Prime Electronics and Satellitics WA211P-X Wireless Access Point User Manual WA211P

Prime Electronics & Satellitics Inc. Wireless Access Point WA211P

User Manual

Wireless Access Point
User Manual
Wireless Access Point
Copyright
Copyright 2001 by this company. All rights reserved. No part of this
publication may be reproduced, transmitted, transcribed, stored in a
retrieval system, or translated into any language or computer language,
in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise, without the prior written permission of
this company.
This company makes no representations or warranties, either
expressed or implied, with respect to the contents hereof and
specifically disclaims any warranties, merchantability or fitness for any
particular purpose. Any software described in this manual is sold or
licensed "as is". Should the programs prove defective following their
purchase, the buyer (and not this company, its distributor, or its dealer)
assumes the entire cost of all necessary servicing, repair, and any
incidental or consequential damages resulting from any defect in the
software. Further, this company reserves the right to revise this
publication and to make changes from time to time in the contents
hereof without obligation to notify any person of such revision or
changes.
.
All brand and product names mentioned in this manual are trademarks and/or registered
trademarks of their respective holders.
Federal Communication Commission
Interference Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4. Consult the dealer or an experienced radio/television technician for help.
Notice 1:
The changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
Notice 2:
Shielded interface cables, if any, must be used in order to comply with the emission
limits.
Notice 3:
This device complies with Part 15 of the FCC Rules. Operations is subject to the
following two conditions: (1) This devices may not cause harmful interference and
(2) This devices must accept any interference received including interference that
may cause undesired operation.
Caution: “ To comply with FCC RF exposure compliance requirements, a separation
distance of at least 20cm must be maintained between the antenna of this device
and all persons. Do not alter the antenna(s) which is equipped with this device”
Manual Contents
Purpose
This user guide gives you all the information to install and operate the
Wireless Access Point Device properly.
Structure
This user guide consists of five chapters:
Chapter 1 Introduction
This chapter introduce the feature and package contents of this
product before you proceed the Wireless Access Point
installation
Chapter 2 Installation
This chapter gives all the necessary information that to install the
Wireless Access Point
Chapter 3 Configuring the Wireless Access Point
This chapter contains step-by-step procedure on how to
configure the Wireless Access Point through the DFU utility or
the SNMP manager.
Chapter 4 Troubleshooting
This chapter provides solutions to problems usually encountered
during the installation and operation of the Wireless Access
Point
Chapter 5 Appendix
Wireless Access Point
This chapter contains definitions of technical terms and
acronyms commonly found when installing and configuring this
device
Table of Contents
Chapter 1 Introduction
1.1 Package Contents ..................................................... 1-1
1.2 System Requirements ............................................... 1-1
1.3 Features ……………………………….…………………1-2
1.4 Specification…..……………………….…………………1-2
Chapter 2 Installation
2.1 Hardware connection ..................................................... 2-1
2.2 LED Indicator .................................................................. 2-2
Chapter 3 Configuring the Wireless Access Point
3.1 Configure through DFU Utility .................................. 3-1
3.2 Configure through SNMP Manager .......................... 3-7
Chapter 4 Troubleshooting
4.1 Frequently Asked Questions .................................... 4-1
Chapter 5 Appendix
Chapter
1
Introduction
Introduction 1-1
Thank you for purchasing Wireless Access Point. This device features
the latest innovation wireless technology making the wireless
networking world happened. This manual guides you on how to install
and properly use the Wireless Access Point in order to take full
advantage of its features.
1.1 Package Contents
Make sure that you have the following items:
One Wireless Access Point
One AC Power Adapter
One USB Cable
One Installation Manual
One CD-Title with AP manager Software and manual
If any of the above items are missing, contact your supplier as soon as
possible.
1.2 System Requirements
Before installation, please check the following requirements with your
equipment.
1-2 User Manual
Pentium Based ( And Above ) IBM-Compatible PC System
CD-ROM drive
One Available USB Connector
Windows 9x/ME/NT4.0/2000 Operating System with TCP/IP
protocol
At least 500Kbytes of free disk space for utility and driver
installation
1.3 Features
Highly Efficient Dipole Antennas Provide Extensive Range of
Operation
Auto Fall-Back Data Rate for Long-Distance Communication and
Noisy Environments
High-Speed Data Transmitter Rate Up to 11 Mbps
Interoperable with IEEE 802.11b (DSSS) 2.4GHz-Compliant
Equipment
Features Roaming, Best Access Point Selection, Load Balancing,
and Network Traffic Filtering
40-Bit or 128-Bit (optional) Wired Equivalent Privacy
Free Software Driver Upgrades
Auto Fallback Data Rate for Long-Distance Communication and
Noisy Environments
1.4 Specification
Standard IEEE 802.11b
Introduction 1-3
Signal Type DSSS(Direct Sequence Spread Spectrum)
Modulation QPSK / BPSK / CCK
Port One RJ 45 / One 10BASE-T
Ethernet Interface IEEE802.3 10 BASET
Antenna Dual Dipole Antenna
Data Encryption 40 bit WEP encryption ,
128 bit KEY Length(otional)
Frequency 2.4GHz –2.4835GHz
Channel 11 Channels(US,Canada)
13 Channels(Europe)
14 Channel(Japan)
Data Rate Up to 11Mbps(with automatic scale back)
LED Indicators Power , Link(wired),Activity(wireless) status
Power Input-AC 100-240V , 50-60Hz, 1A
Output-DC 5V/ 800mA
Temperature Operating :0 to 55, 32 to 131
Storage : -20 to 70, -4 to 158
Humidity 95% Non-Condensing
Dimensions 206*142*35mm
Chapter
2
Installation
Installation 2-1
Before you proceed with the installation, it is necessary that you have
enough information about the Wireless Access point
2.1 Hardware Connection
1. Locate an optimum location for the Wireless Network Access
Point. The best place for your Wireless Network Access Point is
usually at the center of your wireless network, with line of sight to all
of your mobile stations.
2. Fix the direction of the antenna . Try to place it in a position which
can best cover your wireless network . Normally, the higher you place
the antenna, the better the performance will be. The antenna’s
position enhances the receiving sensitivity.
3. Connect an RJ-45 to the Wireless Network Access Point. Then,
connect the other end of the Ethernet cable to a switch or hub.
Wireless Network Access Point will then be connected to the 10/100
Network.
4. Connect the AC Power Adapter to the Wireless Network Access
Point’s. Power
5. Then, power on the Access Point.
2-2 User Manual
2.2 LED Indicator
The LED indicators located in the front of the panel shows the Wireless
Access Point status and connection activity.
Chapter
3
Configuring the Wireless Access
Point
Configuring 3-1
This chapter contain detains on how to configure your Wireless Access
Point as well as how to verify if your setting is correct during the
installation. We recommend that you follow the steps accordingly to
avoid future problems.
3.1 Configure through DFU utility
The DFU Utility is provided to configure the Wireless Access Point
setting through the USB port.
Note : Before start using the AP ,configure through DFU utility first.
Even if you won’t use the DFU to manager this AP in the future . When
first connect the AP to the USB port , the operating system will ask for
the driver upon detecting the device. Locate the driver into your CD and
the installation will go on automatically. (Windows 98 and Windows
2000 are supported). After completing the installation , configure
through the DFU utility to get the AP work.
Note: Be sure that there is no AP inserted at this installation
stage.
3-2 User Manual
Installing the DFU Utility
In order to install DFU Utility, execute/or double click DFU setup.exe
program which may find in the CD title . A wizard appears indicating the
completeness of installation process.
Configuring the Wireless Network Access Point with
the DFU Utility
Boots up the DFU utility form the Windows start manual the
following dialog will apper.
Note : If this is your first time to use the DFU utility to configure
the Access Point. We do recommend you use the “Access Point
Wizard” as show above to go for the setting. This wizard will
guide you the most easy way to set up your device. Or you may
click the “Configuration” to get advanced setting.
Configuring 3-3
1 Access Point Wizard set up
1.1 Step up the IP address
Press the “Access Point Wizard” button, the following dialog
will show up .If there is a DHCP server in your Ethernet,
Enable” DHCP Client. If not, consult your network administer
about how to configure your IP setting. After complete the
manual Setting ,click the “Next “ .
1.2 Step up the SSID
SSID is the identification string used to distinguish different
wireless network. Key in any sting you like to identify your
wireless network. Click “Next “to continue.
3-4 User Manual
Note : Be sure that the SSIDs of setting the Access Point
and the Wireless LAN card must be the same in order to
function properly.
1.3 Setting up the Channel
Choose the channel you may use, then click “Finish” to
complete the setting.
Configuring 3-5
2 Advanced DFU Setting
2.1 Be sure that you have enough information to have the
advance setting before you boot up the following dialog.
2.2 You may use those buttons in the right side as shown in the
figure able for advance setting.
Get “ button details the current setting.
Modify “ button allows new setting parameters
Set “ button save and take any effect to the current
setting .
2.3 Click Eth_IP-Address” to set the IP address used by the
AP .Click the other items to continue other setting.
3-6 User Manual
2.4 Click Eth_Submask” to set the subnet address .
2.5 Click “Wirel_ESSID” to give a name for the AP which may
find them to the network.
2.6 Click Wirel_Channel” to define the channel used by the
AP.
2.7 Click Access Point Name” to name the AP .
2.8 Click Gateway IP Address” to set the Gateway IP
Address.
2.9 Click Operation Mode “ to set the mode used by AP.Refer
to the Appendix for more information.
Lastly, close the application and unplug the cable.
Note: Chapter 5 contains definitions of technical terms and
acronyms commonly found when installing and configuring this
device.
3.2 Configure through SNMP Manager
The Access Point SNMP Manager is provided to manage the
Wireless Access Point through Ethernet.
Note: Before using the SNMP manager to configure the AP, please
check with your Network Administrator to have enough information for
the setting. .
Configuring 3-7
Note: Be sure that there is no AP inserted at this installation
stage.
Installing the Wireless Access Point SNMP manager
In order to install the SNMP manager, run the program setup.exe
which may find in the CD . Follow the instructions of the set-up program
and select the directory where the application will be installed. A
window wizard appears indicating the completeness of the installation
process.
Configuring the Wireless Network Access Point with
the SNMP Manager
Before configure the AP by the SNMP Manger utility ,Please set
the Access Point IP address following the procedure described
below. On the Windows Start Menu, choose
Start->Programs->SNMP Manger
Connect to Access Point –You can directly connect with the
Access Point by typing the appropriate IP address and community
in the panel,(The default password is” public”). Additionally you
select the User or Administrator Authority in the Authority
combo-box. User Authority allow you to view the Access Point
Configuration only, while Administrator Authority allow you to view
or change to the Access Point Configuration. After the above
configuration setting, press “OK”.
3-8 User Manual
Find out Access Point–
1.This submenu allows you to find and connect with the Access
Point without the necessity of knowing its IP address. Choose
this submenu in order to find the Access Point and press
“Connect”. Window appears indicating the IP Address of the
selected Access Point and prompting you do select Authority
and appropriate password at the community field. Then press
“OK”.
2.The following window appears indicates a successful connection to
Access Point. Press “OK
3.The following message appears an unsuccessful connection.
Configuring 3-9
4.If the above error message appears, please check whether the AP
has and appropriate IP address and been connected to the network.
5.a message “Get Configuration done” and the “IP Address” will appear
at the left and right button of the manual box once the connection
between the Access point been established.
File menu: The file menu contains the following enabled
submenus
Close Connection AP – Terminates the connection with the
Access Point.
Download changes – When all the desired values of the
parameters have been set you are able to download the
changes (save the changes) to the Access Point by selecting
this submenu.
Options – Defines the polling interval according to which the
SNMP Manager polls the Access Point in order to update the
Associated Stations List.
Setup Menu: You are able to view or set the Access Point
parameters under the “Setup” menu, the section consists of
following submenus.
Setup->Bridge->IP Configuration or Filtering
IP Configuration
The “IP Address” and “IP Mask” can be modified through “IP
Configuration”, if DHCP client is not enabled. If DHCP client is
enabled the IP Address field displays the IP Address that was
dynamically assigned to the AP by the network DHCP server
and the IP Mask field displays the IP Mask utilized by the
network DHCP server. Additional you have to select the Primary
Port which is the interface that determines the “File” menu in
order to save them.
3-10 User Manual
Filtering –
If IP Routing is enabled all the other protocols will be filtered out
offer than the IP protocol through the WLAN.
Setup->Wireless LAN ->Privacy Options or Operational
Settings or Authorized Mac Address
Privacy Options
By choosing this option you must define the encryption key
values of your choice. There are four 5 Hex digit encryption
keys available if you select 64 bit WEP or there are four 13
Hex digit encryption keys available if you select 128bit WEP.
The key is enabled only if you select it in the “Default Key”
option. Enable the WEP (Wired Equivalent Privacy) option in
order to activate WEP encryption for transmissions between
the stations and the Access Point. WEP is an authentication
algorithm which protects authorized Wireless LAN users
against eavesdropping.
Configuring 3-11
Note: The authentication type must be the same on the wireless station
and on the access point. All shared keys on the wireless station must
be the same as those on the access point with which the client station is
associated.
Operational settings-
Using this option you can either view or modify the Wireless LAN
parameters of the Access Point . These parameters are described
below:
ESSID---It is an ASCII string up to 21 characters used to identify a
WLAN that prevents the unintentional merging of two co-located
WLANs. The ESSID value must be the same in all stations and Access
point in the extended WLAN. Select the ESSID to be used.
Channel---There are 14 channels available. The channels differ from
country to country. Select the channel to be used.
Fragmentation threshold---The size at which packets will be
fragmented. Choose a setting within a range of 256 to 2346 bytes.
3-12 User Manual
RTS Threshold--- Minimum packet size to require an RTS (Request To
Send). For packets smaller than this threshold, an RTS is not sent and
the packet is transmitted directly to the WLAN. This is the option for the
RTS Threshold activation.
Authentication Type-- Select Open System, Shared Key, or Both
Open System: With this setting any station in the WLAN can
associate with an Access Point and receive and transmitted data
(null authentication).
Shared Key: With this setting only stations using a shared key
encryption identified by the Access Point are allowed to associate
with it.
Both: with this setting stations communicate with the Access Point
either with or without data encryption.
Preamble Type (Short/Long)--- Preamble is the first subfield of PPDU,
which is the appropriate frame format for transmission to PHY (Physical
layer). There are two options, Short Preamble and Long Preamble. The
Short Preamble option improves throughput performance
Rate---By default the unit adoptively selects the highest possible rate
for transmission. Select the basic rates to be used among the following
options 1-2-5.5-11 (Mbps).
Auto Rate Fall Back--- When this is enabled the transmission rate is the
optimum rate. In case of obstacles or interference, the system will
automatically fall back.
Regulatory Domain--- The value of this field is already set and cannot
be modified.
Advanced Setting--- there are the following three operational modes
available.
Configuring 3-13
Access Point: This mode provides access for wireless stations to
wired LANs and from wired LANs to wireless stations.
Furthermore, wireless stations within the range of the Access Point
device may communicate with each other via the Access Point.
Access Point Client: This mode allows the connection of one or
more remote LANs with a central LAN, creating thus an extended
single virtual LAN. In this way, any station of the Remote LAN can
successfully communicate with any station of the central LAN, as if
all of them belonged to the same physical LAN. Wireless Stations
can’t associated with Access Point Clients. The Access Point
conducts the designated traffic to the appropriate wired or wireless
station.
Wireless Bridge: This mode allows two types of connections.
a. Point to point: The wireless bridge can communicate with a
specific Remote MAC Address.
b. Point to Multipoint: The Wireless bridge can communicate with
any Wireless Bridge available in the same channel. When
Authorization Algorithm (see the next menu – Authorized MAC
Address ), is enabled, the Wireless Bridge can communicate
For each mode you can either view or modify the Wireless
LAN parameters of the Wireless Operational Settings window.
In the Operational Mode Window there are the following
parameters.
Preferred BSS: It is enabled only if you select the Access Point C
lient option. BSS corresponds to the MAC Address of the desired
AP.
Remote MAC Address: It is enabled only if you select Point to
Point. It corresponds to the MAC Address of the Wireless Bridge of
the Remote LAN.
3-14 User Manual
Authorized MAC Address – For security reasons the Access Point
has the ability to associate with authorized MAC Address stations, if the
authorization Table option is enabled. Thus, under the Authorized MAC
Address option you may press the following buttons.
The “Load file” button in order to load a file with the MAC Address
that can be associated with the Access Point (Authorized MAC
Address).
The “Download” button in order to download the Authorized MAC
Address to the Access Point.
The “Get” button in order to get from the Access Point the
Authorized MAC Addresses.
Setup->Enable SNMP Traps
Enable SNMP traps –
Configuring 3-15
using this submenu you can either enable or disable SNMP traps,
which are messages displayed in the right bottom corner of the main
window indicating that an action related to the AP took place.
Permitted messages are: Trap association -- This trap message is
sent when a Station’s association request is received from the AP –
Bridge.
Trap association: Indicates the reception of an association request
packet and the sender Station’s successful association with the
Wireless Bridge.
Trap Disassociation: This trap message is sent when
disassociation notification packet is received from a station.
Trap Reset: This trap message is sent when the AP-Bridge resets.
Trap Setting IP Address with Ping: This trap message is sent when
the AP-Bridge IP address is sent with the transmission of a ping
message.
Trap Start UP: This trap message is sent when Bridge starts up.
Trap Failed To Erase Flash: This trap message is sent when
Bridge fails to erase flash.
Setup->Authorization
Authorization –
Using this submenu the Administrator can change the passwords
which referred to the community field for the User and the
Administrator Authority.
3-16 User Manual
Commands menu: Under this menu there are two submenus.
Commands->Reset device or Restore Default
Reset device –
You can reset the Access Point. This action takes place after a user
makes configuration changes in order to initiate the changes.
Restore Default –
You can restore the factory default values of the Access Point.
Info menu: Using this menu you can view a limited number of
statistics by choosing the “SNMP – Shot View” of the “Change
Mode” Software. There are the following submenus:
Info ->Wireless statistic or Ethernet statistics
Wireless statistics: This submenu reports the statistics concerning
the unit’s wireless activity. The meaning of the fields, concerning all the
statistics, is giving in the following table.
Configuring 3-17
Ethernet statistics: This submenu reports the statistics concerning
the unit’s Ethernet port activity. The meaning of the fields, concerning
all the statistics is given in the following table.
Network menu: Provides information about the Network. Under
this menu there is only the Associated Station submenu.
Network ->Associated stations
Associated stations – Using this submenu you can view the MAC
Address of the Associated stations with the Access Point.
Window menu: Under this menu there are the following
submenus
Window ->Cascade or Tile
Cascade – All opened windows are arranged on the desktop in a
cascade fashion.
Tile – All open windows are visible on the desktop.
Help menu: Provides on line help about the application.
Chapter
4
Troubleshooting
Trobleshooting 4-1
This chapter gives tips on how to configure the communication
software. This chapter provides solutions to problems usually
encountered during the installation and operation of the Wireless
Network Access Point. Read the description below to solve your
problems.
4.1 Frequently Asked Questions
Can I run an application from a remote computer over the wireless
network
This will depend on whether or not the application is designed to be
used over a network. Consult the application’s user guide to determine
if it supports operation over a network.
Can, I play computer games with other members of the cordless
network
Yes, as long as the game supports multiple plays over a LAN (local
area network).Refer to the game’s user guide for more information.
What is the IEEE 802.11b standard
The IEEE 802.11b Wireless LAN standards subcommittee, which is
formulating a standard for the industry. The objective is to enable
wireless LAN hardware from different manufactures to communicate.
What IEEE 802.11 feature are supported
4-2 User Manual
The product supports the following IEEE 802.11 functions:
CSMA/CA plus Acknowledge protocol
Multi-Channel Roaming
Automatic Rate Selection
RTS/CTS feature
Fragmentation
Power Management
What is Ad-hoc
An Ad-hoc integrated wireless LAN is a group of computers, each with
a WLAN adapter, Connected as an independent wireless LAN. Ad hoc
wireless LAN is applicable at a departmental scale for a branch or
SOHO operation.
What is Infrastructure
An integrated wireless and wireless and wired LAN is called an
Infrastructure configuration. Infrastructure is applicable to enterprise
scale for wireless access to central database, or wireless application
for mobile workers.
What is Roaming
Roaming is the ability of a portable computer user to communicate
continuously while moving freely throughout an area greater than that
covered by a single Wireless Network Access Point. Before using the
roaming function, the workstation must make sure that it is the same
channel number with the Wireless Network Access Point of dedicated
coverage area.
Troubleshooting 4-3
To achieve true seamless connectivity, the wireless LAN must
incorporate a number of different functions. Each node and Wireless
Network Access Point, for example, must always acknowledge receipt
of each message. Each node must maintain contact with the wireless
network even when not actually transmitting data. Achieving these
functions simultaneously requires a dynamic RF networking technology
that links Wireless Network Access Points and nodes. In such a
system, the user’s end node undertakes a search for the best possible
access to the system. First, it evaluates such factors as signal strength
and quality, as well as the message load currently being carried by
each Wireless Network Access Point and the distance of each Wireless
Network Access Point to the wired backbone. Based on that
information, the node next selects the right Wireless Network Access
Points and registers its address. Communications between end node
and host computer can then transmitted up and down the backbone.
As the user moves on, the end nodes RF transmitter regularly checks
the system to determine whether it is in touch with the original or
Wireless Network Access Point whether it should seek a new one.
When a node no longer receives acknowledgment from its original
Wireless Network Access Point, it undertakes a new search. Upon
finding a new Wireless Network Access Point, it then re-registers, and
the communication process continues.
What is BSS ID
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers
in a BSS must be configured with the same BSS ID.
What is ESS ID
An Infrastructure configuration could also support roaming capability
for mobile workers. More than one BSS can be configured as an
Extended Service Set (ESS).Users within an ESS could Roam freely
between BSSs while served as a continuous connection to the network
wireless stations and Wireless Network Access Points within an ESS
must be configured with the same ESS ID and the same radio channel.
What is ISM band
4-4 User Manual
The FCC and their counterpart outside of the U.S. have set aside
bandwidth for unlicensed use in the ISM (Industrial, Scientific and
Medical) band. Spectrum in the Vicinity of 2.4 GHz, in particular, is
being made available worldwide. This presents a truly revolutionary
opportunity to place convenient high speed wireless capabilities in the
hands of users around the globe.
What is Spread Spectrum
Spread Spectrum technology is a wideband radio frequency technique
developed by the military for use in reliable, secure, mission-critical
communication systems. It is designed to trade off bandwidth efficiency
for reliability, integrity, and security. In other words, more bandwidth is
consumed than in the case of narrowband transmission , but the trade
off produces a signal that is, in effect, louder and thus easier to detect,
provided that the receiver knows the parameters of the
spread-spectrum signal being broadcast. If a receiver is not tuned to
the right frequency, a spread –spectrum signal looks like background
noise. There are two main alternatives, Direct Sequence Spread
Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
What is DSSSWhat is FHSSAnd what are their differences
Frequency-hopping spread-spectrum (FHSS) uses a narrowband
carrier that changes frequency in a pattern that is known to both
transmitter and receiver. Properly synchronized, the net effect is to
maintain a single logical channel. To an unintended receiver, FHSS
appears to be short-duration impulse noise. Direct-sequence
spread-spectrum (DSSS) generates a redundant bit pattern for each bit
to be transmitted.This bit pattern is called a chip (or chipping code). The
longer the chip, the greater the probability that the original data can be
recovered. Even if one or more bits in the chip are damaged during
transmission, statistical techniques embedded in the radio can recover
the original data without-the need for retransmission. To an unintended
receiver, DSSS appears as low power wideband noise and is rejected
(ignored) by most narrowband receivers.
Would the information be intercepted while transmitting on air
Troubleshooting 4-5
WLAN features two-fold protection in security. On the hardware side,
as with Direct Sequence Spread Spectrum technology, it has the
inherent security feature of scrambling. On the software side, WLAN
series offer the encryption function (WEP) to enhance security and
Access Control. Users can set it up depending upon their needs.
Can Wireless products support printer sharing
Wireless products perform the same function as LAN products.
Therefore, Wireless products can work with Netware, Windows
NT/2000, or other LAN operating systems to support printer or file
sharing.
What is WEP
WEP is Wired Equivalent Privacy, a data privacy mechanism based on
a 40 bit shared key algorithm, as described in the IEEE 802 .11
standard.
Chapter
5
Appendix
Appendix 5-1
MAC Address
The MAC Address of the AP. Unique 48-bit, hard-coded Media Access
Control address known as the station identifier.
Regulatory domain
You need to select the Regulation Domain among the following
options, FCC, ETSI, SPAIN, DOC, SPAIN, FRANCE and MKK.
Ethernet IP Address
The IP Address of the AP. Network-assigned Internet protocol address
of the Access Point.
Ethernet Subnet Mask
The Ethernet station and the Access Point must be on the same
subnet. The IP address for the Access Point must correspond to the
Subnet Mask. Subnet Mask consists of four sets of three digits that
divides a network into subnetworks.
ESSID
Select the ESSID to be used. The ESSID (up to 32 printable ASCII
characters) of the unit is a string used to identify a WLAN. The ID
prevents the unintentional merging of two co-located WLANs.
ESSID Length
The length of the ESSID (number of characters).
5-2 User Manual
Auto Rate Fall Back
Select Enable or Disable. When this is enabled the transmission rate is
defined by the past transmission status.
Wireless Channel
Select the channel to be used. The channels differ from country to
country. There are 14 channels available.
WEP Key
The WEP key if the WEP option is enabled in order to activate WEP
encryption for transmissions between the stations and the Access
Point.
WEP Type
The Wired Equivalent Privacy Algorithm (64 or 128 bits)
Wireless Fragmentation Threshold
The size at which packets will be fragmented . Choose a setting within
a range of 256 to 2346 bytes. This is the option for the Fragmentation
Threshold activation.
Wireless RTS Threshold
Minimum packet size to require an RTS (Request To Send). For
packets smaller than this threshold, an RTS is not sent and the packet
is transmitted directly to the WLAN. This is the option for the RTS
Threshold activation.
WEP Keys#1-#4-
The default key that will be used. May be edited only if WEP type is 64
bits.
Preamble Type
Appendix 5-3
Select Short or Long Preamble Type. Preamble is the first sub field of
PPDU, which is the appropriate frame format for transmission to PHY
(Physical layer).There are two options, Short Preamble and Long
Preamble. The Short Preamble option improves throughput
performance.
Authentication Type
Select Open System or Shared Key Authentication Type
Open System- With this setting any station in the WLAN can associate
with an Access Point and receive and transmit data (null
authentication).
Shared Key- With this setting only stations using a shared key
encryption identified by the Access Point are allowed to associate with
it.
Both- With this setting stations communicate with or without data
encryption.
Operational Rate Set
By default the unit adaptively selects the highest possible ate for
transmission. In case of obstacles or interference, the system will step
down. Select the basic rates to be used among the following options 1 -
2 (Mpbs), 1 - 2 - 5.5 - 11 (Mbps). Select the Operational Rate set
among the following options, 82 84 8B 96 (1 – 2 - 5.5 - 11 Mbps) or 82
84 0B 16 (1 - 2 Mbps).
Beacon Period
Set the Beacon Period parameter, which specifies the duration
between the range 20-1000 with a typical value of 100.
DTIM
Set the DTIM period. Determines at which interval the AP will send its
broadcast traffic. Default value is 4 beacons.
5-4 User Manual
Receive Antenna
Set the Receive Antenna among the following options Left, Right or
Diversity, to determine which antennas are used for reception.
Transmit Antenna
Set the Transmit Antenna among the following options Left, Right or
Diversity, to determine which antennas are used for transmission.
Operational Mode
Set one of the following operational modes on the Access Point
Access Point
Access Point Client
Wireless Bridge
User Community
Indicates the user’s password. The default password is “public
User Access
Indicates the user’s access rights. The user can only read and not set
or change the AP’s parameters.
Administrator Community
Indicates the administrator’s password. The default password is
public”.
Administrator Access
Indicates the Administrator’s access rights. The administrator can read
and also set or save changes to the AP’s parameters.
Appendix 5-5
Manufacturer Community
Indicates the manufacturer’s password.
Manufacturer Access
Indicates the manufacturer’s access rights. The manufacturer can read
and set or save changes to the AP’s parameters. Also can view or
modify the Hardware Configuration.
Gateway IP Address
Network Gateway
IP Filtering
Enable/Disable the possibility to allow only IP protocol packets to pass
through the WLAN and any other protocol packets filtered out.
DHCP client
Enable/Disable automatic IP address assignment by the DHCP server
Primary Port: Determines the Access Point’s MAC and IP Address.
Primary Port
The interface which determines the DHCP server ( Ethernet Port/
Wireless Port).
Authorization Algorithm
Enable/Disable the association with authorized MAC Addresses
stations.
SNMP traps
Enabled/Disabled SNMP traps, which are the messages indicating the
actions related to the AP that have taken place.
5-6 User Manual
Preferred BSSID
Remote MAC Address for connection, in Access Point Client or
Wireless Bridge Operational modes.
WEP 128 keys #1-#4
The default key that will be used. May be edited if WEP type is 128 bits.
ESSID: It is an ASCII string up to 21 characters used to identify a
WLAN that prevents the unintentional merging of two co-located
WLANs. The ESSID value must be the same in all stations and Access
point in the extended WLAN. Select the ESSID to be used.
Channel: There are 14 channels available. The channels differ from
country to country. Select the channel to be used.
Fragmentation threshold: The size at which packets will be
fragmented. Choose a setting within a range of 256 to 2346 bytes.
RTS Threshold: Minimum packet size to require an RTS (Request To
Send). For packets smaller than this threshold, an RTS is not sent and
the packet is transmitted directly to the WLAN. This is the option for the
RTS Threshold activation.
Authentication Type: Select Open System, Shared Key, or Both
Open System: With this setting any station in the WLAN can
associate with an Access Point and receive and transmitted data
(null authentication).
Shared Key: With this setting only stations using a shared key
encryption identified by the Access Point are allowed to associate
with it.
Both: with this setting stations communicate with the Access
Point either with or without data encryption.
Appendix 5-7
Preamble Type (Short/Long): Preamble is the first sub field of PPDU,
which is the appropriate frame format for transmission to PHY (Physical
layer). There are two options, Short Preamble and Long Preamble. The
Short Preamble option improves throughput performance
Rate: By default the unit adoptively selects the highest possible rate for
transmission. Select the basic rates to be used among the following
options 1-2-5.5-11 (Mbps).
Auto Rate Fall Back: When this is enabled the transmission rate is the
optimum rate. In case of obstacles or interference, the system will
automatically fall back.
Regulatory Domain: The value of this field is already set and cannot
be modified.

Navigation menu