Vai alla pagina of
Un buon manuale d’uso
Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso X-Micro Tech. XWL-11GRTX. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica X-Micro Tech. XWL-11GRTX o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.
Che cosa è il manuale d’uso?
La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso X-Micro Tech. XWL-11GRTX descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.
Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.
Quindi cosa dovrebbe contenere il manuale perfetto?
Innanzitutto, il manuale d’uso X-Micro Tech. XWL-11GRTX dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo X-Micro Tech. XWL-11GRTX
- nome del fabbricante e anno di fabbricazione X-Micro Tech. XWL-11GRTX
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature X-Micro Tech. XWL-11GRTX
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti
Perché non leggiamo i manuali d’uso?
Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio X-Micro Tech. XWL-11GRTX non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti X-Micro Tech. XWL-11GRTX e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio X-Micro Tech. in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche X-Micro Tech. XWL-11GRTX, come nel caso della versione cartacea.
Perché leggere il manuale d’uso?
Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo X-Micro Tech. XWL-11GRTX, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.
Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso X-Micro Tech. XWL-11GRTX. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.
Sommario del manuale d’uso
-
Pagina 1
V 1.0 WLAN 1 1g Broadband Router User Manual[...]
-
Pagina 2
This product is in compliance with the essential requirement s and other relevant provisions of th e R&TTE directive 1999/5/EC. MAX. OUT POWER COUNTR Y CHANNELS INDOOR OUTDOOR Spai n 2400-2483.5 MHz 1-13 < 100 mW EIRP < 100 mW EIRP France 2400-2454 MHz 1-8 < 100 mW EIRP < 100 mW EIRP France 2454-2483.5 MHz 9-13 < 100 mW EIRP <[...]
-
Pagina 3
Federal Communications Commission (FCC) St atement This equipment has been tested and found to comply with the limit s for a Class B digital device, pursuant to part 15 of the FCC rules. These limit s are designed to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses and can rad[...]
-
Pagina 4
Copyright Copyright 2007 by X-Micro Te chnology Corp., All rights reserved . No part of this publication may be reproduced, tr ansmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, me chanical, magnetic, optical, chemical, manual or otherwise, without the[...]
-
Pagina 5
i T able of Content s TERMINOLOGY ............................................................................................................................... I 1 INTRODUCTION ..................................................................................................................... 1 1.1 P AC K AGE C ONT ENTS .........................[...]
-
Pagina 6
ii 3.3.1 1 W AN Interface Setup ............................................................................................ 25 I S tatic IP ....................................................................................................................... 26 II DHCP Client .......................................................................[...]
-
Pagina 7
iii 4.13 W HA T IS P REAMBLE T YPE ? .............................................................................................. 57 4.14 W HA T IS SSID B ROADCAST ? ........................................................................................... 57 4.15 W HA T IS W I -F I P ROTECTED A CCESS (WP A)? ....................................[...]
-
Pagina 8
i T erminology 3DES T riple Data Encryption S tandard AES Advanced Encryption S tandard ANSI American Nationa l S tandards Institute AP Access Point CCK Complementary Code Keying CSMA/CA Carrier Sense Multiple Access/ Collision Avoidance CSMA/CD Carrier Sense Multiple Access/ Collision Detection DDNS Dynamic Domain Name Server DH Diffie-Hellman Alg[...]
-
Pagina 9
ii VPN V irtual Private Network WDS Wireless Distribution System WEP Wired Equivalent Privacy WLAN Wireless Local Area Network WP A Wi-Fi Protected Access[...]
-
Pagina 10
1 1 Introduction The X-Micro Wireless LAN Broadband Router is an affordable IEEE 802.1 1b/g wireless LAN broadband router solution; setting SO HO and enterprise standard for high performance, secure, m anageable and reliable WLAN. This document describes the steps required for the initial IP address assign and other WLAN router configuration. The d[...]
-
Pagina 11
2 1.3 Product Features Generic Router ¾ Complies with IEEE 802.1 1b/g st andard for 2.4GHz Wireless LAN. ¾ Support s multi-operation (bridge/gat eway/WISP) modes between wireless and wired Ethernet interfaces. ¾ Support s 64-bit and 128-bit WEP , WP A, WP A2 encryption/decryption function to protect the wir eless data transmission. ¾ Support s [...]
-
Pagina 12
3 1.4 Panel Description LED Indicator St ate Description 1. Power LED On The X-Micro WLAN 1 1g Broadband Router is powered on. Off The X-Micro WLAN 1 1g Broadband Router is powered off. 2. WLAN LED Flashing Data is transmitting or receiving on the antenna. Off No data is transmitting or receiving on the antenna. 3. W AN LED ACT Flashing Data is tra[...]
-
Pagina 13
4 Interfaces Description 1. Antenna The Wireless LAN Antenna. 2. W AN The RJ-45 socket allows W AN connection through a Category 5 cable. Suppor t auto-sensing on 10/100M speed and half/ full duplex; comply with IEEE 802.3/ 802.3u respectively . 3. LAN The RJ-45 sockets allow LAN connection through Category 5 cables. Support auto-sensing on 10/100M[...]
-
Pagina 14
5 2 Installation 2.1 Hardware Installati on S tep 1: Place the Wireless LAN Br oad band Router to the best optimum transmission location. The best transmi ssion location for your X-Micro WLAN 1 1g Broadband Router is usually at the geographic center of your wireless network, with li ne of sign to all of your mobile stations. S tep 2: Connect the X-[...]
-
Pagina 15
6 3 Software configuration There are web based management and configur ation functions allowing you to have the jobs done easily . The X-Micro WLAN 1 1g Broadband Router is delivered with t he following factory default parameters on the Ethernet LAN interfaces. Default IP Address : 192.168.1.254 Default IP subnet mask : 255.255.255.0 WEB login User[...]
-
Pagina 16
7 2. Move mouse and double-click the right button on Network and Dial-up Connections icon. Move mouse and double-click the Local Area Connection icon. The Local Area Connection windo w will appear . Click Properties button in the Local Area Connection wind ow . 3. Check the installed list of Network Components . If TCP/IP is not installed, click th[...]
-
Pagina 17
8 on the URL to connect the X-Micro WLAN 1 1g Broadband Router . 3.3 Management and configuration on the X-Micro WLAN 1 1g Broadband Router 3.3.1 S tatus This page shows the current st atus and some basic settings of the device, includes system, wireless, Ether net LAN and W AN configuration information. Screen snapshot – S t atus Item Descriptio[...]
-
Pagina 18
9 System Uptime It shows the duration sinc e X-Micro WLAN 1 1g Broadband Router is powered on. Firmware version It shows the firmware version of X-Micro WLAN 1 1g Br oadband Router . Wireless configuration Mode It shows wireless operation mode Band It shows the current wireless operating frequency . SSID It shows the SSID of this X-Micro WLAN 1 1g [...]
-
Pagina 19
10 DNS1/DNS2/DNS3 It shows the DNS server information. MAC Address It shows the MAC address of W AN interface of X-Micro WLAN 1 1g Broadband Router . 3.3.2 Setup Wizard This page guides you to configure wir eless broadband router for fi rst time Screen snapshot – Setup Wizard I Operation Mode This page followed by Setup Wiza rd page to define the[...]
-
Pagina 20
11 II T ime Zone Setting This page is used to enable and configure NTP client Screen snapshot – T ime Zone Settings III LAN Interface Setup This page is used to configure local area network IP address and subnet mask Screen snapshot – LAN Interface Setup[...]
-
Pagina 21
12 IV W AN Interface Setup This page is used to configure W AN access type Screen snapshot – W AN Interface Setup V Wireless Basic Settings This page is used to configure ba sic wireless parameters like Band, Mode, Network T ype SSID, Channel Number , Enable Mac Clone(Single Ethernet Client) Screen snapshot – Wireless Basic Settings[...]
-
Pagina 22
13 VI Wireless Security Setup This page is used to configure wireless security Screen snapshot – Wireless Security Setup 3.3.3 Operation Mode This page is used to configure which mode wireless broadband router acts Screen snapshot – Operation Mode Item Description Gateway T raditional gateway configuration. It always connects internet via ADSL/[...]
-
Pagina 23
14 Bridge Each interface (LAN, W AN and Wireless) regards as bridge. NA T , Firewall and all rout er ’s functions are not supported Wireless ISP Switch Wireless interface to WA N port and all Ethernet ports in bridge mode. Wireless interface can do all router ’s functions Apply Changes Click the Apply Changes button to complete the new configur[...]
-
Pagina 24
15 Item Description Disable Wireless LAN Interface Click on to disable the wireless LAN data transmission. Band Click to select 2.4GHz(B) / 2.4GHz(G) / 2.4GHz(B+G) Mode Click to select the WL AN AP / Client / WDS / AP+WDS wireless mode. Site Survey The Site Survey button provides tool to scan the wireless network. If any Access Point or IBSS is fou[...]
-
Pagina 25
16 Screen snapshot – Wireless Advanced Settings Item Description Authentication T ype Click to select the authentication type in Open System , Shared Key or Auto selection. Fragment Threshold Set the data p acket fragmentation threshold, value can be written between 256 and 2346 bytes. Refer to 4.10 What is Fragment Threshold? R TS Threshold Set [...]
-
Pagina 26
17 transmission. Refer to 4.13 What is Preamble T ype? Broadcast SSID Click to enable or disable the SSID broadcast function. Refer to 4.14 What is SSID Broadcast? IAPP Click to enable or disable the IAPP function. Refer to 4.20 What is Inter-Access Point Protocol(IAPP)? 802.1 1g Protection Protect 802.1 1b user . RF Output Power T o adjust transmi[...]
-
Pagina 27
18 Item Description Encryption Select the encry ption supported over wireless access. The encryption method can be None, WEP , WP A(TKIP), WP A2 or WP A2 Mixed Refer to 4.9 What is WEP? 4.15 What is Wi-Fi Protected Access (WP A)? 4.16 What is WP A2(AES)? 4.17 What is 802.1X Authentication? 4.18 What is T emporal Key Integrity Protocol (TKIP)? 4.19 [...]
-
Pagina 28
19 I WEP Key Setup Screen snapshot – WEP Key Setup Item Description Key Length Select the WEP shared secret key length from pull-down menu. The l ength can be chose between 64-bit and 128-bit (known as “WEP2”) keys. The WEP key is composed of initialization vector (24 bits) and secret key (40-bit or 104-bit). Key Format Select the WEP shared [...]
-
Pagina 29
20 Length Format 64-bit 128-bit A SCII 5 characters 13 characters HEX 10 hexadecimal codes 26 hexadecimal codes 3.3.7 Wireless - Access Control If you enable wireless access control, only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point. When this option is enabled, no wirele ss [...]
-
Pagina 30
21 Reset Click the Reset button to abort change and recover the previous configuration setting. Current Access Control List It shows the registered clients that are allowed to link to this X-Micro WLAN 1 1g Broadband Router . Delete Selected Click to delete the selected clients that will be access right removed from this X-Micro WLAN 1 1g Broadband[...]
-
Pagina 31
22 Comment Fill in the comment tag for the registered AP . Apply Changes Click the Apply Changes button to register the AP to new configuration setting. Reset Click the Reset button to abort change and recover the previous configuration setting. Set Security Click button to configure wireless security like WEP(64bits), WEP(128b its), WP A(TKIP), WP[...]
-
Pagina 32
23 Screen snapshot – WDS AP T able Item Description MAC Address It shows the MAC Address within WDS. Tx Packets It shows the statistic count of sent p ackets on the wireless LAN interface. Tx Errors It shows the statistic count of error sent packets on the Wireless LAN interface. Rx Packets It shows the statistic count of received p ackets on the[...]
-
Pagina 33
24 Item Description SSID It shows the SSID of AP . BSSID It shows BSSID of AP . Channel It show the current channel of AP occupied. T ype It show which type AP act s. Encrypt It shows the encryption status. Signal It shows the power level of current AP . Select Click to select AP or client you’d like to connect. Refresh Click the Refresh button t[...]
-
Pagina 34
25 Subnet Mask Fill in the subnet mask of LAN interfaces of this WLAN Access Point. Default Gateway Fill in the default gateway for LAN interfaces out going data p ackets. DHCP Click to select Disabled , Client or Server in different operation mode of wireless Access Point. DHCP Client Range Fill in the start IP address and end IP address to alloca[...]
-
Pagina 35
26 I S tatic IP Screen snapshot – W AN Interface Setup – S tatic IP Item Description S tatic IP Click to select S tatic IP support on W AN interface. There are IP address, subnet mask and default gateway settings need to be done. IP Address If you select the S tatic IP support on W AN interface, fill in the IP address for it. Subnet Mask If you[...]
-
Pagina 36
27 Enable Web Server Access on W AN Click the checkbox to enable web configuration from W AN side. Enable W AN Echo Reply Click the checkbox to enable W AN ICMP response. Enable IPsec pass through on VPN connection Click the checkbox to enable IPSec packet p ass through Enable PPTP pass through on VPN connection Click the checkbox to enable PPTP pa[...]
-
Pagina 37
28 server . Host Name Fill in the host name of Host Name. The default value is empty MTU Size Fill in the mtu size of MTU Size. The default value is 1400 Attain DNS Automatically Click to select getting DNS address for DHCP support. Please select Set DNS Manually if the DHCP support is selected. Set DNS Manually Click to select getting DNS address [...]
-
Pagina 38
29 III PPPoE Screen snapshot – W AN Interface Setup – PPPoE Item Description PPPoE Click to select PPPoE support on W AN interface. There are user name, password, connection type and idle time settings need to be done. User Name If you select the PPPoE support on W AN interface, fill in the user name and password to login the PPPoE server . Pas[...]
-
Pagina 39
30 setup the connection through PPPoE protocol whenever you send the data p acket s out through the W AN interface; there are a watchdog implemented to close the PPPoE connection while there are no data sent out longer than the idle time set. Manual connection type means to setup the connection through the PPPoE protocol by clicking the Connect but[...]
-
Pagina 40
31 IV PPTP Screen snapshot – W AN Interface Setup – PPTP Item Description PPTP A llow user to make a tunnel wi th remote site directly to secure the data transmission among the connection. User can use embedded PPTP client supported by this router to make a VPN connection. IP Address If you select the PPTP support on W AN interface, fill in the[...]
-
Pagina 41
32 Encryption encryption. Attain DNS Automatically Click to select getting DNS address for PPTP support. Please select Set DNS Manually if the PPTP support is selected. Set DNS Manually Click to select getting DNS address for PPTP support. DNS 1 Fill in the IP address of Domain Name Server 1. DNS 2 Fill in the IP address of Domain Name Server 2. DN[...]
-
Pagina 42
33 Screen snapshot – Firewall - Port Filtering Item Description Enable Port Filtering Click to enable t he port filtering security function. Port Range Protocol Comments T o restrict dat a transmission from the local network on certain port s, fill in t he range of start-port and end-port, and the protocol, also put your comments on it. The Proto[...]
-
Pagina 43
34 Screen snapshot – Firewall - IP Filtering Item Description Enable IP Filtering Click to enable t he IP filtering security function. Local IP Address Protocol Comments T o restrict dat a transmission from local network on certain IP addresses, fill in the IP address and the protocol, also put your comments on it. The Protocol can be TCP , UDP o[...]
-
Pagina 44
35 Screen snapshot – Firewall - MA C Filtering Item Description Enable MAC Filtering Click to enable t he MAC filtering security function. MAC Address Comments T o restrict data transmission from local network on certain MAC addresses, fill in the MAC address and your comments on it. Comments let you know about whys to restrict data from the MAC [...]
-
Pagina 45
36 Screen snapshot – Firewall - Port Forwarding Item Description Enable Port Forwarding Click to enable the Port Forwarding security function. IP Address Protocol Port Range Comment T o forward dat a packets coming from W AN to a specific IP address that hosted in local network behind the NA T firewall, fill in the IP address, protocol, port rang[...]
-
Pagina 46
37 3.3.16 Firewall – URL Filtering URL Filtering is used to restrict users to access specific websites in internet. Screen snapshot – Firewall – URL Filtering Item Description Enable URL Filtering Click to en able the URL Filtering function. URL Address Add one URL address. Apply Changes Click the Apply Changes button to save settings. Reset [...]
-
Pagina 47
38 Screen snapshot – Firewall - DMZ Item Description Enable DMZ Click to enable the DMZ function. DMZ Host IP Address T o support DMZ in your firewall design, fill in the IP address of DMZ host that can be access from the W AN interface. Apply Changes Click the Apply Changes button to register the IP address of DMZ host. Reset Click the Reset but[...]
-
Pagina 48
39 Screen snapshot – VPN Setup Item Description Enable IPSEC VPN Click to enable IPSEC VPN function. Refer to 4.27 What is VPN ? and 4.28 What is IPSEC ? Enable NA T T raversal Click to enable NA T T raversal function. Generate RSA Key Click to generate RSA key . Show RSA Public Key Click to show RSA public key that we generate. Apply Changes Cli[...]
-
Pagina 49
40 I VPN Setup - Edit T unnel Screen snapshot – VPN Setup-Edit-1 Item Description Enable T unnel # Click to enable the IPSEC VPN current tunnel. Connection Name Assign the connection name tag. Auth T ype Click to select PSK or RSA . Local Site Local IP Address/Network Local Subnet Mask Click to select Single Address or Subnet Address VPN connecti[...]
-
Pagina 50
41 Screen snapshot – VPN Setup-Edit-2 Item Description Key Management Click to select IKE or Manual mode. Advanced Click Advanced button to configure more IKE settings. Connection T ype Click to select Initiator or Responder mode. Connect Click to connect manually . [Responder mode only] Disconnect Click to disconnect manually . [Responder mode o[...]
-
Pagina 51
42 II Advanced IKE Setup Screen snapshot – Advanced VPN Settings for IKE Item Description Phase 1 Negotiation Mode Main mode. Encryption Algorithm Click to select 3DES or AES128 encryption. Authentication Algorithm Click to select MD5 or SHA1 authentication. Key Group Click to select DH1(modp768) , DH2(modp1024) or DH5(modp1536) key group. Defaul[...]
-
Pagina 52
43 Key Life T ime Fill in the key life time value by seconds. Encapsulation T unnel mode. Perfect Forward Secrecy (PFS) Click to select ON or NONE . Ok Click the Ok button to save current tunnel settings. Cancel Click the Cancel button to close current window without any changes. 3.3.19 Management - S tatistics This page shows the p acket counter s[...]
-
Pagina 53
44 3.3.20 Management - DDNS This page is used to configure Dynam ic DNS service to have DNS with dynamic IP address. Screen snapshot – Management – DDNS Item Description Enable DDNS Click the checkbox to enable DDNS service. Refer to 4.25 What is DDNS? Service Provider Click the drop down menu to pickup the right provider . Domain Name T o conf[...]
-
Pagina 54
45 Screen snapshot – Management – T ime Zone Settings Item Description Current T ime It shows the current time. T ime Zone Select Click the time zone in your country . Enable NTP client update Click the checkbox to enable NTP client update. Refer to 4.26 What is NTP Client? NTP Server Click select default or input NTP server IP address. Apply C[...]
-
Pagina 55
46 Screen snapshot – Management – Denial-of-Service Item Description Enable DoS Prevention Click the checkbox to enable DoS prevention. Whole System Flood / Per-Source IP Flood… Enable and setup prevention in details. Select ALL Click the checkbox to enable all prevention items. Clear ALL Click the checkbox to disable all prevention items. Ap[...]
-
Pagina 56
47 Screen snapshot – Management – Log Item Description Enable Log System all Wirelessy DoS Click the checkbox to enable log. Show all log of wir eless broadband router Only show wireless log Only show Denial-of-Service log Enable Remote Log Log Server IP Address Click the checkbox to enable remote log service. Input the remote log IP address Ap[...]
-
Pagina 57
48 Screen snapshot – Management - Upgrade Firmware Item Description Select File Click the Browse button to select the new version of web firmware image file. Upload Click the Upload button to update the selected web firmware image to the X-Micro WLAN 1 1g Broadband Router . Reset Click the Reset button to abort change and recover the previous con[...]
-
Pagina 58
49 Default parameter to factory d efaults. 3.3.26 Management - Password Setup This page is used to set the account to access the web server of Access Point. Empty user name and passwor d will disable the protection. + Screen snapshot – Management - Password Setup Item Description User Name Fill in the user name for web management login control. N[...]
-
Pagina 59
50 Screen snapshot – Management – W atchDog Settiing Item Description Enable W atchDog Click to enable watchdog. W atchDog IP Address IP address that is referred. Ping Interval Fill in the value by seconds. Ping Fail to reboot Count Fill in the value that is the threshold to reboot router when ping fails. Apply Changes Click the Apply Changes b[...]
-
Pagina 60
51 Screen snapshot – Management – Qaulity of Service Item Description Enable QoS Click to enable QoS. ISP Bandwidth Download Fill in the value that is the download stream from ISP by KB/s. Upload Fill in the value that is the upload stream from ISP by KB/s. Undef IP Bandwidth Download Define the download bandw idth that is not defined. Upload D[...]
-
Pagina 61
52 Piority Click to pick High , Medium or Low Apply Changes Click the Apply Changes button to complete the new configuration setting. It is added into Current Bandwid th Control T able . Reset Click the Reset button to abort change and recover the previous configuration setting. Delete Selected Click to delete the selected ip addresses that will be[...]
-
Pagina 62
53 4 Frequently Asked Questions (F AQ) 4.1 What and how to find my PC’ s IP and MAC address? IP address is the identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol r oute messages based on the IP address of the destination. The format of an IP addr ess is a 32-bit numeric address written as four numbers sepa[...]
-
Pagina 63
54 Example 1: wireless Infrastructure Mode Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.1 1 wireless stations that communicate directly with one another without using an access point or any connection to a wired network. This mode is useful for quickly and easily setting up a wirele[...]
-
Pagina 64
55 ¾ Electrical devices: microwaves, monitors and electrical motors. Solutions to overcome the interferences: 9 Minimizing the number of walls and ceilings. 9 Position the WLAN antenna for best reception. 9 Keep WLAN devices away from other electrical devices, eg: microwaves, monitors, electric motors, … etc. 9 Add additional WLAN Access Points [...]
-
Pagina 65
56 to low fragment overhead. Hence there is a trade-off between sp atial re-use and fragment overhead. Fragment threshold is the maximum packe t size used for fragment ation. Packet s larger than the size programmed in this field will be fragmented. If you find that your corrupted packet s or asymmetric packet reception (all send packet s, for exam[...]
-
Pagina 66
57 buffered frames at the access point). 4.13 What is Preamble T ype? There are two preamble types defined in IEEE 802.1 1 specification. A long preamble basically gives the decoder more time to process the preamble. All 802.1 1 devices support a long preamble. The short preamble is designed to improve efficiency (for example, for V o IP systems). [...]
-
Pagina 67
58 amendment to the 802.1 1 st andard. 4.17 What is 802.1x Authentication? 802.1x is a framework fo r authenticated MAC-level a ccess control, defines Extensible Authentication Protoco l ( EAP) over LANs (WAPOL). The standard encapsulates and leverages much of EAP , which was defined for dial-up authentication with Point-to-Poi nt Protocol in RFC 2[...]
-
Pagina 68
59 devices regardless of media, opera ting system, programming language, and wired/wireless connection. 4.23 What is Maximum T ransmission Unit (MTU) Size? Maximum T ransmission Unit (MTU) indicat e s the network stack of any p acket is larger than this value wil l be fragmented before the tr ansmission. During the PPP negotiation, the peer of the [...]
-
Pagina 69
60 WMM adds prioritized capabilities to Wi-Fi networks and optimizes their performance when multiple concurring appl ications, each with different latency and throughput requirements, compete for network resources. By using WMM, end-user satisfaction is maintained in a wider variety of environment s and traffic conditions. WMM makes it possible for[...]
-
Pagina 70
61 5 Configuration Examples 5.1 Example One – PPPoE on the W AN Sales division of Company ABC likes to est ablish a WLAN network to support mobile communication on sales’ Not ebook PCs. MIS engineer collects information and plans the X-Micro WLAN 1 1g Broadband Router implement ation by the following configuration. WAN configuration: PPPoE User[...]
-
Pagina 71
62 Configure the W AN interface: Open W AN Interface Setup page, select PPPoE then enter the User Name “ H890123456” and Password “ PW192867543210 ”, the password is encrypted to display on the screen. Press button to confirm t he configuration setting. Configure the LAN interface: Open LAN Interface Setup page, enter the IP Address “ 192[...]
-
Pagina 72
63 Configure the WLAN interface: Open WLAN Interface Setup page, enter the SSID “ MyWL AN ”, Channel Number “ 11 ”. Press button to confirm t he configuration setting. 5.2 Example T wo – Fixed IP on the W AN Company ABC likes to establish a WLAN network to support mobile communication on all employees’ Notebook PCs. MIS engineer collect[...]
-
Pagina 73
64 Internet xDS L/ C M Power adapter Ethern et Cab le Ethernet cable SSID: MyW L AN Channel: 11 DHC P c lie nt SSID: MyWL AN Channel: 11 DHC P c lie nt SSID: MyWLA N Channel: 11 DHCP clie nt SSID: MyWLA N Channel: 11 DHCP c lie nt DHC P c lie nt Rout er mod e SSID: MyW LAN Channel: 11 DHCP range: 192.168.1.100 to 192.168.1.200 WAN IP: 192.168.2.254[...]
-
Pagina 74
65 Configure the W AN interface: Open W AN Interface Setup page, select Fixed IP then enter IP Address “ 192.168.2.254”, subnet mask “ 255.255.255.0 ”, Default gateway “ 192.168.2.10 ”. Press button to confirm t he configuration setting. Configure the LAN interface: Open LAN Interface Setup page, enter the IP Address “ 192.168.1.254 ?[...]
-
Pagina 75
66 Configure the WLAN interface: Open WLAN Interface Setup page, enter the SSID “ MyWLAN ”, Channel Number “1 1”. Press button to confirm t he configuration setting.[...]
-
Pagina 76
67 www .x-micro.com[...]