WLAN AP Router User Manual V1.
Trademarks Copyright @2008 Contents are subject to change without notice. All trademarks belong to their respective proprietors. Copyright Statement THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION THAT IS THE PROPERTY OF THIS COMPANY. AND NO PART OF THIS DOCUMENTATION MAY BE REPRODUCED, STORED IN A RETRIEVAL SYSTEM OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, ELECTRICAL OR MECHANICAL, BY PHOTOCOPYING, RECORDING, OR OTHERWISE, WITHOUT THE PRIOR WRITTEN CONSENT OF THIS COMPANY.
Table of Contents TERMINOLOGY ----------------------------------------------------------------------------------------- 7 1.INTRODUCTION -------------------------------------------------------------------------------------8 1.1 PACKAGE CONTENTS --------------------------------------------------------------------------------------------------8 1.2 PRODUCT SPECIFICATIONS-------------------------------------------------------------------------------------------8 1.
3.3.7Wireless -Access Control ----------------------------------------------------------------------------------------------- 27 3.3.
4.FREQUENTLY ASKED QUESTIONS (FAQ) ------------------------------------------------- 54 4.1 WHAT AND HOW TO FIND MY PC'S IP AND MAC ADDRESS? ---------------------------------------------- 54 4.2 WHAT IS WIRELESS LAN? -------------------------------------------------------------------------------------------- 54 4.3 WHAT ARE ISM BANDS? ---------------------------------------------------------------------------------------------- 54 4.
4.27 WHAT IS VPN? ---------------------------------------------------------------------------------------------------------- 59 4.
Terminology 3DES Triple Data Encryption Standard AES Advanced Encryption Standard ANSI American National Standards Institute AP Access Point CCK Complementary Code Keying CSMA/CA Carrier Sense Multiple Access/Collision Avoidance CSMA/CD Carrier Sense Multiple Access/Collision Detection DDNS Dynamic Domain Name Server DH Diffie-Hellman Algorithm DHCP Dynamic Host Configuration Protocol DSSS Direct Sequence Spread Spectrum EAP Extensible Authentication Protocol ESP Encapsulating Secur
1 Introduction The WLAN AP Router is IEEE 802.11b/g WLAN AP router solution; setting SOHO and enterprise standard for high performance, secure, manageable and reliable WLAN. This document describes the steps required for the initial IP address assignment and other WLAN router configuration. The description includes the implementation of the above steps. 1.
1.3 Product Features ¾ Complies with IEEE 802.1 lb/g standard for 2.4GHz Wireless LAN. ¾ Supports bridging, routing, WISP functions between wireless and wired Ethernet interfaces. ¾ Supports 64-bit and 128-bit WEP, WPA, WPA2 encryption/decryption function to protect the wireless data transmission. ¾ Supports IEEE 802. lx Authentication. ¾ Support Wi-Fi Protected Access Authentication with Radius and Pre-Shared Key mode. ¾ Supports Inter-Access Point Protocol (IAPP).
1.4 Front Panel Description Figure 1 -WLAN AP Router Front Panel LED Indicator 1. POWER LED 2. WLAN LED 3. LAN LED ACT (LAN 1-4) State Description On The WLAN AP Router is powered on. Off The WLAN AP Router is powered off. Flashing Data is transmitting or receiving on the antenna. No data is transmitting or receiving on the Off antenna. Data is transmitting or receiving on the LAN On interface. Off Flashing 4. WAN LED ACT Off No data is transmitting or receiving on the LAN interface.
1.5 Rear Panel Description Figure 2 - WLAN AP Router Rear Panel (SMA Antenna) Interfaces Description 1.Antenna (SMA) The Wireless LAN Antenna.(Figure 2) 2.Reset Push continually the reset button 5 ~ 10 seconds to reset the configuration parameters to factory defaults. 3.WAN The RJ-45 socket allows WAN connection through a Category 5 cable. Support auto-sensing on 10/100M speed and half/ full duplex; comply with IEEE 802.3/ 802.3u respectively. 4.
2 Installation 2.1 Hardware Installation Step 1: Place the WLAN AP Router to the optimum transmission location. The best transmission location for your WLAN AP Router is usually at the geographic center of your wireless network, with line of sign to all of your mobile stations. Step 2: Connect the WLAN AP Router to your wired network. Connect the Ethernet WAN interface of WLAN AP Router by category 5 Ethernet cable to your switch/ hub/ xDSL modem or cable modem.
3 Software configuration The web based management and configuration functions allow you to do the step-by-step easily. The WLAN AP Router is delivered with the following factory default parameters on the Ethernet LAN interfaces. Default IP Address: 192.168.1.254 Default IP subnet mask: 255.255.255.0 WEB login User Name: WEB login Password: 3.1 Prepare your PC to configure the WLAN AP Router For Microsoft Windows 95/ 98/ ME: 1.
For Microsoft Windows 2000/XP: 1. Click the Start button and select Settings, then click Control Panel. The Control Panel window will appear. 2. Move mouse and double-click the right button on Network and Dial-up Connections icon. Move mouse and double-click the Local Area Connection icon. The Local Area Connection window will appear. Click Properties button in the Local Area Connection window. 3. Check the installed list of Network Components.
3.2 Connect to the WLAN AP Router Open a WEB browser, i.e. Microsoft Internet Explore, then enter 192.168.1.254 on the URL to connect the WLAN AP Router. 3.3 Management and configuration on the WLAN AP Router 3.3.1 Status This page shows the current status and some basic settings of the device, includes system, wireless, Ethernet LAN and WAN configuration information.
Item System Uptime Firmware version Wireless configuration Mode Band SSID Description Channel Number Encryption Associated Clients BSSID It shows the wireless channel connected currently. It shows the status of encryption function. It shows the number of connected clients (or stations,PCs). It shows the BSSID address of the WLAN AP Router.BSSID is a six-byte address.
3.3.2 Setup Wizard This page guides you to configure wireless AP router for first time Screen snapshot - Setup Wizard I Operation Mode This page followed by Setup Wizard page to define the operation mode.
II Time Zone Setting This page is used to enable and configure NTP client Screen snapshot - Time Zone Settings III LAN Interface Setup This page is used to enable and configure NTP client Screen snapshot - LAN Interface Setup - 18 -
IV WAN Interface Setup This page is used to configure WAN access type Screen snapshot - WAN Interface Setup V Wireless Basic Settings This page is used to configure basic wireless parameters like Band, Mode, Network Type SSID, Channel Number, Enable Mac Clone(Single Ethernet Client) Screen snapshot — Wireless Basic Settings - 19 -
VI Wireless Security Setup This page is used to configure wireless security Screen snapshot - Wireless Security Setup 3.3.
Item Gateway Description Traditional gateway configuration. It always connects internet via ADSL/Cable Modem. LAN interface, WAN interface, Wireless interface, NAT and Firewall modules are applied to this mode Bridge Each interface (LAN, WAN and Wireless) regards as bridge. NAT, Firewall and all router's functions are not supported Wireless ISP Switch Wireless interface to WAN port and all Ethernet ports in bridge mode.
Item Disable Wireless LAN Interface Description Click on to disable the wireless LAN data transmission. Band Mode Click to select 2.4GHz(B) / 2.4GHz(G) / 2.4GHz(B+G) Click to select the WLAN AP / Client / WDS / AP+WDS wireless mode. The Site Survey button provides tool to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it manually when client mode is enabled. Refer to 3.3.9 Site Survey. Site Survey SSID It is the wireless network name.
Screen snapshot - Wireless Advanced Settings Item Description Authentication Type Click to select the authentication type in Open System, Shared Key or Auto selection. Set the data packet fragmentation threshold, value can be written between 256 and 2346 bytes. Refer to 4.10 What is Fragment Threshold? Refer to 4.10 What is Fragment Threshold? Set the RTS Threshold, value can be written between 0 and 2347 bytes. Refer to 4.
Preamble Type Broadcast SSID IAPP 802.1 lg Protection RF Power Level ACK Timeout Apply Changes Reset Click to select the Long Preamble or Short Preamble support on the wireless data packet transmission. Refer to 4.13 What is Preamble Type? Click to enable or disable the SSID broadcast function. Refer to 4.14 What is SSID Broadcast? Click to enable or disable the IAPP function. Refer to 4.20 What is Inter-Access Point Protocol(IAPP)? Protect 802.1 lb user. Select the TX Power from 18-19dBm to 24-26dbm.
Item Description Encryption Select the encryption supported over wireless access. The encryption method can be None, WEP, WPA(TKIP), WPA2 or WPA2 Mixed Refer to 4.9 What is WEP? 4.15 What is Wi-Fi Protected Access (WPA)? 4.16 What is WPA2CAES1? 4.17 What is 802. IX Authentication? 4.18 What is Temporal Key Integrity Protocol (TKIP)? 4.19 What is Advanced Encryption Standard (AES)? Use 802. lx Authentication While Encryption is selected to be WEP. Click the check box to enable IEEE 802.
I WEP Key Setup Screen snapshot - WEP Key Setup Item Description Key Length Select the WEP shared secret key length from pull-down menu. The length can be chose between 64-bit and 128-bit (known as "WEP2") keys. The WEP key is composed of initialization vector (24 bits) and secret key (40-bit or 104-bit). Select the WEP shared secret key format from pull-down menu. The format can be chose between plant text (ASCII) and hexadecimal (HEX) code. Set the default secret key for WEP security function.
3.3.7 Wireless - Access Control If you enable wireless access control, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. When this option is enabled, no wireless clients will be able to connect if the list contains no entries.
Reset Click the Reset button to abort change and recover the previous configuration setting. Current Access Control It shows the registered clients that are allowed to link to this WLAN List AP Router. Delete Selected Click to delete the selected clients that will be access right removed from this WLAN AP Router. Delete All Click to delete all the registered clients from the access allowed list. Reset Click the Reset button to abort change and recover the previous configuration setting. 3.3.
Item Description Enable WDS Click the check box to enable wireless distribution system. Refer to 4.21 What is Wireless Distribution Svstem (WDS)? Fill in the MAC address of AP to register the wireless distribution system access capability. Fill in the comment tag for the registered AP. Click the Apply Changes button to register the AP to new configuration setting. Click the Reset button to abort change and recover the previous configuration setting.
II WDS AP Table This page is used to show WDS statistics Screen snapshot - WDS AP Table Item Description MAC Address Tx Packets It shows the MAC Address within WDS. It shows the statistic count of sent packets on the wireless LAN interface. It shows the statistic count of error sent packets on the Wireless LAN interface. It shows the statistic count of received packets on the wireless LAN interface. It shows the wireless link rate within WDS. Click to refresh the statistic counters on the screen.
Item Description SSID BSSID Channel Type Encrypt Signal Select Refresh Connect It shows the SSID of AP. It shows BSSID of AP. It show the current channel of AP occupied. It show which type AP acts. It shows the encryption status. It shows the power level of current AP. Click to select AP or client you'd like to connect. Click the Refresh button to re-scan site survey on the screen Click the Connect button to establish connection. 3.3.
Item Description IP Address Subnet Mask Default Gateway DHCP Server Fill in the IP address of LAN interfaces of this WLAN AP Router. Fill in the subnet mask of LAN interfaces of this WLAN AI Router. Fill in the default gateway for LAN interfaces out going data packets. Click to select Disabled, Client or Server in different operation mode of wireless AP router.
Item Description Static IP Click to select Static IP support on WAN interface. There are IP address, subnet mask and default gateway settings need to be done. IP Address If you select the Static IP support on WAN interface, fill in the IP address for it. If you select the Static IP support on WAN interface, fill in the subnet mask for it. If you select the Static IP support on WAN interface, fill in the default gateway for WAN interface out going data packets.
Item Description DHCP Client Click to select DHCP support on WAN interface for IP address assigned automatically from a DHCP server. Attain DNS Automatically Set DNS Manually Click to select getting DNS address for DHCP support. Please select Set DNS Manually if the DHCP support is selected. Click to select getting DNS address for DHCP support. DNS 1 DNS 2 DNS 3 Clone MAC Address Fill in the IP address of Domain Name Server 1. Fill in the IP address of Domain Name Server 2.
III PPPoE Item PPPoE User Name Password Connection Type Screen snapshot - WAN Interface Setup - PPPoE Description Click to select PPPoE support on WAN interface. There are user name, password, connection type and idle time settings need to be done. If you select the PPPoE support on WAN interface, fill in the user name and password to login the PPPoE server. If you select the PPPoE support on WAN interface, fill in the user name and password to login the PPPoE server.
Idle Time MTU Size Attain DNS Automatically Set DNS Manually DNS 1 DNS 2 DNS 3 Clone MAC Address Enable uPNP Enable Web Server Access on WAN Enable WAN Echo Reply Apply Changes Reset If you select the PPPoE and Connect on Demand connection type, fill in the idle time for auto-disconnect function. Value can be between 1 and 1000 minutes. Fill in the mtu size of MTU Size. The default value is 1400. Refer to 4.
IV PPTP Item PPTP IP Address Subnet Mask Server IP Address User Name Password MTU Size Attain DNS Automatically Set DNS Manually DNS 1 DNS 2 DNS 3 Clone MAC Address Screen snapshot - WAN Interface Setup - PPTP Description Allow user to make a tunnel with remote site directly to secure the data transmission among the connection. User can use embedded PPTP client supported by this router to make a VPN connection. If you select the PPTP support on WAN interface, fill in the IP address for it.
Enable uPNP Enable Web Server Access on WAN Enable WAN Echo Reply Apply Changes Reset Click the checkbox to enable uPNP function. Refer to 4.22 What is Universal Plus and Plav (uPNP)? Click the checkbox to enable web configuration from WAN side. Click the checkbox to enable WAN ICMP response. Click the Apply Changes button to complete the new configuration setting. Click the Reset button to abort change and recover the previous configuration setting.
3.3.12 Firewall - Port Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Screen snapshot - Firewall - Port Filtering Item Description Enable Port Filtering Port Range Protocol Comments Click to enable the port filtering security function. Apply Changes Click the Apply Changes button to register the ports to port filtering list.
3.3.13 Firewall - IP Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network. Screen snapshot - Firewall - IP Filtering Item Enable IP Filtering Local IP Address Protocol Comments Apply Changes Reset Delete Selected Delete All Reset Description Click to enable the IP filtering security function.
3.3.14 Firewall - MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway. Use of such filters can be helpful in securing or restricting your local network.
3.3.15 Firewall - Port Forwarding Entries in this table allow you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway's NAT firewall. Screen snapshot - Firewall - Port Forwarding Item Description Enable Port Forwarding Click to enable the Port Forwarding security function.
3.3.16 Firewall - URL Filtering URL Filtering is used to restrict users to access specific websites in internet. Item Description Enable URL Filtering URL Address Apply Changes Delete Selected Click to enable the URL Filtering function. Add one URL address. Click the Apply Changes button to save settings. Click to delete the selected URL address that will be removed from the URL Filtering list. Click to delete all the registered entries from the URL Filtering list.
3.3.17 Firewall - DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. Item Enable DMZ DMZ Host IP Address Apply Changes Reset Screen snapshot - Firewall - DMZ Description Click to enable the DMZ function.
3.3.18 Management – Statistics This page shows the packet counters for transmission and reception regarding to wireless, Ethernet LAN and Ethernet WAN networks. Screen snapshot - Management – Statistics Item Description Wireless LAN Sent Packets Wireless LAN Received Packets Wireless LAN Sent Packets Ethernet LAN Received Packets Ethernet WAN Sent Packets Ethernet WAN Received Packets Refresh It shows the statistic count of sent packets on the wireless LAN interface.
3.3.19 Management – DDNS This page is used to configure Dynamic DNS service to have DNS with dynamic IP address. Screen snapshot - Management – DDNS Item Description Enable DDNS Click the checkbox to enable DDNS service. Refer to 4.25 What is DDNS? Click the drop down menu to pickup the right provider. To configure the Domain Name. Configure User Name, Email. Configure Password, Key. Click the Apply Changes button to save the enable DDNS service.
3.3.20 Management - Time Zone Setting This page is used to configure NTP client to get current time. Item Current Time Time Zone Select Enable NTP client update NTP Server Apply Change Reset Refresh Screen snapshot - Management - Time Zone Settings Description It shows the current time. Click the time zone in your country. Click the checkbox to enable NTP client update. Refer to 4.26 What is NTP Client? Click select default or input NTP server IP address.
3.3.21 Management - Log This page is used to configure the remote log server and shown the current log. Screen snapshot - Management – Log Item Description Enable Log Wireless only System all Enable Remote Log Log Server IP Address Apply Changes Refresh Clear Click the checkbox to enable log. Only show wireless log Show all log of wireless AP router Click the checkbox to enable remote log service. Input the remote log IP address Click the Apply Changes button to save above settings.
3.3.22 Management - Upgrade Firmware This page allows you upgrade the Access Point firmware to new version. Please note, do not power off the device during the upload because it may crash the system. Screen snapshot - Management - Upgrade Firmware Item Description Select File Click the Browse button to select the new version of web firmware image file. Click the Upload button to update the selected web firmware image to the WLAN AP Router.
3.3.23 Management Save/ Reload Settings This page allows you save current settings to a file or reload the settings from the file that was saved previously. Besides, you could reset the current configuration to factory default. Screen snapshot - Management - Save/Reload Settings Item Description Save Settings to File Click the Save button to download the configuration parameters to your personal computer.
3.3.24 Management - Password Setup This page is used to set the account to access the web server of Access Point. Empty user name and password will disable the protection. Screen snapshot - Management - Password Setup Item Description User Name New Password Confirmed Password Fill in the user name for web management login control. Fill in the password for web management login control. Because the password input is invisible, so please fill in the password again for confirmation purpose.
3.3.26 Qos(Quality of Service) The QoS can let you classify Internet application traffic by source/destination IP address and port number. You can assign priority for each type of application and reserve bandwidth for it. The packets of applications with higher priority will always go first. Lower priority applications will get bandwidth after higher priority applications get enough bandwidth.
Edit QoS Rule: You can assign packet classification criteria by its local IP range, remote IP range parameters. The parameters that you leave as blank will be ignored. The priority of this rule will be applied to packets that match classification criteria of this rule. You can limit bandwidth consumed by packets that match this rule or guarantee bandwidth required by packets that match this rule. Item Description Rule Name Bandwidth The name of this rule.
4 Frequently Asked Questions (FAQ) 4.1 What and how to find my PC's IP and MAC address? IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 191.168.1.254 could be an IP address.
Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network.
4.8 What are the Open System and Shared Key authentications? IEEE 802.11 supports two subtypes of network authentication services: open system and shared key. Under open system authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station then returns a frame that indicates whether it recognizes the sending station.
4.12 What is Beacon Interval? In addition to data frames that carry information from higher layers, 802.11 includes management and control frames that support data transfer. The beacon frame, which is a type of management frame, provides the "heartbeat" of a wireless LAN, enabling stations to establish and maintain communications in an orderly fashion. Beacon Interval represents the amount of time between beacon transmissions.
4.18 What is Temporal Key Integrity Protocol (TKIP)? The Temporal Key Integrity Protocol, pronounced tee-kip, is part of the IEEE 802.Hi encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP. 4.
4.26 What is NTP Client? NTP client is designed for fetching the current timestamp from internet via Network Time protocol. User can specify time zone, NTP server IP address. 4.27 What is VPN? VPN is the abbreviation of Virtual Private Network. It is designed for creating point-to point private link via shared or public network. 4.28 What is IPSEC? IPSEC is the abbreviation of IP Security. It is used to transferring data securely under VPN.