background image

www.lanpro.com

Wireless - Equipment - 2.4 GHz - LP-1522 User Manual 

36

What is Advanced Encryption Standard (AES)?

Security issues are a major concern for wireless LANs, AES is the U.S. government’s next-generation cryptography 

algorithm, which will replace DES and 3DES.

4.19

What is Inter-Access Point Protocol (IAPP)?

The IEEE 802.1 If Inter-Access Point Protocol (IAPP) supports Access Point Vendor interoperability, enabling roaming 

of 802.11 Stations within IP subnet.

IAPP  defi nes  messages  and  data  to  be  exchanged  between  Access  Points  and  between  the  IAPP  and  high  layer 

management entities to support roaming. The IAPP protocol uses TCP for inter-Access Point communication and UDP 

for  RADIUS  request/response  exchanges.  It  also  uses  Layer  2  frames  to  update  the  forwarding  tables  of  Layer  2 

devices.

4.20

What is Wireless Distribution System (WDS)?

The Wireless Distribution System feature allows WLAN AP to talk directly to other APs via wireless channel, like the 

wireless bridge or repeater service.

4.21

What is Universal Plug and Play (uPNP)?

UPnP is an open networking architecture that consists of services, devices, and control points. The ultimate goal is to 

allow data communication among all UPnP devices regardless of media, operating system, programming language, 

and wired/wireless connection.

4.22

What is Maximum Transmission Unit (MTU) Size?

Maximum  Transmission  Unit  (MTU)  indicates  the  network  stack  of  any  packet  is  larger  than  this  value  will  be 

fragmented before the transmission. During the PPP negotiation, the peer of the PPP connection will indicate its MRU 

and will be accepted. The actual MTU of the PPP connection will be set to the smaller one of MTU and the peer’s MRU. 

The default is value 1400.

4.23

What is Clone MAC Address?

Clone MAC address is designed for your special application that request the clients to register to a server machine 

with  one identifi ed MAC address. Since that all  the clients  will  communicate outside  world  through the WLAN AP 

Router, so have the cloned MAC address set on the WLAN AP Router will solve the issue.

4.24

What is DDNS?

DDNS is the abbreviation of Dynamic Domain Name Server. It is designed for user own the DNS server with dynamic 

WAN IP address.

4.25

What is NTP Client?

NTP client is designed for fetching the current timestamp from internet via Network Time protocol. User can specify 

time zone, NTP server IP address.

4.26

What is VPN?

VPN is the abbreviation of Virtual Private Network. It is designed for creating point-to point private link via shared or 

public network.

What is IPSEC?

IPSEC is the abbreviation of IP Security. It is used to transferring data securely under VPN.

For Additional Support: 

[email protected]

4.27

4.28

Содержание LP-1522

Страница 1: ...gh Speed Long Range 802 11b g 54Mbps Wireless Broadband AP and Router High Power 800mW with External Antenna LP1522_UM_ENB02W LP 1522 User Manual High Speed Long Range 802 11b g 54Mbps Wireless Broadb...

Страница 2: ...use harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one of the following...

Страница 3: ...ons Commission FTP File Transfer Protocol IEEE Institute of Electrical and Electronic Engineers IKE Internet Key Exchange IP Internet Protocol ISM Industrial Scienti c and Medical LAN Local Area Netwo...

Страница 4: ...t ready for eld installation The Wireless LAN Broadband LanPro 1522 Router is an affordable IEEE 802 11b g wireless LAN broadband router solution setting SOHO and enterprise standard for high performa...

Страница 5: ...2 Installation 1 2 1 3 Package contents The package of the LP 1522 WLAN Broadband Router includes the following items The LP 1522 WLAN Broadband Router The AC to DC power adapter The Documentation CD...

Страница 6: ...og box after the TCP IP installation 6 Select TCP IP and click the properties button on the Network dialog box 7 Select Specify an IP address and type in values as following example IP Address 192 168...

Страница 7: ...wing example IP Address 192 168 1 1 IP address within the range of 192 168 1 1 to 192 168 1 253 is used to connect the WLAN AP Router IP Subnet Mask 255 255 255 0 7 For Microsoft Windows NT 1 Click th...

Страница 8: ...e of WLAN AP Router and haredamong its service area so all device sat tempts to join the samewireless network can identify it Channel Number It shows the wireless channel connected currently Encryptio...

Страница 9: ...in IP by PPPoE PPTP connection IP Address It shows the IP address of WAN interface of WLAN AP Router Subnet Mask It shows the IP subnet mask of WAN interface of WLAN AP Router Default Gateway It shows...

Страница 10: ...Zone Setting This page is used to enable and con gure NTP client Screen snapshot Time Zone Settings III LAN Interface Setup Screen snapshot LAN Interface Setup 10 IV WAN Interface Setup This page is...

Страница 11: ...and Mode Network Type SSID Channel Number Enable Mac Clone Single Ethernet Client Screen snapshot Wireless Basic Settings VI Wireless Security Setup This page is used to con gure wireless security Scr...

Страница 12: ...Screen snapshot Wireless Basic Settings Item Description Disable Wireless LAN Interface Click on to disable the wireless LAN data transmission Band Click to select 2 4GHz B 2 4GHz G 2 4GHz B G Mode Cl...

Страница 13: ...Interval Data Rate Select the transmission data rate from pull down menu Data rate can be auto select 11M 5 5M 2M or IMbps Preamble Type Click to select the Long Preamble or Short Preamble support on...

Страница 14: ...ode with Enterprise RADIUS or Personal Pre Shared Key Refer to 4 15 What is Wi Fi Protected Access WPA Pre Shared Key Format While Encryption is selected to be WPA Select the Pre shared key format fro...

Страница 15: ...ant text ASCII and hexadecimal HEX code Default Tx Key Set the default secret key for WEP security function Value can be chose between 1 and 4 Encryption Key 1 Secret key 1 of WEP security encryption...

Страница 16: ...bility Comment Fill in the comment tag for the registered client Apply Changes Click the Apply Changes button to register the client to new con guration setting Reset Click the Reset button to abort c...

Страница 17: ...ty Click button to con gure wireless security like WEP 64bits WEP 128bits WPA TKIP WPA2 AES or None Show Statistics It shows the TX RX packets rate statistics Delete Selected Click to delete the selec...

Страница 18: ...ge is used to view or con gure other APs near yours Screen snapshot Wireless Site Survey Item Description SSID It shows the SSID of AP BSSID It shows BSSID of AP Channel It show the current channel of...

Страница 19: ...able window that shows the active clients with their assigned IP address MAC address and time expired information Server mode only 802 Id Spanning Tree Select to enable or disable the IEEE 802 Id Span...

Страница 20: ...data packets DNS 1 Fill in the IP address of Domain Name Server 1 DNS 2 Fill in the IP address of Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in t...

Страница 21: ...f Domain Name Server 2 DNS 3 Fill in the IP address of Domain Name Server 3 Clone MAC Address Fill in the MAC address that is the MAC address to be cloned Refer to 4 24 What is Clone MAC Address Enabl...

Страница 22: ...button manually and clicking the Disconnect button manually Idle Time If you select the PPPoE and Connect on Demand connection type ll in the idle time for auto disconnect function Value can be betwe...

Страница 23: ...er MTU Size Fill in the mtu size of MTU Size The default value is 1400 Refer to 4 23 What is Maximum Transmission Unit MTU Size Attain DNS Automatically Click to select getting DNS address for PPTP su...

Страница 24: ...ck to enable the port ltering security function Port Range Protocol Comments To restrict data transmission from the local network on certain ports ll in the range of start port and end port and the pr...

Страница 25: ...also put your comments on it Apply Changes Click the Apply Changes button to register the ports to port ltering list Reset Click the Reset button to abort change and recover the previous con guration...

Страница 26: ...d the NAT rewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s NAT rewall Screen snapsho...

Страница 27: ...lick the Reset button to abort change and recover the previous con guration setting 3 3 16 Firewall DMZ A Demilitarized Zone is used to provide Internet services without sacri cing unauthorized access...

Страница 28: ...nterface Wireless LAN Sent Packets It shows the statistic count of sent packets on the Ethernet WAN interface Wireless LAN Received Packets It shows the statistic count of received packets on the Ethe...

Страница 29: ...ve and enable NTP client service Reset Click the Reset button to abort change and recover the previous con guration setting Refresh Click the refresh the current time shown on the screen Management Lo...

Страница 30: ...t change and recover the previous con guration setting Management Save Reload Settings This page allows you save current settings to a le or reload the settings from the le that was saved previously B...

Страница 31: ...t login control Con rmed Password Because the password input is invisible so please ll in the password again for con rmation purpose Apply Changes Clear the User Name and Password elds to empty means...

Страница 32: ...down it to select There are three types of priority level High Medium and Low Note If the total assigned bandwidth of higher priority applications is larger than the maximum bandwidth provided by the...

Страница 33: ...mmunications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz How does wireless networking work The 802 11 standard de ne two modes infra...

Страница 34: ...rame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes The determination of an ef cient fragment th...

Страница 35: ...at is Wi Fi Protected Access WPA Wi Fi s original security mechanism Wired Equivalent Privacy WEP has been viewed as insuf cient for securing con dential business communications A longer term solution...

Страница 36: ...programming language and wired wireless connection 4 22 What is Maximum Transmission Unit MTU Size Maximum Transmission Unit MTU indicates the network stack of any packet is larger than this value wi...

Отзывы: