LITE ON TECHNOLOGY WP300UP 802.11g Wireless Access Point / Workgroup Bridge User Manual WP 300U Bridge

LITE-ON Technology Corp. 802.11g Wireless Access Point / Workgroup Bridge WP 300U Bridge

Contents

Bridge mode User Manual

Download: LITE ON TECHNOLOGY WP300UP 802.11g Wireless Access Point / Workgroup Bridge User Manual WP 300U Bridge
Mirror Download [FCC.gov]LITE ON TECHNOLOGY WP300UP 802.11g Wireless Access Point / Workgroup Bridge User Manual WP 300U Bridge
Document ID417237
Application IDsnMvf23Wmp90FCXCb+v6NA==
Document DescriptionBridge mode User Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize199.9kB (2498794 bits)
Date Submitted2004-04-23 00:00:00
Date Available2004-04-23 00:00:00
Creation Date2003-11-04 10:00:35
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-04-21 08:31:38
Document TitleWP-300U(Bridge)
Document CreatorAdobe PageMaker 6.52
Document Author: Louis

The information contained in this manual has been verified at the time of this
manual's printing. The manufacturer reserves the right to make any changes and
improvements in the product described in this manual at any time and without notice.
All registered trademarks are the property of their respective owners.
Copyright © 2003 All rights reserved. No reproduction of this document in any form
is permitted without prior written authorization from the manufacturer.
Chapter 1: Introduction
The WP-300U acts as a high performance 802.11g access
point and also support bridge mode to enable multiple wired
Ethernet client access to wireless environments. The WP-300U
also provides convenient WLAN access to office/family users
with connection speeds up to 54Mbps. Support Wi-Fi Protected
Access standard to provide higher level of security for network
data and communication. Optional 802.3af capability enriches
possible application for installation. The WP-300U is also fully
compatible with IEEE 802.11b standard, so it connects with all
existing 802.11b-compliant devices.
1.1
Features
Easy to use Web Browser-Based configuration
Built-in high speed RISC CPU for better performance.
It will help for better third-party review comment and
benefit the sell-through
Compact size for home user
Detachable SMA type antenna
Acts as the workgroup bridge between wired Ethernet
clients and wireless 802.11g
Support latest WPA security feature (Bridge mode
support WPA PSK only)
1.2
Package Contents
Before installing the WP-300U, please verify that you have all
the items listed as below. If any of the items are missing or
damaged, please contact us. Also be sure you have all the
necessary tools and cabling before installing the WP-300U.
The Package includes:
One WP-300U
Power adapter
Users Guide( Wireless Access Point & Workgroup Bridge)
Warronty Card
Quick Install Guide
1.3
Description of Hardware
The following figures show the back panels of the WP-300U:
Reset Button
While the user has the trouble of negotiation with
WirelessLAN, pressing the Reset button for system
refresh, pressing the Reset button for system reset to
default settings.
LAN Ports
For linking computers or other Ethernet devices, e.g. a
hub/switch
Uplink/PC Switch
For connect to the Ethernet port of hub/switch,select the
switch to ” Uplink”. If not, switch to “PC”.
Power (DC 5V)
Used to connect the external power adapter supplied with
the Access Point. Note that only the supplied adapter should
be used.
1.4
LEDs
The LEDs are indicators of switch activity and performance.
Table 1 shows the location of the LEDs. You can check each
connection by viewing the port status indicators shown in the
following table.
LED
Status
Description
Power
Green, On
Power is supplied to the device
Off
WLAN
Link/Activity
LAN
Link/Act
Green, On
Power is disconnected
WLAN On
Blinking transmitting data to the wireless LAN
from the Access Point
Off
Green, On
No data transferred
Good Link
Blinking Receiving/transmitting data at 100M
Table 1: LEDs Indicators
Chapter 2: Installation
2.1
Making a Connection
1.
Connect to a PC — Use a standard Ethernet RJ-45
2.
cable.
Check the “Link/Act” LED of “LAN” port on front
panel, it must be on.
If not, to ensure that the cable is connected
3.
properly.
Connect the power adapter.
Attention:
1.
The cable distance between the Router and PC/hub/
Switch should not exceed 100 meters.
2. Make sure the wiring is correct. In 10Mbps
operation, Category 3/4/5 cable can be used for
connection. To reliably operate your network at
100Mbps, you must use Category 5 cable, or better
Data Grade.
2.1.1
Setup Uplink-PC slide switch
1.
For connecting to a PC, select the switch to “PC”.
2.
For connecting to a hub/switch, select the switch to
“Uplink”.
2.2
Verify the IP address setting
Your need to configure your PC’ s network settings to an IP
address. Computer use IP addresses to communicate with
each other across a network, such as the Internet.
1. From the taskbar, click the Start button, select
Settings > Control Panel. From there, double-click
the Network connections icon.
2. Right click the Local Area Connection icon
Properties , select the TCP/IP line for the applicable Ethernet adapter. Then, click the Properties
button.
3. Click the IP Address tab page, select USE the
following IP address, type 192.168.1.1~192.168.
1.254 ( but, 192.168.1.240 for this Access Point use)
in the IP Address field and 255.255.255.0 in the
Subnet Mask field, then click OK button.
2.3
Setup the Workgroup Bridge under Windows
Start Setup...
1. After getting the correct connection, start the web
browser
and type 192.168.1.240 in the address field. Press
Enter.
2. Enter the factory default User name field and Password
field are blank and click OK button.
2.3.1 Information
Basic information about this bridge. NOTE: You may have to
reload this page to see the current settings.
Figure 1: Information
10
2.3.2 Basic Wireless
On this page you can configure the basic 802.11g wireless
settings. Any new settings will not take effect until the bridge
is rebooted.
Figure 2: Basic Wireless
Wireless Network Type
Select ‘Infrastructure’ to connect to a wireless access
point, select ‘Ad-hoc’ to connect to another bridge or
wireless station.
Wireless Network Name (SSID)
11
This is the name of the wireless access point that
this bridge will associate to. Leave this field blank to
associate to any access point.
Desired BSSID
This provides manual selection for the desired Access
Point to join with. The SSID for the Access Point still
has to match. You can copy and paste the desired MAC
address from the Info page.
Channel
This is the radio channel that is used in ad-hoc mode.
This setting has no effect in infrastructure mode. If you
experience interference (e.g. lost connections or slow
data transfers) you may need to try different channels
to see which is the best.
Transmission rate (Mbits/s)
This is the speed at which the bridge will transmit
data. Normally you should select ‘best’ here, although
if your wireless network is unusually noisy or quiet you
may which to use a fixed low or high rate.
Wireless Mode
Wireless mode allows the user to select whether this
Bridge will connect to an 802.11g only network, an
802.11b only network, or both types of networks.
12
2.3.3 Security and Encryption Settings
On this page you can set the 802.11g security and encryption options. Any new settings will not take effect until the
bridge is rebooted.
Figure 3: Security and Encryption Settings
13
WPA configuration
Enable WPA Authenticator to require stations to use
high grade encryption and authentication.
WPA Enable.
PSK: Enter a text pass phrase up to 63 characters.
WPA Multicast Cipher Type: Currently TKIP is the
only permitted setting.
WPA Pairwise Cipher Type: Currently TKIP is the only
permitted setting.
WPA Group Key Update Interval.
WEP configuration
WEP is the wireless encryption standard. To use it
you must enter the same key(s) into the bridge and the
access point. For 64 bit keys you must enter 10 hex
digits into each key box. For 128 bit keys you must enter
26 hex digits into each key box. A hex digit is either a
number from 0 to 9 or a letter from A to F. If you leave
a key box blank then this means a key of all zeros.
Enable WEP : Check this box to enable WEP. For the
most secure use of WEP, also select “Deny Unencrypted
Data” and set Authentication to “Shared Key” when
WEP is enabled.
WEP key lengths: Select the WEP key size. This
length applies to all keys.
Default WEP key to use: Select the key to be used
as the default key. Data transmissions are always encrypted using the default key. The other keys can only
be used to decrypt received data.
WEP key.
14
Deny unencrypted data: SSelect this to require peers
to use encryption. This is only effective when WEP is
enabled.
Authentication: Select the type of authentication used
when connecting to an access point. ‘Open’ is used if
anyone can connect to the AP. ‘Shared key’ is used if
both devices must know the encryption key.
15
2.3.4 Advanced
On this page you can configure the advanced 802.11g
wireless settings. Any new settings will not take effect until the
bridge is rebooted.
Figure 4: Advanced
16
Cloning Mode
This feature controls the MAC Address of the
Bridge as seen by other devices (wired or wireless).
If set to “Ethernet Client”, the MAC Address from
the first Ethernet client that transmits data through
the Bridge will be used. This setting is useful when
connected to an Xbox or if there is only one
Ethernet device connected to the bridge. When
multiple Ethernet devices are connected to the
Bridge, it may not be obvious which MAC Address is
being used.
If set to “WLAN Card”, the MAC Address of the
WLAN Card (typically written on the back of the
card) will be used. When multiple Ethernet devices
are connected to the Bridge, the MAC Address of
the Bridge will not change.
Fragmentation threshold
Transmitted wireless packets larger than this size
will be fragmented to maintain performance in noisy
wireless networks.
RTS threshold
Transmitted wireless packets larger than this size
will use the RTS/CTS protocol to (a) maintain
performance in noisy wireless networks and (b)
prevent hidden nodes from degrading performance.
Maximum burst time
This is also known as PRISM Nitro (tm)
technology. The technology uses fully standardscompliant methods that eliminate collisions in mixed17
mode networks, while greatly increasing the
performance of both pure
802.11g and mixed
802. 11b/g networks. The setting is for the amount
of time the radio will be reserved to send data
without requiring an ACK.
This number is in units of microseconds. The
optimized value for 802.11g only networks is 1400,
and the optimized value for 802.11g + 802.11b
mixed mode networks is 650. When this number is
zero, bursting is disabled.
18
2.3.5 Administration
On this page you can configure the IP address used by the
Web server running on this bridge. For “static” mode, the IP
address settings are given here. For “DHCP” mode, these
settings are supplied by a DHCP server on your network. You
can also change the password, reboot the bridge, or reset all
settings to their factory defaults. If you have changed any
settings it is necessary to reboot the bridge for the new settings to take effect.
Figure 5-1: Administration (1)
19
Figure 5-2: Administration (2)
Device name
This is the name that the bridge will use to identify itself
to external configuration and IP-address-finding
programs. This is not the same as the SSID. It is okay
to leave this blank if you are not using these programs.
IP settings
IP Address Mode: Select ‘DHCP’ to get the IP settings from a DHCP server on your network. Select ‘Static’
to use the IP settings specified on this page.
20
Default IP address: Type the IP address of your
bridge.
Default subnet mask: The subnet mask specifies
the network number portion of an IP address. The factory default is 255.255.255.0.
Default gateway: This is the IP address of the gateway that connects you to the internet. The factory
default is 192.168.1.1.
Security
User name: This is the user name that you must
type when logging in to these web pages.
Administrator password: This is the password that
you must type when logging in to these web pages.
You must enter the same password into both boxes,
for confirmation.
Commands
Reboot bridge.
Reset to factory defaults.
Upgrade firmware
The upload may take up to 60 seconds.
21
2.3.6 Help
This is where some helpful information will go. There is
nothing here right now.
22
Appendix I Specifications
Standard support
IEEE802.3, IEEE802.3u, IEEE802.11b, IEEE802.11g
Interface
Wireless IEEE 802.11b/g
One 10/100 Mbps RJ-45 port
Max. Band width
Ethernet:
Full Duplex: 200Mbps (100BaseTX), 20 Mbps(10BaseT)
Half Duplex: 100Mbps (100BaseTX), 10 Mbps(10BaseT)
Wireless: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps, Auto
Fall-Back
SDRAM 1Mbit
Flash
4Mbit
Diagnostic LEDs
Unit:
Power (Green)
WLAN:
100M Link/Activity (Green)
LAN:
100M Link/Act (Green)
Wireless Radio
Data Rate: 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48, 54 Mbps
Signal Frequency: 2.4Ghz to 2.5Ghz OFDM with BPSK, QPSK,
16QAM, 64QAM, DBPSK, DQPSK, CCK
Encryption: 64bit and 128bit WEP data encryption
Channel:
America/FCC: 2.412~2.462 GHz (11 channels)
Europe CE/ETSI: 2.412~2.472 GHz (13 channels)
Japan: 2.412~2.484 GHz (14 channels)
France: 2.457~2.472 GHz(4 channels)
Spain: 2.457~2.462 GHz (2 channels)
RF Power Output: 16 dBm@ 11Mbps/ 12dBm @54 Mbps
(typical)
23
Receiver Sensitivity: 54Mbps OFDM, 10% PER, -68dBm 11Mbps
CCK, 8% PER, -84dBm
Wireless Setting
− SSID
− Channel Selection
− Transmission Rate (Best, 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5,
2, 1) in Mbps
− Intersil PHY profiles
802.11g Max Performance,
802.11g only
802.11b/g Mixed
802.11b/g Mixed with Long Preamble
802.11b for Wi-Fi certification
802.11b only
− Fragment Threshold
− RTS Threshold
Wireless Security
WEP setting
− WEP Enabled (On or Off)
− WEP key Length(64-bit, 128 -bit)
− Default WEP key to use (1-4)
− WEP key (10 or 26 hex digits)
− Deny unencrpted data (On or Off)
− Authentication (Open, Shared Key, Both)
WPA setting
− WPA Enabled (On or Off)
− PSK (up to 63 charactersof text)
− WPA Muticast Cipher Type (TKIP-WPA, None)
− WPA Pairwise Cipher Type (TKIP-WPA, None)
Software / Firmware
− AP and Bridge mode support (Need different firmware)
− DHCP Client
24
− WPA Support (Bridge mode support WPA PSK only)
− MAC Cloning (WLAN Card, Ethernet Client)
− Web-based configuration via popular browser (MS IE,
Netscape...)
− Firmware download and upgrade via web server
− Reset to default by web server or hardware button
Forwarding Mode
store and foreard
Antenna Gain Max 1.91 dB
25
Appendix II Glossary
802.11 standard
802.11, or IEEE 802.11, is a type of radio technology used for
wireless local area networks (WLANs). It is a standard that has
been developed by the IEEE (Institute of Electrical and Electronic Engineers), http://standards.ieee.org. The IEEE is an international organization that develops standards for hundreds of
electronic and electrical technologies. The organization uses a
series of numbers, like the Dewey Decimal system in libraries, to
differentiate between the various technology families.
The 802 subgroup (of the IEEE) develops standards for local
and wide area networks with the 802.11 section reviewing and
creating standards for wireless local area networks.
Wi-Fi , 802.11, is composed of several standards operating in
different radio frequencies: 802.11b is a standard for wireless
LANs operating in the 2.4 GHz spectrum with a bandwidth of 11
Mbps.
Another standard, 802.11g, is for WLANS operating in the 2.4 GHz
frequency but with a bandwidth of 54 Mbps.
26
802.11b
International standard for wireless networking that operates
in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and
provides a throughput of up to 11 Mbps. This is a very commonly
used frequency. Microwave ovens, cordless phones, medical and
scientific equipment, as well as Bluetooth devices, all work within
the 2.4 GHz frequency band.
802.11g
Similar to 802.11b, but this standard provides a throughput of
up to 54 Mbps. It also operates in the 2.4 GHz frequency band
but uses a different radio technology in order to boost overall
bandwidth.
Access point
A wireless LAN transceiver or “base station” that can connect a
wired LAN to one or many wireless devices. Access points can
also bridge to each other.
There are various types of access points and base stations
used in both wireless and wired networks. These include bridges,
hubs, switches, routers and gateways. The differences between
them are not always precise, because certain capabilities associated with one can also be added to another. For example, a
router can do bridging, and a hub may also be a switch. But
they are all involved in making sure data is transferred from one
location to another.
A bridge connects devices that all use the same kind of protocol.
A router can connect networks that use differing protocols. It
also reads the addresses included in the packets and routes
them to the appropriate computer station, working with any other
routers in the network to choose the best path to send the packets on. A wireless hub or access point adds a few capabilities
27
such as roaming and provides a network connection to a variety
of clients, but it does not allocate bandwidth. A switch is a hub
that has extra intelligence: It can read the address of a packet
and send it to the appropriate computer station. A wireless gateway is an access point that provides additional capabilities such
as NAT routing, DHCP, firewalls, security, etc.
AES (Advanced Encryption Standard)
A chip-based security, has been developed to ensure the
highest degree of security and authenticity for digital information,
wherever and however communicated or stored, while making
more efficient use of hardware and/or software than previous
encryption standards. It is also included in IEEE 802.11i standard.
Compared with AES, TKIP is a temporary protocol for replacing
WEP security until manufacturers implement AES at the hardware level.
DHCP
Dynamic Host Configuration Protocol. This protocol automatically configures the TCP/IP settings of every computer on your
home network.
Encryption key
An alphanumeric (letters and/or numbers) series that enables
data to be encrypted and then decrypted so it can be safely
shared among members of a network. WEP uses an encryption
key that automatically encrypts outgoing wireless data. On the
receiving side, the same encryption key enables the computer to
automatically decrypt the information so it can be read.
Ethernet
A standard for computer networks. Ethernet networks are con28
nected by special cables and hubs, and move data around at up
to 100 million bits per second (Mbps).
ESSID
The identifying name of an 802.11 wireless network. When
you specify your correct ESSID in your client setup you ensure
that you connect to your wireless network rather than another
network in range. (See SSID.) The ESSID can be called by different terms, such as Network Name, Preferred Network, SSID
or Wireless LAN Service Area.
Gateway
In the wireless world, a gateway is an access point with additional software capabilities such as providing NAT and DHCP.
Gateways may also provide VPN support, roaming, firewalls,
various levels of security, etc.
IEEE802.11
A set of specifications for LANs from The Institute of Electrical
and Electronics Engineers (IEEE). Most wired networks conform to 802.3, the specification for CSMA/CD based Ethernet
networks or 802.5, the specification for token ring networks.
802.11 defines the standard for wireless LANs encompassing
three incompatible (non-interoperable) technologies: Frequency
Hopping Spread Spectrum (FHSS), Direct Sequence Spread
Spectrum (DSSS) and Infrared. WECA’s focus is on 802.11b, an
11 Mbps high-rate DSSS standard for wireless networks.
IP Address
IP stands for Internet Protocol. An IP address consists of a
series of four numbers separated by periods, that identifies an
single, unique Internet computer host. Example: 192.34.45.8.
29
ISP Gateway Address (see ISP for definition).
The ISP Gateway Address is an IP address for the Internet
router located at the ISP’s office. This address is required only
when using a cable or DSL modem.
ISP
Internet Service Provider. An ISP is a business that provides
connectivity to the Internet for individuals and other businesses
or organizations.
LAN
Local Area Network. A LAN is a group of computers and devices connected together in a relatively small area (such as a
house or an office). Your home network is considered a LAN.
MAC
Every wireless 802.11 device has its own specific MAC address hard-coded into it. This unique identifier can be used to
provide security for wireless networks. When a network uses a
MAC table, only the 802.11 radios that have had their MAC addresses added to that network’s MAC table will be able to get
onto the network.
MAC Address
MAC stands for Media Access Control. A MAC address is the
hardware address of a device connected to a network.
Peer-to-peer network
A wireless or wired computer network that has no server or
central hub or router. All the networked PCs are equally able to
act as a network server or client, and each client computer can
talk to all the other wireless computers without having to go
through an access point or hub. However, since there is no central base station to monitor traffic or provide Internet access, the
30
various signals can collide with each other, reducing overall
performance.
SSID
A 32-character unique identifier attached to the header of
packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. (Also called ESSID.) The
SSID differentiates one WLAN from another, so all access points
and all devices attempting to connect to a specific WLAN must
use the same SSID. A device will not be permitted to join the
BSS unless it can provide the unique SSID. Because an SSID can
be sniffed in plain text from a packet, it does not supply any
security to the network. An SSID is also referred to as a Network
Name because essentially it is a name that identifies a wireless
network.
Subnet Mask
A subnet mask, which may be a part of the TCP/IP information provided by your ISP, is a set of four numbers configured
like an IP address. It is used to create IP address numbers used
only within a particular network (as opposed to valid IP address
numbers recognized by the Internet.
TCP/IP
Transmission Control Protocol/Internet Protocol. This is the
standard protocol for data transmission over the Internet.
TKIP
The TKIP (Temporal Key Integrity Protocol), pronounced teekip, is part of the IEEE 802.11i encryption standard for wireless
LANs. TKIP is the next generation of WEP used to secure 802.11
wireless LANs.TKIP provides per-packet key mixing, a message
31
integrity check and a re-keying mechanism, thus fixing the flaws
of WEP.
WAN
A wide area network (WAN) is a geographically dispersed
telecommunications network. The term distinguishes a broader
telecommunication structure from a local area network. A wide
area network may be privately owned or rented, but the term
usually connotes the inclusion of public (shared user) networks.
An intermediate form of network in terms of geography is a
metropolitan area network .
WEP
WEP (Wired Equivalent Privacy) is 802.11’s optional encryption standard implemented in the MAC layer that most radio
network interface card (NIC) and access point vendors support.
Basic wireless security provided by Wi-Fi. In some instances,
WEP may be all a home or small-business user needs to protect
wireless data. WEP is available in 40-bit (also called 64-bit), or in
108-bit (also called 128-bit) encryption modes. As 108-bit encryption provides a longer algorithm that takes longer to decode,
it can provide better security than basic 40-bit (64-bit) encryption.
Wi-Fi
An interoperability certification for wireless local area network (LAN) products based on the Institute of Electrical and
Electronics Engineers (IEEE) 802.11 standard.
WLAN
Also referred to as LAN. A type of local-area network that uses
high-frequency radio waves rather than wires to communicate
between nodes.
32
WPA
WPA is a standards-based, interoperable security specification
that utilizes Temporal Key Integrity Protocol to provide improved over-the-air encryption of wireless data.
33
In order to maintain compliance with the FCC RF exposure
guidelines, this equipment shouldbe installed and operated with
minimum distance 20cm between the radiator and your
body.Use only with supplied antenna. Unauthorized antenna,
modification, or attachments could damage the transmitter and
may violate FCC regulations.


Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Modify Date                     : 2004:04:21 08:31:38+08:00
Create Date                     : 2003:11:04 10:00:35Z
Keywords                        : Ver, 1.0a
Subject                         : Workgroup Bridge IEEE 802.11g
Page Count                      : 37
Has XFA                         : No
About                           : uuid:96004cfc-feb3-4733-8432-de5e4f5d51ab
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Creation Date                   : 2003:11:04 10:00:35Z
Mod Date                        : 2004:04:21 08:31:38+08:00
Author                          : Louis
Metadata Date                   : 2004:04:21 08:31:38+08:00
Creator Tool                    : Adobe PageMaker 6.52
Document ID                     : uuid:26574eac-f45f-4e90-bc95-e6c6ff5b61d6
Format                          : application/pdf
Creator                         : Louis
Title                           : WP-300U(Bridge)
Description                     : Workgroup Bridge IEEE 802.11g
EXIF Metadata provided by EXIF.tools
FCC ID Filing: PPQWP300UP

Navigation menu