Loopcomm Technology LP-8696C LP-8696C 802.11n WIRELESS AP ROUTER User Manual User s Manual of WLAN Broadband router 1T2R

Loopcomm Technology,.Inc. LP-8696C 802.11n WIRELESS AP ROUTER User s Manual of WLAN Broadband router 1T2R

Users Manual

© 2009  User's Manual of WLAN Broadband router(2T2R)USER MANUAL  1.0.0
-2-Table of ContentsChapter I              Terminology  5Chapter II              Introduction  6................................................................................................................................... 61. Package contents................................................................................................................................... 62. Product Specifications................................................................................................................................... 73. Product Features................................................................................................................................... 84. Front Panel Description................................................................................................................................... 95. Rear Panel DescriptionChapter III              Installation  9................................................................................................................................... 91. Hardware Installation................................................................................................................................... 102. Software InstallationChapter IV              Software configuration  10................................................................................................................................... 101. Prepare your PC to configure the WLAN Broadband Router................................................................................................................................... 112. Connect to the WLAN Broadband Router................................................................................................................................... 123. Management and configuration on the WLAN Broadband Router......................................................................................................................................................... 123.1 Status ......................................................................................................................................................... 143.2 Setup Wizard ......................................................................................................................................................... 183.3 Operation Mode ......................................................................................................................................................... 183.4 Wireless - Basic Settings ......................................................................................................................................................... 203.5 Wireless - Advanced Settings ......................................................................................................................................................... 213.6 Wireless - Security Setup ......................................................................................................................................................... 233.7 Wireless - Access Control ......................................................................................................................................................... 243.8 WDS Settings .................................................................................................................................................. 253.8. WDS Security Setup .................................................................................................................................................. 263.8. WDS AP Table ......................................................................................................................................................... 273.9 Site Survey ......................................................................................................................................................... 273.10 WPS ......................................................................................................................................................... 293.11 LAN Interface Setup .................................................................................................................................................. 303.11. Static DHCP Setup ......................................................................................................................................................... 313.12 WAN Interface Setup .................................................................................................................................................. 323.12. Static IP .................................................................................................................................................. 343.12. DHCP Client .................................................................................................................................................. 363.12. PPPoE .................................................................................................................................................. 393.12. PPTP ......................................................................................................................................................... 413.13 Firew all - Port Filtering ......................................................................................................................................................... 423.14 Firew all - IP Filtering ......................................................................................................................................................... 433.15 Firew all - MAC Filtering ......................................................................................................................................................... 443.16 Firew all - Port Forw arding ......................................................................................................................................................... 463.17 Firew all - URL Filtering ......................................................................................................................................................... 463.18 Firew all - DMZ ......................................................................................................................................................... 473.19 Managem ent - Statistics
-3-......................................................................................................................................................... 483.20 Managem ent - DDNS ......................................................................................................................................................... 493.21 Managem ent - Tim e Zone Setting ......................................................................................................................................................... 503.22 Managem ent - Denial-of-Service ......................................................................................................................................................... 513.23 Managem ent - Log ......................................................................................................................................................... 523.24 Managem ent - Upgrade Firm w are ......................................................................................................................................................... 533.25 Managem ent - Save/ Reload Settings ......................................................................................................................................................... 533.26 Managem ent - Passw ord Setup Chapter V              FREQUENTLY ASKED QUESTIONS (FAQ)  54................................................................................................................................... 541. What and how to find my PC’s IP and MAC address?................................................................................................................................... 542. What is Wireless LAN?................................................................................................................................... 543. What are ISM bands?................................................................................................................................... 544. How does wireless networking work?................................................................................................................................... 555. What is BSSID?................................................................................................................................... 556. What is ESSID?................................................................................................................................... 557. What are potential factors that may causes interference?................................................................................................................................... 568. What are the Open System and Shared Key authentications?................................................................................................................................... 569. What is WEP?................................................................................................................................... 5610. What is Fragment Threshold?................................................................................................................................... 5611. What is RTS (Request To Send) Threshold?................................................................................................................................... 5712. What is Beacon Interval?................................................................................................................................... 5713. What is Preamble Type?................................................................................................................................... 5714. What is SSID Broadcast?................................................................................................................................... 5715. What is Wi-Fi Protected Access (WPA)?................................................................................................................................... 5716. What is WPA2?................................................................................................................................... 5817. What is 802.1x Authentication?................................................................................................................................... 5818. What is Temporal Key Integrity Protocol (TKIP)?................................................................................................................................... 5819. What is Advanced Encryption Standard (AES)?................................................................................................................................... 5820. What is Inter-Access Point Protocol (IAPP)?................................................................................................................................... 5821. What is Wireless Distribution System (WDS)?................................................................................................................................... 5822. What is Universal Plug and Play (uPNP)?................................................................................................................................... 5823. What is Maximum Transmission Unit (MTU) Size?................................................................................................................................... 5924. What is Clone MAC Address?................................................................................................................................... 5925. What is DDNS?................................................................................................................................... 5926. What is NTP Client?................................................................................................................................... 5927. What is VPN?................................................................................................................................... 5928. What is IPSEC?................................................................................................................................... 5929. What is WLAN Block Relay Between Clients?................................................................................................................................... 5930. What is WMM?................................................................................................................................... 5931. What is WLAN ACK TIMEOUT?................................................................................................................................... 5932. What is Modulation Coding Scheme (MCS)?................................................................................................................................... 6033. What is Frame Aggregation?
-4-................................................................................................................................... 6034. What is Guard Intervals (GI)?Chapter VI              Configuration examples  61................................................................................................................................... 611. Example one - PPPoE on the WAN................................................................................................................................... 642. Example two - fixed IP on the WAN
Terminology-5-1 Terminology3DESTriple Data Encryption StandardAESAdvanced Encryption StandardANSIAmerican National Standards InstituteAPAccess PointCCKComplementary Code KeyingCSMA/CACarrier Sense Multiple Access/Collision Avoidance   CSMA/CDCarrier Sense Multiple Access/Collision DetectionDDNSDynamic Domain Name ServerDHDiffie-Hellman AlgorithmDHCPDynamic Host Configuration ProtocolDSSSDirect Sequence Spread SpectrumEAPExtensible Authentication ProtocolESPEncapsulating Security PayloadFCCFederal Communications CommissionFTPFile Transfer ProtocolIEEEInstitute of Electrical and Electronic EngineersIKEInternet Key ExchangeIPInternet ProtocolISMIndustrial, Scientific and MedicalLANLocal Area NetworkMACMedia Access ControlMD5Message Digest 5NATNetwork Address TranslationNTNetwork TerminationNTPNetwork Time ProtocolPPTPPoint to Point Tunneling ProtocolPSDPower Spectral DensityRFRadio FrequencySHA1Secure Hash AlgorithmSNRSignal to Noise RatioSSIDService Set IdentificationTCPTransmission Control ProtocolJTFTPTrivial File Transfer ProtocolTKIPTemporal Key Integrity ProtocolUPNPUniversal Plug and PlayVPNVirtual Private NetworkWDSWireless Distribution System
-6-WEPWired Equivalent PrivacyWLANWireless Local Area NetworkWPAWi-Fi Protected Access2 IntroductionThe Wireless LAN Broadband Router is an affordable IEEE 802.11b/g with 802.11n Draft 2.0specifications of wireless LAN broadband router solution; setting SOHO and enterprise standard forhigh performance, secure, manageable and reliable WLAN. This document describes the stepsrequired for the initial IP address assign and other WLAN router configuration. The descriptionincludes the implementation of the above steps.2.1 Package contentsThe package of the WLAN Broadband Router includes the following items,üThe WLAN Broadband RouterüThe DC Power AdapterüThe Documentation CDüRJ-45 Cable LineüThe CradleüThe Two 2dbi antenna2.2 Product SpecificationsProduct NameWLAN 11n Router, 2.4GStandard802.11b/g/n(Wireless), 802.3(10BaseT), 802.3u(100BaseT) Data Transfer Rate1,2,5.5,6,9,11,12,18,24,36,48,54, and maximum of 300MbpsModulation MethodBPSK/QPSK/16-QAM/64-QAM Frequency Band2.4GHz - 2.483GJz ISM Band, DSSSRF Output Power< 14dBm(802.11n),< 17dBm(802.11b),< 15dBm(802.11g) Receiver Sensitivity802.11b: -93dBm@8%, 802.11g: -91dBm@10%, 802.11n: -89dBm@10%Operation RangeIndoor@Up to 100 meters,Outdoor@Up to 280 meters AntennaExternal Antenna(2Tx2R)LEDPower, Active (WLAN), Act/Link (Ethernet)Security64 bit/128 bit WEP, TKIP, AESLAN interfaceOne 10/100BaseT with RJ45 connector (WAN)Four 10/100BaseT with RJ45 connectors (LAN)Power Consumption12 V, 1A  Power AdapterOperatingTemperature0 ~ 50°C ambient temperatureStorage Temperature-20 ~ 70°C ambient temperatureHumidity5 to 90 % maximum (non-condensing)Dimension146 x 100 x 24 mm
Introduction-7-2.3 Product FeaturesGeneric RouterØCompatible with IEEE 802.11n Draft 2.0 Specifications provides wireless speed up to 300Mbpsdata rate.ØCompatible with IEEE 802.11g high rate standard to provide wireless Ethernet speeds of 54Mbpsdata rate.ØMaximizes the performance and ideal for media-centric applications like streaming video, gamingand Voice over IP technology.ØSupports multi-operation (bridge/gateway/WISP) modes between wireless and wired Ethernetinterfaces.ØSupports WPS, 64-bit and 128-bit WEP, WPA, WPA2 encryption/decryption and WPA withRadius function to protect the wireless data transmission.ØSupports IEEE 802.1x Authentication.ØSupports IEEE 802.3x full duplex flow control on 10/100M Ethernet interface.ØSupports DHCP server to provide clients auto IP addresses assignment.ØSupports DHCP client, static IP, PPPoE, PPTP of WAN Interface.ØSupports firewall security with port filtering, IP filtering, MAC filtering, port forwarding, trigger port,DMZ hosting and URL filtering functions.ØSupports WEB based management and configuration.ØSupports UPnP for automatic Internet access.ØSupports Dynamic DNS service.ØSupports NTP client service.ØSupports Log table and remote Log service.ØSupport Setup Wizard mode.
-8-2.4 Front Panel DescriptionLED IndicatorStateDescription1. PWR LEDonThe WLAN Broadband Router is powered on.offThe WLAN Broadband Router is powered off.2. WLAN LEDFlashingData is transmitting or receiving on the antenna.offNo data is transmitting or receiving on the antenna.3. LAN LED ACTFlashingData is transmitting or receiving on the LAN interface.onPort linked.offNo link.4. WAN LED ACTFlashingData is transmitting or receiving on the WAN interface.onPort linked.offNo link.5. WPS LED ACTFlashing1 sec flash light / 1 sec light darkonPress ButtonoffDefault No link
Introduction-9-2.5 Rear Panel DescriptionInterfacesDescriptionAntenna (Fixed / SMA) The Wireless LAN Antenna.PowerThe power jack allows an external DC power supply connection.The external DC adaptor provide adaptive power requirement to theWLAN Broadband Router.LANThe RJ-45 sockets allow LAN connection through Category 5cables. Support auto-sensing on 10/100M speed and half/ fullduplex; comply with IEEE 802.3/ 802.3u respectively.WANThe RJ-45 socket allows WAN connection through a Category 5cable. Support auto-sensing on 10/100M speed and half/ fullduplex; comply with IEEE 802.3/ 802.3u respectively.ResetPush continually the reset button 5 ~ 10 seconds to reset theconfiguration parameters to factory defaults.WPSPush the WPS button implementation to reduce the networkconfiguration steps,and also easy to implement network security. 3 Installation3.1 Hardware InstallationStep 1: Place the Wireless LAN Broadband Router to the best optimum transmission location. The besttransmission location for your WLAN Broadband Router is usually at the geographic center of yourwireless network, with line of sign to all of your mobile stations.Step 2: Connect the WLAN Broadband Router to your wired network. Connect the Ethernet WAN interface ofWLAN Broadband Router by category 5 Ethernet cable to your switch/ hub/ xDSL modem or cablemodem. A straight-through Ethernet cable with appropriate cable length is needed.Step 3: Supply DC power to the WLAN Broadband Router. Use only the AC/DC power adapter supplied withthe WLAN Broadband Router; it maybe occur damage by using a different type of power adapter.The hardware installation finished.
-10-3.2 Software InstallationThere are no software drivers, patches or utilities installation needed, but only the configurationsetting. Please refer to chapter 3 for software configuration.Notice: It will take about 50 seconds to complete the boot up sequence after powered on the WLANBroadband Router; Power LED will be active, and after that the WLAN Activity LED will be flashing toshow the WLAN interface is enabled and working now.4 Software configurationThere are web based management and configuration functions allowing you to have the jobs doneeasily.The WLAN Broadband Router is delivered with the following factory default parameters on theEthernet LAN interfaces.Default IP Address: 192.168.1.254Default IP subnet mask: 255.255.255.0WEB login User Name: <empty>WEB login Password: <empty>4.1 Prepare your PC to configure the WLAN Broadband RouterFor OS of Microsoft Windows 2000/ XP:1. Click the Start button and select Settings, then click Control Panel. The Control Panel windowwill appear.2. Move mouse and double-click the right button on Network and Dial-up Connections icon. Movemouse and double-click the Local Area Connection icon. The Local Area Connection windowwill appear. Click Properties button in the Local Area Connection window.3. Check the installed list of Network Components. If TCP/IP is not installed, click the Add buttonto install it; otherwise go to step 6.4. Select Protocol in the Network Component Type dialog box and click Add button.5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click OK button to installthe TCP/IP protocol, it may need the Microsoft Windows CD to complete the installation. Closeand go back to Network dialog box after the TCP/IP installation.6. Select TCP/IP and click the properties button on the Network dialog box.7. Select Specify an IP address and type in values as following example.üIP Address: 192.168.1.1, any IP address within 192.168.1.1 to 192.168.1.253 is good toconnect the Wireless LAN Access Point.üIP Subnet Mask: 255.255.255.08. Click OK to completes the IP parameters setting.For OS of Microsoft Windows Vista:1. Click the Start button and select Settings, then click Control Panel. The Control Panel windowwill appear.2. Move mouse and double-click the right button on Network Connections item. The NetworkConnections window will appear. Double click Local Area Connection icon, then User AccountControl window shown. Right click Continue button to set properties.3. In Local Area Connection Properties window, Choose Networking tab, move mouse and clickInternet Protocol Version 4 (TCP/IPv4), then click Properties button.4. Move mouse and click General tab, Select Specify an IP address and type in values as followingexample.
Software configuration-11-üIP Address: 192.168.1.1, any IP address within 192.168.1.1 to 192.168.1.253 is good toconnect the Wireless LAN Access Point.üIP Subnet Mask: 255.255.255.05. Click OK to complete the IP parameters setting.For OS of Microsoft Windows 95/ 98/ Me:1. Click the Start button and select Settings, then click Control Panel. The Control Panel windowwill appear.Note: Windows Me users may not see the Network control panel. If so, select View allControl Panel options on the left side of the window2. Move mouse and double-click the right button on Network icon. The Network window will appear.3. Check the installed list of Network Components. If TCP/IP is not installed, click the Add buttonto install it; otherwise go to step 6.4. Select Protocol in the Network Component Type dialog box and click Add button.5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click OK button to installthe TCP/IP protocol, it may need the Microsoft Windows CD to complete the installation. Closeand go back to Network dialog box after the TCP/IP installation.6. Select TCP/IP and click the properties button on the Network dialog box.7. Select Specify an IP address and type in values as following example.üIP Address: 192.168.1.1, any IP address within 192.168.1.1 to 192.168.1.253 is good toconnect the Wireless LAN Access Point.üIP Subnet Mask: 255.255.255.08. Click OK and reboot your PC after completes the IP parameters setting.For OS of Microsoft Windows NT:1. Click the Start button and select Settings, then click Control Panel. The Control Panel windowwill appear.2. Move mouse and double-click the right button on Network icon. The Network window will appear.Click Protocol tab from the Network window.3. Check the installed list of Network Protocol window. If TCP/IP is not installed, click the Addbutton to install it; otherwise go to step 6.4. Select Protocol in the Network Component Type dialog box and click Add button.5. Select TCP/IP in Microsoft of Select Network Protocol dialog box then click OK button to installthe TCP/IP protocol, it may need the Microsoft Windows CD to complete the installation. Closeand go back to Network dialog box after the TCP/IP installation.6. Select TCP/IP and click the properties button on the Network dialog box.7. Select Specify an IP address and type in values as following example.üIP Address: 192.168.1.1, any IP address within 192.168.1.1 to 192.168.1.253 is good toconnect the Wireless LAN Access Point.üIP Subnet Mask: 255.255.255.08. Click OK to complete the IP parameters setting.4.2 Connect to the WLAN Broadband RouterOpen a WEB browser, i.e. Microsoft Internet Explore 6.1 SP1 or above, then enter 192.168.1.254 onthe URL to connect the WLAN Broadband Router.
-12-4.3 Management and configuration on the WLAN BroadbandRouter4.3.1 StatusThis page shows the current status and some basic settings of the device, includes system,wireless, Ethernet LAN and WAN configuration information.ItemDescriptionSystemUptimeIt shows the duration since WLAN AP Router is powered on.Firmware versionIt shows the firmware version of WLAN AP Router.
Software configuration-13-Wireless configurationModeIt shows wireless operation modeBandIt shows the current wireless operating frequency.SSIDIt shows the SSID of this WLAN AP Router.The SSID is the unique name of WLAN AP Router andshared among its service area, so all device sat tempts tojoin the same wireless network can identify it.Channel NumberIt shows the wireless channel connected currently.EncryptionIt shows the status of encryption function.Associated ClientsIt shows the number of connected clients (or stations,PCs).BSSIDIt shows the BSSID address of the WLAN AP Router.BSSIDis a six-byte address.LAN configurationIP AddressIt shows the IP address of LAN interfaces of WLAN APRouter.Subnet MaskIt shows the IP subnet mask of LAN interfaces of WLAN APRouter.Default GatewayIt shows the default gateway setting for LAN interfacesoutgoing data packets.DHCP ServerIt shows the DHCP server is enabled or not.MAC AddressIt shows the MAC address of LAN interfaces of WLAN APRouter.WAN configurationAttain IP ProtocolIt shows how the WLAN AP Router gets the IP address. TheIP address can be set manually to a fixed one or setdynamically by DHCP server or attain IP by PPPoE / PPTPconnection.IP AddressIt shows the IP address of WAN interface of WLAN APRouter.Subnet MaskIt shows the IP subnet mask of WAN interface of WLAN APRouter.Default GatewayIt shows the default gateway setting for WAN interfaceoutgoing data packets.MAC AddressIt shows the MAC address of WAN interface of WLAN APRouter.
-14-4.3.2 Setup WizardThis page guides you to configure wireless broadband router for first time.I. Operation ModeThis page followed by Setup Wizard page to define the operation mode.
Software configuration-15-II. Time Zone SettingThis page is used to enable and configure NTP client.III. LAN Interface SetupThis page is used to configure local area network IP address and subnet mask.IV.WAN Interface SetupThis page is used to configure WAN access type.
-16-V. Wireless Basic SettingsThis page is used to configure basic wireless parameters like Band, Mode, Network Type SSID,Channel Number, Enable Mac Clone(Single Ethernet Client).VI.Wireless Security Setup
Software configuration-17-This page is used to configure wireless security.
-18-4.3.3 Operation ModeThis page is used to configure which mode wireless broadband router acts.ItemDescriptionGatewayTraditional gateway configuration. It always connects internet viaADSL/Cable Modem. LAN interface, WAN interface, Wirelessinterface, NAT and Firewall modules are applied to this modeBridgeEach interface (LAN, WAN and Wireless) regards as bridge.NAT, Firewall and all router's functions are not supportedWireless ISPSwitch Wireless interface to WAN port and all Ethernet ports inbridge mode. Wireless interface can do all router's functionsApply ChangesClick the Apply Changes button to complete the newconfiguration setting.ResetClick the Reset button to abort change and recover the previousconfiguration setting.4.3.4 Wireless - Basic SettingsThis page is used to configure the parameters for wireless LAN clients that may connect to yourBroadband Router. Here you may change wireless encryption settings as well as wireless networkparameters.
Software configuration-19-ItemDescriptionDisable Wireless LAN InterfaceClick on to disable the wireless LAN data transmission.BandClick to select 2.4GHz(B) / 2.4GHz(G) / 2.4GHz(N) /2.4GHz(B+G)/ 2.4GHz(G+N) / 2.4GHz(B+G+N)ModeClick to select the WLAN AP / Client / WDS /AP+WDS wireless mode.Network TypeWhile Mode is selected to be Client. Click to select thenetwork type infrastructure or Ad hoc.SSIDIt is the wireless network name. The SSID can be 32bytes long.Channel WidthSelect the operating channel width 20 MHz or 40 MHz.[N band only]Control SidebandSelect the Sideband with Upper or Lower for channelwidth 40MHz. [N band only]
-20-Channel NumberSelect the wireless communication channel from pull-down menu.Broadcast SSIDClick to enable or disable the SSID broadcast function.WMMClick Enabled/Disabled to init WMM feature.Data RateSelect the transmission data rate from pull-down menu.Data rate can be auto-select, 1M to 54Mbps or MCS.Associated Clients Click the Show Active Clients button to open ActiveWireless Client Table that shows the MAC address,transmit-packet, receive-packet and transmission-ratefor each associated wireless client.Enable Mac Clone(Single Ethernet Client)Take Laptop NIC MAC address as wireless clientMAC  address. [Client Mode only]SSID of ExtendedClick to enable Universal Repeater ModeInterfaceAssign SSID when enables Universal Repeater Mode.Apply ChangesClick the Apply Changes button to complete the newconfiguration setting.ResetClick the Reset button to abort change and recover theprevious configuration setting.4.3.5 Wireless - Advanced SettingsThese settings are only for more technically advanced users who have a sufficient knowledge aboutwireless LAN. These settings should not be changed unless you know what effect the changes willhave on your WLAN Broadband Router.
Software configuration-21-ItemDescriptionFragment ThresholdSet the data packet fragmentation threshold, value can bewritten between 256 and 2346 bytes.RTS ThresholdSet the RTS Threshold, value can be written between 0 and2347 bytes.Beacon IntervalSet the Beacon Interval, value can be written between 20 and1024 ms.Preamble TypeClick to select the Long Preamble or Short Preamblesupport on the wireless data packet transmission.IAPPClick to enable or disable the IAPP function. Protection Protect 802.11n user priority.AggregationClick to enable or disable the Aggregation function.Short GIClick to enable or disable the short Guard Intervals function.RF Output PowerTo adjust transmission power level.Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.4.3.6 Wireless - Security SetupThis page allows you setup the wireless security. Turn on WEP, WPA, WPA2 by using encryptionkeys could prevent any unauthorized access to your wireless network.
-22-ItemDescriptionSelect SSIDSelect the SSID from multiple APs.EncryptionSelect the encryption supported over wireless access. Theencryption method can be None, WEP, WPA, WPA2 orWPA-Mixed.Use 802.1xAuthenticationWhile Encryption is selected to be WEP. Click the check boxto enable IEEE 802.1x authentication function.Authentication TypeClick to select the authentication type in Open System,Shared Key or Auto selection.Key LengthSelect the WEP shared secret key length from pull-downmenu. The length can be chose between 64-bit and 128-bit(known as “WEP2”) keys.The WEP key is composed of initialization vector (24 bits)and secret key (40-bit or 104-bit).Key FormatSelect the WEP shared secret key format from pull-downmenu. The format can be chose between plant text (ASCII)and hexadecimal (HEX) code.Encryption KeySecret key of WEP security encryption function.WPA AuthenticationModeWhile Encryption is selected to be WPA. Click to select theWPA Authentication Mode with Enterprise (RADIUS) orPersonal (Pre-Shared Key).WPA Cipher SuiteSelect the Cipher Suite for WPA encryption.WPA2 Cipher SuiteSelect the Cipher Suite for WPA2 encryption.Pre-Shared KeyFormatWhile Encryption is selected to be WPA.Select the Pre-shared key format from the pull-down menu.The format can be Passphrase or Hex (64 characters).[WPA, Personal(Pre-Shared Key) only]Pre-Shared KeyFill in the key value. [WPA, Personal(Pre-Shared Key)only]Enable Pre-AuthenticationClick to enable Pre-Authentication. [WPA2/WPA2 Mixed only, Enterprise only]AuthenticationRADIUS ServerSet the IP address, port and login password information ofauthentication RADIUS sever.Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.WEP encryption key (secret key) length: Format Length
Software configuration-23-64-bit128-bit ASCII 5 characters 13 characters HEX 10 hexadecimal codes26 hexadecimal codes4.3.7 Wireless - Access ControlIf you enable wireless access control, only those clients whose wireless MAC addresses are in theaccess control list will be able to connect to your Access Point. When this option is enabled, nowireless clients will be able to connect if the list contains no entries.ItemDescriptionWireless AccessControl ModeClick the Disabled, Allow Listed or Deny Listed of dropdown menu choose wireless access control mode. This is a security control function; only those clientsregistered in the access control list can link to this WLANBroadband Router.MAC AddressFill in the MAC address of client to register this WLANBroadband Router access capability.CommentFill in the comment tag for the registered client.Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover the
-24-previous configuration setting.Current AccessControl List It shows the registered clients that are allowed to link to thisWLAN Broadband Router.Delete SelectedClick to delete the selected clients that will be access rightremoved from this WLAN Broadband Router.Delete AllClick to delete all the registered clients from the accessallowed list.ResetClick the Reset button to abort change and recover theprevious configuration setting.4.3.8 WDS SettingsWireless Distribution System uses wireless media to communicate with other APs, like the Ethernetdoes. To do this, you must set these APs in the same channel and set MAC address of other APthat you want to communicate with in the table and then enable the WDS.ItemDescriptionEnable WDSClick the check box to enable wireless distribution system.MAC AddressFill in the MAC address of AP to register the wirelessdistribution system access capability.Data RateSelect the transmission data rate from pull-down menu.Data rate can be auto-select, 1M to 54Mbps or MCS.CommentFill in the comment tag for the registered AP.
Software configuration-25-Apply Changes Click the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.Set SecurityClick button to configure wireless security like WEP(64bits),WEP(128bits), WPA(TKIP), WPA2(AES) or NoneShow Statistics It shows the TX, RX packets, rate statistics.Delete SelectedClick to delete the selected clients that will be access rightremoved from this WLAN Broadband Router.Delete AllClick to delete all the registered clients from the accessallowed list.ResetClick the Reset button to abort change and recover theprevious configuration setting.4.3.8.1 WDS Security SetupRequirement: Set [Wireless]->[Basic Settings]->[Mode]->AP+WDSThis page is used to configure the wireless security between APs.
-26-4.3.8.2 WDS AP TableThis page is used to show WDS statistics.ItemDescriptionMAC AddressIt shows the MAC Address within WDS.Tx PacketsIt shows the statistic count of sent packets on the wirelessLAN interface.Tx ErrorsIt shows the statistic count of error sent packets on theWireless LAN interface.Rx PacketsIt shows the statistic count of received packets on thewireless LAN interface.Tx Rare (Mbps)It shows the wireless link rate within WDS.RefreshClick to refresh the statistic counters on the screen.Close Click to close the current window.
Software configuration-27-4.3.9 Site SurveyThis page is used to view or configure other APs near yours.ItemDescriptionSSID It shows the SSID of AP.BSSID It shows BSSID of AP.ChannelIt show the current channel of AP occupied.TypeIt show which type AP acts.EncryptIt shows the encryption status.SignalIt shows the power level of current AP.RefreshClick the Refresh button to re-scan site survey on thescreen.ConnectClick the Connect button to establish connection.4.3.10 WPSThis page allows you to change the setting for WPS (Wi-Fi Protected Setup). Using this featurecould let your wireless client automically syncronize its setting and connect to the Access Point ina minute without any hassle.
-28-ItemDescriptionDisable WPSClick on to disable the Wi-Fi Protected Setup function.WPS StatusShow WPS status is Configured or UnConfigured.Self-PIN NumberFill in the PIN Number of AP to register the wirelessdistribution system access capability.Push ButtonConfigurationThe Start PBC button provides tool to scan the wirelessnetwork. If any Access Point or IBSS is found, you couldconnect it automatically when client join PBC mode.Apply ChangesClick the Apply Changes button to complete the newconfiguration setting.Reset Click the Reset button to abort change and recover theprevious configuration setting.Current Key InfoAuthentication  It shows the Authentication is opened orclosed.Encryption  It shows the Encryption mode.Key  It shows the Encryption key.Client PIN NumberFill in the Client PIN Number from your Client sites.
Software configuration-29-4.3.11 LAN Interface SetupThis page is used to configure the parameters for local area network that connects to the LAN portsof your WLAN Broadband Router. Here you may change the setting for IP address, subnet mask,DHCP, etc.ItemDescriptionIP AddressFill in the IP address of LAN interfaces of this WLANAccess Point. Subnet MaskFill in the subnet mask of LAN interfaces of this WLANAccess Point.Default GatewayFill in the default gateway for LAN interfaces out goingdata packets.DHCPClick to select Disabled, Client or Server in differentoperation mode of wireless Access Point. DHCP Client RangeFill in the start IP address and end IP address to allocatea range of IP addresses; client with DHCP function setwill be assigned an IP address from the range.Show ClientClick to open the Active DHCP Client Table window thatshows the active clients with their assigned IP address,MAC address and time expired information. [Servermode only]
-30-Static DHCPSelect enable or disable the Static DHCP function frompull-down menu. [Server mode only]Set Static DHCPManual setup Static DHCP IP address for specific MACaddress. [Server mode only]Domain NameAssign Domain Name and dispatch to DHCP clients. It isoptional field.802.1d Spanning TreeSelect enable or disable the IEEE 802.1d Spanning Treefunction from pull-down menu.Clone MAC AddressFill in the MAC address that is the MAC address to beclonedApply ChangesClick the Apply Changes button to complete the newconfiguration setting.ResetClick the Reset button to abort change and recover theprevious configuration setting.4.3.11.1 Static DHCP SetupItemDescriptionIP AddressIf you select the Set Static DHCP on LAN interface, fill inthe IP address for it.MAC AddressIf you select the Set Static DHCP on LAN interface, fill inthe MAC address for it.CommentFill in the comment tag for the registered Static DHCP.Apply ChangesClick the Apply Changes button to complete the newconfiguration setting.
Software configuration-31-ResetClick the Reset button to abort change and recover theprevious configuration setting.Static DHCP ListIt shows IP Address  MAC Address from the StaticDHCP.Delete SelectedClick to delete the selected clients that will be removedfrom the Static DHCP list.Delete AllClick to delete all the registered clients from the StaticDHCP list.ResetClick the Reset button to abort change and recover theprevious configuration setting.4.3.12 WAN Interface SetupThis page is used to configure the parameters for wide area network that connects to the WAN portof your WLAN Broadband Router. Here you may change the access method to Static IP, DHCP,PPPoE or PPTP by click the item value of WAN Access Type.
-32-4.3.12.1 Static IPItemDescriptionStatic IPClick to select Static IP support on WANinterface. There are IP address, subnet maskand default gateway settings need to bedone.IP AddressIf you select the Static IP support on WANinterface, fill in the IP address for it.Subnet MaskIf you select the Static IP support on WANinterface, fill in the subnet mask for it.Default GatewayIf you select the Static IP support on WAN
Software configuration-33-interface, fill in the default gateway for WANinterface out going data packets.MTU SizeFill in the mtu size of MTU Size. The defaultvalue is 1400.DNS 1Fill in the IP address of Domain Name Server1.DNS 2Fill in the IP address of Domain Name Server2.DNS 3Fill in the IP address of Domain Name Server3.Clone MAC AddressFill in the MAC address that is the MACaddress to be cloned.Enable uPNPClick the checkbox to enable uPNP function.Enable IGMP ProxyClick the checkbox to enable IGMP Proxy.Enable Ping Access on WANClick the checkbox to enable WAN ICMPresponse.Enable Web Server Access onWANClick the checkbox to enable webconfiguration from WAN side.Enable IPsec pass through on VPNconnectionClick the checkbox to enable IPSec packetpass through.Enable PPTP pass through on VPNconnectionClick the checkbox to enable PPTP packetpass through.Enable L2TP pass through on VPNconnectionClick the checkbox to enable L2TP packetpass through.Apply ChangesClick the Apply Changes button to completethe new configuration setting.ResetClick the Reset button to abort change andrecover the previous configuration setting.
-34-4.3.12.2 DHCP ClientItemDescriptionDHCP ClientClick to select DHCP support on WANinterface for IP address assignedautomatically from a DHCP server.Host NameFill in the host name of Host Name. Thedefault value is empty.MTU SizeFill in the mtu size of MTU Size. The defaultvalue is 1400.Attain DNS AutomaticallyClick to select getting DNS address for DHCP support.
Software configuration-35-Please select Set DNS Manually if theDHCP support is selected.Set DNS ManuallyClick to select getting DNS address for DHCP support.DNS 1Fill in the IP address of Domain Name Server1.DNS 2Fill in the IP address of Domain Name Server2.DNS 3Fill in the IP address of Domain Name Server3.Clone MAC AddressFill in the MAC address that is the MACaddress to be cloned.Enable uPNPClick the checkbox to enable uPNP function.Enable IGMP ProxyClick the checkbox to enable IGMP Proxy.Enable Ping Access on WANClick the checkbox to enable WAN ICMPresponse.Enable Web Server Access onWANClick the checkbox to enable webconfiguration from WAN side.Enable IPsec pass through on VPNconnectionClick the checkbox to enable IPSec packetpass through.Enable PPTP pass through on VPNconnectionClick the checkbox to enable PPTP packetpass through.Enable L2TP pass through on VPNconnectionClick the checkbox to enable L2TP packetpass through.Apply ChangesClick the Apply Changes button to completethe new configuration setting.ResetClick the Reset button to abort change andrecover the previous configuration setting.
-36-4.3.12.3 PPPoEItemDescriptionPPPoEClick to select PPPoE support on WANinterface. There are user name, password,connection type and idle time settings needto be done.
Software configuration-37-User NameIf you select the PPPoE support on WANinterface, fill in the user name and passwordto login the PPPoE server.PasswordIf you select the PPPoE support on WANinterface, fill in the user name and passwordto login the PPPoE server.Service NameFill in the service name of Service Name. Thedefault value is empty.Connection TypeSelect the connection type from pull-downmenu. There are Continuous, Connect onDemand and Manual three types to select.Continuous connection type means to setupthe connection through PPPoE protocolwhenever this WLAN AP Router is poweredon.Connect on Demand connection typemeans to setup the connection throughPPPoE protocol whenever you send the datapackets out through the WAN interface; thereare a watchdog implemented to close thePPPoE connection while there are no datasent out longer than the idle time set. Manual connection type means to setup theconnection through the PPPoE protocol byclicking the Connect button manually, andclicking the Disconnect button manually.Idle TimeIf you select the PPPoE and Connect onDemand connection type, fill in the idle timefor auto-disconnect function. Value can bebetween 1 and 1000 minutes.MTU SizeFill in the mtu size of MTU Size. The defaultvalue is 1400.Attain DNS AutomaticallyClick to select getting DNS address for DHCP support.Please select Set DNS Manually if theDHCP support is selected.Set DNS ManuallyClick to select getting DNS address for DHCP support.DNS 1Fill in the IP address of Domain Name Server1.DNS 2Fill in the IP address of Domain Name Server2.DNS 3Fill in the IP address of Domain Name Server3.Clone MAC AddressFill in the MAC address that is the MAC
-38-address to be cloned.Enable uPNPClick the checkbox to enable uPNP function.Enable IGMP ProxyClick the checkbox to enable IGMP Proxy.Enable Ping Access on WANClick the checkbox to enable WAN ICMPresponse.Enable Web Server Access onWANClick the checkbox to enable webconfiguration from WAN side.Enable IPsec pass through on VPNconnectionClick the checkbox to enable IPSec packetpass through.Enable PPTP pass through on VPNconnectionClick the checkbox to enable PPTP packetpass through.Enable L2TP pass through on VPNconnectionClick the checkbox to enable L2TP packetpass through.Apply ChangesClick the Apply Changes button to completethe new configuration setting.ResetClick the Reset button to abort change andrecover the previous configuration setting.
Software configuration-39-4.3.12.4 PPTPEnter topic text here.ItemDescriptionPPTPAllow user to make a tunnel with remote site
-40-directly to secure the data transmissionamong the connection. User can useembedded PPTP client supported by thisrouter to make a VPN connection.Enable Dynamic ModeClick to select PPTP Dynamic support onWAN interface for IP address assignedautomatically from a PPTP server. IP AddressIf you select the PPTP support on WANinterface, fill in the IP address for it.Subnet MaskIf you select the PPTP support on WANinterface, fill in the subnet mask for it.GatewayIf you select the Static PPTP support on WANinterface, fill in the gateway for WAN interfaceout going data packets.Server IP AddressEnter the IP address of the PPTP Server.Server Domain NameAssign Domain Name and dispatch to PPTPservers. It is optional field.User NameIf you select the PPTP support on WANinterface, fill in the user name and passwordto login the PPTP server.PasswordIf you select the PPTP support on WANinterface, fill in the user name and passwordto login the PPTP server.MTU SizeFill in the mtu size of MTU Size. The defaultvalue is 1400.Request MPPE EncryptionClick the checkbox to enable request MPPEencryption.Attain DNS AutomaticallyClick to select getting DNS address for PPTP support.Please select Set DNS Manually if thePPTP support is selected.Set DNS ManuallyClick to select getting DNS address for PPTP support.DNS 1Fill in the IP address of Domain Name Server1.DNS 2Fill in the IP address of Domain Name Server2.DNS 3Fill in the IP address of Domain Name Server3.Clone MAC AddressFill in the MAC address that is the MACaddress to be cloned.Enable uPNPClick the checkbox to enable uPNP function.Enable IGMP ProxyClick the checkbox to enable IGMP Proxy.
Software configuration-41-Enable Ping Access on WANClick the checkbox to enable WAN ICMPresponse.Enable Web Server Access onWANClick the checkbox to enable webconfiguration from WAN side.Enable IPsec pass through on VPNconnectionClick the checkbox to enable IPSec packetpass through.Enable PPTP pass through on VPNconnectionClick the checkbox to enable PPTP packetpass through.Enable L2TP pass through on VPNconnectionClick the checkbox to enable L2TP packetpass through.Apply ChangesClick the Apply Changes button to completethe new configuration setting.ResetClick the Reset button to abort change andrecover the previous configuration setting.Note: PPTP GatewayYour ISP will provide you with the Gateway IP Address. If your LAN has a PPTP gateway, then enterthat PPTP gateway IP address here. If you do not have PPTP gateway then enter the ISP’s GatewayIP address above.4.3.13 Firewall - Port FilteringEntries in this table are used to restrict certain types of data packets from your local network toInternet through the Gateway. Use of such filters can be helpful in securing or restricting your localnetwork.
-42-ItemDescriptionEnable Port FilteringClick to enable the port filtering security function.Port Range ProtocolCommentsTo restrict data transmission from the local networkon certain ports, fill in the range of start-port and end-port, and the protocol, also put your comments on it.The Protocol can be TCP, UDP or Both.Comments let you know about whys to restrict datafrom the ports.Apply ChangesClick the Apply Changes button to complete thenew configuration setting.ResetClick the Reset button to abort change and recoverthe previous configuration setting.Delete SelectedClick to delete the selected port range that will beremoved from the port-filtering list.Delete AllClick to delete all the registered entries from theport-filtering list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.4.3.14 Firewall - IP FilteringEntries in this table are used to restrict certain types of data packets from your local network toInternet through the Gateway. Use of such filters can be helpful in securing or restricting your localnetwork.
Software configuration-43-ItemDescriptionEnable IP FilteringClick to enable the IP filtering security function.Local IP AddressProtocol Comments To restrict data transmission from local network oncertain IP addresses, fill in the IP address and theprotocol, also put your comments on it.The Protocol can be TCP, UDP or Both.Comments let you know about whys to restrict datafrom the IP address. Apply ChangesClick the Apply Changes button to complete thenew configuration setting.ResetClick the Reset button to abort change and recoverthe previous configuration setting.Delete SelectedClick to delete the selected port range that will beremoved from the IP-filtering list.Delete AllClick to delete all the registered entries from the IP-filtering list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.4.3.15 Firewall - MAC FilteringEntries in this table are used to restrict certain types of data packets from your local network toInternet through the Gateway. Use of such filters can be helpful in securing or restricting your localnetwork.
-44-ItemDescriptionEnable MAC FilteringClick to enable the MAC filtering security function.MAC AddressComments To restrict data transmission from local network oncertain MAC addresses, fill in the MAC address andyour comments on it.Comments let you know about whys to restrict datafrom the MAC address.Apply ChangesClick the Apply Changes button to register theMAC  address to MAC filtering list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.Delete SelectedClick to delete the selected port range that will beremoved from the MAC-filtering list.Delete AllClick to delete all the registered entries from theMAC-filtering list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.4.3.16 Firewall - Port ForwardingEntries in this table allow you to automatically redirect common network services to a specificmachine behind the NAT firewall. These settings are only necessary if you wish to host some sort ofserver like a web server or mail server on the private local network behind your Gateway's NATfirewall.
Software configuration-45-ItemDescriptionEnable PortForwardingClick to enable the Port Forwarding security function.Local IP AddressProtocol Port RangeCommentTo forward data packets coming from WAN to aspecific IP address that hosted in local networkbehind the NAT firewall, fill in the IP address,protocol, port range and your comments.The Protocol can be TCP, UDP or Both.The Port Range for data transmission. Comments let you know about whys to allow datapackets forward to the IP address and port number.Apply ChangesClick the Apply Changes button to register the IPaddress and port number to Port forwarding list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.Delete SelectedClick to delete the selected IP address and portnumber that will be removed from the port-forwardinglist.Delete AllClick to delete all the registered entries from theport-forwarding list.ResetClick the Reset button to abort change and recoverthe previous configuration setting.
-46-4.3.17 Firewall - URL FilteringURL Filtering is used to restrict users to access specific websites in internet.ItemDescriptionEnable URL FilteringClick to enable the URL Filtering function.URL AddressAdd one URL address.Apply Changes Click the Apply Changes button to save settings.ResetClick the Reset button to abort change and recoverthe previous configuration setting.Delete SelectedClick to delete the selected URL address that will beremoved from the URL Filtering list.Delete AllClick to delete all the registered entries from theURL Filtering list.Reset Click the Reset button to abort change and recoverthe previous configuration setting.4.3.18 Firewall - DMZA Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access toits local private network. Typically, the DMZ host contains devices accessible to Internet traffic, suchas Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers.
Software configuration-47-ItemDescriptionEnable DMZClick to enable the DMZ function.DMZ Host IP AddressTo support DMZ in your firewall design, fill in the IPaddress of DMZ host that can be access from theWAN interface.Apply Changes Click the Apply Changes button to register the IPaddress of DMZ host.Reset Click the Reset button to abort change and recoverthe previous configuration setting.4.3.19 Management - StatisticsThis page shows the packet counters for transmission and reception regarding to wireless, EthernetLAN and Ethernet WAN networks.
-48-ItemDescriptionWireless LANSent PacketsIt shows the statistic count of sent packets on thewireless LAN interface.Received PacketsIt shows the statistic count of received packets onthe wireless LAN interface.Ethernet LANSent PacketsIt shows the statistic count of sent packets on theEthernet LAN interface.Received PacketsIt shows the statistic count of received packets onthe Ethernet LAN interface.Ethernet WANSent PacketsIt shows the statistic count of sent packets on theEthernet WAN interface.Received PacketsIt shows the statistic count of received packets onthe Ethernet WAN interface.RefreshClick the refresh the statistic counters on the screen.4.3.20 Management - DDNSThis page is used to configure Dynamic DNS service to have DNS with dynamic IP address.ItemDescription
Software configuration-49-Enable DDNSClick the checkbox to enable DDNS service.Service Provider Click the drop down menu to pickup the rightprovider.Domain NameTo configure the Domain Name.User Name/EmailConfigure User Name, Email.Password/KeyConfigure Password, Key.Apply ChangeClick the Apply Changes button to save the enableDDNS service.ResetClick the Reset button to abort change and recoverthe previous configuration setting.4.3.21 Management - Time Zone SettingClick the Reset button to abort change and recover the previous configuration setting.ItemDescriptionCurrent TimeIt shows the current time.Time Zone SelectClick the time zone in your country.Enable NTP clientupdateClick the checkbox to enable NTP client update.NTP ServerClick select default or input NTP server IP address.Apply ChangeClick the Apply Changes button to save and enableNTP client service.ResetClick the Reset button to abort change and recoverthe previous configuration setting.
-50-Refresh Click the refresh the current time shown on thescreen.4.3.22 Management - Denial-of-ServiceThis page is used to enable and setup protection to prevent attack by hacker’s program. It providesmore security for users.
Software configuration-51-ItemDescriptionEnable DoS PreventionClick the checkbox to enable DoS prevention.Whole System Flood /Per-Source IP Flood…Enable and setup prevention in details.Select ALLClick the checkbox to enable all prevention items.Clear ALLClick the checkbox to disable all prevention items.Apply ChangesClick the Apply Changes button to save abovesettings.4.3.23 Management - LogThis page is used to configure the remote log server and shown the current log.ItemDescriptionEnable LogClick the checkbox to enable log.System allShow all log of wireless broadband router.WirelessOnly show wireless log
-52-DoSOnly show Denial-of-Service logEnable Remote LogClick the checkbox to enable remote log service.Log Server IP AddressInput the remote log IP address.Apply Changes Click the Apply Changes button to save abovesettings.RefreshClick the refresh the log shown on the screen.ClearClear log display screen.4.3.24 Management - Upgrade FirmwareThis page allows you upgrade the Access Point firmware to new version. Please note, do not poweroff the device during the upload because it may crash the system.ItemDescriptionSelect FileClick the Browse button to select the new version of webfirmware image file.UploadClick the Upload button to update the selected web firmwareimage to the WLAN Broadband Router.ResetClick the Reset button to abort change and recover theprevious configuration setting.
Software configuration-53-4.3.25 Management - Save/ Reload SettingsThis page allows you save current settings to a file or reload the settings from the file that was savedpreviously. Besides, you could reset the current configuration to factory default.ItemDescriptionSave Settings to FileClick the Save button to download the configurationparameters to your personal computer.Load Settings fromFileClick the Browse button to select the configuration filesthen click the Upload button to update the selectedconfiguration to the WLAN Broadband Router.Reset Settings toDefaultClick the Reset button to reset the configuration parameterto factory defaults.4.3.26 Management - Password SetupThis page is used to set the account to access the web server of Access Point. Empty user nameand password will disable the protection.ItemDescriptionUser NameFill in the user name for web management login control.
-54-New PasswordFill in the password for web management login control. ConfirmedPasswordBecause the password input is invisible, so please fill in thepassword again for confirmation purpose.Apply ChangesClear the User Name and Password fields to empty, means toapply no web management login control.Click the Apply Changes button to complete the newconfiguration setting. ResetClick the Reset button to abort change and recover the previousconfiguration setting.5 FREQUENTLY ASKED QUESTIONS (FAQ)Enter topic text here.5.1 What and how to find my PC’s IP and MAC address?IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IPprotocol route messages based on the IP address of the destination. The format of an IP address isa 32-bit numeric address written as four numbers separated by periods. Each number can be zero to255. For example, 191.168.1.254 could be an IP address.The MAC (Media Access Control) address is your computer's unique hardware number. (On anEthernet LAN, it's the same as your Ethernet address.) When you're connected to the Internet fromyour computer (or host as the Internet protocol thinks of it), a correspondence table relates your IPaddress to your computer's physical (MAC) address on the LAN.To find your PC’s IP and MAC address,üOpen the Command program in the Microsoft Windows.üType in ipconfig /all then press the Enter button. ØYour PC’s IP address is the one entitled IP Address and your PC’s MAC address is the oneentitled Physical Address.5.2 What is Wireless LAN?A wireless LAN (WLAN) is a network that allows access to Internet without the need for any wiredconnections to the user’s machine.5.3 What are ISM bands?ISM stands for Industrial, Scientific and Medical; radio frequency bands that the FederalCommunications Commission (FCC) authorized for wireless LANs. The ISM bands are located at915 +/- 13 MHz, 2450 +/- 50 MHz and 5800 +/- 75 MHz.5.4 How does wireless networking work?The 802.11 standard define two modes: infrastructure mode and ad hoc mode. In infrastructuremode, the wireless network consists of at least one access point connected to the wired networkinfrastructure and a set of wireless end stations. This configuration is called a Basic Service Set(BSS). An Extended Service Set (ESS) is a set of two or more BSSs forming a single subnetwork.Since most corporate WLANs require access to the wired LAN for services (file servers, printers,Internet links) they will operate in infrastructure mode.
FREQUENTLY ASKED QUESTIONS (FAQ)-55-Example 1: wireless Infrastructure Mode Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) issimply a set of 802.11 wireless stations that communicate directly with one another without using anaccess point or any connection to a wired network. This mode is useful for quickly and easily settingup a wireless network anywhere that a wireless infrastructure does not exist or is not required forservices, such as a hotel room, convention center, or airport, or where access to the wired networkis barred (such as for consultants at a client site).Example 2: wireless Ad Hoc Mode5.5 What is BSSID?A six-byte address that distinguishes a particular a particular access point from others. Also knowas just SSID. Serves as a network ID or name.5.6 What is ESSID?The Extended Service Set ID (ESSID) is the name of the network you want to access. It is used toidentify different wireless networks.5.7 What are potential factors that may causes interference?Factors of interference:OObstacles: walls, ceilings, furniture… etc.OBuilding Materials: metal door, aluminum studs.OElectrical devices: microwaves, monitors and electrical motors.Solutions to overcome the interferences:
-56-üMinimizing the number of walls and ceilings.üPosition the WLAN antenna for best reception. üKeep WLAN devices away from other electrical devices, eg: microwaves, monitors, electricmotors, … etc.üAdd additional WLAN Access Points if necessary. 5.8 What are the Open System and Shared Key authentications?IEEE 802.11 supports two subtypes of network authentication services: open system and sharedkey. Under open system authentication, any wireless station can request authentication. The stationthat needs to authenticate with another wireless station sends an authentication management framethat contains the identity of the sending station. The receiving station then returns a frame thatindicates whether it recognizes the sending station. Under shared key authentication, each wirelessstation is assumed to have received a secret shared key over a secure channel that is independentfrom the 802.11 wireless network communications channel.5.9 What is WEP?An optional IEEE 802.11 function that offers frame transmission privacy similar to a wired network.The Wired Equivalent Privacy generates secret shared encryption keys that both source anddestination stations can use to alert frame bits to avoid disclosure to eavesdroppers.WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wirelessEthernet card) and an access point (i.e. a base station). The secret key is used to encrypt packetsbefore they are transmitted, and an integrity check is used to ensure that packets are not modifiedin transit.5.10 What is Fragment Threshold?The proposed protocol uses the frame fragmentation mechanism defined in IEEE 802.11 to achieveparallel transmissions. A large data frame is fragmented into several fragments each of size equal tofragment threshold. By tuning the fragment threshold value, we can get varying fragment sizes. Thedetermination of an efficient fragment threshold is an important issue in this scheme. If the fragmentthreshold is small, the overlap part of the master and parallel transmissions is large. This means thespatial reuse ratio of parallel transmissions is high. In contrast, with a large fragment threshold, theoverlap is small and the spatial reuse ratio is low. However high fragment threshold leads to lowfragment overhead. Hence there is a trade-off between spatial re-use and fragment overhead.Fragment threshold is the maximum packet size used for fragmentation. Packets larger than thesize programmed in this field will be fragmented.If you find that your corrupted packets or asymmetric packet reception (all send packets, forexample). You may want to try lowering your fragmentation threshold. This will cause packets to bebroken into smaller fragments. These small fragments, if corrupted, can be resent faster than alarger fragment. Fragmentation increases overhead, so you'll want to keep this value as close to themaximum value as possible.5.11 What is RTS (Request To Send) Threshold?The RTS threshold is the packet size at which packet transmission is governed by the RTS/CTStransaction. The IEEE 802.11-1997 standard allows for short packets to be transmitted without RTS/CTS transactions. Each station can have a different RTS threshold. RTS/CTS is used when the datapacket size exceeds the defined RTS threshold. With the CSMA/CA transmission mechanism, thetransmitting station sends out an RTS packet to the receiving station, and waits for the receivingstation to send back a CTS (Clear to Send) packet before sending the actual packet data.
FREQUENTLY ASKED QUESTIONS (FAQ)-57-This setting is useful for networks with many clients. With many clients, and a high network load,there will be many more collisions. By lowering the RTS threshold, there may be fewer collisions,and performance should improve. Basically, with a faster RTS threshold, the system can recoverfrom problems faster. RTS packets consume valuable bandwidth, however, so setting this value toolow will limit performance.5.12 What is Beacon Interval?In addition to data frames that carry information from higher layers, 802.11 includes managementand control frames that support data transfer. The beacon frame, which is a type of managementframe, provides the "heartbeat" of a wireless LAN, enabling stations to establish and maintaincommunications in an orderly fashion.Beacon Interval represents the amount of time between beacon transmissions. Before a stationenters power save mode, the station needs the beacon interval to know when to wake up to receivethe beacon (and learn whether there are buffered frames at the access point).5.13 What is Preamble Type?There are two preamble types defined in IEEE 802.11 specification. A long preamble basically givesthe decoder more time to process the preamble. All 802.11 devices support a long preamble. Theshort preamble is designed to improve efficiency (for example, for VoIP systems). The differencebetween the two is in the Synchronization field. The long preamble is 128 bits, and the short is 56bits.5.14 What is SSID Broadcast?Broadcast of SSID is done in access points by the beacon. This announces your access point(including various bits of information about it) to the wireless world around it. By disabling thatfeature, the SSID configured in the client must match the SSID of the access point.Some wireless devices don't work properly if SSID isn't broadcast (for example the D-link DWL-120USB 802.11b adapter). Generally if your client hardware supports operation with SSID disabled, it'snot a bad idea to run that way to enhance network security. However it's no replacement for WEP,MAC filtering or other protections.5.15 What is Wi-Fi Protected Access (WPA)?Wi-Fi’s original security mechanism, Wired Equivalent Privacy (WEP), has been viewed asinsufficient for securing confidential business communications. A longer-term solution, the IEEE802.11i standard, is under development. However, since the IEEE 802.11i standard is not expectedto be published until the end of 2003, several members of the WI-Fi Alliance teamed up withmembers of the IEEE 802.11i task group to develop a significant near-term enhancement to Wi-Fisecurity. Together, this team developed Wi-Fi Protected Access.To upgrade a WLAN network to support WPA, Access Points will require a WPA software upgrade.Clients will require a software upgrade for the network interface card, and possibly a software updatefor the operating system. For enterprise networks, an authentication server, typically one thatsupports RADIUS and the selected EAP authentication protocol, will be added to the network.5.16 What is WPA2?It is the second generation of WPA. WPA2 is based on the final IEEE 802.11i amendment to the802.11 standard.
-58-5.17 What is 802.1x Authentication?802.1x is a framework for authenticated MAC-level access control, defines Extensible AuthenticationProtocol (EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP, whichwas defined for dial-up authentication with Point-to-Point Protocol in RFC 2284.Beyond encapsulating EAP packets, the 802.1x standard also defines EAPOL messages thatconvey the shared key information critical for wireless security.5.18 What is Temporal Key Integrity Protocol (TKIP)?The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.11i encryptionstandard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol,which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a messageintegrity check and a re-keying mechanism, thus fixing the flaws of WEP.5.19 What is Advanced Encryption Standard (AES)?Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation cryptography algorithm, which will replace DES and 3DES.5.20 What is Inter-Access Point Protocol (IAPP)?The IEEE 802.11f Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability,enabling roaming of 802.11 Stations within IP subnet.IAPP defines messages and data to be exchanged between Access Points and between the IAPPand high layer management entities to support roaming. The IAPP protocol uses TCP for inter-Access Point communication and UDP for RADIUS request/response exchanges. It also uses Layer2 frames to update the forwarding tables of Layer 2 devices.5.21 What is Wireless Distribution System (WDS)?The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wirelesschannel, like the wireless bridge or repeater service.5.22 What is Universal Plug and Play (uPNP)?UPnP is an open networking architecture that consists of services, devices, and control points. Theultimate goal is to allow data communication among all UPnP devices regardless of media, operatingsystem, programming language, and wired/wireless connection.5.23 What is Maximum Transmission Unit (MTU) Size?Maximum Transmission Unit (MTU) indicates the network stack of any packet is larger than thisvalue will be fragmented before the transmission. During the PPP negotiation, the peer of the PPPconnection will indicate its MRU and will be accepted. The actual MTU of the PPP connection will beset to the smaller one of MTU and the peer’s MRU. The default is value 1400.
FREQUENTLY ASKED QUESTIONS (FAQ)-59-5.24 What is Clone MAC Address?Clone MAC address is designed for your special application that request the clients to register to aserver machine with one identified MAC address. Since that all the clients will communicate outsideworld through the WLAN Broadband Router, so have the cloned MAC address set on the WLANBroadband Router will solve the issue.5.25 What is DDNS?DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for user own the DNSserver with dynamic WAN IP address.5.26 What is NTP Client?NTP client is designed for fetching the current timestamp from internet via Network Time protocol.User can specify time zone, NTP server IP address.5.27 What is VPN?VPN is the abbreviation of Virtual Private Network. It is designed for creating point-to point privatelink via shared or public network.5.28 What is IPSEC?IPSEC is the abbreviation of IP Security. It is used to transferring data securely under VPN.5.29 What is WLAN Block Relay Between Clients?An Infrastructure Basic Service Set is a BSS with a component called an Access Point (AP). Theaccess point provides a local relay function for the BSS. All stations in the BSS communicate withthe access point and no longer communicate directly. All frames are relayed between stations bythe access point. This local relay function effectively doubles the range of the IBSS.5.30 What is WMM?WMM is based on a subset of the IEEE 802.11e WLAN QoS draft standard. WMM adds prioritizedcapabilities to Wi-Fi networks and optimizes their performance when multiple concurringapplications, each with different latency and throughput requirements, compete for networkresources. By using WMM, end-user satisfaction is maintained in a wider variety of environmentsand traffic conditions. WMM makes it possible for home network users and enterprise networkmanagers to decide which data streams are most important and assign them a higher traffic priority.5.31 What is WLAN ACK TIMEOUT?ACK frame has to receive ACK timeout frame. If remote does not receive in specified period, it will beretransmitted.5.32 What is Modulation Coding Scheme (MCS)?MCS is Wireless link data rate for 802.11n. The throughput/range performance of a AP will dependon its implementation of coding schemes. MCS includes variables such as the number of spatialstreams, modulation, and the data rate on each stream. Radios establishing and maintaining a linkmust automatically negotiate the optimum MCS based on channel conditions and then continuouslyadjust the selection of MCS as conditions change due to interference, motion, fading, and other
-60-events.5.33 What is Frame Aggregation?Every 802.11 packet, no matter how small, has a fixed amount of overhead associated with it. FrameAggregation combines multiple smaller packets together to form one larger packet. The largerpacket can be sent without the overhead of the individual packets. This technique helps improve theefficiency of the 802.11n radio allowing more end user data to be sent in a given time. 5.34 What is Guard Intervals (GI)?A GI is a period of time between symbol transmission that allows reflections (from multipath) fromthe previous data transmission to settle before transmitting a new symbol. The 802.11n draftspecifies two guard intervals: 400ns (short) and 800ns (long). Support of the 400ns GI is optional fortransmit and receive. The purpose of a guard interval is to introduce immunity to propagation delays,echoes, and reflections to which digital data is normally very sensitive.
FREQUENTLY ASKED QUESTIONS (FAQ)-61-6 Configuration examples6.1 Example one - PPPoE on the WANSales division of Company ABC likes to establish a WLAN network to support mobilecommunication on sales’ Notebook PCs. MIS engineer collects information and plans the WLANBroadband Router implementation by the following configuration.WAN configuration:PPPoEUser Name84549386Password 2uprlamvNote:User Name and Password.ISP provide.LAN configuration:IP Address192.168.1.254Subnet Mask255.255.255.0Default Gateway 0.0.0.0DHCP Client Range192.168.1.100 – 192.168.1.200 WLAN configuration:SSIDAPChannel Number111. Configure the WAN interface: Open WAN Interface Setup page, select PPPoE then enter the User Name “84549386” andPassword “2uprlamv”, the password is encrypted to display on the screen.Press   button to confirm the configuration setting.
-62-2. Configure the LAN interface: Open LAN Interface Setup page, enter the IP Address “192.168.1.254”, Subnet Mask“255.255.255.0”, Default Gateway “0.0.0.0”, enable DHCP Server, DHCP client range “192.168.1.100”to “192.168.1.200”.Press   button to confirm the configuration setting.
Configuration examples-63-3. Configure the WLAN interface: Open WLAN Interface Setup page, enter the SSID “AP”, Channel Number “11”.Press   button to confirm the configuration setting.
-64-6.2 Example two - fixed IP on the WANCompany ABC likes to establish a WLAN network to support mobile communication on allemployees’ Notebook PCs. MIS engineer collects information and plans the WLAN BroadbandRouter implementation by the following configuration.WAN configuration:Fixed IPIP Address192.168.2.254Subnet Mask255.255.255.0Default Gateway 192.168.2.10DNS Address168.95.1.1LAN configuration:IP Address192.168.1.254Subnet Mask255.255.255.0Default Gateway 192.168.2.254DHCP Client Range192.168.1.100 – 192.168.1.200
Configuration examples-65-WLAN configuration:SSIDAPChannel Number111. Configure the WAN interface:Open WAN Interface Setup page, select Fixed IP then enter IP Address “192.168.2.254”, subnetmask “255.255.255.0”, Default gateway “192.168.2.10”. Press   button to confirm the configuration setting.2. Configure the LAN interface:Open LAN Interface Setup page, enter the IP Address “192.168.1.254”, Subnet Mask “255.255.255.0”, enable DHCP Server, DHCP client range “192.168.1.100” to “192.168.1.200”.
-66-Press   button to confirm the configuration setting.3. Configure the WLAN interface:Open WLAN Interface Setup page, enter the SSID “AP”, Channel Number “11”.Press   button to confirm the configuration setting.
Configuration examples-67-
NOTE:  1. To comply with the FCC RF exposure compliance requirements, no change to the antenna or the device is permitted. Any change to the antenna or the device could result in the device exceeding the RF exposure requirements and void user’s authority to operate the device.  2. The changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.  3. Separation Distance Between the User and the EUT : To maintain compliance with FCC’s RF exposure guidelines, this equipment should be installed and operated with minimum distance 20cm between the radiator and your body. Use only the supplied antenna(s).
FCC ID: VYTLP-8696CFCC Compliance and Advisory StatementThis device complies with Part 15 of the FCC rules. Operation is subject to the following twoconditions:(1) this device may not cause harmful interference, and (2) this device must acceptany interference received, including interference that may cause undesired operation.This equipment has been tested and found to comply with the limits for a Class B digital device,according  to  Part  15  of  the  FCC  rules.    These  limits  are  designed  to  provide  reasonableprotection against harmful interference in a residential installation.    This equipment generates,uses and can radiate radio frequency energy and if not installed and used in accordance withthe instructions, may cause harmful interference to radio communications.    However, there isno guarantee that interference will not occur in a particular installation.    If this equipment doescause harmful interference to radio or television reception, which can be determined by turningthe equipment off and on, the user is encouraged to try correct the interference by one or moreof the following measures:1.Reorient the receiving antenna.2.Increase the separation between the equipment and receiver.3.Connect the equipment into and outlet on a circuit different from that to which the receiver isconnected.4.Consult the dealer or an experienced radio/TV technician for help.Any special accessories needed for compliance must be specified in the instruction manual.Warning: A shielded-type power cord is required in order to meet FCC emission limits andalso to prevent interference to the nearby radio and television reception.    It is essential thatonly the supplied power cord be used. Use only shielded cables to connect I/O devices to thisequipment.CAUSION: Any changes or modifications not expressly approved by the party responsible forcompliance could void your authority to operate the equipment.

Navigation menu