Conceptronic 150N Wireless LAN Access Point User’s Manual Version: 1.
Contents Chapter I: Product Information Product introduction Safety Information Package Contents Familiar with your new wireless access point 2 2 3 3 4 Chapter II: System and Network Setup 2-1. Installing the access point to your network 2-2. Connecting to wireless access point by web browser 5 5 5 1-1. 1-2. 1-3. 1-4. 2-2-1. 2-2-2. 2-2-3. 2-3. 2-4. 2-5. 2-6. 2-7. 2-8. 2-9. 2-10.
Chapter I: Product Information 1-1. Product introduction Thank you for purchasing this wireless access point! With this high cost-efficiency wireless access point, computers and wireless devices which are compatible with 802.11 Draft-N can connect to existing wired Ethernet network via this wireless access point, at the speed of 150Mbps. Easy install procedures allows any computer users to setup a network environment in very short time - within minutes, even inexperienced users.
1-2. Safety Information In order to keep the safety of users and your properties, please follow the following safety instructions: • This access point is designed for indoor use only; DO NOT place this access point outdoor. • DO NOT put this access point at or near hot or humid places, like kitchen or bathroom. Also, do not left this access point in the car in summer. • DO NOT pull any connected cable with force; disconnect it from the access point first.
1-4. Familiar with your new wireless access point Front Panel LED Name PWR WLAN LAN Light Status On On Off Flashing On Off Flashing Description The access point is switched on and correctly powered. Wireless WPS mode is enabled. Wireless network is switched off. Wireless LAN activity (transferring or receiving data).
Chapter II: System and Network Setup 2-1. Installing the access point to your network Please follow the following instruction to build the network connection between your new wireless access point and your computers, network devices: A. Connect the access point to ADSL modem, router, or switch/hub in your network through the LAN port of the access point by Ethernet cable. B. Connect the A/C power adapter to the wall socket, and then connect it to the ‘Power’ socket of the access point. C.
2-2-1. Windows XP IP address setup: A. Click ‘Start’ button (it should be located at lower-left corner of your computer), then click control panel. Double-click Network and Internet Connections icon, click Network Connections, and then double-click Local Area Connection, Local Area Connection Status window will appear, and then click ‘Properties’. B. Select ‘Use the following IP address’, then input the following settings in respective field: IP address: Subnet Mask: 192.168.0.10 255.255.255.
2-2-2. Windows Vista IP address setup: A. Click ‘Start’ button (it should be located at lower-left corner of your computer), then click control panel. Click View Network Status and Tasks, then click Manage Network Connections..Right-click Local Area Netwrok, then select ‘Properties’. Local Area Connection Properties window will appear, select ‘Internet Protocol Version 4 (TCP / IPv4), and then click ‘Properties’. B.
2-2-3. Connecting to Web Management Interface All functions and settings of this access point must be configured via web management interface. Please start your web browser, and input ‘192.168.0.2’ in address bar, then press ‘Enter’ key.
2-3. View System Status and Information After you connected to the access point by web browser, the first thing you see is ‘Status and Information’ page. All system and network related information of this access point will be displayed here. The information is very helpful when you want to know the detailed information of your access point, and when you try to fix the communication problem between this access point and other wired / wireless computer / devices.
2-4. Select an Operating Mode for Wireless Access Point This access point can be operated in different modes; you can click ‘Basic Setting’ on the left of web management interface to select an operating mode you want to meet for different needs: You can click ‘Mode’ dropdown menu to select operating mode, and there are 6 operating modes available: AP Access point mode, allows wireless clients to connect to access point and exchange data with the devices connected to the wired network.
2-4-1. AP Mode This is the most common mode. When in AP mode, this access point acts as a bridge between 802.11b/g/Draft-N wireless devices and wired Ethernet network, and exchange data between them. When you select ‘AP’, the following options will be displayed: Here are descriptions of every setup item: Band Please select the wireless band you wish to use. By selecting different band setting, you’ll be able to allow or deny the wireless client of a certain band. • If you select 2.4GHz (B), 2.
After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save. You can click ‘Continue’ button to back to previous page and continue on other setting items, or click ‘Apply’ button to restart the wireless access point and the changes will take effect after about 30 seconds. 2-4-1-1. Multiple ESSID This access point supports four SSIDs.
2-4-2. Station-Infrastructure In this mode, you can connect the access point to Ethernet device such us TV and Game player to enable the Ethernet device be a wireless station and join to a wireless network through an access point or AP router. Here are descriptions of every setup item: Band Please select the wireless band you wish to use. By selecting different band setting, you’ll be able to allow or deny the wireless client of a certain band. • If you select 2.4GHz (B), 2.4GHz (N), or 2.
After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save. You can click ‘Continue’ button to back to previous page and continue on other setting items, or click ‘Apply’ button to restart the wireless access point and the changes will take effect after about 30 seconds. 2-4-2-1.
2-4-3. AP Bridge-Point to Point Mode In this mode, this wireless access point will connect to another wireless access point which uses the same mode, and all wired Ethernet clients of both wireless access points will be connected together. You can use this mode to connect a network to another network which is physically isolated. Please note that when you set your access point to this mode, it will not accept regular wireless clients anymore.
After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully saved, you can click ‘Continue’ button to back to previous page and continue on other setting items, or click ‘Apply’ button to restart the wireless access point and the changes will take effect after about 30 seconds. 2-4-4.
Here are descriptions of every setup item: Band Please select the wireless band you wish to use. By selecting different band setting, you’ll be able to allow or deny the wireless client of a certain band. • If you select 2.4GHz (B), 2.4GHz (N), or 2.4GHz (G), only wireless clients using the wireless band you select (802.11b, 802.11 Draft-N, or 802.11g) will be able to connect to this access point. • If you select 2.4GHz (B+G), then only wireless clients using 802.11b and 802.
2-4-5. AP Bridge-WDS Mode In this mode, this wireless access point will connect to up to four wireless access points which uses the same mode, and all wired Ethernet clients of every wireless access points will be connected together. You can use this mode to connect a network to other networks which is physically isolated. When you use this mode, this access point is still able to accept wireless clients.
Associated Clients Click ‘Show Active Clients’ button and a new popup window will appear which contains the information about all wireless clients connected to this access point. You can click ‘Refresh’ button in popup window to keep information up-to-date. MAC address 1 ~ 4 Please input the MAC address of the wireless access point you wish to connect Set Security Click this button to select an encryption mode for this wireless link, a new popup window will appear.
2-4-6. Universal Repeater In this mode, the access point can act as a wireless repeater; it can be Station and AP at the same time. It can use Station function to connect to a Root AP and use AP function to service all wireless stations within its coverage. Note: For Repeater Mode, this access point will demodulate the received signal, checking if this signal is noise for the operating network then have the signal modulated and amplified again.
Root AP SSID In ‘Universal Repeater’ mode, this device can act as a station to connect to a Root AP. You should assign the SSID of the Root AP here or click ‘Select Site Survey’ button to choose a Root AP. Select Site Survey Click ‘Select Site Survey’ button, then a “Wireless Site Survey Table” will pop up. It will list all available access points near by. You can select one access point in the table and the access point will join wireless LAN through this access point.
2-5. WPS Setting Wi-Fi Protected Setup (WPS) is the simplest way to build connection between wireless network clients and this access point. You don’t have to select encryption mode and input a long encryption passphrase every time when you need to setup a wireless client, you only have to press a button on wireless client and this access point, and the WPS will do the setup for you. This access point supports two types of WPS: Push-Button Configuration (PBC), and PIN code.
Here are descriptions of every setup item: Enable WPS Check this box to enable or disable WPS function Wi-Fi Protected Setup Information All information related to WPS will be displayed here, they’re helpful when you’re setting up connections by WPS. WPS Status: Displays WPS status. If data encryption settings of this access point has never been set, ‘unConfigured’ message will be displayed her.
2-6. Advanced Wireless Settings This wireless access point has many advanced wireless features. Please note that all settings listed here are for experienced users only, if you’re not sure about the meaning and function of these settings, please don’t modify them, or the wireless performance will be reduced.
Channel Width Select wireless channel width (bandwidth taken by wireless signals of this access point). It’s suggested to select ‘Auto 20/40MHz’. Do not change to ’20 MHz’ unless you know what it is. Preamble Type Set the type of preamble of wireless radio, Do not modify default value if you don’t know what it is, default setting is ‘Short Preamble’. Broadcast ESSID Decide if the wireless access point will broadcast its own ESSID or not.
2-7. Wireless Security This wireless access point provides many types of wireless security (wireless data encryption). When you use data encryption, data transferred by radio signals in the air will become unreadable for those people who don’t know correct encryption key (encryption password). There are two ways to set wireless security: 1. Click ‘Security Settings’ on the left of web management interface. 2.
There are four types of security level you can select: Disable (no security - data encryption disabled), WEP, WPA Pre-shared Key, and WPA Radius. Please refer to the following sections for detailed instructions. Note: If you have enabled Multiple SSID function, please select the SSID network you wish to configure in advance.
2-7-1. Disable Security Select the SSID you wish to configure. When you select ‘Disable’, wireless encryption for the network is disabled. After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save.
2-7-2. WEP Security WEP (Wired Equivalent Privacy) is a common encryption mode; it is safe enough for home and personal use. But if you need higher level of security, please consider using WPA encryption (see next Section). However, some wireless clients don’t support WPA, but only support WEP, so WEP is still a good choice for you if you have such kind of client in your network environment.
After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save. You can click ‘Continue’ button to back to previous page and continue on other setting items, or click ‘Apply’ button to restart the wireless access point and the changes will take effect after about 30 seconds.
2-7-3. WPA Pre-shared Key WPA Pre-shared key is the safest encryption method currently, and it’s recommended to use this encryption method to ensure the safety of your data. When you select ‘WPA pre-shared key’ as encryption type, the following messages will be displayed: Here are descriptions of every setup item: WPA Unicast Cipher Suite Available options are: WPA (TKIP), WPA2 (AES), and WPA2 Mixed.
2-7-4. WPA RADIUS WPA Radius is the combination of WPA encryption method and RADIUS user authentication. If you have a RADIUS authentication server, you can check the identify of every wireless client by user database.
2-7-5. 802.1x Authentication You can enable 802.1x user identification (based on RADIUS user authentication server) by checking ‘Enable 802.1x Authentication’ box when you select ‘Disable’ or ‘WEP’ as encryption type, and the following message will be displayed: Here are descriptions of every setup item: Select SSID Choose the SSID you wish to configure. Use internal MD5/PEAP RADIUS Server Uses built-in RADIUS Server (refer to next Section) instead of external RADIUS server.
2-8. Radius Server Comparing to other wireless security measures, radius server provides user-based authentication. If your wireless client supports 802.1x user authentication, you can use the ‘Radius Server’ function to use the internal mini radius server to improve security and wireless user control. The internal radius server only supports 96 users and 16 IP addresses. If the number of user and/or IP address you need is more than this, please use external radius server.
Here are descriptions of every setup item: Enable Radius Server Check this box to enable internal radius server function. User Profile You can add or delete radius user here. Please input username, password, re-type password in corresponding field, and click ‘Add’ button to add the user to radius server database. You can click ‘Reset’ to clear the text you typed in above three fields. All current radius users will be listed here.
2-9. MAC Filtering Another security measure you can use to keep hackers and intruders away is ‘MAC filtering’. You can pre-define a so-called ‘white-list’, which contains MAC addresses of the wireless clients you trust. All other wireless client with the MAC address which is not in your list will be denied by this wireless access point.
Add When you finish inputting MAC address and (optional) Comment, click this button to add the MAC address to the list. Clear Remove all characters in ‘MAC address’ and ‘Comments’ field. After you finish with setting, please click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save.
2-10. System Utilities This access point provides some control functions include password, IP address management, and DHCP server function. Please click ‘System Utility’ on the left of web management interface to access these functions. Below are detailed descriptions of every control function.
2-10-1. Change Password You can change the password used to enter the web configuration menu of this wireless access point. Please input current password in ‘Current Password’ field, then input new password in both ‘New Password’ and ‘Re-Enter Password’ field. After you finish, please go to the bottom of this page and click ‘Apply’, and the following message will be displayed: When you see this message, the settings you made is successfully save.
2-10-3. DHCP Server This wireless access point is capable to act as a DHCP server for your network, and it’s disabled by default. If you want to activate this function, please click ‘System Utility’ on the left, and the following message will be displayed: Note: Please remember to select ‘Enable’ in ‘DHCP Server’ option as described in last Section or all DHCPrelated fields will be grayed out, and you will not be able to input any DHCP parameter.
Chapter III: Advanced Configuration 3-1. Configuration Backup and Restore You can backup all configurations of this access point to a file, so you can make several copied of access point configuration for security reason.
3-2. Firmware Upgrade If there are new firmware of this wireless access point available, you can upload the firmware to the access point to change the firmware with new one, to get extra functions or problem fix. To perform firmware upgrade, please click ‘Upgrade’ on the left of web management interface, and the following message will be displayed: Click ‘Browse’ button first, you’ll be prompted to provide the filename of firmware upgrade file.
3-3. System Reset When you think the access point is not working properly, you can use this function to restart the access point; this may help and solve the problem. This function is useful when the access point is far from you or unreachable. However, if the access point is not responding, you may have to switch it off by unplug the power plug and plug it back again after 10 seconds.
Chapter IV: Appendix 4-1. Troubleshooting If you found the access point is working improperly or stop responding to you, don’t panic! Before you contact your dealer of purchase for help, please read this troubleshooting first.
4-2. Glossary Default Gateway (Access point): Every non-access point IP device needs to configure a default gateway’s IP address. When the device sends out an IP packet, if the destination is not on the same network, the device has to send the packet to its default gateway, which will then send it out towards the destination. DHCP: Dynamic Host Configuration Protocol. This protocol automatically gives every computer on your home network an IP address.
PPPoE: Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a secure data transmission method originally created for dial-up connections; PPPoE is for Ethernet connections. PPPoE relies on two widely accepted standards, Ethernet and the Point-to-Point Protocol.
4-3. License Agreement Licensing Information This Conceptronic product C150BRS4 includes copyrighted third-party software licensed under the terms of the GNU General Public License. Please see The GNU General Public License for the exact terms and conditions of this license. All used software packages are copyright by their respective authors. Please see the source code for detailed information. Availability of source code Conceptronic.
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
3.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9.
GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
BSD LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.