background image

11g Wireless Client Bridge/AP 

 

 

 

 

                         Version 1.36 

 

 

 28 

 

 

4.4.4 Site Survey 

ƒ

 Click 

on 

the 

Site Survey

 link under the 

Wireless

 menu. This page displays the list of 

Access Points in the coverage area and allows you to connect to them if you have 
the required credentials.  

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

ƒ

 

The site survey table lists the following: 

o

  SSID: This is the unique name of the wireless network. 

o

  BSSID: This is the MAC address of the Access Point. 

o

  Channel: This indicates the current channel that the Access Point is 

operating on, along with the 802.11 network type (B, G, or B+G). 

o

  Encrypt: This indicates the encryption type. 

o

  Signal: This indicates the signal strength of the Access Point.  

ƒ

  You may select the radio button of a specific Access Point and then click on the 

Conenct

 button. If the credentials of this device match that of the Access Point that 

you will be connected immediately, if not, you must specify the appropriate 
credentials.  

ƒ

 

You may click on the Refresh button at any time to re-scan the area.  

 
 
 
 
 
 
 
 
 
 
 
 
 

 
 
 
 
 

Summary of Contents for ECB-3220

Page 1: ...11g Wireless Client Bridge AP User s Manual Version 1 36 ...

Page 2: ...NAGEMENT 14 4 2 1 OPERATION MODE 14 4 2 2 STATUS 16 4 2 3 STATISTICS 17 4 2 4 LOG 17 4 2 5 UPGRADE FIRMWARE 18 4 2 6 SAVE RELOAD SETTINGS RESET TO DEFAULT 18 4 2 7 PASSWORD 19 4 3 TCP IP SETTINGS 20 4 3 1 LAN INTERFACE 20 4 4 WIRELESS 21 4 4 1 BASIC SETTINGS INFRASTRUCTURE ADHOC 21 4 4 2 ADVANCED SETTINGS INFRASTRUCTURE ADHOC 22 4 4 3 SECURITY 24 4 4 3 1 ENCRYPTION DISABLED 24 4 4 3 2 WEP 64 BIT 1...

Page 3: ...39 5 4 1 BASIC SETTINGS 40 5 4 2 ADVANCED SETTINGS 40 5 4 3 SECURITY 42 5 4 3 1 ENCRYPTION DISABLED 43 5 4 3 2 WEP 64 BIT 128 BIT 44 5 4 3 3 WPA WPA2 WPA2 MIXED PASSPHRASE 45 5 4 3 4 WPA WPA2 WPA2 MIXED RADIUS AUTHENTICATION 46 5 4 4 ACCESS CONTROL 47 5 4 5 WDS 48 APPENDIX A SPECIFICATIONS 50 APPENDIX B FCC INTERFERENCE STATEMENT 51 ...

Page 4: ...11g Wireless Client Bridge AP Version 1 36 4 Revision History Version Date Notes 1 36 April 26 2006 ...

Page 5: ...xactly which stations should have access to your network This chapter describes the features benefits package contents applications and network configuration 1 1 Features Benefits Features Benefits High Speed Data Rate Up to 54Mbps Capable of handling heavy data payloads such as MPEG video streaming High Output Power and High Sensitivity Spreads the operation distance and reduce the roaming betwee...

Page 6: ...The following are the minimum system requirements in order configure the device h PC AT compatible computer with a Ethernet interface h Operating system that supports HTTP web browser 1 5 Applications The wireless LAN products are easy to install and highly efficient The following list describes some of the many applications made possible through the power and flexibility of wireless LANs a Diffic...

Page 7: ... Network managers implement wireless LANs to provide backup for mission critical applications running on wired networks h Training Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information information exchanges and learning 1 6 Network Configuration To better understand how the wireless LAN products work together to c...

Page 8: ...communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater which effectively doubles the distance between wireless stations The image below depicts a network in infrastructure mode ...

Page 9: ...pter into the PoE injector port labeled DC240V and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 IP Address Configuration This device can be configured as a Bridge or Access Point The default IP address of the device is 192 168 1 1 In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the control...

Page 10: ...r PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example Device IP address 192 168 1 1 PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Page 11: ...1 of the bridge into the address bar of the web browser 2 By default a user name and password has not been configured If you have configured a user name and password please enter them into the field to continue 3 Once you have logged in click on the Operation Mode link under the Management menu 4 Since this device is currently in Bridge mode the Bridge radio button will be selected by default 5 Se...

Page 12: ... a user name and password please enter them into the field to continue 3 Once you have logged in click on the Operation Mode link under the Management menu 4 Since this device is currently in Access Point mode the AP radio button will be selected by default 5 Select the Bridge or Bridge Router radio button to and then click on the Apply Change to switch the operation mode to Bridge 6 Wait for abou...

Page 13: ...g in you will graphical user interface GUI of the bridge The navigation drop down menu on left is divided into three main sections 1 Management This includes operation mode status statistics logs upgrade firmware save reload settings and password 2 TCP IP Settings This includes the configuration of the LAN port and settings for the LAN IP subnet mask DHCP client spanning tree and MAC cloning 3 Wir...

Page 14: ...ent state of the bridge It may be scanning or associated or disabled TCP IP Configuration o Attain IP Protocol The IP address setting may be fixed or static o IP Address Displays the current IP address of the LAN port o Subnet Mask Displays the current subnet mask for the IP address o Default Gateway Displays the default gateway for the device o DHCP Displays the DHCP setting o MAC Address Display...

Page 15: ...y Change button Wait for about a minute until you see the following Pop Up message Click on the OK button and then enter the specified IP address into the web browser Switch to other mode the configuration settings will continue using Refer to Chapter 5 to learn how to configure this device in Access Point mode ...

Page 16: ...P or WDS o Band Frequency and IEEE 802 11 operation mode b only g only or b g o SSID The name used to identify the wireless network o Channel Number The channel used to communicate on the wireless network o Encryption The type of security used on this network It may be disabled WEP WPA etc o BSSID The MAC address of the SSID o State The current state of the bridge It may be scanning or associated ...

Page 17: ... on the Ethernet and Wireless interface Since the packet counter is not dynamic you must click on the Refresh button for the most recent statistics 4 2 4 Log Click on the Log link under the Management menu The Log page displays a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be ...

Page 18: ...re from your vendor Click on the Browse button and then select the appropriate firmware and then click on the Upload button Note The upgrade process may take about 1 minute to complete Do not power off the device during this process as it may crash the device and make it unusable The device will restart automatically once the upgrade is complete 4 2 6 Save Reload Settings Reset to Default Click on...

Page 19: ...Password link under the Management menu This option allows you to create a user name and password for the device By default this device is configured without a user name and password For security reasons it is highly recommended that you create a user name and password Enter a user name into the first field Enter a password into the New Password field and then re type the password into the Confirm...

Page 20: ...ddress Enter the IP address Subnet Mask Enter the subnet mask for the IP address Default Gateway Enter the IP address for the default gateway DHCP If this device is a DHCP client and will receive its IP settings from a DHCP server then select Enabled from the drop down list Enabling the DHCP client will disable the IP address subnet mask and default gateway fields If the DHCP option is Disabled th...

Page 21: ... of SNMP Trap Host 4 4 Wireless Click on the Wireless link on the navigation drop down menu You will then see four options basic settings advanced settings security and site survey Each option is described below 4 4 1 Basic Settings Infrastructure Adhoc Click on the Basic Settings link under the Wireless menu Using this option you may configure the 802 11b g settings as well as the frequency chann...

Page 22: ...s not required however when selecting Adhoc mode you must select the same channel on all points Enable MAC cloning Change the Bridge s MAC to the connected Client s MAC which is the first client connects with Bridge This function only allow one Client connect to network Clone MAC Address Bridge s MAC will be defined by the value in blank space Click on the Apply Changes button to confirm the chang...

Page 23: ...ed to select Auto if you are not sure which authentication type is used Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Beacon Interval Beacons will b...

Page 24: ...tter performance The Default is disabled Click on the Apply Changes button to confirm the changes This device will automatically restart once these changes have been applied 4 4 3 Security Click on the Security link under the Wireless menu On this page you can configure the authentication and encryption settings such as WEP WPA and 80 1x 4 4 3 1 Encryption Disabled Encryption Select None from the ...

Page 25: ... WEP from the drop down list if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network Set WEP Key Click on this button to configure the WEP Key ...

Page 26: ...drop down list if your wireless network uses this encryption WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm...

Page 27: ...the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with WPA Authentication Mode Select the Enterprise RADIUS radio button WPA WPA2 Select TKIP or AES as the cipher suite RADIUS Port Enter the port number of the RADIUS server The default is usually 1812 RADIUS IP Address...

Page 28: ...ess of the Access Point o Channel This indicates the current channel that the Access Point is operating on along with the 802 11 network type B G or B G o Encrypt This indicates the encryption type o Signal This indicates the signal strength of the Access Point You may select the radio button of a specific Access Point and then click on the Conenct button If the credentials of this device match th...

Page 29: ... logging in you will graphical user interface GUI of the Access Point The navigation drop down menu on left is divided into three main sections 4 Management This includes operation mode status statistics logs upgrade firmware save reload settings and password 5 TCP IP Settings This includes the configuration of the LAN port and settings for the LAN IP subnet mask DHCP client spanning tree and MAC ...

Page 30: ... Displays the number of clients currently associated to the Access Point TCP IP Configuration o Attain IP Protocol The IP address setting may be fixed or static o IP Address Displays the current IP address of the LAN port o Subnet Mask Displays the current subnet mask for the IP address o Default Gateway Displays the default gateway for the device o DHCP Displays the DHCP setting o MAC Address Dis...

Page 31: ...ified IP address into the web browser Switch to other mode the configuration settings will continue using Switch to other mode the setting Refer to Chapter 4 to learn how to configure this device in Bridge Router mode 5 2 2 Status Click on the Status link under the Management menu The Status page is the first page that is displayed once you have logged in This includes details about the system wir...

Page 32: ...channel used to communicate on the wireless network o Encryption The type of security used on this network It may be disabled WEP WPA etc o BSSID The MAC address of the SSID o Associated Clients Displays the number of clients currently associated to the Access Point TCP IP Configuration o Attain IP Protocol The IP address setting may be fixed or static o IP Address Displays the current IP address ...

Page 33: ...ays a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes In order for the log to record all the events you must first place a check in the Enable Log or Enable Remote Log Log Server required check box Select system al...

Page 34: ...ete Do not power off the device during this process as it may crash the device and make it unusable The device will restart automatically once the upgrade is complete 5 2 6 Save Reload Settings Reset to Default Click on the Save Reload Setting link under the Management menu This option is used to save the current settings of the device in a file on your local disk or load settings on to the device...

Page 35: ...ecurity reasons it is highly recommended that you create a user name and password Enter a user name into the first field Enter a password into the New Password field and then re type the password into the Confirmed Password field Then click on the Apply Changes button By clicking on the Reset button the user name and password fields will become blank indicating that the username and password has b...

Page 36: ...eceive its IP settings from a DHCP server then select Enabled from the drop down list Enabling the DHCP client will disable the IP address subnet mask and default gateway fields If the DHCP option is Disabled then the IP address subnet mask and default gateway fields must be filled in 802 1d Spanning Tree Select Enabled from the drop down list if you if you would like to use the spanning tree feat...

Page 37: ...will disable the IP address subnet mask and default gateway fields If the DHCP option is Disabled then the IP address subnet mask and default gateway fields must be filled in 802 1d Spanning Tree Select Enabled from the drop down list if you if you would like to use the spanning tree feature Click on the Apply Changes button to confirm the changes This device will automatically restart once these ...

Page 38: ...he clients associated DHCP Client Range Enter the first and last IP address of the range Make sure that the range is on the same subnet as the device You may click on the Show Client button to view a list of IP addresses that were distributed DNS Server Enter the IP address of the DNS server 802 1d Spanning Tree Select Enabled from the drop down list if you if you would like to use the spanning tr...

Page 39: ...Read Write Community Strings Enable Send SNMP Trap to activate the SNMP Trap Agent and input the IP address of SNMP Trap Host 5 4 Wireless Click on the Wireless link on the navigation drop down menu You will then see five options basic settings advanced settings security access control and WDS Each option is described below ...

Page 40: ...etwork The SSID must be identical on all points of the wireless network and cannot exceed 32 characters Channel Select a channel from the drop down list The channels available are based on the country s regulation When selecting Infrastructure mode a channel is not required however when selecting Adhoc mode you must select the same channel on all points Show Active Clients Click on this button to ...

Page 41: ...ommended to select Auto if you are not sure which authentication type is used Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Beacon Interval Beacons ...

Page 42: ...ite survey IAPP It is recommended to Enable the Inter Access Point Protocol IAPP if you would like the clients on the wireless network to seamlessly roam between Access Points of the same SSID 802 11g Protection If your wireless network is using both 802 11b and 802 g devices then it is recommended to enable this feature so that the 802 11b devices will not degrade the performance of 802 11g devic...

Page 43: ...cryption Disabled Encryption Select None from the drop down list if your wireless network does not use any type of encryption Click on the Apply Changes button to confirm the changes This device will automatically restart once these changes have been applied ...

Page 44: ... WEP from the drop down list if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network Set WEP Key Click on this button to configure the WEP Key ...

Page 45: ...d from the drop down list if your wireless network uses this encryption WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashin...

Page 46: ... through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with WPA Authentication Mode Select the Enterprise RADIUS radio button WPA WPA2 Select TKIP AES or both as the cipher suite RADIUS Port Enter the port number of the RADIUS server The default is usually 1812 RAD...

Page 47: ...e table will have access to the network all other clients will be blocked On the other hand selected Deny Listed only the listed MAC address will be blocked from access the network all other clients will have access to the network MAC Address Enter the MAC address Current Access Control list This table lists the blocked or allowed MAC addresses you may delete selected MAC address or delete all the...

Page 48: ... Add WDS AP Enter the MAC address of the Access Point that will join the WDS network along with a comment about the AP Current WDS AP list This table lists MAC addresses you may delete selected MAC address or delete all the addresses from the table by clicking on the associated buttons Click on the Apply Changes button to confirm the changes This device will automatically restart once these change...

Page 49: ...cters where as 128 bit keys require 26 characters A hex key is defined as a number between 0 through 9 and letter between A through F Key Length Select a 64 bit or 128 bit from the drop down list Pre Shared Key Format Select Passphrase from the drop down list Pre Shared Key Enter the pass phrase this should be between 8 and 63 characters Click on the Apply Changes button to confirm the changes Thi...

Page 50: ...s 16 QAM 24 and 36 Mbps 64 QAM 48 and 54 Mbps Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 88dBm 6Mbps 70dBm 54Mbps Available Transmit Power Max 26dBm 1 24Mbps 23dBm 36Mbps 21dBm 48Mbps 20dBm 54Mbps RF Connector TNC Type Female Reverse Networking Topology Ad Hoc Infrastructure Operation Mode Point to Point Point to Multipoint Bridge AP Client Bridg...

Page 51: ...wing measures z Reorient or relocate the receiving antenna z Increase the separation between the equipment and receiver z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance c...

Reviews: