Compex Systems 802.11N Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Compex Systems 802.11N an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Compex Systems 802.11N, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Compex Systems 802.11N die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Compex Systems 802.11N. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Compex Systems 802.11N sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Compex Systems 802.11N
- Den Namen des Produzenten und das Produktionsjahr des Geräts Compex Systems 802.11N
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Compex Systems 802.11N
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Compex Systems 802.11N zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Compex Systems 802.11N und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Compex Systems finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Compex Systems 802.11N zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Compex Systems 802.11N, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Compex Systems 802.11N widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    [...]

  • Seite 2

    © Copyright 2009 Compex Systems Pte Ltd All Rights Reserved This document contai ns information, which is protected b y copyright. Reproductio n, adaptati on or translati on without prior permi ssion is prohibi ted, except as allowed under the copyright laws. T rademark Information Compex ® is a registered trad emark of Compex, Inc. Microsoft Win[...]

  • Seite 3

    FCC NOTICE This devi ce has been tested and found to compl y with the limi ts for a Class B di gital d evice , pursuant to Part 15 of the F CC Rules. Th ese limi ts are designed to prov id e reasonable protecti on against harmful interference in a resi dential instal lation. Thi s device generates uses and can radiate radi o frequency energy and, i[...]

  • Seite 4

    Declaration of Conf ormi ty Compex, Inc. declares the f oll owing: Product Name: Wireless A ccess Point with PoE Model No.: MMJ543 conforms to the following Product Standards : This device compli es with the Electromagneti c Compatibili ty Directive (89/336/EEC) issued by the Commissi on of the Europea n Communi ty. Compli ance with thi s directiv [...]

  • Seite 5

    T able of Contents Overview the Pr oduct .................................................................................................. 7 Introduction .................................................................................................................. 7 Features and Benefits ........................................................[...]

  • Seite 6

    System T ab .................................................................................................................. 58 Firmware Upgrade ............................................................................................................... ... 58 Host Name ..........................................................................[...]

  • Seite 7

    Overview the Pr oduct Introduction The high-performance Wireless Network Access Point (AP) is designed for enterprise and public access applications . Embedded with the Atheros chipset, it boasts network robustness, s tability and wider network coverag e. Based on 802.11n (Draft 2.0), the access point support s high-speed data transmission of up to[...]

  • Seite 8

    Featur es and Benefits Point-to-Point & Point-to-MultiPoint Support Point-to-Point and Po int-to-MultiPoint communicat ion between dif ferent buildings enables yo u to bridge wireless cli ents that are kilom etres apart while unifying the net works. V irtual AP (Multiple SSID) V irtual AP implements mS SID (Multi-SSID) This allo ws a single wir[...]

  • Seite 9

    Operation Modes and Connection Examples Access Point and Access Point WDS Mode The Access Point Mode is the default mode of the dev ice. It enables the bridging of wireless cli ents to wired network i nfrastructure and enable s transparent access and communi cation with each other . The illustration below shows a typical resources sharing appli cat[...]

  • Seite 10

    S tation Mode In Station mode the device acts as a wi reless client. When connected to an access point, it creates a network link between the Ethernet network connected at thi s client device , and the wireless Ethernet network connected at the access point. In this example the workgroup PCs on the ethernet network connected to the Station device c[...]

  • Seite 11

    S tation WDS Mode Statio n WDS mode is s imilar to Stat ion mode. The d ifference is Stat ion WDS must connect to access point confi gured to Access Point WDS (or RootAP) mode. Stat io n WDS is main l y us e for po i n t-to– poin t connection between 2 buildings or locations as far as several kilometer away. Point-to-Point Point-to-MultiPoint An [...]

  • Seite 12

    Router Mode In Router Mode, the device also operates as a router. Either the wireless or Ethernet can be setup as WAN connection to a broadband modem. Wireless as W AN is known as Station + Router mode (or Wireless Routing Client mode) and Ethernet as WAN is known as AP + Router mode (or Gateway m o d e ) . Device supports several types of br oadba[...]

  • Seite 13

    Repeater WDS Mode Repeater WDS Mode to mainly to extend the wireless range and cove rage of the wireless network allowing access and communications over places generally difficult for wireles s c lie nts t o connect to the network. In Repeater mode, the access point acts as a relay for network signals on the network by regenerating the signa ls it [...]

  • Seite 14

    Device Panel V iews and Descriptions Features S tatus and Indications 1 POWER LED Static ON: Power is being supplied to the device. Off: Power is not being supplied to the device. 3 DIAGNOSTIC LED Flashing: During power-up. Goes OFF after de v ice is up. 2 3 4 5 SIGNAL STRENGTH LEVEL INDICA TOR ( l o w ) ( h i g h e r l o w ) ( l o w e r h i g h ) [...]

  • Seite 15

    Install the Hardwar e This section will show you how to instal l the hardware of the access point. • Antenna Alignment The antenna alignmen t of the access point must first b e considered to ensure that the signal is strong. • Installation Direction After considering the antenna alignment, the direction in which the ac cess p o i n t i s f a c [...]

  • Seite 16

    Antenna Alignment The physical environment of the antenna must be examined when aligning the antenna. Obstructions , available mounting locati ons, and other factors must be considered. Many objects such as forests, buildings, and hills , can obstruct the antenna, reducing the signal strength. The antenna can be installed at a height above such obs[...]

  • Seite 17

    Installation Dir ection The directional antenna radiates the signal towards the front of the unit . T he unit sho ul d be ins tal le d in a position whereby the front of the unit faces the direction you wish to send the signal to. Therefore the direction you wish to send the signal to has to be consi dered before going on to the next step of starti[...]

  • Seite 18

    Setup Requir ements • CAT5/5e Networking Cable. • At least 1 computer install ed with a web browser and a wired or wireless network interface adapter. • All netwo rk nodes installed with TC P/IP and properly configured IP address parameters. Mount the Unit on a Pole Access point is designed to mo unt to a pole. The mounting method will be des[...]

  • Seite 19

    Pr epare Unit to mount to a pole Unpack the 2 cable ties from the b ox. Loop each cable tie through the mounting bracket hole at the top and bottom. W rap them round the pole and tigh ten the cable ties to secure the unit to the p ole. Connect one end of an RJ45 Ethernet cable to the LAN OUT port of the Injector and the oth er end to LAN of the acc[...]

  • Seite 20

    Connect the RJ45 Ethernet cable at tached to the PoE Injector to a network device, such as to a switch or to the PC you will use to configure the access point. PoE power input: Passive PoE (range 12V – 24V DC) Connect the pow er adapter in the PoE kit to the main electrical sup ply and the power plu g into the socket of the injector. N o w , t u [...]

  • Seite 21

    Configur e the IP Addr ess After setting up the hardware you need to assi gn an IP address to your PC so that it is in the same subnet as the access point. For W indows 95/98/98SE/ME/NT S S t t e e p p 1 1 : : From your desktop, right-click the Network Neighborhood icon and select Properties . S S t t e e p p 2 2 : : Select the network ada pter tha[...]

  • Seite 22

    S S t t e e p p 5 5 : : To verify that the IP address has been correctly assi gned to your PC, go to the Start menu, select Run , and enter the command: winipcfg . Select the Ethernet a dapter from the drop-down list and click OK . PC is now setup wi th p rop er IP address to communicate w ith the access point.[...]

  • Seite 23

    For W indows XP/2000 S S t t e e p p 1 1 : : Go to your desktop, right-click on the My Network Places icon and select Properties . S S t t e e p p 2 2 : : Right-click the netw ork adapt er icon and select Properties. S S t t e e p p 3 3 : : Highlight Internet Protocol (TCP/IP) and click on the Properties button. S S t t e e p p 4 4 : : Select the U[...]

  • Seite 24

    S S t t e e p p 5 5 : : Click on the OK button to close all w i ndow s. S S t t e e p p 6 6 : : To verify that the IP address has been c orrectly assigned to your PC, go to the Start menu, Accessories , select Command Prompt , and type the command: ipconfig/all PC is now setup with a p roper IP address to communicate with the a ccess point.[...]

  • Seite 25

    Access the W eb Interface Access with uConfig The UConfig utility provides dire ct access to the web interface. S S t t e e p p 1 1 : : Insert the Product C D into your CD-ROM drive, the C D will autorun. S S t t e e p p 2 2 : : From the U U t t i i l l i i t t i i e e s s section, select to install the u u C C o o n n f f i i g g utility t o your [...]

  • Seite 26

    S S t t e e p p 4 4 : : Select the access point from th e products list and click on the O O p p e e n n W W e e b b button. To retrieve and disp lay the latest device(s) in the list, c lick on the R R e e f f r r e e s s h h button. S S t t e e p p 5 5 : : Do not exit the uConfig program while acce ssing the web-based interface as this will discon[...]

  • Seite 27

    S S t t e e p p 6 6 : : At the login prompt, enter the User Name and Password. The default are : User Name : admin Password : password S S t t e e p p 7 7 : : It then opens the device home page. The Status page.[...]

  • Seite 28

    A ccess with a W eb Browser S S t t e e p p 1 1 : : Launch your Web browser. e.g. MS Inte rnet Explorer, FireFox, Net scape, etc.. For MS IE, under the T T o o o o l l s s tab, select I I n n t t e e r r n n e e t t O O p p t t i i o o n n s s . S S t t e e p p 2 2 : : Open the C C o o n n n n e e c c t t i i o o n n s s tab and in the L L A A N N [...]

  • Seite 29

    S S t t e e p p 4 4 : : At the login prompt, enter the User Name and Password. The default are : User Name : admin Password : password It then opens the device home page. The Status page.[...]

  • Seite 30

    Navigation Main Menu Bar St a t u s : Page displays current status of the device and the sta tistical information. Basic Wir eless : Page contains the controls for a wireless network configuration, while covering basic wir eless settings which defi ne operating mode, as sociating details and data s ecurity options. Basic Network : Page covers the c[...]

  • Seite 31

    Basic Network T ab Click BASIC NETWORK from the menu bar to open the page as sh ow below . Network Modes: Bridging and Routing Network Mode: Select between Bri dge (default) and Router m ode. LAN Setup LAN Mode: St a t i c : (default) lets you enter a specific I P address for the device. Default IP address is 192.168.168.1 DHCP Client: when set let[...]

  • Seite 32

    Gateway: (optional) Enter the gatew ay IP address of the network t he device is connected. Primary DNS IP : (optional) Enter the primary DNS IP address nearest to the gateway router . Secondary DNS IP: (optional) Enter the secondary DNS IP addre ss nearest to the gateway router . DHCP Mode: None: function disabled DHCP Server: Check to enable. Devi[...]

  • Seite 33

    Basic W ir eless T ab Under the tab, there is th e selection of 4 radios. Fig 2.1 Basic W ireless T ab Currently device su pport only one 802.. 11 n radio card. Select RADIO 1 to c onfigure. Basic W ireless T ab contains all th e wireless setup, which is nec essary for the operator to setup th e wireless part of the li nk. Enable the radio Fig 2.2 [...]

  • Seite 34

    W ireless Mode There are 5 modes available. Access Point This mode can be connected to St a t i o n m ode, and then forwards all the traffic to the network devices connected to the Ethernet devices of the Station. Access Point WDS This mode can be connected to Station WDS mode. Using WDS protocol, it allows a client or station device to bridge wire[...]

  • Seite 35

    Access Point Parameters Settings Fig 2.3 Basic W ire less Settings (Access Point/ Access Point WDS) Local AP-ESSID This is the Service Set Identifier used to ide ntify the operator ’ s wireless LAN. It should be specified while operating in Acce ss Point or Access Point WDS m ode. All the client devices within its range will receive broadcast mes[...]

  • Seite 36

    Channel Spectrum W idth 20M represents the data transmitted at a ba ndwidth of 20MHz. 20/40MHz represents the data trans mitted at either 20MHz or 40MHz. In very noisy environment it automatically fall back to 20MHz to be more resilient to the interference. In situation when auto fall back did not happened, manually changing channel spectrum width [...]

  • Seite 37

    S tation Parameters Settings Fig 2.4 Basic W ireless Settings (Station/Station W DS) This options below are only available in S tation, S tation WDS and Repeater WDS modes unless otherwise stated. Wir eless Mode: Station Remote AP-ESSID This is the Service Set Identifier used by station to seek and connect to the access point of same the SSID ident[...]

  • Seite 38

    Channel Scan List Fig 2.5 Channel Scan List (In US Country Code) According to the availability of cha nnels in the country codes, the operator can select which channels to be scanned when scanni ng for an Access Point. Then the scanned channels will appear on the Site Survey . Wi rel e s s A d ap t e r m o de This option change device functi on lik[...]

  • Seite 39

    Wir eless Security All the wireless security sett ings are set under this section. The operation of the Keys is the s ame for ALL the W ireless modes. WP A or WP A2 Authentication Fig 2.7 WP A (Access Point/Access P oint WDS/Repeater WDS) WP A PSK PSK (Default) – WP A or WP A2 with Pre-shared Key method. Cipher T ype TKIP - T empo ral Key Integri[...]

  • Seite 40

    WP A + EAP Fig 2.8 WP A + EAP E A P – WP A or WP A2 with EAP (Extensible Authentication Protocol) Firm ware supported options for clients are: EAP-TLS, EAP-TTLS, PEAP Cipher T ype T K I P - T emporal Key Integrity Protoc ol which uses RC4 encryp tion algorithm. A E S - Advanced Encryption S tandard (AES) algorithm. AUTO (Default) – Automaticall[...]

  • Seite 41

    WP A + EAP_TLS, WP A-TTLS, WP A-PEAP Fig 2.8 WP A (Station /S tation WDS/Repeater WDS) This apply to the fo llowing modes only , when WP A or WP A2 , with EAP is selected. S tation, S tation WDS, Repeater WDS mode. Identity Identification credential used by th e wpa- supplicant for EAP authentication. User Name: Identification crede ntial used by t[...]

  • Seite 42

    IEEE802.1x Settings The operation of the Keys is the same for ALL the m odes. Fig. 2.8 IEEE802.1X (Access Point/A ccess Point WDS/ Repeater WDS) This option apply to the following m odes only , when WP A EAP or IEEE802.1x . Access Point, Access Point WDS, Repeater WDS modes. Primary Radius Server IP Enter the Primary Radius Server IP that Access Po[...]

  • Seite 43

    WEP Fig 2.6 WE P The operation of the Keys is the s ame for ALL the m odes. ** Note: Operating with WEP security will lower t he performance significantly with 802.1 1n radio. Not recommended for Access Point and Access Point WDS m o d e o p e r a t i o n . M a y u s e W E P ONL Y when connecting with standard 1 1 and 54Mbps (legacy) 802.1 1a/b/g b[...]

  • Seite 44

    V irtual Access Point (V AP) V irtual AP (V AP) implem ents mSSID (Multi-SSID) whereby a single wireless card can be setup with up to 3 virtual SSID of BSSID connections. Each V AP can be set with di fferent security authentication m ode. Fig 2.1 1 V irtual AP (Only A vailable in Access Point/ Access Point WDS Mode) All V APs are created from the s[...]

  • Seite 45

    Advance W ir eless T ab Click Advanced Wir eless tab from menu and select RADIO 1 to open the page below . Long Range Parameters Setup Advanced wirel e ss page let you setup outd oor long distant connection p arameters. Long Range Parameters: Check to enable parameters. Beacon Interval: (default is 100 ms) Define the time interv al (in millisecond)[...]

  • Seite 46

    Noise Immunity: Check to enable. W hen enabled, it autom atically adjusts the signal/noise le vel for best performance. In low noise environment it is recommended to turn of f this function. Signal S trength Indicator (RSSI): The default values are LED1-Red (10) , LED2-Y ellow (20), LED3-Green (40) Each LEDs when turn o n indicates the RSSI signal [...]

  • Seite 47

    Advanced Network T ab Click Advanced Network tab from menu to open the page below . *Note: This tab will not ope n when in device is in Bridge n ode. T o open page, first enabled R outer mode in Basic Network Figure 1[...]

  • Seite 48

    Spanning T ree Setup Spanning T ree Protocol: Default is disabled . Check on box to enable. Root Priority: Default value is 32768. Smaller value has higher priority . Root Hello T ime: Default time is 2 sec onds. Root Forward Delay: D efault is 15 seconds Root Maximum Age: Default is 20 seconds Changing to lower time can caused hig h overheads to t[...]

  • Seite 49

    Adding an entry fr om Custom Serv er Entry from Custom Server box l ets you enter the other port num ber service for an applica tion and new applications. Custom Server also lets you ente r a different publi c and private port service Server T ype: Enter a brief name for the appli cation. This info helps you track the application for tha t port num[...]

  • Seite 50

    Bandwidth Contr ol Bandwidth Control: Default is dis ab led . Chec k on bo x to ena bl e . This control let us er set a max limited bandwi dth to router . This function let use share one high s peed broadband line w ith several routers each limited to a m axim um limited by its bandwidth control. Download T otal Rate(kbit) enter the max ba ndwidth [...]

  • Seite 51

    Fir ewall Setup Firew all Setup: Default is disabled. Check on box to ena ble . For configuration refer t o Appendix section. Comment: enter a brief name for the service. Policy: select Accept or Deny for the apply rule IP T ype: select ICMP , TC P , and UDP pa cket type to check Source IP/Mask: enter the source IP address and Netmask Is the sou rc[...]

  • Seite 52

    Outbound Filtering Setup Filtering Setup: Default is disabled. Ch eck on box to ena ble . For configurat ion refer to Append ix sect ion. DNS Redirection: Defaul t is enabled. Check on box to disable. When enabled, router d evice will act as DNS proxy . PC connected to this router device to set their T CPIP DNS IP to router ’ s IP address. PC can[...]

  • Seite 53

    UPNP: Default is disa bled. Check on box to enabled. When enabled, cli ent PC running Microsoft UP nP serv ices can automaticall y open certain specific port required by the PC application in the router . For security reason this service sho uld not be open. Recommend to se tup manually open al l port service through Port Forwardin g s e r v i c e [...]

  • Seite 54

    Services T ab Click Services tab from menu to open the page below . Services section provides varieties of useful and enhanced functions to help assist device operations.[...]

  • Seite 55

    Ping W atchdog Enable Ping W atchdog: Default is disabled. Check on box to enable. IP Address T o Ping: T arget IP address do ping test m onitor . Ping Interval: Default is 5 sec onds (minimum). This is Ping test duration. S tartup Delay: Default is 60 seconds(m inimum). One time delay after device startup. Failed Count T o Reboot: Default is 5. Th[...]

  • Seite 56

    SNMP Setup Enable SNMP: Default is dis abled. Check on box t o enable. Read Only Password: Password to query devic e. Engine ID: Default is Enable SNMP T rap: Default is disabl ed. Check on box to e nable. T rap Destination IP: Enter the IP to send the info when tr ap is triggered. Community: Enter the SNMP community string. NTP Setup Enable NTP Cl[...]

  • Seite 57

    T elnet Access Setup Enable T elnet Server: Default is enabled. Remove check on box t o disable. Server Port: Default is 23. Enter new preferred port number . SSH Access Setup Enable SSH Server: Default is dis abled. Check on bo x to enable. Server Port: Default is 22. Enter new preferred port number . System Log Setup Enable System Logging: Defaul[...]

  • Seite 58

    System T ab The System Page co ntains Administrative options . This page enables adm inistrator to customize, reboot the devic e, set it to factory defaults, u pload a new firmware, ba ckup or update the configuration and configure adm inistrator’ s credentials. Firmware Upgrade Use this section to fin d out current software version and update th[...]

  • Seite 59

    Host Name Host Name is the syst em wide devic e identifier . It is report ed by SNMP Agen t to authoriz ed management stations. Host Name will be represented in popular Router Operating Systems registration screens a nd discovery tools. Host Name: specifies the system identity . Change button saves the Host Nam e if activated. Administrative and Re[...]

  • Seite 60

    Configuration Management Backup Configuration: click Dow nload button to ex port the current configurati on to a file. Upload Configuration: click Browse bu tton to navigate to a nd select the new configurat ion file or specify the full path to the configuratio n file location. Activating the Uplo ad button will transfer new configur ation file to [...]

  • Seite 61

    S tatus Page The S tatus Page displays a summary of link stat us information, current va lues of basic configuration settings (depending o n operating mode), netw ork settings and traf fic statistics of al l the interfaces. S tatus Reporting Main Uptime: displays device up ti me since boot up. The time is expressed in days, hours, minutes a n d s e[...]

  • Seite 62

    LAN Setting LAN MAC: displays the MAC addr ess of the device LAN (Ethernet) in terface. LAN Mode: displays the mode used, eith er static or DHCP client. LAN IP Address: displays the current IP address of the LAN (Ethernet) in terface. LAN Gateway IP Address: displays t he IP address of the gateway us ed in LAN. LAN Pri. DNS IP: displays the Primary[...]

  • Seite 63

    S tation Connection S tatus Info Click at the b ottom of the S tatus page to view clie nt connection statistics. WLAN Connected S tatus: MAC Address: disp lays the MAC address of the current active WLAN card. Signal S trength: displays the received wir eless signal level of opposite connected devi ce. TX Rate and RX Rate: displays the current 802.1[...]

  • Seite 64

    Rx Invalid Crypt value represents the number of tran smitted and r eceived packets which were encrypted with the wrong encryption key and fail ed the decryption routin es. It can be used to detect invalid wireless security settings an d encryption break attem pts. Rx Invalid Frag value represents the num ber of packets missed during transm ission a[...]

  • Seite 65

    Appendix I - Network This section provi des more detailed expla nation on the networ k operation modes in gen eral. The Network Page a llows the administrator to se tup bridge or routing f unctionality . Device can operate i n bridge or router mode. The IP configuration as descri bed below is required for device managem ent purposes. IP addresses c[...]

  • Seite 66

    Bridge IP Address : The device can be set for static IP or can be set to obta in an IP address from the DHCP server it is connected to. One of the IP assignment modes m ust be selected: DHCP : choose this option to assign the dynamic IP address, Gateway and DNS address by the local DHCP server . ST A TIC : choose this option to assign t he static I[...]

  • Seite 67

    Spanning T ree Protocol: Multiple interconnected bridges create lar ger networks using the IEEE 802.1d Spanning T ree Protocol (STP), which is used for find ing the shortest path wi thin network and to elim inate loops from the topology . If the STP is turned on, the Bridge device will comm unicate with other network devi ces by sending and re ceiv[...]

  • Seite 68

    Appendix II – W ir eless with Router Mode This section provi des more details on wireless with rout er function. The role of the LAN and WLAN interf ace will change accordingly to the W ireless Mode while the device is operating in Router mode: • Wireless interface and al l the w irel e ss clients con nected are considered as the i nternal LAN [...]

  • Seite 69

    Gateway IP: This is the IP address of the host router which resides on t he external network and provides the point of connection to the ne xt hop towards the interne t. This can be a DSL m odem, Cable modem, or a WISP gateway router . The device will direct all the pac kets to the gateway if the destinat ion host is not within th e local network. [...]

  • Seite 70

    Port Forwarding Settings Port Forwarding : Port forwarding allows specific ports of the hosts residing in the internal network to be forw arded to the external netw ork. This is useful for num ber of applications such as FTP servers, gaming, etc. where differ en t host systems need to be seen using a single common IP address/port. Port Forwarding r[...]

  • Seite 71

    Bridge mode Firewall Configuration Settings Firewall functionality on a ny router interface can be enabled using the "Enable Fi rewall" option. Router Firewall rules ca n be configured, enabled or disabled while using Firewall configuration window which is op ened with the "Conf igure" button. Firewall entries can be spec ified [...]

  • Seite 72

    Enable DMZ: The Dem ilitarized zone (DMZ) can be enabled and used as a place where services can be placed such as W eb Servers, Proxy Servers, and E-mail Servers such that these services can still serve the loc al network and are at the sam e time isolated from it for additional security . DMZ is commonly used with t he NA T functionality as an alt[...]

  • Seite 73

    Appendix III- Advanced Settings This section prov ides more detail e xplanation on adva nced setting for routing a nd wireless settings. The Advanced o ptions page allows y ou to manage advance d settings that influenc e on the device performance and behavior . The advanced wireless settings are dedi cated for more technically advanced users who h [...]

  • Seite 74

    Fragmentation Thr eshold: specifies the maximum size for a pa cket before data is fragmented into multiple packets. The range is 256- 2346 bytes, or word “of f”. Setting the Fragmentati on Threshold too low m ay result in poor network p erformance. The use of fragmentation can increase the reliabil ity of fram e transmissions. Becau se of sendi[...]

  • Seite 75

    Signal S tr ength LED Settings LED Thresholds Configuration The LED's for signal strength on the device c an be made to ligh t on when received sign al levels reach the values defined i n the fo llowing fields. This allows a t echnician to easily deploy a CPE without logging into the unit (i.e. for ant enna alignment op eration). Signal LED Th[...]

  • Seite 76

    Appendix IV - Services This section provi des more details on the sy stem management service s. Ping W atchDog The ping wat chdog sets the device to continuously pi ng a user defined IP address (it can be the internet gateway for example). If it is unable to ping under the user d efined constraints, the de vice will automatically reboot. This optio[...]

  • Seite 77

    NTP Client, W eb, T elnet, SSH Server NTP Client: The Network T ime Protocol (NTP) is a protocol for synchronizing the cl ocks of computer system s over packet-switched, variable- latency data networks. It can be used to set the device system tim e. System T ime is reported next to the every System Log entry while registering system events if Log o[...]