User Manual
29000141-001 A iii
Table of Contents
Chapter 1: Introduction...................................................................................................1
Capabilities...............................................................................................................1
Functionality ............................................................................................................1
Video System Features............................................................................................2
Wireless Basics............................................................................................................4
802.11b.......................................................................................................................4
802.11g.......................................................................................................................4
Network Conguration ..........................................................................................5
Access Point Congurations..................................................................................5
Possible AP Topologies.........................................................................................6
Bridging ....................................................................................................................7
Default Conguration.............................................................................................7
Data Encryption and Security................................................................................7
SSID ...........................................................................................................................8
WEP ...........................................................................................................................8
WPA with TKIP/ AES-CCMP................................................................................8
AES and 3DES..........................................................................................................8
MAC Address Filtering ..........................................................................................9
DHCP Server............................................................................................................9
Operator Authentication and Management ........................................................9
Management...............................................................................................................9
3e-528 Navigation Options.....................................................................................10
Chapter 2: Hardware installation................................................................................11
Preparation for Use..................................................................................................11
Installation Instructions ..........................................................................................12
Minimum System and Component Requirements ............................................12
Cabling ......................................................................................................................13
External Camera Power Cable.............................................................................14
External Power Cable............................................................................................15
Pan/Tilt/Zoom Cable...........................................................................................16
WAN/LAN Cable .................................................................................................17
Video In Cable........................................................................................................17
Bridge Antenna Installation ...................................................................................18
Chapter 3: Access Point Conguration ......................................................................19
Introduction..............................................................................................................19
Preliminary Conguration Steps..........................................................................19
Initial Setup using the “CONFIG 1” Port.............................................................20
System Conguration..............................................................................................22
General....................................................................................................................22
WAN........................................................................................................................23
LAN .........................................................................................................................24
Operating Mode.....................................................................................................24
Submodes ............................................................................................................24
Wireless Conguration ...........................................................................................26
General....................................................................................................................26
Security ...................................................................................................................28
No Encryption .....................................................................................................28
Static AES Key .....................................................................................................29
Static 3DES Key ...................................................................................................29
Dynamic Key Exchange .....................................................................................30
No Encryption (non-FIPS) .................................................................................31
Static WEP Encryption (non-FIPS) ...................................................................31
WPA (non-FIPS)...................................................................................................32
MAC Address Filtering ........................................................................................34
Bridging and Bridging Encryption .....................................................................35