Lantech
IWP-2000-68
802.11a/b/g Dual Radio Outdoor Multi-Function
Wireless Access Point
User’s Manual
Page 1: ...Lantech IWP 2000 68 802 11a b g Dual Radio Outdoor Multi Function Wireless Access Point User s Manual...
Page 2: ...ii IWP 2000 68 User s Manual Release 1 0...
Page 3: ...Mode 11 3 2 1 System 12 3 2 2 LAN Configuration 21 3 2 3 Wireless 23 3 2 4 Filtering 27 3 2 5 SNMP 28 3 2 6 Tools 33 3 2 7 Log Out 33 3 3 AP CB Bridge Mode 33 3 3 1 System 34 3 3 2 LAN Configuration 4...
Page 4: ...3 8 AP4 WDS Bridge Mode 148 3 8 1 System 148 3 8 2 LAN Configuration 157 3 8 3 Wireless 158 3 8 4 Filtering 168 3 8 5 SNMP 168 3 8 6 Tools 173 3 8 7 Log Out 173 3 9 OLSR_AP Mode 174 3 9 1 System 175...
Page 5: ...v Revision History Release Date Revision 1 0 12 31 2010 A1...
Page 6: ...ssis of your computer to ground the static electrical charge before you pick up the circuit device Pick up the device by holding it on the left and right edges only The Web UI s Main Menu links are us...
Page 7: ...IWP 2000 68 through the built in web UI step by step Many explanations in details of hardware and software functions are shown as well as the examples of the operation for web based interface Overvie...
Page 8: ...simultaneously on both directions Key Features in the Device Dual Radio Two high power IEEE 802 11 a b g radio for backhaul and local access Multi operating modes support OLSR_AP AODV_AP AP Bridge AP...
Page 9: ...MHz network processor Interface 1 RJ 45 Ethernet Port for POE input 1 RJ 45 Ethernet Port for POE power forwarding Flash 16MB Memory 64MB SDRAM RF Information Output power 1 5 2dBm 802 11a 22dBm 6Mbps...
Page 10: ...n STP RSTP STP RSTP QOS WMM Bandwidth limitation Traffic shaping by IP address in MESH and ROUTE mode Management Features IP Auto configuration DHCP client server SNMP V1 V2c V3 LLDP Link Layer Discov...
Page 11: ...J 45 CAT 5 Ethernet cable 30m 7 2 x Seals for cable 8 1 x User manual CD 9 2 x 7dBi dual band Omni Antenna 10 2 x Pole mount kit and Screws pack 11 2 x Wall mount kit 1 Main Unit 2 Power Cord 3 48V 1A...
Page 12: ...as IPCAM By default it is disabled Please note the voltage supply by eth0 is 48V and maximum output power watt is the outcome of AP s power usage deduct from total input power For example with standar...
Page 13: ...ower input Power Data Output Port 5 for connecting an Ethernet Cable to the AP POE picture1 POE picture2 Power and Data Interface location on the PoE denoted by numbers 3 5 2 3 Mount Kit for IWP 2000...
Page 14: ...0 68 is equipped with a PoE Injector module The PoE Injector delivers both data and power to IWP 2000 68 via Ethernet cable and gives the following benefits to improve the performance vs installation...
Page 15: ...er will light up Step2 Connect the cross over Ethernet cable from DATA IN Port to the Ethernet port on a PC Step3 Connect another Ethernet cable to the eth1 on IWP 2000 68 Hand tightens the Seals for...
Page 16: ...g 3 1 and ask user enter the username and password The default username and password are both admin For the first time to use please enter the default username and password then click the LOGIN button...
Page 17: ...es all basic configurations for the Access Point The items are list in left hand side of the menu Figure 3 2 3 2 AP Bridge Mode The default operating model for IWP 2000 68 is AP Bridge this model is t...
Page 18: ...Setting WIFI ath6 Setting WIFI ath7 Setting FILTER MAC Filtering SNMP Basic Setting VACM Setting Trap Setting Tools Tools Log Out 3 2 1 System This page shows the current status and some basic settin...
Page 19: ...ailable are English Simplified Chinese and Traditional Chinese Model Select OLSR AP To set this device as an AP with layer 3 MESH function AODV AP To set this device as an AP with layer 3 MESH functio...
Page 20: ...ost Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the WIF...
Page 21: ...nt may not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid fir...
Page 22: ...value Figure 3 2 6 Local Backup Settings Restore settings To backup or restore the configuration for this device click on NEXT button beside Local Backup settings Restore settings Figure 3 2 7 Click...
Page 23: ...Backup settings Restore settings Figure 3 2 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 2 10 3 2 1 4 General Status...
Page 24: ...18 Figure 3 2 11 3 2 1 5 Power Control Status In this page user can enable the PoE power forwarding function for eth0 port...
Page 25: ...interfaces information of this device such as interface information STP status mac address information etc Figure 3 2 13 3 2 1 7 WIFI Status In this page user could see the WIFI information of this de...
Page 26: ...ting the other one is synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Day and Hour Minute Second Using Internet Time Server Hours from GMT User can enter...
Page 27: ...s of this device will be assigned There are two options available here Static option the IP address should be entered in Network IP Parameters and DHCP option the IP address will be assigned from othe...
Page 28: ...iority of the port interface It is used in the designated port and root port selection algorithms P to P If a bridge port is operating in full duplex mode than the port is functioning as point to poin...
Page 29: ...is function is to hide the SSID in the wireless net work Country This setting configures the access point s country code which identify the country of operation and sets the authorized radio channels...
Page 30: ...mode only If enabled all of the clients connect to the same AP will not be able to access each other WEP Key Setting It uses two kinds of WEP Encryption key length 5 bytes and 13 bytes The key format...
Page 31: ...Standard AES Share Key User should define the pre share key in here the length of the key is 8 23 characters WPA Encryption User can choose the encryption method of the pre shared key here there are t...
Page 32: ...data that requires maximum throughput and is not time sensitive is sent to this queue FTP data for example AP Tx Video High Priority Minimum delay Time sensitive video data is automatically sent to th...
Page 33: ...m connecting to user s network A MAC address is a unique ID assigned by the manufacturer of the network adapter 3 2 4 1 MAC Filtering User can block certain clients from accessing this AP based on its...
Page 34: ...tact Specify the contact name for this managed node as well as information about how to contact this person Location It is used to define the location of the host on which the SNMP agent is running V1...
Page 35: ...ication Protocol An indication of which authentication protocol is used The available options for this field are MD5 and SHA Auth Passphrase Authentication Key A secret key used by the authentication...
Page 36: ...to give SNMPv3 security privileges to SNMPv1 and SNMPv2 users and communities Index Index of Community to Security Tick the checkbox to enable the recordset Security Name is a name that will use by th...
Page 37: ...and lookup the Group Name from the Group table Security model Specified in the message s msgSecurityModel parameter The available options for this field are any v1 v2c and usm Security level Specified...
Page 38: ...or not send disable v1 v2c Trap IP Address Port The IP and Port to receive traps Community The community string to be used when sending traps v3 Trap Trap Index of SNMP v3 traps Tick the checkbox to...
Page 39: ...Log Out User can manually logout by click on Log Out Figure 3 2 34 3 3 AP CB Bridge Mode AP CB Bridge mode is to set this device as an AP and Client Bridge device the setting and functions as followin...
Page 40: ...on Tools General Status Power Control Bridge Status WIFI Status Log System Time and Reboot screen as shown in Figure 3 3 1 Figure 3 3 1 3 3 1 1 Administrator By selecting the item of Administrator und...
Page 41: ...th AP and CB functions CB CB ROUTE To set this device as a router device with dual CB functions VLAN AP To set this device as a VLAN AP device Each SSID can have its own VLAN ID AP_WDS_BRG To set this...
Page 42: ...his page also allow user to using TFTP or WEB or FTP method to upgrade to the new version of firmware Figure 3 3 3 Using TFTP On any computer in the network or a compute direct connect to the AP Insta...
Page 43: ...ecting the item of Configuration Tools under System the screen will show in Figure 3 3 4 This page includes three selections Restore Factory Default Configuration Local Backup settings Restore setting...
Page 44: ...Remote Backup Settings Restore settings User can also backup restore the configuration of this device remotely Click on NEXT button beside Local Backup settings Restore settings Figure 3 3 9 Enter the...
Page 45: ...39 Figure 3 3 11 3 3 1 5 Power Control Status In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 3 12...
Page 46: ...STP status mac address information etc Figure 3 3 13 3 3 1 7 WIFI Status In this page user can click WIFI Interfaces to see each WIFI s information of this device such as Interface information Securi...
Page 47: ...re 3 3 16 shows ath4 AP model information Figure 3 3 16 3 3 1 8 Log In this page user could see the system logs record of this device Figure 3 3 17 3 3 1 9 System time Select Setting Type Setting by U...
Page 48: ...e of the device is not function normally or after user change some major settings for example change system model The existing settings will not be changed To perform the reboot click on the Reboot bu...
Page 49: ...conds Forwarding Delay Set the bridge s bridge forward delay value seconds Max Age Set the bridge s maximum message age value seconds Port Cost Set the port cost of the port Port Priority Set the port...
Page 50: ...n the list is a legal AP for CB to connect Check the box and press the Del button to remove it Rogue AP The nearby AP list not include the allowed APs Check the box and press the Add button to add it...
Page 51: ...adjacent If select manual the distance will be determined by Slot time ACK timeout and CTS timeout three values Beacon Period This item contains the length of the beacon interval Enter a value betwee...
Page 52: ...transmitted with encryption Select Key Check the radio box in front of the key that user would like to use for this AP Figure 3 3 24 WPA Personal The method of authentication is similar to WEP user c...
Page 53: ...his interface on or off Wireless Mode Select which wireless mode that user wants to use The options available here are 802 11a 802 11b 802 11g and 802 11b g SSID The SSID service set identifier is an...
Page 54: ...are transmitted by the RTS CTS handshake Enter a value between 1 and 2346 to specify the value of the RTS CTS Threshold Tx Power To set the tx power as off to turn off the tx power set auto to let de...
Page 55: ...elect Key Check the radio box in front of the key that user would like to use for this AP Figure 3 3 29 WPA Personal The method of authentication is similar to WEP user can define a Pre Shared Key onc...
Page 56: ...formation here Figure 3 3 31 QoS WMM Enable disable WMM support MAX Associated Station Maximum number of stations allowed in station table Common Parameters CWmin Minimum Contention Window The valid v...
Page 57: ...MM clients for frames transmitted to the access point STA Tx Best Effort Medium Priority Medium throughput and delay Most traditional IP data will be sending to this queue STA Tx Background Low Priori...
Page 58: ...ing function If this option is selected all PCs can access this AP Accept All PCs are filtered out except those MAC addresses in the following MAC address table In other words only those interfaces PC...
Page 59: ...SNMP V3 is a Security Enhancement for SNMP it provides secure access to devices by a combination of userID authenticating and encrypting packets over the network User ID A string representing the name...
Page 60: ...VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options U...
Page 61: ...This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 3 35 View Create a view fo...
Page 62: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field...
Page 63: ...h trap items to send Figure 3 3 39 3 3 6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 3 40 3 3 7 Log Out User can ma...
Page 64: ...l Status Power Control WIFI Status Log System time Reboot WAN WAN Setting Bandwidth Management LAN Eth0 Settings Eth1 Settings AP ath4 Setting AP ath5 Setting AP ath6 Setting AP ath7 Setting WIRELESS...
Page 65: ...er can only input 0 9 a z A Z _ or Language Select This function allows user to select a language for the UI the options available are English Simplified Chinese and Traditional Chinese Model OLSR AP...
Page 66: ...ost Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the WIF...
Page 67: ...ay not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwar...
Page 68: ...value Figure 3 4 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 4 7 Click...
Page 69: ...Restore settings Figure 3 4 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 4 10 3 4 1 4 General Status In this page use...
Page 70: ...64 Figure 3 4 11 3 4 1 5 Power Control Status In this page user can enable the eth0 port to provide PoE power and data forwarding function...
Page 71: ...ace information Security information Associated AP Station The Figure 3 4 13 shows the ath3 CB interface is waiting for connecting to an AP Figure 3 4 13 The Figure 3 4 14 shows that the ath3 CB model...
Page 72: ...rs from GMT User can enter the Hours from GMT for example Taiwan is GMT 8 Hours Server IP User should enter the Internet time server IP address here Time Update for Every User can set time update inte...
Page 73: ...Gateway address Figure 3 4 19 3 4 2 2 Bandwidth Management This function allows user to set the limitation of total upload download bandwidth on WAN interface and also can set the limitation of upload...
Page 74: ...the IP address Subnet mask and DHCP server related settings Network IP Parameters User can change the network settings of this interface from LAN configuration it is including IP address Subnet mask...
Page 75: ...n front of Enable to enable the Rogue AP detection and Press Add or Del button to apply Allow AP The allowable AP list The AP in the list is a legal AP for CB to connect Check the box and press the De...
Page 76: ...onnected to the Wireless Bridge it may not be obvious which MAC Address will be used If set to WDS it will include 4 MAC address while transmit the data through Wireless Bridge It is only available on...
Page 77: ...on type to secure the wireless net work There are four options for authentication Disable WEP WPA personal and WPA enterprise WEP Short for Wired Equivalent Privacy a security protocol for wireless lo...
Page 78: ...separate RADIUS server is required User should enter their account and password to pass the authentication Figure 3 4 27 Please Note In wifi station model the security setting must be same as the AP...
Page 79: ...hreshold Packets larger than the value are transmitted by the RTS CTS handshake Enter a value between 1 and 2346 to specify the value of the RTS CTS Threshold Tx Power To set the tx power as off to tu...
Page 80: ...elect Key Check the radio box in front of the key that user would like to use for this AP Figure 3 4 30 WPA Personal The method of authentication is similar to WEP user can define a Pre Shared Key onc...
Page 81: ...formation here Figure 3 4 32 QoS WMM Enable disable WMM support MAX Associated Station Maximum number of stations allowed in station table Common Parameters Cwmin Minimum Contention Window The valid v...
Page 82: ...MM clients for frames transmitted to the access point STA Tx Best Effort Medium Priority Medium throughput and delay Most traditional IP data will be sending to this queue STA Tx Background Low Priori...
Page 83: ...ss This option is only available in router and MESH modes IP Filtering Enable Disable IP Filtering IP Address Enter the Network IP Address and press Apply to filter Figure 3 4 34 3 4 5 2 MAC Filtering...
Page 84: ...ser wants Lantech Wireless View to remote management the AP and draw the network topography System Information Contact Specify the contact name for this managed node as well as information about how t...
Page 85: ...e available options for this field are NoAuthNoPriv AuthNoPriv or AuthPriv Auth Type Authentication Protocol An indication of which authentication protocol is used The available options for this field...
Page 86: ...VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options U...
Page 87: ...This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 4 37 View Create a view fo...
Page 88: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field...
Page 89: ...h trap items to send Figure 3 4 41 3 4 7 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 4 42 3 4 8 Log Out User can ma...
Page 90: ...net s AP The setting and functions list as following SYSTEM Administrator Firmware Configuration Tools General Status Power Control WIFI Status Log System time Reboot WAN WAN Settings Bandwidth Manage...
Page 91: ...er can only input 0 9 a z A Z _ or Language Select This function allows user to select a language for the UI the options available are English Simplified Chinese and Traditional Chinese Model OLSR AP...
Page 92: ...ote host Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor th...
Page 93: ...ay not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwar...
Page 94: ...value Figure 3 5 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 5 7 Click...
Page 95: ...ngs Restore settings Figure 3 5 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 5 10 3 5 1 4 General Status In this page...
Page 96: ...90 Figure 3 5 11 3 5 1 5 Power Control Status In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 5 12...
Page 97: ...e 3 5 13 The Figure 3 5 14 shows that the ath3 ath7 CB model has connected to an AP and display the relevant information Figure 3 5 14 3 5 1 7 Log In this page user could see the system logs record of...
Page 98: ...the reboot click on the Reboot button and click on OK on pop up screen to confirm user s decision Figure 3 5 17 3 5 2 WAN Configuration 3 5 2 1 WAN Settings This function is to establish a connection...
Page 99: ...limitation The options available here are disable upload download and upload download Start IP Address To set the start IP of bandwidth limitation End IP Address To set the end IP of bandwidth limita...
Page 100: ...s The IP Address range which will be assigned Lease Time How long does the IP address can be leased by DHCP server Figure 3 5 20 In Lan configuration user can also configure the IP of Station ath7 Set...
Page 101: ...The nearby AP list not include the allowed APs Check the box and press the Add button to add it as a legal AP Re Scan Press WIFIx button to Re scan the APs nearby which are scanned by wifi card x x 1...
Page 102: ...time ACK timeout and CTS timeout three values Beacon Period This item contains the length of the beacon interval Enter a value between 20 and 1000 to specify the Beacon Period DTIM Period This item co...
Page 103: ...transmitted with encryption Select Key Check the radio box in front of the key that user would like to use for this AP Figure 3 5 25 WPA Personal The method of authentication is similar to WEP user c...
Page 104: ...tion can be used to filter network access by machines based on the unique MAC addresses of their network adapter s It is most useful to prevent unauthorized wireless devices from connecting to user s...
Page 105: ...le this filtering function If this option is selected all PCs can access this AP Accept All PCs are filtered out except those MAC addresses in the following MAC address table In other words only those...
Page 106: ...pography System Information Contact Specify the contact name for this managed node as well as information about how to contact this person Location It is used to define the location of the host on whi...
Page 107: ...thNoPriv or AuthPriv Auth Type Authentication Protocol An indication of which authentication protocol is used The available options for this field are MD5 and SHA Auth Passphrase Authentication Key A...
Page 108: ...r VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options...
Page 109: ...This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 5 31 View Create a view fo...
Page 110: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field...
Page 111: ...h trap items to send Figure 3 5 35 3 5 7 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 5 36 3 5 8 Log Out User can ma...
Page 112: ...S WIFI ath0 Setting WIFI ath1 Setting WIFI ath2 Setting WIFI ath3 Setting WIFI ath4 Setting WIFI ath5 Setting WIFI ath6 Setting WIFI ath7 Setting FILTER MAC Filtering SNMP Basic Setting VACM Setting T...
Page 113: ...s available are English Simplified Chinese and Traditional Chinese Model OLSR AP To set this device as an AP with layer 3 MESH function AODV AP To set this device as an AP with layer 3 MESH function A...
Page 114: ...host Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the W...
Page 115: ...may not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwa...
Page 116: ...t value Figure 3 6 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 6 7 Click...
Page 117: ...Backup settings Restore settings Figure 3 6 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 6 10 3 6 1 4 General Status...
Page 118: ...112 Figure 3 6 11 3 6 1 5 Power Control Status In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 6 12...
Page 119: ...Setting Type Setting by User can set system time in two ways One is manual setting the other one is Synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Day...
Page 120: ...l not be changed To perform the reboot click on the Reboot button and click on OK on pop up screen to confirm user s decision Figure 3 6 16 3 6 2 LAN Configuration Network IP Parameters User can chang...
Page 121: ...function is to hide the SSID in the wireless net work Country This setting configures the access point s country code which identify the country of operation and sets the authorized radio channels Cha...
Page 122: ...mode only If enabled all of the clients connect to the same AP will not be able to access each other WEP Key Setting It uses two kinds of WEP Encryption key length 5 bytes and 13 bytes The key format...
Page 123: ...Standard AES Share Key User should define the pre share key in here the length of the key is 8 23 characters WPA Encryption User can choose the encryption method of the pre shared key here there are t...
Page 124: ...data that requires maximum throughput and is not time sensitive is sent to this queue FTP data for example AP Tx Video High Priority Minimum delay Time sensitive video data is automatically sent to th...
Page 125: ...m connecting to user s network A MAC address is a unique ID assigned by the manufacturer of the network adapter 3 6 4 1 MAC Filtering User can block certain clients from accessing this AP based on its...
Page 126: ...pography System Information Contact Specify the contact name for this managed node as well as information about how to contact this person Location It is used to define the location of the host on whi...
Page 127: ...thNoPriv or AuthPriv Auth Type Authentication Protocol An indication of which authentication protocol is used The available options for this field are MD5 and SHA Auth Passphrase Authentication Key A...
Page 128: ...r VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options...
Page 129: ...This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 6 27 View Create a view fo...
Page 130: ...nd the View Name from View table Write Authorized View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for no...
Page 131: ...Priv Figure 3 6 30 Trap Items Enable Disable which trap items to send Figure 3 6 31 3 6 6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethern...
Page 132: ...ime Reboot LAN Bridge LAN settings WIRELESS WIFI ath0 Setting WIFI ath4 Setting FILTER MAC Filtering SNMP Basic Setting VACM Setting Trap Setting Tools Tools Log Out 3 7 1 System This page shows the c...
Page 133: ...s available are English Simplified Chinese and Traditional Chinese Model OLSR AP To set this device as an AP with layer 3 MESH function AODV AP To set this device as an AP with layer 3 MESH function A...
Page 134: ...host Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the W...
Page 135: ...may not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwa...
Page 136: ...t value Figure 3 7 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 7 7 Click...
Page 137: ...l Backup settings Restore settings Figure 3 7 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 7 10 3 7 1 4 General Status...
Page 138: ...132 Figure 3 7 11 3 7 1 5 Power Control Status In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 7 12...
Page 139: ...aces information of this device such as interface information STP ststus mac address information etc Figure 3 7 13 3 7 1 7 WIFI Status In this page user could see the WIFI information of this device s...
Page 140: ...ting the other one is Synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Day and Hour Minute Second Using Internet Time Server Hours from GMT User can enter...
Page 141: ...he IP address should be entered in Network IP Parameters and DHCP option the IP address will be assigned from other DHCP server Network IP Parameters User can change the network settings of this devic...
Page 142: ...operating in full duplex mode than the port is functioning as point to point The available options are auto true or false By default it is set to auto Edge If a port is operating in half duplex mode...
Page 143: ...m contains the length of the beacon interval Enter a value between 20 and 1000 to specify the Beacon Period DTIM Period This item contains the number of Beacon intervals between Delivery Traffic Indic...
Page 144: ...on User can choose which authentication type to secure the wireless net work There are four options for authentication Disable WEP WPA personal and WPA enterprise WEP Short for Wired Equivalent Privac...
Page 145: ...ryption User can choose the encryption method of the pre shared key here there are three options Auto AES and TKIP Group Key Update Interval Time interval for rekeying the GTK broadcast multicast encr...
Page 146: ...sent to this queue AP Tx Voice High Priority Time sensitive data like VoIP and streaming media are automatically sent to this queue STA Parameters These parameters are sent to WMM clients when they a...
Page 147: ...iltering User can block certain clients from accessing this AP based on its MAC address Use Filtering type to define the filtering scenario General Disabled Disable this filtering function If this opt...
Page 148: ...ography System Information Contact Specify the contact name for this managed node as well as information about how to contact this person Location It is used to define the location of the host on whic...
Page 149: ...thNoPriv or AuthPriv Auth Type Authentication Protocol An indication of which authentication protocol is used The available options for this field are MD5 and SHA Auth Passphrase Authentication Key A...
Page 150: ...r VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options...
Page 151: ...This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 7 28 View Create a view fo...
Page 152: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field...
Page 153: ...h trap items to send Figure 3 7 32 3 7 6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 7 33 3 7 7 Log Out User can ma...
Page 154: ...ettings WIRELESS WIFI ath0 Setting WIFI ath4 Setting WIFI ath5 Setting WIFI ath6 Setting WIFI ath7 Setting FILTER MAC Filtering SNMP Basic Setting VACM Setting Trap Setting Tools Tools Log Out 3 8 1 S...
Page 155: ...s available are English Simplified Chinese and Traditional Chinese Model OLSR AP To set this device as an AP with layer 3 MESH function AODV AP To set this device as an AP with layer 3 MESH function A...
Page 156: ...host Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the W...
Page 157: ...may not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwa...
Page 158: ...t value Figure 3 8 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 8 7 Click...
Page 159: ...l Backup settings Restore settings Figure 3 8 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 8 10 3 8 1 4 General Status...
Page 160: ...154 Figure 3 8 11 3 8 1 5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 8 12...
Page 161: ...aces information of this device such as interface information STP status mac address information etc Figure 3 8 13 3 8 1 7 WIFI Status In this page user could see the WIFI information of this device s...
Page 162: ...ting the other one is Synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Day and Hour Minute Second Using Internet Time Server Hours from GMT User can enter...
Page 163: ...he IP address should be entered in Network IP Parameters and DHCP option the IP address will be assigned from other DHCP server Network IP Parameters User can change the network settings of this devic...
Page 164: ...port is operating in full duplex mode than the port is functioning as point to point The available options are auto true or false By default it is set to auto Edge If a port is operating in half duple...
Page 165: ...20 Advanced Settings Peer Node Distance Set the distance between this device and it s adjacent If select manual the distance will be determined by Slot time ACK timeout and CTS timeout three values B...
Page 166: ...can either use ASCII to set the key values ie 0 9 a z Or use HEX to set the key value in hexadecimal ie 0 9 a f User can set maximum 4 keys but only one key will functional at one time Figure 3 8 21...
Page 167: ...ause the encryption of method used is Advanced Encryption Standard AES Share Key User should define the pre share key in here the length of the key is 8 23 characters WPA Encryption User can choose th...
Page 168: ...rsting AP Parameters This affects traffic flowing from the access point to the client station These parameters are used by the access point when transmitting frames to the clients AP Tx Best Effort Me...
Page 169: ...in milliseconds the Transmission Opportunity TXOP for Client Station that is the interval of time when the WMM AP has the right to initiate transmissions on the wireless network ACM Admission control...
Page 170: ...e are transmitted by the RTS CTS handshake Enter a value between 1 and 2346 to specify the value of the RTS CTS Threshold Tx Power To set the tx power as off to turn off the tx power set auto to let d...
Page 171: ...n Select Key Check the radio box in front of the key you would like to use for this AP Figure 3 8 29 WPA Personal The method of authentication is similar to WEP user can define a Pre Shared Key once t...
Page 172: ...sary information here Figure 3 8 31 QoS WMM Enable disable WMM support MAX Associated Station Maximum number of stations allowed in station table Common Parameters CWmin Minimum Contention Window The...
Page 173: ...ll be used by WMM clients for frames transmitted to the access point STA Tx Best Effort Medium Priority Medium throughput and delay Most traditional IP data will be sending to this queue STA Tx Backgr...
Page 174: ...General Disabled Disable this filtering function If this option is selected all PCs can access this AP Accept All PCs are filtered out except those MAC addresses in the following MAC address table In...
Page 175: ...n a specified community V3 The SNMP V3 is a Security Enhancement for SNMP it provides secure access to devices by a combination of userID authenticating and encrypting packets over the network User ID...
Page 176: ...be sent to the SNMP manager The following tokens for VACM access security that user can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Secu...
Page 177: ...for group Security Name Assign security name for group This field will obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when se...
Page 178: ...ble Write Authorized View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available opt...
Page 179: ...able Disable which trap items to send Figure 3 8 39 3 8 6 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 8 40 3 8 7 Lo...
Page 180: ...eneral Status Power Control WIFI Status Log System time Reboot WAN WAN Settings Bandwidth Management LAN Eth0 settings AP WLAN Settings MESH WLAN Settings MESH OLSR CONFIG OLSR ADMIN OLSR ROUTES OLSR...
Page 181: ...ser can only input 0 9 a z A Z _ or Language Select This function allows user to select a language for the UI the options available are English Simplified Chinese and Traditional Chinese Model OLSR AP...
Page 182: ...host Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the W...
Page 183: ...may not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwa...
Page 184: ...t value Figure 3 9 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 9 7 Click...
Page 185: ...ettings Restore settings Figure 3 9 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 9 10 3 9 1 4 General Status In this p...
Page 186: ...180 Figure 3 9 11 3 9 1 5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 9 12...
Page 187: ...Setting Type Setting by User can set system time in two ways One is manual setting the other one is Synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Day...
Page 188: ...on is to establish a connection with user s WAN network and also assign the IP to the host behind this AP Network IP Parameters User can change the network settings of this interface from WAN configur...
Page 189: ...oad Bandwidth The total download bandwidth in Mbps Bandwidth Limitation Action To set the action type of bandwidth limitation The options available here are disable upload download and upload download...
Page 190: ...nge which will be assigned Lease Time How long does the IP address can be leased by DHCP server Figure 3 9 19 3 9 3 2 AP WLAN Settings User can change the local network settings from LAN Configuration...
Page 191: ...rameters IP Address The IP address of the AP on the MESH network Subnet Mask The subnet mask of the IP address Figure 3 9 21 3 9 4 MESH This page will show the mesh information The options available h...
Page 192: ...de RFC3626 If set to 1 the link quality is used when calculating MPRs If set to 2 the route will also be calculated based on distributed link quality information This option should therefore only be s...
Page 193: ...t key for signature generation and verification Security Enable Disable To enable or disable the security function Security Key 0123456789abcdef For nodes to participate in the OLSR routing domain the...
Page 194: ...ink quality window size NLQ this is our neighbor s view of the link quality Previously we have called this the Neighbor Link Quality This value is extracted from LQ HELLO messages received from our ne...
Page 195: ...nk LQ link quality The quality of the link as determined by the source node For the source node this is the Link Quality For the destination node this is the Neighbor Link Quality ILQ inverse link qua...
Page 196: ...operation and sets the authorized radio channels Channel Set the operating frequency channel for this device Figure 3 9 27 Advanced Settings Peer Node Distance Set the distance between this device an...
Page 197: ...n key length 5 bytes and 13 bytes The key format can either use ASCII to set the key values ie 0 9 a z Or use HEX to set the key value in hexadecimal ie 0 9 a f User can set maximum 4 keys but only on...
Page 198: ...here the length of the key is 8 23 characters WPA Encryption User can choose the encryption method of the pre shared key here there are three options Auto AES and TKIP Group Key Update Interval Time i...
Page 199: ...s queue FTP data for example AP Tx Video High Priority Minimum delay Time sensitive video data is automatically sent to this queue AP Tx Voice High Priority Time sensitive data like VoIP and streaming...
Page 200: ...ength is 32 SSID Hide This function is to hide the SSID in the wireless net work Country This setting configures the access point s country code which identify the country of operation and sets the au...
Page 201: ...It is used in AP mode only If enabled all of the clients connect to the same AP will not be able to access each other WEP Key Setting It uses two kinds of WEP Encryption key length 5 bytes and 13 byte...
Page 202: ...authorized wireless devices from connecting to user s network A MAC address is a unique ID assigned by the manufacturer of the network adapter 3 9 6 1 IP Filtering User can block certain client PCs fr...
Page 203: ...pt those interfaces PCs with MAC address in the MAC address table Figure 3 9 37 3 9 7 SNMP The IWP 2000 68 support SNMP V1 V2C V3 this page is for defines the SNMP access control and SNMP traps 3 9 7...
Page 204: ...he network User ID A string representing the name of the user Security Level User can select which security level that user wants to use The available options for this field are NoAuthNoPriv AuthNoPri...
Page 205: ...r VACM access security that you can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options Y...
Page 206: ...ill obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 9 39 View Create a view for user to let...
Page 207: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field...
Page 208: ...h trap items to send Figure 3 9 43 3 9 8 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 9 44 3 9 9 Log Out User can ma...
Page 209: ...Reboot WAN WAN Settings Bandwidth Management LAN Eth0 settings AP WLAN Settings MESH WLAN Settings MESH AODV ADMIN WIRELESS WIFI AP Setting WIFI MESH Setting FILTER IP Filtering MAC Filtering SNMP Bas...
Page 210: ...e Select This function allows user to select a language for the UI the options available are English Simplified Chinese and Traditional Chinese Model OLSR AP To set this device as an AP with layer 3 M...
Page 211: ...ost Then only the host with the entered IP address can access this device WIFI Loading Warning Threshold The threshold value is used by Lantech Wireless View Lantech Wireless View will monitor the WIF...
Page 212: ...ay not respond to commands while uploading the firmware This is normal behavior and do not turn off the Access Point while firmware is upgrading Using FTP On FTP server there should have valid firmwar...
Page 213: ...t value Figure 3 10 6 Local Backup Settings Restore settings To backup or restore the configuration for this device Click on NEXT button beside Local Backup settings Restore settings Figure 3 10 7 Cli...
Page 214: ...ttings Restore settings Figure 3 10 9 Enter the necessary setting in next page then click on Backup To Server or Restore From Server to start the process Figure 3 10 10 3 10 1 4 General Status In this...
Page 215: ...209 Figure 3 10 11 3 10 1 5 Power Control In this page user can enable the eth0 port to provide PoE power and data forwarding function Figure 3 10 12...
Page 216: ...ct Setting Type Setting by User can set system time in two ways One is manual setting the other one is Synchronize with an Internet Time Server Manual Setting User can manually enter the Year Month Da...
Page 217: ...ion is to establish a connection with user s WAN network and also assign the IP to the host behind this AP Network IP Parameters User can change the network settings of this interface from WAN configu...
Page 218: ...oad Bandwidth The total download bandwidth in Mbps Bandwidth Limitation Action To set the action type of bandwidth limitation The options available here are disable upload download and upload download...
Page 219: ...ser can change the local network settings from LAN Configuration for ath4 interface which include the IP address Subnet mask and DHCP server related settings Network IP Parameters User can change the...
Page 220: ...0 interface and must be in different subnet with WAN AP WLAN IP address Network IP Parameters IP Address The IP address of the AP on the MESH network Subnet Mask The subnet mask of the IP address Figu...
Page 221: ...s in the network Node Travesal Time It is a conservative estimate of the average one hop traversal time for packets and should include queuing delays interrupt processing times and transfer times Acti...
Page 222: ...to specify the Beacon Period DTIM Period This item contains the number of Beacon intervals between Delivery Traffic Indication Message DTIM Enter a number between 1 and 255 to specify Fragment Thresh...
Page 223: ...e as long as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted without encryption If the Restricted selected all the packets are transmit...
Page 224: ...er and Shared Secret here In case if a backup server has been deployed in user s network user can also enter the necessary information here Figure 3 10 26 QoS WMM Enable disable WMM support MAX Associ...
Page 225: ...eters will be used by WMM clients for frames transmitted to the access point STA Tx Best Effort Medium Priority Medium throughput and delay Most traditional IP data will be sending to this queue STA T...
Page 226: ...which identify the country of operation and sets the authorized radio channels Channel Set the operating frequency channel for this device Figure 3 10 28 Advanced Settings Peer Node Distance Set the d...
Page 227: ...o kinds of WEP Encryption key length 5 bytes and 13 bytes The key format can either use ASCII to set the key values ie 0 9 a z Or use HEX to set the key value in hexadecimal ie 0 9 a f User can set ma...
Page 228: ...of the network adapter 3 10 6 1 IP Filtering User can block certain client PCs from accessing this AP based on its IP address If enabled user should also configure the IP Filtering Address This option...
Page 229: ...ces PCs with MAC address in the MAC address table Figure 3 10 32 3 10 7 SNMP The IWP 2000 68 support SNMP V1 V2C V3 this page is for defines the SNMP access control and SNMP traps 3 10 7 1 Basic Setti...
Page 230: ...the network User ID A string representing the name of the user Security Level User can select which security level that user wants to use The available options for this field are NoAuthNoPriv AuthNoPr...
Page 231: ...or VACM access security that you can use Community to Security for V1 V2c Map the community name COMMUNITY into a security name The Community to Security token takes NAME SOURCE and COMMUNITY options...
Page 232: ...ll obtain from the Security Name of Comunity to Security when security model is v1 or v2c or obtain from the User ID of usm when security model is usm Figure 3 10 34 View Create a view for user to let...
Page 233: ...View Name for write access The available options for this field are all none mib2 and the View Name from View table Notify Authorized View Name for notify access The available options for this field a...
Page 234: ...trap items to send Figure 3 10 38 3 10 8 Tools Command Ping It runs ping command to test the connection capability of this device with the other Ethernet device Figure 3 10 39 3 10 9 Log Out User can...
Page 235: ...cy when using integrated antennas Any changes or modification to the product not expressly approved by Original Manufacture could void the user s authority to operate this device Caution To meet regul...