background image

Long Range Wireless Access Point / Client Bridge        

 

 

                      Version 1.0 

 

 

 54 

 

an

 

unencrypted

 

challenge

 

text

 

string

 

to

 

any

 

device

 

attempting

 

to

 

communicate

 

with

 

the

 

Access

 

Point.

 

The

 

device

 

requesting

 

authentication

 

encrypts

 

the

 

challenge

 

text

 

and

 

sends

 

it

 

back

 

to

 

the

 

Access

 

Point.

 

If

 

the

 

challenge

 

text

 

is

 

encrypted

 

correctly,

 

the

 

Access

 

Point

 

allows

 

the

 

requesting

 

device

 

to

 

authenticate.

 

It

 

is

 

recommended

 

to

 

select

 

Auto

 

if

 

you

 

are

 

not

 

sure

 

which

 

authentication

 

type

 

is

 

used.

  

ƒ

 

Input

 

Type

:

 

Select

 

He

 

or

 

ASCII

 

from

 

the

 

drop

down

 

list

 

ƒ

 

Key

 

Length

:

 

Select

 

a

 

key

 

format

 

from

 

the

 

drop

down

 

list.

 

64bit

hex

 

keys

 

require

 

10

 

characters,

 

where

 

as

 

128

bit

 

keys

 

require

 

26

 

characters.

 

A

 

hex

 

key

 

is

 

defined

 

as

 

a

 

number

 

between

 

0

 

through

 

9

 

and

 

letter

 

between

 

A

 

through

 

F.

 

ƒ

 

Default

 

Key

:

 

You

 

may

 

use

 

up

 

to

 

four

 

different

 

keys

 

for

 

four

 

different

 

networks.

 

Select

 

the

 

current

 

key

 

that

 

will

 

be

 

used.

  

ƒ

 

Key

 

1

4

:

 

You

 

may

 

enter

 

four

 

different

 

WEP

 

keys.

  

ƒ

 

Click

 

on

 

the

 

Apply

 

button

 

to

 

save

 

the

 

changes.

  

 
 

 

6.5.2.2

 

Wireless

 

Security

 

 

WPA

PSK,

 

WPA2

PSK

 

ƒ

 

Security

 

Mode

:

 

Select

 

WPA

PSK,

 

or

 

WPA2

PSK

 

from

 

the

 

drop

down

 

list

 

if

 

your

 

wireless

 

network

 

uses

 

WPA

 

pre

shared

 

key.

 

 

 

 

ƒ

 

Encryption

:

 

Select

 

TKIP

 

or

 

AES

 

from

 

the

 

drop

down

 

list

 

if

 

your

 

wireless

 

network

 

uses

 

this

 

encryption.

 

WPA

 

(Wi

Fi

 

Protected

 

Access)

 

was

 

designed

 

to

 

improve

 

upon

 

the

 

security

 

features

 

of

 

WEP

 

(Wired

 

Equivalent

 

Privacy).

 

The

 

technology

 

is

 

designed

 

to

 

work

 

with

 

existing

 

Wi

Fi

 

products

 

that

 

have

 

been

 

enabled

 

with

 

WEP.

 

WPA

 

provides

 

improved

 

data

 

encryption

 

through

 

the

 

Temporal

 

Integrity

 

Protocol

 

(TKIP),

 

which

 

scrambles

 

the

 

keys

 

using

 

a

 

hashing

 

algorithm

 

and

 

by

 

adding

 

an

 

integrity

 

checking

 

feature

 

which

 

makes

 

sure

 

that

 

keys

 

haven’t

 

been

 

tampered

 

with.

  

ƒ

 

Passphrase

:

 

Specify

 

a

 

passphrase

 

that

 

is

 

shared

 

amongst

 

the

 

Access

 

Points

 

and

 

clients.

  

ƒ

 

Click

 

on

 

the

 

Apply

 

button

 

to

 

save

 

the

 

changes.

  

 
 

Содержание EOC-5610

Страница 1: ...EOC 5610 Wireless Outdoor Access Point Client Bridge User s Manual V1 0 ...

Страница 2: ...4 2 3 SYSTEM LOG 15 4 3 SYSTEM 16 4 3 1 SYSTEM PROPERTIES 16 4 3 2 IP SETTINGS 17 4 3 3 SPANNING TREE SETTINGS 17 4 4 WIRELESS 18 4 4 1 WIRELESS NETWORK 18 4 4 1 1 WIRELESS SECURITY WEP 19 4 4 1 2 WIRELESS SECURITY WPA PSK WPA2 PSK WPA MIXED 20 4 4 1 3 WIRELESS SECURITY WPA WPA2 21 4 4 2 WIRELESS MAC FILTER 22 4 4 3 WIRELESS ADVANCED SETTINGS 22 4 5 MANAGEMENT 23 4 5 1 ADMINISTRATION 24 4 5 2 SNMP...

Страница 3: ...2 6 2 STATUS 43 6 2 1 MAIN 43 6 2 2 DHCP CLIENT TABLE 44 6 2 3 CONNECTION STATUS 44 6 2 4 SYSTEM LOG 45 6 3 SYSTEM 46 6 3 1 SYSTEM PROPERTIES 46 6 4 ROUTER 46 6 4 1 WAN SETTINGS 47 6 4 1 1 WAN DHCP 47 6 4 1 2 WAN STATIC IP 48 6 4 1 3 WAN PPPOE 49 6 4 2 LAN SETTING 51 6 4 3 VPN PASS THROUGH 51 6 5 WIRELESS 52 6 5 1 WIRELESS NETWORK 52 6 5 2 WIRELESS SECURITY 53 6 5 2 1 WIRELESS SECURITY WEP 53 6 5 ...

Страница 4: ...Long Range Wireless Access Point Client Bridge Version 1 0 4 Revision History Version Date Notes 1 0 January 08 2009 Initial Version ...

Страница 5: ... and superior performance EOC 5610 makes an optimal wireless solution for both small and large scale projects 1 1 Features Wireless 5GHz 2 4GHz It works in 5GHz 2 4GHz frequency spectrum High output power Transmit output power programmable for different country selections High Data Rate High speed transmitting rate up to 108Mbps with Super Mode supports large payload such as MEPG video streaming M...

Страница 6: ... case of return the unit must be shipped in its original package h 1 Wireless 802 11a b g Outdoor Device EOC 5610 h 1 PoE Injector EPE 1212 h 1 Power Adaptor 24V 0 6A h 1 CD with User s Manual h 1 QIG h 1 Metal strap h 1 Special screw set 1 3 Safety Guidelines In order to reduce the risk of fire electric shock and injury please adhere to the following safety guidelines h Carefully follow the instr...

Страница 7: ...r impossible or very expensive b Temporary workgroups Consider situations in parks athletic arenas exhibition centers disaster recovery temporary offices and construction sites where one wants a temporary WLAN established and removed c The ability to access real time information Doctors nurses point of sale employees and warehouse workers can access real time information while dealing with patient...

Страница 8: ...cess Point Client Bridge Version 1 0 8 h Training Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information information exchanges and learning ...

Страница 9: ...to AP Bridge port of the PoE injector and the other end into you cable DSL modem Internet 4 Insert the DC inlet of the power adapter into the 24V port of the PoE injector and the other end into the power socket on the wall This diagram depicts the hardware configuration 2 2 Hardware Description The images below depict the front and rear panel of the Access Point Client Bridge PoE Injector PC Cable...

Страница 10: ...ridge Router or Access Point The default IP address of the device is 192 168 1 1 In order to log into this device you must first configure the TCP IP settings of your PC Notebook 1 In the control panel double click Network Connections and then double click on the connection of your Network Interface Card NIC You will then see the following screen Standard Pole Mount Optional Wall Mount Optional Wi...

Страница 11: ... TCP IP settings of your PC Notebook 3 Select Use the following IP Address radio button and then enter the IP address and subnet mask Ensure that the IP address and subnet mask are on the same subnet as the device For Example PC IP address 192 168 1 10 PC subnet mask 255 255 255 0 4 Click on the OK button to close this window and once again to close LAN properties window ...

Страница 12: ...r of the web browser and press Enter Make sure that the device and your computers are configured on the same subnet Refer to Chapter 2 in order to configure the IP address of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will see the graphical user interface of the device Click on ...

Страница 13: ...dress of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into four sections 1 Status Displays the overall status connection status and event log 2 System This menu includes the system pro...

Страница 14: ...2 1 Main Click on the Main link under the Status drop down menu The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Client are displayed in the LAN section In the Wir...

Страница 15: ...cess Point The MAC addresses and signal strength for each client is displayed Click on the Refresh button to refresh the client list 4 2 3 System Log Click on the System Log link under the Status drop down menu The device automatically logs records events of possible interest in its internal memory If there is not enough internal memory for all events logs of older events are deleted but logs of t...

Страница 16: ...rties Click on the System Properties link under the System drop down menu This page allows you to switch the operating mode of the device as well as specify a name and select the operating region Device Name Specify a name for the device this is not the SSID Country Region Select a country from the drop down list Operating Mode Select and operating mode Configuration for each operating mode is des...

Страница 17: ...ith it You may select Specify an IP Address radio button if you would like the device to use a static IP address In this case you would be required to specify an IP address subnet mask and default gateway IP address IP Address Specify an IP address IP Subnet Mask Specify the subnet mask for the IP address Default Gateway Specify the IP address of the default gateway Click on the Apply button to sa...

Страница 18: ...r of seconds for the priority Click on the Apply button to save the changes 4 4 Wireless Click on the Wireless link on the navigation drop down menu You will then see four options wireless network wireless MAC filter WDS link settings and wireless advanced settings Each option is described below 4 4 1 Wireless Network The Wireless Network page allows you to configure the wireless mode channel SSID...

Страница 19: ...elect a channel from the drop down list The channels available are based on the country s regulation 4 4 1 1 Wireless Security WEP Security Mode Select WEP from the drop down list if your wireless network uses WEP encryption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network Authentication ...

Страница 20: ...re as 128 bit keys require 26 characters A hex key is defined as a number between 0 through 9 and letter between A through F Default Key You may use up to four different keys for four different networks Select the current key that will be used Key 1 4 You may enter four different WEP keys Click on the Apply button to save the changes 4 4 1 2 Wireless Security WPA PSK WPA2 PSK WPA Mixed Security Mo...

Страница 21: ...urity WPA WPA2 Security Mode Select WPA or WPA2 from the drop down list if your wireless network uses WPA WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled with WEP WPA provides improved data encryption through the Temporal Integrity Protocol TKIP which...

Страница 22: ...h the network By selecting Allow MAC in the List only the address listed in the table will have access to the network all other clients will be blocked On the other hand selected Deny MAC in the List only the listed MAC addresses will be blocked from accessing the network all other clients will have access to the network MAC Address Enter the MAC address This table lists the blocked or allowed MAC...

Страница 23: ...reshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance Protection Mode If your wireless network is using both 802 11b and 802 g devices then it is recommended to enable this feature so that the 802 11b devices will not degrade the performance of 802 11g devices WMM Enable wireless Q...

Страница 24: ...ssword Specify a password into this field and then re type the password into the Confirm Password field Click on the Apply button to save the changes 4 5 2 SNMP Settings Click on the SNMP Settings link under the Management menu This option allows you to assign the contact details location and community name and trap settings for SNMP This is a networking management protocol used to monitor network...

Страница 25: ...write access Send SNMP Trap Specify the IP address of the computer that will receive the SNMP traps Trap Community Name Specify the password for the SNMP trap community Click on the Apply button to save the changes 4 5 3 Backup Restore settings Reset to factory default settings Click on the Backup Restore Setting link under the Management menu This option is used to save the current settings of th...

Страница 26: ... 192 168 1 1 4 5 4 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu This page is used to upgrade the firmware on the device Make sure that downloaded the appropriate firmware from your vendor Click on the Browse button and then select the appropriate firmware and then click on the Upgrade button Note The upgrade process may take about 1 minute to complete Do not power ...

Страница 27: ...nder the Management menu The Log page displays a list of events that are triggered on the Ethernet and Wireless interface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes Syslog Choose to enable or disable the system log Log Server IP Address Specify the IP address of the server that wil...

Страница 28: ...ddress of your computer After connecting to the IP address the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into four sections 1 Status Displays the overall status connection status and event log 2 System This menu includes the system pr...

Страница 29: ... 1 Main Click on the Main link under the Status drop down menu The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Client are displayed in the LAN section In the Wire...

Страница 30: ...onnection Status Click on the Connection Status link under the Status drop down menu This page displays the current status of the network including network type SSID BSSID connection status wireless mode current channel security data rate noise level and signal strength ...

Страница 31: ...gs of older events are deleted but logs of the latest events are retained 5 3 System Click on the System link on the navigation drop down menu You will then see three options System Properties IP Settings and Spanning Tree Settings Each option is described in detail below 5 3 1 System Properties Click on the System Properties link under the System drop down menu This page allows you to switch the ...

Страница 32: ...adio button if the Access Point is connected to a DHCP server This will allow the Access Point to pass IP addresses to the clients associated with it You may select Specify an IP Address radio button if you would like the device to use a static IP address In this case you would be required to specify an IP address subnet mask and default gateway IP address IP Address Specify an IP address IP Subne...

Страница 33: ...Specify the number of seconds for the bridge forward delay Priority Specify the number of seconds for the priority Click on the Apply button to save the changes 5 4 Wireless Click on the Wireless link on the navigation drop down menu You will then see three options wireless network wireless security and wireless advanced settings Each option is described below 5 4 1 Wireless Network The Wireless N...

Страница 34: ...k and cannot exceed 32 characters You may specify an SSID or select one from the Site Survey Site Survey Click on the Site Survey button in order to scan the 2 4GHz frequency for devices that broadcast their SSID Click on the BSSID link to connect to the Access Point Click on the Refresh button to re scan the frequency 5 4 2 Wireless Security The Wireless Security page allows you to configure the ...

Страница 35: ...ypted correctly the Access Point allows the requesting device to authenticate It is recommended to select Auto if you are not sure which authentication type is used Input Type Select He or ASCII from the drop down list Key Length Select a key format from the drop down list 64bit hex keys require 10 characters where as 128 bit keys require 26 characters A hex key is defined as a number between 0 th...

Страница 36: ...h the Temporal Integrity Protocol TKIP which scrambles the keys using a hashing algorithm and by adding an integrity checking feature which makes sure that keys haven t been tampered with Passphrase Specify a passphrase that is shared amongst the Access Points and clients Click on the Apply button to save the changes 5 4 3 Wireless Advanced Settings Click on the Wireless Advanced Settings link On ...

Страница 37: ...on Mode If your wireless network is using both 802 11b and 802 g devices then it is recommended to enable this feature so that the 802 11b devices will not degrade the performance of 802 11g devices WMM You can select Enable or Disable WMM when doing the communication by wireless Distance 1 30km Specify a distance between 1 and 30Km Click on the Apply button to save the changes 5 5 Management Clic...

Страница 38: ...s is a networking management protocol used to monitor network attached devices SNMP allows messages called protocol data units to be sent to various parts of a network Upon receiving these messages SNMP compatible devices called agents return data stored in their Management Information Bases SNMP Enable Disable Choose to enable or disable the SNMP feature Contact Specify the contact details of the...

Страница 39: ...r local disk or load settings on to the device from a local disk This feature is very handy for administrators who have several devices that need to be configured with the same settings Save a copy of the current settings Click on the Backup button to save the current configuration Restore saved settings from a file Once a file has been backed up you may restore it by clicking on the Browse button...

Страница 40: ... about 1 minute to complete Do not power off the device during this process as it may crash the device and make it unusable The device will restart automatically once the upgrade is complete 5 5 5 Time Settings Click on the Time Settings link under the Management menu This page allows you to configure the time on the device You may do this manually or by connecting to a NTP server Manually Set Dat...

Страница 41: ...nterface This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes Syslog Choose to enable or disable the system log Log Server IP Address Specify the IP address of the server that will receive the system log Local Log Choose to enable or disable the local log Click on the Apply button to save th...

Страница 42: ...ess the web browser will display the login page Specify admin for both the user name and password After logging in you will graphical user interface GUI of the device The navigation drop down menu on left is divided into four sections 1 Status Displays the overall status connection status and event log 2 System This menu includes the system properties IP and Spanning Tree settings 3 Router This in...

Страница 43: ... The status that is displayed corresponds with the operating mode that is selected Information such as Device Name Country Firmware version Ethernet MAC Address Wireless MAC Address and Current Time are displayed in the System section LAN IP Address Subnet Mask Default Gateway and DHCP Server are displayed in the LAN section In the Wireless section Operation Mode Wireless Mode SSID Security Channe...

Страница 44: ...connection with DHCP clients 6 2 3 Connection Status Click on the Connection Status link under the Status drop down menu This page displays the current status of the network including network type SSID BSSID connection status wireless mode current channel security data rate noise level and signal strength ...

Страница 45: ... Click on the System Log link under the Status drop down menu The device automatically logs records events of possible interest in its internal memory If there is not enough internal memory for all events logs of older events are deleted but logs of the latest events are retained ...

Страница 46: ... the device as well as specify a name and select the operating region Device Name Specify a name for the device this is not the SSID Country Region Select a country from the drop down list Operating Mode Select and operating mode Configuration for each operating mode is described in their respective chapters Click on the Apply button to save the changes 6 4 Router Click on the Router link on the n...

Страница 47: ...ain Name Specify a domain name if the ISP has provided you with one MTU The Maximum Transmission Unit MTU is a parameter that determines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for a...

Страница 48: ...ed to the ISP or click on the Clone MAC button Click on the Apply button to save the changes 6 4 1 2 WAN Static IP The WAN interface can be configured as Static IP address In this type of connection your ISP provides you with a dedicated IP address which does not change as DHCP Internet Connection Type Select the Static IP from the drop down list Account Name Specify an account name if your ISP ha...

Страница 49: ...assigned by your ISP Subnet Mask Specify the subnet mask for this IP address which is assigned by your ISP Default Gateway Specify the IP address of the default gateway which is assigned by your ISP Domain Name Service Select Get Automatically from ISP if the ISP will provide the DNS address if not select Use these DNS servers and specify the primary and secondary DNS server IP address Router MAC ...

Страница 50: ...l fragment packets unnecessarily and in extreme cases may be unable to establish some connections In either case network performance can suffer Login Specify the user name which is provided by your ISP Password Specify the password which is provided by your ISP and then verify it once again in the next field Service Name Specify the name of the ISP Type Select a reconnection type Keep Alive A conn...

Страница 51: ...ion rules that allows corporations to extend their own corporate network through private tunnels L2TP Pass Through Place a check in this box if you would like to enable this pass through Layer 2 Tunneling Protocol is a transport protocol that enables tunneling through the Internet for the establishment of virtual private networks IPSec Pass Through Place a check in this box if you would like to en...

Страница 52: ...etwork you may select A B G or B G mixed Turbo Mode If you are not sure about which clients will be accessing the wireless networks it is recommended that you select A or B G mixed for the best performance SSID The SSID is a unique named shared amongst all the points of the wireless network The SSID must be identical on all points of the wireless network and cannot exceed 32 characters You may spe...

Страница 53: ...yption WEP is an acronym for Wired Equivalent Privacy and is a security protocol that provides the same level of security for wireless networks as for a wired network Authentication Type Select an authentication method Options available are Open Key Shared Key or Auto An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set A...

Страница 54: ...or four different networks Select the current key that will be used Key 1 4 You may enter four different WEP keys Click on the Apply button to save the changes 6 5 2 2 Wireless Security WPA PSK WPA2 PSK Security Mode Select WPA PSK or WPA2 PSK from the drop down list if your wireless network uses WPA pre shared key Encryption Select TKIP or AES from the drop down list if your wireless network uses...

Страница 55: ...the device by selecting a value from the drop down list This feature can be helpful in restricting the coverage area of the wireless network Fragment Packets over the specified size will be fragmented in order to improve performance on noisy networks RTS Threshold Packets over the specified size will use the RTS CTS mechanism to maintain performance in noisy networks and preventing hidden nodes fr...

Страница 56: ...ured without a user name and password admin For security reasons it is highly recommended that you create a new user name and password Name Specify a user name into the first field Password Specify a password into this field and then re type the password into the Confirm Password field Remote Management Choose to enable or disable remote management Remote Upgrade Choose to enable or disable remote...

Страница 57: ...he device Location Specify the location of the device Read Only Community Name Specify the password for access the SNMP community for read only access Read Write Community Name Specify the password for access to the SNMP community with read write access Send SNMP Trap Specify the IP address of the computer that will receive the SNMP traps Trap Community Name Specify the password for the SNMP trap ...

Страница 58: ... select the file and then the Restore button Revert to factory default settings Click on the Factory Default Settings button to reset the device to the default settings Please wait while the device restart and then access the device using the default IP address 192 168 1 1 6 6 4 Firmware Upgrade Click on the Upgrade Firmware link under the Management menu This page is used to upgrade the firmware ...

Страница 59: ...t menu This page allows you to configure the time on the device You may do this manually or by connecting to a NTP server Manually Set Date and Time Specify the date and time Automatically Get Date and Time Select the time zone from the drop down list and then specify the IP address of the NTP server Click on the Apply button to save the changes 6 6 6 Log Click on the Log link under the Management...

Страница 60: ...sion 1 0 60 Syslog Choose to enable or disable the system log Log Server IP Address Specify the IP address of the server that will receive the system log Local Log Choose to enable or disable the local log Click on the Apply button to save the changes ...

Страница 61: ...gulation Certifications FCC Part 15C 15B 15E EN 300 328 EN 301 489 1 17 RF Specification Frequency Band 802 11a 5 150 5 350GHz 5 470 5 725GHz 5 725 5 825GHz 802 11b g 2 412 2 472GHz Modulation Technology OFDM BPSK QPSK 16 QAM 64 QAM DSSS DBPSK DQPSK CCK Operating Channels 802 11a See the Table1 802 11b g 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 802 11a 88dBm 6Mbp...

Страница 62: ...EEE802 11b 28dBm 1 11Mbps 2 412 2 472 GHz IEEE802 11b 28dBm 1 11Mbps Internal Antenna 1 x 5dBi 2 4GHz Panel Antenna 1 x 13dBi 5GHz Panel Antenna External Antenna 2 x SMA connector for 2 4GHz and 5GHz individually Software Features General Topology Infrastructure Protocol Standard IEEE 802 3 Ethernet IEEE 802 3u Fast Ethernet IEEE 802 11b g 2 4GHz WLAN Operation Mode 802 11 a b g Access Point Clien...

Страница 63: ...mware Upgrade Upgrade firmware via web browser Keep latest setting when f w update Administrator Setting Administrator password change Reset Setting Reboot Press 1 second Reset to Factory Default Press 5 seconds System monitoring Status Event Log SNMP V1 V2c MIB MIB I MIB II RFC1213 Backup Restore Settings through Web Time setting NTP Auto setting of time Time setting manually Environment Mechanic...

Страница 64: ...ollowing measures z Reorient or relocate the receiving antenna z Increase the separation between the equipment and receiver z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for complian...

Отзывы: