www.elpro.com.au
245U-E Wireless Ethernet Modem User Manual
31
Rev Version 2.24
Radio Data Rate and Channel will be set to Auto, Radio Transmit Power will be set to maximum and any
previous configuration of unrelated parameters will not be modified and will still apply.
3.4 Network Configuration
You can view or modify Ethernet network parameters by selecting the Network menu. When prompted for
the username and password, enter “user” as the username, and “user” as the password. This is the factory
default setting. To change the default username and password, see “3.24 Module Information.” If you
have forgotten the IP address or password, the factory default switch may be used to access the existing
configuration. Refer to previous section for more information.
Figure 28 Network
The Network Configuration page allows configuration of parameters related to the wired and wireless
Ethernet interfaces. In general, IP address selection will be dependent upon the connected wired Ethernet
device(s). Before connecting to an existing LAN consult the network administrator.
Default configuration of the module will be “Client” and “Bridge.” When in Bridged mode, the module’s
wired and wireless IP address will be the same, meaning only one IP address is required. If the device mode
is changed to “Router,” the page will display two IP addresses, one for Ethernet and one for wireless. For
more information on bridging networks see “3.18 Routing.”
If the module has been configured for VLAN, the page will show the device mode as “VLAN Bridge” and the
Ethernet IP and netmask will no longer be editable. See “3.23 VLAN” for details on VLAN configuration.
A system of 245U-Es must have at least one access point (configured as a master) and have one or more
clients. All 245U-Es must have the same system address (ESSID). For further information and examples on
wireless network topologies refer to “1.0 Network Topology.”
The 245U-E supports several different radio encryption schemes. If utilizing any form of encryption, all
modules in the system that communicate with each other will need the same encryption method and