LITE ON TECHNOLOGY WP300UP 802.11g Wireless Access Point / Workgroup Bridge User Manual WP 300U AP

LITE-ON Technology Corp. 802.11g Wireless Access Point / Workgroup Bridge WP 300U AP

Contents

AP mode User Manual

3
The information contained in this manual has been verified at the time of this
manual's printing. The manufacturer reserves the right to make any changes and
improvements in the product described in this manual at any time and without notice.
All registered trademarks are the property of their respective owners.
Copyright © 2003 All rights reserved. No reproduction of this document in any form
is permitted without prior written authorization from the manufacturer.
4
Chapter 1: Introduction
The WP-300U acts as a high performance 802.11g access
point and also support bridge mode to enable multiple wired
Ethernet client access to wireless environments. The WP-300U
also provides convenient WLAN access to office/family users
with connection speeds up to 54Mbps. Support Wi-Fi Protected
Access standard to provide higher level of security for network
data and communication. Optional 802.3af capability enriches
possible application for installation. The WP-300U is also fully
compatible with IEEE 802.11b standard, so it connects with all
existing 802.11b-compliant devices.
1.1 Features
Easy to use Web Browser-Based configuration
Built-in high speed RISC CPU for better performance.
It will help for better third-party review comment and
benefit the sell-through
Compact size for home user
Detachable SMA type antenna
Acts as the workgroup bridge between wired Ethernet
clients and wireless 802.11g
Support latest WPA security feature (Bridge mode
support WPA PSK only)
1.2 Package Contents
Before installing the WP-300U, please verify that you have all
the items listed as below. If any of the items are missing or
damaged, please contact us. Also be sure you have all the
necessary tools and cabling before installing the WP-300U.
5
1.3 Description of Hardware
The following figures show the back panels of this Access
Point:
The Package includes:
One WP-300U
Power adapter
Users Guide( Wireless Access Point & Workgroup Bridge)
Warronty Card
Quick Install Guide
Reset Button
While the user has the trouble of negotiation with
WirelessLAN, pressing the Reset button for system
refresh, pressing the Reset button for system reset to
default settings.
LAN Ports
For linking computers or other Ethernet devices, e.g. a
hub/switch
Uplink/PC Switch
For connect to the Ethernet port of hub/switch,select the
switch to ” Uplink”. If not, switch to “PC”.
Power (DC 5V)
Used to connect the external power adapter supplied with
the Access Point. Note that only the supplied adapter should
be used.
6
1.4 LEDs
The LEDs are indicators of switch activity and performance.
Table 1 shows the location of the LEDs. You can check each
connection by viewing the port status indicators shown in the
following table.
Table 1: LEDs Indicators
LED Status Description
Power Green, On Power is supplied to the device
Off Power is disconnected
WLAN Green, On WLAN On
Blinking transmitting data to the wireless LAN
Link/Activity from the Access Point
Off No data transferred
LAN Green, On Good Link
Link/Act Blinking Receiving/transmitting data at 100M
7
Chapter 2: Installation
2.1 Making a Connection
1. Connect to a hub/switch — Use a standard Ethernet
RJ-45 cable.
2. Check the “Link/Act” LED of “LAN” port on front
panel, it must be on.
If not, to ensure that the cable is connected
properly.
3. Connect the power adapter.
Attention:
1. The cable distance between the Router and PC/hub/
Switch should not exceed 100 meters.
2. Make sure the wiring is correct. In10Mbps
operation, Category 3/4/5 cable can be used for
connection. To reliably operate your network at
100Mbps, you must use Category 5 cable, or better
Data Grade.
2.1.1 Setup Uplink-PC slide switch
1. For connecting to a hub/switch, select the switch to
“Uplink”.
2. For connecting to a PC, select the switch to “PC”.
8
2.2 Verify the IP address setting
Your need to configure your PC’ s network settings to an IP
address. Computer use IP addresses to communicate with
each other across a network, such as the Internet.
1. From the taskbar, click the Start button, select
Settings > Control Panel. From there, double-click
the Network connections icon.
2. Right click the Local Area Connection icon
Properties , select the
TCP/IP
line for the appli-
cable Ethernet adapter. Then, click the Properties
button.
3. Click the IP Address tab page, select USE the
following IP address, type
192.168.1.1~192.168.
1.254
( but, 192.168.1.240 for this Access Point use)
in the IP Address field and
255.255.255.0
in the
Subnet Mask field, then click OK button.
9
2.3 Setup the Access Point under Windows
Start Setup...
1. After getting the correct connection, start the web
browser
and type 192.168.1.240 in the address field. Press
Enter.
2. Enter the factory default User name field and Password
field are blank and click OK button.
10
2.3.1 Information
Basic information about this access point. NOTE: You may
have to reload this page to see the current settings.
Figure 1: Information
11
2.3.2 Associations
This is a list of MAC addresses of stations that have associ-
ated to the access point. NOTE: You may have to reload this
page to see the current settings.
Figure 2: Associations
12
2.3.3 Wireless Configuration
On this page you can configure the basic 802.11g access
point settings. Any new settings will not take effect until the
access point is rebooted.
Visibility Status
When Invisibility is selected, the AP is protected
against discovery by wireless sniffers, and all wireless
clients must explicitly know and use the SSID.
PHY Profiles
These profiles control a number of settings for
Figure 3: Wireless Configuration
13
overall wireless network usage. Their meanings are
self-explanatory. For more details, please see Intersil
documentation.
Wireless Network Name (SSID)
This is the name of the access point on the wireless
network. Stations that associate to this access point
may have to know this name.
Channel
IThis is the radio channel that the access point will
operate on. If you experience interference (e.g. lost
connections or slow data transfers) you may need
to try different channels to see which is the best.
Channels 1-11 are in the 2.4 GHz band.
Transmission rate (Mbits/s)
This is the speed at which the access point will
transmit data. Normally you should select ‘best’
here, although if your wireless network is unusually
noisy or quiet you may which to use a fixed low or
high rate.
14
Figure 4: Access Control
2.3.4 Access Control
On this page you can enable Access Control. If enabled, only
the MAC addresses entered into the ‘MAC address’ boxes are
allowed to associate to this AP. Note that you can cut and
paste the addresses from the ‘Station List’ page into the MAC
address boxes. These changes are effective immediately.
15
Figure 5: Advanced Wireless
2.3.5 Advanced Wireless
On this page you can configure the advanced 802.11g
access point settings. Any new settings will not take effect
until the access point is rebooted.
Maximum associated stations
This the maximum number of wireless stations
that can be associated at any one time.
16
Fragmentation threshold
Transmitted wireless packets larger than this size
will be fragmented to maintain performance in noisy
wireless networks.
RTS threshold
Transmitted wireless packets larger than this size
will use the RTS/CTS protocol to (a) maintain
performance in noisy wireless networks and (b)
prevent hidden nodes from degrading performance.
Beacon period
Access point beacons are sent out periodically.
This is the number of milliseconds between each
beacon.
DTIM interval
This is the number of beacons per DTIM (Delivery
Traffic Indication Message), e.g. ‘1’ means send a
DTIM with each beacon, ‘2’ means with every 2nd
beacon, etc.
Maximum burst time
This is also known as PRISM Nitro (tm)
technology. The technology uses fully standards-
compliant methods that eliminate collisions in mixed-
mode networks, while greatly increasing the
performance of both pure 802.11g and mixed 802.
11b/g networks. The setting is for the amount of
time the radio will be reserved to send data without
requiring an ACK. This number is in units of
microseconds. A typical value would be 650
microseconds. When this number is zero, bursting is
17
disabled.
Enable PSM buffer
Turn this on to enable support for stations in power
save mode.
18
Figure 6-1: Security and Encryption Settings(1)
2.3.6 Security and Encryption Settings
On this page you can set the 802.11g security and encryp-
tion options. Any new settings will not take effect until the
access point is rebooted.
19
Figure 6-2: Security and Encryption Settings(2)
WPA configuration
Enable WPA Authenticator to require stations to use
high grade encryption and authentication.
WPA Enable.
PSK Pass-phrase: Leave blank if stations will be sup-
plied a key by the 1X Authentication Server. Choose a
pass-phrase between 8 and 63 characters.
WPA Multicast Cipher Type: Currently TKIP is the
only permitted setting.
20
802.1X configuration
When 802.1X authentication is enabled then the AP
will authenticate clients via a remote RADIUS server.
WPA Pairwise Cipher Type: Currently TKIP is the only
permitted setting.
WPA Group Key Update Interval.
WEP configuration
WEP is the wireless encryption standard. To use it
you must enter the same key(s) into the access point
and the wireless stations. For 64 bit keys you must enter
10 hex digits into each key box. For 128 bit keys you
must enter 26 hex digits into each key box. A hex digit is
either a number from 0 to 9 or a letter from A to F. If
you leave a key box blank then this means a key of all
zeros.
802.1X Enable.
Authentication timeout(mins).
RADIUS server IP address.
RADIUS server port number.
RADIUS server shared secret.
MAC Address Authentication.
Enable WEP : Check this box to enable WEP. For the
most secure use of WEP, also select “Deny Unencrypted
Data” and set Authentication to “Shared Key” when WEP
is enabled.
WEP key lengths: Select the key size. This length
applies to all keys.
WEP key.
Default WEP key to use: Select the key to be used
21
as the default key. Data transmissions are always en-
crypted using the default key. The other keys can only
be used to decrypt received data.
Deny unencrypted data: Select this to require peers
to use encryption. This is only effective when WEP is
enabled
Authentication: ‘Open’ allows anyone to authenti-
cate to this access point. ‘Shared key’ allows only sta-
tions that know the key(s) to authenticate. ‘Both’ allows
a station to use either mode.
22
Figure 7: IP Settings
2.3.7 IP Settings
On this page you can configure the IP address used by the
Web server running on this access point. For “static” mode, the
IP address settings are given here. For “DHCP” mode, these set-
tings are supplied by a DHCP server on your network. Any new
IP settings will not take effect until the access point is rebooted.
IP Address Mode
Select ‘DHCP’ to get the IP settings from a DHCP
server on your network. Select ‘Static’ to use the IP
settings specified on this page.
23
Default IP Address
Type the IP address of your Access Point.
Default subnet mask
The subnet mask specifies the network number
portion of an IP address. The factory default is 255.255.
255.0.
Default gateway
This is the IP address of the gateway that connects
you to the internet.
Access point name
This is the name that the access point will use to
identify itself to external configuration and IP-address-
finding programs. This is not the same as the SSID. It is
okay to leave this blank if you are not using these
programs.
24
Figure 8: Administration
2.3.8 Administration
On this page you can change the password, reboot the access
point, or reset all settings to their factory defaults. If you have
changed any settings it is necessary to reboot the access point
for the new settings to take effect.
User name
This is the user name that you must type when
logging in to these web pages.
administrator password
This is the password that you must type when
logging in to these web pages. You must enter the same
25
password into both boxes, for confirmation.
Commands
Upgrade firmware
The upload may take up to 60 seconds.
Reboot access point.
Reset to factory defaults.
26
Figure 9: Help
2.3.9 Help
This is where some helpful information will go. There is
nothing here right now.
27
Appendix I Specifications
Standard support
IEEE802.3, IEEE802.3u, IEEE802.11b, IEEE802.11g
Interface
Wireless IEEE 802.11b/g
One 10/100 Mbps RJ-45 port
Max. Band width
Ethernet:
Full Duplex: 200Mbps (100BaseTX), 20 Mbps(10BaseT)
Half Duplex: 100Mbps (100BaseTX), 10 Mbps(10BaseT)
Wireless: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps, Auto
Fall-Back
SDRAM 1Mbit
Flash 4Mbit
Diagnostic LEDs
Unit: Power (Green)
WLAN: 100M Link/Activity (Green)
LAN: 100M Link/Act (Green)
Wireless Radio
Data Rate: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps
Signal Frequency: 2.4Ghz to 2.5Ghz OFDM with BPSK, QPSK,
16QAM, 64QAM, DBPSK, DQPSK, CCK
Encryption: 64bit and 128bit WEP data encryption
Channel:
America/FCC: 2.412~2.462 GHz (11 channels)
Europe CE/ETSI: 2.412~2.472 GHz (13 channels)
Japan: 2.412~2.484 GHz (14 channels)
France: 2.457~2.472 GHz(4 channels)
Spain: 2.457~2.462 GHz (2 channels)
RF Power Output: 16 dBm@ 11Mbps/ 12dBm @54 Mbps
(typical)
28
Receiver Sensitivity: 54Mbps OFDM, 10% PER, -68dBm 11Mbps
CCK, 8% PER, -84dBm
Wireless Setting
SSID
Channel Selection
Transmission Rate (Best, 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5,
2, 1) in Mbps
Intersil PHY profiles
802.11g Max Performance,
802.11g only
802.11b/g Mixed
802.11b/g Mixed with Long Preamble
802.11b for Wi-Fi certification
802.11b only
Fragment Threshold
RTS Threshold
Wireless Security
WEP setting
WEP Enabled (On or Off)
WEP key Length(64-bit, 128 -bit)
Default WEP key to use (1-4)
WEP key (10 or 26 hex digits)
Deny unencrpted data (On or Off)
Authentication (Open, Shared Key, Both)
WPA setting
WPA Enabled (On or Off)
PSK (up to 63 charactersof text)
WPA Muticast Cipher Type (TKIP-WPA, None)
WPA Pairwise Cipher Type (TKIP-WPA, None)
Software / Firmware
AP and Bridge mode support (Need different firmware)
DHCP Client
29
WPA Support (Bridge mode support WPA PSK only)
MAC Cloning (WLAN Card, Ethernet Client)
Web-based configuration via popular browser (MS IE,
Netscape...)
Firmware download and upgrade via web server
Reset to default by web server or hardware button
Forwarding Mode store and foreard
Antenna Gain Max 1.91 dB
30
802.11 standard
802.11, or IEEE 802.11, is a type of radio technology used for
wireless local area networks (WLANs). It is a standard that has
been developed by the IEEE (Institute of Electrical and Elec-
tronic Engineers), http://standards.ieee.org. The IEEE is an in-
ternational organization that develops standards for hundreds of
electronic and electrical technologies. The organization uses a
series of numbers, like the Dewey Decimal system in libraries, to
differentiate between the various technology families.
The 802 subgroup (of the IEEE) develops standards for local
and wide area networks with the 802.11 section reviewing and
creating standards for wireless local area networks.
Wi-Fi , 802.11, is composed of several standards operating in
different radio frequencies: 802.11b is a standard for wireless
LANs operating in the 2.4 GHz spectrum with a bandwidth of 11
Mbps.
Another standard, 802.11g, is for WLANS operating in the 2.4 GHz
frequency but with a bandwidth of 54 Mbps.
Appendix II Glossary
31
802.11b
International standard for wireless networking that operates
in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and
provides a throughput of up to 11 Mbps. This is a very commonly
used frequency. Microwave ovens, cordless phones, medical and
scientific equipment, as well as Bluetooth devices, all work within
the 2.4 GHz frequency band.
802.11g
Similar to 802.11b, but this standard provides a throughput of
up to 54 Mbps. It also operates in the 2.4 GHz frequency band
but uses a different radio technology in order to boost overall
bandwidth.
Access point
A wireless LAN transceiver or “base station” that can connect a
wired LAN to one or many wireless devices. Access points can
also bridge to each other.
There are various types of access points and base stations
used in both wireless and wired networks. These include bridges,
hubs, switches, routers and gateways. The differences between
them are not always precise, because certain capabilities associ-
ated with one can also be added to another. For example, a
router can do bridging, and a hub may also be a switch. But
they are all involved in making sure data is transferred from one
location to another.
A bridge connects devices that all use the same kind of protocol.
A router can connect networks that use differing protocols. It
also reads the addresses included in the packets and routes
them to the appropriate computer station, working with any other
routers in the network to choose the best path to send the pack-
ets on. A wireless hub or access point adds a few capabilities
32
such as roaming and provides a network connection to a variety
of clients, but it does not allocate bandwidth. A switch is a hub
that has extra intelligence: It can read the address of a packet
and send it to the appropriate computer station. A wireless gate-
way is an access point that provides additional capabilities such
as NAT routing, DHCP, firewalls, security, etc.
AES (Advanced Encryption Standard)
A chip-based security, has been developed to ensure the
highest degree of security and authenticity for digital information,
wherever and however communicated or stored, while making
more efficient use of hardware and/or software than previous
encryption standards. It is also included in IEEE 802.11i standard.
Compared with AES, TKIP is a temporary protocol for replacing
WEP security until manufacturers implement AES at the hard-
ware level.
DHCP
Dynamic Host Configuration Protocol. This protocol automati-
cally configures the TCP/IP settings of every computer on your
home network.
Encryption key
An alphanumeric (letters and/or numbers) series that enables
data to be encrypted and then decrypted so it can be safely
shared among members of a network. WEP uses an encryption
key that automatically encrypts outgoing wireless data. On the
receiving side, the same encryption key enables the computer to
automatically decrypt the information so it can be read.
Ethernet
A standard for computer networks. Ethernet networks are con-
33
nected by special cables and hubs, and move data around at up
to 100 million bits per second (Mbps).
ESSID
The identifying name of an 802.11 wireless network. When
you specify your correct ESSID in your client setup you ensure
that you connect to your wireless network rather than another
network in range. (See SSID.) The ESSID can be called by dif-
ferent terms, such as Network Name, Preferred Network, SSID
or Wireless LAN Service Area.
Gateway
In the wireless world, a gateway is an access point with addi-
tional software capabilities such as providing NAT and DHCP.
Gateways may also provide VPN support, roaming, firewalls,
various levels of security, etc.
IEEE802.11
A set of specifications for LANs from The Institute of Electrical
and Electronics Engineers (IEEE). Most wired networks con-
form to 802.3, the specification for CSMA/CD based Ethernet
networks or 802.5, the specification for token ring networks.
802.11 defines the standard for wireless LANs encompassing
three incompatible (non-interoperable) technologies: Frequency
Hopping Spread Spectrum (FHSS), Direct Sequence Spread
Spectrum (DSSS) and Infrared. WECA’s focus is on 802.11b, an
11 Mbps high-rate DSSS standard for wireless networks.
IP Address
IP stands for Internet Protocol. An IP address consists of a
series of four numbers separated by periods, that identifies an
single, unique Internet computer host. Example: 192.34.45.8.
34
ISP Gateway Address (see ISP for definition).
The ISP Gateway Address is an IP address for the Internet
router located at the ISP’s office. This address is required only
when using a cable or DSL modem.
ISP
Internet Service Provider. An ISP is a business that provides
connectivity to the Internet for individuals and other businesses
or organizations.
LAN
Local Area Network. A LAN is a group of computers and de-
vices connected together in a relatively small area (such as a
house or an office). Your home network is considered a LAN.
MAC
Every wireless 802.11 device has its own specific MAC ad-
dress hard-coded into it. This unique identifier can be used to
provide security for wireless networks. When a network uses a
MAC table, only the 802.11 radios that have had their MAC ad-
dresses added to that network’s MAC table will be able to get
onto the network.
MAC Address
MAC stands for Media Access Control. A MAC address is the
hardware address of a device connected to a network.
Peer-to-peer network
A wireless or wired computer network that has no server or
central hub or router. All the networked PCs are equally able to
act as a network server or client, and each client computer can
talk to all the other wireless computers without having to go
through an access point or hub. However, since there is no cen-
tral base station to monitor traffic or provide Internet access, the
35
various signals can collide with each other, reducing overall
performance.
SSID
A 32-character unique identifier attached to the header of
packets sent over a WLAN that acts as a password when a mo-
bile device tries to connect to the BSS. (Also called ESSID.) The
SSID differentiates one WLAN from another, so all access points
and all devices attempting to connect to a specific WLAN must
use the same SSID. A device will not be permitted to join the
BSS unless it can provide the unique SSID. Because an SSID can
be sniffed in plain text from a packet, it does not supply any
security to the network. An SSID is also referred to as a Network
Name because essentially it is a name that identifies a wireless
network.
Subnet Mask
A subnet mask, which may be a part of the TCP/IP informa-
tion provided by your ISP, is a set of four numbers configured
like an IP address. It is used to create IP address numbers used
only within a particular network (as opposed to valid IP address
numbers recognized by the Internet.
TCP/IP
Transmission Control Protocol/Internet Protocol. This is the
standard protocol for data transmission over the Internet.
TKIP
The TKIP (Temporal Key Integrity Protocol), pronounced tee-
kip, is part of the IEEE 802.11i encryption standard for wireless
LANs. TKIP is the next generation of WEP used to secure 802.11
wireless LANs.TKIP provides per-packet key mixing, a message
36
integrity check and a re-keying mechanism, thus fixing the flaws
of WEP.
WAN
A wide area network (WAN) is a geographically dispersed
telecommunications network. The term distinguishes a broader
telecommunication structure from a local area network. A wide
area network may be privately owned or rented, but the term
usually connotes the inclusion of public (shared user) networks.
An intermediate form of network in terms of geography is a
metropolitan area network .
WEP
WEP (Wired Equivalent Privacy) is 802.11’s optional encryp-
tion standard implemented in the MAC layer that most radio
network interface card (NIC) and access point vendors support.
Basic wireless security provided by Wi-Fi. In some instances,
WEP may be all a home or small-business user needs to protect
wireless data. WEP is available in 40-bit (also called 64-bit), or in
108-bit (also called 128-bit) encryption modes. As 108-bit en-
cryption provides a longer algorithm that takes longer to decode,
it can provide better security than basic 40-bit (64-bit) encryption.
Wi-Fi
An interoperability certification for wireless local area net-
work (LAN) products based on the Institute of Electrical and
Electronics Engineers (IEEE) 802.11 standard.
WLAN
Also referred to as LAN. A type of local-area network that uses
high-frequency radio waves rather than wires to communicate
between nodes.
37
WPA
WPA is a standards-based, interoperable security specification
that utilizes Temporal Key Integrity Protocol to provide im-
proved over-the-air encryption of wireless data.
In order to maintain compliance with the FCC RF exposure guidelines, this 
equipment shouldbe installed and operated with minimum distance 20cm 
between the radiator and your body.Use only with supplied antenna. 
Unauthorized antenna, modification, or attachments could damage the 
transmitter and may violate FCC regulations.

Navigation menu