background image

68 

 

 

 

 

 

 

Fields 

Description 

Select Encryption 

Select the Encryption Mode from the pull down menu. 

Pre-Authentication 

Select Pre-Authentication as Personal or Enterprise. 

Encryption Type 

TKIP:

 Temporal Key Integrity Protocol (TKIP) for data Encryption. TKIP utilizes a 

stronger encryption method and incorporates Message Integrity Code (MIC) to 

provide protection against hackers. 

AES:

 Advanced Encryption Standard (AES) for data encryption. AES utilizes a 

symmetric 128-bit block data encryption. 

AUTO:

 Auto is the default Encryption Type. It will change automatically to fulfill 

client’s requirement.

 

Pre-shared Key 

User can enter Maximum number of Key Length. The format can be passphrase or 

any characters. 

 

 

 

Содержание LP-2396K

Страница 1: ...1 LP 2396K Outdoor 2 4GHz Wireless AP CPE Bridge User Manual ...

Страница 2: ...ith LP 2396K 16 4 Software Features 17 4 1 Operation Mode 17 4 1 1 Access Point 17 4 1 2 Client 25 4 1 3 WDS Access Point 33 4 1 4 WDS Client 41 4 1 5 AP Router 49 4 1 6 Wireless ISP 64 4 2 System Configuration 80 4 2 1 Device IP Settings 80 4 2 2 Time Settings 81 4 2 3 Password Settings 82 4 2 4 System Management 83 4 2 5 Ping Watchdog 84 4 2 6 Firmware Upgrade 85 4 2 7 Save and Restore 85 4 2 8 ...

Страница 3: ...se feel free to contact us We d love to hear from you and thank you for your support Email support loopcomm com Website www loopcomm com Notice This document is issued to guide users how to install and operate LP 2396K Outdoor Long Range 802 11b g n Wireless AP CPE Bridge Please read the document carefully to avoid any damage which is caused by inappropriate use excluding from the warranty Loopcom...

Страница 4: ...can operate up to 300Mbps data rate by supporting IEEE 802 11b g n standard and with full WEP WPA WPA2 data security Wireless LAN Access Control List and TKIP AES encryption It keeps the data transmission safe in any network connection mode Moreover it supports different operation modes for any user s applications like point to point network and IP surveillance Product Outline ...

Страница 5: ...Package Content The package content includes the following items shown from left to right in the below figure LP 2396K DC 24V 1A Power adapter Power cord User Manual CD Cable Tie Quick Installation Guide QIG ...

Страница 6: ... TKIP AES encryption Support SNMP V2 management SSH NTP and Telnet Support QoS bandwidth control MAC Access Control Built in Web based management and firmware upgrade PoE pass through available on Secondary Ethernet port Configurable via Web UI Remotely enable system reset by PoE Adapter 1 4 Application 1 4 1 Wireless ISP WISP Mode LP 2396K can operate as station client in WISP mode to remotely re...

Страница 7: ...cs for LP 2396K is directional with high gain design it can transmit RF signal for several miles Based on this point LP 2396K is greatly used to bridge at long distance transmission for point to point applications like IP surveillance networking company ...

Страница 8: ...8 1 5 Product Outline Introduction 1 5 1 Front view 1 5 2 Back view ...

Страница 9: ... is powered OFF Main ON Port linked OFF No connection Blink Data is being transmitted or received on the Main Ethernet port Secondary ON Port linked OFF No connection Blink Data is being transmitted or received on the Secondary Ethernet port 2 4GHz Blink Data is being transmitted or received using Wi Fi ...

Страница 10: ...full duplex and complies with IEEE 802 3 802 3u respectively Note In Operation mode the AP router s secondary port will be WAN Port by default Reset Button Press continually the reset button at least 5 seconds to reset the configuration parameters to factory defaults Earth Ground It used to connect the metal line to ground in order to avoid the device from external electrical damage Note LP 2396K ...

Страница 11: ...Mounting Options Pole Mount Use cable tie and make it pass through the one of middle holes to fix and tie on the pole Wall Mount Please fix the screws into the wall and hang LP 2396K on the corresponding screws ...

Страница 12: ...he Main Ethernet port of LP 2396K with a RJ 45 cable Note LP 2396K built in PoE pass through function on Secondary Ethernet port It means the Secondary Ethernet port is able to provide 24V power for a secondary device if this function enabled on Web Configuration Please refer to the statement on Advanced Setting of Radio menu ...

Страница 13: ...Ethernet port to PoE Adapter 7 LAN port Connect Ethernet cable from PoE Adapter to your computer laptop for Web configuration 8 Reset button It allows user to remotely reset the system of LP 2396K Note 1 There is no software driver or utility installation needed 2 RJ 45 8P8C Ethernet cable is required 3 It takes about 60 seconds to complete the boot up sequence after LP 2396K powered up ...

Страница 14: ...o for IP surveillance The following figure indicates the basic setup to implement IP surveillance with a pair of LP 2396K The remote monitoring image can be delivered to local NVR via the high powered long distance transmission by LP 2396K ...

Страница 15: ...work segment as LP 2396K before connecting to LP 2396K Configuration Example In the Windows 7 operating system 1 Press Start and enter ncpa cpl in search bar You will see network connection page 2 Select your network interface card and Right click to set Properties 3 Double click Internet Protocol Version 4 TCP IPv4 4 Select Specify an IP address and enter the IP address IP Address 192 168 1 x x c...

Страница 16: ...rted with LP 2396K 1 Open Web browser and enter 192 168 1 200 in the URL field of Web browser 2 Enter admin as default user name and admin as default password After successful login you can see the Loopcomm web page ...

Страница 17: ... they are 4 1 1 Access Point It Connects to an internal network LAN and broadcasts a wireless network connection WLAN When operating in the Access Point mode LP 2396K becomes the center hub of the wireless network All wireless cards and clients connect and communicate through the device Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup the...

Страница 18: ...nnel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regulations Transmit Distance Changing the...

Страница 19: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Страница 20: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 21: ...timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is the better the security it varies from 300 to 3600 S...

Страница 22: ...s beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI ...

Страница 23: ...rmines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Wi Fi Multimed...

Страница 24: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Страница 25: ...ient to connect a remote segment to an existing WLAN Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Страница 26: ...elects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level m...

Страница 27: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Страница 28: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 29: ...timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is the better the security it varies from 300 to 3600 S...

Страница 30: ...ze A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting a new symbol The 802 11n draft specifies two ...

Страница 31: ...ice is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected settings ...

Страница 32: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Страница 33: ...ase station for a Wireless Distribution System mesh network Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Страница 34: ... wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level maximum is limited according to country regul...

Страница 35: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Страница 36: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 37: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Страница 38: ...the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting ...

Страница 39: ...r of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected setting...

Страница 40: ...When this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Clic...

Страница 41: ... station in a Wireless Distribution System mesh network Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Страница 42: ... selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit Power Defines the maximum average transmit output power in dBm of the device The transmit power level...

Страница 43: ...AC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication ...

Страница 44: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 45: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Страница 46: ...nsmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guar...

Страница 47: ...termines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the f...

Страница 48: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Страница 49: ... WLAN to allow cross communication Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed Note In AP router secondary port will be WAN Port by default ...

Страница 50: ...this network User cannot Ping Radio Mode Select the Mode of 2G 11NG HT20 or 2G 11NG HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu Data Rate Defines the data rate in Mbps at which the device should transmit wireless packets You can fix a specific data rate between MCS 0 and MCS 7 or MCS 15 for 2x2 chain devices Transmit P...

Страница 51: ...entification for using the wireless adapter s MAC address Open system authentication is used when no authentication is required Shared Key It verifies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE ...

Страница 52: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 53: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security It varies from 300 to 3600 Sec...

Страница 54: ...nsmission of this beacon frame You can change the value from 1 to 255 The AP will check the buffered data according to this value For example selecting 1 means to check the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guar...

Страница 55: ...termines the number of frames combined in the new larger frame Maximum Aggregated Size Determines the size in bytes of the larger frame Tx Rx ChainMask Displays the number of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the f...

Страница 56: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Страница 57: ...el to clear the entered settings Static Mode fixed IP Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the I...

Страница 58: ...el Click Save to change the new settings Click cancel to clear the entered settings Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registe...

Страница 59: ...Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start Address of ...

Страница 60: ...ally Internet users would not be able to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP UDP TCP or UDP IP Address Enter the IP address to which the data packets can...

Страница 61: ...ternet Fields Description Filtering Enable Disable the function to IP Filter Protocol Specify protocol TCP UDP TCP or UDP IP Address Enter the specific IP Address to be denied Comment Make a comment for the IP Filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings ...

Страница 62: ...omment for the Port Filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings MAC Filtering Settings The MAC filtering feature allows you to deny MAC address which cannot connect to internet Fields Description Filtering Select Enable Disable the Mac Filtering function Mac Address Enter the specific MAC address to be denied Comment Make a comment fo...

Страница 63: ...ddress of the device PC connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Control Add Cancel Click Add to change the new settings Click cancel to clear the enter...

Страница 64: ...is an internet Service Provider with a network based on wireless networking Note Depending on the mode you choose applicable settings will be enabled disabled automatically Press setup then below Screen is displayed Press OK to continue then below page is displayed ...

Страница 65: ...SID from the list Enable Wireless Disable SSID Broadcasting Enable Isolated Enable Wireless Option SSID will be hidden only users who know the SSID can associate with this network User cannot Ping Radio Mode Select the Mode of 2G 11NG HT20 or 2G 11NG HT40 Auto option selects the mode by itself Channel Select the wireless communication frequency channel from pull down menu ...

Страница 66: ...ording to country regulations Transmit Distance Changing the distance value will change the ACK Acknowledgement timeout value accordingly so it means the distance should be set as real distance between LP 2396K and other device for accurate transmission performance Save and Restart It saves the new settings and restarts Site Survey You could configure AP Client parameters here Click Rescan to brow...

Страница 67: ...fies that an authentication initiating station has knowledge of a shared secret The 802 11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802 11 Auto Auto is the default authentication algorithm It will change its authentication type automatically to fulfill client s requirement Key ...

Страница 68: ...KIP utilizes a stronger encryption method and incorporates Message Integrity Code MIC to provide protection against hackers AES Advanced Encryption Standard AES for data encryption AES utilizes a symmetric 128 bit block data encryption AUTO Auto is the default Encryption Type It will change automatically to fulfill client s requirement Pre shared Key User can enter Maximum number of Key Length The...

Страница 69: ...n timeout interval for 802 1x re authorization setting Session timeout interval unit is seconds RSN Reauthorization Enable Disable the function to access WPA Group Rekey Interval A group key is used for multicast broadcast data and the re key interval is time period that the system will change the group key periodically The shorter the interval is better the security it varies from 300 to 3600 Sec...

Страница 70: ...the buffered data at every beacon Fragment Size A large data frame is fragmented into several fragments each of size equal to fragment threshold By tuning the fragment threshold value we can get varying fragment sizes Short GI Guard Interval A GI is a period of time between symbol transmission that allows reflections from multipath from the previous data transmission to settle before transmitting ...

Страница 71: ...r of independent spatial data streams the device is transmitting TX and receiving RX simultaneously within one spectral channel of bandwidth Multiple chains increase data transfer performance significantly WMM Capable Enable the feature to access or Disable it WMM Configuration Displays the WMM Parameters of station and Access Point Save Cancel Save the changed settings Cancel the selected setting...

Страница 72: ...hen this option is selected all wireless clients except those whose MAC addresses are in the current access control list will not be able to connect to internet Mac Address Enter client MAC address and press Apply Changes button to add client MAC address into current access control list Comment Make a comment for Wireless access control Function buttons for the Access Control List Apply Changes Cl...

Страница 73: ...el to clear the entered settings Static Mode fixed IP Fields Description WAN Connection Type Select Static Mode from pull down menu IP Address Enter the IP address IP Subnet Mask Enter the subnet mask for WAN interface Gateway IP address Enter the default gateway for WAN interface outgoing data packets Primary DNS Server Enter the IP address of Domain Name Server 1 Secondary DNS Server Enter the I...

Страница 74: ...el Click Save to change the new settings Click cancel to clear the entered settings Dynamic DNS Settings The Dynamic DNS features allow you to register your device with a DNS server and access your device each time using the same host name Fields Description Dynamic DNS Provider Click the drop down menu to pick up the right DDNS provider you registered Account Enter the account of DDNS you registe...

Страница 75: ...Lease Time is the amount of time that a network user is allowed to maintain a network connection to the device using the current dynamic IP address At the end of the Lease Time the lease is either renewed or a new IP is issued by the DHCP server The amount of time is in units of seconds The default value is 864000 seconds 1 day The value 1 stands for the infinite lease From Enter Start address of ...

Страница 76: ...ally Internet users would not be able to access a server on your LAN because of native NAT protection The virtual server feature solves these problems and allows internet users to connect to your servers Fields Description Virtual Server Select Enable or Disable the Virtual Server function Protocol There are 3 options TCP UDP TCP or UDP IP Address Enter the IP Address to which the data packets can...

Страница 77: ... policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings Port Filtering Settings The Port filtering feature allows you to deny specific Ports which cannot connect to internet Fields Description Filtering Enable Disable the function to Port Filter Protocol Specify the protocol TCP UDP TCP or UDP Port Range Enter the specific Port range to be denied Comment ...

Страница 78: ...iltering function Mac Address Enter the specific MAC address to be denied Comment Make a comment for the filtering policy Add Cancel Click Add to change the new settings Click cancel to clear the entered settings SNMP Settings Fields Description SNMP Enable Disable the feature to access Save Cancel Click Save to change the new settings Click cancel to clear the entered settings ...

Страница 79: ...ddress and Mac address Local IP Address If you select IP Address then Enter the IP Address of the device PC connected to the router MAC Address If you select MAC Address then Enter the MAC Address of the device PC connected to the router Uplink Bandwidth Kbps Enter the limit for uplink bandwidth Downlink Bandwidth Kbps Enter the limit for downlink bandwidth Comment Make a comment for Bandwidth Con...

Страница 80: ...the Device IP Subnet Mask Enter the Subnet Mask as 255 255 0 0 Gateway IP Address Enter the Gateway IP Address for the Device DNS Server Primary DNS Server Secondary DNS Server The Domain Name System DNS is a server on the Internet that translates logical names such as www yahoo com to IP addresses like 66 218 71 80 In order to do this a query is made by the requesting device to a DNS server to pr...

Страница 81: ...ble NTP so that time date will be updated correctly even after reboot Server Name Enter the NTP server Name NTP request interval NTP updating time interval By default its 24 Local Time Zone Select the Time zone of your country from pull down menu Local date and time Enter the month date year hours Minutes and seconds AM PM Manually to set date and time Sync with PC It Synchronizes the new settings...

Страница 82: ...assword please go to System Configuration Password Settings menu Fields Description Current Password Enter the password of the device New Password Enter your new password to which you want to change Re enter New Password For confirmation enter the new password again Save Change It saves and changes to New Password ...

Страница 83: ...Device Name POE Pass Through It allows Secondary Ethernet port to provide 24V power for a secondary device when it s enabled UPnP Administrator can enable or disable the UPnP function Syslog This option enables the registration routine of system log syslog messages IGMP Internet Group Management Protocol Enable disable the IGMP function for the multiple bridged ports Save Start It saves the settin...

Страница 84: ...case Fields Description Ping Watchdog Enable Disable the function to access IP Address 1 Enter the IP address to be pinged Ping Frequency Set the number of seconds to be Pinged Failed Tries Enter the number of permitted times for the ping to be failed before power reboot For example 2 means the CPE will reconnect if the PING doesn t respond for 120Seconds Action If the remote IP address does not r...

Страница 85: ...hen firmware upgrade is in process Otherwise it will probably cause system crash Caution A corrupted file will hang up the System 4 2 7 Save and Restore System Configuration Configuration Save and Restore You can save system configuration settings to a file and later download it back to the LP 2396K by following the steps Save Press Save button to save the current configuration settings of the dev...

Страница 86: ...settings Click YES to go ahead and restore the configuration to the factory default 4 2 9 Reboot Whenever you use the Web configuration to change system settings the changes are initially placed in temporary storage These changes will be lost if the device is reset or turn off IMPORTANT Do not turn off or press the Reset button while this procedure is in progress ...

Страница 87: ...e Disable the feature to access Reboot Time Enter the Time to reboot Reboot Plan Select the option weekday or every day to reboot Weekday Select the number of days to reboot Apply changes Reset Click it to save the changed settings Click it to erase the saved settings ...

Страница 88: ... requesting host receives a response from the destination host this host is reachable Network Ping is commonly used to provide a basic picture of where a specific networking problem may exist For example if an Internet connection is down at an office the ping utility can be used to figure out whether the problem exists within the office or within the network of the Internet provider Fields Descrip...

Страница 89: ...se intermediate hosts If you execute the Traceroute command on a source device it sends IP packets toward the destination with Time To Live TTL values that increment up to the maximum specified hop count This is 30 by default on most systems Fields Description Destination IP Address Enter the IP address to which you like to know the trace route Max Hop Maximum number of routes Result It displays t...

Страница 90: ...itor the status of the device It provides information on device status wireless information LAN Information wireless client table and system log 4 4 1 Device Information Device Status Device Information It presents the status of LP 2396K Firmware devices memory utilization and ARP Table ...

Страница 91: ...evice such as current operation mode wireless traffic error packets device SSID Band channel and encryption used Transmit Power 4 4 3 LAN Information This page shows the LAN information of LP 2396K device such as Physical Address IP Address Network Mask Default Gateway and DHCP details ...

Страница 92: ...92 4 4 4 Internet Information 4 4 5 Wireless Client Table This feature displays the currently connected MAC address of Wi Fi clients ...

Страница 93: ...93 4 4 6 System LOG This page is used to view system logs The System Log displays the system activities login and system error report 4 5 LOGOUT Please make sure to Logout after you finish all settings ...

Страница 94: ...an for help FCC Caution This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation RF Radiation Exposure and Hazard Statement To ensure compliance with FCC RF exposure requirements this device...

Отзывы: