background image

www.lanpro.com

Wireless - Equipment - 2.4 GHz - LP-1522 User Manual 

36

What is Advanced Encryption Standard (AES)?

Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation cryptography 

algorithm, which will replace DES and 3DES.

4.19

What is Inter-Access Point Protocol (IAPP)?

The IEEE 802.1 If Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability, enabling roaming 

of 802.11 Stations within IP subnet.

IAPP  defi nes  messages  and  data  to  be  exchanged  between  Access  Points  and  between  the  IAPP  and  high  layer 

management entities to support roaming. The IAPP protocol uses TCP for inter-Access Point communication and UDP 

for  RADIUS  request/response  exchanges.  It  also  uses  Layer  2  frames  to  update  the  forwarding  tables  of  Layer  2 

devices.

4.20

What is Wireless Distribution System (WDS)?

The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless channel, like the 

wireless bridge or repeater service.

4.21

What is Universal Plug and Play (uPNP)?

UPnP is an open networking architecture that consists of services, devices, and control points. The ultimate goal is to 

allow data communication among all UPnP devices regardless of media, operating system, programming language, 

and wired/wireless connection.

4.22

What is Maximum Transmission Unit (MTU) Size?

Maximum  Transmission  Unit  (MTU)  indicates  the  network  stack  of  any  packet  is  larger  than  this  value  will  be 

fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate its MRU 

and will be accepted. The actual MTU of the PPP connection will be set to the smaller one of MTU and the peer’s MRU. 

The default is value 1400.

4.23

What is Clone MAC Address?

Clone MAC address is designed for your special application that request the clients to register to a server machine 

with  one identifi ed MAC address. Since that all  the clients  will  communicate outside  world  through the WLAN AP 

Router, so have the cloned MAC address set on the WLAN AP Router will solve the issue.

4.24

What is DDNS?

DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for user own the DNS server with dynamic 

WAN IP address.

4.25

What is NTP Client?

NTP client is designed for fetching the current timestamp from internet via Network Time protocol. User can specify 

time zone, NTP server IP address.

4.26

What is VPN?

VPN is the abbreviation of Virtual Private Network. It is designed for creating point-to point private link via shared or 

public network.

What is IPSEC?

IPSEC is the abbreviation of IP Security. It is used to transferring data securely under VPN.

For Additional Support: 

[email protected]

4.27

4.28

Summary of Contents for LP-1522

Page 1: ...gh Speed Long Range 802 11b g 54Mbps Wireless Broadband AP and Router High Power 800mW with External Antenna LP1522_UM_ENB02W LP 1522 User Manual High Speed Long Range 802 11b g 54Mbps Wireless Broadb...

Page 2: ...use harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following...

Page 3: ...ons Commission FTP File Transfer Protocol IEEE Institute of Electrical and Electronic Engineers IKE Internet Key Exchange IP Internet Protocol ISM Industrial Scienti c and Medical LAN Local Area Netwo...

Page 4: ...t ready for eld installation The Wireless LAN Broadband LanPro 1522 Router is an affordable IEEE 802 11b g wireless LAN broadband router solution setting SOHO and enterprise standard for high performa...

Page 5: ...2 Installation 1 2 1 3 Package contents The package of the LP 1522 WLAN Broadband Router includes the following items The LP 1522 WLAN Broadband Router The AC to DC power adapter The Documentation CD...

Page 6: ...og box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IP Address 192 168...

Page 7: ...wing example IP Address 192 168 1 1 IP address within the range of 192 168 1 1 to 192 168 1 253 is used to connect the WLAN AP Router IP Subnet Mask 255 255 255 0 7 For Microsoft Windows NT 1 Click th...

Page 8: ...e of WLAN AP Router and haredamong its service area so all device sat tempts to join the samewireless network can identify it Channel Number It shows the wireless channel connected currently Encryptio...

Page 9: ...in IP by PPPoE PPTP connection IP Address It shows the IP address of WAN interface of WLAN AP Router Subnet Mask It shows the IP subnet mask of WAN interface of WLAN AP Router Default Gateway It shows...

Page 10: ...Zone Setting This page is used to enable and con gure NTP client Screen snapshot Time Zone Settings III LAN Interface Setup Screen snapshot LAN Interface Setup 10 IV WAN Interface Setup This page is...

Page 11: ...and Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client Screen snapshot Wireless Basic Settings VI Wireless Security Setup This page is used to con gure wireless security Scr...

Page 12: ...Screen snapshot Wireless Basic Settings Item Description Disable Wireless LAN Interface Click on to disable the wireless LAN data transmission Band Click to select 2 4GHz B 2 4GHz G 2 4GHz B G Mode Cl...

Page 13: ...Interval Data Rate Select the transmission data rate from pull down menu Data rate can be auto select 11M 5 5M 2M or IMbps Preamble Type Click to select the Long Preamble or Short Preamble support on...

Page 14: ...ode with Enterprise RADIUS or Personal Pre Shared Key Refer to 4 15 What is Wi Fi Protected Access WPA Pre Shared Key Format While Encryption is selected to be WPA Select the Pre shared key format fro...

Page 15: ...ant text ASCII and hexadecimal HEX code Default Tx Key Set the default secret key for WEP security function Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security encryption...

Page 16: ...bility Comment Fill in the comment tag for the registered client Apply Changes Click the Apply Changes button to register the client to new con guration setting Reset Click the Reset button to abort c...

Page 17: ...ty Click button to con gure wireless security like WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None Show Statistics It shows the TX RX packets rate statistics Delete Selected Click to delete the selec...

Page 18: ...ge is used to view or con gure other APs near yours Screen snapshot Wireless Site Survey Item Description SSID It shows the SSID of AP BSSID It shows BSSID of AP Channel It show the current channel of...

Page 19: ...able window that shows the active clients with their assigned IP address MAC address and time expired information Server mode only 802 Id Spanning Tree Select to enable or disable the IEEE 802 Id Span...

Page 20: ...data packets DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in t...

Page 21: ...f Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Refer to 4 24 What is Clone MAC Address Enabl...

Page 22: ...button manually and clicking the Disconnect button manually Idle Time If you select the PPPoE and Connect on Demand connection type ll in the idle time for auto disconnect function Value can be betwe...

Page 23: ...er MTU Size Fill in the mtu size of MTU Size The default value is 1400 Refer to 4 23 What is Maximum Transmission Unit MTU Size Attain DNS Automatically Click to select getting DNS address for PPTP su...

Page 24: ...ck to enable the port ltering security function Port Range Protocol Comments To restrict data transmission from the local network on certain ports ll in the range of start port and end port and the pr...

Page 25: ...also put your comments on it Apply Changes Click the Apply Changes button to register the ports to port ltering list Reset Click the Reset button to abort change and recover the previous con guration...

Page 26: ...d the NAT rewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s NAT rewall Screen snapsho...

Page 27: ...lick the Reset button to abort change and recover the previous con guration setting 3 3 16 Firewall DMZ A Demilitarized Zone is used to provide Internet services without sacri cing unauthorized access...

Page 28: ...nterface Wireless LAN Sent Packets It shows the statistic count of sent packets on the Ethernet WAN interface Wireless LAN Received Packets It shows the statistic count of received packets on the Ethe...

Page 29: ...ve and enable NTP client service Reset Click the Reset button to abort change and recover the previous con guration setting Refresh Click the refresh the current time shown on the screen Management Lo...

Page 30: ...t change and recover the previous con guration setting Management Save Reload Settings This page allows you save current settings to a le or reload the settings from the le that was saved previously B...

Page 31: ...t login control Con rmed Password Because the password input is invisible so please ll in the password again for con rmation purpose Apply Changes Clear the User Name and Password elds to empty means...

Page 32: ...down it to select There are three types of priority level High Medium and Low Note If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the...

Page 33: ...mmunications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz How does wireless networking work The 802 11 standard de ne two modes infra...

Page 34: ...rame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes The determination of an ef cient fragment th...

Page 35: ...at is Wi Fi Protected Access WPA Wi Fi s original security mechanism Wired Equivalent Privacy WEP has been viewed as insuf cient for securing con dential business communications A longer term solution...

Page 36: ...programming language and wired wireless connection 4 22 What is Maximum Transmission Unit MTU Size Maximum Transmission Unit MTU indicates the network stack of any packet is larger than this value wi...

Reviews: