Winmate 1200 Access Point User Manual

WINMATE Communication INC. Access Point Users Manual

Users Manual

Download: Winmate 1200 Access Point User Manual
Mirror Download [FCC.gov]Winmate 1200 Access Point User Manual
Document ID246760
Application IDUSE4cMzI9vYHXkQ+eHrgLA==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize134.77kB (1684657 bits)
Date Submitted2002-06-03 00:00:00
Date Available2002-06-03 00:00:00
Creation Date2002-04-24 09:44:29
Producing SoftwareAcrobat Distiller 5.0 (Windows)
Document Lastmod2002-05-22 13:27:47
Document TitleMicrosoft Word - AP-WN1200 User Guide _user_ v0.7.1-letter
Document CreatorADOBEPS4.DRV Version 4.50
Document Author: kim

ACCESS POINT
User Guide
Access Point
ACCESS POINT
Table of Contents
1. INTRODUCTION ................................................................................ 1
1.1 PRODUCT FEATURES .............................................................................................1
1.2 NETWORK OVERVIEW ...........................................................................................2
1.2.1 Infrastructure Mode ......................................................................................2
1.2.2 Microcells and Roaming ...............................................................................3
1.3 NETWORK SERVICE SET IDENTIFICATION (SSID) OVERVIEW................................4
1.4 CHANNEL SERVICES OVERVIEW ............................................................................5
1.5 REQUIREMENT FOR A WIRELESS CONNECTION.......................................................5
2. INSTALLATION AP ............................................................................ 6
2.1 PACKAGE CONTENTS .............................................................................................6
2.2 NOTICE .................................................................................................................6
2.3 INSTALLATION DIAGRAM ......................................................................................6
2.4 PHYSICAL DESCRIPTION........................................................................................7
2.5 CONNECTING TO THE NETWORK ...........................................................................7
2.6 AP CONFIGURATION (INSTALL THE SNMP MANAGER) ........................................7
2.7 DEFAULT SETTING.................................................................................................8
3. SPECIFICATION ................................................................................. 9
3.1 HARDWARE SPECIFICATION ...................................................................................9
3.2 IEEE 802.11 FUNCTIONALITY SUPPORT .............................................................10
4. CONFIGURATION AP ...................................................................... 11
4.1 SETTING UP ACCESS POINTS IP ADDRESS ...........................................................11
5. INSTALLING SNMP MANAGER.................................................... 13
5.0.1 USING SNMP APPLICATION ............................................................................14
5.1 FILE MENU..........................................................................................................15
5.1.1 Connection to Access Point ........................................................................16
5.1.2 Find Access Point .......................................................................................17
5.2 SETUP MENU.......................................................................................................19
5.2.1 Bridge..........................................................................................................20
5.2.2 IP Configuration .........................................................................................21
ii
ACCESS POINT
5.2.3 Wireless LAN...............................................................................................22
5.2.4 Privacy Options ..........................................................................................23
5.2.5 Operational Settings ...................................................................................24
5.2.6 Advance Operational Setting ......................................................................26
5.2.7 Authorized MAC addresses.........................................................................29
5.2.8 SNMP Traps ................................................................................................30
5.2.9 Authorization ..............................................................................................31
5.3 COMMANDS MENU .............................................................................................32
5.4 INFORMATION MENU...........................................................................................33
5.4.1 Wireless Statistics........................................................................................34
5.4.2Ethernet Statistics ........................................................................................35
5.5 TRAP MENU ........................................................................................................36
5.6 NETWORK MENU ................................................................................................38
5.7 WINDOW MENU ..................................................................................................40
5.8 HELP MENU ........................................................................................................41
6. TUTORIAL ........................................................................................ 42
6.1 PACKET FRAGMENTATION ...................................................................................42
6.2 ENCRYPTION .......................................................................................................43
Authentication Type .............................................................................................44
How is encryption key generated?.......................................................................44
6.3 SUBNETTING .......................................................................................................45
7. TROUBLESHOOTING...................................................................... 46
7.1 CHECKING VALID IP ADDRESSES ........................................................................49
7.2 CONNECTION TROUBLESHOOTING ......................................................................50
7.3 RESETTING THE ACCESS POINT ...........................................................................51
7.4 ENCRYPTION TROUBLESHOOTING .......................................................................52
7.5 TROUBLESHOOTING CHECK TABLE .....................................................................53
8. FAQ..................................................................................................... 54
9. WLAN GLOSSARY........................................................................... 56
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE STATEMENT......... 60
iii
ACCESS POINT
Copyright © 2002 Manufacturer all rights reserved.
The information in this document is subject to change without notice. The statements,
configurations, technical data, and recommendations in this document are believed to be
accurate and reliable, but are presented without express or implied warranty. Users must
take full responsibility for their applications of any products specified in this document.
The information in this document is proprietary to Manufacturer.
Manufacturer reserves the right to make revisions to this publication without obligation to
notify any person or entity of any such changes.
Trademarks
Microsoft, Windows 98, Windows ME, Windows 2000, Windows XP are trademarks or
registered trademarks of Microsoft Corporation.
Atmel and Atmel logo are trademarks or registered trademarks of Atmel Corporation.
All other trademarks and registered trademarks are the property of their respective owner
iv
ACCESS POINT
1. Introduction
This user guide provides an overview of the Wireless LAN Technology and
instruction for using the Access Point. Actually, Wireless LAN is a flexible data
communication system implemented as an extension to, or as an alternative for, a
wired LAN within a building or campus. Using electromagnetic waves, WLANs
transmit and receive data over the air, minimizing the need for wired connections.
Overall, we hope this document is helpful to give users a Clear View on the Access
Point and a better understanding of WLAN Technology.
1.1 Product Features
Flexible and standards-based (IEEE802.11b) interoperability.
64/128bits WEP key encryption for security.
MAC address registration function for security.
Communication between the Ethernet LAN and the wireless LAN.
AppleTalk protocol compatible.
Automatic Rate Fallback.
Association, Re-association and Disassociation.
Support three Operational Modes (Access Point, AP Client, Wireless Bridge).
Support Simple Network Management Protocol (SNMP).
DHCP Client-Default Gateway.
IP Filtering.
ACCESS POINT
1.2 Network Overview
1.2.1 Infrastructure Mode
In an infrastructure network, the wireless device (such as Access Point) links the
WLAN to the wired network to offer users more mobilities in movement and
resources sharing within the network service area. It enables users to have freedom
from network cabling.
Figure 1 - Infrastructure mode
ACCESS POINT
1.2.2 Microcells and Roaming
WLANs use cells, called microcells, similar to the cellular telephone system to extend
the range of wireless connectivity. At any point in time, a mobile PC equipped with a
WLAN adapter is associated with a single access point and its microcell, or area of
coverage. Individual microcells overlap to allow continuous communication within
wired network. They handle low-power signals and allow users to roam through a
given geographic area.
Figure 2 - Handling of WLAN connection between APs
ACCESS POINT
1.3 Network Service Set Identification (SSID) Overview
On a wireless network, a mobile user can roam freely within the service area of the
Access Point with the same service Set Identification SSIDs without losing
connection to the wired network. In order for a mobile unit to roam seamlessly from
one Access Point to another, the SSIDs of all Access Points and the wireless LAN
cards must be the same.
Assigning SSIDs, can provide the following security:
To avoid different user-groups from accessing network resources other than their
own.
Ensure each user-group has access within its own network.
Assure different user-group has the same access to Ethernet segment.
Figure 3 illustrates the use off SSIDs in an environment containing multiple
infrastructure network configured to communicate in the same Ethernet segment.
SSIDs assure the 3 users of Group A can only access each other, but not other
infrastructure, such as Group B.
Figure 3 – SSID Assignments
ACCESS POINT
1.4 Channel Services Overview
The Direct Sequence Spread Spectrum (DSSS) modulation has the effect of
suppressing radio frequency interference in the same frequency bands.
The IEEE 802.11b DSSS service is a channelized service, listed as Table 1.
Table 1 - Channel Usage by Country
Country
Channels Used by the Access Point
United States
1 through 11
Canada
Europe
France
Spain
Japan
1 through 11
1 through 13
10 through 13
10 through 11
14
1.5 Requirement for a wireless connection
To install an Access Point, the hardware requirements are:
A supported LAN protocol stack (IPX/SPX or TCP/IP or AppleTalk)
For a 100 Base-TX / 10 Base-T Ethernet connection, a modular data cable with a
dual twisted pair cable terminated with a male RJ-45 modular jack
ACCESS POINT
2. Installation AP
2.1 Package contents
Before using the Access point, please make sure that all the items listed below are
present in your package.
Wireless Access Point
5V DC power adapter
Installation CD
Quick Installation Guide
If any items are missing or damaged, please contact your dealer immediately.
2.2 Notice
1. Keep the Number of Wall and ceilings to a minimum. Each of Wall or Ceiling will
reduce 20-30% transmission range.
2. Make sure having the direct line among the Client WLAN card.
3. Keep your product away from electronic devices
4. Make sure that the antenna is positioned for best reception
5. Building Material make a difference. Normally a solid metal door or aluminum
studs may have a negative effect on range.
2.3 Installation Diagram
Figure 4 - Installation Diagram
ACCESS POINT
2.4 Physical Description
1st – WLAN
(Wireless LAN lamp)
2nd – LAN
(LAN lamp)
3rd – PWR
(POWER lamp)
Figure 5 - Access Point Diagram
To install your Access Point, plug the power cord into the Access Point. When power
is applied and the network system has been loaded, please refer to Table 2 for the
LED activity:
Table 2
LED
Activity
1st
Flashing (Green) Communicating with the wireless
LAN
2nd
On (Green)
LAN connection is active
Flashing (Green) Communicating with the LAN
On (Red)
Power is on
3rd
Description
2.5 Connecting to the Network
After installing the AP you can connect to the network when you have completed
network configuration of your wireless adapter.
2.6 AP Configuration (Install the SNMP Manager)
If you want to configure the AP (e.g.: Setting the AP’s IP address*), please refer to
Configuration AP and Installing SNMP Manager section. The electronic user manual
will guide you on how to install the Access Point SNMP Manager and configure the
AP through the Access Point SNMP Manager.
* You can connect to network without setting the AP’s IP address
ACCESS POINT
2.7 Default Setting
Functions
Default
IP Address
192.168.100.2
Subnet Mask
255.255.255.0
Gateway
0.0.0.0
DHCP
Disable
Access Point Name
AP-xxxxxx*
ESSID
AP-xxxxxx*
SSID Broadcasting
Enable
Enable/ Disable
Channel
10
1~14 (Depend on Regulatory Domain)
Fragmentation Threshold 2346
Options
Enable/ Disable
256 ~ 2346
RTS Threshold
2346
0 ~ 2347
Rates
1/ 2/ 5.5/ 11
1, 2, 5.5, 11 Mbps
Authentication Type
Both
Open System/ Shared Key/ Both
Preamble Type
Long
Short/ Long
Rx Antenna
Diversity
Left/ Right/ Diversity
Tx Antenna
Left
Left/ Right/ Diversity
Operational Mode
Access Point
Access Point/ Access Point Client/ Wireless Bridge
User Password
public
Administrator Password public
* Where xxxxxx are the last 6 digits of your devices MAC address.
ACCESS POINT
3. Specification
3.1 Hardware Specification
Item
Data transfer rate
Data Rates, Distance Range
AP without external Antenna
AP with external Antenna
(May vary depending on operation
environmental)
Network Interface
Ethernet
Radio Specification
Modulation Technique
Wireless LAN Standard
Frequency range
Channels:
Output Power
EMC certification:
Modulation
@ 11 Mbps
@ 5.5 Mbps
@ 2 Mbps
@ 1 Mbps
Configuration & Management
Utility
Watching dog
Security
Power
LED indicators
Size & Weight
Dimensions (L/W/H)
Weight (include box)
Environment
Operating temperature
Storage
Temperature
Supported Protocol
Description
1, 2, 5.5, 11 Mbps and auto selective
Indoor Range
Outdoor Range
35 ~ 40m
80 ~ 100m
50 ~ 80m
180 ~ 300m
10 Base-T / 100Base-TX (RJ45)*
Direct Sequence Spread Spectrum
Compliant with IEEE 802.11b
2.4-2.4835 GHz unlicensed ISM Band
USA and Canada 11 channels
European
13 channels
France
4 channels
Japan
1 channel
MAX 14dBm(25mW)
U.S.:
FCC part 15 class B
Europe: ETSI 300.328 and CE EMC-EEC
DQPSK (CCK)
DQPSK (CCK)
DQPSK
DBPSK
Included
64/128 bit WEP Encryption
DC 5V, 1A
3 LED for Ethernet Activity (green), Wireless
Activity (green), Power (red)
108.5mm × 71.2mm × 22mm
120g (body and cable, no box)
0℃-40℃
0℃-75℃
TCP/IP, NETBEUI, IPX/SPX, AppleTalk
*To ensure problem-free connection, avoid connecting the AP to a pure 100 Base-T Ethernet adapters
or hubs.
ACCESS POINT
3.2 IEEE 802.11 Functionality Support
Distributed Coordination Function (DCF)
CSMA/CA
Backoff Procedure
NAV Management
ACK procedure
Retransmission of unacknowledged frames
RTS/CTS Handshake
Duplicate detection and recovery
Beacon generation
Probe response
Fragmentation and reassembly
Wired Equivalent Privacy (WEP 64/128 bits)
Authentication algorithm (Open system and Shared key)
Power Management
Short preamble
10
ACCESS POINT
4. Configuration AP
The first step to configure the AP is to set its IP Address. This procedure can be done
through the Ethernet/Wireless port by using a combination of ARP/ PING commands
and the SNMP Manager, or by the network DHCP server.
4.1 Setting up Access Points IP Address
You can use ARP/PING commands to set the access point IP address or let the
network DHCP server set the address automatically. Before starting, get the MAC
address of the access point, which is indicated on the back of the AP housing. Follow
the steps below to give the access point a temporary address (Step A) and saving the
IP address through the SNMP Manager (Step B).
Note: Setting the IP address of the access point using the ARP/PING command will
only work within the first three minute from the time the AP first power on.
Step A:
1. Connect an Ethernet station and the access point on the same LAN. The simplest
way to accomplish this is to connect the access point and the Ethernet station to the
same hub. Check the station IP and the subnet mask address configurations to see if
they are properly set. New IP address for the access point must correspond to the
subnet mask.
2. Open an MS-DOS prompt window and enter a static route in the ARP table for the
new IP you want to assign. To assign IP address, use the ARP -s command:
> arp -s "new-IP-address" "AP-MAC-address"
For example:
> arp -s 192.168.1.105 00-03-E1-F2-00-01
(The MAC-address of the AP is indicated on the back of the AP housing.)
Note: A valid IP address must be specified, otherwise communication to and
from AP will not work. Refer to checking valid IP address section to check which
IP are valid.
3. Use its new IP address to ping the Access Point.
For example:
> ping 192.168.1.105 -t
If you receive replies, then the IP address has been temporarily set. In order to set it
permanently you need to proceed to Step B without powering off the access point.
11
ACCESS POINT
Step B
1. Open the SNMP Manager application. If you haven’t installed SNMP Manager
application, please refer to the Installing SNMP Manager section.
2. Connect to the access point by selecting Connect AP, which is a submenu under
File menu. Type the IP address of the access point (which has been temporarily set
in Step A) in the panel that appears. Type “public” at the password field; select
“Administrator” in the authority combo-box and then press “OK”. The SNMP
manager will inform you that the access point has been found and that all the
configuration values have been retrieved.
3. Under the Setup ⇒ Bridge submenu, select IP Configuration. Type the IP address
that was set up in Step A in the configuration window that appears. Confirm the
validity of the other values (MAC Address and subnet mask), and select the
primary port that determines the access point’s MAC Address and IP, then press
“OK”.
4. Save the configuration by selecting “Download Changes” under the File menu. The
IP address of the access point has now been set permanently.
DHCP client
If DHCP client is enabled, the IP address field displays the IP address that was
dynamically assigned to the access point by the DHCP server. The Subnet Mask field
displays the subnet mask utilized by the network DHCP server. Select the primary
port that is the interface which determines the DHCP server and press “OK”. If the
network server failed to give an IP address to the access point, then the default IP
address will be assigned to the access point.
If you have problem in configuring your AP correctly, then follow the appropriate
link(s) above to seek further information regarding setting and configuring your AP.
Otherwise, you may proceed to the Using SNMP Application usage section on
information describing on how to use the application utility.
12
ACCESS POINT
5. Installing SNMP Manager
Insert your installation CD into your CD-ROM. Auto run screen will appear. Click on
“SNMP Utility Installation” to start the installation process. Follow the instructions of
the setup program to finish installation. Refer to the Using SNMP Application section
for information regarding how to use the SNMP manager.
Figure 6 - Autorun screen
13
ACCESS POINT
5.0.1 Using SNMP Application
This section describes how to use your SNMP application. You can open up SNMP
application from the start menu as shown below.
Figure 7 - SNMP Application
When you start up the application, there will be only two menus available, namely
File and Help. You will need to connect to an access point first before other menus
will become available. Refer to Connection to AP section if you need help with
establishing connection with AP. SNMP application has the following menu options:
File – Download/upload information to the access point.
Setup – Provide setup configurations for the access point.
Commands – Provide reset and default functions.
Info – Provides statistical values for the access point.
Traps – Provides trap records.
Network – Provide network information regarding to AP.
Window – Provide functions to organize your window views.
Help – Provides help facilities on using SNMP application and application
version.
14
ACCESS POINT
5.1 File Menu
Figure 8 - File Menu
Click on the topics below to see a full detail description of each submenu.
Connect to Access Point – Connect to a known AP.
Find Access Point – Search for an available AP to connect to.
Exit – Exit SNMP application.
The following menus will be enabled once connection to the AP has been made.
Close Connection AP – close the current connection with the AP.
Download changes – Upload configuration changes to the access point.
Refresh – Get the current AP configuration.
Options – Defines the polling interval according to which the SNMP manager
polls the access point in order to update statistics and associated stations list.
15
ACCESS POINT
5.1.1 Connection to Access Point
To connect to the access point, you need to do the following:
1. Type the access points IP address in the IP Address field.
2. Type in the appropriate password in the Password field. (The default password
is “public”.) Note: Password is case sensitive.
3. In Authority combo-box, choose either Administrator or User Authority. User
authority allows you only to view and not set or save changes to the access
point configuration, while administrator authority allows you to view and
change AP configurations.
4. Click “OK”.
Figure 9 - Connecting to AP
Refer to troubleshooting section if you have trouble connecting to the AP.
16
ACCESS POINT
5.1.2 Find Access Point
This option allows you to find and connect with an access point without the necessity
of knowing its IP. Choose this option in order to find the access points available for
connection. Select one of the available access points and press “Connect”.
Figure 10 - Available Access Points
The following screen will appear indicating the IP address of the selected access point
and prompting you to select authority and to input the appropriate password at the
Password field. Then press “Ok”.
Figure 11 - Connecting to AP
17
ACCESS POINT
If connection to the access points is successful, then the following window will
appear.
Figure 12 - Connection successful
When the connection has been successfully established, a message in the bottom left
hand corner of the screen indicating, “Get Configuration done” will appear. IP address
of the connected AP will appear at the bottom right hand corner of the screen.
Refer to troubleshooting section if you have trouble connecting to the AP.
18
ACCESS POINT
5.2 Setup Menu
Figure 13 - Setup menu
Under the setup menu are the following submenus:
Bridge – Provides routing setup for your AP.
Wireless LAN – Provides configurations for your APs wireless activities.
Enable SNMP Traps – Provides trap messages.
Authorization – Let your AP accept/decline packets from authorized remote
APs.
19
ACCESS POINT
5.2.1 Bridge
Figure 14 - Bridge configuration
There are two menus under bridge menu. They are:
1. IP Configuration – Let you modified AP IP settings.
2. Filtering – If filtering is enabled, then only the IP protocol packets will pass
through the WLAN and other protocol packets will get filtered out.
Note: If you change any of the settings, remember to save your changes by choosing
Download Changes under the file menu. Otherwise, the values that you altered will be
discarded!
20
ACCESS POINT
5.2.2 IP Configuration
The IP address and subnet mask can be modified through “IP Configuration”. If
DHCP client is enabled the IP Address field displays the IP address that was
dynamically assigned to AP and the Subnet Mask field displays the subnet mask
utilized by the network DHCP server. In addition, you have to select the primary port
that determines the DHCP server.
Table 3 - Bridge IP Configuration Parameters
Parameters
Description
MAC Address Unique 48-bit, hard-coded physical address known as the station identifier.
IP Address
Network-assigned Internet Protocol address of the access point.
Subnet Mask
Four sets of three digits that divide a network into sub networks.
Bridge IP Configuration dialog box
Figure 15 - IP Configurations
21
ACCESS POINT
5.2.3 Wireless LAN
Figure 16 - Wireless LAN
Under Wireless LAN are the following sub-menus:
•
•
•
Privacy Options – Specifies whether to use encryption or not.
Operational Settings – Specifies AP operational settings
Authorized MAC Addresses – Specifies which APs are allowed to
communicate with you.
Note: If you change any of the settings, remember to save your changes by choosing
Download Changes under the file menu. Otherwise, the values that you altered will be
discarded!
22
ACCESS POINT
5.2.4 Privacy Options
Wired Equivalent Privacy (WEP) is an authentication algorithm that protects
authorized wireless LAN users against eavesdroppers. Ten hexadecimal digits must
be supplied in keys 1 to 4 if 64 bits encryption selected. If 128 bits encryption
selected, then 26 hexadecimal digits must be supplied in keys 1 to 4. Choosing disable
will disable WEP encryption and every packet will be send without any encryption.
Finally, if you are using encryption, choose a default key to use.
Figure 17 - Privacy option
Refer to tutorial section if you are unfamiliar with encryptions.
23
ACCESS POINT
5.2.5 Operational Settings
Using this option you can either view or modify the wireless LAN parameters of the
access point. These parameters are described below:
Figure 18 - Operational settings
Access Point Name: Specifies the name of your access point.
ESSID: Up to 32 ASCII characters used to identify a wireless LAN. It prevents the
unintentional merging of two co-located WLANs. The ESSID value must be the same
in all stations and access point in the extended WLAN.
SSID broadcasting: Setting broadcasting on will allow the access point to broadcast
its SSID.
24
ACCESS POINT
Channel: There are 14 channels available. Select the channel to be used. Refer to
radio channel selection table to see which channels are available in your region.
Fragmentation threshold: The size at which packets will be fragmented. Choose a
setting within a range of 256 to 2346 bytes. Refer to tutorial section if you are
unfamiliar with fragmentations.
RTS Threshold: Minimum packet size to require an RTS (Request To Send).
Authentication Type: Select Open System, Shared Key, or Both. Setting
authentication type to both will enable your AP to communicate with other access
point either with or without data encryption. Refer to the tutorial section if you are
unfamiliar with authentication type.
Preamble Type (Short/Long): Preamble is the first sub field of PPDU, which is the
appropriate frame format for transmission to physical layer. There are two options,
Short Preamble and Long Preamble. The short preamble option improves throughput
performance while long preamble provides better synchronization.
Rate: By default the unit adoptively selects the highest possible rate for transmission.
Alternatively, you can choose the rate at which the AP will transmit its data at.
Available transmission rates are 1, 2, 5.5 and 11 Mbps.
Auto Rate Fall Back: System will automatically reduce the transmission rate if
traffic in network is heavy. This will result in better network performance and
minimize packet loss.
Regulatory Domain: Specify the regulatory domain that you are in.
Click on the advanced button to configure advanced settings.
25
ACCESS POINT
5.2.6 Advance Operational Setting
Figure 19 - Operating modes
Access Point: This mode provides access for wireless stations to wired LANs and
from wired LANs to wireless stations. Furthermore, wireless stations within the range
of the access point device may communicate with each other via the access point.
Access Point Client: This mode allows the connection of one or more remote LANs
with a central LAN, creating thus an extended single virtual LAN. In this way, any
station of the remote LAN can successfully communicate with any station of the
central LAN, as if all of them belonged to the same physical LAN. Wireless stations
can’t associate with access point clients. The access point conducts the designated
traffic to the appropriate wired or wireless station. Figure below illustrate this:
Figure 20 - Access Point Client environment
26
ACCESS POINT
To connect to a central LAN, tick the Preferred BSS check box and enter the MAC
address of the central LANs AP. If you don’t know the MAC address of the central
LANs AP, click on Site Survey and then on “Get / Refresh” button. A list of the
available APs will appear. Click on the SSID of the AP you wish to connect to and
click the Connect button. In addition to setting the preferred BSS, you also need to
make sure that the remote AP has the same ESSID as yours.
Figure 21 - Access Point Client setting
Wireless Bridge: Two types of connection are available under this mode.
a. Point to Point: The wireless bridge can communicate with a specific remote
MAC address.
b. Point to Multipoint: The wireless bridge can communicate with any wireless
bridge available in the same channel. When authorization algorithm is enabled,
the wireless bridge can communicate with any wireless bridge whose MAC
addresses exists in the authorization table.
27
ACCESS POINT
Figure 22 - Wireless Bridge environment
28
ACCESS POINT
5.2.7 Authorized MAC addresses
Figure 23 - Authorized MAC address
For security reasons, the access points have the ability to associate with authorized
MAC address stations. To activate this option, click on the Authorization Table
Enable check box.
Load file: Load a file with the authorized MAC addresses. To create load file,
compose a file with MAC addresses, (12 consecutive digits, no ‘-‘) one per line.
Download: Download the authorized MAC addresses to the access point.
Get: Get the authorized MAC addresses from AP.
Note: Make sure that you download the changes to the AP, otherwise the MAC
addresses you specified will not be validated.
29
ACCESS POINT
5.2.8 SNMP Traps
SNMP traps are messages that are displayed in the bottom right hand corner of the
main window specifying AP actions. Available trap messages are:
•
Trap Re-association: This trap message is sent when a Station’s re-association
request is received from the AP - Bridge.
•
Trap Association: Indicates the reception of an association request packet and
the sender station's successful association with the wireless bridge.
•
Trap Disassociation: This trap message is sent when a disassociation
notification packet is received from a station.
•
Trap Reset: This trap message is sent when the AP-Bridge resets.
•
Trap Setting IP Address with Ping: This trap message is sent when the
AP-Bridge IP address is set with the transmission of a ping message.
•
Trap Start Up: This trap message is sent when bridge starts up.
•
Trap Failed To Erase Flash: This trap message is sent when bridge fails to
erase flash.
30
ACCESS POINT
5.2.9 Authorization
This menu let the administrator change the password that referred to the Password
field for the user and also the fields in Administrator Authority.
Type in the password in the appropriate field and again in the confirm field to confirm
password. Click “Apply” to save settings.
Figure 24 - Authority configuration
31
ACCESS POINT
5.3 Commands Menu
Figure 25 - Command options
Reset Device – Reset the AP
Restore Defaults – Restore AP configurations to factory defaults.
32
ACCESS POINT
5.4 Information Menu
Figure 26 - Information menu
Wireless Statistics – Displays several statistical values on your wireless
activities.
Ethernet Statistics – Displays statistical data on your Ethernet activities
33
ACCESS POINT
5.4.1 Wireless Statistics
Report statistics concerning the unit’s wireless activities.
Figure 27 - Short wireless statistics view
Field name
Description
Unicast Transmitted Packets
The number of unicast packets successfully transmitted
Broadcast transmitted packets
The number of broadcast packets transmitted
Multicast transmitted packets
The number of multicast packets transmitted
Unicast Received Packets
The number of unicast packets that were successfully received
Broadcast Received
The number of broadcast packets that were successfully received.
Multicast Received
The number of multicast packets that were successfully received
34
ACCESS POINT
5.4.2Ethernet Statistics
Report statistics concerning the unit’s Ethernet port activity.
Figure 28 - Basic Ethernet statistics
Field
Description
Received Packets
Total Bytes
The number of bytes in the frames that were received
Total Packets
Total number of received packets
Packet CRC Errors
The number of packets with CRC Errors
Transmitted Packets
Total Bytes
The number of bytes in the frames that were transmitted
Total Packets
Total number of transmitted packets
Packet CRC Errors
The number of packets with CRC Errors
35
ACCESS POINT
5.5 Trap Menu
Figure 29 – Traps menu
36
ACCESS POINT
Figure 30 - Trap recorder
Trap menu contains trap records of your AP.
37
ACCESS POINT
5.6 Network Menu
Figure 31 - Network menu
Associated stations shows you the MAC addressees of access points you are
associated (connected) with.
38
ACCESS POINT
Figure 32 - Associated stations
39
ACCESS POINT
5.7 Window Menu
Figure 33 - Window menu
Under this menu there are the following submenus
•
Cascade - All opened windows are arranged on the desktop in a cascade
fashion.
•
Tile - All open windows are visible on the desktop.
40
ACCESS POINT
5.8 Help Menu
Figure 34 - Help menu
Help Topics: Display quick listing of help topics.
About SNMP Manager: Displays the manger version.
41
ACCESS POINT
6. Tutorial
This section explains some of the simple network concepts concerning wireless
LAN’s and networking in general.
Topics covered are:
Packet Fragmentation
Encryption
Subnetting
6.1 Packet Fragmentation
Packet fragmentation means splitting a data packet into several smaller packets.
We need to fragment packets because of:
o Hardware limits – some hardware do not support packets up to certain
threshold.
o Operating system buffer constraints – depending on the system memory,
buffer overflow means lost of data and waste bandwidth in unnecessary
retransmissions. Breaking packets into smaller segment means system will
have extra memory and extra time in processing those smaller data packets.
o Protocol limits – some protocol specify maximum permitted size of a packet.
E.g. an ATM cell packet is restricted to 53 bytes.
o Reduce channel occupancy – routers can process smaller packets faster than
larger packets, result in smaller packet stays in router shorter time. This will
result in more throughputs and reduce the likelihood router dropping packets.
Advantages of packet fragmentation:
Easier and faster processing time for routers.
Less delay compare to larger packets
Less likelihood of routers dropping packets when traffic in network is heavy.
This is because the processing time for fragmented packets is lower.
Disadvantages for packet fragmentation:
Additional header information in the packet header result in less data can be
stored in a single packet.
Unnecessary packet fragmentation if traffic in network is low.
Reassemble fragmented packets requires extra time.
42
ACCESS POINT
Setting fragmentation threshold can be a tricky business. Getting the best performance
out of fragmentation depends on the network traffic condition.
6.2 Encryption
•
All users throughout the Internet can read unencrypted data, illustrated below
with a simple wired network.
Figure 35 - Intercepted data
•
B want to send some data to A, but the data was intercepted by C.
Figure 36 - Retransmitted data
•
C then modifies the data and transmits it to A. A is unaware of C’s presents and
thinks the data originates from B.
With wireless networks, data is even more vulnerable to such attacks since everyone
within your radio transmitting range can intercept your data.
43
ACCESS POINT
Wired Equivalent Privacy (WEP) provides techniques to prevent intruders invading
your data.
With the current IEEE specification, WEP encryption has two types, 64 and 128 bits1
encryption.
For 64bits encryption, 10 hexadecimal2 values must be presented in the key field.
While 128 bits encryption, 26 hexadecimal values must be in the key field.
Authentication Type
Share Key: Encryption algorithm used on each of the computers or access points
might different. Hosts must discover which algorithm other remote hosts use before
proper communication could be established.
Open System: The IEEE 802.11 default authentication method, which is a very simple,
two-step process. First the station wanting to authenticate with another station sends
an authentication management frame containing the sending station’s identity. The
receiving station then sends back a frame alerting whether it recognizes the identity of
the authenticating station.
WEP standard did not specify which algorithm or the procedure to be used. In
practice, most installation uses a single algorithm that is shared between all mobile
stations and access points.
How is encryption key generated?
Firstly, 24bits IV is generated. This IV is then pass through an encryption algorithm
generator with your data. The generator will generate the appropriate length of bits
that represents your encrypt data.
Other manual may specify 40 or 104bits encryption, this is because the manual didn’t include 24 bits
Initialization Vector (IV).
Hexadecimal numbers range from 0 ~ 9 and A ~ F.
44
ACCESS POINT
6.3 Subnetting
Subnetting allows an organization to use one network address to span many small
physical networks, illustrated below.
Figure 37 - Example of subnet configuration
Subnetting breaks up host ID portion of the IP address and separate it into subnet ID
and host ID.
Without subnet
Net id
With subnet
Host id
Net id
Host id
Subnet id
Figure 38 - Class B IP address using subnetting
Subnet mask is used to identify a particular network within the organization. Subnet
mask can be variable and it is determined by how the organization divides its network.
From the example above, to find a particular network within this organization, we can
use the first three portion of the IP address. Thus, its subnet mask is defined as
255.255.255.0
45
ACCESS POINT
7. Troubleshooting
Problem 1: I can’t find an access point through the wireless LAN adapter.
Answer:
i) Check the following
Access point is powered on.
Make sure the operational mode of the AP is in Access Point mode. (Please
refer to operational settings section and advance operational setting for more
details.)
The AP is within the valid transmission range.
Keep the number of wall and ceilings to a minimum.
Keep the AP away from electronic devices.
If you still can’t find any access points through your WLAN adaptor, then you need to
reset your AP. Refer to resetting the access point section to see how to reset and
reconfigure your AP.
Problem 2: I can’t establish connection between an access point and a wired
network.
Answer: To ensure problem-free connection, we recommend avoiding connecting the
AP to a pure 100 Base-TX Ethernet adapters or hubs. Also check the network settings
on both devices to ensure they are correct.
Problem 3: I can’t connect to an access point.
Answer: There are few possible answers to this problem. Refer to connection
troubleshooting section for more details.
Problem 4: I have trouble with setting/using encryption.
Answer: If you receive error when setting encryption or you can’t communicate with
other parties when you enable your encryption, check your settings against those
listed in the encryption troubleshooting section.
Problem 5: I can’t send other protocol packets except for IP.
Answer: If you are using other protocols (e.g. NetBEUI) other then IP and have IP
filtering on, then all the packets apart from IP packets will get filtered out. In other
word, your AP will drop every packet other then IP data packets. To turn IP filtering
off, de-select the IP filtering check box in the bridge menu.
46
ACCESS POINT
Problem 6: I forgot my password
Answer: If you have forgotten your password, then you need to reset your AP so it
can restore factory settings and therefore restore default password as well. The default
password is “public”. Refer to resetting the access point section to see how to reset
and reconfigure your AP.
Problem 7: I receive this error message when I try to set my AP to “Access Point
Client” mode.
Solution: This error is caused by the fact that your AP cannot detect other APs within
its range. Make sure other AP is powered on and connected. Then try again.
Problem 8: I received this error message.
Some settings are restricted and can only be modified by administrators. If you want
to change these settings, then you have to log in as administrator rather than user.
Problem 9: I receive “Get Configuration failed” error message.
Answer: This problem is usually caused by the connection between you and the
access point has been broken. Try to reconnect to the access point. If reconnection
fails, then check the network setting and also if the AP is powered on and connected
to the network.
47
ACCESS POINT
Problem 10: I receive the following error message:
Answer: This error arises because you try to open up two SNMP Manager
applications. Only one SNMP Manager application can be run at one computer at any
time.
Problem 11: I have set authorized MAC addresses but then realize the addresses
I entered are wrong, and I can’t connect to the AP now.
Answer: Your AP will only be allowed to communicate with wireless LANs/APs that
the MAC specifies. If you set MAC wrongly, then you have to find other wireless
LAN or AP who is authorized to communicate with the given AP. Otherwise you will
need to reset the access point. Refer to resetting the AP for further details.
Note: Authorized MAC address only restricts communication to the wireless LAN.
You can still communicate with the access point if you are using a wired LAN.
48
ACCESS POINT
7.1 Checking Valid IP Addresses
There are restrictions on which IP addresses you can and cannot use. Some IP
addresses are reserved for testing, multicasting and some IP are restricted by your ISP.
Following IP addresses cannot be used:
•
•
•
•
127.X.X.X – this is a loop back address, used for testing
0.0.0.0 – this IP address represent the host address.
•
0 or 255 in host ID portion of your IP are not valid. This represent local host
or broadcast address for your class of IP (explained in the next paragraph).
255.255.255.255 – this is local broadcast address
First portion of IP cannot exceed 224, that is, IP addresses which is in the
range of 224~239.X.X.X is not valid. This range of IP is for multicasting. IP
range from 240~255.X.X.X are reserved IP addresses and cannot be used.
IP has five classes, namely class A, B, C, D and E. For each class, the host ID portion
in the IP field is different for each of the classes. Figure below illustrate this.
Class A:
1~127 .
Host ID
Class B:
128~191 . X
Host ID
Class C:
192~223 . X
Class D:
224~239
Used for Multicasting (no Host ID)
Class E:
240~255
Reserved IP address
Host ID
Host ID cannot be all 0’s or all 255’s. For example, the following are not valid IP’s:
1~127.0.0.0
– invalid class A address
1~127.255.255.255
– invalid class A address
128~191.X.0.0
– invalid class B address
128~191.X.255.255 – invalid class B address
192~223.X.X.0
– invalid class C address
192~223.X.X.255
– invalid class C address
Note: X denote don’t cares in the above example
49
ACCESS POINT
7.2 Connection Troubleshooting
VI receive this error message when I try to find access point.
Solution: Check the following:
AP is powered on and connected
If AP is powered on but you still can’t find the access point, then you have
probably have or set the APs IP address to one of the invalid addresses. To fix the
problem, you need to reset the AP. Refer to resetting AP section for more
information on how to reset your AP.
Note: If you are using wireless LAN to connect to the access point, then there is a
higher chance of you not able to detect the AP. Try to use Ethernet to connect to
the access point.
V I can’t connect to an AP.
Solution: Check the following:
Access point is powered on and connected.
Access point is connected to the same subnet as your Ethernet station. Refer to
tutorial section if you are unfamiliar with subnet and subnet settings.
Both you and the access point have a valid IP address. Refer to validating IP
address section to check if you have a valid IP address.
50
ACCESS POINT
7.3 Resetting the Access Point
Resetting the access point will restore the factory settings.
WARNING: All the settings you made to the access point will be lost after
resetting the device.
To reset the AP, use a pin or something small to push and hold the reset button. Reset
button is located on the reverse side of the AP. Resetting procedure should take no
more then 10 seconds. After the device has been reset, you need to reconfigure its IP
and saving it again. Refer to configure AP if you have problems setting APs IP using
ARP command.
The Bottom of the AP Diagram
51
ACCESS POINT
7.4 Encryption Troubleshooting
Following discusses problems that may arise when setting your encryption keys.
VI got error messages when I press the set button
Error message type:
Unable to Set Privacy Configuration. Possibly Access Point is not connected.
This problem arises because you have typed in a non-hexadecimal digit.
That is, you have typed a key outside the range 0 ~ 9 and A ~ F.
VI cannot communicate with other parties.
This is probably the most common error when setting encryption. Try one of the
suggestions below to solve your dilemma.
1. Make sure you and the other party (either access point or wireless LAN) is
using the same encryption type, that is, 64 bits or 128 bits.
2. Make sure the WEP key you are using matches the corresponding key the
other party (either access point or wireless LAN) is using and vice versa. That
is, if you are using Key 1, other parties value of Key 1 must be the same as
yours, and vice versa.
3. Make sure all parties are using the same authentication type. If uncertain, set it
to both (automatic).
4. If you set your encryption key under the required length, the system will set it
to default. Check your encryption keys again to see if they are set to what you
intended to.
52
ACCESS POINT
7.5 Troubleshooting Check Table
If you can’t establish connection, please check the configurations below.
Item
SSID Channel
Encryption
Operational
mode
Key Authentication Protocol
#1~4
Type
Network
Domain
Access Point
Disable
64 Bit or 128 Bit
N/A Open System or
Both
**
***
N/A
AP Client
Disable
N/A Open System or
Both
64 Bit or 128 Bit
Wireless
Bridge
N/A
Disable
N/A Open System or
Both
64 Bit or 128 Bit
Note:
**
***
Encryption must be set to the same type.
Value of encryption keys must be the same for all users but can choose
different key to use when communicating.
The authentication type setting must be the same, either Open System or
Shared Key. Select Both for communication with clients with different
settings.
53
ACCESS POINT
8. FAQ
Q1: What is an Access Point (AP)?
Answer: An AP is the bridge to connect two different protocols, Ethernet 802.3 and
wireless 802.11b. It can be used as the center of a wireless infrastructure, providing
connections to your wired networks. Or, it can act as a repeater, increasing wireless
communication range. The maximum communication range is based on how you
configure your wireless infrastructure. If your purpose is merely to transfer files
between two nearby computers, you can connect these two PCs by two WLAN cards
through ad-hoc mode without using an AP.
Q2: Why can’t my wireless LAN detect an access point?
Answer: Wireless LAN cannot detect access point under some AP configurations. If
an access point is configured to be access point client or wireless bridge then
detection cannot be made with a wireless LAN. Although communication to the
access point through Ethernet is still possible.
Q3: What is the difference between point-to-point wireless bridge setting and
access point setting?
Answer: Setting your AP to access point mode will enable it to communicate with
any other APs, but it cannot communicate with any APs which are configured to
point-to-point wireless bridge. Similarly, APs which are set to point-to-point wireless
bridge mode will be able to communicate with any other APs which are in wireless
bridge mode, but it cannot communicate with any AP which are configured to access
point mode.
Q4: Can my wireless LAN communicate with an AP that is configured to access
point client?
Answer: You can communicate to an AP that is configured to access point client
mode if and only if communication is done through another AP that is configured to
access point mode and that AP can communicate with the access point client AP.
Q5: Why does the APs SSID field empty why I try to detect it through my
wireless LAN?
Answer: If the access point didn’t broadcast its SSID, then the SSID field will be
empty when you try to detect the AP using a wireless LAN. To turn the SSID
broadcasting on, select SSID broadcasting field in the operational settings menu.
54
ACCESS POINT
Q6: How can I remove the SNMP Manager utility in Windows?
Answer: You can uninstall the manager utility by executing the un-installation
program, which is located under the following path:
Start ⇒ Programs ⇒ Atmel Utilities ⇒ AP Configuration ⇒ Uninstall AP Configuration
Q7: Can I select any of the 14 channels to use?
Answer: There are regulations to which channels that can be used. Refer to the
channel usage by country table to see which channel is available in your region.
Q8: Does the radio wave emitted from the AP have any threat to human health?
Answer: Now scientific studies have been unable to attribute adverse health effects to
AP transmissions. As with other wireless technologies, AP must meet strict
government and industry standards for safety.
Q9: What is the maximum transmission rate of the access point?
Answer: In 802.11b, the maximum transmission rate is 11Mbps. It also supports
1Mbps, 2Mbps, and 5.5Mbps rates when the transmission condition is not desirable. If
the AP is connected to other APs or wireless LANs, then the 11Mbps bandwidth is
shared among these devices.
55
ACCESS POINT
9. WLAN Glossary
Access Point (AP)
A device that transports data between a wireless network and a wired network
(infrastructure).
Ad-hoc network
A wireless network composed only of stations (no access point). Also known as peer
to peer network
Authentication
The process a station uses to announce its identity to another station. IEEE 802.11
specifies two forms of authentication: open and shared key.
Basic Service Set (BSS)
A set of 802.11-compliant stations that operates as a fully connected, wireless
network.
BSSID
A 6-byte address that distinguishes a particular AP from others. Also known as a
network ID or the MAC address of the AP.
Cyclic Redundancy Check (CRC)
An error-detection process that (at the transmitting station) divides the data being sent
by a particular polynomial and appends the resulting remainder to the transmitted
data.
Data link layer
The bottom second layer of the OSI layers. It provides synchronization and
transmission error control to packets. In 802.11 LANs, it encompasses the logical link
control (LLC) and medium access control (MAC) layers.
Differential quadrature phase shift keying (DQPSK)
A modulation process that the IEEE 802.11 direct sequence physical layer uses to
transmit data. It operates at a specific center frequency and varies the phase of the
signal to represent double-bit symbols.
56
ACCESS POINT
Direct Sequence Spread Spectrum (DSSS)
Combines a data signal at the sending station with a higher data rate bit sequence,
which many refer to as a chip sequence (processing gain). A high processing gain
increases the signal’s resistance to interference.
Extended Service Set (ESS)
A collection of basic service sets tied together via a distribution system.
Frequency hopping spread spectrum (FHSS)
Takes the data signal and modulates it with a carrier signal that hops from frequency
to frequency as a function of time over a wide band of frequencies.
Independent Basic Service Set Network (IBSS Network)
A 802.11-based wireless network that has no backbone infrastructure and consists of
at least two wireless stations. This type of network is often referred to as an ad hoc
network because it can be constructed quickly without much planning.
Industrial, Scientific, and Medicine bands (ISM bands)
Radio frequency bands that the Federal Communications Commission (FCC)
authorized for wireless LANs. The ISM bands are located at 902 MHz, 2.400 GHz,
and 5.7 GHz.
Logical Link Control (LLC) layer
The highest layer of the IEEE 802 reference model, providing similar functions of a
traditional data link control protocol.
Medium Access Control (MAC) layer
Provides medium access services for IEEE 802 LANs.
Microcell
A bounded physical space in which a number of wireless devices can communicate.
Because it is possible to have overlapping cells as well as isolated cells, the
boundaries of the cell are established by some rule or convention.
57
ACCESS POINT
Open system authentication
The IEEE 802.11 default authentication method, which is a very simple, two-step
process. First the station wanting to authenticate with another station sends an
authentication management frame containing the sending station’s identity. The
receiving station then sends back a frame alerting whether it recognizes the identity of
the authenticating station.
Open System Interconnection (OSI)
An ISO standard specifying an open system capable of enabling the communications
between diverse systems. It has the following seven layers of distinction: physical,
data link, network, transport, session, and application. These layers provide the
functions necessary to allow standardized communications between two application
processes.
Physical layer
Provides the transmission of bits through a communication channel by defining
electrical, mechanical, and procedural specifications.
Point Coordination Function (PCF)
An IEEE 802.11 mode that enables contention-free frame transfer based on a priority
mechanism. Enables time-bounded services that support the transmission of voice and
video.
Quadrature Phase Shift Keying (QPSK)
A modulation technique that changes the phase of a signal to represent different,
four-bit binary words.
Radio Frequency (RF) Terms: GHz, MHz, Hz
The international unit for measuring frequency is Hertz (Hz), which is equivalent to
the older unit of cycles per second. One Mega-Hertz (MHz) is one million Hertz. One
Giga-Hertz (GHz) is one billion Hertz. For reference: the standard US electrical
power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55 -1.6 MHz,
the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens
typically operate at 2.45 GHz.
Roaming
Movement of a wireless node between two microcells. Roaming usually occurs in
infrastructure networks built around multiple access points.
58
ACCESS POINT
Shared key authentication
A type of authentication that assumes each station has received a secret shared key
through a secure channel independent from an 802.11 network. Stations authenticate
through shared knowledge of the secret key. Use of shared key authentication requires
implementation of the 802.11 WEP algorithms.
Wired Equivalent Privacy (WEP)
An optional IEEE 802.11 function that offers frame transmission similar to a wired
network. The WEP generates secret shared encryption keys that both source and
destination stations can use to alter frame bits to avoid disclosure to eavesdroppers.
59
ACCESS POINT
Federal Communications Commission Interference Statement
FCC Class B Certification
The device complies with Part 15 of the FCC rules. Operation is subject to the
following conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that
may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interference
to radio communications However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the
following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from the one which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
CAUTION:
To assure continued FCC compliance:
(1) The user must use shielded interface cable and shielded power cord.
(2) Any changes or modifications not expressly approved by the grantee of this
device could void the user's authority to operate the equipment.
FCC RF Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with a
minimum distance of 20cm between the radiator and your body.
CE Market Declaration of Conformance
This is to certify that this product complies with ISO/IEC Guide 22 and EN45014. It
conforms to the following specifications:
EMC:
EN55022(1988)/CISPR-22(1985)
Class B
IEC 61000-4-2(2000)
4kVCD/8k VAD
IEC 61000-3-3(2000)
3V/m
IEC 61000-4-4(2000)
1kV-(power line)
IEC 61000-4-6(2000)
3Vrms
IEC 61000-4-11(2000)
3Vrms
The product complies with the requirements of the Low Voltage Directive 73/23/EEC
and the EMC Directive 89/336/EEC, and carries the CE Mark accordingly.
60
Radio Channel Selection Table
Center
Channel
Frequency
ID
MKK1
(MHz)
Regulator domains
FCC
DOC
ETSI
MKK
U.S.A
Canada
Most of
Europe
Spain
France
Japan
2412
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2417
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2422
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2427
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2432
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2437
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2442
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2447
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
2452
yes
yes
yes
yes
ㄨ
ㄨ
ㄨ
10
2457
yes
yes
yes
yes
yes
yes
ㄨ
11
2462
yes
ㄨ
yes
yes
ㄨ
yes
2467
yes
ㄨ
yes
12
yes
ㄨ
yes
ㄨ
13
2472
yes
ㄨ
ㄨ
ㄨ
14
2484
yes
ㄨ
ㄨ
yes
ㄨ
yes
yes
ㄨ
ㄨ
ㄨ
yes

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Create Date                     : 2002:04:24 09:44:29Z
Modify Date                     : 2002:05:22 13:27:47+08:00
Page Count                      : 65
Creation Date                   : 2002:04:24 09:44:29Z
Mod Date                        : 2002:05:22 13:27:47+08:00
Producer                        : Acrobat Distiller 5.0 (Windows)
Author                          : kim
Metadata Date                   : 2002:05:22 13:27:47+08:00
Creator                         : kim
Title                           : Microsoft Word - AP-WN1200 User Guide _user_ v0.7.1-letter
EXIF Metadata provided by EXIF.tools
FCC ID Filing: PX91200

Navigation menu