background image

 

LP-2396K  

Outdoor 2.4GHz Wireless AP/CPE/Bridge 

             
        
 
 
 
User Manual  

 

 
 

 

 

Summary of Contents for LP-2396K

Page 1: ...1 LP 2396K Outdoor 2 4GHz Wireless AP CPE Bridge User Manual ...

Page 2: ...ith LP 2396K 16 4 Software Features 17 4 1 Operation Mode 17 4 1 1 Access Point 17 4 1 2 Client 25 4 1 3 WDS Access Point 33 4 1 4 WDS Client 41 4 1 5 AP Router 49 4 1 6 Wireless ISP 64 4 2 System Configuration 80 4 2 1 Device IP Settings 80 4 2 2 Time Settings 81 4 2 3 Password Settings 82 4 2 4 System Management 83 4 2 5 Ping Watchdog 84 4 2 6 Firmware Upgrade 85 4 2 7 Save and Restore 85 4 2 8 ...

Page 3: ...se feel free to contact us We d love to hear from you and thank you for your support Email support loopcomm com Website www loopcomm com Notice This document is issued to guide users how to install and operate LP 2396K Outdoor Long Range 802 11b g n Wireless AP CPE Bridge Please read the document carefully to avoid any damage which is caused by inappropriate use excluding from the warranty Loopcom...

Page 4: ...can operate up to 300Mbps data rate by supporting IEEE 802 11b g n standard and with full WEP WPA WPA2 data security Wireless LAN Access Control List and TKIP AES encryption It keeps the data transmission safe in any network connection mode Moreover it supports different operation modes for any user s applications like point to point network and IP surveillance Product Outline ...

Page 5: ...Package Content The package content includes the following items shown from left to right in the below figure LP 2396K DC 24V 1A Power adapter Power cord User Manual CD Cable Tie Quick Installation Guide QIG ...

Page 6: ... TKIP AES encryption Support SNMP V2 management SSH NTP and Telnet Support QoS bandwidth control MAC Access Control Built in Web based management and firmware upgrade PoE pass through available on Secondary Ethernet port Configurable via Web UI Remotely enable system reset by PoE Adapter 1 4 Application 1 4 1 Wireless ISP WISP Mode LP 2396K can operate as station client in WISP mode to remotely re...

Page 7: ...cs for LP 2396K is directional with high gain design it can transmit RF signal for several miles Based on this point LP 2396K is greatly used to bridge at long distance transmission for point to point applications like IP surveillance networking company ...

Page 8: ...8 1 5 Product Outline Introduction 1 5 1 Front view 1 5 2 Back view ...

Page 9: ... is powered OFF Main ON Port linked OFF No connection Blink Data is being transmitted or received on the Main Ethernet port Secondary ON Port linked OFF No connection Blink Data is being transmitted or received on the Secondary Ethernet port 2 4GHz Blink Data is being transmitted or received using Wi Fi ...

Page 10: ...full duplex and complies with IEEE 802 3 802 3u respectively Note In Operation mode the AP router s secondary port will be WAN Port by default Reset Button Press continually the reset button at least 5 seconds to reset the configuration parameters to factory defaults Earth Ground It used to connect the metal line to ground in order to avoid the device from external electrical damage Note LP 2396K ...

Page 11: ...Mounting Options Pole Mount Use cable tie and make it pass through the one of middle holes to fix and tie on the pole Wall Mount Please fix the screws into the wall and hang LP 2396K on the corresponding screws ...

Page 12: ...he Main Ethernet port of LP 2396K with a RJ 45 cable Note LP 2396K built in PoE pass through function on Secondary Ethernet port It means the Secondary Ethernet port is able to provide 24V power for a secondary device if this function enabled on Web Configuration Please refer to the statement on Advanced Setting of Radio menu ...

Page 13: ...Ethernet port to PoE Adapter 7 LAN port Connect Ethernet cable from PoE Adapter to your computer laptop for Web configuration 8 Reset button It allows user to remotely reset the system of LP 2396K Note 1 There is no software driver or utility installation needed 2 RJ 45 8P8C Ethernet cable is required 3 It takes about 60 seconds to complete the boot up sequence after LP 2396K powered up ...

Page 14: ...o for IP surveillance The following figure indicates the basic setup to implement IP surveillance with a pair of LP 2396K The remote monitoring image can be delivered to local NVR via the high powered long distance transmission by LP 2396K ...

Page 15: ...work segment as LP 2396K before connecting to LP 2396K Configuration Example In the Windows 7 operating system 1 Press Start and enter ncpa cpl in search bar You will see network connection page 2 Select your network interface card and Right click to set Properties 3 Double click Internet Protocol Version 4 TCP IPv4 4 Select Specify an IP address and enter the IP address IP Address 192 168 1 x x c...

Page 16: ...rted with LP 2396K 1 Open Web browser and enter 192 168 1 200 in the URL field of Web browser 2 Enter admin as default user name and admin as default password After successful login you can see the Loopcomm web page ...

Page 17: ... they are 4 1 1 Access Point It Connects to an internal network LAN and broadcasts a wireless network connection WLAN When operating in the Access Point mode LP 2396K becomes the center hub of the wireless network All wireless cards and clients connect and communicate through the device Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup the...

Page 18: ...nnel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the...

Page 19: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Page 20: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 21: ...timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is the better the security it varies from 300 to 3600 S...

Page 22: ...s beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI ...

Page 23: ...rmines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Wi Fi Multimed...

Page 24: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Page 25: ...ient to connect a remote segment to an existing WLAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Page 26: ...elects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level m...

Page 27: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Page 28: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 29: ...timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is the better the security it varies from 300 to 3600 S...

Page 30: ...ze A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two ...

Page 31: ...ice is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings ...

Page 32: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Page 33: ...ase station for a Wireless Distribution System mesh network Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Page 34: ... wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regul...

Page 35: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Page 36: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 37: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Page 38: ...the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting ...

Page 39: ...r of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected setting...

Page 40: ...When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Clic...

Page 41: ... station in a Wireless Distribution System mesh network Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Page 42: ... selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level...

Page 43: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Page 44: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 45: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Page 46: ...nsmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guar...

Page 47: ...termines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the f...

Page 48: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Page 49: ... WLAN to allow cross communication Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed Note In AP router secondary port will be WAN Port by default ...

Page 50: ...this network User cannot Ping Radio Mode Select the Mode of 2G 11NG HT20 or 2G 11NG HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit P...

Page 51: ...entification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE ...

Page 52: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 53: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Page 54: ...nsmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guar...

Page 55: ...termines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the f...

Page 56: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Page 57: ...el to clear the entered settings Static Mode fixed IP Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the I...

Page 58: ...el Click Save to change the new settings Click cancel to clear the entered settings Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registe...

Page 59: ...Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start Address of ...

Page 60: ...ally Internet users would not be able to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP UDP TCP or UDP IP Address Enter the IP address to which the data packets can...

Page 61: ...ternet Fields Description Filtering Enable Disable the function to IP Filter Protocol Specify protocol TCP UDP TCP or UDP IP Address Enter the specific IP Address to be denied Comment Make a comment for the IP Filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings ...

Page 62: ...omment for the Port Filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings MAC Filtering Settings The MAC filtering feature allows you to deny MAC address which cannot connect to internet Fields Description Filtering Select Enable Disable the Mac Filtering function Mac Address Enter the specific MAC address to be denied Comment Make a comment fo...

Page 63: ...ddress of the device PC connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Cancel Click Add to change the new settings Click cancel to clear the enter...

Page 64: ...is an internet Service Provider with a network based on wireless networking Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Page 65: ...SID from the list Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Radio Mode Select the Mode of 2G 11NG HT20 or 2G 11NG HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu ...

Page 66: ...ording to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2396K and other device for accurate transmission performance Save and Restart It saves the new settings and restarts Site Survey You could configure AP Client parameters here Click Rescan to brow...

Page 67: ...fies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key ...

Page 68: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Page 69: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security it varies from 300 to 3600 Sec...

Page 70: ...the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting ...

Page 71: ...r of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected setting...

Page 72: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Page 73: ...el to clear the entered settings Static Mode fixed IP Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the I...

Page 74: ...el Click Save to change the new settings Click cancel to clear the entered settings Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registe...

Page 75: ...Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start address of ...

Page 76: ...ally Internet users would not be able to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP UDP TCP or UDP IP Address Enter the IP Address to which the data packets can...

Page 77: ... policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet Fields Description Filtering Enable Disable the function to Port Filter Protocol Specify the protocol TCP UDP TCP or UDP Port Range Enter the specific Port range to be denied Comment ...

Page 78: ...iltering function Mac Address Enter the specific MAC address to be denied Comment Make a comment for the filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings SNMP Settings Fields Description SNMP Enable Disable the feature to access Save Cancel Click Save to change the new settings Click cancel to clear the entered settings ...

Page 79: ...ddress and Mac address Local IP Address If you select IP Address then Enter the IP Address of the device PC connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Con...

Page 80: ...the Device IP Subnet Mask Enter the Subnet Mask as 255 255 0 0 Gateway IP Address Enter the Gateway IP Address for the Device DNS Server Primary DNS Server Secondary DNS Server The Domain Name System DNS is a server on the Internet that translates logical names such as www yahoo com to IP addresses like 66 218 71 80 In order to do this a query is made by the requesting device to a DNS server to pr...

Page 81: ...ble NTP so that time date will be updated correctly even after reboot Server Name Enter the NTP server Name NTP request interval NTP updating time interval By default its 24 Local Time Zone Select the Time zone of your country from pull down menu Local date and time Enter the month date year hours Minutes and seconds AM PM Manually to set date and time Sync with PC It Synchronizes the new settings...

Page 82: ...assword please go to System Configuration Password Settings menu Fields Description Current Password Enter the password of the device New Password Enter your new password to which you want to change Re enter New Password For confirmation enter the new password again Save Change It saves and changes to New Password ...

Page 83: ...Device Name POE Pass Through It allows Secondary Ethernet port to provide 24V power for a secondary device when it s enabled UPnP Administrator can enable or disable the UPnP function Syslog This option enables the registration routine of system log syslog messages IGMP Internet Group Management Protocol Enable disable the IGMP function for the multiple bridged ports Save Start It saves the settin...

Page 84: ...case Fields Description Ping Watchdog Enable Disable the function to access IP Address 1 Enter the IP address to be pinged Ping Frequency Set the number of seconds to be Pinged Failed Tries Enter the number of permitted times for the ping to be failed before power reboot For example 2 means the CPE will reconnect if the PING doesn t respond for 120Seconds Action If the remote IP address does not r...

Page 85: ...hen firmware upgrade is in process Otherwise it will probably cause system crash Caution A corrupted file will hang up the System 4 2 7 Save and Restore System Configuration Configuration Save and Restore You can save system configuration settings to a file and later download it back to the LP 2396K by following the steps Save Press Save button to save the current configuration settings of the dev...

Page 86: ...settings Click YES to go ahead and restore the configuration to the factory default 4 2 9 Reboot Whenever you use the Web configuration to change system settings the changes are initially placed in temporary storage These changes will be lost if the device is reset or turn off IMPORTANT Do not turn off or press the Reset button while this procedure is in progress ...

Page 87: ...e Disable the feature to access Reboot Time Enter the Time to reboot Reboot Plan Select the option weekday or every day to reboot Weekday Select the number of days to reboot Apply changes Reset Click it to save the changed settings Click it to erase the saved settings ...

Page 88: ... requesting host receives a response from the destination host this host is reachable Network Ping is commonly used to provide a basic picture of where a specific networking problem may exist For example if an Internet connection is down at an office the ping utility can be used to figure out whether the problem exists within the office or within the network of the Internet provider Fields Descrip...

Page 89: ...se intermediate hosts If you execute the Traceroute command on a source device it sends IP packets toward the destination with Time To Live TTL values that increment up to the maximum specified hop count This is 30 by default on most systems Fields Description Destination IP Address Enter the IP address to which you like to know the trace route Max Hop Maximum number of routes Result It displays t...

Page 90: ...itor the status of the device It provides information on device status wireless information LAN Information wireless client table and system log 4 4 1 Device Information Device Status Device Information It presents the status of LP 2396K Firmware devices memory utilization and ARP Table ...

Page 91: ...evice such as current operation mode wireless traffic error packets device SSID Band channel and encryption used Transmit Power 4 4 3 LAN Information This page shows the LAN information of LP 2396K device such as Physical Address IP Address Network Mask Default Gateway and DHCP details ...

Page 92: ...92 4 4 4 Internet Information 4 4 5 Wireless Client Table This feature displays the currently connected MAC address of Wi Fi clients ...

Page 93: ...93 4 4 6 System LOG This page is used to view system logs The System Log displays the system activities login and system error report 4 5 LOGOUT Please make sure to Logout after you finish all settings ...

Page 94: ...an for help FCC Caution This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation RF Radiation Exposure and Hazard Statement To ensure compliance with FCC RF exposure requirements this device...

Reviews: