GemTek Technology R911129 WLAN Inter-Building Router User Manual P380 users guide UL
Gemtek Technology Co., Ltd. WLAN Inter-Building Router P380 users guide UL
Manual
P380 Wi-Fi Inter-Building Router User’s Guide .Wireless Broadband Anywhere .Wireless Broadband Anywhere.Wireless Broadband Anywhere. P380 Users guide Contents P380 ___________________________________________________________1 User’s Guide _________________________________________________________ 1 Overview________________________________________________________4 Wireless Networking System ____________________________________________ 4 Features ________________________________________________________5 3 Operating Modes _______________________________________________6 Starting Up ______________________________________________________8 Device Status page ______________________________________________ 10 Setup Wizard ___________________________________________________ 11 Operation Mode Settings Page _________________________________________ 11 General Configuration Settings Page _____________________________________ 12 Network Configuration Settings page _____________________________________ 13 Wireless Configuration Settings page ____________________________________ 14 Redirection Service ___________________________________________________ 16 Advanced Settings ______________________________________________ 18 Firewall configuration _________________________________________________ 18 ACL Configuring _____________________________________________________ 21 Static routing configuration _____________________________________________ 21 DHCP Service Configuration ___________________________________________ 23 Port forwarding configuration ___________________________________________ 23 Setting up administrator password _______________________________________ 25 System Tools ___________________________________________________ 26 Clients page ________________________________________________________ 26 Loopback Test_______________________________________________________ 27 Configuring SNMP management ________________________________________ 29 Site survey page _____________________________________________________ 30 Monitoring page _____________________________________________________ 30 Upgrade page _______________________________________________________ 31 Upgrade Utility_______________________________________________________ 34 Reboot Page ________________________________________________________ 34 Reset page _________________________________________________________ 35 Hardware Reset _________________________________________________ 36 Specifications __________________________________________________ 37 P380 Users guide Administration _______________________________________________________ 37 Glossary _______________________________________________________ 39 P380 Users guide Overview The AP router, P380, is a standalone wireless client, which provides IP routing functionality between a Local Area Network (LAN) and a Wide Area Network (WAN). It uses an Ethernet interface to connect to LAN, and wireless 802.11b-based interface to connect to a Wireless Networking System, which provides miscellaneous WAN access. Wireless Networking System P380 is part of the Wireless Internet Service Provision System. It provides access for locally connected computers to WAN, such as the Internet. In Figure 1 shown below, P380 client devices are connected to P380 access points (please refer to P380 specification). Figure 1: P380 Solution P380 Users guide Features P380 is based on indoor architecture. An indoor unit with 2.4 GHz antennas is placed on the mast or the ceiling of the construction elements. It is connected to a UTP cable. An individual computer or an entire local network can gain access to the Internet by simply connecting the P380 indoor unit to the switch/hub. P380 is a full featured IP router with extensive firewall capabilities and a user-friendly web interface. Features: • • • • Wireless Access Point or Client (configurable) Router/Bridge (configurable) and Firewall Telecom features Built-in Web management Interface P380 can be managed via: • FTP • Telnet • WWW • SNMP (v1, v2) It is possib le to modify the following information through a web interface: • • • • • • • General information Network LAN and WAN interfaces settings Wireless device settings DHCP server configuration IP Firewall Port forwarding Static routing P380 Users guide 3 Operating Modes The P380 Router supports 3 different kind of operating modes: AP-Router, AP and Bridge. AP-Router Mode In this mode, the P380 wireless unit plays the roles of the wireless network Access point and a router. LAN Hub Firewall Wireless LAN WOR-3000 WOR-3000 (ETRAX-100LX) (ETRAX-100LX) link ss ele Wir Wireless endpoint (client) WWW Server Wireless ISP Network Figure 2: AP-Router mode AP Mode In this mode, P380 acts as conventional wireless Access point. The routing function is disabled. Local Network Area is automatically set up to Wireless. Hub WOR-3000 LAN (ETRAX-100LX) Figure 3: AP mode P380 Users guide Bridge Mode When operating in this mode, one P380 device can connect with another P380 device and form wireless “bridge” interconnecting two or more local networks. Note that all these devices must work in the same frequency channel and must have the same SSID string. Please also note that wireless “bridge” DOES NOT retransmits packets. Figure 4: Bridge mode P380 Users guide Starting Up To setup P380 for the first time can be performed through a web browser on a computer connected to the local network. The administrator can use one of standard browsers available (e.g., Netscape Navigator, or Microsoft Internet Explorer versions 4.0 or later). Once the setup process is completed, P380 can be managed from any computer on the network that has a web browser. The steps to setup P380 using a web browser are listed below: 1. Launch a standard web browser on a computer connected to the network. 2. Enter the P380 IP address given to you from the ISP into the URL field of your web browser (the default setting is 192.168.2.2). P380 device provides SSL (Secure Sockets Layer) feature, so use https://192.168.2.2 to connect. If local network settings were configured correctly, then a login screen should appear: Input the username (the default username is “root”) and correct password (the default password is “pass”) and click the “OK” button to pass the security control screen. Once the correct username and password combination is entered, a P380 welcome screen should appear as below: P380 Users guide Figure 5: Welcome screen Click on the “Setup Wizard” button on the menu bar to begin P380 device configuration (described in the following section). P380 Users guide Device Status page Device status page displays all information includes system, interface and network status. Figure 6: Device Status table The Device Status page is divided into to four parts: System Status table - This table shows P380 software version, system uptime (after last reboot), average load, memory usage and radio signal strength (RSSI). System service and interfaces status is shown in “Service/Interface Status” table This table shows wireless interface and system services state. Possible values in this table can be Enabled/Disabled for appropriate interface/service state. 10 P380 Users guide Network status is shown in the “Network Status ” table - This table shows operating mode of the device, which can be “Router” for AP-Router mode, “AP” – for access point mode and “Bridge” for bridge mode. Network statistics are shown in separate table - This table contains statistics for both interfaces of the P380 – wired and wireless. The wired interface is called LAN, and the wireless interface is called WLAN. Each column corresponds to the statistics value of the interfaces: TxData – amount of data transferred TxErrors – amount of transmit errors RxData – amount of data received RxErrors – amount of receive errors Collisions – amount of network collisions Setup Wizard Operation Mode Settings Page The first page of the P380 configuration wizard is dedicated to the device operating mode selection: Figure 7: Device Mode Settings page This enables a user to select the operating mode of the device. Click on the “Reset” button to reset the page fields to their default values. Select one of the three device modes and click on the “Next” button to continue the configuration wizard (For a detailed explanation of the wizard settings, please refer to the P380 Quick Installation Guide). 11 P380 Users guide General Configuration Settings Page Various general device parameters can be set in this page. All of those parameters are optional. Figure 8: General Configuration Settings page These parameters include: Hostname – a general network parameter returned in statistics routines DNS Server address – this Domain Name Server address is assigned to the PCs requesting DNS address through DHCP (Dynamic Host Configuration Protocol). System Identification – free form system identification code for easier device identification by the service staff. Serial Number – A unique serial number of the P380 device. Users should not change this number. Address – The location of the device. Coordinates – GPS coordinates. Service staff fills this field when deploying device. Customer Name – customer name, which is used for easy identification of P380 Click on the “Back ” button to go to the previous page, Operating Mode Settings. Click on the “Reset” button to reset all page fields to their previous values and click on the “Next” button to continue the configuration wizard. 12 P380 Users guide Network Configuration Settings page v Router Mode In Router mode, LAN (Local Area Network) and WAN (Wide Area Network – For P380, this can be the enterprise networks on the Internet) configurations can be modified using the LAN Settings and the WAN Settings tables shown as followed: Figure 9: Network Configuration Settings page -1 (Router mode) WAN settings must be set up according to the information provided by the ISP. There is no such restriction on LAN settings. WAN access can be disabled to restrict LAN users access to this network. The masquerade setting enables the users to use the NAT (Network Address Translation) feature of P380. When this option is enabled, P380 “hides” LAN addresses to the “external world”. Access to the services, such as web services, provided by servers in the LAN, can be achieved by using the port forwarding feature. 13 P380 Users guide i Hint: Use known private IP addresses for the local network, because if you use public addresses, you will not be able to connect to WAN. It is recommended to use IANA (Internet Assigned Numbers Authority) reserved private address space (10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16) . v AP Mode In AP and Bridge mode, P380 does not require an active LAN (Local Area Network) interface, so the “LAN Interface Settings” table is not displayed. Figure 10: Network Configuration Settings page -2 (non-Router mode) Click on the “Back” button to go back to the previous page, which is General Configuration Settings. Click on the “Reset” button to reset all current page fields to their previous values and click on the “Next” button to continue wizard. Wireless Configuration Settings page Wireless device is configured as shown below: 14 P380 Users guide Figure 11: Wireless Configuration Settings page At lease two essential parameters are required to setup : 15 P380 Users guide − Access Point SSID (Service Set Identifier): This is a case-sensitive parameter to uniquely identify your radio network. − Default Channel for BSS: It can be set up by selecting a fixed channel or have the channel automatically assigned. i Hint: Use the site survey utility in System Tools to verify a fixed channel selection. This utility will help the administrator to discover unused channels, or to check the signal strengths of other Access points of the selected channel. In Bridge mode, there is a column field called "Access Point ID". This value should be assigned with different for all bridges connected to the same LAN as a bridge ID. The value itself has no meaning if it's less or greater than other's bridge ID. It can be from 0 to 255. For example, it could be assigned value "20" to the first bridge and "25" to the second. You may desire additional security on your wireless network, which can be achieved by using WEP (Wired Equivalent Privacy) encryption. P380 offers 64/128 bit WEP securities on wireless transmissions. Encryption keys are combined by 5 (for 64 bit WEP) or 13 (for 128 bit WEP) pairs of hexadecimal digit and separated by colon (e.g., 01:23:45:67:89 for 64 bit WEP encryption keys). WEP encrypts each frame transmitted from the radio using one of the keys from this table. When an encrypted frame is received, it will only be accepted if it is decrypted correctly, therefore the receiver must have the same WEP key used by the transmitter. Each key must consist of hex digits, which is composed of digits 0-9 and letters A-F. i Hint: Network traffic encryption requires a significant amount of resources, so its usage is recommended only when security is crucial. Usually it is not used in simple commercial networks transmitting everyday data. Also usually is more efficient to protect sensitive documents before transmitting over network e.g., use archive program with password protection, than encrypt all network traffic. Click on the “Back” button to return to the previous page, the Network Configuration Settings page. Click on the “Reset” button to reset all page fields to their previous values. Click on the “Save settings” to save and to close the configuring window. Redirection Service If a new IP was assigned and the “Save Settings” button was click to save the network setting, a waiting and redirection message pops up as shown below: 16 P380 Users guide Figure 12: Waiting and redirection message It indicates that the browser will be redirected to a new site (new IP). If the new site is in a different subnet from the old one (e.g., from 192.168.2.218/24 to 168.20.1.10/24), the redirection function will not work. The IP of the local connected computer must change to the same subnet of the new site (168.20.1.x/24) first. And then re-click the redirection message above or re-enter the new IP of P380 into URL field of browser, to reconnect to the site. If the new site is in the same subnet as the old site (e.g., from 192.168.2.218 to 192.168.2.100), and the redirection function did not redirect to new site automatically, please re-click the redirection message or refresh button in the browser. 17 P380 Users guide Advanced Settings Setting up advanced P380 settings requires some advanced knowledge of the TCP/IP network structure and functionalities. It is recommended that only skilled network administrators should use these settings. Firewall configuration IP firewall configuration page provides user firewall services control. User can add, modify or delete customized firewall rules. Main firewall page view is shown as followed: Figure 13: IP Firewall Settings page ~Note: In AP and Bridge mode P380 has no active LAN (Local Area Network) interface, so the “Firewall configuration” page is not displayed 18 P380 Users guide This page shows service state and firewall rules list. Rules are divided in two parts – Input rules, which apply to the incoming packets, and the Output rules, which apply to the outgoing packets. User can change these rule lists by editing existing rules, deleting unnecessary ones, and adding new rules. Modification and addition of the rules is shown below: Figure 14: Firewall rule edit The main firewall rule parameters are: Target – this implementation of firewall control supports only two types of rules – ACCEPT and DROP. The appropriate policy defines what to do if packet matches rule. Source IP Address – source IP address, can be specified as any Source Netmask – source subnet, can be specified as any Source port(s) – can be specified in two ways: All or a given port range 19 P380 Users guide Destination IP Address – specified the same as Source IP Destination Netmask – specified the same as Source Netmask Destination port(s) – specified the same as Source port Network protocol – network protocol which the rule affects. Can be specified as one of TCP/UDP/ICMP or any i Hint: If an exact port is specified, use of “any” protocol setting makes no sense (different protocols use their own port ranges). Use exact protocol, or use several rules to specify traffic filtering on required ports. ~Note: When defining rules, avoid DENY type rules using “any” as the address class, which can cause loss of web management connection (e.g., deny traffic from any to any IP address). In such case, only connection via serial console, manually disabling the firewall or hardware reset the device to factory default to disable the firewall setting, can rectify this problem. 20 P380 Users guide ACL Configuring All clients MAC are set by acceptable as default in Access Control List function. To deny the MAC address, just click “Add New Rule” button to add the new record. Access Control List setting is shown below: Figure 15: ACL Settings page Static routing configuration Static routing service lets user specify static routes, which is present in system routing table form system startup. This service is needed, when local computers are divided into different subnets, using external router, etc. Static routing page is shown as followed: Figure 16: Static Routing Settings page 21 P380 Users guide i Hint: above figure shows default system routes, which are added automatically, and restored after any network configuration. However these routes can be edited for temporary needs. This page provides a user static route list (present on the system), and ability to edit, delete and add routes. Rule editing and adding is done in the following page: ~Note: In AP and Bridge mode P380 has no active LAN (Local Area Network) interface, so the “Static Routes” page is not displayed Figure 17: Route editing table Each rule in the route list consists of Device (interface) selection (can be wireless or Ethernet), Destination address (depending on netmask, can be a host or sub net), Gateway address (if not specified, program uses default interface gateway), Metric (route priority), and Netmask. If netmask is specified as 255.255.255.255, then routing program assumes that it is the “host” route type; otherwise route specifies “net”. Note that routes are automatically enabled when the “Save Route” button is pressed. If a rule is specified incorrectly, no warning is provided, but rule is not added to the system. Only skilled network administrator with in-depth knowledge of the network topology should use the static routing feature. 22 P380 Users guide DHCP Service Configuration The Dynamic Host Configuration Protocol (DHCP) provides IP configuration parameters to hosts in a client-server model. DHCP servers assign network addresses and deliver the configuration parameters to other (client) hosts. DHCP server feature is offered only in AP Router mode. This server set up is done in the DHCP Settings table, which is shown below. Figure 18: DHCP Server Settings page DHCP server service can be enabled or disabled from this page. Service state is altered, and new configuration is loaded after “Save Settings” button is clicked. The IP Address range entered must be in the same subnet the LAN interface of P380. i Hint: Remember to set up local computers as DHCP client, when the DHCP server is enabled. If the server detects that some computers already have addresses from the defined range, the address is not given to the computers. ~Note: In AP and Bridge mode P380 has no active LAN (Local Area Network) interface, so “DHCP Settings” page is not displayed. Click on the “Reset” button to reset all page fields to their previous values and click on the “Save Settings” button to save the DHCP server setting. Port forwarding configuration Port forwarding service provides access to locally connected computers with dedicated services by overriding the firewall’s NAT (Network Address Translation) feature. Example of such services can be chat programs, online games, etc. Port forwarding 23 P380 Users guide administrator can define local computer, to which data from specified ports of firewall are automatically redirected to ports of this local computer. Port Forwarding Settings page is shown below: Figure 19: Port Forwarding Settings table ~Note: In AP and Bridge mode P380 has no active LAN (Local Area Network) interface, so the “Port Forwarding Settings” page is not displayed From this page, administrator can modify port forwarding rule list by adding new, delete and edit existing rules. Also the service can be enabled or disabled from this page. When editing existing rule, or adding new one – the following page is displayed: 24 P380 Users guide Figure 20: Port Forwarding Rule editing table As shown in Figure 20, a port forwarding rule consists of protocol specification – UDP or TCP protocol, port on the P380 needed for application, the local IP address and port to which arriving data will be redirected. i Hint: Sometimes games, chat programs and other applications may need to change their network settings to something like “Use Firewall” or “Use proxy” to work properly. This setting may and sometimes should be used with Port Forwarding service. When remote server desires to define IP address to communicate, you should specify not your local IP address, but IP address of P380. Setting up administrator password Administrator password is a key used to access P380 configuration functions in administrator security required login screen (please refer section “Starting Up”). It will be requested when setting up or maintaining P380. This password is set up in the Administrator Settings table shown in following: 25 P380 Users guide Figure 21: Administrator Settings table To change the password, you must enter the current password in “Old Password” field, then enter a new password in the “New Password” field. Re-enter the same value in the “Retype New Password” field. Use hard-to-guess password, i.e. more than five characters, containing both letters and numbers, and is not a dictionary word. Be sure to remember this password (or write it down at a safe location) to access the P380 management administration features in the future. Default factory password setting is “pass” (password is case-sensitive). This password should be changed frequently to prevent unauthorized user access to P380. Click on the “Reset” button to reset all page fields to their previous values and click on the “Save Settings” button to save the administrator settings. System Tools Clients page Connected Clients page shows connected wireless clients list (AP and AP-Router modes only). This list is shown in the form of a table: 26 P380 Users guide Figure 22: Connected Clients page In the “Client MAC address” column, connected wireless card MAC (hardware) addresses are shown. Signal and Noise columns show radio signal and noise levels. The column, “Rate ”, shows connection bit rate (connection speed) in hundreds of kilobits. This rate can be easily converted in to megabits by dividing this number by 10. For example 110 corresponds to 11Mbits, 55 correspond to 5.5Mbits and so on. Loopback Test Figure 23: Loopback Test page Loopback test is used for wireless link diagnostics. This page shows data transfer rate between P380 and endpoint device (PC running endpoint program). This transfer rate is 27 P380 Users guide measured by sending ICMP (Internet diagnostics protocol) stream to the end point device. Data is refreshed every second. To start loopback testing, enter endpoint IP address in the “Endpoint IP address” field and click on the “Start” button in the lower right corner of the page. Status line will show last measured data transfer rate, and the time when this data was received from the endpoint. To stop loopback-testing, click on the “Stop” button. ~Note: Due to the nature of this test, test data is stored in the web browser applet area. Clicking the “Refresh” or “Back” buttons when test is running will stop the test and clear the collected test data. 28 P380 Users guide Configuring SNMP management SNMP (Simple Network Management Protocol) service is configured in the SNMP Settings page. This page is used for setting up read-only and read-write communities: Figure 24: SNMP Settings Community strings are used for SNMP authentication purposes. It is possible to allow or deny IP address groups from accessing P380 using SNMP. IP address and netmask combination 0.0.0.0/32 means “ANY” IP address. It could be setup by a specified IP, ex 192.168.2.100/32, or by a group, ex 192.168.2.0/24. i Hint: For security purposes, use only local IP addresses for Read/Write access Click on the “Reset” button to reset all page fields to their default values and click on the “Save Settings” button to save the SNMP setting. 29 P380 Users guide Site survey page Figure 25: Site Survey Test Results page Site survey test shows the load situation in the wireless network. Using this test, user can scan for active Access Points; check the operating channels and their respective signal/noise levels. i Hint: Because wireless card is scanning through all radio frequency channels, the page loading time is much longer when compared to the other P380 management pages. Use the rescan button to check signal/noise levels when deploying new Access Points in the existing wireless network. Monitoring page 30 P380 Users guide Figure 26: Monitoring page The Monitoring menu shows TX/RX statistics graph. These statistics show a five-minute average traffic rate over the last 24 hours period. RX (green) indicates incoming (Received) traffic and TX (red) indicates outgoing (Transmitted) traffic. The TX/RX monitoring is restarted on every P380 reboot. The reason is that P380 has no real time clock, and the time used is relative to P380 restart. The first statistics appear as 2 points after 5 minutes after P380. Normal view is acquired 10 minutes and later after P380 reboot. Click on the 'Show' button is needed when first time the TX/RX statistics applet appears in browser window. Next time click 'Refresh' button which appears instead of 'Show' button to get newer TX/RX statistics. You can also manipulate on TX/RX graph time interval. There are two drop-down menus used for this purpose. The first one is used to choose the interval starting hour. It is possible to choose any hour from the last 24 hours, but choice can be limited to fewer hours because of P380 reboot. The second drop-down is used to choose time interval duration in hours. The possible choices are from 1 to 25 hours, but it also can be limited to fewer hours because of P380 reboot. Sometimes you can get 24 instead of 25 hours limit because relative time is even to hour range. ~Note: On older firmware versions, only 'Refresh' or 'Show' buttons are available, but they have the same behaviour. Upgrade page ~ Important! When clicking on the “Upgrade button” in the main menu, a warning message box will pop up. Do not enter this page if there is no need to upgrade P380. Simply click on the “Reset” button, if no upgrade is necessary. 31 P380 Users guide Entering this page will put the device into UPGRADE mode. All of the device functions will be SUSPENDED. Once the device enters the UPGRADE mode, it can only be upgraded or rebooted. i Hint: Because upgrade is done using the WEB management screen, all management pages still work, so it is still possible to configure P380 before rebooting it. Figure 27: Upgrade page P380 firmware is upgraded using the “Upgrade” page. In this page, the current firmware version is shown. If there is a need to change this firmware, a valid firmware file must be selected first. Click on the “Browse” button to do this. After clicking this button – a file selection dialog should appear: 32 P380 Users guide Figure 28: Firmware file selection dialog When firmware file is selected, its name is shown in the “Firmware” field. Then click on the “Upgrade” button to upgrade firmware. A “System Firmware Upgrade Process” screen will be displayed and firmware should be upgraded as shown below: Figure 29: System Firmware Upgrade Process Status A percentage will be showed on the status bar to indicate the upgrade status. After completed the firmware upgrade, the P380 device will be rebooted automatically. ~Note: The new firmware file overwrites the old one completely. All custom P380 configuration settings will be reset to the default values. Write down all configuration settings to be preserved, and set up them, when P380 starts after firmware upgrade. Initial P380 setup is described in the “Starting Up” chapter of this manual. 33 P380 Users guide Upgrade Utility P380 can also be configured as a wireless station, but the unit requires full firmware upgrade, which can not be done in the web site. Therefore the P380 comes with an upgrade utility, “upgrade.exe ”, to allow the user to perform the task. The program runs under MS Windows 2000 family and MS Windows XP. Before the program is executed, the firmware should be located first. It can be found under the root directory in the CD. When executing the program, the following screen should appear: Figure 30: Upgrade utility In the Host address field, enter the P380 IP address for which the firmware is to be upgraded. Enter the root password and choose Full upgrade. Specify the P380 station firmware file, before clicking on the “Upgrade” button. When the process is completed, it will be indicated in the upgrade log window. Reboot Page 34 P380 Users guide Click on the “Reboot” button to reboot P380 device via web management. All functions will be stopped while the device is rebooted. Reset page To reset the P380 device to the factory setting, click on the “Reset” button. A waiting & redirection message should be shown as below (for the redirection service, please refer to the redirection service section for detail): ~Note: All customized P380 configuration settings will be reset to the default values. Write down any configuration changes to be preserved, and set up them, when P380 starts after reset. Initial P380 setup is described in the “Starting Up” chapter of this manual. 35 P380 Users guide Hardware Reset To reset the P380 device back to factory settings, except for web management, hardware reset will be another choice. There is no any physical button offered in hardware reset. For convenience sake, P380 offers the hardware reset processes as followed. 1. Unplug the power cable. 2. Re-connect the power cable. 3. Please wait for 5 to 6 seconds. At this moment, please disconnect the power cable. 4. Reconnect the cable on again and device will restart. This procedure will reset the settings back to default configuration. The device IP will be reset to the default IP. ~Note: The length of the time allowed for hardware reset is only around two seconds. If it is missed, please restart the process. ~Note: All custom P380 configuration settings will be reset to the default values. Write down any configuration settings, which should be preserved, and set up them, when P380 starts after reset. Initial P380 setup is described in the “Starting Up” chapter of this manual. 36 P380 Users guide Specifications Hardware CPU RAM Flash Memory Ethernet Wireless ETRAX-100LX 16 MB 4 MB 10/100 Mbit IEEE 802.11b Operating system Linux version 2.4.14. Network Subsystem TCP/IP protocol suite Firewall Packet filtering Masquerading (NAT) Port forwarding DHCP DHCP server for one interface (Ethernet) SNMP 802.11 MIB support (read write) MIB-I, MIB2 support (read only) Routing Static routing only Wireless Wireless client mode support. Wireless access point mode support Wireless bridge mode support WEP-48, WEP-128 encryption support Administration Web Access to all user functions through web browsers (Java Script must be enabled) Dynamic configuration changes (no reboot necessary) 37 P380 Users guide Telnet All console features Scripting User script support (available on the Pro version) SNMP 802.11 MIB support (read write) MIB-I, MIB-II support (read only) Separate community strings for read and write support, standard SNMP trap support. 38 P380 Users guide Glossary Symbols: 10BaseT 10 Mbps/baseband/twisted pair. The IEEE standard for twisted pair Ethernet. IEEE 802.11b The IEEE standards for the definition of the Wireless high speed (11Mbit) protocol for wireless communication. Authorization the process of determining what types of activities a user is permitted to undertake. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized for different types of access or activity. Backbone The primary connectivity mechanism of a hierarchical distributed system. All systems, which have connectivity to an intermediate system on the backbone, are assured of connectivity to each other. This does not prevent systems from setting up private arrangements with each other to bypass the backbone for reasons of cost, performance, or security. Bandwidth Technically, the difference, in Hertz (Hz), between the highest and lowest frequencies of a transmission channel. However, as typically used, the amount of data that can be sent through a given communications circuit. For example, typical Ethernet has a bandwidth of 100Mbps. bps bits per second. A measure of the data transmission rate. DHCP Dynamic Host Configuration Protocol. A service that lets clients on a LAN request configuration information, such as IP host addresses, from a server. DNS Domain Name System. The distributed name/address mechanism used in the Internet. It comprises distributed online databases that contain mappings between humanreadable names and IP addresses, and servers, which provide translation services to client applications. Domain A part of the DNS naming hierarchy. Syntactically, an Internet domain name consists of a sequence of names (labels) separated by periods (dots), e.g., “machine.company.com”. See DNS. 39 P380 Users guide Ethernet A common, 10Mbps local area network technology invented by Xerox Corporation at the Palo Alto Research Center. Ethernet is a best-effort delivery system that uses CSMA/CD technology. Ethernet can be run over thinwire coaxial cable (10BASE2), thickwire coaxial cable (10BASE5), twisted pair cable (10BASET), or fibre optic cable. Filter Within the router, a filter is a process used to select which packets will be processed by the router, and which will be ignored or discarded. Selection may be based on addresses or protocol type. Firewall A system or combination of systems that enforces a boundary between two or more networks. FLASH A new memory technology, which combines the nonvolatile features of EPROMs with the easy in-system reprogramming of conventional volatile RAM. See EPROM. Gateway The original Internet term for what is now called router or more precisely, IP router. In modern usage, the term “gateway” and “application gateway” refers to systems, which perform translation from some native protocol, or physical data format to another. Examples include electronic mail gateways, which translate between X.400 and RFC 822 mail message formats. See router. Host An (end-user) computer system that connects to a network, such as a PC, minicomputer of mainframe. ICMP Internet Control Message Protocol. The TCP/IP protocol used to handle errors and control messages at the IP layer. ICMP is part of the IP protocol. Gateways, routers and hosts use ICMP to send reports of problems about datagrams back to the original source that sent the datagram. Interface One of the physical ports on the router, including the Ethernet and asynchronous ports. Interface type The type (Ethernet or Point-to-Point) of one of the interfaces on the router. 40 P380 Users guide Internet A collection of networks interconnected by a set of routers, which allow them to function as a single, large virtual network. Internet (note the capital “I”) The largest internet in the world consisting of large national backbone networks (such as MILNET, NSFNET, and CREN) and a myriad of regional and local campus networks all over the world. The Internet is a multiprotocol network, but generally carries TCP/IP. Internet address See IP address. Internet Protocol See IP. ISP Internet service provider. A company that provides Internet - related services. Most importantly, an ISP provides Internet access services and products to other companies and consumers. IP Internet Protocol. The network layer protocol for the TCP/IP protocol suite. It is a connectionless, best-effort packet switching protocol. IP address A 32-bit address assigned to hosts using TCP/IP. The address specifies a specific connection to a network, not the host itself. See dotted decimal notation. LAN Local Area Network. Any physical network technology (such as Ethernet) that operates at high speed (typically 10 Mbit per second or more) over short distances (up to a few kilometers). See WAN. LED Light Emitting Diode. A luminous indicator. MAC address. The hardware address of a device connected to a shared media. For example, the MAC address of a PC on an Ethernet is its Ethernet address. Metric A concept used to describe the cost of a route across a network, the distance to the destination at the remote end of the route, or the capacity of the route. Name resolution The process of mapping a name into the corresponding address. See DNS. NAT Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all 41 P380 Users guide necessary IP address translations. NAT is used for two main tasks – to provide a type of firewall by hiding internal IP addresses and enable a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations. Network A computer network is a data communications system which interconnects computer systems at various different sites. A network may be composed of any combination of LANs or WANs. Network address The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first two bytes of the IP address. For a class C network, the network address is the first three bytes of the IP address. In each case, the remainder is the host address. In the Internet, assigned network addresses are globally unique. See IP address. Node An addressable device attached to a computer network. See host, router. Packet The unit of data sent across a network. “Packet” is a generic term used to describe units of data at all levels of the protocol stack, but it is most correctly used to describe application data units. See datagram, frame. Policy Organization-level rules governing acceptable use of computing resources, security practices, and operational procedures. Port The abstraction used by Internet transport protocols to distinguish among multiple simultaneous connections to a single destination host. A port is a transport layer demultiplexing value. Each application has a unique port number associated with it. It is also used to refer to one of the physical network connectors on the router. Protocol A formal description of message formats and the rules two computers must follow to exchange those messages. Protocols can describe low-level details of machineto-machine interfaces (e.g., the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (e.g., the way in which two programs transfer a file across the Internet). QOS Quality of Service. Transmission system qualities measure in terms of reliability and availability. Route The path that network traffic takes from the source to the destination. It may include many gateways, routers, hosts and physical networks. 42 P380 Users guide Route table A table listing information about routes to other hosts or networks, such as the remote network or host address, the interface down which the route exists, the distance to the remote address and the cost of sending data over the route. Router A system responsible for making decisions about which of several paths network (or Internet) traffic will follow. To do this it uses a routing protocol to gain information about the network, and algorithms to choose the best route based on several criteria known as “routing metrics”. Server A network device that provides services to client stations. Examples include file servers and print servers. Service A term used with the router to refer to a connection to another port on (another) router, used to access dialup modems, hosts that do not support TCP/IP and other asynchronous devices. SNMP Simple Network Management Protocol. The Internet standard protocol developed to manage nodes on an IP network. See MIB. Subnet A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number. A subnet is to a network what a network is to an internet. Subnet Address The subnet portion of an IP address. In a subnetted network, the host portion of an IP address is split into a subnet portion and a host portion using an address or subnet mask. See subnet mask, IP address and network address. Subnet Mask A bit mask used to select bits from an Internet address for subnet addressing. The mask is 32 bits long and selects the network portion of the Internet address and one or more bits of the local portion. Sometimes called address mask. TCP Transmission Control Protocol. The TCP/IP standard transport layer protocol in the Internet suite of protocols, providing reliable, connection-oriented, full-duplex streams. It uses IP for delivery. TCP/IP Protocol Suite Transmission Control Protocol over Internet Protocol. This is common shorthand, which refers to the suite of transport and application protocols that runs over IP. See IP, ICMP, TCP, UDP, FTP, Telnet, and SNMP. Telnet The virtual terminal protocol in the TCP/IP suite of protocols, which allows users of one host t o log into a remote host and interact as normal terminal users of that host. 43 P380 Users guide Topology A network topology shows the computers and the links between them. A network layer must know the current network topology to be able to route packets to their final destination. UDP User Datagram Protocol. A transport layer protocol in the TCP/IP suite of protocols. UDP, like TCP, uses IP for delivery; however, unlike TCP, UDP provides for exchange of datagrams without acknowledgements or guaranteed delivery. URL Uniform Resource Locator. A standard format for specifying the name, type and location of documents and resources on an Internet. The syntax is type://host.domain[:port]/path/filename, where type specifies the type of document or resource (e.g. http is a file on a WWW server; file is a file on an anonymous FTP server; telnet is a connection to a Telnet-based service). See WWW. WAN Wide Area Network. Any physical network technology that spans large geographic distances. WANs usually operate a slower speeds than LANs. See LAN. WWW World Wide Web. A hypertext-based, distributed information system based on client - server architecture. Web browsers (client applications) request documents from Web servers. Documents may contain text, graphics and audiovisual data, as well as links to other documents and services. Web servers and documents are identified by URLs (Uniform Resource Locators). See URL. 44 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: - Reorient or relocate the receiving antenna. - Increase the separation between the equipment and receiver. - Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. - Consult the dealer or an experienced radio/TV technician for help. FCC Caution: To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No Encryption : Standard V1.2 (40-bit) User Access : Print, Copy, Fill forms, Extract, Assemble, Print high-res Creator : P380 users guide (UL) - Microsoft Word Create Date : 2002:09:25 09:32:15 Title : P380 users guide _UL_ Author : Alex_mrlee Producer : Acrobat PDFWriter 4.05 for Windows NT Modify Date : 2002:09:30 14:14:44+08:00 Page Count : 45EXIF Metadata provided by EXIF.tools