background image


 

Advanced Settings .......................................................................................................................................................... 31

 

Authentication Type ..........................................................................................................................................................................31

 

Fragment Threshold .........................................................................................................................................................................31

 

RTS Threshold .................................................................................................................................................................................31

 

Beacon Interval.................................................................................................................................................................................32

 

ACK Timing ......................................................................................................................................................................................32

 

Client Expired Time ..........................................................................................................................................................................32

 

MTU Size .........................................................................................................................................................................................32

 

Data Rate .........................................................................................................................................................................................32

 

Preamble Type .................................................................................................................................................................................32

 

Broadcast SSID ................................................................................................................................................................................32

 

IAPP .................................................................................................................................................................................................32

 

802.11g Protection ............................................................................................................................................................................32

 

Block WLAN Relay (Isolate Client) ....................................................................................................................................................32

 

Turbo Mode ......................................................................................................................................................................................33

 

Aggregation Mode ............................................................................................................................................................................33

 

Tx Burst Mode ..................................................................................................................................................................................33

 

Transmit Power .................................................................................................................................................................................33

 

Security ........................................................................................................................................................................... 34

 

Encryption ........................................................................................................................................................................................34

 

WPA Authentication Mode ................................................................................................................................................................36

 

Access Control ................................................................................................................................................................ 37

 

WDS Settings .................................................................................................................................................................. 37

 

Site Survey ...................................................................................................................................................................... 37

 

Connecting Profile ........................................................................................................................................................... 38

 

TCP/IP Configuration ........................................................................................................................................................ 40

 

Configuring LAN Interface ............................................................................................................................................... 40

 

Configuring DHCP Server .................................................................................................................................................................40

 

Configuring WAN Interface .............................................................................................................................................. 40

 

Static IP ............................................................................................................................................................................................41

 

PPPoE ..............................................................................................................................................................................................43

 

PPTP ................................................................................................................................................................................................44

 

Configuring Clone MAC Address ......................................................................................................................................................45

 

VPN Pass-through ............................................................................................................................................................................48

 

Static Route Setup .......................................................................................................................................................... 48

 

Dynamic Route Setup ..................................................................................................................................................... 49

 

Firewall Configuration ...................................................................................................................................................... 51

 

Configuring LAN to WAN Firewall ................................................................................................................................... 51

 

Port Filtering .................................................................................................................................................................... 51

 

IP Filtering ....................................................................................................................................................................... 51

 

MAC Filtering .................................................................................................................................................................. 51

 

Configuring Port Forwarding (Virtual Server) .................................................................................................................. 52

 

Multiple Servers behind NAT Example: ........................................................................................................................... 52

 

Configuring DMZ ............................................................................................................................................................. 53

 

Configuring VPN ............................................................................................................................................................. 54

 

Management Configuration ............................................................................................................................................. 55

 

Quality of Service (QoS) ................................................................................................................................................. 55

 

QoS Rule settings .............................................................................................................................................................................56

 

Current QoS setting table .................................................................................................................................................................56

 

Bandwidth Control ........................................................................................................................................................... 57

 

SNMP Agent .................................................................................................................................................................... 58

 

Upgrade Firmware .......................................................................................................................................................... 61

 

Firmware Types ................................................................................................................................................................................61

 

Upgrading Firmware .........................................................................................................................................................................61

 

Save/Reload Settings ...................................................................................................................................................... 61

 

Reset Setting to Factory Default Value .............................................................................................................................................61

 

Password ........................................................................................................................................................................ 62

 

Using CLI Menu ................................................................................................................................................................. 63

 

Start a SSH(Secure Shell) client session to login to the device .........................................................................................................63

 

Execute CLI program ........................................................................................................................................................................63

 

Menu Tree List ..................................................................................................................................................................................64

 

Password .........................................................................................................................................................................................64

 

Summary of Contents for DLB70XX

Page 1: ...DLB70XX WLAN Dual Outdoor Radio User Manual Version 1 0 0 11 08 2006 ...

Page 2: ...Network Type 15 SSID 15 Channel Number 15 Advanced Settings 17 Authentication Type 17 Fragment Threshold 17 RTS Threshold 17 Beacon Interval 17 ACK Timing 18 Client Expired Time 18 MTU Size 18 Data Rate 18 Preamble Type 18 Broadcast SSID 18 IAPP 18 802 11g Protection 18 Block WLAN Relay Isolate Client 18 Turbo Mode 18 Aggregation Mode 18 Tx Burst Mode 19 Transmit Power 19 Security 20 Encryption 20...

Page 3: ...tic IP 41 PPPoE 43 PPTP 44 Configuring Clone MAC Address 45 VPN Pass through 48 Static Route Setup 48 Dynamic Route Setup 49 Firewall Configuration 51 Configuring LAN to WAN Firewall 51 Port Filtering 51 IP Filtering 51 MAC Filtering 51 Configuring Port Forwarding Virtual Server 52 Multiple Servers behind NAT Example 52 Configuring DMZ 53 Configuring VPN 54 Management Configuration 55 Quality of S...

Page 4: ...3 Auto Discovery Tool 66 Discover 66 Setup IP 66 Detail 67 WDS 68 Active Clients 68 Connect to Web Server 68 ...

Page 5: ...ing antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from where the receiver is connected Consult the dealer or an experienced radio TV technician for help Changes or modifications to this equipment not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment FCC...

Page 6: ... that are of the same type and with lesser gain than those that are certified with this device may be used legally by the installer Packing List Before you start to install the device make sure the package contains the following items Wireless Outdoor Bridge unit 1 Mounting Kit 1 Power Over Ethernet Kit 1 ...

Page 7: ...example shows how to create a bridged Access Point using both the 802 11A radio and the 802 11B G radio The Operation Mode needs to be set to Bridge This bridges both wireless interfaces and the ethernet interface In the Wireless wlan1 Basic Settings section uncheck Disable Wireless LAN Interface checkbox Set the Mode to AP Assign the SSID For this example we used DLB_AP_BG since this is the 802 1...

Page 8: ...Disable Wireless LAN Interface checkbox Set the Mode to AP Assign the SSID For this example we used DLB_AP_A since this is the 802 11A interface For ease of management it might be beneficial to change the LAN IP address to reside on the same subnet as the other PCs in your bridged network ...

Page 9: ...pter In this mode the device can connect to the other wireless stations Ad Hoc network type or Access Point Infrastructure network type and you don t need to install any driver In Basic Settings page change the Mode to Client mode And key in the SSID of the AP you want to connect then press Apply Changes button to apply the change Check the status of connection in the Status web page 2 1 3 ...

Page 10: ...nd then press Connect button to establish the link If the link is established successfully it will show the message Connect successfully Then press OK Then you can check the linking information in Status page NOTE If the available network requires authentication and data encryption you need to setup the authentication and 1 3 2 ...

Page 11: ...the device supports WEP and WPA Personal Enterprise except WPA2 mixed mode data encryption For more information about the detail data encryption settings please refer the security section Configuring Universal Repeater This device can be configured as a Repeater In this mode the device can extend the available wireless range of other AP and let the user link to the network that they want The devic...

Page 12: ...in the same subnet as the device such as 192 168 2 X for LAN 172 1 1 X for WAN NOTE By default the DHCP server is enabled Do not have multiple DHCP servers in your network environment otherwise it will cause an abnormal situation We also provide an auto discovery tool which is used for finding out the IP of the device In case you have forgotten the IP of the device or the IP of the device has been...

Page 13: ...irement Bridge The wired Ethernet and wireless NIC are bridged together Once Bridge mode is selected all the WAN related functions will be disabled WISP Wireless ISP This mode allows the wireless NIC to act as the WAN port and the wired NIC to act as the LAN port with NAT enabled between them To use this mode you must first set the wireless radio to be in client mode and connect to the AP of your ...

Page 14: ...re the same public IP address from your ISP WDS Wireless Distribution System This mode serves as a wireless repeater the device forwards the packets to another AP with WDS function When this mode is selected no wireless clients can survey or connect to the device The device only allows the WDS connection WDS AP This mode combines WDS plus AP modes it not only allows WDS connections but also allows...

Page 15: ...l wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards the packets to another AP with WDS function When this mode is selected no wireless clients can survey or connect to the device The device only allows the WDS connection AP WDS This mode combines WDS p...

Page 16: ...nnection In client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity Multiple access point bridges on a network or sub network can use the same SSID SSIDs are case sensitive and can contain up to 32 alphanumeric characters Do not incl...

Page 17: ...as EMEA Japan Israel and China 7 2442 Americas EMEA Japan Israel and China 8 2447 Americas EMEA Japan Israel and China 9 2452 Americas EMEA Japan Israel and China 10 2457 Americas EMEA Japan and China 11 2462 Americas EMEA Japan and China 12 2467 EMEA and Japan only 13 2472 EMEA and Japan only 14 2484 Japan only When set to Auto the device will find the least congested channel for use ...

Page 18: ...ing one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent as several pieces instead of as one block Use a low setting in areas where communication is poor or where there is a great deal of radio interference This function will help you to improve the network performance RTS Threshold The RTS threshold determines the packet size...

Page 19: ...our wireless clients find the device automatically If you are building a public Wireless Network disabling this function can provide better security Every wireless station located within the coverage of the device must connect to this device by manually configuring the SSID in your client settings IAPP 802 11f This provides a mechanism for association data e g encryption settings station informati...

Page 20: ...ode and two transmission output power levels 100 and 50mW for OFDM 802 11g mode You can adjust the power level to change the coverage of the device Every wireless station located within the coverage of the device also needs to have the high power radio Otherwise the wireless station can only survey the device and cannot establish a connection with device ...

Page 21: ...ed in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client in your wireless network For more secure data transmission you can change the encryption type to WEP and click the Set WEP Key button to open the Wireless WEP Key setup page When you decide to use the WEP encryption to secure your WLAN please refer to the following settings of ...

Page 22: ...st unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the users In this way every user must use a valid account before accessing the Wireless LAN and requires a RADIUS or other authentication server on the network An example is shown as follows You should choose WEP 64 or 128 bit encryption based on your current network requirements Then ...

Page 23: ...e requires only an access point and client station that supports WPA PSK The WPA PSK settings include Key Format Length and Value They must be the same as each wireless client in your wireless network When the Key format is Passphrase the key value should have 8 63 ACSII chars When Key format is Hex the key value should have 64 hexadecimal digits 0 9 a f or A F Access Control WDS Settings Wireless...

Page 24: ...demonstrate the WDS network topologies and WDS AP List configuration You can setup four kinds of network topologies bus star ring and mesh In this case there are five devices with WDS enabled WDS1 WDS2 WDS3 WDS4 and WDS5 Bus topology Device Entries of WDS AP List Spanning Tree Protocol Required WDS1 The MAC Address of WDS2 No WDS2 The MAC Addresses of WDS1 and WDS3 No WDS3 The MAC Addresses of WDS...

Page 25: ...Address of WDS1 No Ring topology Device Entries of WDS AP List Spanning Tree Protocol Required WDS1 The MAC Addresses of WDS2 and WDS5 Yes WDS2 The MAC Addresses of WDS1 and WDS3 Yes WDS3 The MAC Addresses of WDS2 and WDS4 Yes WDS4 The MAC Addresses of WDS3 and WDS5 Yes WDS5 The MAC Addresses of WDS4 and WDS1 Yes ...

Page 26: ...DS1 WDS2 WDS3 and WDS4 Yes Wireless Repeater A Wireless Repeater can be used to increase the coverage area of another device Parent AP Between the Parent AP and the Wireless Repeater wireless stations can move among the coverage areas of both devices When you decide to use the WDS as a Repeater please refer to the following instructions for configuration In AP mode enable the WDS function You must...

Page 27: ...SSID Choose WDS mode for only wireless backbone extension purpose You can use any network topology please refer the WDS topology section Site Survey This tool allows you to scan for nearby wireless networks If any Access Point or IBSS is found you can choose to connect it manually when client mode is enabled Connecting Profile If you enable the connecting profile in client mode the system will che...

Page 28: ...27 ...

Page 29: ...l wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards the packets to another AP with WDS function When this mode is selected no wireless clients can survey or connect to the device The device only allows the WDS connection AP WDS This mode combines WDS p...

Page 30: ...n client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity Multiple access point bridges on a network or sub network can use the same SSID SSIDs are case sensitive and can contain up to 32 alphanumeric characters Do not include spaces...

Page 31: ...34 5170 36 5180 38 5190 40 5200 42 5210 44 5220 46 5230 48 5240 52 5260 56 5280 60 5300 64 5320 149 5745 153 5765 157 5785 161 5805 When set to Auto the device will find the least congested channel for use ...

Page 32: ... setting is Auto The wireless client can associate with the device by using one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent as several pieces instead of as one block Use a low setting in areas where communication is poor or where there is a great deal of radio interference This function will help you to improve the networ...

Page 33: ...upport the long preamble The short preamble optional maybe used to improve throughput when all stations on the network support the short preamble Broadcast SSID Broadcasting the SSID will let your wireless clients find the device automatically If you are building a public Wireless Network disabling this function can provide better security Every wireless station located within the coverage of the ...

Page 34: ...ks 1 3 clients to transmit at higher speeds In larger networks this will result in degraded performance Transmit Power The device supports four transmission output power levels 250 200 150 and 100mW for CCK 802 11b mode and two transmission output power levels 100 and 50mW for OFDM 802 11g mode You can adjust the power level to change the coverage of the device Every wireless station located withi...

Page 35: ...security function you need Encryption Wired Equivalent Privacy WEP is implemented in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client in your wireless network For more secure data transmission you can change the encryption type to WEP and click the Set WEP Key button to open the Wireless WEP Key setup page When you decide to use th...

Page 36: ...ng The device supports an external RADIUS Server that can secure networks against unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the users In this way every user must use a valid account before accessing the Wireless LAN and requires a RADIUS or other authentication server on the network An example is shown as follows You should choos...

Page 37: ...ation mode is Enterprise RADIUS you have to add user accounts and the target device to the RADIUS Server In the device you need to specify the IP address Password Shared Secret and Port number of the target RADIUS server Pre Share Key In this mode you can use the Pre shared Key to enhance your security setting This mode requires only an access point and client station that supports WPA PSK The WPA...

Page 38: ...nfiguration The bridging devices by WDS must use the same radio channel When the WDS function is enabled no wireless stations can connect to the device If your network topology has a loop you need to enable the 802 1d Spanning Tree function You don t need to add all MAC address of devices existing in your network to the WDS AP List The WDS AP List only needs to specify the MAC address of devices y...

Page 39: ...referred SSID and BSSID in a fixed period If preferred APs are found the radio will try to connect to them one by one regardless of the signal quality and strength Please note that checking the preferred APs will have a significant impact on throughput All the profiles share the same security settings ...

Page 40: ...39 ...

Page 41: ...dresses as shown in the following page When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will be set to the IP address of device Configuring WAN Interface The device supports four kinds of IP configuration for WAN interface including Static IP DHCP Client PPPoE and PPTP You can select one of the WAN Access Types depend...

Page 42: ...e of the DNS addresses IP Address The Internet Protocol IP address of WAN interface provided by your ISP or MIS The address will be your network identifier outside of your local network Subnet Mask The number used to identify the IP subnet network indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway ...

Page 43: ...d destination DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists of domain name IP addresses and maps the domain names in your Internet requests to other servers on the Internet until the specified web site is found Clone MAC Address Clone device MAC address to the specific MAC address required by ...

Page 44: ...requests to other servers on the Internet until the specified web site is found Clone MAC Address Clone device MAC address to the specific MAC address required by your ISP Enable uPnP Enable uPnP this function allows the device to be found and configured automatically by the system Ex Window XP PPPoE When the PPPoE Point to Point Protocol over Ethernet WAN Access Type is selected you must fill the...

Page 45: ... need to change the MTU for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists of domain name IP addresses and maps the domain names in your Internet requests to other servers on the Internet until the specified web site is found Clone MAC Address Clone de...

Page 46: ...TU for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists of domain name IP addresses and maps the domain names in your Internet requests to other servers on the Internet until the specified web site is found Clone MAC Address Clone device MAC address to t...

Page 47: ...46 Clone MAC address for Static IP WAN access type Clone MAC address for PPPoE WAN access type ...

Page 48: ...47 Clone MAC address for PPTP WAN access type Physical LAN interface MAC address clone ...

Page 49: ...utton Static Route Setup You can set the routing information to let the Router know what routing is correct if it cannot learn automatically through other means For example if the user wants to link the Network 3 and Network 4 separately from Network 1 the Routing Table configuration would be as shown below Enable Static Routing in Route Setup of TCP IP page and then enter IP Address of Network 3 ...

Page 50: ...ange button In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1 2 to transmit and receive the route information with other Routers Enable Dynamic Route and then select RIP 1 RIP2 or Both to transmit receive packets then click the Apply Change button Click the Show Route Table button to show Dynamic Route Table ...

Page 51: ...50 In the Dynamic Routing Table there are two routings for Network 3 and Network 4 ...

Page 52: ... table When the source port of outgoing packets matches the port definition or falls within the port ranges in the table the firewall will block those packets from LAN to WAN IP Filtering When you enable the IP Filtering function you can specify local IP Addresses in the current filter table When the source IP address of outgoing packets matches the IP Addresses in the table the firewall will bloc...

Page 53: ...ten used port numbers are shown in the following table Services Port Number ECHO 7 FTP File Transfer Protocol 21 Telnet 23 SMTP Simple Mail Transfer Protocol 25 DNS Domain Name System 53 Finger 79 HTTP Hyper Text Transfer Protocol 80 POP3 Post Protocol 110 NNTP Network News Transport Protocol 119 SNMP Simple Network Management Protocol 161 SNMP trap 162 SIP Session Initiation Protocol 5060 PPTP Po...

Page 54: ...ccessible to Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers All inbound packets will be redirected to the computer you set It also is useful if you run some applications e g Internet games that use uncertain incoming ports Enable DMZ Enables the DMZ DMZ Host IP Address Input the IP Address of the computer that you want to expose to the Internet ...

Page 55: ...54 Configuring VPN ...

Page 56: ...um 30 and Low 20 The following table describes the priorities that you can apply to bandwidth Priority Level Description High Typically used for voice or video applications that is especially sensitive to the variations in delay Medium Typically used for important traffic that can tolerate some delay Low Typically used for non critical traffic such as a large number of transfers but that should no...

Page 57: ...ask Once the source destination IP Address is entered the subnet mask address must be filled in this field MAC Address Enter source destination MAC Address Port range You can enter specific port number or port range of the source destination Protocol Select a protocol from the drop down list box Choose TCP UDP TCP or UDP Bandwidth Priority Select a bandwidth priority from the drop down list box Ch...

Page 58: ...ile User C wants to use software phone to connect with customer Since VoIP traffic is sensitive to variations in delay jitter you can set High priority for User C However because the FTP transmission may take a long time you can set Low priority for User B Bandwidth Control This functionality can control the upstream and downstream bandwidth Enable Bandwidth Control and then enter Data Rate Latenc...

Page 59: ...ta that from Wireless interface to Ethernet interface Downstream Latency Similar a waiting time the data queuing time Downstream Burst Packet Similar a buffer the data will into the buffer while the data is transmit or receive SNMP Agent This device is compatible with SNMP v1 v2c and provides standard MIB II Currently only the public community string is available and any setting modified by SNMP S...

Page 60: ...eboot the device linkDown 2 The trap is sent when any of the links are down See the following table linkup 3 The trap is sent when any of the links are UP See the following table authenticationFailure 4 The trap is sent when the device receiving gets or sets requirement with wrong community Private MIBs OID Description 1 3 6 1 4 1 99 1 Mode Operation Mode in device 1 3 6 1 4 1 99 2 SSID SSID of th...

Page 61: ...3 6 1 4 1 99 1 Mode 1 3 6 1 4 1 99 2 SSID 1 3 6 1 4 1 99 3 Channel 1 3 6 1 4 1 99 4 Band 1 3 6 1 4 1 99 5 RSSI 1 3 6 1 4 1 99 6 Active_Clients 1 3 6 1 4 1 99 7 Active_Clients_List 1 3 6 1 4 1 99 8 Encryption ...

Page 62: ...efault setting upon rebooting and the original configuration data will be lost To upgrade the firmware just enter the file name with full path and click the Upload button Memory Limitation To make sure the device has enough memory to upload firmware the system will check the capacity of free memory If the device lacks enough memory to upload the firmware please temporarily turn off some functions ...

Page 63: ...your local host then you can back up the configuration data to local host or restore configuration data to the device Password The Web Browser interface has password protection To disable the Web Browser password protection just leave the User Name field to blank then click the Apply Changes button ...

Page 64: ...on your firmware version Once the user has logged in to the device then the password can be changed by CLI command Execute CLI program This program won t execute automatically when user logs in to the device The user must manually execute it by typing the case sensitive command cli Please note that modified settings won t save permanently until the user executes Apply Changes to Flash and reboots ...

Page 65: ...RIP receive from LAN Static Route F Static Route G Add Static Route Setting H Delete Static Route Setting I Delete all Static Route Setting J Current Static Route Setting List Route Table K Show Route Table List 0 Exit Wireless Basic Settings A Access Point Status B QoS Settings C Bandwidth Control D SNMP Settings E Password 0 Exit Firewall Settings A Port Filtering B IP Filtering C MAC Filtering ...

Page 66: ...65 ...

Page 67: ...our network and you would see the basic information about these devices such as SSID IP Address Subnet Mask Channel number MAC Address Setup IP After you press the Setup IP button you will see Setup IP Address window You can change the device s IP Address Netmask and Default Gateway in this window But if the device s web server needs User Name and Password to login you should fill in these two fie...

Page 68: ...67 Detail If you want to see more detailed information you could press the Detail button and then you will see the Detail Information window ...

Page 69: ... you will see the WDS List window Active Clients After pressing the Active Clients button you will see the WLAN AP Active Clients window with information such as Connect to Web Server If you want connect to device s web server you can press the Connect to Web Server button or double click on the device ...

Reviews: