
23
6193-5201
j) Type the command reset, or cycle power to the unit. The 240UE will reset and start
with the network settings you have entered.
k) Open Internet Explorer and ensure that settings will allow you to connect to the IP
address selected. If the PC uses a proxy server, ensure that Internet Explorer will
bypass the Proxy Server for local addresses. This option may be modified by opening
Tools -> Internet Options -> Connections Tab -> LAN Settings->Proxy Server ->
bypass proxy for local addresses.
l) Enter
the
webpage
http://xxx.xxx.xxx.xxx/ where xxx.xxx.xxx.xxx
is the IP address select-
ed for the module. A welcome webpage should be displayed as illustrated.
m) Clicking on any of the menu items, and entering the username “user” and password
“user” may open Configuration and Diagnostics. If the password has previously been
configured other than the default password, then enter this instead.
3.5 Network Configuration
You can view or modify Ethernet network parameters by selecting the “Network” menu.
When prompted for username and password, enter “user” as the username, and “user”
as the password in the password field. If IP address or password has been forgotten, the
Factory Default switch may be used to access the existing configuration. Refer to section
3.3 above.
The Network Configuration page allows configuration of parameters related to the wired
and wireless Ethernet interfaces. In general, IP address selection will be dependant upon
the connected wired Ethernet device(s) – before connecting to an existing LAN consult
the network administrator.
A system of RM-240’s must have at least one Access Point acting as a master to one or
more Clients. All RM-240’s to be configured as part of the same wireless network should
be given the same System Address (SSID) and Radio Encryption settings. For further
information and examples on wireless network topologies refer section 1.1 above.
The RM-240 supports several different radio encryption schemes. WEP
(Wired Equivalent
Privacy)
encryption is the weakest encryption method, defined by the original IEEE802.11
standard. 64bit and 128bit WEP combine either a 40bit or 104bit key with a 24bit ini-
tialization vector, and are intended to provide equivalent security attributes to those of a
wired medium. The RM-240 supports both 64bit and 128bit WEP without any perform-
ance (throughput) degradation.
WPA
(WiFi Protected Access)
is a subset of the IEEE802.11i Security Enhancements specifi-
cation. The RM-240 supports WPA-1 TKIP and WPA-2 AES using a Pre-Shared Key (PSK).
TKIP
(Temporal Key Integrity Protocol)
enhances WEP by using 128bit encryption plus
separate 64bit Tx and Rx MIC
(Message Integrity Check)
keys. Enabling TKIP will degrade
the RM-240 radio throughput by approximately half of the rate attainable using either
WEP or no encryption. AES
(Advanced Encryption Standard)
, the most secure encryption
method, is also based on 128 bit encryption key. Enabling AES in the RM-240 will degrade
radio throughput to approximately 20% of the rate attainable using either WEP or no
encryption.
After changes are made to Network Configuration, it is important to save the configura-
tion by selecting “Save and Reset”.