Table of Contents
1
INTRODUCTION................................................................................................................................5
1.1
F
EATURES
&
B
ENEFITS
.................................................................................................................6
1.2
P
ACKAGE
C
ONTENTS
....................................................................................................................7
1.3
B
RIDGE
/AP
D
ESCRIPTION
.............................................................................................................7
1.4
E
THERNET CABLE WATER PROOF KIT
I
NSTALL
G
UIDE
...................................................................8
1.5
M
OUNTING
I
NSTALL
G
UIDE
..........................................................................................................9
1.6
S
YSTEM
R
EQUIREMENTS
.............................................................................................................11
1.7
A
PPLICATIONS
.............................................................................................................................11
1.8
N
ETWORK
C
ONFIGURATION
........................................................................................................11
a)
Ad-hoc Mode (Bridge) ......................................................................................................................... 12
b)
Infrastructure Mode (AP Client) ........................................................................................................... 12
2
UNDERSTANDING THE HARDWARE.........................................................................................13
2.1
H
ARDWARE
I
NSTALLATION
.........................................................................................................13
2.2
IP
A
DDRESS
C
ONFIGURATION
.....................................................................................................13
3
CLIENT BRIDGE MODE – WEB CONFIGURATION................................................................15
3.1
L
OGGING
I
N
................................................................................................................................15
3.2
S
YSTEM
.......................................................................................................................................17
3.2.1
A
DMINISTRATOR
S
ETTINGS
.........................................................................................................17
3.2.1.1
S
AVE
C
ONFIGURATION TO A
F
ILE
...........................................................................................19
3.2.1.2
R
ESTORE THE
C
ONFIGURATION FROM A
F
ILE
.........................................................................19
3.2.1.3
S
WITCH
D
EVICE TO
AP
M
ODE
................................................................................................19
3.2.2
F
IRMWARE
U
PGRADE
..................................................................................................................20
3.2.3
S
YSTEM
R
EBOOT AND
R
ESTORE
S
ETTINGS TO
D
EFAULT
.............................................................22
3.2.3.1
S
YSTEM
R
EBOOT
....................................................................................................................22
3.2.3.2
R
ESTORE
S
ETTINGS TO
D
EFAULT
...........................................................................................23
3.2.4
S
YSTEM
T
IME
C
ONFIGURATION
..................................................................................................23
3.3
W
IRELESS
....................................................................................................................................25
3.3.1
SSID
C
ONFIGURATION
................................................................................................................25
3.3.1.1
802.11
A
I
NFRASTRUCTURE
/
A
D
-
HOC
M
ODE
..........................................................................26
3.3.2
802.11
B
I
NFRASTRUCTURE
/
A
D
-
HOC
M
ODE
...............................................................................27
3.3.3
W
IRELESS
802.11
G
C
ONFIGURATION
..........................................................................................28
3.3.4
W
IRELESS
S
ECURITY
...................................................................................................................29
3.3.4.1.1
WEP
(W
IRED
E
QUIVALENT
P
RIVACY
) ...................................................................................29
3.3.4.1.2
WPA/WPA2
–
P
ERSONAL
(W
I
-F
I
P
ROTECTED
A
CCESS
) ........................................................30
3.3.5
A
DVANCED
W
IRELESS
S
ETTINGS
................................................................................................31
3.3.6
SNMP .........................................................................................................................................32
3.4
LAN
S
ETTINGS
(S
TATIC
/
DHCP) ...............................................................................................33
3.5
L
OGS
...........................................................................................................................................34
3.6
S
TATISTICS
..................................................................................................................................36
4
ACCESS POINT MODE – WEB CONFIGURATION ..................................................................37
4.1
L
OGGING
I
N
................................................................................................................................37
4.2
S
YSTEM
.......................................................................................................................................38
4.2.1
A
DMINISTRATOR
S
ETTINGS
.........................................................................................................38
4.2.1.1
S
AVE
C
ONFIGURATION TO A
F
ILE
...........................................................................................38
4.2.1.2
R
ESTORE THE
C
ONFIGURATION FROM A
F
ILE
.........................................................................39
4.2.1.3
S
WITCH
D
EVICE TO
B
RIDGE
M
ODE
........................................................................................39
4.2.2
F
IRMWARE
U
PGRADE
..................................................................................................................40
4.2.3
S
YSTEM
R
EBOOT AND
R
ESTORE
S
ETTINGS TO
D
EFAULT
.............................................................41
4.2.3.1
S
YSTEM
R
EBOOT
....................................................................................................................42
4.2.3.2
R
ESTORE
S
ETTINGS TO
D
EFAULT
...........................................................................................42
4.2.4
S
YSTEM
T
IME
C
ONFIGURATION
..................................................................................................43