background image

 

 

 

ALL0258 

Wireless Outdoor 

Access Point & Client Bridge

 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

User’s Manual

 

V1.0 

 
 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  

 

 
 

Summary of Contents for ALL0258

Page 1: ...ALL0258 Wireless Outdoor Access Point Client Bridge User s Manual V1 0 ...

Page 2: ...EM LOG 15 4 3 SYSTEM 15 4 3 1 SYSTEM PROPERTIES 15 4 3 2 IP SETTINGS 16 4 3 3 SPANNING TREE SETTINGS 17 4 4 WIRELESS 17 4 4 1 WIRELESS NETWORK 18 4 4 1 1 WIRELESS SECURITY WEP 19 4 4 1 2 WIRELESS SECURITY WPA PSK WPA2 PSK WPA MIXED 20 4 4 1 3 WIRELESS SECURITY WPA WPA2 21 4 4 2 WIRELESS MAC FILTER 22 4 4 3 WIRELESS ADVANCED SETTINGS 23 4 5 MANAGEMENT 24 4 5 1 ADMINISTRATION 24 4 5 2 SNMP SETTINGS ...

Page 3: ... 2 DHCP CLIENT TABLE 44 6 2 3 CONNECTION STATUS 44 6 2 4 SYSTEM LOG 45 6 3 SYSTEM 46 6 3 1 SYSTEM PROPERTIES 46 6 4 ROUTER 46 6 4 1 WAN SETTINGS 47 6 4 1 1 WAN DHCP 47 6 4 1 2 WAN STATIC IP 48 6 4 1 3 WAN PPPOE 49 6 4 2 LAN SETTING 51 6 4 3 VPN PASS THROUGH 51 6 5 WIRELESS 52 6 5 1 WIRELESS NETWORK 52 6 5 2 WIRELESS SECURITY 53 6 5 2 1 WIRELESS SECURITY WEP 53 6 5 2 2 WIRELESS SECURITY WPA PSK WPA...

Page 4: ...ds radio coverage avoids unnecessary roaming between Access Points and ensures a stable wireless connection while reduces the number of required equipments ALL0258 provides user friendly interface including user friendly distance control ranges from 1Km up to 30Km and RSSI LED indicator offering real time signal status It comes with PoE injector for convenient outdoor installation ALL0258 enforces...

Page 5: ...Public wireless solution An AP interface that is especially useful in public areas such as hotspots and enterprise Signal Strength Display RF signal strength status shown LEDs of 3 colors making network build up easier BSSID Basic Service Set ID supports 4 MAC address Networking QoS WMM Enhance performance and density PPPoE Point to Point Protocol over Ethernet at Client Router mode This function ...

Page 6: ...y guidelines h Carefully follow the instructions in this manual also follow all instruction labels on this device h Except for the power adapter supplied this device should not be connected to any other adapters h Do not spill liquid of any kind on this device h Do not place the unit on an unstable stand or table This unit may drop and become damaged h Do not place any hot devices close to this un...

Page 7: ... time information Doctors nurses point of sale employees and warehouse workers can access real time information while dealing with patients serving customers and processing information d Frequently changed environments Show rooms meeting rooms retail stores and manufacturing sites where frequently rearrange the workplace e Small Office and Home Office SOHO networks SOHO users need a cost effective...

Page 8: ...t cable to AP Bridge port of the PoE injector and the other end into you cable DSL modem Internet 4 Insert the DC inlet of the power adapter into the 24V port of the PoE injector and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 Hardware Description The images below depict the front and rear panel of the Access Point Client Bridge PoE Injector ...

Page 9: ...igured as a Bridge Router or Access Point The default IP address of the device is 192 168 1 1 In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the control panel double click Network Connections and then double click on the connection of your Network Interface Card NIC You will then see the following screen Standard Pole Mount Optional Wall Moun...

Page 10: ...configure the TCP IP settings of your PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Page 11: ...e address bar of the web browser and press Enter Make sure that the device and your computers are configured on the same subnet Refer to Chapter 2 in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will see the graphical user interface of the devi...

Page 12: ...ure the IP address of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into four sections 1 Status Displays the overall status connection status and event log 2 System This menu includes t...

Page 13: ...tail below 4 2 1 Main Click on the Main link under the Status drop down menu The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Client are displayed in the LAN secti...

Page 14: ...2 Wireless Client List Click on the Wireless Client List link under the Status drop down menu This page displays the list of Clients that are associated to the Access Point The MAC addresses and signal strength for each client is displayed Click on the Refresh button to refresh the client list ...

Page 15: ... latest events are retained 4 3 System Click on the System link on the navigation drop down menu You will then see three options System Properties IP Settings and Spanning Tree Settings Each option is described in detail below 4 3 1 System Properties Click on the System Properties link under the System drop down menu This page allows you to switch the operating mode of the device as well as specif...

Page 16: ...IP Network Setting Select Obtain an IP address automatically DHCP radio button if the Access Point is connected to a DHCP server This will allow the Access Point to pass IP addresses to the clients associated with it You may select Specify an IP Address radio button if you would like the device to use a static IP address In this case you would be required to specify an IP address subnet mask and d...

Page 17: ...ble the spanning tree feature Bridge Hello Time Specify the number of seconds for the hello time Bridge Max Age Specify the number of seconds for the max age Bridge Forward Delay Specify the number of seconds for the bridge forward delay Priority Specify the number of seconds for the priority Click on the Apply button to save the changes 4 4 Wireless Click on the Wireless link on the navigation dr...

Page 18: ...ork you may select A B G B G mixed If you are not sure about which clients will be accessing the wireless networks it is recommended that you select A or B G mixed for the best performance Turbo Mode is a proprietary mode which combines all channels into a single channel to maximize the through put up to 200 Please be aware that Turbo Mode works only with other Turbo Mode supported devices Channel...

Page 19: ...s an unencrypted challenge text string to any device attempting to communicate with the Access Point The device requesting authentication encrypts the challenge text and sends it back to the Access Point If the challenge text is encrypted correctly the Access Point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used In...

Page 20: ...rity features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with Passphrase Specify a passp...

Page 21: ...ough the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with Encryption Select TKIP or AES from the drop down list if your wireless network uses this encryption RADIUS IP Address Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS s...

Page 22: ... with the network By selecting Allow MAC in the List only the address listed in the table will have access to the network all other clients will be blocked On the other hand selected Deny MAC in the List only the listed MAC addresses will be blocked from accessing the network all other clients will have access to the network MAC Address Enter the MAC address This table lists the blocked or allowed...

Page 23: ...ication distance of the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network Fragment Packets over the specified size will be fragmented in order to improve performance on noisy networks RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preven...

Page 24: ...ty reasons it is highly recommended that you create a new user name and password Name Specify a user name into the first field Password Specify a password into this field and then re type the password into the Confirm Password field Click on the Apply button to save the changes 4 5 2 SNMP Settings Click on the SNMP Settings link under the Management menu This option allows you to assign the contac...

Page 25: ...munity with read write access Send SNMP Trap Specify the IP address of the computer that will receive the SNMP traps Trap Community Name Specify the password for the SNMP trap community Click on the Apply button to save the changes 4 5 3 Backup Restore Reset to factory default settings Click on the Backup Restore Setting link under the Management menu This option is used to save the current settin...

Page 26: ...default settings Please wait while the device restart and then access the device using the default IP address 192 168 1 1 4 5 4 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu This page is used to upgrade the firmware on the device Make sure that downloaded the appropriate firmware from your vendor Click on the Browse button and then select the appropriate firmware an...

Page 27: ...ecify the date and time Automatically Get Date and Time Select the time zone from the drop down list and then specify the IP address of the NTP server Click on the Apply button to save the changes 4 5 6 Log Click on the Log link under the Management menu The Log page displays a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error o...

Page 28: ...nter Make sure that the device and your computers are configured on the same subnet Refer to Chapter 2 in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divi...

Page 29: ...ail below 5 2 1 Main Click on the Main link under the Status drop down menu The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Client are displayed in the LAN sectio...

Page 30: ...de 30 5 2 2 Connection Status Click on the Connection Status link under the Status drop down menu This page displays the current status of the network including network type SSID BSSID connection status wireless mode current channel security data rate noise level and signal strength ...

Page 31: ...all events logs of older events are deleted but logs of the latest events are retained 5 3 System Click on the System link on the navigation drop down menu You will then see three options System Properties IP Settings and Spanning Tree Settings Each option is described in detail below 5 3 1 System Properties Click on the System Properties link under the System drop down menu This page allows you t...

Page 32: ...ically DHCP radio button if the Access Point is connected to a DHCP server This will allow the Access Point to pass IP addresses to the clients associated with it You may select Specify an IP Address radio button if you would like the device to use a static IP address In this case you would be required to specify an IP address subnet mask and default gateway IP address IP Address Specify an IP add...

Page 33: ... Max Age Specify the number of seconds for the max age Bridge Forward Delay Specify the number of seconds for the bridge forward delay Priority Specify the number of seconds for the priority Click on the Apply button to save the changes 5 4 Wireless Click on the Wireless link on the navigation drop down menu You will then see three options wireless network wireless security and wireless advanced s...

Page 34: ...ll be accessing the wireless networks it is recommended that you select A or B G mixed for the best performance SSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters You may specify an SSID or select one from the Site Survey Site Survey Click on the Site Survey button in...

Page 35: ...ong as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted without encryption Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point The device requesting authentication encrypts the challenge text and sends it back to the Access Point If the challenge text is encrypted correct...

Page 36: ...on the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with Passphrase Spec...

Page 37: ... Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Protection Mode If your wireless network is using both 802 11b and 802 g devices then it is recommended to enable this feature so that the 802 11b devices will not degrade the performance of 802 11g devices WMM You can select Enable or...

Page 38: ...irst field Password Specify a password into this field and then re type the password into the Confirm Password field Click on the Apply button to save the changes 5 5 2 SNMP Settings Click on the SNMP Settings link under the Management menu This option allows you to assign the contact details location and community name and trap settings for SNMP This is a networking management protocol used to mo...

Page 39: ...Restore Reset to factory default settings Click on the Backup Restore Setting link under the Management menu This option is used to save the current settings of the device in a file on your local disk or load settings on to the device from a local disk This feature is very handy for administrators who have several devices that need to be configured with the same settings Save a copy of the current...

Page 40: ... Browse button and then select the appropriate firmware and then click on the Upgrade button Note The upgrade process may take about 1 minute to complete Do not power off the device during this process as it may crash the device and make it unusable The device will restart automatically once the upgrade is complete 5 5 5 Time Settings Click on the Time Settings link under the Management menu This ...

Page 41: ...he Log link under the Management menu The Log page displays a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes Syslog Choose to enable or disable the system log Log Server IP Address Specify the IP address of the se...

Page 42: ...ess the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into four sections 1 Status Displays the overall status connection status and event log 2 System This menu includes the system properties IP and Spanning Tree settings 3 Router This in...

Page 43: ...rop down menu The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Server are displayed in the LAN section In the Wireless section Operation Mode Wireless Mode SSID Se...

Page 44: ...st shows all connection with DHCP clients 6 2 3 Connection Status Click on the Connection Status link under the Status drop down menu This page displays the current status of the network including network type SSID BSSID connection status wireless mode current channel security data rate noise level and signal strength ...

Page 45: ... 4 System Log Click on the System Log link under the Status drop down menu The device automatically logs records events of possible interest in its internal memory If there is not enough internal memory for all events logs of older events are deleted but logs of the latest events are retained ...

Page 46: ...ating mode of the device as well as specify a name and select the operating region Device Name Specify a name for the device this is not the SSID Country Region Select a country from the drop down list Operating Mode Select and operating mode Configuration for each operating mode is described in their respective chapters Click on the Apply button to save the changes 6 4 Router Click on the Router ...

Page 47: ...Specify an account name if your ISP has provided you with one Domain Name Specify a domain name if the ISP has provided you with one MTU The Maximum Transmission Unit MTU is a parameter that determines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU ...

Page 48: ...dress If you need to change the MAC address of the router s WAN interface either type in an alternate MAC address for example the MAC address of the router initially connected to the ISP or click on the Clone MAC button Click on the Apply button to save the changes 6 4 1 2 WAN Static IP The WAN interface can be configured as Static IP address In this type of connection your ISP provides you with a...

Page 49: ...ome connections In either case network performance can suffer IP Address Specify the IP address for this device which is assigned by your ISP Subnet Mask Specify the subnet mask for this IP address which is assigned by your ISP Default Gateway Specify the IP address of the default gateway which is assigned by your ISP Domain Name Service Select Get Automatically from ISP if the ISP will provide th...

Page 50: ...he router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections In either case network performance can suffer Login Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field Service Name Specify the name of the ISP Type Select a reconnection type Keep...

Page 51: ...of communication rules that allows corporations to extend their own corporate network through private tunnels L2TP Pass Through Place a check in this box if you would like to enable this pass through Layer 2 Tunneling Protocol is a transport protocol that enables tunneling through the Internet for the establishment of virtual private networks IPSec Pass Through Place a check in this box if you wou...

Page 52: ...connected to the network you may select A B G or B G mixed If you are not sure about which clients will be accessing the wireless networks it is recommended that you select A or B G mixed for the best performance SSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters You ...

Page 53: ...ent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network Authentication Type Select an authentication method Options available are Open Key Shared Key or Auto An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set All authentication packets are transmitted ...

Page 54: ...ent key that will be used Key 1 4 You may enter four different WEP keys Click on the Apply button to save the changes 6 5 2 2 Wireless Security WPA PSK WPA2 PSK Security Mode Select WPA PSK or WPA2 PSK from the drop down list if your wireless network uses WPA pre shared key Encryption Select TKIP or AES from the drop down list if your wireless network uses this encryption WPA Wi Fi Protected Acces...

Page 55: ...lication distance of the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network Fragment Packets over the specified size will be fragmented in order to improve performance on noisy networks RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preve...

Page 56: ...his device is configured without a user name and password admin For security reasons it is highly recommended that you create a new user name and password Name Specify a user name into the first field Password Specify a password into this field and then re type the password into the Confirm Password field Remote Management Choose to enable or disable remote management Remote Upgrade Choose to enab...

Page 57: ...tact details of the device Location Specify the location of the device Read Only Community Name Specify the password for access the SNMP community for read only access Read Write Community Name Specify the password for access to the SNMP community with read write access Send SNMP Trap Specify the IP address of the computer that will receive the SNMP traps Trap Community Name Specify the password f...

Page 58: ...wse button to select the file and then the Restore button Revert to factory default settings Click on the Factory Default Settings button to reset the device to the default settings Please wait while the device restart and then access the device using the default IP address 192 168 1 1 6 6 4 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu This page is used to upgrade ...

Page 59: ... the device and make it unusable The device will restart automatically once the upgrade is complete 6 6 5 Time Settings Click on the Time Settings link under the Management menu This page allows you to configure the time on the device You may do this manually or by connecting to a NTP server Manually Set Date and Time Specify the date and time Automatically Get Date and Time Select the time zone f...

Page 60: ...nd Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes Syslog Choose to enable or disable the system log Log Server IP Address Specify the IP address of the server that will receive the system log Local Log Choose to enable or disable the local log Click on the Apply butt...

Page 61: ...ower over Ethernet Proprietary PoE design Power Adapter 24V 1A DC Regulation Certifications FCC Part 15C 15B 15E EN 300 328 EN 301 489 1 17 RF Specification Frequency Band 802 11a 5 150 5 350GHz 5 470 5 725GHz 5 725 5 825GHz 802 11b g 2 412 2 472GHz Modulation Technology OFDM BPSK QPSK 16 QAM 64 QAM DSSS DBPSK DQPSK CCK Operating Channels 802 11a See the Table1 802 11b g 11 for North America 14 fo...

Page 62: ... 22dBm 54Mbps 2 412 2 462 GHz IEEE802 11 g 28dBm 6 24Mbps 26dBm 36Mbps 25dBm 48Mbps 24dBm 54Mbps 2 412 2 472 GHz IEEE802 11g 28dBm 6 24Mbp s 26dBm 36Mbps 25dBm 48Mbps 24dBm 54Mbps 2 412 2 462 GHz IEEE802 11 b 28dBm 1 11Mbps 2 412 2 472 GHz IEEE802 11b 28dBm 1 11Mbp s Internal Antenna 1 x 5dBi 2 4GHz Panel Antenna 1 x 13dBi 5GHz Panel Antenna External Antenna 2 x SMA connector for 2 4GHz and 5GHz i...

Page 63: ...ons MAC address filtering up to 50 field Wireless STA Client connected list QoS WMM Management Configuration Web based configuration HTTP Firmware Upgrade Upgrade firmware via web browser Keep latest setting when f w update Administrator Setting Administrator password change Reset Setting Reboot Press 1 second Reset to Factory Default Press 5 seconds System monitoring Status Event Log SNMP V1 V2c ...

Page 64: ...ollowing measures z Reorient or relocate the receiving antenna z Increase the separation between the equipment and receiver z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for complian...

Page 65: ...The conformity to the above directive is indicated by the CE sign on the device The ALLNET ALL0258 Wireless Outdoor Access Point Client Bridge conforms to the Council Directive of 2006 95 EC This equipment meets the following conformance standards EN 300 328 EN 301489 1 17 EN 301 893 EN 50385 EN 60950 This equipment is intended to be operated in all countries This declaration is made by ALLNET Deu...

Reviews: