background image

11a/b/g Wireless Multi-Client Bridge/AP/WDS  

 

 

 

                         Version 1.0 

 

 

 32 

 

4.2.2 Advanced Wireless and WDS 

ƒ

  Click on the 

Advanced 

link under the 

System

 menu. This page allows you to 

configure the fragmentation threshold, RTS threshold, 802.11d, transmit power and 
WDS (wireless distribution system).  

 
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

ƒ

 

Fragment Threshold

: Packets over the specified size will be fragmented in order to 

improve performance on noisy networks. Specify a value between 256 and 65535. 
The default value is 2346.   

ƒ

 

RTS Threshold

: Packets over the specified size will use the RTS/CTS mechanism to 

maintain performance in noisy networks and preventing hidden nodes from 
degrading the performance. Specify a value between 1 and 65535. The default value 
is 2346. 

ƒ

 

Beacon Period

: Beacons are packets sent by a wireless Access Point to 

synchronize wireless devices. Specify a Beacon Period value between 20 and 1000. 
The default value is set to 100 milliseconds.  

ƒ

 

DITM Interval

: A DTIM is a countdown informing clients of the next window for 

listening to broadcast and multicast messages. When the wireless Access Point has 
buffered broadcast or multicast messages for associated clients, it sends the next 
DTIM with a DTIM Interval value. Wireless clients detect the beacons and awaken to 
receive the broadcast and multicast messages. The default value is 1. Valid settings 
are between 1 and 255.  

ƒ

 

802.11d Enable:

 802.11d is a wireless specification for operation in multiple 

regulatory domains. This supplement to the 802.11 specifications defines the 
physical layer requirements (channelization, hopping patterns, new values for current 
MIB attributes, and other requirements to extend the operation of 802.11 WLANs in 
multiple regulatory domains (countries). The current 802.11 standard defines 
operation in only a fixed regulatory domain (country). This supplement adds the 
requirements and definitions necessary to allow WLAN equipment to operate in 

Summary of Contents for ECB-8610

Page 1: ...________ 11a b g Wireless Multi Client Bridge AP User s Manual Version 1 0 ...

Page 2: ...STEM TIME CONFIGURATION 19 3 3 WIRELESS 21 3 3 1 NUMBER OF ACCESS POINTS 21 3 3 2 WIRELESS 11A 11B G CONFIGURATION 22 3 3 3 INFRASTRUCTURE AD HOC MODE 22 3 3 4 WIRELESS SECURITY 23 3 3 4 1 1 WEP WIRED EQUIVALENT PRIVACY 23 3 3 4 1 2 WPA PERSONAL WI FI PROTECTED ACCESS 25 3 4 LAN SETTINGS STATIC DHCP 26 3 5 LOGS 27 3 6 STATISTICS 28 4 ACCESS POINT MODE WEB CONFIGURATION 29 4 1 LOGGING IN 29 4 2 SYS...

Page 3: ...WEP WIRED EQUIVALENT PRIVACY 43 4 3 1 2 WPA PERSONAL WI FI PROTECTED ACCESS 44 4 3 1 3 WPA ENTERPRISE WI FI PROTECTED ACCESS 802 1X 45 4 4 LAN 47 4 5 DHCP SERVER 48 4 6 MAC ADDRESS FILTER 50 4 7 LOGS 51 4 8 STATISTICS 52 APPENDIX A SPECIFICATIONS 53 APPENDIX B FCC INTERFERENCE STATEMENT 54 ...

Page 4: ...________ Revision History Version Date Notes 1 0 June 4 2006 Initial Version ...

Page 5: ...ge contents applications and network configuration 1 1 Features Benefits Features Benefits High Speed Data Rate Up to 54Mbps Capable of handling heavy data payloads such as MPEG video streaming High Output Power up to 26 dBm in 11b g Excellent output power spreads the operation distance IEEE 802 11b g Compliant Fully Interoperable with IEEE 802 11b IEEE802 11g compliant devices Point to point Poin...

Page 6: ...it must be shipped in its original package h One Client Bridge AP h One Power Adapter h One CAT5 UTP Cable h One Dual Band Antenna h One CD ROM with User s Manual 1 3 Bridge AP Description 1 4 System Requirements The following are the minimum system requirements in order configure the device h PC AT compatible computer with a Ethernet interface h Operating system that supports HTTP web browser Bri...

Page 7: ...ng sites where frequently rearrange the workplace e Small Office and Home Office SOHO networks SOHO users need a cost effective easy and quick installation of a small network f Wireless extensions to Ethernet networks Network managers in dynamic environments can minimize the overhead caused by moves extensions to networks and other changes with wireless LANs g Wired LAN backup Network managers imp...

Page 8: ...The image below depicts a network in ad hoc mode b Infrastructure Mode The infrastructure mode requires the use of an access point AP In this mode all wireless communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater whic...

Page 9: ...o the power socket on the wall This diagram depicts the hardware configuration 2 2 IP Address Configuration This device can be configured as a Bridge Router or Access Point The default IP address of the device is 192 168 1 1 Client Bridge mode 192 168 1 2 Access Point mode In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the control panel doubl...

Page 10: ...ur PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example Device IP address 192 168 1 1 192 168 1 2 PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Page 11: ... you will graphical user interface GUI of the bridge The navigation drop down menu on left is divided into six main sections 1 System This menu includes the administrator settings advanced wireless settings such as wireless MAC clone and RTS fragmentation threshold Also included are other system related settings such as firmware upgrade reset to factory defaults and system date time configuration ...

Page 12: ...firmware LAN IP address and MAC address and the wireless settings such as the radio status MAC address SSID RF channel and security General o Displays firmware version and system date LAN o Displays the MAC address IP address and subnet mask of the LAN interface Wireless LAN o Displays the status MAC address SSID RF channel and security settings of the wireless interface ...

Page 13: ...e the password to access this device from the web browser You can also specify a name for the bridge as well as backup and restore the system settings The first part of this page gives you the option to save the changes that were made on this page Click on the Save Settings button once you have configured the administrator settings The second part of this page allows you to configure the user name...

Page 14: ...ame for this device as well as save or restore a configuration Click on the Save Settings button to store the changes Bridge Name Specify a name for this bridge Web Idle Timeout Specify a time in minutes If there is no activity on the configuration pages then web page will close the session at the specified time ...

Page 15: ...n in the dialog box 3 2 1 2 Restore the Configuration from a File This option allows you to restore a backup configuration from a file to the device Click on the Browse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the sys...

Page 16: ... are connected to the Bridge the MAC address of the Bridge will not change Fragment Threshold Packets over the specified size will be fragmented in order to improve performance on noisy networks Specify a value between 256 and 65535 The default value is 2346 RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden ...

Page 17: ...ystem menu This page allows you to upgrade the firmware of the device in order to improve the functionality and performance This page also displays the current firmware version and its release date Ensure that you have downloaded the appropriate firmware from the vendor s website Connect the device to your PC using an Ethernet cable as the firmware cannot be upgraded using the wireless interface C...

Page 18: ...ttings Therefore you may need to restore a configuration from a file Refer to Administrator Settings for details 3 2 4 System Reboot and Restore Settings to Default Click on the System link under the System menu This page allows you to reboot the device using the current settings or restore all the settings to the factory defaults 3 2 4 1 System Reboot Click on the Reboot the Device button to rebo...

Page 19: ...current settings will be lost 3 2 5 System Time Configuration Click on the Time link under the System menu This feature allows you to configure update and maintain the correct time on the device s internal system clock as well as configure the time zone The date and time of the device can be configured manually or by copying the time on the PC that it is wired to Note If the bridge losses power fo...

Page 20: ...ect your time zone from the drop down list Set the Date and Time Select a date and time from the drop down list or do to use computer s time and date click on the Copy Your Computer s Time Settings button Click on the Save Settings button once you have modified the settings ...

Page 21: ...ed to identify the wireless network The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters Channel The channel used to communicate on the wireless network Mode Frequency and IEEE 802 11 operation mode b only g only or b g Privacy The type of security used on this network It ma...

Page 22: ...f this page allows you to configure the device in infrastructure or ad hoc mode Wireless Mode Select the Infrastructure or Ad Hoc radio button Infrastructure is a point to multipoint PtMp topology where as Adhoc is a point to point topology PtP Wireless Network Name The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wire...

Page 23: ... WEP is the original wireless encryption standard WPA provides a higher level of security WPA Personal does not require an authentication server Select the None radio button in order to disable security 3 3 4 1 1 WEP Wired Equivalent Privacy Select the WEP radio button if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provid...

Page 24: ...t to authenticate as long as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted without encryption Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP The device requesting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encry...

Page 25: ... the data communication TKIP Use TKIP only TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Use AES only AES Advanced Encryption Standard is a very secure block based encryption Note that if the bridge uses the AES option the bridge can associate with the access point only if the access point is also set to use only AES TKIP and AES The bridge negotia...

Page 26: ...dio button you are not required to enter the rest of the fields as the IP address will be provided to the device by the AP or DHCP server If you select the Static radio button you must enter the IP address subnet mask and default gateway IP Address Enter an IP address for this device Subnet Mask Enter the subnet mask for this IP address Default Gateway Enter the IP address of the default gateway C...

Page 27: ...on the system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the appropriate box Then click on the Apply Log Settings Now button Log Details The events are logged in this section Click on the Refresh button to refresh the events or click on the Clear button to clea...

Page 28: ...rors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss of a ...

Page 29: ...er Name and password configured by default therefore please leave the password field blank and then click on the Login button After logging in you will graphical user interface GUI of the Access Point The navigation drop down menu on left is divided into seven main sections 1 System This menu includes system related settings such as firmware upgrade reset to factory defaults system date time confi...

Page 30: ...menu This page allows you to configure the password to access this device from the web browser You can also backup and restore the system settings Specify a user name and password and then re type it once again for verification Click on the Save Settings button to store the changes 4 2 1 1 Save Configuration to a File This option allows you to save the current configuration of the device into a fi...

Page 31: ...file to the device Click on the Browse button to select the file and then click on Restore Configuration from a File button The system then prompts you to reboot the device Click on the OK button to continue You will then see the Rebooting page Please wait while the system is rebooting Note Do no un plug the device during this process as this may cause permanent damage ...

Page 32: ...ween 20 and 1000 The default value is set to 100 milliseconds DITM Interval A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless Access Point has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Wireless clients detect the beacons and awaken to receive the broa...

Page 33: ...now the MAC Address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP Make sure the APs are configured with same channel number WDS AP MAC Address Specify one half of the WDS link The other AP must also have the MAC address of this AP to create the WDS link back to this AP Click on the Save Settings button once you have modified the settings 4 2 3 Firmware ...

Page 34: ...lug the device during this process Some firmware upgrades may restore the configuration back to the factory default settings Therefore you may need to restore a configuration from a file Refer to Administrator Settings for details 4 2 4 System Reboot and Restore Settings to Default Click on the System link under the System menu This page allows you to reboot the device using the current settings o...

Page 35: ...he Restore all Settings to Factory Defaults button This option restores al configuration settings back to the settings that were in effect at the time when the device was shipped from the factory Once the dialog box appears click on the OK button to confirm the action Note The current settings will be lost ...

Page 36: ...pying the time on the PC that it is wired to Note If the device losses power for any reason it will not be able to keep its clock running and will not display the correct time once the device has been restarted Therefore you must re enter the correct date and time Time Zone Select your time zone from the drop down list Set the Date and Time Select a date and time from the drop down list or do to u...

Page 37: ...s wizard guides you in through the process of configuring the connection and security features of the Access Point 4 2 6 1 Connection Setup Wizard The connection wizard will guide you through the steps to get your network connection up and running Click on the Launch Setup Wizard button Click on the Next button to continue ...

Page 38: ... Next button Select your time zone from the drop down list and then click on the Next button The setup wizard is almost complete click on the Connect button The configuration has been saved click on the Reboot the Device button The dialog box asks you to confirm your action click on the OK button The connection wizard is complete Please wait while the system is rebooting Note Do no un plug the dev...

Page 39: ...ork Name SSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters Click on the Next button to continue In order to protect your network from hackers and unauthorized users it is highly recommended to secure the network using encryption and authentication Select a level of s...

Page 40: ...eless Security Level BEST Select the BEST radio button which supports WPA2 encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Page 41: ...less Security Level BETTER Select the BETTER radio button which supports WPA encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Page 42: ...reless Security Level GOOD Select the GOOD radio button which supports WPA encryption Then click on the Next button Enter a security password between 2 and 20 characters then click on the Next button The setup is complete Click on the Save button and then reboot the device ...

Page 43: ...02 11g clients then it is recommended to select 802 11g only instead of Mixed 802 11g and 802 11b which will reduce the performance of the wireless network You may also select 802 11b only or 802 11a only Click on the Save Settings button once you have modified the settings 4 3 1 1 WEP Wired Equivalent Privacy Select the WEP radio button if your wireless network uses WEP encryption WEP is an acron...

Page 44: ...esting authentication encrypts the challenge text and sends it back to the access point If the challenge text is encrypted correctly the access point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Click on the Save Settings button once you have modified the settings 4 3 1 2 WPA Personal Wi Fi Protected Access Sele...

Page 45: ...n It cannot be shorter than eight characters although for proper security it needs to be of ample length and should not be a commonly known phrase This phrase is used to generate session keys that are unique for each wireless client Click on the Save Settings button once you have modified the settings 4 3 1 3 WPA Enterprise Wi Fi Protected Access 802 1x Select the WPA Enterprise radio button if yo...

Page 46: ...er of seconds before the group key used for broadcast and multicast data is changed Authentication Timeout Specify the number of minutes after which the client will be required to re authenticate RADIUS Server IP Address Specify the IP address of the RADIUS server RADIUS Server Port Specify the port number of the RADIUS server the default port is 1812 RADIUS Server Shared Secret Specify the pass p...

Page 47: ...following fields Choose Static IP Manual if your router does not support DHCP or if for any other reason you need to assign a fixed address to this device Note You cannot choose DHCP Dynamic if you have enabled the DHCP Server option on the DHCP page this device cannot be both a DHCP client and a DHCP server IP Address Enter an IP address for this device Subnet Mask Enter the subnet mask for this ...

Page 48: ... a DHCP Server DHCP IP Address Range Enter the first and last IP address of the range Make sure that the range is on the same subnet as the device These two IP values from and to define a range of IP addresses that the DHCP Server uses when assigning addresses to computers and devices on your Local Area Network Any addresses that are outside of this range are not managed by the DHCP Server these c...

Page 49: ...o all clients thereby working around the problem at the cost of increased broadcast traffic on the LAN Click on the Save Settings button once you have modified the settings Enable DHCP Reservation You may use this feature to reserve a specific IP address for a specific MAC address node Place a check in this box to enable this feature IP Address Specify the IP address MAC Address Specify the MAC ad...

Page 50: ...tting from the drop down list When only allow listed machines is selected only computers with MAC addresses listed in the MAC Address List are granted network access When only deny listed machines is selected any computer with a MAC address listed in the MAC Address List is refused access to the network Filter Wireless Clients Place a check in this box if you would like to filter wireless clients ...

Page 51: ...e system or when a report needs to be sent to the technical support department for debugging purposes Log Options Select the type of warning that you would like recorded and place a check in the appropriate box Then click on the Apply Log Settings Now button Log Details The events are logged in this section Click on the Refresh button to refresh the events or click on the Clear button to clear the...

Page 52: ... errors collisions or bridge resource limitations RX Packets Dropped The number of packets that were dropped while being received due to errors collisions or bridge resource limitations Collisions The number of packets that were dropped due to Ethernet collisions two or more devices attempting to use an Ethernet circuit at the same time Errors The number of transmission failures that cause loss of...

Page 53: ...s 88dBm 54Mbps 70dBm 2 412 2 472G IEEE802 1 1g 6Mbps 91dBm 54Mbps 74dBm 2 412 2 472G IEEE802 1 1b 11Mbps 90dBm 1Mbps 95dBm Available Transmit Power Typical 5 15 5 24 GHz IEEE802 11a 17dBm 6 36Mbps 16 dBm 48Mbps 15 dBm 54Mbps 5 26 5 35GHz IEEE802 11a 20dBm 6 24Mbps 18dBm 36Mbps 16 dBm 48Mbps 15 dBm 54Mbps 5 745 5 85GHz IEEE802 11a 18dBm 6 24Mbps 16dBm 36Mbps 14 dBm 48Mbps 13 dBm 54Mbps 2 412 2 472G...

Page 54: ...ceived including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be...

Page 55: ... 55 Les conditions de fonctionnement sont sujettes à deux conditions Ce périphérique ne doit pas causer d interférence et Ce périphérique doit accepter toute interférence y compris les interférences pouvant perturber le bon fonctionnement de ce périphérique ...

Reviews: