54/108Mbps Super G Wireless LAN Managed Access Point WAP-4060PE User’s Manual
Copyright Copyrightã 2005 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of PLANET.
R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8,2000.
TABLE OF CONTENTS CHAPTER 1 INTRODUCTION .......................................................................... 1 1.1 Package Contents ........................................................................................... 1 1.2 System Requirements .................................................................................... 1 1.3 Features ........................................................................................................... 1 1.4 Physical Details.........................
4.6.2 802.1x Authentication Setup .................................................................. 49 4.7 Using 802.1x Mode (without WPA) .............................................................. 52 CHAPTER 5 OPERATION AND STATUS ...................................................... 53 5.1 Operation ....................................................................................................... 53 5.2 Status Screen .............................................................................
Chapter 1 Introduction 1 WAP-4060PE is an IEEE 802.11g Wireless Access Point with PoE. Catering to the enterprise demands, WAP-4060PE enhances security and management features, including multiple SSIDs, VLAN support, WPA support, RADIUS MAC authentication, rogue AP detection, and so on. The LAN port of WAP-4060PE is 802.3af compliant. Therefore, it can be installed anywhere without the constraint on power socket.
n Provide Windows-base utility, Web, and CLI (Command Line Interface) Configuration n SNMP support 1.4 Physical Details Front panel STATUS On - Error condition. Off - Normal operation. Blinking - During start up, and when the Firmware is being upgraded. POWER On - Normal operation. Off - No power LAN On - The LAN (Ethernet) port is active. Off - No active connection on the LAN (Ethernet) port. Flashing - Data is being transmitted or received via the corresponding LAN (Ethernet) port.
3. Continue holding the Reset Button until the Status (Red) LED blinks TWICE. 4. Release the Reset Button. The factory default configuration has now been restored, and the WAP-4060PE is ready for use. LAN (PoE) Use a standard LAN cable (RJ45 connectors) to connect this port to a 10BaseT or 100BaseT hub on your LAN. Power port Connect the supplied power adapter here. 1.5 Specification Standard IEEE 802.11b, 802.
Management Data Rate Web based configuration RADIUS Accounting RADIUS-On feature RADIUS Accounting update CLI Message Log Access Control list file support Configuration file Backup/Restore Statistics support Device discovery program Windows Utility Super G mode Up to 108Mbps 802.11g Up to 54Mbps (6/9/12/18/24/36/48/54) 802.11b Up to 11Mbps (1/2/5.
Moreover, the original antenna of WAP-4060PE can be replaced with other external antennas to extend the coverage. Please check the specification of the antenna you want to use, and make sure it can be used on WAP-4060PE. 4. WLAN type If WAP-4060PE is installed in an 802.11b and 802.11g mixed WLAN, its performance will reduced significantly. Because every 802.11g OFDM packet needs to be preceded by an RTS-CTS or CTS packet exchange that can be recognized by legacy 802.11b devices.
Chapter 2 Installation 2 2.1 General Installation Before you proceed with the installation, it is necessary that you have enough information about the WAP-4060PE. 1. Locate an optimum location for the WAP-4060PE. The best place for your WAP4060PE is usually at the center of your wireless network, with line of sight to all of your mobile stations. 2. Assemble the antenna to WAP-4060PE. Try to place them to a position that can best cover your wireless network.
Chapter 3 Access Point Setup 3 3.1 Overview This chapter describes the setup procedure to make the WAP-4060PE a valid device on your LAN, and to function as an Access Point for your Wireless Stations. The WAP-4060PE can be configured using either the supplied Windows utility or the Web Browser 3.2 Setup using the Windows Utility A simple Windows setup utility is supplied on the CD-ROM. This utility can be used to assign a suitable IP address to the WAP-4060PE.
IP address The IP address for the WAP-4060PE. MAC Address The hardware or physical address of the WAP-4060PE. IEEE Standard The wireless standard or standards used by the WAP-4060PE (e.g. 802.11b, 802.11g) FW Version The current Firmware version installed in the WAP-4060PE. Description Any extra information for the WAP-4060PE, entered by the administrator.
These are the default values. The password can and should be changed. Always enter the current user name and password, as set on the Admin Login screen. 4. You will then see the Status screen, which displays the current settings and status. No data input is possible on this screen. 5. From the menu, check the following screens, and configure as necessary for your environment. Details of these screens and settings are described in the following subsections of this chapter.
3.4 Access Control This feature allows you to block certain access from unknown or distrusted wireless stations. Click Access Control on the menu to view a screen like the following. Data - Access Control Screen Enable Use this checkbox to Enable or Disable this feature as desired. Warning: Ensure your own PC is in the "Trusted Wireless Stations" list before enabling this feature. Trusted Stations This table lists any Wireless Stations you have designated as "Trusted".
Data - Trusted Wireless Stations Trusted Wireless Stations Here lists ass Wireless Stations which you have designated as “Trusted”. Other Wireless Stations Here lists all Wireless Stations detected by the WAP-4060PE, which you have not designated as "Trusted". Name The name assigned to the Trusted Wireless Station. Use this when adding or editing a Trusted Station. Address The MAC (physical) address of the Trusted Wireless Station. Use this when adding or editing a Trusted Station.
Add To add a Trusted Station which is not in the "Other Wireless Stations" list, enter the required data and click this button. Clear Clear the Name and Address fields. 3.5 Security Profiles Security Profiles contain the SSID and all the security settings of this WAP-4060PE. · Up to eight (8) Security Profiles can be defined. · Up to four (4) Security Profiles can be enabled at one time, allowing up to 4 different SSIDs to be used simultaneously.
Data - Security Profiles Screen Profile Profile List Buttons All available profiles are listed. For each profile, the following data is displayed: · * (star sign) If displayed before the name of the profile, this indicates the profile is currently enabled. If not displayed, the profile is currently disabled. · Profile Name The current profile name is displayed. · [SSID] The current SSID associated with this profile. · Security System The current security system (e.g. WPA-PSK) is displayed.
802.11b/g Bridge Mode Select the primary profile for 802.11b and 802.11g Bridge Mode. This setting determines the SSID and security settings used for the Bridge connection to the remote AP. Isolation None If this option is selected, wireless clients using different profiles (different SSIDs) are not isolated, so they will be able to communicate with each other.
Data - VLAN Configuation Screen VLAN – Client Traffic Profile Each profile is listed, whether currently enabled or not. You can assign traffic from each profile (SSID) to a different VLAN if desired. To assign multiple profiles to the same VLAN, just enter the same VLAN ID for each profile. VLAN ID Enter the desired VLAN ID, as used on your network. IDs must be in the range 1 ~ 4095. These IDs must match the IDs used by other network devices.
Specified VLAN ID If selected, you can enter the desired VLAN ID. Normally, this ID should be one of the client VLAN IDs defined above. 3.6 Configure Security Profile This screen is displayed when you select a Profile on the Security Profiles screen, and click the Configure button. 3.6.1 Profile Data Enter the desired settings for each of the following: Profile Name Enter a suitable name for this profile. SSID Enter the desired SSID. Each profile must have an unique SSID.
If this option is selected: · This WAP-4060PE must have a "client login" on the Radius Server. · Each user must have a "user login" on the Radius Server. · Each user's wireless client must support 802.1x and provide the login data when required. · All data transmission is encrypted using the WPA standard. Keys are automatically generated, so no key input is required. · 802.1x - This uses the 802.1x standard for client authentication, and WEP for data encryption. If possible, you should use WPA-802.
the Security page, or the Radius-based MAC authentication sub-screen, depending on the security method used. · On the WAP-4060PE, enable the Radius-based MAC authentication feature on the screen below. 6. Add Users on the Radius server as required. The username must be the MAC address of the Wireless client you wish to allow, and the password must be blank. 7. When clients try to associate with the WAP-4060PE, their MAC address is passed to the Radius Server for authentication.
WEP Key Index If this field is visible, select the desired key index. Any value can be used, provided it matches the value on the Radius Server. 3.6.5 UAM UAM (Universal Access Method) is intended for use in Internet cafes, Hot Spots, and other sites where the WAP-4060PE is used to provide Internet Access. If enabled, then HTTP (TCP, port 80) connections are checked. (UAM only works on HTTP connections; all other traffic is ignored.
2. 3. 4. 5. 6. 7. 8. · Ensure the WAP-4060PE has the correct address, port number, and shared key for login to your Radius Server. These parameters are entered either on the Security page, or the UAM sub-screen, depending on the security method used. On your Web Server, create a suitable welcome page. The welcome page must have a link or button to allow the user to input their user name and password on the uamlogon.htm page on the WAP-4060PE.
Data - UAM Screen Enable Enable this if you want to use this feature. See the section above for details of using UAM. Internal Web-based Authentication If selected, then when a user first tries to access the Internet, they will be blocked, and re-directed to the built-in login page. The logon data is then sent to the Radius Server for authentication.
Data - WEP Screen WEP Data Encryption Authentication Select the desired option, and ensure your Wireless stations have the identical setting: · 64 Bit Encryption - Keys are 10 Hex (5 ASCII) characters. · 128 Bit Encryption - Keys are 26 Hex (13 ASCII) characters. · 152 Bit Encryption - Keys are 32 Hex (16 ASCII) characters. Normally, you can leave this at “Automatic”, so that Wireless Stations can use either method ("Open System" or "Shared Key".).
Passphrase Use this to generate a key or keys, instead of entering them directly. Enter a word or group of printable characters in the Passphrase box and click the "Generate Key" button to automatically configure the WEP Key(s). Radius MAC Authentication The current status is displayed. UAM The current status is displayed. Click the "Configure" button to configure this feature if required. Click the "Configure" button to configure this feature if required. 3.6.
· TKIP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are not encrypted. · TKIP + 64 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 64 bit WEP. · TKIP + 128 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 128 bit WEP.
Data - WPA-802.1x Screen WPA-802.1x Radius Server Address Enter the name or IP address of the Radius Server on your network. Radius Port Enter the port number used for connections to the Radius Server. Client Login Name This read-only field displays the current login name, which is the same as the name of the WAP-4060PE. The Radius Server must be configured to accept this login. Shared Key This is used for the Client Login on the Radius Server. Enter the key value to match the Radius Server.
WPA Encryption Select the desired option. Other Wireless Stations must use the same method. · TKIP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are not encrypted. · TKIP + 64 bit WEP - Unicast (point-to-point) transmissions are encrypted using TKIP, and multicast (broadcast) transmissions are encrypted using 64 bit WEP.
3.6.9 Security Settings - 802.1x This uses the 802.1x standard for client authentication, and WEP for data encryption. If possible, you should use WPA-802.1x instead, because WPA encryption is much stronger than WEP encryption. If this option is selected: · This WAP-4060PE must have a "client login" on the Radius Server. · Each user must have a "user login" on the Radius Server. Normally, a Certificate is used to authenticate each user. · Each wireless client must support 802.1x.
WEP Key Size Dynamic WEP Key Select the desired option: · 64 Bit - Keys are 10 Hex (5 ASCII) characters. · 128 Bit - Keys are 26 Hex (13 ASCII) characters. · 152 Bit - Keys are 32 Hex (16 ASCII) characters. Click this if you want the WEP keys to be automatically generated. · The key exchange will be negotiated. The most widely supported protocol is EAP-TLS. · The following Key Exchange setting determines how often the keys are changed.
3.7 System Screen Click System on the menu to view a screen like the following. Data - System Screen Identification Access Point Name Enter a suitable name for this WAP-4060PE. Description If desired, you can enter a description for the WAP-4060PE. Country Domain Select the country or domain matching your current location. IP Address DHCP Client Select this option if you have a DHCP Server on your LAN, and you want the WAP-4060PE to obtain an IP address automatically.
WINS Enable WINS If your LAN has a WINS server, you can enable this to have this AP register with the WINS server. WINS Server Name/IP Address Enter the name or IP address of your WINS server. 3.8 2.4GHz Wireless There are two configuration screens available: · Basic Settings · Advanced 3.8.1 Basic Settings Screen The settings on this screen must match the settings used by Wireless Stations. Click Basic on the menu to view a screen like the following.
Data - Basic Settings Screen Operation Wireless Mode Select the desired option: · Disable - select this if for some reason you do not want this AP to transmit or receive at all. · 802.11b and 802.11g - this is the default setting, and will allow connections by both 802.11b and 802.1g wireless stations. · 802.11b - if selected, only 802.11b clients are allowed. 802.11g wireless stations will only be able to connect if they are fully backward compatible with the 802.11b standard. · 802.11g - only 802.
AP Mode Both Bridge mode and AP mode can be used simultaneously, unless AP mode is "Client/Repeater". Select the desired AP mode: · None (disable) - Disable AP mode. Use this if you want this WAP-4060PE to act as Bridge only. · Access Point - operate as a normal Access Point · Client/Repeater - act as a client or repeater for another Access Point. If selected, you must provide the address (MAC address) of the other AP in the Repeater AP MAC Address field.
In PTMP mode, only allow specified APs This is only functional if using Point-to-Multi-Point Bridge (PTMP) mode. If enabled, you can specify the MAC addresses of the APs which are allowed to connect to this AP. To specify the allowed APs: 1. Enable this checkbox 2. Click the button "Set PTMP APs". 3. On the resulting sub-screen, enter the MAC addresses of the allowed APs. Set PTMP APs Use this to open a sub-window where you can specify the MAC addresses of the APs which are allowed to connect to this AP.
Data - Advanced Settings Screen Basic Rate Basic Rate The Basic Rate is used for broadcasting. It does not determine the data transmission rate, which is determined by the "Mode" setting on the Basic screen. Select the desired option. Do NOT select the "802.11g" or "ODFM" options unless ALL of your wireless clients support this. 802.11b clients will not be able to connect to the WAP-4060PE if either of these modes is selected.
RTS/CTS Threshold Enter the preferred setting between 256 and 2346. Normally, this can be left at the default value. Preamble Type Select the desired option. The default is "Long". The "Short" setting takes less time when used in a good environment. Output Power Level Select the desired power output. Higher levels will give a greater range, but are also more likely to cause interference with other devices. Antenna Selection WAP-4060PE has only 1 antenna, there is only 1 option available. 802.
Chapter 4 PC and Server Configuration 4 4.1 Overview All Wireless Stations need to have settings which match the Wireless Access Point. These settings depend on the mode in which the WAP-4060PE is being used. · If using WEP or WPA-PSK, it is only necessary to ensure that each Wireless station's settings match those of the WAP-4060PE, as described below. · For WPA-802.1x and 802.1x modes, configuration is much more complex.
Security · The Pre-shared Key entered on the WAP-4060PE must also be entered on each Wireless client. · The Encryption method (e.g. TKIP, AES) must be set to match the WAP-4060PE. 4.4 Using WPA-802.1x This is the most secure and most complex system. 802.1x mode provides greater security and centralized management, but it is more complex to configure. Wireless Station Configuration For each of the following items, each Wireless Station must have the same settings as the WAP-4060PE.
· dhcpd · dns · rras · webserver (IIS) · Radius Server (Internet Authentication Service) · Certificate Authority 4.5.1 Windows 2000 Domain Controller Setup 1. Run dcpromo.exe from the command prompt. 2. Follow all of the default prompts, ensure that DNS is installed and enabled during installation. 4.5.2 Services Installation 1. Select the Control Panel - Add/Remove Programs. 2. Click Add/Remove Windows Components from the left side. 3.
6. Enter the information for the Certificate Authority, and click Next. 7. Click Next if you don't want to change the CA's configuration data. 8. Installation will warn you that Internet Information Services are running, and must be stopped before continuing. Click Ok, then Finish. 4.5.3 DHCP server configuration 1. Click on the Start - Programs - Administrative Tools - DHCP 2. Right-click on the server entry as shown, and select New Scope.
3. Click Next when the New Scope Wizard Begins. 4. Enter the name and description for the scope, click Next. 5. Define the IP address range. Change the subnet mask if necessary. Click Next. 6. Add exclusions in the address fields if required. If no exclusions are required, leave it blank. Click Next. 7. Change the Lease Duration time if preferred. Click Next. 8. Select Yes, I want to configure these options now, and click Next. 9. Enter the router address for the current subnet.
11. If you don't want a WINS server, just click Next. 12. Select Yes, I want to activate this scope now. Click Next, then Finish. 13. Right-click on the server, and select Authorize. It may take a few minutes to complete. 4.5.4 Certificate Authority Setup 1. Select Start - Programs - Administrative Tools - Certification Authority. 2. Right-click Policy Settings, and select New - Certificate to Issue. 3. Select Authenticated Session and Smartcard Logon (select more than one by holding down the Ctrl key).
4. Select Start - Programs - Administrative Tools - Active Directory Users and Computers. 5. Right-click on your active directory domain, and select Properties. 6. Select the Group Policy tab, choose Default Domain Policy then click Edit.
7. Select Computer Configuration - Windows Settings - Security Settings - Public Key Policies, right-click Automatic Certificate Request Settings - New - Automatic Certificate Request. 8. When the Certificate Request Wizard appears, click Next. 9. Select Computer, then click Next.
10. Ensure that your certificate authority is checked, then click Next. 11. Review the policy change information and click Finish. 12. Click Start - Run, type cmd and press enter. Enter secedit /refreshpolicy machine_policy This command may take a few minutes to take effect. 4.5.5 Internet Authentication Service (Radius) Setup 1. Select Start - Programs - Administrative Tools - Internet Authentication Service 2. Right-click on Clients, and select New Client. 3.
9. Click Permitted, then OK. Select Next. 10. Select Grant remote access permission. Click Next. 11. Click Edit Profile... and select the Authentication tab. Enable Extensible Authentication Protocol, and select Smart Card or other Certificate. Deselect other authentication methods listed. Click OK. 12. Select No if you don't want to view the help for EAP. Click Finish. 4.5.6 Grant Remote Access for Users 1. Select Start - Programs - Administrative Tools- Active Directory Users and Computers. 2.
3. Select the Dial-in tab, and enable Allow access. Click OK. 4.6 802.1x Client Setup on Windows XP Windows XP ships with a complete 802.1x client implementation. If using Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality. If you don't have either of these systems, you must use the 802.1x client software provided with your wireless adapter. Refer to the documentation of your wireless adapter for setup instructions.
4. On the first screen (below), select Request a certificate, click Next. 5. Select User certificate request and select User Certificate, the click Next.
6. Click Submit. 7. A message will be displayed, then the certificate will be returned to you. Click Install this certificate.
8. . You will receive a confirmation message. Click Yes. 9. Certificate setup is now complete. 4.6.2 802.1x Authentication Setup 1. Open the properties for the wireless connection, by selecting Start - Control Panel - Network Connections. 2. Right Click on the Wireless Network Connection, and select Properties. 3. Select the Authentication Tab, and ensure that Enable network access control using IEEE 802.1X is selected, and Smart Card or other Certificate is selected from the EAP type.
Encryption Settings The Encryption settings must match the APs (WAP-4060PE) on the Wireless network you want to join. · Windows XP will detect any available Wireless networks, and allow you to configure each network independently. · Your network administrator can advise you of the correct settings for each network. 802.1x networks typically use EAP-TLS. This is a dynamic key system, so there is no need to enter key values.
2. Select the wireless network from the Available Networks list, and click Configure. 3. Select and enter the correct values, as advised by your Network Administrator. For example, to use EAP-TLS, you would enable Data encryption, and click the checkbox for the setting: The key is provided for me automatically, as shown below. Setup for Windows XP and 802.1x client is now complete.
4.7 Using 802.1x Mode (without WPA) The procedures are similar to using WPA-802.1x. The only difference is that on your client, you must NOT enable the setting: The key is provided for me automatically. Instead, you must enter the WEP key manually, ensuring it matches the WEP key used on the Access Point. Note: On some systems, the "64 bit" WEP key is shown as "40 bit" and the "128 bit" WEP key is shown as "104 bit".
Chapter 5 Operation and Status 5 5.1 Operation Once both the WAP-4060PE and the PCs are configured, operation is automatic. However, you may need to perform the following operations on a regular basis. · If using the Access Control feature, update the Trusted PC database as required. (See Access Control in Chapter 3 for details.) · If using 802.1x mode, update the User Login data on the Windows 2000 Server, and configure the client PCs, as required. 5.
Data - Status Screen Access Point Access Point Name The current name will be displayed. MAC Address The MAC (physical) address of the WAP-4060PE. Domain The region or domain, as selected on the System screen. Firmware Version The version of the firmware currently installed. TCP/IP IP Address The IP Address of the WAP-4060PE. Subnet Mask The Network Mask (Subnet Mask) for the IP Address above.
5.3.1 Statistics Screen This screen is displayed when the 2.4GHz Statistics button on the Status screen is clicked. It shows details of the traffic flowing through the WAP-4060PE. Data - Statistics Screen System Up Time System Up Time This indicates the time period which the system has been running since the last restart or reboot. 2.4GHz Wireless Authentication The number of "Authentication" packets received. Authentication is the process of identification between the AP and the client.
Multicast Packets Number of Broadcast packets transmitted to or received from Wireless Stations, using Multicast transmission. Management Number of Management packets transmitted to or received from Wireless Stations. Control Number of Control packets transmitted to or received from Wireless Stations. 5.3.2 Profile Status The Profile Status screen is displayed when the Profile Status button on the Status screen is clicked.
5.3.3 Activity Log This screen is displayed when the Log button on the Status screen is clicked. Data - Activity Log Data Current Time The system date and time is displayed. Log The Log shows details of the connections to the WAP4060PE. Buttons Refresh Update the data on screen. Save to file Save the log to a file on your pc. Clear Log This will delete all data currently in the Log. This will make it easier to read new messages.
5.3.4 Station List This screen is displayed when the Stations button on the Status screen is clicked. Data - Station List Screen Station List Name The name of each Wireless Station is displayed. If the name is not known, "unknown" is displayed for the name. MAC Address The MAC (physical) address of each Wireless Station is displayed. Mode The mode of each Wireless Station. SSID This displays the SSID used the Wireless station.
Chapter 6 Management 6 6.1 Overview This Chapter covers the following features, available on the WAP-4060PE’s Management menu. · Admin Login · Auto Config/Update · Config File · Log Settings · Rogue APs · SNMP · Upgrade Firmware 6.2 Admin Login Screen The Admin Login screen allows you to assign a password to the WAP-4060PE. This password limits access to the configuration interface. The default password is password. It is recommended to change it for security consideration.
Change Admin Password If you wish to change the Admin password, check this field and enter the new login password in the fields below. New Password Enter the desired login password. Repeat New Password Re-enter the desired login password. Admin Connections Allow Admin connections via wired Ethernet only If checked, then Admin connections via the Wireless interface will not be accepted. Enable HTTP Enable this to allow admin connections via HTTP.
Data - Auto Config/Update Screen Admin Connections Perform Auto Configuration on this AP next restart If checked, this AP will perform Auto Configuration the next time it restarts. · The wired LAN (NOT the Wireless LAN) will be searched for compatible APs. · If a compatible AP is found, its configuration is copied. If more than one compatible AP exists, the first one found is used. · Some data cannot be copied: o The IP address is not copied, and will not change.
Provide "Respond to Auto-configuration" setting If enabled, the "Respond to Auto-configuration" setting on this AP is supplied to the AP making the Autoconfiguration request. If disabled, the AP making the Auto-configuration request will keep its existing setting. Auto Update Check for Firmware upgrade Install... If enabled, this AP will check to see if a Firmware (FW) upgrade is available on the specified FTP Server. If enabled: · Enter the desired time interval (in days) between checks.
Data - Config File Screen Backup Save a copy of current settings Once you have the WAP-4060PE working properly, you should back up the settings to a file on your computer. You can later restore the settings from this file, if necessary. To create a backup file of the current settings: · Click Back Up. · If you don't have your browser set up to save downloaded files automatically, locate where you want to save the file, rename it if you like, and click Save.
6.5 Log Settings (Syslog) If you have a log server on your LAN, this screen allows you to configure the WAP4060PE to send log data to your log server. Data - Log Settings Screen Syslog Server Select the desired Option: · Disable - Syslog server is not used. · Broadcast - Syslog data is broadcast. Use this option if different PCs act as the Syslog server at different times. · Send to specified Syslog Server - Select this if the same PC is always used as the Syslog server.
Data - Rogue AP Screen Enable Detection Enable Detection To use this feature, enable the "Enable Rogue AP Detection" checkbox, and select the desired wireless band and time interval. Scan Select the desired Wireless band to scan to Rogue APs and enter the desired time interval between each scan. Detection generates SNMP Trap If using SNMP, checking this option will generate a SNMP trap whenever a Rogue AP is detected. If not using SNMP, do not enable this option.
Data - SNMP Screen General Enable SNMP Use this to enable or disable SNMP as required Community Enter the community string, usually either "Public" or "Private". Access Rights Select the desired option: · Read-only - Data can be read, but not changed. · Read/Write - Data can be read, and setting changed. Managers Any Station The IP address of the manager station is not checked. Only this station The IP address is checked, and must match the address you enter in the IP address field provided.
6.8 Upgrade Firmware The firmware (software) in the Wireless Access Point can be upgraded using your Web Browser. You must first download the upgrade file, and then select Upgrade Firmware in the Management section of the menu. You will see a screen like the following. To perform the Firmware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3.
A Appendix A Specifications Model WAP-4060PE Standard IEEE 802.11b, 802.11g Signal Type DSSS (Direct Sequence Spread Spectrum) Modulation OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK, CCK Port 10/100Mbps RJ-45 port * 1, 802.3af compliant Antenna Connector Reverse SMA male * 1 Output Power 18dBm 11 Mbps (CCK): -85dBm 5.5 Mbps (QPSK): - 89dBm 802.
Management Data Rate Web based configuration RADIUS Accounting RADIUS-On feature RADIUS Accounting update CLI Message Log Access Control list file support Configuration file Backup/Restore Statistics support Device discovery program Windows Utility Super G mode Up to 108Mbps 802.11g Up to 54Mbps (6/9/12/18/24/36/48/54) 802.11b Up to 11Mbps (1/2/5.
Appendix B Troubleshooting Problem 1: Can't connect to the WAP-4060PE to configure it. Solution 1: Check the following: B · The WAP-4060PE is properly installed, LAN connections are OK, and it is powered ON. Check the LEDs for port status. · Ensure that your PC and the WAP-4060PE are on the same network segment. (If you don't have a router, this must be the case.) · If your PC is set to "Obtain an IP Address automatically" (DHCP client), restart it.
Appendix C Command Line Interface C If desired, the Command Line Interface (CLI) can be used for configuration. This creates the possibility of creating scripts to perform common configuration changes. The CLI requires either a Telnet connection or a physical connection from your PC to the serial port (RS232 port) on the WAP-4060PE. C.1 Using the CLI - Telnet 1. Start your Telnet client, and establish a connection to the WAP-4060PE. e.g. Telnet 192.168.0.228 2.
4. Use the “Connect” command to start the connection. 5. You will be prompted for a user name and password. Enter the current user name and password for the AP you are connecting to. The default values are admin for the User Name, and password for the Password. 6. You will then see the prompt, and can use any of the commands listed in the following Command Reference. C.3 Command Reference The following commands are available.
get 11gonly Display 11g Only Allowed get 11goptimize Display 11g Optimization Level get 11goverlapbss Display Overlapping BSS Protection get acl Display Access Control List get aging Display Aging Interval get antenna Display Antenna Diversity get association Display Association Table get authentication Display Authentication Type get autochannelselect Display Auto Channel Select get basic11b Display Basic 11b Rates get basic11g Display Basic 11g Rates get beaconinterval Display Beaco
get ctstype Display CTS type get domainsuffix Display Domain Name Server suffix get dtim Display Data Beacon Rate (DTIM) get enableANI Display Adaptive Noise Immunity Control On/Off get encryption Display Encryption Mode get extendedchanmode Display Extended Channel Mode get firStepLvl Display ANI Parameter for FirStepLevel get fragmentthreshold Display Fragment Threshold get frequency Display Radio Frequency (MHz) get gateway Display Gateway IP Address get gbeaconrate Display 11g Beaco
get overRidetxpower Display Tx power override get operationMode Display Operation Mode get power Display Transmit Power Setting get quietAckCtsAllow Display if Ack/Cts frames are allowed during quiet period get quietDuration Display Duration of quiet period get quietOffset Display Offset of quiet period into the beacon period get radiusname Display RADIUS server name or IP address get radiusport Display RADIUS port number get rate Display Data Rate get remoteAp Display Remote Ap's Mac Add
get wds Display WDS Mode get wep Display Encryption Mode get wirelessmode Display Wireless LAN Mode get 80211d Display 802.
get ftpLogin Display FTP Login Name get ftpPassword Display FTP Password get activeCurrentProfile Display active Current Profile get profileName Display Profile Name get profileVlanId Display Profile VLAN ID get APPrimaryProfile Display AP Primary Profile get WDSPrimaryProfile Display WDS Primary Profile get securityMode Display Security Mode get Accounting Display Accounting Enable/Disable get Accountingport Display Accounting port number get keyValue Display Encryption Key Value get
get trapRecvIp Display Trap Receiver IP get wdsMacList Display WDS Mac Address List get enableWirelessClient Display Wireless Client Enable/Disable get isolationType Display Isolation Type get winsEnable Display WINS Server Enable/Disable get winsserveraddr Display IP address of WINS server get wirelessSeparate Display wireless seprate Mode get description Display Access Point Description get dhcpmode Display dhcp mode get wlanstate Display wlan state help Display CLI Command List Lebr
set authentication Set Authentication Type set autochannelselect Set Auto Channel Selection set basic11b Set Use of Basic 11b Rates set basic11g Set Use of Basic 11g Rates set beaconinterval Modify Beacon Interval set burstSeqThreshold Set Max Number of frames in a Burst set burstTime Set Burst Time set calibration Set Calibration Period set cckTrigHigh Set Higher Trigger Threshold for CCK Phy Errors For ANI Control set cckTrigLow Set Lower Trigger Threshold for CCK Phy Errors For ANI Con
set fragmentthreshold Set Fragment Threshold set frequency Set Radio Frequency (MHz) set gateway Set Gateway IP Address set gbeaconrate Set 11g Beacon Rate set groupkeyupdate Set Group Key Update Interval (in Seconds) set gdraft5 Set 11g Draft 5.
set radiusport Set RADIUS port number set radiussecret Set RADIUS shared secret set rate Set Data Rate set rate Set Data Rate set rate Set Data Rate set rate Set Data Rate set rate Set Data Rate set regulatorydomain Set Regulatory Domain set remoteAP Set Remote AP's Mac Address set hwtxretries Set HW Transmit Retry Limit set swtxretries Set SW Transmit Retry Limit set rtsthreshold Set RTS/CTS Threshold set shortpreamble Set Short Preamble set shortslottime Set Short Slot Time set
set wirelessmode Set Wireless LAN Mode set 80211d Set 802.
set activeCurrentProfile Set active Current Profile set profileName Set Profile Name set profileVlanId Set Profile Vlan Id set APPrimaryProfile Set AP's Primary Profile set WDSPrimaryProfile Set WDS's Primary Profile set securityMode Set Security Mode set Accounting Set Accounting Enable/Disable set Accountingport Set Accounting port number set keyValue Set Encryption Key Value set keyLength Set Encryption Key Length set keyIndex Set Encryption Key Index set UAM Set UAM Authentication
set dhcpMode Set Dhcp Mode set wdsMacList Set WDS Mac Address List set enableWirelessClient Set Wireless Client Enable/Disable set isolationType Set Isolation Type set winsEnable Set WINS Server Enable/Disable set winsServerAddr Set WINS Server IP address set wirelessSeparate Set wireless separate Mode set sdSet Set debug level set sdAdd Add debug level set sdDel Del debug level start wlan Start the current wlan stop wlan Stop the current wlan timeofday Display Current Time of Day