Loopcomm Technology LP-9186-001 Wireless AP Router IEEE 802.11b/g User Manual

Loopcomm Technology,.Inc. Wireless AP Router IEEE 802.11b/g Users Manual

Users Manual

Download: Loopcomm Technology LP-9186-001 Wireless AP Router IEEE 802.11b/g User Manual
Mirror Download [FCC.gov]Loopcomm Technology LP-9186-001 Wireless AP Router IEEE 802.11b/g User Manual
Document ID904134
Application IDX8gv1UYwDHUubqDQhzLfpQ==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize246.91kB (3086401 bits)
Date Submitted2008-02-20 00:00:00
Date Available2008-02-20 00:00:00
Creation Date2008-02-14 15:00:27
Producing SoftwareAcrobat 5.0 Scan Plug-in for Windows
Document Lastmod2008-02-14 15:10:41
Document TitleUsers Manual
Document CreatorAcrobat 5.0 Scan Plug-in for Windows

WLAN AP Router
User Manual v1.0
Trademarks
Copyright ©1005
Contenm are subject to clung: withom notice‘
All trademarks belong to their respective proprietors.
Copyrlgm Shumant
nus DOCUMENT CQNYALNS FRONIITARV TBCIIMCAL INFORMATION THAT ls THE normv OF
TIIIS COMPANE AND NO PART OI’IHIS DOCUMENTATION MAV BE “PRODUCED, 810le IN A NEVA],
sva 0]! TRANSMITTED IN ANY FORM OR BY ANV MEANS. ELECTRICAL OR MECHANICAL BY
"(WIDCOPYING RECORDING 0! Ul'llERWIfl-L WITHOUT Till PRIOR WRITTEN CONSENT OI’ THIS
come.
Flthral Communlcfllon Commission Immune. Summon!
Thumipmnmhubunhnod And mwmrywmm Ilmlls lul cm. a new mm, pm-umP-n vw
chcRum, rum-mmwmmmmmmwmmlmnmlmmmwum
[mlum‘ ms oqlbmem 9mm... nu. am am mm nflo mmy may one. w m mun-u mu mm m
acne-dam- wilh m. lmmom. my mum humlul mun-um. m Mic wmmmleafiwl. How-w. mm 1- no
cur-rule. M mun-um wll an new! In a pamur inn-mo", mm mum-em m emu mm mum
mmmummm. Munbemmfindwmmlmimewlpflmmofilmon. m. mull-mum.»
wwwmlmwmdmmg’msum:
- mum aloe-u m. rue-Mug mum.
- Imluu Iln saw-non mun-m. nqllpmflfilfld mow-f.
~ Cowman»oqllpmontlnlolnWWM-dmdlfimmmntomlmmmwhemmm.
- mmnuunn'omcxpomuumvmmmnm.
Yhit emu eon-pu- mmmwmm rec Rulu. owukals mwwwmwmmmamomzmmmia
mty nu mu rum mamv and (2) ml: um mm mm my Immune. Imam Indudlug Inn-mums
mm M own “mind owufiun.
FCC cutie". Anya-m or mine-rim; mt manly apprwsd by n- my mpomibh for Wine. could void
in m mommy b nnaw mi: swam-m.
IMPORTANT NOTE:
FCC Radlatlon Exposun smonvom:
ml; mum-mac mum wnmmmhrmum mmmmm This owlpm'm
mwmmwmmmmammmwmnmmmmmwy
Tm- awn-mmmwmaommmmjumflmmmymuamunmm.
Ilm‘s Manama A? mln'n
Table of Contents
REVISION HISTORY W...“
TERMINOLOGY .... ..... mm.
mummmmJ
I INTRODUCTION...
Ll PACKAGE CONTEN'ISA...
1,2 mower srecmcmons
1.3 PRODUCT FEATullES
14 F110)" PANEL Dmmon.
1.5 REAR PANEL Descmmon
2 INSTALLATION......“mama.“mm...........‘.1.T.......I....
2.1 HARDWAREINSTALLAHONN
2.2 SOFTWAREINSMLLATIONN"
3 SOFTWARE CONFIGURATION m...”
3,1 PREPARE YOUR PC 10 conun THE WLAN AP ROUTER ,.
3.2 CONNECTTOTHE WLAN AP ROUTER
3,3 MANAGEMENT AND CONFIGUMTION on THE WLAN AP Rot/Tm
313.1 Status“
3.3.2
11 Time Zone Setting,
lll LAN Interface Setup
rv WAN lmerfm Setup .
V Wirelm Basic Setting
VI Wireless Security Seq-p,
3.3.3 Opemtion Mode
3.314 Wireless - Basic Settings
313.5 Wireless - Advanced Settings
3.3.5 Wirelm - Semi-y Setup.
1 WEP Key Sen-p .,
33.7
3.348
usnvs MANUALOFWl-AN Ar ann
r st Smun‘ty Setu
II WDS A? Table
3.3.9 Site Survey.
3.3.10 LAN Interface Selu
3.3.1! WAN lnlerfue Setup
1 Static I?
ll DHCP Clien
Ill PPPoE .
lV PPTP
3.3.12 Firewall - Port Filtering
3.3.13 Firewall - l'l’ Filtering.
13. I4 Firewall - MAC Filtenn
3.3.[5 Firewall - Pan Forwarding,
3.3.16 Firewall - DMZ..
3.3.17 VPN(0ptiun)Sen.ings
I VPN Setup - Edit Tunnel
u AdvancedlKE Sen-p.
3.3.18 Management - Smisliw.
3.3,[9 Managerial“ - DDNS
3.3.20 Management - Time Zone Sewing.
3.3.2] Management - Log .....
3322 Management - Upgrade Finnwzre
3,323 Management Snve/ Reload Settings
3.3.24 Mmlgemenl - Password Selup.
3.3.25 Logan .....
4 FREQUENTLY ASKED QUESTIONS (FAQ)..-
4,1 WHATAND HOW TO FIND MY PC's lPAND MAC ADM-BS?
4.2 WHAT IS WIRELESS LAN?
4,1 WHAT ARE ISM BANDS?
4.4 How DOES WIRELESS NETWORKING WORK?
4.5 WHAT ls BSSlD? ..
4.6 WHAT IS ESSlD? ..
4.7 WHATMIE POTENTIAL FACTORS THAT MAv CAUSES INTERFERENCE?
4.8 WHATARE THE OPEN SYSTEM AND SHARED KEYAuTHEN'flCATloNs
4.9 WHAT IS WEP
4,10 WHAT [S FRAGMENT THRESHOLD.
4.1 l
4.12
4.13
4.14
4.15
4. 16
4.17
4.1 E
4.19
4.20
4.21
4.22
4,23
4.24
425
4.26
4.27
4.28
Im‘s MANUALOIWLAN Ar RerR Vim-l: m
WHAT Is RTS (REQUEST To SEND) THRBHOLD?
WHAT IS BEACON INTERVAL”
WHAT Is PREAMBLE TYPE
WHAT Is SSID BROADCAST] ..
WHAT IS WI-FI PROTECTED Access (WPA)?
WHAT Is WPAZ?
WHAT Is solIxAun-LENTlcmoN? ..
WHAT Is TEMPORAL Kev INTEGRITY PROTOCOL (TKIP)
WHAT rs ADVANCED ENCRvaN STANDARD (AES)?
WHAT Is INTER-ACCESS Pom PROTOCOL (IAPP)?
WHAT Is WIRELESS DISTRIBUTION SYSTEM (WDS)
WHAT Is UNIVERSAL PLUG AND PLAY (UPNP)?
WHAT Is MAXIMUM TRANSMISSION UNIT (MT U) SIZE"
WHAT ls CLONE MAC ADDRESS
WHAT IS DDNS?
WHAT Is NTP CLIENT"
WHAT IS VPN.
11mm mummy wum Ar uovrm
Revision History
2006/11/17
(mm,
Vail-u: m
usms unnum- Wu" Arlmm
Terminology
was a n'ple Data Enoiyp on Standard 7 7
Adi/mood Encrflion Samara
American National snaiiqaros lnxiimte 7
n won; , a; , , .
lccx ‘Complemeniary Coda Kcying 7l
CSMA/gA7 7 7 Carrier S-se7ll7/lultiplc fleeces/Collision Avoidance ‘
6542/03 Car_ricr Sens7c77MuItipIe74cccss/Co 7 7 7 7 77 777 _ 7 7,
onus Dynamic Domain Name Saver l
loll ‘Diffic-Hel7lman Algorithm 77 7 ‘
Bynnmic Host7Configl-latlon7ljwloool 7
DRCESWWWFEEM 59°69,“ ,
Emnsibchuthmficafion Protocol 7;
Encapsulaling Sewn'ty Payload l
Feoa7ial Com7m7m71ications7§ommissio7rl 77 7
Fi1e7 T7ransfe7r Emmi 7 7 7 7 7 7 .
l'lEEE ilnsrinite ofElecm'c-I and Electronic Engineels
IKE Immul Key Exchange 77
IP __ Ingmql’mofol 7 7 777 7 7
L154 7 lndnsnial, Scigniific and Medical7 7 77 7
LAN jun-l Am Netwotk 7 7 77 7 7 7 7 5
MAC Media Access Control
MD5 Message Digest 5 7 77 777 7 7 77
‘NAT Wemfl 511de Tran§lat7ion ' 7 7 77i
Noiwork rerrninaiion 7 F' '7 7 ‘ 7 7 i
New? WWW“!
P int to Mn; mmielingivmioool” 7
P 7w7er Spectral D7e7l7lsity
“mew-01,
;ssn> A Service sn Identification
L0;n,fi TW‘“! 9M me' , ,
TFTP Trivial File Transfer Pmoool
wuvxmnuuopwununmu v-u-um
mp fanpomKeyhugfltyhmmlfiVV 7 7 W W, ,,, 777 7»
mpg ,_ _ 7 riUniversrll Plugand Phy 7 j
VPN Vmuxl Prime waork ,, ‘
WDS Wireless Distribution Sm ' 7 V ,
WE? “ME‘IE‘W‘MQQYMY W, Y, .‘ ,,, , ,, <
\Wvl:A7NW_ 7_Ak;W|rel¢sslncalAreaNenvmk
WPA Yvfil’m‘fifiszeia. , J, u fl , . ,, WE
nsms mrammvwmn unlrmt Vain-z in
1 Introduction
The WLAN AP Router is IEEE 802.11b/g WLAN AP
router solution; selling SOHO and enterprise snndard for high performance, secure,
manageable and reliable WLAN.
This document describes the steps required fertile initial 1? address assignment and other WLAN
router configuration. The description includes rne implemenurien enlie above sups.
1.1 Package contents
The package of the WLAN AP Router includes ilie following items,
1 The WLAN AP Renter
J The AC to DC power adapter
'/ The Documentation CD
1.2 Product Specifications
Product Name JWLAN AP Roma
Standard 302.11b/g(WneIess), 802.3(IOBaseT), 802.3n(100338e‘l')
Data Transfer Rate S4M]7ps(ere1ess), IOOMbpsi'Ethemet)
Modulation Method CCK(BOZ, 1 1h), 0FDM(802,11g)
Frequency Band 42146112 — 24483012 ISM Band, DSSS
RF Output Power CCK< 17 dBm, OFDM< 13.5 dBln
Receiver Sensitivity 802.111: -80 dBm@10%. 302,11; -68 dBm@8%
Operation Range 30 to 280 meters (dependth on surroundings)
Antenna External Antenna
LED Power. Active (WLAN), Act/Link (Ethemet)
Security 64 bill 128 bit WEP, WPA, WPAZ, port filtering, 1? filtering,
MAC filtering, port forwarding and DMZ hosting
LAN interface One IO/IOOaneT wilh R145 connect!" (WAN)
£0“, IOIIOOBaseT with ”45 connenols (LAN)
Power Consumption 12V, IA DC Power Adapter
Operating Temperature 0 ~ 50“C ambient temperature
Storage humeral-ire -20 ~ 70°C ambient lemperamre
Humidity 5 to 90 % maximum (non-condensing)
Dimension 160x120x30mm
mien-t mummy WW A? min-n
1.3 Product Features
Vv
VVVVVVVVV
Vvvvvvvvvv
Complies with IEEE 802.11b/g standard for 2.4GHz Wireless LAN.
Supports bridging. fouling, er, WIS? functions between wireless and wired
Ethernet interfaces.
Supports 64—bit and 12847“ WEP, WPA. WPAZ encryption/decryption fimction to
protect the wireless data transmission.
Supports [EEE 802.11Anthenlication,
Support Vii-Pi Protected Access Authentication with Ridills and Pie-Shared Key
mode.
Supports Inter-Access Point Protocol (IAPP).
Supports Wireless Distribution System (WDS).
Supports IEEE 802.3x full duplex flow control on lO/l00M Ethernet interface.
Supports DHCP server to pmvide clients auto 1? addresses assignment.
Supports DHCP client for Ethernet WAN interface auto rr address assigunent.
Supports static and dynamic IP routing
Suppom PPPaE an Ethernet WAN interfnoe.
Supports clone MAC address function.
Supports firewall seein'ily with part filler-Eng, [P filtering, MAC filtering, port
famrdiug, triggerpnrt and DMZ hosting functions.
Supports WEB based management and configuration,
Supports PP’l'P Client on Ethernet WAN interface.
Supports UPnP for automatic Internet access.
Supparts Dynamic DNS service.
Suppom NTP client service.
Supports log table and minute log service,
Support Setup Wm mode.
Supports Virtual Private Network (VPN) mutation.
Supports mstzc tunnel encryplianGDES/AESIZE) and nulhentication(MD5/SHAI)
Supports WISP (Wireless ISP).
vmvs mun. ow wun Miami
I .4 Front Panel Description
(MAR)
Viri-l: m
1 vw R u el
{49 lldkltorV__ Sinltk" Dflcrlylkl_ ‘ __ 7 ._ M‘_
1, rowan LED On The WLAN AP Roma: is powened on.
2'. fiKLED"
imi“‘3_,_.__._ _,_. ___
05 No am is transmilling or MEG-"(g on the
_ ~~~~~~~ w k “W; _4 ‘A, , __
3,1.ANLEDAcr _ 7 ,__ 7 "tr—
(um-4) On Dam is Innsmitfing or receiving an the LAN
;£°erfl£ ___ ¥ fl _ _A 7‘
Off No data us humming): recelvlng on the
IAN interface, _
4. WAN LED ACl' Flushing Data is transmitting or weeiving on the WAN
interface.
—on No an}; mefizfieb-Eimon the WAN
interface.
mum mmumrwun n noun:
LS Rear Panel Description
mm: m
mm: muumww A? normal
Vanni: u
Push continually the m bunon s~ 10 seconds to reset the
configuration parameters to fuelory
The Ill—45 socket allows WAN connect on lllrough a Category
5 cable. Support auto-sensing on 10/ IOOM speed and half/ full
duplex; comply with IEEE 302.3! 802,3u respectively.
4. LAN
5 Power
The R145 sockm allow LAN connection through Category 5
cables Support auto-sensing on 1011 MM speed and halfl filll
duplex, comply “E1255? £31): 3/ 801 3u respectively 777777
The power jack allows an external DC 12 v power supply
connection
The exlemlj AC to DC adupmr provide adaptive power
reqnilement to the WLAN AP Router.
urn-s MANUALWWmArlmml m m
2 Installation
21 Hardware Installation
Slep 1: Place the WLAN AP Router lo the optimum transmission
location. The best transmission location for your WLAN AP Router is
usually at the geographic center ofyour wireless network, with line ofsign to all
of your mobile stations.
Sup 2: Connect the WLAN AP Router to your wired nelwork Connect the
Ethernet WAN inertia: of WLAN AP Router by category 5 Ethen-let
cable to your swilch/ huh/ xDSL modem or cable modem, A sh'aiglit-throltgh
Ethernet cable with appmprlm cable length is needed.
Step 3: Supply DC power to the WLAN AP Router Use only the AC/DC power
adapter supplied with the WLAN AP Router; it my occur dams: by
using a different type ofpower adapter.
The hardware installation is finished,
2.2 Software Installation
> There are no sofiwnre drivers, patches or utilities installation needed, but only the
configuration sening. Please refer to chapter 3 for sofiware configuration,
um-suwuorwmnnwnu V-nh-zl»
3 Software configuration
The web based management and configuration functions allow you to do the slep-by-step
easily.
The WLAN AP Router is delivered with the following factory default parameters on
the Ethernet LAN interfaces.
Default 1? Address: 192.168.1‘254
Default IP suhuel mask: 155l255.255.0
WEB login User Name: wry>
WEB login Password: W
3,1 Prepare your PC to configure the WLAN AP Router
For Mlcroson Windows 95! 98! ME:
1. Click the Mr! Inmon and select Settings. then click Control Panel. The Can/ml
Panel window will appear.
Note: “findnws Me users may not see the Network control panel. if so, select View
all Control Pmd options on the Iefi side oftlle window
2. Move mouse md double-click the right button on Network iwn, The Network
window will appear
3, Check the installed list oleorl Convenient. lfTCP/ll’ is not installed, click the
Addbutwn to install it; omerwiee go to step 6.
4. Select Protocol in the Network Component Type dialog box and click Add button.
Sl Select TCP/lP in Wrong]? of Select Nmork Fromm! dialog box Ihlen click OK
button Io install the TCP/lP protocol. it may need the Mlcrosofi “Endows CD to
complete the installation. Close and go back toNetwork dialog box afier the TCP/l'l’
inmllation.
6. Select TCP/IP and click the properties button on the Network dialog box.
7. Select Speq'fyan lPaddrm and type in values as following example.
I l'PAddress: 192.168‘IJ. lPaddresswithin the range “192,168.” to
l92.l68.l.253 is used to connect the WLAN AP Router.
1 IP Sulmet Mask: 255.255.1551)
8. Click OK and reboot your PC mer completing the [P paramelerr setting.
For Mlcroson WIndws ZODDIXP:
1. Click the San button and select Settings, then click Control Panel. The Control
“
hams mnuuovwmnummn vm in
mud window will appear,
2. Move mouse and double—click the right button on Networked Dill—up Connections
icon. Move mouse Mid double-click the LocalAm Connection icon. The Local Area
Cnnnecn'an window will appear. Click Properties button in the Local/4nd
Connection window.
3. Check the installed list of Network Component lfTCP/lP is not inslalled, click the
Add button to install it; otherwise go to step 6,
4, Select Protocol in the Network Component Me dialog box and click Add button.
5. Select TCP/lP in Micmsqfl “Sela-(Network Protocol dialog box Ihen click OK
billion to install the TCP/IP proloool, it may need the Microsoft Windows CD to
complete the installation. Close and go back (0 Network dialog box afier the TCP/lP
installation.
6. Select 10/1? and click thepmptrdts onnon on the Newark dialog hon
7. Seleei spam an [roam and type in values as following example.
/ l'l’Address: 192.168.1J. ll’ addxess Within the Rage of l92,l68.l.1 to
19116811152 is used to connect the WLAN AP Router.
/ lP Snbnet Mask: 255.155.2551)
8. Click 0K to complete the 11> parameters setting.
For Mlcmofl Windows NT:
1. Click the “in lumen and select Settings. then click Cnntml Panel. The Control
Paul window will appeu
2. Move mouse and doublNIick the right button on Namath icon, The Newark
window will appear. Click hmml tab from the Newark window,
31 Check the installed list omeor/t Pmlawl window. lfTCP/ll’ is not installed, click
the Addbulton to install 11; otherwise go to step 61
41 Select Meal in the Network Component 1570 dialog box and click Add 1mm.
51 Select TCP/IP in Micmrofi’ of SdmNem-ork MM dialog box then click OK
button to install the TCP/lP protocol, it may need the Microsofl Windows CD to
complete the insmllntion. Close and to back to Nmrk dialog box alter the TCP/l'l’
installation.
6. Select raw- and click lhepmpenies button on the Nmork dialog box,
7. Seleei Spcaxv an [Paldnn and type in values as following example.
« lPAddress: 192.153.1.1.11> address within the range of 192.168.1Jw
192.168.1253 is used to connect the Wnelees LAN Access Point
/ 11> Subtle! Mlsk: 1551551554)
3. Click ox to complete the leanrne'er: setting.
“
users MANUALOIWLANMROVIER Vuhxln
3,2 Connect to the WLAN AP Router
Open a WEB browser, it. Microsofl Internet Explore, then enter 192.168.1154 on the
URL to connect the WLAN AP Router.
3.3 Management and configuration on the WLAN AP Router
3.3.1 Status
This page shows the currenl status and some basic settings affine device, includes
system, wireless, Ed|=met LAN and WAN configuration infonmtion.
Access Point Slams
Mnfiuhmfihd—i-fiifiufiu,
1: shows me dumion since WLXN A? Router is
powmd on,
Finnwuu version n shows the fimwnn velsion ofWLAN AP
Router.
vsn-s swam. 01 mm A! mum Vnhx 1.0
wireless configuration
Mode It shows wireless operation mode __ ,
sin ’ f M 77777 ,_ _,
E5115 _ 7 7 Eowxge ssm of smN AP’Romer.
The SSID is the unique name of WLAN AP
Router and shared among its service area, m 1111 devices
mempts to join me same wireless network can identify a.
Channel Numb“ I! Show: the winless channel connected cnmntly.
Encryption II shows the sums of encryption function _ ~
Miami Clients ll shows flu number of connected clients (or nations.
PCs).
BSSlD It shows the 135st address ofthc WLAN AP
Roma, 135er is s six-by-s address, _
LAN configuring _‘ _ A _
IP Address 1! shows the IP address of LAN interfaces of WMN AP
,. Router. _
Subnel Musk It shows the [P subnct mask of LAN inherfaces of WLAN AP
Defil’fl’tidfllcway 7
outgoing data packets
QHEgServer lt shuws the DHCP server is enubled or n
MAC Addmss I! shows the MAC nidrfis of LAN inlefl‘
Router.
WAN configuration
Athin 11> Protocol 11 shows how she WLAN AP Rome: gcu me 11>
addmss. The IP address can be an manually to a fixed
one or set dynamically by DHCP server or main 11> by
, s A ,, l?!“ ’ "WSW“ W. A
IPAddress 1: shows the 1p addmss ofWAN intesfaee’ZifiAN AP
Routen
Snbnet Mask 11 shows the 1? subnel mask of WAN 1mm ofWLAN AP
,, , B9B?" ,;,, . “7, fl, is
Default Gateway 11 shows the defauk ganeivsy se-nng‘forix'lnN invades
77 fl ‘ outgoing dam mkfls
MAC Address 1: shows the MAC address ofWAN interface ofWLAN AP
Rowen
10
MANUAL on mm A lama
3.3.2 Setup Wizard
This page guides you to configure Wireless A? muler for fim time
Setup Wand
mmmfl—l-ynhwm-p—lmhh.hmflpvfin~filnyq
n,
m—u—w—u
mmaflF-wh~uym-m
|. wand-um
z floaty-INT-
: mun-m
4 WWMH‘:
s tau-"mm
s Wat-“Mun.
WM
1 Operation Mode
This page followed by Setup Wizard page to define Ihe opemion mode.
l. Opzulion Mode
Yum-Mm-fihwnmmmflAT-lmm
g m hfi—Aulfi’nhwn—aum—qnmwfin
mun-mun hwmflfimflhlflw
wmmm—uwmu-u.vmmw_mm
“Wei-crash.
o W hfinnumuwwn-«uwuxm
M-wu-Wmmhfin—fi—Inmw
0 mm u—u‘n—nw-wnwuu-‘muua
mhflmmmmxiMMKI-“mmfl-
murmur-”mm: Yu—n‘u-quuhuh
du—nflun’MEW-yw mmwuuma
wmmnuqmwamu-mm
E-En-E}
ode
wars mnuuovwm AP nume-
11 Time Zone Setting
This page is used to enable ml configlue NT? client
2. Time Zane Setting
Ynen-fimumhwmm-Mwlmm
n human-1.1.-
link-lune:
m":
«Baa: H M»
II] LAN Interface Setup
Venn-z m
This page is used to configure local area network IP address and subnet
mask
3. LAN Interline Setup
Mnnud-nfl—ummhhanMn—ofiummmdm
mumumqmmu—unmm—qm,‘
nu..." Thing ,»
am...» 5—‘ngzgo J
[E-
“fl
vsu-s mun. ow wLAnulmrm m: u
IV WAN Interface Setup
This page is used to configure WAN access iype
4. WAN Interface Setup
mwuuua‘m-mhummwmuwmmdm
MPfiH—y—nlflfi-fifimmulfitfl.m,mumiyflmh
vacuum-"m
mun-nap mm‘
can“ [rd-i»
Mm
V Wireless Basic Settings
This page is used to configure basic wireless parameters like Bum], Mode,
Network Type SSTD, Channel Number, Enable Mac Clone(Single
Ethernel Clienl)
Wirelm Basic Belting;
mu-uu-u-u—um-wnu-u—m
h-hhnntnv-m-fi-fl-‘fi—
mum-an...“
n “Wham-“inlaid“
man-u..- L ' ' j
13
Wt!" mmumrwun u IWI'EI
VI Wireless Security Setup
This page is used to configure wireless security
6. Wireless Seculity Setup
mmmmm—wiuun-iyJ—nm-wnnnqmm
mmqwmummnm
ham-Ag]
(E-(E
St: W Ie
3.343 Operation Mode
This page in used to configure which made wireless AP router acts
Opcnn'un Mode
y-nwm—uu-wuwmmmunhm
a a.” hfi—ghmhwumun—mmm
man.—....m.w,.._...—m.m..m-
mmmwnum.wm~vy—gmmu
mm...»
o ..,,,. hmmuhmuw-anwumr
a...uuuuwmmn.a--4m..uw
o mu...“ hmsfi‘m—umnww-‘hmfl-fl
munmw.mmunuum-Mmmn
_rummmw Vu-nufiwfi-uanuh
Mu-mflM-m~.mmwmkmn
wumbyuqmwe-trmmumn.
ENE
Screen snapshot - Dpemtion Mod:
Gateway Traditional gateway configuration. ll always connects
intern“ via ADSl/Cnble Modem LAN inmfm‘ WAN
“
14
nus-vs mwumwunnmmn Vern..-
interface, Villeless interface, NAT and Firewall modules
. 7, is, a ,, fiffiflflWfli s ,__ “in, M 7
Bridge Each interface (LAN, WAN and Wireless) regards as
bridge, NAT, Firewall and all mum's firnerians are not
. W A, 7 a, , ‘Wfi‘lnid,__ s_. fiukfwm 77“
Wireless [SP Elwin wireless interface WAN pot! and all Ethernet
ports in bridge mode. Wireless intexfipe can (30 all
router‘s functions
Apply Changes Click thieApply Changes lumen on complete the new
configuntion selling.
Reset Click the Rem button to nbcn change and recover the
pmious configuration setting.
3.3.4 Wireless - Basic Settings
This page is used tn configure the parameters for wireless LAN clients that my
connect to your AP Rowen Hm ymn may change wireless encryption
setting as well as wireless network pammetels.
Wireless Basic Seninu
m—lfihn‘hmh'fiwhuw—bn
A.M-l--mq-~n¢-fi-~~a
unsung—an
I: umb—um-n-a—M
man-run. C'
ll to disable the wireless LAN data Innsmissiom
Disable Wireless LAN Click 0
Interface
Band Click to select Z.4GHzl(B) / 244GH2(G) / 2.46Hz(B+G)
“is
mm mammary/unaware Van-nu
Mode Click to select the WLAN AP/ Client / WDS / AP+WDS
., .. w A 71ifilefill°€iw m, ._ m_v,,, _ , . WM ,,
Site Survey The Sin Survey button provides tool to won the wireless
network. "any Access Point or IBSS is found, you could
choose Io meet it manually when client mode is
enabled, Refem 11mm
SSlD ll is the whales network name. The SSll) can be 32
bytes long _
Channel Number Select the wireless communimtion channel from
pull-down menu
Associated Clients Click the ShawActive Clients button to open Active
Wireless Client Table that shows the MAC nddmss,
Innsmil-packet, receive-packet and transmission-rule for
each associaxed wireless client,
bane Mee Clone Take Laptop NIC MAC address u wireless client MAC
(Single Ethernet Client) address, [Client Made only]
Apply Changes Click the Apply Changes button to oomplete the new
_ ¥ 77 _> configuration setting
Reset Click Ihe new human to abort change and recover the
previous configuration setting, W __
3,3.5 Wireless -Advanced Settings
These settings are only for more technically advanced users who have :
suficient knowledge about wireless LAN These settings should not be changed
unless you know whal effect the changes will have on your WLAN AP
Router.
16
um-s mmumv wun n mun!
Wireless Advanced Seltlngs
m.u—p-qh-Mn_«mmm.u_mmw
w. Mm.mmnuwunmmnnw—m-mm»
mm can»... ass-«w em.
r-v—nnflk
mum-m:
he.“
nth-m
Mm
mm
mun-u...
Authenncation Type Click to select the authentication type in Open mm,
W ‘ i _ Shamlxey 0mm selection, _A
Fragment Threshold Set the data packet fragmentation llumhold, value can be
written between 256 and 2346 bytes.
Refer w i-Mamfimmqu
RTS Thmhold Set the RTS Threshold, value can be written between 0
and 2347 bytes.
‘ 7A 7 ”7 _ 7 __Refeftg4l ‘ T eslT 317
Beacon Interval Set the Beacon lntervnl value can be written between 20
and 1024 ms.
Refer to 4 zwnm '§ 3mm! lntem 7
Data Rate Selm the mnsmission data we fivm pull—down menu.
Data rate can be unto-select, llM, 5.5M‘ 2M or leps.
humble Type Click to select Ihe Long Preamble or Short Preamble
support cm the wireless data packet transmission.
limdcafl Ssm Click lo enable or disable the SSID broadcast fimction.
Refer to 4 29 What '3 [mg-5995; Pg'm mam (IAPPfl
17
m1mnmwrm~ A? mourn v“: u
802.115 Proteetion Protect 802.1 lb uscr.
Apply Changes Click the Apply Change: human 00 complete the new
configmalion setting.
Reset Click the Rest! human m abm't change Ind “cover Ihe
previous configumion setting.
3,3.6 Muless - Security Setup
This page allows you setup the wireless security “him on W'EP, WPA, WPAZ by
using encryption keys could prevent any unauthorized access m your wimless
network,
Wirelzss Security Setup
m~wayn~m~ifi~mlq m-ww-wAvy-s‘qswp—lmuu
wqmmnlynii‘u“
m a; j semwm ;
EMMA“ warm, wanna
mum-m u—nmm "manna-mm)
“Mmm.w,...-mm_
[El
nsna ol—W' ' Sam
Se on the encrypuon supported over wn-elws am. Fe
encryption method can be None. WEP. WPAfl'KIP),
WPAZorWPAZMixed
Referw4QEhAQ'5 flag
4 IQWhali§M-F’ Wm Em ?
Al “SW? 7
Q I Z EM is 302.1X Angm’mign’
Mm
4 ' v Enc
I8
mwmnolrwm nrmmu
vmx u
Use 802i Ix While Encryption is selected to be WEP.
Authentication Click me check box to enable IEEE 802.11
authentication function.
Refer tn 4.16 What is 802.1x Authentication?
WPA Authentication While Encryption is selected to be WPA,
Mode Click to select the WPA Authentication Mode with
Enterprise (RADIUS) or Personal (Pm-Shared Key),
Refer w A” What i; fli-Fi M AM WPA 7
Freshmen Key Format While Encryption is selected to be pr.
Select the Pre-shared key format from the pull—down
menu The format can be Passphrase or Hex (64
chum-s» lwm “BE“(PES'1E’5'MLWXL,
Pre-Slured Key Fill in the key value [WPA, Pemnakl’re—Sllared Key)
only]
Enable Click to enable Pris-Authentication. lerz/wmz
."‘"‘"L‘“‘E"E°°‘5€"L Mifsdsflh EBWLwflxL e A _ A, ,. _ _
Authentication 5c: the IP address, port and login Mord information
RADIUS Sewer ohmhentication moms sever.
Apply Changes Click theApply Changes hnnon to enmpleie the new
. n _ _, , _ ¥73flfimsfiml _ _ —
Reset Click the Rue! lninnn to abort change and recover if
previous configuration setting.
19
vim-s mum on wun u mural
I WEP Key Setup
Wimless WEP Key Setup
MnmnmfiWh‘hvmmflwfiwalnb-km
nuanmcnailncemdn—vn
I'll-at
Key Length Select the WE? shared secret key length from pull-down
menu. The length can be chose between 64-bit and
[28—bit (known as “WEP2") keys.
The WEP key is composed “initialization vemr (24
bits) and secret key (40-bit or IN-hit),
Key Format Select the wrap sir-red mm key format from pull-down
menu. The format can he chose between plant text
(ASCII) and hexadecimal (HEX) code,
Default Tx Key Set the detail]! secret key [or W? security function
, , . . , , Y,“E°1"l”.£‘!°fl°‘l“£ljfiflt 7fi.
Encryption Key I Secret key 1 ofWEP security encryption function.
Encryption Key 2 Secret key 2 ofWEP semirity encryprien function,
Encryption Key 3 Secret key 3 of WEP security encryplion function.
Click theAppIy Cherry: bmmn to cmriplete the new ’
configuration setting,
Click to clg this WEP Key setup window.
7 Chill the mm bug to abqn chungeartd recover the
“
usu's muopwun Ar now-n
previous epnfigumuon smug1
WEP enclyption key (mm key) length:
3.3.7 Mrcless - Access Comm]
If you enable wiulm mess comm]. only those clienls whose wirelm MAC
addresses an in the access control list will be able to connect to your Access
Point. When this option is enabled, no wireless clients will be able (0 oonnefl if
the list wnlains no entriesl
Wirelzss Access Colml
vy-mww.qmo—n--—unmm—.nmmu
wlu‘nn-uny—M mmmualmunmu-un
fl—Mmumflm m
Wireless Access Chck the Duablzl, 11W Lulzdgbmy Listed ofdmp
Control Mode dawn mtnu choose wireless access own-01 mode.
This is a security conunl function; only those clients
registered in the access control list can link 10 this
WLAN AP Router,
MAC Adm Fill in the MAC addmss of client to register this WLAN
2!
van-s mnmwrwun ummn Valli: u
AP Router am capability.
new configuration setting
Rout Click the Rue! button in short change and recover Ihe
pmious co gumticm selling,
and Access Contml 1: shows the Ngistel'ed clients um are allowed to link to
List this WLAN AP Renter.
Delete Selccwd Click to duet: the sclemd clients that will be access
7 rigln unwed from this WLAN AP Routet.
Delete All Click la delete all the registered clients mm the nmss
777 7 _ fallowed hit. ¥ 77 _ , F 7777,
Rem ' ' Hit" the mine: an; to new“; an} Yemen the
pxwious configuration setting, fimum 7
3.3.8 W'DS Settings
Wireless Distribution System uses Wil‘ltSS media in communicate with otllct
APS, like the Ethernet does. To do this, you must set these Al’s in the same
channel and set MAC addla'ys ofmhcrAPIhxt you want to communicate with in
the table and then enable the WDSA
wns Setting:
mun-Mm-finnfiummmmhfih—imJ-u
fiwflan-nme—iumWMnrdQ-MMy-lv-h
c—dn-mhs'ufi—n-ndnhm
Elan-cm
mmm mu—F'_ "77m-
Wfim 1s-mq|mm
mun-Arne
—Ec@
ot~
22
nun-s mnmmpwun A? mm: W n
Enable WDS Click the check box to enable Wireless distribution
sysiem- Refer to MM
M12
MAC Addms Fill in the MAC addl‘ess oiAP to regime: the winlzss
__ » distribution system mess “palm-y. 7
pommem _ __ A Fill in ll_1e comment mg for the regism’od AP. _
Apply Changes Click the Apply Changes button 10 register mm? to new
A» configunlion setting.
Reset Click the Rafi bumm to abort change and recover the
previous canflgmllon setting.
Sel Security Click butum to configure wireless securily likg
WEP(6lbik), WEHIZBMIS), WI’AH‘KIP), WPAZMES)
, , , ‘."'fi"!L,,, ,,,,,,,,,,, _4 ”W”
Show Sminics It shows the TX, Rx packets, rate statistics
Delele Selecled Click Io delete tho selected clients that will be removed
fronlflw tireless dlflfibut—igll syslem.
03m All " Click lo delete all the registered Al’s fromim wlleloss
dish-lbnllan syswm allowed lisl.
Rem Click the Run butlon to abort change and recover the
Vprcvious configuration searing? 7 7
WDS Security Setu.
23
“ZIP! MANUAL okunumunn Var-Mal: m
wns Security Setup
mwmmiqmw‘nmhmm-‘ummm
mmwumumummmmum.
II WDS AP Table
This page is used in show was statistics
WDS AP Table
mmmummxwmmmmmm
Mmmwm
MAC Address It showsithe MAC _Add.rgss within VLDS.
Tx PEG; 7M “ ltshows flwmfisfic oouiiofseni packefiane wireiés‘s'
7_ M w LAN interface. __ A»
Tx 15mm It shows flie mastic count ofermr sent packets on the
_v_ Wmless LAN interface.
Rx mm It shows «he statistic count ofrcceived packets on the
wilelgs LAN interfacei
mumuormnu-mn v-m- u
Tx Rm (M'hrps) It shows me wirelm link rale within wns.
Ben”
3,349 Site Survey
This page is used 10 view or mnfigure me: APs near youtsl
Wirelcs Site Survey
mnwfinflbnhfiuruhmum-Hnnflwbmk
“fink-tn“
It shows lhe SSI'D ofAP.
lass") 77 7 7. 7 7 7h lam/3 assrg ofAP._ 77 7
9M, . , laahmlzsimzzcmslflm
Type ltxhnwwhich lypeAPams.
Encrypt It shows flue encryption slam;
$31.31 , 777 7 7 7 _ll shows the p_ower level ofct7l7rl'vnt Alf, 717777777
Select ' _ Click a; select AP or client you‘d like w comm.
Refresh Click the lie/ml: mm. m re-scan site survey on the
7 screen.
Connect ‘ Click the Come; may.» mam, can-mien.
3.3.10 LAN Intel-I‘m Setup
This page is used to configure the pammelm for local area network that
connects to the LAN porls ofyour WLAN AP Routel: Here you may
25
Um‘l MANUAl-OIWLANMlOlfllR Vent-en
change lhe selling for IP address, subnel mask, 13ch etc,
LAN Ilmfwe Sewn
hum-m...- uu...—.a..~.a.u. .
-A—h-l- —- ammonia—"A -
. .... inn-Tu
a...“ assume 3
SM mapshot —LAN lmgrfwe sung
lPAddress Fill in the IP address ofLAN inlet-flaws ofthis mm
Rowen
siihnet Mask Fill in the mlmet mask ofLAN interfaces onhis WLAN AP
Router, _
Default Gateway Fill in the derauh gateway for LAN interfixces out going
due packetsi
DHCP Server Click to select ambled, Client or Server in different
operation mode ofwirelm AP mun
DHCP Clienthange Fill in the sun IP address and end [P addrm lo allncm a
lange ofTP addresses; client with DHCP function set will
Show Client
cave DHCP Client mu window that
shows the active clienls with their assigned u> address,
MAC address and time expired information. [Server
so: ld shim}; Zriee ' EeléEEei-xble or disable the [EMS 802.1d Spanning
, 7 7 m e , __ Eificg’lfi‘lmflflflflmfl“; a fi _ _. _
Clone MAC Address Fill“ In the MAC address that“ ls the MAC address lo be
cloned. Refer to 4.24 Em 15 Q gm M7 Ag AME-7 .
“
26
on.“ mnorwun “noun:
Apply Chmses
Reset
, ., ,E“Lfi&‘1“.‘?9“m8~
Venn-x u
Click the Apply cums button m complete the new
Click the Rent human 10 abort change and recover the
m PW‘EQ’LQKEFE‘?“ WE; , ,,
3.3.11 WAN Interface Setup
This page is used no configure Ihe pammmls for wide am network um
connects to the WAN pan or your WLAN AP Runner. Here you may
change Ike access mahod to fifldcll’. DHCP. PPPaE or PPTP by click the
item vlluc of WAN Access Type.
I Static IP
WAN Interface Setup
mw.u.*mmnu—M-fiamumw~vm4y~
Am-h‘hwnyflumnmufimmm-mwmmh—
mdeNAnu-nyp
D Inn-m
D M'dhm-IAN
D “Wampum
KEEP
a — WAN rfsce — St '
Cliek to 849100! Static IP suppon cm WAN inlerfue. There
we]? address, subnet mask and default gateway settings
Static IP
need lo be done,
l'PAddmss "you selem the Static IP snppoll on WAN inn-rm, m]
fl in the 1? address for n.
sum; Mask lfyou select the sgm; rp sump on WAN igmfm, fill
27
In.“ MANUALOFWLAN AP mum: venu-
“A, in the subnet mask for in.
Default Gateway lfyou select the Static LP support on WAN interface, fill
in the defamlt gateway for WAN inlerfice out going data
packets.
DNsrlr 77 7 7 Fill in the 1? address ofDomnin Name Server 1
mi;: 2 7 7 m: 7 7
DNS 3 7 i mime 1p mifDmTain Name .
Clone MAC Addass Fill in the MAC address ills! is the MAC address to be
claneqiefenw 4 14 What '; Clong MACAfim?
Enible “Fir Click the checkbox to enable uFN'P function.
Rflfflwmmixwhum
Enable Web Server Click the checkbox to enable web configuration from
Age“ on WAN 7 , WAN side. _ .,
Enable WAN Bell; Click lhe checkbox to enable WAN ICM'P response.
Reply
Apply Changes Click the Apply Change: button to complete the new
. 7 , m , wfiwfimwfiw A 7 , Mi",
Reset Flick the MIT-awn Ellen elm; Ind move: me
__ pleviqus configuration setting. _
II DHCP Client
WAN Interface Setup
mnuunnuummu—nmwm-uwup-cm
Mhhmwfi-fi‘mnmumlflmmumwumh
md'lAlAu-nlnt
mum-«em- Wmi
Gunman—an
Qumran-g,
mu:
um:
mas:
mummy-en
Cl mm
D “IOWA-uni“
D Minna-m
(ME
usual mummy wuu n nomn
DHCP cuent Click to select DHCP support on WAN lnterfaee for 11>
address assigned auxomalically from n DHCP server.
Attnln DNS Click tn select getting bus addw for anp Suppon.
Amomafically Please selecl MDNS Manually llthe mu? suppon is
_ selectedl
Set nus Mnnunlly Click to select getting DNS addxess for DIICPsuppon.
bus 1 Fill in the IP address ofDomain Name Serve: 11
ptis 2 ,_ 7“ > Fill lnthe lpnddms omnntnln Nnme Serveiz.‘
PNS 3 Fill in the 11> addmss ofDamaill Name Server 34 _ 7
Clane MAC Add-ens Fill in the MAC address that is the MAC addxus to he
a W _ cloned. Refer to 4 z4 mg; '; Clong MAC Agmg” A
Enable uPN'P 7 black the eheekhox to ennhle lIPN_'P function. "
_A 7 __7 R5fer!94.zzmti§!1n'vfl P113 angtnulrm"
Enable Web Serve: Click the checkbox to enable web configuration fmm
5915032“! ,_ . WA’iiidL . _ u ”A,
Ennhle WAN Echo $1: the eheEkhoiKEnahle—wfimnespmm
Reply
Apply Changes Click LheApply Changes button to complete the new
., ,_,_°?’.‘fil"“‘i°"mi“§; m, ,_, _ W
Reset Click the Rae! bunon to abon change and recover the
previous confiilnation setting
29
Ilm‘! mnnummu noun: v-
Hl PPPOE
WAN lnterfac: Setup
(LIN—M)
v “mun-y...)
User Nam
Pisswol'd
Connection Type
Click to select PPPOE support on WAN inlflfacen There
an: user name, password, connection type and idle time
settings weed to be none.
lfyon select the PPPoE slippm‘l on WAN interflce, fill in
the usernnme and password to login the PPPoE server.
Ifyml select the PPPOE slipper! on WAN interface, fill in
the user name and password in login the PPPoE mm
Select the connection type from pull-down menu. There
are Glam-Imus, Culture! on Del-mud and [than] three
types to select.
Continuous connection type mum; to setup the
connection through PPPoE protocol whenever this
WLAN AP Router is powered an.
some} en 05». ‘
lull-s MANUALOIWLAN n mom-m
Vents.
connection through PPPoE protocol whenever you send
the data packets out through the WAN interface; there are
a watchdog implemented to close the PPPoE connection
while there In no data sent out longer than the idle time
set.
Manual connection type means to setup the connection
through the PPPoE protoool by clicking the Connect
bunon manually. and clicking the Disconnect bulwn
lfyml select the PPPoE and Cal-net! an Dmami
connection type,l fiII' III the idle time for auto-disconnect
_ bfimction. Value can be between 1 and woe minutes,
Fill in the mm size ofMTU Size. The default value is
1400. Refer to 913 mm is Magnum Tgmm'gigg Quit
fixtuin DNS Click to seleet getting nus address for PPPaE support.
Arnonrstioally Please selectSermvsmnunayifthe ppm: support is
selected.
Set DNS Manually Click to seleot getting DNS address form]? support.
DNS 1 Fill in the 11> address of Domain Nnnre Server 1,
pus: N 7‘ FillintheanddmisofDomainNa-rlc Serverz. _k
DNS 3 * Fill inthe lPaddress oiDontnin Name Server 34
Clone MAC Address Fill in the MAC rddress that is the MAC address to he
7 _ ‘ v 77 7 W clonegLRefer lo4 24 Whgl '5 Clone MAC? Mg 3? _
Enable uPNP Click the check—hon to ensble um iinrotion'
Refer to WWW}
Enable Web Server Click the checkbox to enable web oonfigurstion from
A999?s MN. m, EAN side- A
Enahle WAN Echo CliTrhe Ereibo'x to‘erble wmfimsi; ”
3wa M
Apply Changes Click the Apply Changes button to complete the new
, . , ,, , m mfimignsstzizs “knit _ _ _
Reset Click the 11:32me abort change and recover the
previous configru-stion setting,
3!
us 1 human: wun A! mm:
IV PPTP
WAN [menace Selup
mmnnuumummuwmmmumwumum
Amllh‘imyw-nywfimywu mm,m,m-nnwuu-
wm-ll'AXAmnw
mum. 1m
"m.“ L‘L A swam-m
eA-INA-l—dly
Cumin-flu
ml: ‘h’fi
m1:
nan»
cue-mu..." mm ,
D Inn-urn
El “was-muunnwm
D “WASIAQM
[ME]
Sc 3 ol—W -
PP’TP Allow “set no make a tunnel WI remote site directly to
secure the data transmission among the commion. User
can use embeddgd PP'I'P client supported by this router to
make I VPN connection.
LPAddress _ lfyou select the WT? support on WAN interface, fill:
line I? xddress for it.
Subnct Mask Ifyou select the pnp support on WAN interface, fill in
the mime: mask f
Seiver’uikdfdrés am we 11> address ome PPTP Server.
User Name Ifyou select me PPTP suppon on WAN intm‘face, fill in
usm-s munmmfl AP [OUTER Vent—1L!
Password fyoll select the my suppon on WAN inmf-ne‘ fill in
MTTSiQe ., M " ' Fill inlhemtusizeofMTUSize Tnedefniuzvalneis *
1400. Refer m4 z; my 15 Maximum Tm§mis§ gn Hull
,, , , , _, mm ,... _, “73,7,
Amin DNS Click MIe—E—inn ENS address’foi PPTPsuppm.
Aulmmlically Please selea sa mvs Manually ifthe my support is
selected.
Click lo _seleel getting DNSidl'eis [95115ng 7
pgsl ‘ _ _ m ¥lilll Ill me lpflmfiigtbmm Name Sewer l. ,- _
DNS 2 Fill In the 1? address ofDomain Nnme Sewer 2
DNS 3 Fill in the IP address ofDomnill Nime Sen/er 3
Clone MAC Add“ Flll in the MAC Mikes: that Is the MAC an‘ldnss lo be
Clbnedl Refer Io 174mm
Emble uPNP Click the ckeclnlm to emble uPNP function.
Refer (04 22 Km! is Univeg [I ilk m Em “ENE.
Enable Web Server Click the checkbox to enable web mfiguratlon from
Access on WAN WAN side.
Enable WAN Echo Click the Checkbox 10 ennble WAN ICMP response.
Replxg _ 7, W , _ _D*7 »
Apply Changes Click meAJIyZh-zlglv fiQTngnEleTe ii: i;
configmtion setting.
Reset Click me Reset button Io aborl Change and recover me
previous configuration setting
3.3.12 Firewall - Port Filtering
Entries in this table are used to rem-lei certain types ofdava packets from your
local network in lntemel through the Gateway. Use ofsuch filters can be
helpful in securing or restricting your local nelwm'k.
33
um's mnuuorwum A? lama
Port Filtering
E—nm-fl-nw-mm'fl‘xflfivml—whfimhb—n
mun-m, wanna-naumnmum-amum
a nun...“
mum—3C] NJ cm
_E'~:'Z|
., C ik “l en_nl>1e the poll filterin ficurity function
To restrict data transmission from the local network on
cemin pom, fill in the range ofstamport and end-port,
Comments and the protocol, also put your cqmments on it.
The Protocol can be TCP. UDP of Both.
Com-rm let you know about whys to restrict data fmm
the ports.
Apply Chmges Click the Apply Changes button to register the ports to
, _r , , .r , . Mfil'flinsui‘;_~ _ mam
RM Click the Rest! button to abort change and recover the
previous configuration setting
Delete Selected Click to delele the selected pon range that will be
W, .. , ,_m"°£fi_wflh9p1fl-fihifi'fih_ , 7,” A. W,
Delete All Click to delete all the reglstet'et‘l entries from the
A . _port-filten'ng list. ‘
Rm Click the Rent button to abort change and recover the
_ m .. ., __ mvioux configuration setting.
33.13 Firewall - IP Filtering
Entries in this table are used to restrict cemin types ofdatx packets from your
local network to lntemet through the Gateway Use ofsuch films can be
helpful in securing or mtricling your local network.
34
mn's mnuuormn nun-nu Wei-u n
hum-mun“.- inmmfiwx-{mmfi-yfl-hslwnh—fl
WNW 3mm...“ '
‘Enable IP Ewing __ Click to enable the IP fillgl'illg soundly filncti n. 7
Local lPAddress To restrict am transmission fmm local network en'
Protocol cemin IP addresses, fill in the IP address and the
Comments protocol. also put your comments on it.
'l1|e Pmlocnlcan be TCP, UDP or Both.
Eminent: let you know about whys to restrict data firm
the l? addlvss,
Apply Changes Click the Apply Chung“ lmnon to register the l'Paddress
, . ,, ,, Emmett ._ ,, H. H-” A m.
Reset Click the Rent button to abort change and recover the
_ __ pmions configuration setting.
Delete Selccled Click to delete the selected 1? address that will be
ienwved from the lP-filtcring list.
Delete All Click to delete all the registered entries from the
lP-flluring list.
Rm! Click the RM button to abort change and recover the
previous configuration setting, .
3.3414 Firewall - MAC Filtering
Entries in this table an used to restrict certain types ol'data packets from your
local network to lmemet through the Gateway Use ofsuch filters can be
“35
Im‘i mmmoewwi AP mm:
helpful in securing or mu-icring your local network
MAC Filtering
l—n-mhfi-mlumrmmlwml—ynh‘mum
mummy Unamhmhm-mummbmm
E “my...”
mun-m‘ 7 ("d-nut;r
—@
mun-rum
_ nable MAC Filtering Click Io enable the MAC filtering security funcuo .
MAC Ailing To magi—data hanxmission from local network on
Comments 84min MAC “dresses, fill in the MAC address and your
comments on it.
Can-mm lei you know about whys to restrict dam from
the MAC addressl
Apply Chnnges Click Ille Apply Changes lumen to register the MAC
, A ,, ,, EdEiwfléCfl'efiflgfifg.w ,,,,,,, A,
Reset Ch'ek rhe Raul Inmcm to abon change and recover the
previous configuration getting _
Delete Selected Click in delete the 9:1er MAC address Lhal will be
removed from the MAGfilwring lisL
Deleie All Click to delete all the registered entries from (he
MAC-filtering list.
Reset Click the Reset button to abort change and recover the
previous confignnnion seizing,
3.3.15 Firewall - Port Forwarding
Entries in this table allow you to auwmarically redirect common network
services to a specific machine behind the NAT firewall, These mines are only
“
36
mm unsunwkun A! nmrm
nemwy ifyou wish lo liosi some sort of server like a web server or mail
server on Ille private local network behind your Gateway's NAT firewall.
Port Forwarding
l—almm‘efimhmflyflfiwr—mMH-fllmnxulmwm
UNAYMMu—‘u-rmmnqimnnuhummdrmhlwunun
min-unumnwmwmwimrm
_En__xble pnnfcnwnding Click loenable melon Forwarding security ligation,
[P Address To [ward data packers coming from WAN m a specific
Protocol IP address that hosted in local network behind the NAT
Port Range firewall, fill in llle IP address, prolocol. pen range and
Comment your comments.
The Pmtocal can be TCP, UDP or Both
The Part Range for data transmission.
Conn-mm let you know elm-l whys to allow data
packets forward an the l? addlms and port number.
Apply Changes Click ineApply Changes button to register the 1? address
and port number in Pan forwarding list
Reset Click the Run button to shell change and reoover the
previous configuration swing,
Delete Selected Click Io delete the seleaed IP address and port number
that will be removed fi'cm the port-forwarding list.
Delele All Click on delete all the registered entries from the
pon-forwardinglist.
37
mmmuorwmnnwmu vmzu
Reset Click the Rm! button to abort change and recover the
previmn; Qnfigunfion setting, 7
3.116 Firewall - DMZ
A Demilitarized Zone is used 00 provide 111me services without swrificing
unauthorized access to its local private lulwork. Typically, the DMZ hos!
ennui-is devices accessible to lnnernei tnfl'l . such as Web (HTTP) servers,
m servers, SMTP (”mill servers and DNS servers.
DMZ
AwhiMuMWW‘MIMq—Mvduix‘unbd
pmmmmwwmmmmanmmmnnwamml
mmmmlumm um um
II—ulnu
manna-mm]
WM M)
ngn musket — Em - DMZ
Enable DMZ Click to enable llre DMZ (Mon.
DMZ Hon l'PAddress To snppan DMZ in your firewall design, fill in the 1?
address ofDMZ lion llm can be were from the WAN
lnierfree.
Apply Changes Click flieApply Changes button to register me [P sddlcss
7 7 _ . e n, JL‘PI’EE‘PLf-.- _ __AV-. _ .
Resel Click the RM bimon to abort change and recover
previoniqonfigmtion setting.
3.3.17 VPN (Option) Settings
This page is used no show VPN connecticm table, configure IPSEC VPN, NAT
vaersal, Gwen“: RSA Key, Show RSA Public Key,
Note: V'PN is optional.
38
Inn's muncrwm n nan-n
le-z u
Enable lPSEC VPN
Click in enable IPSEC Vl’N functnon.
Refer to Lulu;
_‘ “Mum 8Whatisl E '!
Emblc NAT Traversal Click to enable NAT Tmersal function.
Geneme RSA Key Click to generate RSA key
Show RSA Public Key Click Io show RSA public key lhatwe geneme. M
Apply Chmges Click the Apply Chaugn bunon to enable lPSEC VFNl
NAT Traversal settings.
Cunenl VPN II shows cumml WAN interface infomlxlion and VPN
szfliimw ,m °Ei°wb1=«, _
Edit to enter the an}; lunnel cmfigumuan page
Delm Click to delete the cur-em VPN tunnel Ihal ml‘lo button
slay.
Refit?“ Click to wheel! the cum! VPN connectioll table,
39
Ilsn's mm“. okun A? novrut wee-lee: u
I VPN Setup - Edit Tunnel
VPN Sewn
Emu-ti
cunt-ii—
Enable Tunnel 35 Click to enable the lPSEC VPN sin-rent tin—nu
Connection Name Assign the connection name tag
7 7 77 Qllgiflselectl'sxorm,
Elick to select Single/441MB or SubnetAddtm VPN
connection
LocalIP Fill in IP address or subnet address depends on which
AddmlflVfl-vork Local Sile option you choose
LocalSubnfl Mmk Fill in the local subnet mask,
“Remote Site Click (a select SlugkAldms, SubnnAldlm. Any
Aldus: or NAT-uh; Address va remote connection,
Realm Seam Fill in remote gateway IP address
Gateway
Remnufl’ Fill in ll> address orsubneladdressdepcnds on which
AddeeMork Remote Site option you choosel
Rea-wt: Slim!“ Mask Fill in mime subncl mask
[meal/Peer m Define IKE exchange infomtuion type ’
LocnIlD 1m Click to select IP,DNSorbnuilas local exchange type
LocallD Fill in local l'D except ll> seleoted
gmmem Me; 7 _ Click to selegt lP. ozvs or E-wyil as mote exchange
“
40
IISEI‘S MMDIWLAN Ar new“ Vain: w
type
Rural: ID , Fill in remote 1D except 1? selected
Key Munagenwnt ' Click to select 11m nrM-nul mode.
AW, W _ , cm" Aflfflflyflflflfflfflflfin
ConnectionType ' Clickloselect lm'k'clormknponder mode,
999°“ . cm" ‘° °W WEE“?! IRSEE'L'F'EQMi
Qiuonnéln 7 7 Click GEM—nu?“ manually. [Responder mode only].
ESP Click to oonflgm‘e was, firm orNULL encryption.
.. r _, ,, f ' 0:2 yrflfirmmm "2"? _ _ _
PreShared Key the k y value. IKE mode onty
Remote RSA Key Fill in the rel-now ptcway RSA key. mm mode only]
Status It shows connection statusl [IKE mode only]
SP] Fill in Securily Parameter Index value. [Mutual mode
only]
Encryption Key Fill in encryption key [Mnmul mode only]
Hi'leflfiifilfixnjiey Fi Enigmatic“ key [Mnnujlflnwde MIIL
Apply Change ‘cuclr the Apply Ell-ages buttln to save current tunnel
he}; 7 7 7" Click uieEEEiEiTo JonéfingTaTfiTeQVZtE7
previous configuration setting
Refresh It shows the current connection slams, [Mann-I mode
only]
Back _ ll remms back to VPN Sen-p pagel
4|
MEMAKUALOIWIMAPIWER Vern-in
II Advanced IKE Setup
Adavnced VPN Setting for IKE
mmukwnmmwhnm
del
M 1:
WMok Klimt
mm» @
MGM» DHMW)
hymn“ as»
M1: *7'"*7
mm in
mm @
MAW M05 .
kylife'l'ine moo
flaunt-fix 1mm
mwmm on i
E]
sin —Ad va ' f (I
”E” ‘ _
Negotiation Mode Main model
Encryption Algal-mini Click to select was MAESIZU encryption.
Amhenlication Click in select Mm orSHAI authentication.
Algorithm
my Group Click to select nflumdwm DHNWMII) or
push-wuss; key goup, Default value is Dl-lz
Key Life Tlm Fill in the key life Lime value by worlds,
"m“ 2
12
Wu's MmALorwun A? non-nu
v-r-tm 1)
Active Protocol ESP.
Authenticition ' Click to seiect M05 orSHAl annhemicalion
Algorithm
_ Fill“ in the key life time vnlne by seconds.
Perfect Forward
Secrecy (PF S)
0k?
Cancel ' Click the Cancelhnlton we close current window without
any changat
3,3.18 Management ~ Statistics
This page shows the packet countens for innsmission and reception regarding
IA) Wingless, Ethernet LAN and Emmet WAN networks.
Statistics
mwmanlummummnpqu-wummm
w‘rreiess LAN Ir skews the statistic count or sent packets on the wireless
30:1an _ _ LAN interface.
Wireless LAN It shows the statistic count ofteceived packets on the
Raceivedl’ackm wireless LAN imerfxoe.
Ethemet LAN It shows the mfisfic count ofmt packets on the
Sent Fades Ethernet LAN inlerfnce. ,
EihsEleANm M7 _ itehgws the smtistig gaunt of received mkets on the
43
mu'smxuuorwumnounu Venue-en
Rulivfll Finders Ethernet LAN interface.
Emmet WAN it shows the misfit: count of sent packets on the
Seal Puke“ Ethernn WAN interface.
Ethernet WAN It shows the statistic count of received packets on the
Ethemel WAN interffwe.
rh uh smligfic coilnlels on the semen,
33.19 Management - DDNS
This page is used to configure Dynamic DNS service to have DNS with
dynamic 11> address.
Dynamic DNS Setting
“Mu-mnupwiny-rw‘nm-nmmM—‘fl-UIUwum
uwmmwum
aw
Fumm‘MMliadmhrflmwwy-Dmmnw
IVQflEMMMWMVS-xmm
Enable DDNS Click the checkbox to enable DDNS service. Refer ta
, , ,, ,, ,, ,, ,1~?_ A470“! me, A ,,, t, , ..
Service vaider Cl 1: the drop div/n rnenn w picinp the right provider.
Domain Name To configure the DomainName.
Useanme/izmfl Configure User Name, Email.
£82946” , , , Sflfiflm “Wm-E! , , ,, , .. . ,
Apply Change Clickthe L’pp’iy éthgerTuncn to'rm' the enable
DDNS service,
Reset Click the Rem button to abort change and recover the
> previous configuration setting
“
44
mm; mwuorwun n murmur Vam u
3.3420 Management - Time Zone Setting
This page is used to wnfiguxe NTP cliem to get current time.
Time Zone Setting
Ynmmfimofl—mbyolm—‘mlp‘k-ruwfinvfih-fi
cum-um rrLJm-[TlgqandH-LMLJ fl
muse.“ [mmToanl-w
Ell-Mammal“
mm“ 9 mum MAn-nm I
11 ot— —'l'| ne
_Cllrrent_‘r_“lme It shows the cunmt time
Time Zone Select Click the time zone in your country.
Enable NTP client Click the eheeklmx to enable NTP client update. Refer m
"9912 _ 7 ,_ , , 4M, f “Tiling _._ ,_ hm _
NTP Server ‘ qickfiecheEult or input NTP screenwriters.
Apply Change Click the Apply Change. button to save and enable NTP
, 7 e , , W, M Lfim‘ififim _A “A, “mm _
Reset Click the Beer hufito atht flange and recover the
_ previous configuration sewing,
refresh fl Click the refresh the arr-em rime shown err the screen.
3,321 Management - Log
This page is used to configure the remote log server and shown the current log.
45
Wu'suwuokun A? noun: Yank-ill
System Log
mwmhmnummhpmumm m...”
a mum
cum-q- em."
a mu...” Him-"rune": ,:
‘lé'e-v fl:
aaxalwoanl
m-ama lxaetlulfl) 4m
car has
us up:
mm noxomu may: unuvouo u anemone (mum
- mun “tux-x m aunmma 45mm mm
| on use 0 mm. n mu
many 00. am mun, u an.
my aoxomu 1mm: a mu,
m, eoxnoxn mm ea—nn nu: xwv—latv/u- mun-a
(ML-Luna» sum
1m), 00:00:11 C-hbx-ulv any use...
EMEIE
Screen snapshot ~ Mmgemem — Log
nun mum
Enable Log Click the checkbox to enable log.
Winks: only Only show wireless log
Aynem all Show all log ofwiueless AP mum
Enable Rum”: Log Click the checkbox Io enable mmwe log service,
Log Sam IPA/Mm: Input the remote log 11> address
APP]! W554 , gig [hf Alli-V 94539 I’Jyflflsfl'ejbfliyfinffa 4
Refresh Click the refresh the lug shown on the screen.
Clear 10; qlsplay screen
3.322 Management - Upgrade Firmware
This page allows you upde the Access Point firmware to new version.
Please note, do not power offthe device during the upload because it may
mash the symm.
usuvs muolrwun Arlmmn thx u
Upgrade Firmware
MplrfinyflmfiAMIMfi-mhmrn— hmmnhnflmn‘h’
mmuumemnnmm
Select File Click the Browse bumn w select the new vetslorl of web
, fimwmji’fiflf; aim, "m, , ,,
Upload an the Upload button to update the selected web
firmware image in the WLAN AP Router.
Reset Click the Rue! button to abon change and recover the
previous configumign selling,
3.323 Management Snve/ Reload Settings
This page allows you save current settings to a file or reload the settings from
the file lint was saved previously. Besides, you could reset the current
configuration to factory default,
Sue/Reload Settings
Mmmmmmnflpnrlfluwhmi—hflmn um
Mame—mmmwmumm
hem-m
puma-m
mung-m
Save Settings (0 File Click the Save human to download the configuration
plmnmers to your personal computer.
Load Settings (mm File Click the 3mm billion in select the configuration files
then click the Upleqd human to update the seleeted 7
——-————-——
17
m's munokun u nun-n Venn-z u
configuration in the WLAN AP Router.
Reset Settings to Click the new button to reset the configuration
Default parameter m factnry defaiflts.
343.24 Management - Password Setup
This page is used M) m the account to mess the web server orAeeess Point.
Empty user name and password will disable the protection,
Password Setup
Minnuutlumflmhmxumm‘rwuum Mwflmmfiluwfl
dummy-m
01-34-14
"new:
can—mum:
. iflumflmsiflfi'!
New Password Fill in the password for web mnTgement login control
Confirmed Password Because the password input is invisible. so please fill In
., _i W , , _ A. 0“ “£1432" for mfimfi'fllw
Apply Changes Clear the User Mann: and PM fields to empty,
means to apply no web management iogin commL
Click the Apply Changes button to complete the new
7 configln-ntion setting ___ m _4 _
Reset Click the Rm button to rim change and recover the
previous conflgmtion setting.
3.3.25 Logout
This page is used to logout web mamgement page. This item will be activated
next time you login afier you define user account and password.
4!
umrs mu. ow wun AP mun-n
v...“ m
Logoul
non-mmmn
Apply Change Click the Appfy Change mum, Then click Oxbumm lo
logout. _
49
van-s mum. or wm A? norm- Mg m
47 What are potential factors Ihal may causes interference?
Factors of interference:
F Obstacles: walls, ceilings, fimriture etc.
> Building Materials: metal door. aluminum studar
> Electrical devices: microwaved, monitors and electrical motors.
Solutions to overcome the interferences:
J Minimizing the number ofwalls and ceilings.
'/ Position the WLAN antenna for best reception
/ Keep WLAN devices away from other electrical devices, eg: microwaves,
monitors, electric motors, etc.
'/ Add additional WLAN Access Points if necessary
4.8 What are the Open System and Shared Key authentications‘!
lEEE 802.1] suppom two subtypes ornetwm-k authentication services: open system and
shared key, Under open system authentication, any wireless station can request
authentication. The station that needs to authenticate with another wireless station sends
an authentication management frame that contains the identity oftbe sending station.
The receiving swim] then returns a frame that indicates whether it recognizes the
sending station Under shared key authentication, each wireless station is assumed to
have received a secret shared key over a secure channel that is independent from the
802. ll wireless network communications channel
4.9 What is WEP‘?
An optional IEEE 801“ function that offers Frame transmission privacy similar to a
wired network The Wired Equivalent Privacy generates secret shared encryption keys
that both source and destination swim can use to alert frame bits to avoid disclosure to
cavesdmppers.
WEYrelies on a secret key that is shared between a mobile station (eg, a laptop with a
wireless Ethernet card) and an access point (i,e. a base station), The secret key is used to
encrypt packets before they are transmitted, and an integriry check is used to ensure that
packets are not modified in transit.
410 What is Fragment Threshold?
The prom protocol use: the frame fragmentation mechanism defined in IEEE 802.1]
to achieve parallel transmissions. A large data frame is fragmented into several
52
use" MANUALOFWIAN nlwnn Venn-i: u
fragments each ofsize equal to fmgnent threshold. By tuning the fragment threshold
value, we can get varying fragment sizes. The determination ofnn efficient fragment
threshold is an important issue in this scheme. If the hymn! threshold is small, the
overlap part of the master and parallel transmissions is larger This means the spatial
reuse ratio ofparallel transmissions is high In contrast. with a large fragment threshold,
the overlap is small and the spatial reuse ratio is low. However high fragment threshold
leads to low fragment overhead, Hence there is a trade-off between spatial reuse and
fragnent overhead.
anmenl threshold is the maximum packet size used for fragmentation. Packets larger
than the size programnwd in this field will he fingrnented.
if you find that your corrupted packets or asymmetric packet reception (all send packets,
for example), You may want to try lowering your fragmentation threshold. This will
cause packets to be broken into smelter fragments. These sin-u fragments, ifoorrupted.
can be resent foster than a larger fragment, Fragmentation increases overhead. so you'll
want to keep this Value as close to the maximum value as possible
4.11 What is RTS (Request To Send) Threshold?
The RTS threshold is the paelret size at which pneket transmission is governed by the
RTS/CTS transaction. The IEEE 80211-1997 standald allows for short packets to be
transmitted without RTS/C’m transactions, Eula station can have a different RTS
threshold, RTS/CTS is used when the data packet size exceeds the defined RTS
threshold, With the CSMA/CA transmission mechanism. the transmitting station sends
out an MS packet to the receiving station, and waits for the receiving smtion to send
back a C'l'S (Clearw Send) packet before sending the actual packet data.
This setting is useful for networks with many clients. With many clients, and a high
network load, there will be many more collisionx. Hy lowering the RTS threshold. there
may be fewer collisions, and perfomhanoe should improve. Basically. with a faster RTS
threshold, the system can recover from problems faster. RTS packets consume valuable
bandwidth, however, so setting this value too low will limit performance,
4. 12 What is Beacon Interval?
In addition to data fumes thnt carry information from higher layers, 802.11 includes
management and control frames that support data transfer. 11|e beacon frame. which is a
type of ntartiigement frame, provides the "heartbeat" of a wireless LAN, enabling
“
53
bums mnunnocwm n noun-m Vent-a; u
stations In ashblish and maintain communications in an orderly fashion.
Beacon Interval represents the amount ortime between beacon transmissions. Before a
station enters power save mode, the station needs the beacon interval to know when to
wake up to receive the beacon (and learn whether there are buffered frames at the access
point).
4.13 What is Preamble Type?
There are two preamble types defined in [BEE 302. ll specification Along preamble
bmieally gives the decoder more time to process the preamble. All 802,11 devices
supper! a long preamble, The short preamble is designed to improve efficiency (for
eurnple, for Vol? systems). The difl'erenoe beiween the two is in the Synchronization
field, The long preamble is I28 bits, and the short is 56 bits.
4.14 What is SSID Broadcast?
Broadcast of SSID is done in wuss points by the beacon, This announce: your access
point (including various bits of information about it) to the wireless world uroturd it. By
disabling that (centre, the SSID configured in the client must match the SSID ofthe
access point,
Some wireless devices don't work properly if SSID isn‘t broadcast (for example the
D~link DWL~120 USB 802.1 lb adapter). Generally if your client hardware supports
operation with SSID disabled, it's not a bad idea to run that way to enhance network
securily. However it's no replmnent for WEP, MAC filtering or other protections.
4.15 What is Wi-Fi Protected Access (WPA)?
Wi~Fi‘s original security mechanism, Wired Equivalent Privacy (WEP). has been
viewed as insufficient for securing confidential business communication A longer-rem
solution, the IEEE 802. l li standard, is under development. However, since the “£155
802.1“ sundurd is not expected to be published until the end of2003‘ several members
orthe Wl-FiAlliarwe mmedup with membersamre IEEE 302.1“ taskgmp to
develop a significant hear—term enhancement to Wi-Fi security. Together. this team
developed Wi-Fi Protected Access.
To upgmie I WLAN network w support WPA, Access Points will require n WPA
sofiware upgrde. Clients will require a sofiwrre upgrade for the network interface card.
and possibly a sofiware update for the operating system. For enterprise networks, an
my
mumuunnnrwmnnwnn Venhxll
4 Frequently Asked Questions (FAQ)
41 What and how to find my PC’s IP and MAC address?
it address is the identifier for a computer or device an a TCP/IP network. Networks
using the TCP/IP protocol inure messages based on the IP address critic destination.
The formal ofan IP address is a 32~bi| numeric address written as four numbers
separated by periods. Each number can be zero to 255. For example. 191,168,I 254
could be an IP address
The MAC (Media Amer. Control) address is your computer‘s unique hardware number.
(On an Ethernet LAN, it‘s the same as your Emmi address) When you‘re connected to
the lntemet From your computer (or host as the lntemot protocol thinks of it), a
correspondence mile relates your [Paddress to your computer's physical (MAC) address
on the LAN.
To find your PC‘s l? and MAC address,
/ Open the Command program in the Microsofi Windows.
I W in Ware/all then press the Euler button.
> Your PC’s 1? address is the one entitled lPAddress and your PC's MAC address is
the one entitled Phym'cal Address.
442 What is Wireless LAN?
A wireless LAN (WLAN) is a network that allows access to lmemct without the need
for any wired connections to the user‘s machine.
443 What are ISM bands?
ISM Hands for lrlduslrial, Scientific and Medial: radio fi'equency bands that the Federal
Communications Commission (FCC) authorized for wireless LAN, The ISM bands are
located at 915 +l- I3 MHL 2450 H- 50 MHz and 5800 H— 75 MHz.
4.4 How does wireless networking work?
The 802.“ standard define two modes: infraxlruuure mode and ad hoc mode. In
infrastructure mode. the wireless network wnsists ofat least one access point connected
to the wired network infrastructure and a set of wireless end swionn This configuration
is culled a Basic Service Set (355). An Extended Service Set (ESS) is a set of two or
more 3585 forming a single subnetwork Since most corporate WLANs require access
“50
use" munorwmurwvmn Vault-11.0
to the wired LAN for services (file servers, printefl‘ Internet links) Ihey will operate in
infiastnwture mode.
bin-mu n!
Q} aim!»
mm a wuss)
Example 1: wireless lnfnstrucnne Mode
Ad hoc mode (also called peervtcrpeer mode or an Independent Basic Service Set, or
1358) is simply a set of 802“ wireless stations that communicate directly with one
another without using an access point or any connection to a wired network This mode
is useful for quickly and easily setting up awireless network anywhere that a wireless
infrastructure does not exist or is not required for services, such as n hone] mm
convention center, or airport, or where m to the wired network is barred (such as for
consultants a! a client rite).
Mindful M ml Walt!)
Example 2: wireless Ad Hoc Mode
4.5 What is BSSID?
Asix-hyte mm um dininguishes n partieulur ! paniculnr access poim fmm others.
Also Irnow asjust SSlD. Servu as a network [D or name.
4.6 What is ESSID'J
The Extended Service Sen ID (ESSlD) is the rune ofthe network you want to access, It
is used to identify difl'erent wilelus networks.
51
um's MANUALOIWLAN A? nom- Vflnh- u
“
4.21 What is Wireless Distribution System (WDS)?
The Wireless Distribution System feature allows WLAN AP to talk directly to other Al’s
via wireless ehannel, like the wireless bridge or repeater service.
4.22 What is Universal Plug and Play (uPNP)?
UPnP is an open networking architecture that consists of services, devices, and wntrol
points. The ultimate goal is to allow data communication among all UPnP devices
regardless ofmedia. operating system, programming language, and wired/wireless
connection
423 What is Maximum Transmission Unit (MTU) Size?
Maximum Transmission Unit (MT U) indicates the network stack of any packet is larger
than this value will be fragmented before the transmission. During the PPP negotiation,
the peer of the PPP connection will indicate its MRU and will be accepted. The actufll
MTU of the PPP connection will be set to the smaller one of MTU and the peer‘s MRUA
The default is value 1400.
4.24 What is Clone MAC Address?
Clone MAC address is designed for your special application that request the clients to
register to a server machine with one identified MAC lddress.
Since that all the clients will communicate outside world through the WLAN AP
Router, so have the cloned MAC address set on the WLAN AP Router will solve
the issue.
425 What is DDNS?
DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for user own
the DNS server with dynamic WAN IP address
4.26 What is NTP Client?
NTP client is designed for fetching the current Iimfitamp from internet via Network
Time protocol, User can specify time zone, NTP server IP address.
4.27 What is VPN?
VPN is the abbreviation of Virtual Private Network. lt is designed for creating point~to
point private link via shared or public network.
us-rs mnuuol mm A? new v“.- m
428 What is IPSEC'!
IPSEC is the abbreviation of]? Security, 1! is used In transferring dm securely under
VPN,
57

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Modify Date                     : 2008:02:14 15:10:41+08:00
Create Date                     : 2008:02:14 15:00:27+08:00
Creator                         : Acrobat 5.0 Scan Plug-in for Windows
Page Count                      : 65
Mod Date                        : 2008:02:14 15:10:41+08:00
Creation Date                   : 2008:02:14 15:00:27+08:00
Producer                        : Acrobat 5.0 Scan Plug-in for Windows
Metadata Date                   : 2008:02:14 15:10:41+08:00
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: VYTLP-9186-001

Navigation menu