SendFar Technology OAB-04004 Wireless Access Bridge User Manual UserMan QA5 OAB 04004

SendFar Technology Co., Ltd. Wireless Access Bridge UserMan QA5 OAB 04004

User Manual

SF-3000IEEE 802.11b Outdoor Wireless Client BridgeUser ManualFebruary 23, 2004Version 1.01Before operating the unit, please read this manual thoroughly, andretain it for future reference.Version 1.01 i■  ContentsCHAPTER 1. INTRODUCTION .................................................................. 11.1 INTRODUCING THE SF-3000 ...................................................................... 11.2 PRODUCT FEATURES ................................................................................. 11.3 PACKAGE CONTENTS................................................................................. 11.4 SYSTEM REQUIREMENTS ........................................................................... 11.5 INLINE POWER INJECTOR (POE) ................................................................ 2CHAPTER 2. INSTALLATION AND BASIC CONFIGURATION ......... 32.1 BEFORE YOU START.................................................................................. 32.2 LOCATE THE SF-3000 AND INLINE POWER INJECTOR PORTS .................... 42.3 PREPARING INSTALLATION........................................................................ 62.4 BASIC CONFIGURATION............................................................................. 72.4.1 What you need to know.................................................................... 72.4.2 Basic Configuration Steps ................................................................ 72.4.3 Logging into the Web Interface........................................................ 82.4.4 Set Operating Mode, IP Address, Subnet Mask, Default Route IP,DNS Server IP of SF-3000112.4.5 Set Wireless Encryption for Wireless Interface ............................. 132.4.6 Change Supervisor Account & Password....................................... 132.4.7 Upgrade the Firmware.................................................................... 142.4.8 Back-up the SF-3000’s Configuration Files................................... 18CHAPTER 3. NETWORK TOPOLOGIES ............................................... 203.1 WIRELESS CLIENT BRIDGE-TO-CENTRAL WIRELESS BRIDGE.................. 213.2 WIRELESS CLIENT ROUTER-TO-CENTRAL WIRELESS BRIDGE................. 223.3 WIRELESS CLIENT BRIDGE-TO-CENTRAL WIRELESS ROUTER ................. 233.4 WIRELESS CLIENT ROUTER-TO-CENTRAL WIRELESS ROUTER ................ 24CHAPTER 4. NETWORK PARAMETERS .............................................. 264.1 IP CONFIGURATION................................................................................. 264.2 VIRTUAL SERVER .................................................................................... 274.3 CONFIGURE SNMP.................................................................................. 304.3.1 Configure Community Pool ........................................................... 304.3.2 Configure Trap Host Pool .............................................................. 324.4 CONFIGURE WIRELESS RELATED PARAMETERS ....................................... 344.5 SECURITY................................................................................................ 374.5.1 MAC based Access Control ........................................................... 374.6 UTILITY................................................................................................... 38
Version 1.01 ii4.6.1 Software Upgrade........................................................................... 384.6.2 Administration................................................................................ 39CHAPTER 5. MONITOR INFORMATION ............................................. 405.1 SYSTEM INFORMATION............................................................................ 405.2 STATISTIC INFORMATION ........................................................................ 425.3 WIRELESS LINK INFORMATION ............................................................... 43CHAPTER 6. SPECIFICATIONS .............................................................. 446.1 HARDWARE SPECIFICATIONS................................................................... 446.2 SOFTWARE SPECIFICATIONS .................................................................... 45CHAPTER 7. DEFAULT SETTINGS ........................................................ 477.1 GENERAL CONFIGURATION ..................................................................... 477.1.1 System ............................................................................................ 477.1.2 Virtual Server ................................................................................. 477.1.3 SNMP ............................................................................................. 487.1.3.1 Table of SNMP Community Pool .............................................. 487.1.3.2 Table of SNMP Trap Community Host Pool ............................. 487.1.4 Wireless LAN................................................................................. 497.2 UTILITY................................................................................................... 507.2.1 Software Upgrade........................................................................... 507.2.2 Administration................................................................................ 50CHAPTER 8. REGULATORY COMPLIANCE INFORMATION ........ 51Version 1.01 1Chapter 1. Introduction1.1  Introducing the SF-3000The SF-3000 is a fully interoperable with IEEE 802.11b compliant OutdoorWireless Last-mile product. The SF-3000 operates in remote bridge mode,and connects SendFar RB-8110 Outdoor Wireless Router Bridge toconstruct point-to-point as well as point-to-multipoint topologies, formaximum flexibility in configuring building-to-building networks to WISP.1.2 Product Features9  Outdoor enclosure in compliance with IP679  RF transmit power 100mW (20dBm) with -85dBm Rx sensitivity@ 11Mbps data rate9  Embedded 9dBi patch directional antenna9  Support 24VDC 0.8A Power-over-Ethernet9  NAT/NAPT and Virtual Server Mapping support9  MIB-II and Private MIB support9  MAC address based access control1.3 Package ContentsThe product package contains the following items.1.  One (1) SF-3000 Outdoor Wireless Client Bridge unit2.  One (1) 100~240VAC, 50~60Hz AC/DC adapter with wall-mount plug and DC plug power cord3.  One (1) 24VDC, 830mA Inline Power Injector (PoE)4.  One (1) 30m RJ-45 CAT-5 Ethernet cable5.  One (1) 1.8m RS-232 null modem console cable6.  One (1) 1.8m grounding wire7.  One (1) User manual CD-disc8.  One (1) wall/mast mounting kit, including one (1) band clamp1.4 System RequirementsInstallation of the Outdoor Wireless Client Bridge requires the following:
Version 1.01 21.  A Windows-based PC/AT compatible computer or Ethernetdata device with an available RJ-45 Ethernet port to run theconfiguration program or with TCP/IP connection to theEthernet network.2.  A 10/100Base-T Ethernet RJ-45 Ethernet cable is connected toEthernet network.3.  A RS-232 consol port cable is connected to PC/AT compatiblecomputer.4.  An AC power outlet (100~240V, 50~60Hz) supplies the power.1.5  Inline Power Injector (PoE)The SF-3000 is equipped with an Inline Power Injector module. The InlinePower Injector (PoE) delivers both data and power to SF-3000 unit via asignal Ethernet cable, and gives the following benefits to improve theperformance vs. installation cost ratio.1.  This works great in areas where you may not have powerand/or Ethernet easily accessible, like house roof.2.  This also allows you to place the SF-3000 unit closer to theantenna, more easily thus reducing signal loss over antennacabling.3.  Ethernet signal travels well over CAT 5 cable but 2.4GHzsignal doesn't do as well over antenna cabling.4.  Ethernet cabling is much cheaper than Antenna cabling.Version 1.01 3Chapter 2. Installation and Basic ConfigurationThis chapter describes the procedures of installing the SF-3000.2.1  Before You StartAfter unpacking the system, make sure the following items are present andin good condition.1.  SF-3000 Outdoor Wireless Client Bridge unit2.  AC/DC adapter 100~240VAC, 50~60Hz with wall-mount plugand DC plug power cord3.  Inline Power Injector (PoE) 24VDC, 830mA4.  RJ-45 CAT-5 Ethernet cable 30m5.  RS-232 null modem console cable 1.8m6.  Grounding wire 1.8m7.  User manual CD-disc8.  Wall/mast mounting kit, including one (1) band clamp                                  23457861
Version 1.01 42.2  Locate the SF-3000 and Inline Power InjectorPorts Interface on the SF-3000 Unit9 Ethernet Port 1 for connecting the 30m RJ-45 CAT-5 Ethernetcable.9 RS-232 Console Port 2 for connecting the 1.8m RS-232 nullmodem console cable. Interface on the Inline Power Injector9 Data Input Port 3 for connecting cross-over Ethernet Cable toPC or straight Ethernet cable to Hub Switch Router.9  110~240VAC, 50~60Hz AC/DC power adapter DC Input Port49 Power & Data Output Port 5 for connecting the 30m RJ-45CAT-5 Ethernet Cable.9 Grounding Port 6.NOTE: The cross-over or straight type Ethernet cable is not provided in SF-3000 shipping package as an accessory. User can find one fromcomputer store in accordance with the length required for indoordeployment. 312654Version 1.01 5 Mount SF-3000 on A Wall/PoleThe SF-3000 can be mounted on the wall, you can use the Wall Mount kitto mount the SF-3000 as shown in Figure 2.2.1.Figure 2.2.1You can also mount the SF-3000 to the mast as shown in Figure 2.2.2.Figure 2.2.2
Version 1.01 62.3 Preparing InstallationBefore installing SF-3000 for the outdoor application in a hard-to-reachlocation, we recommend to configure and test all the devices first.For configuring the SF-3000, please follow the quick steps below to powerup the SF-3000.Step 1 Attach the 1.8m RS-232 null modem console cable to the ConsolePort on the SF-3000 unit (refer to page 4), and the other end (DB9female type) to a terminal or a PC running a terminal emulationprogram.Step 2 Plug the DC plug of the AC/DC power adapter into the DC InputPort of Inline Power Injector and the wall-mount plug into a poweroutlet or power strip (refer to page 4). The Power LED on the InlinePower Injector will light up.Step 3 Run the cross-over type uplink Ethernet cable from Data InputPort (refer topage 4) to the Ethernet port on a PC.Step 4Step 5Step 2Step 3Step 1:Console PortConnectionVersion 1.01 7NOTE: This connection is required for setting up initial configurationinformation. After configuration is completed, the RS-232 nullmodem console cable shall be removed, and run a cross-overEthernet cable from Data Input Port to PC, or a straight Ethernetcable to LAN connection, e.g. Hub.Step 5 Attach one straight Ethernet cable to the Power & Data OutputPort on the Inline Power Injector(refer to page 5).Step 6  Plug the other end of the straight Ethernet cable to the EthernetPort (refer to page 5) on the SF-300.When the SF-3000 receives power over the Ethernet cable, the SF-3000will start its boot sequence and the Active LED on the Inline Power Injectorwill light up.You can configure the SF-3000 via HTML browser, such as MicrosoftInternet Explorer or Netscape Navigator from a remote host or PC.2.4 Basic Configuration2.4.1  What you need to knowThe SF-3000 can be configured into two operation roles, includingWireless Client Bridge and Wireless Client Router.The SF-3000 is shipped with default configuration to function as a clientbridge between an Ethernet and Wireless network by attaching SF-3000 tothe wired LAN simply. If user would configure SF-3000, please refer to thefollowing procedures.2.4.2  Basic Configuration StepsThis section describes a five-step configuration procedure to setup SF-3000 workable upon your topology requirement.Step 1 Select an operation mode for SF-3000 on the web page “/GeneralConfig/System/”, and click FINISH to refresh this page.
Version 1.01 8Step 2 Modify the factory-default parameters on the web page “/GeneralConfig/System/”, and click FINISH to save the changes.Step 3 Modify the factory-default parameters on the web page “/GeneralConfig/Wireless/”, and click FINISH to save the changes.Step 4 (Optional) Modify other parameters on the web page “/GeneralConfig/”, and click FINISH to save the changes.Step 5 Move to page “/Utility/Administration/”, select the            Savethen Restart and then click FINISH to take effect on the previousconfiguration changes.2.4.3  Logging into the Web InterfaceThe SF-3000 supports access to the configuration system through the useof an HTTP Interface. Web ConfigurationBefore configuring SF-3000, user needs to know the IP Address assignedto the unit. When shipped from the factory, the IP Address 192.168.5.99was assigned to the SF-3000 by default. To start a web connection, usehttp://192.168.2.1 Identify the IP Address assigned to the unitHowever, user may change the IP Address later and cannot connect theunit by using the default IP Address. In this case, it is a must to identify theSF-3000 current IP Address before configuring. To identify the IP Address,user can use the serial port (refer to page 4) to gain access of the currentnetwork status.To start a Serial Port connection by following the steps below.Step 1 Attach the RS-232 null modem console cable (refer to page 4 andpage 6) to the RS-232 Console Port on SF-3000. Connect theother end to a terminal or a PC running a terminal emulationprogram.Step 2 Set the terminal to 115200 baud rate, None Parity, 8 data bits, 1Stop bit, and ANSI compatible.Version 1.01 9Step 3 Run a terminal emulation program on PC, such as HyperTerminal, and set the following connection properties.Step 3.1 Click the Start icon > Program > Accessories >Communication > Terminal.Step 3.2 Create a new connection file, and select a Com Port<COM1, COM2, etc., depending on PC> with115200bps / 8-bits / 1-stop.Step 3.3 Click the properties icon in the Tool Bar > setting >select Emulation terminal VT100 > ok.Step 4 Reboot SF-3000.Step 5 When the SF-3000 is powered up, the “Current Network Status”will be displayed as shown below. Web Access ProceduresOnce you identify the IP Address assigned to SF-3000, use web browser toconfigure SF-3000 through the HTTP Interface. The following procedureexplains how to configure each item.Step 1 Open your browser and enter the IP Address
Version 1.01 10Step 2 Press <ENTER> key and the SF-3000 Login screen appears asshown below.Step 3 Enter “root” in the User Name and the Password fields, and clickOK to enter the web configuration user interface screen as shownbelow. Web Configuration StructureThe web configuration user interface is grouped into a tree structure, andcontains the following settings or information.Version 1.01 11▽ General Configuration● System● TCP/IP- Virtual Server- SNMP● Wireless● Security- MAC Filter▽ Running Status● System Info● Statistic Info● Wireless Link Info▽ Utility● Software Upgrade● AdministrationMove through the tree by clicking on an icon to expand or collapse the tree.The nodes on the tree represent web pages that allow viewing andmodifying the parameters.2.4.4  Set Operating Mode, IP Address, Subnet Mask,Default Route IP, DNS Server IP of SF-3000 Operation ModeWhen setting up SF-3000, you have to decide which Operation Mode inwhich SF-3000 will function. This option is available in the “/GeneralConfig/System/” page as shown below.
Version 1.01 12 Host InformationThe Host Name is not an essential setting, but it helps to identify the devicein network.  Use this setting to assign a name to the device. Bridge IP Address InformationUse this setting to assign or change the SF-3000 IP address. Bridge Subnet MaskEnter an IP subnet mask to identify the sub network so the IP address canbe recognized on the LAN. Default Route IPEnter the default Gateway IP Address. DNS Server IPEnter the Primary/Secondary DNS Server IP Address, and click FINISH atthe bottom of this page to complete the modification of this page.Version 1.01 132.4.5  Set Wireless Encryption for Wireless InterfaceThe SF-3000 supports 64-bit and 128-bit WEP encryption.For 64-bit WEP encryption, an encryption key is 10 hexadecimal characters(0-9 and A-F) or 5 ASCII characters.For 128-bit WEP encryption, an encryption key is 26 hexadecimalcharacters or 13 ASCII characters.Modify the WEP encryption parameters on the web page “/GeneralConfig/Woreless/”. Enter 1~15 characters into the WEP Key field, andclick KeyGen to generate the WEP64 or WEP128 key patterns.2.4.6  Change Supervisor Account & PasswordEnter the Utility > Administration page. The figure below shows theUtility/ Administration page. Supervisor AccountChange the supervisor’s user name and password in the SupervisorAccount field, and click FINISH to take effect on the previous configurationchanges.
Version 1.01 14 Apply the New SettingsStep 1 Enter the Utility > Administration page, select the Save thenRestart to apply the new configuration settings.Step 2 Click FINISH to take effect on the previous configuration changes.Hint: It takes about 10 seconds, to complete the restart process.2.4.7  Upgrade the Firmware Setup your TFTP ServerThe Trivial File Transfer Protocol (TFTP) Server allows you to transfer filesacross a network. You can download the firmware files for SF-3000upgrades.After the TFTP Server is installed, make sure you have the proper TFTPServer IP address, the proper SF-3000 firmware files, and the TFTP Serveris operational. Update the Firmware using the TFTP methodStep 1 Enter the Utility > Software Upgrade page as shown in the figurebelow, and can use TFTP to upgrade SF-3000. Here, user mustspecify the TFTP server IP and select which file you want toupgrade it (Program image, Web image), then click OK button tostart the TFTP upgrade process.Step 2 If the upgrade process is success, the SF-3000 will apply the newsettings and start rebooting right away.Hint: You must set up a TFTP Server and this server must contain thelatest new image files.Version 1.01 15 Upgrade the Firmware using RS-232 consolePlease refer to Provision 2.4.3 that introduces how to use RS-232 consoleport. Identify the IP Address assigned to the unit.Step 1 If the connection is normal, when the SF-3000 is powered up, the“Current Network Status” will be displayed as shown below.
Version 1.01 16Step 2 Press <Esc> keystroke to reboot the SF-3000. Press <x> keyduring the boot process, and it will display prompt characterNetARM> as the figure shown in the next page.Step 3 Press “h” keystroke, it will display related commands as the figureshown below.Version 1.01 17Step 4 Select “F -- upgrade Flash memory” and it will display upgradeitems for selection as the figure shown below.Step 5 Select “3: SOHO” and select “4: WEBIMG” to update the firmwarefiles one by one.Step 6 While the window starts to display “C” character continuously, clickTransfer and select the new firmware files <soho.bin> file, press“OK” to start to transfer file to SF-3000.Step 7 Select “4” to upgrade WEBIMG file. The procedures are the samewith upgrading SOHO file (go back to step 5), but should select<pfs.img> file correctly for WEBIMG file upgrade.Step 8 After the upgrade completes, remember to press “R” keystroke toreboot the system.Note: The default transfer protocol is using “Xmodem”, so please makesure you select correct protocol to download/upload files when youtry to upgrade the SF-3000’s firmware files.
Version 1.01 182.4.8  Back-up the SF-3000’s Configuration FilesAfter configuring SF-3000, user can back-up the configuration files. Usercan upload the latest back-up files and recover the SF-3000 configurationto the settings specified in the back-up files. Downloading Configuration FilesJust being the same with firmware upgrade procedures. After the promptcharacter NetARM> is displayed, select “S – Save image to file”, and thenselect “6: CONFIG” to back-up the SF-3000 configuration as the figureshown below. The back-up file will be saved as <CONFIG.IMG> file. Uploading Configuration FilesTo upload an configuration file to SF-3000, user should select “F --upgrade Flash memory” and then select “6: CONFIG”. While the windowstarts to display “C” character continuously, click Transfer and select thepreferred <CONFIG.IMG>, then press OK to start transferring file to SF-3000.Version 1.01 19Note: Remember to press “R” to reboot the system after you upload theconfiguration file to the SF-3000.
Version 1.01 20Chapter 3. Network TopologiesThis chapter describes several main types of installations implemented byusing the Outdoor Wireless System commonly. This is by no meansintended to be an exhaustive list of all possible configurations, but rathershows examples of some of the more common implementations. The SF-3000 can only be configured into Wireless Client Router/Bridge toaccomplish the broadband wireless point-to-point, point-to-multipointsystems with SendFar RB-8110 (as the figure shown below).The SF-3000 performs in either router or bridge mode. In a Point-to-Multipoint topology, all communication between network systems is donethrough a centralized agent. Among the Outdoor Wireless Router/Bridgeproducts, the centralized agent is Central Router or Central Bridge(SendFar RB-8110) and the individual network notes may be WirelessClient Router or Bridge (SendFar SF-3000).To show the available Point-to-Multipoint topologies, the following examplesare provided.1.  Wireless Client Bridge-to-Central Wireless Bridge2.  Wireless Client Router-to-Central Wireless Bridge3.  Wireless Client Bridge-to-Central Wireless Router4.  Wireless Client Router-to-Central Wireless RouterVersion 1.01 213.1  Wireless Client Bridge-to-Central WirelessBridgeStep 1 Set the Central Outdoor Unit *1 (hereinafter, “COU”) to perform abridge (bridge IP address: 192.168.2.1).Step 2 Set Wireless parameters on COU: Channel (1) and SSID(wireless)Step 3 Set the Remote Outdoor Unit *2 (hereinafter, “ROU”) to perform abridge (bridge IP address: 192.168.2.2).Step 4 Set Wireless parameters on ROU: Channel (1) and SSID(wireless), and these parameters must be the same with COU.Step 5 Left side subnet is transparent to the right side.Step 6 DHCP server assign IP address to PC1 and PC2Remarks:*1 COU refers to SendFar RB-8110 Outdoor Wireless Router Bridge*2 Both SendFar RB-8110 and SF-3000 could function the role of ROU
Version 1.01 223.2  Wireless Client Router-to-Central WirelessBridgeStep 1 Set the COU to perform a bridge (bridge IP address:192.168.2.1).Step 2 Set Wireless parameters on COU: Channel (1) and SSID(wireless).Step 3 Set the ROU to perform a Router (Wireless Interface IP:192.168.2.2, Ethernet Interface IP: 192.168.10.1). It is a must toenable NAT on Wireless Interface (default route is192.168.2.254).Step 4 Set Wireless parameters on ROU: Channel (1) and SSID(wireless), these parameters must same with COU.Step 5 Set the DHCP server service on the ROU and apply it on EthernetInterface.Step 6 The ROU assigns IP addresses to PC1 and PC2Version 1.01 233.3  Wireless Client Bridge-to-Central WirelessRouterStep 1 Set the COU to perform a Wireless Router (Wireless Interface IP:192.168.1.1, Ethernet Interface IP: 192.168.2.1). It is a must toenable NAT on Ethernet interface (default route: 192.168.2.254).Step 2 Set Wireless parameters on COU: Channel (1) and SSID(wireless)Step 3 Set the DHCP server service on the COU and apply it on WirelessInterface.Step 4 Set the ROU to perform a Bridge (Bridge Interface IP:192.168.1.2).Step 5 Set Wireless parameters on ROU: Channel (1) and SSID(wireless), and these parameters must be the same with the COU.Step 6 The COU assigns IP addresses to PC1 and PC2.Step 7 The operator can also disable NAT behavior on COU to make thetwo subnets transparent.
Version 1.01 243.4  Wireless Client Router-to-Central WirelessRouterStep 1 Set the COU to perform a Wireless Router (Wireless Interface IP:192.168.1.1, Ethernet Interface IP: 192.168.2.1, default route:192.168.2.254).Step 2 Set Wireless parameters on COU: Channel (1) and SSID(wireless).Step 3 Set the ROU to perform a Wireless Router (Wireless Interface IP:192.168.1.2, Ethernet Interface IP: 192.168.10.1, default route:192.168.1.1).Step 4 Set Wireless parameters on ROU: Channel (1) and SSID(wireless), and these parameters must be the same with COU.Step 5 Set the DHCP server service on the ROU and apply it on EthernetInterface.Step 6 The ROU assigns IP addresses to PC1 and PC2.The operator can also disable NAT behavior on COU and enable NATbehavior on ROU (enable NAT on Wireless Interface). In this case, anyoutgoing packets will transfer to 192.168.1.2.Version 1.01 25The operator can also enable NAT behavior on COU (enable NAT onEthernet interface) and enable NAT behavior on ROU (enable NAT onWireless Interface).
Version 1.01 26Chapter 4. Network Parameters4.1 IP ConfigurationThe IP Configuration method is different in each Operating Mode. Usercould refer to the following descriptions for details. Wireless Client BridgeStep 1 Select the Wireless Client Bridge mode, and enter the IP Addressmanually into the Bridge IP Address field.Step 2 Use Bridge IP Address setting to assign or change the bridge’s IPaddress.Step 3 Click FINISH at the bottom of this page to complete themodification of IP address. Wireless Client RouterIn this mode, user can assign a Wireless and Ethernet IP address to theSF-3000 manually.The NAPT function allows home users and small businesses to connecttheir network to the Internet cost-effectively and efficiently. User has toenable it to allow the subscribers to connect to the Internet in this mode.Click FINISH at the bottom of this page to complete the IP addressmodifications after enabling NAPT function.Version 1.01 274.2 Virtual ServerSometimes, the operator might expose the internal servers on the localintranet to the public Internet. For this, you must create the Virtual ServerMapping for these invisible internal servers.Step 1 Select the “/General Config/ TCP/IP/Virtual Server”, and then theVirtual Server screen appears. The figure below shows the currentvirtual server entry table. (The Virtual Server Mapping pool isempty as default)Step 2 Click Add, and the Virtual Server Entry Edit page appears as thefigure shown below.
Version 1.01 28Step 3 To edit the Virtual Server Entry, specify all the entry fields to allowInternet user to access the internal servers.9 Service Name. Alias name of this internal server, such asFTP.9 Protocol. Indicate which protocol (TCP/UDP) user wantsto translate from outside to internal server, such as TCP.9 Access Interface. Indicate the translation occurs on whichinterface (Wireless interface / Ethernet interface), such asEthernet.9 Public Access Port number. Indicate which socket port (1~ 65535) user wants to translate from outside to internalserver, such as 21.9 Virtual Server IP address. Specify the private IP addressof the internal server, such as 192.168.1.100.9 Virtual Server Port number. Specify the socket port (1 ~65535) of the internal server, such as 21.Version 1.01 29Step 4 Click OK. The Virtual Server Entry Table appears with the entrieslist.Step 5 To modify or delete a virtual server entry, click the select buttonbeside the entry index number and click Modify or Delete.Step 6 To add another entry to the Virtual Server Mapping Pool, repeatstep 1 through step 3.Step 7 When user has included all the entries preferred, click FINISH.
Version 1.01 304.3 Configure SNMPSelect the “/General Config/ TCP/IP/SNMP”, and the SNMP screenappears. The figure below shows the current SNMP community pool andtrap host pool.4.3.1  Configure Community PoolThe SNMP Community Pool has five entries.  1.  To modify the entry, click the select button beside the entryindex number and click Modify. The configuration pageappears as the figure shown below.Version 1.01 312.  Specify the Validity, Access Right and Community field.9 Validity. Select Enable or Disable to control thiscommunity.9 Access Right. Select a command from the pull down menufor this field.9 Community. Enter the password related the Access Rightin this field.3.  Click OK to refresh the current community pool.4.  To modify another community entry to the current communitypool, repeat step 1 through step 3.5.  When you have modified all the entries preferred, click FINISH.
Version 1.01 324.3.2  Configure Trap Host PoolThe Trap Host Pool has five entries.1.  To modify a entry, click the select button beside the entry indexnumber and click  Modify . The configuration page appears asfollowing figure.2.  Specify the Version, IP Address and Community field.9 Version. Select Disable, Version 1 or Version 2 to controlthis trap host.9 IP Address. Enter the Trap Host IP Address.9 Community. Enter the password in this field.3.  Click OK to refresh the current trap host pool.Version 1.01 334.  To modify another trap host entry to the current trap host pool,repeat step 1 through step 3.5.  When you have modified all the entries preferred, click FINISH.
Version 1.01 344.4  Configure Wireless related parametersStep 1 Select “/General Config/Wireless” and the Wireless LANinformation page appears as the figure shown below.Step 2 In the Wireless LAN information page, set the following parameterssuitable for your radio network.9 Channel (default parameter: 1)9 rts Threshold (default parameter: 1600)9 frag Threshold (default parameter: 1600)9 SSID (default parameter: wireless)9 Station Name (default parameter: ap)Step 3 Click radio button to disable WEP or enable 64/128 bit WEPservices (default parameter: disable). If WEP is enabled, inputcorresponded Default Key index and WEP Key and then clickKeyGen to generate the WEP64 & WEP128 key patterns.Step 4 Click FINISH at the bottom of this page to complete themodification.Version 1.01 35The following gives more info about the parameters set in the Wireless LANinformation page to users. rts ThresholdThe setting determines the packet size, ranging from 0 to 2339 bytes, atwhich the bridge issues a request to send (RTS) before sending the packet.A low RTS Threshold setting can be useful in areas where many clientdevices are associating with the access point, or in areas where the clientsare far apart and can detect only the bridge and not each other. frag ThresholdThe setting determines the size, ranging from 256 to 2338 bytes, at whichpackets are fragmented (sent as several pieces instead of as one block).Use a low setting in areas where communication is poor or where there is agreat deal of radio interference. SSIDThe Service Set ID (SSID) can be any alphanumeric, case-sensitive entryfrom 2 to 32 characters long. This string functions as a password to join theradio network. Hide SSIDUse this setting to decide whether devices that do not specify an SSID areallowed to associate with the access point or not. With “Yes” selected, theSSID used by other devices must match exactly the AP’s SSID. Deny AnyUse this setting to decide whether devices that specify the well defineSSID keyword ‘ANY’ or ‘any’ are allowed to associate with the accesspoint or not. With “Yes” selected, the SSID ‘ANY’ or ‘any’ used by otherdevices are not allowed to associate with the access point Station NameEnter any alphanumeric, case-sensitive entry. WEP KeyEnter 1~15 characters for 64 and 128 bits WEP KEY encryption, and thenclick KeyGen to generate the WEP64 & WEP128 key patternsautomatically. WEPUser can Disable or enable 64/128 bit WEP services here.
Version 1.01 36 Default KeySelect an encryption key from the pull down menu. WEP64 Key1~4 & WEP128 Key1~4The keys in these fields can be generated automatically by KeyGenfunction. For 40-bit encryption, enter 10 hexadecimal digits; for 128-bitencryption, enter 26 hexadecimal digits. Hexadecimal digits include thenumbers 0 through 9 and the letters A through F. The 40-bit WEP keyscan contain any combination of 10 of these characters; the 128-bit WEPkeys can contain any combination of 26 of these characters. The letters arenot case-sensitive.Version 1.01 374.5 Security4.5.1  MAC based Access ControlClick General Config, select MAC Filter page, and choice the MAC Filterservices is Enable or Disable as the figure shown below.User can specify the MAC address of a wireless client station. All MACentries in the MAC address table are permitted to connect to the SF-3000.User can also click ADD, DELETE, MODIFY button to maintain this MACaddress table. After that, click FINISH at the bottom of this page tocomplete the modification of this page.
Version 1.01 384.6 Utility4.6.1 Software UpgradeStep 1 Click Utility, select Software Upgrade page as the figure shownbelow, and then use TFTP to upgrade AP. In the Utility – SoftwareUpgrade page, user must specify the TFTP server IP and selectby which file to upgrade (Program image, Web image), then clickOK button to start the TFTP upgrade process.Step 2 If the upgrade process is success, the AP will apply the newsettings and start rebooting right away.Hint: You must set up a TFTP server and this server must contain onelatest new image.Version 1.01 394.6.2 AdministrationStep 1 Click Utility, Administration. The following figure shows theUtility – Administration page.9 Supervisor Account. Change the supervisor’s user name& password in the Supervisor Account field, and ClickFINISH to take effect on the previous configurationchanges.9 Apply the New Settings. Click Utility, Administration,select the Save then Restart to apply the newconfiguration settings.Step 2 Click FINISH to take effect on the previous configuration changes.Hint: It takes about 10 seconds, to complete the restart process.
Version 1.01 40Chapter 5. Monitor InformationUser can find the system running status and other information on thiswindow. Click the Running Status link on the left window, use can choosewhich function that he wants to monitor.5.1 System InformationBy selecting “Running Status/System Info”, enter the SystemInformation page as the figure shown below.In this page, user can find the system information and most of the runningparameters. General System InformationThe following information can be found in this block.9 Product Model9 Host Name9 Software Version9  Build (Built by)9  Boot Code VersionVersion 1.01 419 Web Version9  AP Firmware version9 System Uptime    General System StatusThe following information can be found in this block.9 Operation Mode9  Interface IP/Net mask9  Brief wireless parametersIf the DHCP or PPPoE services is enabled, user can also see the relatedinformation here. Services InformationThis block shows whether the following services are enabled or disabled.9 NAPT9 SNMP9 MAC Filter9 WEP encryption.
Version 1.01 425.2 Statistic InformationBy selecting “Running Status/Statistic Info”, the figure below shows theStatistic of Interface page.In this page, user can find the packet statistic of each interface, Wirelessand Ethernet. This statistic table includes the following information.9 In Packets9 Out Packets9 In Bytes9 Out Bytes.Version 1.01 435.3  Wireless Link InformationThis item only displayed on ROU mode.By selecting “Running Status/Wireless Link Info”, the figure below showsthe Radio Link Information page.In this page, user can find the following information about the radio link.9 Link Quality9 Signal Strength9  Current used channel9  Current Tx Rate.
Version 1.01 44Chapter 6. Specifications6.1 Hardware Specifications GeneralRadio Data Rate 11, 5.5, 2 and 1 Mbps, Auto Fall-BackClient Interface 10/100Base-T EthernetRange(Open environment)300m @ 11.0Mbps400m @ 05.5Mbps500m @ 02.0Mbps800m @ 01.0MbpsRegulatory & SafetyCertificationsFCC Part 15EN 300 328-1EN 300 328-2EN 301 489-1EN 301 489-17EN 60950IP67DGTCompatibility Fully interoperable with IEEE802.11bcompliant productsPower Supply(AC/DC Power Adaptor)Input: 100~240V, 50~60HzOutput: 24V, 830mA Network InformationNetwork Architecture Infrastructure (via SendFar AP/RB-8110 AP or Bridge)Drivers Windows 95/98/ME/2000/NT 4.0Access Protocol CSMA/CARoaming IEEE802.11b compliantSecurity 64-/128-bit data encryption Radio SpecificationsFrequency Band 2.4 – 2.484 GHzRadio Type Direct Sequence Spread Spectrum(DSSS)Modulation CCK (11, 5.5Mbps)Version 1.01 45DQPSK (2Mbps)DBPSK (1Mbps)Operation Channels North America:11Japan:14Europe:13Spain:2France:4Transmit Power 10dBm (ETSI)19dBm (FCC)Antenna Embedded 9dBi patch antennaSensitivity @ FER=0.08 11.0 Mbps < -85dBm05.5 Mbps < -88dBm02.0 Mbps < -91dBm01.0 Mbps < -93dBm EnvironmentalTemperature Range Operating: 0 to 55℃Storage: -20 to 75℃Humidity (non-condensing) 5% to 95% typical Physical SpecificationsDimensions  138.7mm x 104.0mm x 38.0mmWeight 500g6.2 Software Specifications
Version 1.01 46Protocol TCP/IPNAT/NAPTDHCP ClientVirtual Server Mapping (NAT inbound server)802.1d Transparent BridgingSecurity 64-/128-bit WEP encryptionMAC address based access controlUser authentication in Web-based ManagerManagement Web-based ManagerTelnet configurationConsole (RS-232) configurationSNMP v1SNMP MIB-IIPrivate MIBFirmware upgrade TFTP (Trivial FTP)Xmodem, 1K XmodemZmodemVersion 1.01 47Chapter 7.  Default Settings7.1 General Configuration7.1.1 SystemParameter Description Default Value Host Name  Host name for the RB HWLAN Operation Mode 1.  Wireless Client Bridge2.  Wireless Client RouterWireless ClientBridgeBridge IP Address 192.168.2.1Bridge Subnet MaskFor Wireless Client Bridge withOperation Mode 255.255.255.0IP Address 192.168.1.1Wireless InterfaceAddress Subnet Mask 255.255.255.0NAPT Interface 1. Enable2. Disable Disable Default Route IP IP address of the gateway for default route when TCP/IP filtering192.168.2.254Primary DNS Server IP 192.168.2.254Second DNS Server IPIP addresses of the DNSServers of your Local ISP7.1.2 Virtual ServerParameter Description Default Value Service Name Specify the service for publicaccess NULL Protocol Select a protocol for publicaccess NULLInterface NULL Public Access Port Number NULLIP address NULL Virtual Server Port Number NULLNote: (Maximum Entry: 10, Maximum Port Number: 32767)
Version 1.01 487.1.3 SNMP7.1.3.1  Table of SNMP Community PoolParameter Description Default ValueIndex 1 EnableIndex 2 EnableIndex 3 DisableIndex 4 DisableIndex 5Validity Enable or disable the function of the corresponding community indexDisableIndex 1 ReadIndex 2 WriteIndex 3 ---Index 4 ---Index 5AccessRight Select the access right (Deny/Read/Write/Create) for SNMP Manager---Index 1 publicIndex 2 privateIndex 3 ---Index 4 ---Index 5Community Specify the type of community (public or private) for SNMP Manager---7.1.3.2  Table of SNMP Trap Community Host PoolParameter Description Default ValueIndex 1 Version1Index 2 Version2Index 3 ---Index 4 ---Index 5Version Select or disable the SNMP Version Version 1:  MIB1 Version 2:  MIB2---Index 1 192.168.2.100Index 2 192.168.2.100Index 3 ---Index 4 ---Index 5IP Address Specify the IP address of the SNMP Manager for SNMP Trap Report---Index 1 publicIndex 2 publicIndex 3 ---Index 4Community  Specify the type of community (public or private) for SNMP Manager---Version 1.01 49Index 5 ---7.1.4 Wireless LAN Parameter  Description Default Value RTS Threshold  Set RTS (Request To Send) threshold value 1600 Fragmentation Threshold Set fragmentation threshold value 1600 SSID Wireless LAN service area identifier of the RB (case sensitive)wireless Hide SSID  Yes or No No Deny ANY  Yes or No No Station Name  Show the name of the AP ap WEP Key Push the “KeyGen” button togenerate the WEP key patternsautomaticallywepkey WEP1. WEP1282. WEP643. DisableDisable Default Key Select a WEP key to encrypt each frame transmitted from the radio using one the of the 4 Keys from the Key Panel1 Key Panel When you use WEP to communicate with the other wireless clients, all the wireless devices in this network must have the same encryption key or pass phrase. Note: each key must consist of hex digits, it means that only digit 0 -9 and letters A-F are valid entries. If entered incorrectly, program will not write keys to a driver.7.2
Version 1.01 507.3 Utility7.3.1 Software UpgradeParameter Description Default Value TFTP Server IP Address Specify the IP address of the TFTP server to upgrade the firmware of  the RB192.168.2.100 Program Image soho.bin Upgrade Filename Web Image pfs.img7.3.2 AdministrationParameter Description Default Value Supervisor ID  Supervisor’s identity code root Supervisor Password  Supervisor’s password root Password Confirm  Confirm the password again rootVersion 1.01 51Chapter 8. Regulatory Compliance Information Radio Frequency Interference RequirementsThis device complies with Part 15 of FCC Rules and Canada RSS-210.Operation is subject to the following conditions:This device may not cause harmful interference.This device must accept any interference received, including interferencethat may cause undesired operation. Radiation Exposure StatementThis equipment complies with FCC radiation exposure limits set forth for anuncontrolled environment. This equipment should be installed and operatedwith minimum distance 20 cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with anyother antenna of transmitter. Interference StatementThis equipment has been tested and found to comply with the limits for aClass C digital device pursuant to Part 15 of the FCC Rules and Regulation.These limits are designed to provide reasonable protection against harmfulinterference in a residential installation. This equipment generates, uses,and can radiate radio frequency energy and, if not installed and used inaccordance with the instruction manual, may cause harmful interference tonearby TV’s, VCR’s, radio, computers, or other electronic devices. Tominimize or prevent such interference, this equipment should not be placedor operated near these devices. If interference is experienced, moving theequipment away from them will often reduce or eliminate the interference.However, there is no guarantee that interference will not occur in aparticular installation. If the equipment does cause harmful interference toradio or television reception, which can be determined by turning theequipment off and on, the user is encouraged to try to correct theinterference by one or more of the following measures:Re-orient or relocate the receiving antenna.Increase the separation between the equipment and receiver.Connect the equipment into an outlet on a circuit different from that whichthe receiver is connected.Consult the dealer or an experienced radio/TV technician for help.
Version 1.01 52 Professional InstallationPer the recommendation of the FCC, the installation of high gain directionalantenna to the system, which are intended to operated solely as a point-to-point system and whose total power exceeds +30dBm EIRP, requireprofessional installation. It is the responsibility of the installer and the enduser that the high power systems are operated strictly as a point-to-pointsystem.Systems operating as a point-to-multipoint system or use non directionalantennas cannot exceed +30dBm EIRP power requirement under anycircumstances and do not require professional installation. Information to UserThe user manual or instruction manual for an intentional or unintentionalradiator shall caution the user that changes or modifications not expresslyapproved by the party responsible for compliance could void the user’sauthority to operate the equipment. Manufacturer’s Declaration of ConformitySendFar Technology Co., Ltd.15Fl., No. 866-2, Chungjeng RoadJunghe, TaipeiTaiwan, R.O.C.+886 2 2228 7748Declares that the product:Date:November 18, 2003Brand Name:SendFar Technology Co., Ltd.Model Number:SF-3000Equipment Type:Wireless Access BridgeComplies with Part 15 Class C of the FCC rules. Operation is subjectto the following two conditions: (1) this device may not cause harmfulinterference, and (2) this device must accept any interferencereceived, including interference that may cause undesired operation.Version 1.01 53 European Community – CE NoticeMarking by the symbol:Indicates compliance with the essential requirements of Directive1999/5/EC. Such marking is indicative that this equipment meets orexceeds the following technical standards:9  EN 300 328-29  EN 301 489-19  EN 301 489-179 EN 60950Marking by the symbol:Indicates compliance with the essential requirements of R&TTE Directive99/5/EC, and the product is permitted to be used in the following ECcountries, including Germany, UK, The Netherlands, Belgium, Norway,
Version 1.01 54Sweden, Denmark, Finland, France, Italy, Spain, Austria, Iceland,Ireland, Portugal, Switzerland, Greece and Luxembourg. 中華民國交通部電信總局低功率射頻電機型式認證型式認證標籤式樣:依據交通部電信總局『低功率輻射性電機管理辦法』第十四條規定,經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。依據交通部電信總局『低功率輻射性電機管理辦法』第十七條規定,低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電信。低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。Federal Communication Commission Interference Statement  This equipment has been tested and found to comply with the limits for aClass B digital device, pursuant to Part 15 of the FCC Rules.  These limitsare designed to provide reasonable protection against harmful interferencein a residential installation.  This equipment generates, uses and canradiate radio frequency energy and, if not installed and used in accordancewith the instructions, may cause harmful interference to radiocommunications.  However, there is no guarantee that interference will notoccur in a particular installation.  If this equipment does cause harmfulinterference to radio or television reception, which can be determined byturning the equipment off and on, the user is encouraged to try to correctthe interference by one of the following measures:  - Reorient or relocate the receiving antenna.  - Increase the separation between the equipment and receiver.  - Connect the equipment into an outlet on a circuit different from that towhich the receiver is connected.  - Consult the dealer or an experienced radio/TV technician for help.This device complies with Part 15 of the FCC Rules. Operation is subject tothe following two conditions: (1) This device may not cause harmfulVersion 1.01 55interference, and (2) this device must accept any interference received,including interference that may cause undesired operation.FCC Caution: Any changes or modifications not expressly approved by theparty responsible for compliance could void the user's authority to operatethis equipment.IMPORTANT NOTE:FCC Radiation Exposure Statement: This equipment complies with FCCradiation exposure limits set forth for an uncontrolled environment. Thisequipment should be installed and operated with minimum distance 20cmbetween the radiator & your body.This transmitter must not be co-located or operating in conjunction with anyother antenna or transmitter.

Navigation menu