background image

21 
 

 

128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 

hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. 

The Default Tx Key field determines which of the four keys you want to use in your WLAN environment. 

 

WEP Encryption with 802.1x Setting 

The device supports an external RADIUS Server that can secure networks against unauthorized access. If you use the WEP 

encryption, you can also use the RADIUS server to check the admission of the users. In this way every user must use a valid 

account before accessing the Wireless LAN and requires a RADIUS or other authentication server on the network.  An 

example is shown as follows: 

 

You should choose WEP 64 or 128 bit encryption based on your current network requirements. Then add user accounts and 

the target device to the RADIUS server. In the device, you need to specify the IP address, Password (Shared Secret) and Port 

number of the target RADIUS server. 

 

 

 

Содержание DLB70 Series

Страница 1: ...DLB70XX WLAN Dual Outdoor Radio User Manual Version 1 0 0 11 08 2006...

Страница 2: ...etwork Type 15 SSID 15 Channel Number 15 Advanced Settings 17 Authentication Type 17 Fragment Threshold 17 RTS Threshold 17 Beacon Interval 17 ACK Timing 18 Client Expired Time 18 MTU Size 18 Data Rat...

Страница 3: ...ic IP 41 PPPoE 43 PPTP 44 Configuring Clone MAC Address 45 VPN Pass through 48 Static Route Setup 48 Dynamic Route Setup 49 Firewall Configuration 51 Configuring LAN to WAN Firewall 51 Port Filtering...

Страница 4: ...3 Auto Discovery Tool 66 Discover 66 Setup IP 66 Detail 67 WDS 68 Active Clients 68 Connect to Web Server 68...

Страница 5: ...ng antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from where the receiver is connected Consult the dealer or an experien...

Страница 6: ...lesser gain than those that are certified with this device may be used legally by the installer 23 dBi gain antenna Arc Wireless Solutions antenna PN ANT S 2126 01 Packing List Before you start to in...

Страница 7: ...xample shows how to create a bridged Access Point using both the 802 11A radio and the 802 11B G radio The Operation Mode needs to be set to Bridge This bridges both wireless interfaces and the ethern...

Страница 8: ...isable Wireless LAN Interface checkbox Set the Mode to AP Assign the SSID For this example we used DLB_AP_A since this is the 802 11A interface For ease of management it might be beneficial to change...

Страница 9: ...ter In this mode the device can connect to the other wireless stations Ad Hoc network type or Access Point Infrastructure network type and you don t need to install any driver In Basic Settings page c...

Страница 10: ...d then press Connect button to establish the link If the link is established successfully it will show the message Connect successfully Then press OK Then you can check the linking information in Stat...

Страница 11: ...he device supports WEP and WPA Personal Enterprise except WPA2 mixed mode data encryption For more information about the detail data encryption settings please refer the security section Configuring U...

Страница 12: ...n the same subnet as the device such as 192 168 2 X for LAN 172 1 1 X for WAN NOTE By default the DHCP server is enabled Do not have multiple DHCP servers in your network environment otherwise it will...

Страница 13: ...rement Bridge The wired Ethernet and wireless NIC are bridged together Once Bridge mode is selected all the WAN related functions will be disabled WISP Wireless ISP This mode allows the wireless NIC t...

Страница 14: ...e the same public IP address from your ISP WDS Wireless Distribution System This mode serves as a wireless repeater the device forwards the packets to another AP with WDS function When this mode is se...

Страница 15: ...wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards t...

Страница 16: ...nection In client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish a...

Страница 17: ...s EMEA Japan Israel and China 7 2442 Americas EMEA Japan Israel and China 8 2447 Americas EMEA Japan Israel and China 9 2452 Americas EMEA Japan Israel and China 10 2457 Americas EMEA Japan and China...

Страница 18: ...ng one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent as several pieces instead of as one block Use a low setting in areas whe...

Страница 19: ...ur wireless clients find the device automatically If you are building a public Wireless Network disabling this function can provide better security Every wireless station located within the coverage o...

Страница 20: ...de and two transmission output power levels 100 and 50mW for OFDM 802 11g mode You can adjust the power level to change the coverage of the device Every wireless station located within the coverage of...

Страница 21: ...d in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client in your wireless network For more secure data transmission you can change the e...

Страница 22: ...t unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the users In this way every user must use a valid account before accessing the Wireless...

Страница 23: ...requires only an access point and client station that supports WPA PSK The WPA PSK settings include Key Format Length and Value They must be the same as each wireless client in your wireless network...

Страница 24: ...emonstrate the WDS network topologies and WDS AP List configuration You can setup four kinds of network topologies bus star ring and mesh In this case there are five devices with WDS enabled WDS1 WDS2...

Страница 25: ...ddress of WDS1 No Ring topology Device Entries of WDS AP List Spanning Tree Protocol Required WDS1 The MAC Addresses of WDS2 and WDS5 Yes WDS2 The MAC Addresses of WDS1 and WDS3 Yes WDS3 The MAC Addre...

Страница 26: ...S1 WDS2 WDS3 and WDS4 Yes Wireless Repeater A Wireless Repeater can be used to increase the coverage area of another device Parent AP Between the Parent AP and the Wireless Repeater wireless stations...

Страница 27: ...SID Choose WDS mode for only wireless backbone extension purpose You can use any network topology please refer the WDS topology section Site Survey This tool allows you to scan for nearby wireless net...

Страница 28: ...27...

Страница 29: ...wireless clients to join a wireless local network Client Support Infrastructure and Ad hoc network types to act as a wireless adapter WDS This mode serves as a wireless repeater the device forwards t...

Страница 30: ...client mode the device can not support the Router mode functions including Firewall and WAN settings SSID The SSID is a unique identifier that wireless networking devices use to establish and maintai...

Страница 31: ...4 5170 36 5180 38 5190 40 5200 42 5210 44 5220 46 5230 48 5240 52 5260 56 5280 60 5300 64 5320 149 5745 153 5765 157 5785 161 5805 When set to Auto the device will find the least congested channel for...

Страница 32: ...setting is Auto The wireless client can associate with the device by using one of the two types Fragment Threshold The fragmentation threshold determines the size at which packets are fragmented sent...

Страница 33: ...pport the long preamble The short preamble optional maybe used to improve throughput when all stations on the network support the short preamble Broadcast SSID Broadcasting the SSID will let your wire...

Страница 34: ...s 1 3 clients to transmit at higher speeds In larger networks this will result in degraded performance Transmit Power The device supports four transmission output power levels 250 200 150 and 100mW fo...

Страница 35: ...ecurity function you need Encryption Wired Equivalent Privacy WEP is implemented in this device to prevent unauthorized access to your wireless network The WEP setting must be the same as each client...

Страница 36: ...g The device supports an external RADIUS Server that can secure networks against unauthorized access If you use the WEP encryption you can also use the RADIUS server to check the admission of the user...

Страница 37: ...tion mode is Enterprise RADIUS you have to add user accounts and the target device to the RADIUS Server In the device you need to specify the IP address Password Shared Secret and Port number of the t...

Страница 38: ...figuration The bridging devices by WDS must use the same radio channel When the WDS function is enabled no wireless stations can connect to the device If your network topology has a loop you need to e...

Страница 39: ...eferred SSID and BSSID in a fixed period If preferred APs are found the radio will try to connect to them one by one regardless of the signal quality and strength Please note that checking the preferr...

Страница 40: ...39...

Страница 41: ...resses as shown in the following page When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will be set to the IP address of...

Страница 42: ...of the DNS addresses IP Address The Internet Protocol IP address of WAN interface provided by your ISP or MIS The address will be your network identifier outside of your local network Subnet Mask The...

Страница 43: ...destination DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists of domain name IP addresses and map...

Страница 44: ...equests to other servers on the Internet until the specified web site is found Clone MAC Address Clone device MAC address to the specific MAC address required by your ISP Enable uPnP Enable uPnP this...

Страница 45: ...need to change the MTU for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS ma...

Страница 46: ...U for optimal performance with your specific ISP DNS 1 3 The IP addresses of DNS provided by your ISP DNS Domain Name Server is used to map domain names to IP addresses The DNS maintains central lists...

Страница 47: ...46 Clone MAC address for Static IP WAN access type Clone MAC address for PPPoE WAN access type...

Страница 48: ...47 Clone MAC address for PPTP WAN access type Physical LAN interface MAC address clone...

Страница 49: ...tton Static Route Setup You can set the routing information to let the Router know what routing is correct if it cannot learn automatically through other means For example if the user wants to link th...

Страница 50: ...nge button In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1 2 to transmit and receive the route information with other Rout...

Страница 51: ...50 In the Dynamic Routing Table there are two routings for Network 3 and Network 4...

Страница 52: ...table When the source port of outgoing packets matches the port definition or falls within the port ranges in the table the firewall will block those packets from LAN to WAN IP Filtering When you enab...

Страница 53: ...en used port numbers are shown in the following table Services Port Number ECHO 7 FTP File Transfer Protocol 21 Telnet 23 SMTP Simple Mail Transfer Protocol 25 DNS Domain Name System 53 Finger 79 HTTP...

Страница 54: ...cessible to Internet traffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers All inbound packets will be redirected to the computer you set It also is useful if you run some a...

Страница 55: ...54 Configuring VPN...

Страница 56: ...m 30 and Low 20 The following table describes the priorities that you can apply to bandwidth Priority Level Description High Typically used for voice or video applications that is especially sensitive...

Страница 57: ...sk Once the source destination IP Address is entered the subnet mask address must be filled in this field MAC Address Enter source destination MAC Address Port range You can enter specific port number...

Страница 58: ...le User C wants to use software phone to connect with customer Since VoIP traffic is sensitive to variations in delay jitter you can set High priority for User C However because the FTP transmission m...

Страница 59: ...a that from Wireless interface to Ethernet interface Downstream Latency Similar a waiting time the data queuing time Downstream Burst Packet Similar a buffer the data will into the buffer while the da...

Страница 60: ...boot the device linkDown 2 The trap is sent when any of the links are down See the following table linkup 3 The trap is sent when any of the links are UP See the following table authenticationFailure...

Страница 61: ...6 1 4 1 99 1 Mode 1 3 6 1 4 1 99 2 SSID 1 3 6 1 4 1 99 3 Channel 1 3 6 1 4 1 99 4 Band 1 3 6 1 4 1 99 5 RSSI 1 3 6 1 4 1 99 6 Active_Clients 1 3 6 1 4 1 99 7 Active_Clients_List 1 3 6 1 4 1 99 8 Encr...

Страница 62: ...fault setting upon rebooting and the original configuration data will be lost To upgrade the firmware just enter the file name with full path and click the Upload button Memory Limitation To make sure...

Страница 63: ...our local host then you can back up the configuration data to local host or restore configuration data to the device Password The Web Browser interface has password protection To disable the Web Brows...

Страница 64: ...n your firmware version Once the user has logged in to the device then the password can be changed by CLI command Execute CLI program This program won t execute automatically when user logs in to the...

Страница 65: ...64 Menu Tree List Password The SSH Configuration interface has password protection Please note that this password is separate from the web configuration password...

Страница 66: ...65...

Страница 67: ...ork and you would see the basic information about these devices such as SSID IP Address Subnet Mask Channel number MAC Address Setup IP After you press the Setup IP button you will see Setup IP Addres...

Страница 68: ...67 Detail If you want to see more detailed information you could press the Detail button and then you will see the Detail Information window...

Страница 69: ...you will see the WDS List window Active Clients After pressing the Active Clients button you will see the WLAN AP Active Clients window with information such as Connect to Web Server If you want conne...

Отзывы: