background image

65 
 

 

Summary of Contents for DLB70 Series

Page 1: ...DLB70XX WLAN Dual Outdoor Radio User Manual Version 1 0 0 11 08 2006...

Page 2: ...etwork Type 15 SSID 15 Channel Number 15 Advanced Settings 17 Authentication Type 17 Fragment Threshold 17 RTS Threshold 17 Beacon Interval 17 ACK Timing 18 Client Expired Time 18 MTU Size 18 Data Rat...

Page 3: ...ic IP 41 PPPoE 43 PPTP 44 Configuring Clone MAC Address 45 VPN Pass through 48 Static Route Setup 48 Dynamic Route Setup 49 Firewall Configuration 51 Configuring LAN to WAN Firewall 51 Port Filtering...

Page 4: ...3 Auto Discovery Tool 66 Discover 66 Setup IP 66 Detail 67 WDS 68 Active Clients 68 Connect to Web Server 68...

Page 5: ...ng antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from where the receiver is connected Consult the dealer or an experien...

Page 6: ...lesser gain than those that are certified with this device may be used legally by the installer 23 dBi gain antenna Arc Wireless Solutions antenna PN ANT S 2126 01 Packing List Before you start to in...

Page 7: ...xample shows how to create a bridged Access Point using both the 802 11A radio and the 802 11B G radio The Operation Mode needs to be set to Bridge This bridges both wireless interfaces and the ethern...

Page 8: ...isable Wireless LAN Interface checkbox Set the Mode to AP Assign the SSID For this example we used DLB_AP_A since this is the 802 11A interface For ease of management it might be beneficial to change...

Page 9: ...ter In this mode the device can connect to the other wireless stations Ad Hoc network type or Access Point Infrastructure network type and you don t need to install any driver In Basic Settings page c...

Page 10: ...d then press Connect button to establish the link If the link is established successfully it will show the message Connect successfully Then press OK Then you can check the linking information in Stat...

Page 11: ...he device supports WEP and WPA Personal Enterprise except WPA2 mixed mode data encryption For more information about the detail data encryption settings please refer the security section Configuring U...

Page 12: ...n the same subnet as the device such as 192 168 2 X for LAN 172 1 1 X for WAN NOTE By default the DHCP server is enabled Do not have multiple DHCP servers in your network environment otherwise it will...

Page 13: ...rement Bridge The wired Ethernet and wireless NIC are bridged together Once Bridge mode is selected all the WAN related functions will be disabled WISP Wireless ISP This mode allows the wireless NIC t...

Page 14: ...e the same public IP address from your ISP WDS Wireless Distribution System This mode serves as a wireless repeater the device forwards the packets to another AP with WDS function When this mode is se...

Page 15: ...wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards t...

Page 16: ...nection In client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish a...

Page 17: ...s EMEA Japan Israel and China 7 2442 Americas EMEA Japan Israel and China 8 2447 Americas EMEA Japan Israel and China 9 2452 Americas EMEA Japan Israel and China 10 2457 Americas EMEA Japan and China...

Page 18: ...ng one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent as several pieces instead of as one block Use a low setting in areas whe...

Page 19: ...ur wireless clients find the device automatically If you are building a public Wireless Network disabling this function can provide better security Every wireless station located within the coverage o...

Page 20: ...de and two transmission output power levels 100 and 50mW for OFDM 802 11g mode You can adjust the power level to change the coverage of the device Every wireless station located within the coverage of...

Page 21: ...d in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client in your wireless network For more secure data transmission you can change the e...

Page 22: ...t unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the users In this way every user must use a valid account before accessing the Wireless...

Page 23: ...requires only an access point and client station that supports WPA PSK The WPA PSK settings include Key Format Length and Value They must be the same as each wireless client in your wireless network...

Page 24: ...emonstrate the WDS network topologies and WDS AP List configuration You can setup four kinds of network topologies bus star ring and mesh In this case there are five devices with WDS enabled WDS1 WDS2...

Page 25: ...ddress of WDS1 No Ring topology Device Entries of WDS AP List Spanning Tree Protocol Required WDS1 The MAC Addresses of WDS2 and WDS5 Yes WDS2 The MAC Addresses of WDS1 and WDS3 Yes WDS3 The MAC Addre...

Page 26: ...S1 WDS2 WDS3 and WDS4 Yes Wireless Repeater A Wireless Repeater can be used to increase the coverage area of another device Parent AP Between the Parent AP and the Wireless Repeater wireless stations...

Page 27: ...SID Choose WDS mode for only wireless backbone extension purpose You can use any network topology please refer the WDS topology section Site Survey This tool allows you to scan for nearby wireless net...

Page 28: ...27...

Page 29: ...wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards t...

Page 30: ...client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish and maintai...

Page 31: ...4 5170 36 5180 38 5190 40 5200 42 5210 44 5220 46 5230 48 5240 52 5260 56 5280 60 5300 64 5320 149 5745 153 5765 157 5785 161 5805 When set to Auto the device will find the least congested channel for...

Page 32: ...setting is Auto The wireless client can associate with the device by using one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent...

Page 33: ...pport the long preamble The short preamble optional maybe used to improve throughput when all stations on the network support the short preamble Broadcast SSID Broadcasting the SSID will let your wire...

Page 34: ...s 1 3 clients to transmit at higher speeds In larger networks this will result in degraded performance Transmit Power The device supports four transmission output power levels 250 200 150 and 100mW fo...

Page 35: ...ecurity function you need Encryption Wired Equivalent Privacy WEP is implemented in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client...

Page 36: ...g The device supports an external RADIUS Server that can secure networks against unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the user...

Page 37: ...tion mode is Enterprise RADIUS you have to add user accounts and the target device to the RADIUS Server In the device you need to specify the IP address Password Shared Secret and Port number of the t...

Page 38: ...figuration The bridging devices by WDS must use the same radio channel When the WDS function is enabled no wireless stations can connect to the device If your network topology has a loop you need to e...

Page 39: ...eferred SSID and BSSID in a fixed period If preferred APs are found the radio will try to connect to them one by one regardless of the signal quality and strength Please note that checking the preferr...

Page 40: ...39...

Page 41: ...resses as shown in the following page When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will be set to the IP address of...

Page 42: ...of the DNS addresses IP Address The Internet Protocol IP address of WAN interface provided by your ISP or MIS The address will be your network identifier outside of your local network Subnet Mask The...

Page 43: ...destination DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists of domain name IP addresses and map...

Page 44: ...equests to other servers on the Internet until the specified web site is found Clone MAC Address Clone device MAC address to the specific MAC address required by your ISP Enable uPnP Enable uPnP this...

Page 45: ...need to change the MTU for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS ma...

Page 46: ...U for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists...

Page 47: ...46 Clone MAC address for Static IP WAN access type Clone MAC address for PPPoE WAN access type...

Page 48: ...47 Clone MAC address for PPTP WAN access type Physical LAN interface MAC address clone...

Page 49: ...tton Static Route Setup You can set the routing information to let the Router know what routing is correct if it cannot learn automatically through other means For example if the user wants to link th...

Page 50: ...nge button In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1 2 to transmit and receive the route information with other Rout...

Page 51: ...50 In the Dynamic Routing Table there are two routings for Network 3 and Network 4...

Page 52: ...table When the source port of outgoing packets matches the port definition or falls within the port ranges in the table the firewall will block those packets from LAN to WAN IP Filtering When you enab...

Page 53: ...en used port numbers are shown in the following table Services Port Number ECHO 7 FTP File Transfer Protocol 21 Telnet 23 SMTP Simple Mail Transfer Protocol 25 DNS Domain Name System 53 Finger 79 HTTP...

Page 54: ...cessible to Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers All inbound packets will be redirected to the computer you set It also is useful if you run some a...

Page 55: ...54 Configuring VPN...

Page 56: ...m 30 and Low 20 The following table describes the priorities that you can apply to bandwidth Priority Level Description High Typically used for voice or video applications that is especially sensitive...

Page 57: ...sk Once the source destination IP Address is entered the subnet mask address must be filled in this field MAC Address Enter source destination MAC Address Port range You can enter specific port number...

Page 58: ...le User C wants to use software phone to connect with customer Since VoIP traffic is sensitive to variations in delay jitter you can set High priority for User C However because the FTP transmission m...

Page 59: ...a that from Wireless interface to Ethernet interface Downstream Latency Similar a waiting time the data queuing time Downstream Burst Packet Similar a buffer the data will into the buffer while the da...

Page 60: ...boot the device linkDown 2 The trap is sent when any of the links are down See the following table linkup 3 The trap is sent when any of the links are UP See the following table authenticationFailure...

Page 61: ...6 1 4 1 99 1 Mode 1 3 6 1 4 1 99 2 SSID 1 3 6 1 4 1 99 3 Channel 1 3 6 1 4 1 99 4 Band 1 3 6 1 4 1 99 5 RSSI 1 3 6 1 4 1 99 6 Active_Clients 1 3 6 1 4 1 99 7 Active_Clients_List 1 3 6 1 4 1 99 8 Encr...

Page 62: ...fault setting upon rebooting and the original configuration data will be lost To upgrade the firmware just enter the file name with full path and click the Upload button Memory Limitation To make sure...

Page 63: ...our local host then you can back up the configuration data to local host or restore configuration data to the device Password The Web Browser interface has password protection To disable the Web Brows...

Page 64: ...n your firmware version Once the user has logged in to the device then the password can be changed by CLI command Execute CLI program This program won t execute automatically when user logs in to the...

Page 65: ...64 Menu Tree List Password The SSH Configuration interface has password protection Please note that this password is separate from the web configuration password...

Page 66: ...65...

Page 67: ...ork and you would see the basic information about these devices such as SSID IP Address Subnet Mask Channel number MAC Address Setup IP After you press the Setup IP button you will see Setup IP Addres...

Page 68: ...67 Detail If you want to see more detailed information you could press the Detail button and then you will see the Detail Information window...

Page 69: ...you will see the WDS List window Active Clients After pressing the Active Clients button you will see the WLAN AP Active Clients window with information such as Connect to Web Server If you want conne...

Reviews: