network that
transports information from one central location to another central
location where it is unloaded onto a local system.
G
LOSSARY
Glossary-2
Bandwidth
The difference between the highest and lowest frequencies available for
network signals. Also synonymous with wire speed, the actual speed of the
data transmission along the cable.
Base Station
In mobile telecommunications, a base station is the central radio
transmitter/receiver that maintains communications with the mobile
radiotelephone sets within its range. In cellular and personal
communications applications, each cell or micro-cell has its own base
station; each base station in turn is interconnected with other cells’ bases.
Basic Service Set (BSS)
A set of 802.11-compliant stations that operate as a fully-connected
wireless network.
Domain Naming System (DNS)
System used in the Internet for translating names of network nodes into
addresses.
Dynamic Host Configuration Protocol (DHCP)
Issues IP addresses automatically within a specified range to devices such
as PCs when they are first powered on. The device retains the use of the IP
address for a specific license period that the system administrator can
define. DHCP is available as part of the many operating systems including
Microsoft Windows NT Server and UNIX.
Ethernet
A network communication system developed and standardized by DEC,
Intel, and Xerox, using baseband transmission, CSMA/CD access, logical
bus topology, and coaxial cable. The successor IEEE 802.3 standard
provides for integration into the OSI model and extends the physical layer
and media with repeaters and implementations that operate on fiber, thin
coax and twisted-pair cable.
G
LOSSARY
Glossary-3
File Transfer Protocol (FTP)
A TCP/IP protocol for file transfer.
Infrastructure
An integrated wireless and wired LAN is called an infrastructure
configuration.
Local Area Network (LAN)
A group of interconnected computer and support devices.
LED
Light emitting diode used for monitoring a device or network condition.
Media Access Control (MAC)
A portion of the networking protocol that governs access to the
transmission medium, facilitating the exchange of data between network
nodes.
Node
Any network-addressable device on the network, such as a router or
network interface card.
RJ-45 Connector
A connector for twisted-pair wiring.
Roaming
A wireless LAN mobile user moves around an ESS and maintains a
continuous connection to the infrastructure network.
RTS Threshold
Transmitters contending for the medium may not be aware of each other.
RTS/CTS mechanism can solve this “Hidden Node Problem.” If the
packet size is smaller than the preset RTS Threshold size, the RTS/CTS
mechanism will NOT be enabled.
G
LOSSARY
Glossary-4
Service Set Identifier (SSID)
An identifier attached to packets sent over the wireless LAN that functions
as a “password” for joining a particular radio network (BSS). All radios and
access points within the same BSS must use the same SSID, or their
packets will be ignored.
Wired Equivalent Privacy (WEP)
An optional IEEE 802.11 function that offers frame transmission privacy
similar to a wired network. The Wired Equivalent Privacy generates secret
shared encryption keys that both source and destination stations can use to
alter frame bits to avoid disclosure to eavesdroppers.
Wi-Fi Protected Access (WPA)
An optional IEEE 802.11 function that offers a high level of security.
Wi-Fi Protected Access uses a combination of 802.1x authentication and
broadcast/session keys.
Model Number:WA4001A-BT
E032004-R01 F1.0

Navigation menu