Go to page of
Similar user manuals
-
Network Router
Milan Technology MIL-GBIC-LX10
1 pages 0.19 mb -
Network Router
Milan Technology MIL-SFP-SX
1 pages 0.19 mb -
Network Router
Milan Technology MIL-GBIC-SX
1 pages 0.19 mb -
Network Router
Milan Technology MIL-SM24004TG
424 pages 3.78 mb -
Network Router
Milan Technology MIL-SFP-LX10
1 pages 0.19 mb -
Network Router
Milan Technology MIL-W2332G
70 pages 0.67 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Milan Technology MIL-W2332G, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Milan Technology MIL-W2332G one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Milan Technology MIL-W2332G. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Milan Technology MIL-W2332G should contain:
- informations concerning technical data of Milan Technology MIL-W2332G
- name of the manufacturer and a year of construction of the Milan Technology MIL-W2332G item
- rules of operation, control and maintenance of the Milan Technology MIL-W2332G item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Milan Technology MIL-W2332G alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Milan Technology MIL-W2332G, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Milan Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Milan Technology MIL-W2332G.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Milan Technology MIL-W2332G item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
MIL-W2332G Sh Air™ AccessG Pro Wireless Access Point/Bridge with PoE USER GUIDE[...]
-
Page 2
ii[...]
-
Page 3
i Regulatory Approval - FCC Class A - UL 1950 - CSA C22.2 No. 950 - EN60950 - CE - EN55022 Class A - EN55024 Canadian EMI Notice This Class A digital apparatus meets all the requirements of the Canadian Interference-Causing Equipm ent Regulation s. Cet appareil numerique de la classe A respecte toutes les ex igences du Reglement sur le ma teriel br[...]
-
Page 4
ii Federal Communication Commissi on Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reason able protec- tion against harmful interference in a residential installation. This equipment generates, uses an[...]
-
Page 5
iii R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EURO- PEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecom- munication terminal equipment and the mutual recognition of their conformity (R&TTE). The R&TTE Directive repeals and replaces in the directi[...]
-
Page 6
iv Table of Contents 1. Introduction 1.1. Overview 1.2. Features 1.3. LED Definitions 2. First-Time Installa tion and Configuration 2.1. Selecting a Power Supply Method 2.2. Mounting the AP on a Wall 2.3. Preparing for Configuration 2.3.1. Connecting the Managi ng Computer and the AP 2.3.2. Changing the TCP/IP Setti ngs of the Managing Computer 2.4[...]
-
Page 7
v 3.1.1. Menu Structure 3.1.2. Save, Save & Restar t, and Cancel Commands 3.1.3. Home and Refresh Commands 3.2. Viewing Status 3.2.1. Associated Wireless Clients 3.2.2. Current DHCP Mappings 3.2.3. System Log 3.2.4. Link Monitor 3.3. General Operations 3.3.1. Specifying Operational Mode 3.3.2. Changing Password 3.3.3. Managing Firmware 3.3.3.1.[...]
-
Page 8
vi 3.5.1.3. Association Control 3.5.1.4. AP Load Balancing 3.5.1.5. Wireless Di stribution System 3.5.2. Security 3.5.2.1. Basic 3.5.2.2. MAC-Address- Based Access Control 3.5.3. IEEE 802. 1x/RADIUS 3.6. Configuring Advanced Settings 3.6.1. Packet Filters 3.6.1.1. Ethernet Type Filters 3.6.1.2. IP Prot ocol Filters 3.6.1.3. TCP/UDP Port Filters 3.6[...]
-
Page 9
1 1. Introduction 1.1 Overview The MIL-W2332G Sh Air AccessG Pro Wireless Access Point/Bridge enabl es IEEE 802.11g or IEEE 802.11b client computers to access the resources on the Ethernet network. With the sleek Web-bas ed user interface and the included Sh Air Wireless Management Utility, a network administrator can easily and clearly manage the [...]
-
Page 10
2 IEEE 802.1x/RADIUS. When the AP is in AP/Bridge m ode, it can be configured to authenticate wireless users and distri bute encryption keys dynamically by IEEE 802.1x Port-Based Network Access Control and RADIUS (Remote Au- thentication Dial-In User Service). WPA (Wi-Fi Protected Access). The AP supports the WPA standard proposed by the Wi[...]
-
Page 11
3 high-gain antennas for different purposes. • DHCP client. The AP can automatically obtain an IP address from a DHCP server. • DHCP server. The AP can automatically assign IP addresses to computers or other devices by DHCP (Dynamic Host Configuration Protocol). Static DHCP mappings. The administrator can spec ify static IP address to MAC a[...]
-
Page 12
4 SNMP. SNMP (Simple Network Management Protocol) MIB I, MIB II, IEEE 802.1d, IEEE 802.1x, and Private En terprise MIB are supported. UpnP. The AP responds to UpnP discovery messages so that a Windows XP user can locate the AP in My Network Places and use a Web browser to config- ure it. Telnet. The user is enabled to manage the AP by T[...]
-
Page 13
5 2. First-Time Installation and Configuration 2.1 Selecting a Power Supply Method Optionally, the AP can be powered by the s upplied power adapter or PoE (Power over Ethernet). The AP autom atically selects the suitable one dependin g on your decision. To power the AP by the supplied pow er adapter: 1. Plug the power adapter to an AC socket. 2. Pl[...]
-
Page 14
6 Fig. 1. Mounting the AP on a wall. 2.3 Preparing for Configuration For you to configure an AP, a managing computer with a Web browser is needed. For first-time configuration of an AP, an Ethernet network inte rface card (NIC) should have been installed in the managing computer. For maintenance-c onfiguration of a deployed AP, either a wireless co[...]
-
Page 15
7 2.3.1 Connecting the Managing Computer and the AP To connect the Ethernet m anaging computer and the managed AP for first-time con- figuration, you have two choices as illustrated in Fig. 2. Mana ging Comp uter Normal Ethe rnet cable Sh Ai r Ac c es sG Pro AP Normal Ethernet cable Eth ernet Hub/Switch Cros s-o ve r Ethe rnet cable Fig. 2. Connect[...]
-
Page 16
8 2.4 Configuring the AP After the IP addressing issue is resolved, launch a Web browser on the managing computer. Then, go to “ http:// Error! Reference source not found.” to access the Web-based Network Manager Start page. TIP: For maintenance configuration of an AP, the AP can be reached by its host name using a Web browser. For example, if [...]
-
Page 17
9 Fig. 4. The S tart p age. 2.4.2 Step 1: Selecting an Operational Mode Fig. 5. Operational modes settings. Go to the General, Operational Mode section, select an ope rational mode and click Save at the bottom of this page, and then y ou are brought back to the start page. The AP supports 2 operational modes: • AP/Bridge. This mode provides both [...]
-
Page 18
10 • AP Client. This mode is for Dynamic LAN-to-LAN Bridging. The AP Client auto- matically establishes bridge lin ks with APs from any vendors. In either mode, the AP forwards packets between its Ethernet inte rface and wireless in- terface for wired hosts on the Ethernet side and wireless hos t(s) on the wireless side. There are 2 types of wire[...]
-
Page 19
11 2.4.3 Step 2: Configuring TCP/IP Settings Fig. 6. TCP/IP settings. Go to the TCP/IP, Addressing section to configure IP address settings. The IP address can be manually set or automatically assigned by a DHCP server on the LAN. If you are manually setting the IP address , Subnet mask , and Default gateway settings, set them appropriately, so tha[...]
-
Page 20
12 2.4.5 Step 4: Reviewing and Applying Settings Fig. 8. Settings changes are highlighted in red . On the start page, you can review all the settings you have made. Changes are high- lighted in red . If they are OK, click Restart to restart the AP for the new settings to take effect. NOTE: About 7 seconds are needed for the AP to complete its resta[...]
-
Page 21
13 2.5 Deploying the AP After the settings have been configured, deploy the AP to the field application environ- ment. Connect the AP to an Ethernet LAN through an Ethernet switch/hub. If you are configuring a pair of the APs for a dynamic or static bridging application and external high-gain directional antennas are used, it’s difficult to adjus[...]
-
Page 22
14 Fig. 10. Antenna alignment assistance. Instead of using PING.exe, you can run Wi reless Network Manager on Computer 1, and go to the Antenna Alignment tab. Click Start to begin monitoring the WDS link quality. Adjust the alignment of t he antenna of Bridge 1 until the Link quality indicator shows a relatively maximal value. Finally, click Stop t[...]
-
Page 23
15 2.6 Setting up Client Computers The TCP/IP and IEEE 802.11g-related settings of wireless client co mputers must match those of the AP. 2.6.1 Configuring IEEE 802.11g-Related Settings Before the TCP/IP networking system of a wireless client comput er can communicate with other hosts, the under lying wireless link must be est ablished between this[...]
-
Page 24
16 2.7 Confirming the Settings of the AP and Client Computers After you have completed deploying the AP and setting up client computers, you have to make sure the settings you have made are correct. 2.7.1 Checking if the IEEE 802.11g-Related Settings Work To check if a wireless client com puter can associate with the AP: 1. Launch the configuration[...]
-
Page 25
17 5. Type “ ping 2nd_dns_server ”, where 2nd_dns_server is a placeholder for the IP address of the secondary DNS server of the wireless c lient computer. Then press Enter . If this DNS server responds the client should have no probl em with TCP/IP net- working; else, see Appendix B-2, “TCP/IP Settings Problems” for troubleshooting.[...]
-
Page 26
18 3. Using Web-Based Network Manager In this chapter, we’ll explain each W eb management page of the Web-based Network Manager. 3.1 Overview Fig. 12. The S tart p age.[...]
-
Page 27
19 3.1.1 Menu Structure The left side of the start page contains a menu for you to carry out commands. Here is a brief description of the hyperlinks on the menu: • Home. For going back to the start page. • Status. Status information. Wireless Clients. The status of the wireless clients current ly associated with the AP. DHCP Mappings. C[...]
-
Page 28
20 RADIUS (Remote Authenticat ion Dial-In User Service) settings for better wire- less security. • Advanced. Advanced settings of the AP. Packet Filters. Ethernet Type Filters, IP Protoc ol Filters, and TCP/UDP Port Filters settings. Management. UPnP, System Log, and SNMP settings.[...]
-
Page 29
21 3.1.2 Save, Save & Restart, and Cancel Commands Fig. 13. Save, Save & Restart, and Cancel. At the bottom of each page that contains setti ngs you can configure, there are up to three buttons— Save , Save & Restart , and Cancel . Clicking Sav e stores the settings changes to the memory of the AP and brin gs you back to the start pag[...]
-
Page 30
22 3.1.3 Home and Refresh Commands Fig. 15. Home and Refresh. At the bottom of each status page that shows read-only info rmation, there are two but- tons— Home and Refresh . Clicking Home brings you back to the start page. Clicking Refresh updates the shown status information. 3.2 Viewing Status 3.2.1 Associated Wireless Clients Fig. 16. S tatus[...]
-
Page 31
23 3.2.2 Current DHCP Mappings Fig. 17. Current DHCP mappings. On this page, all the current static or dynamic DHCP mappings are shown. A DHCP mapping is a correspondence relationship between an IP address assigned by the DHCP server and a computer or device that obtains the IP address. A computer or de- vice that acts as a DHCP client is identifie[...]
-
Page 32
24 3.2.3 System Log Fig. 18. System log. System events are recorded in the memory of the AP. The logged information is useful for troubleshooting purposes. The system events are divided into several categories, and you can select which categories of events to log. 3.2.4 Link Monitor Fig. 19. Link monitor . When the AP is in AP Client mode, you can [...]
-
Page 33
25 3.3 General Operations 3.3.1 Specifying Operational Mode Fig. 20. Operational modes settings. The AP supports 2 operational modes: • AP/Bridge. This mode provides both Access Point and Static LAN-to-LAN Bridging functionality. The static LAN- to-LAN bridging function is supported through Wireless Distribution System (WDS). • AP Client. This [...]
-
Page 34
26 AP/Bridge WDS STA-AP AP Client STA-AP To establish a static bridge link based on WDS, the AP/br idges at both end of the WDS link must be manually configured with each other’s MA C addresses (see Section 0 for more information). To establish a dynamic bridge link between an AP and an AP Client, both devices have to be configured with th e same[...]
-
Page 35
27 3.3.3 Managing Firmware Fig. 22. Firmware management protocol setting. Firmware management operati ons for the AP include firmware upgrade , configuration backup , configuration restore , and configuration reset . Firmware upgrade, configuration backup, and configuration restore ca n be achieved via HTTP or TFTP. The HTTP-based way is suggested [...]
-
Page 36
28 3.3.3.2 Backing up and Restoring Configuration Settings by HTTP Fig. 24. Firmware backup by HTTP . To back up configuration of the AP by HTTP: 1. Click Ba ck Up . 2. You’ll be prompted to open or save the configuration file. Click Save . 3. The configuration file is named by the AP’s MAC address. For example, if the AP’s MAC address is 00-[...]
-
Page 37
29 3.3.3.3 Upgrading Firmware by TFTP Fig. 26. TFTP server settings. When use TFTP as the firmwar e management protocol, you can configure settings for the AP’s TFTP client to communicate with a TFTP server. If the TFTP client does not get a response from the TFTP server within a period specified by the Timeout setting, it will resend the previou[...]
-
Page 38
30 8. Trigger the firmware upgrade process by clicking Upgrade . Fig. 28. TFTP Server . NOTE: After the dialog box of the TFTP server program appears, be sure to specify the working folder within which the downloaded firmware files reside. NOTE: Make sure the Accept read requests check box of TFTP Server is selected. NOTE: The LAN IP address of the[...]
-
Page 39
31 3.3.3.4 Backing up and Restoring Co nfiguration Settings b y TFTP Fig. 29. Configurat ion backup/restore. To back up configuration of the AP by TFTP: Get a computer that will be used as a TFTP server and as a managing computer to trigger the backup process. 1. Connect the computer and one of the LAN Ethernet switch port with a normal Ethernet ca[...]
-
Page 40
32 4. On the computer, run the TFTP Server utility. And specif y the folder in which the configuration backup file resides. A config uration backup file is named by the AP’s MAC address. For example, if the AP’ s MAC address is 00- 01-02-33-44-55, the configuration backup file should be “000102334455.hex”. 5. On the computer, run a Web brow[...]
-
Page 41
33 3.4 Configuring TCP/IP Related Settings 3.4.1 Addressing Fig. 31. TC P/IP setting s. The IP address of the AP can be manually set ( Set Manually ) or automatically assigned by a DHCP server on the LAN ( Obtain from a DHCP Server ). If you are manually set- ting the IP address , Subnet mask , and Default gateway settings, set them appropri- ately[...]
-
Page 42
34 3.4.2 DHCP Server 3.4.2.1 Basic Fig. 32. Basic DHCP server settings. The AP can automatically assign IP addresses to client computers by DHCP. In this section of the management page, you can specify the Default gateway , Subnet mask , Primary DNS server , and Secondary DNS server settings that will be sent to a client at its request. Additionall[...]
-
Page 43
35 3.4.2.2 Static DHCP Mappings Fig. 33. S tatic DHCP ma ppings. IP addresses of servers are often static so that clients could alwa ys locate the servers by the static IP addresses. By Static DHCP Mappings , you can ensure that a host will get the same IP address when it requests one from the DHCP serv er. Therefore, in- stead of configuring the I[...]
-
Page 44
36 3.5 Configuring IEEE 802.11g-Related Settings 3.5.1 Communication 3.5.1.1 Basic Basic IEEE 802.11g-related communication settings include AP functionality , RF t ype , Regulatory domain , Channel number , Network name (SSID) , Data rate , and Transmit power . Fig. 34. Basic IEEE 802.1 1g communication settings. For specific needs such as configu[...]
-
Page 45
37 3.5.1.2 Link Integrity Fig. 35. Link integrity settings. When the Ethernet LAN interface is detect ed to be disconnected from the wired network, all currently associated wireless clients ar e disassociated by the AP and no wireless client can associate with the AP. The detec tion mechanism is based on pinging the IP address specified in Referenc[...]
-
Page 46
38 3.5.1.5 Wireless Distribution System LA N AP 2 Notebook Computer AP 1 WDS Fig. 38. Wireless Distribution System. Traditionally, access points are connected by Ethernet. By Wireless Distribution System (WDS), Aps can communicate with one another wirelessly. For example, in Fig. 38, AP 2 acts as an access point for the notebook com puters and it f[...]
-
Page 47
39 Fig. 40. Wireless Distribution System settings. To enable a WDS link: 1. Specify the MAC addre ss of the AP at the other end of the WDS link. 2. Select the corresponding Enabled check box. For example, assume you want two APs with MAC addresses 00-02-65-01-62-C5 and 00-02-65-01-62-C6 to establis h a WDS link between them . On AP 00-02-65-01-62-C[...]
-
Page 48
40 Fig. 41. Sample wireless bridge network topology . WARNING: Don’t let your network topology consis ting of wireless bridges, Ethernet switches, Ethernet links, and WDS links contain loops . If any loops exist, packets will circle around the loops and network perfo rmance will be seriously degraded. Fig. 42. Network topology containing a loop. [...]
-
Page 49
41 Fig. 43. Link health monitoring. Run Wireless Network Manager on a computer and locate the AP you want to manage. Go to the WDS tab, and then click Test . The test results ( OK or Broken ) will be shown in the Link Status column of the WDS links table. If external high-gain directional antennas are used, it’s diffi cult to align the antennas w[...]
-
Page 50
42 Brid ge 1 WDS L ink Computer 1 Computer 2 Bridge 2 PING (ICMP Echo Request) IC MP Ec ho R ep l y Adju st anten na alignmen t Fig. 44. Adjusting alignments of external directional antennas. TIP: You can make use of the Antenna Alignment Assistance feature to help you align the directional antennas. Fig. 45. Antenna alignment assistance. Instead o[...]
-
Page 51
43 3.5.2 Security IEEE 802.11g security settings include SSID broadcasts , Wireless client isolation , Security mode , IEEE 802.11 Authentication algorithm , WEP keys , MAC-Address-Based Access Control . 3.5.2.1 Basic Fig. 46. Basic IEEE 802.1 1g security settings. For security reasons, it’s highly recommended that the security mode be set to opt[...]
-
Page 52
44 AP 1 AP 2 STA 1 STA 2 STA 3 W ireles s Link Ethernet Link Switch WCI : This AP Only WCI : This AP Only Fig. 47. Behavior of the “This AP Only” wireless client isolation option. AP 1 AP 2 STA 1 STA 2 STA 3 W ireles s Link Ethernet Link Switch WCI : Al l AP s in T h is Subnet WCI : Al l AP s in T h is Subnet Fig. 48. Behavior of the “All APs[...]
-
Page 53
45 • Static WEP. WEP (Wired Equivalent Privacy) ke ys must be manually configured. • Static TKIP (WPA-PSK). Only TKIP (Temporal Key Integrity Protocol) mechanism of WPA (Wi-Fi Protected Acce ss) is enabled. In this mode, you have to specify the Pre-shared key , which will be used by the TKIP engine as a master key to gener- ate keys that actual[...]
-
Page 54
46 3.5.2.2 MAC-Address-Based Access Control Fig. 49. MAC-address-based access control settings. With MAC-Address-Based Access Control , you can specify the wireless client com- puters that are permitted or not permitted to associate with the AP. When the table type is set to inclusive , entries in the table are permitted to associate with the AP. W[...]
-
Page 55
47 Fig. 50. MAC ACL download settings. Instead of manually entering MAC addresses to the access control table one by one, you can prepare a text file that contains all the MAC addresses and put it on a TFTP server, and then command the AP to download the MAC ACL (Access C ontrol List) file from the TFTP server. Fi g. 51 shows the contents of a samp[...]
-
Page 56
48 3.5.3 IEEE 802.1x/RADIUS IEEE 802.1x Port-Based Network Access Control is a new standard for solving some security issues associated with IEEE 802.11, such as lack of user-based authentication and dynamic encryption key distribution. With IEEE 802.1x and t he help of a RADIUS (Remote Authentication Dial-In User Service) server and a user account[...]
-
Page 57
49 RADIUS servers. When the pr imary RADIUS server fails to respond, the wireless ac- cess point will try to communi cate with the secondary RADIUS server. You can specify the length of timeout and the number of retries bef ore communicating with the secon- dary RADIUS server after failing to communi cate with the primary RADIUS server. An IEEE 802[...]
-
Page 58
50 3.6 Configuring Advanced Settings 3.6.1 Packet Filters The AP provides layer 2 (Ethernet Type Filters) , layer 3 (IP Protocol Filters), and layer 4 (TCP/UDP Port Filters) filter ing capabilities. The configurat ion processes for the filters are similar. Functionality : whether this filtering capability is enabled or disabled . Policy for matched[...]
-
Page 59
51 3.6.1.2 IP Protocol Filters Fig. 55. IP p rotocol filters settings. The protocol, source address, and destination address fields of a packet incoming from the WLAN or Ethernet interfac e is inspected for filtering. In a rule, specify the hex-decimal protocol number, source IP address range (Source IP Address AND Source Subnet Mask), and destinat[...]
-
Page 60
52 3.6.2 Management 3.6.2.1 UPnP Fig. 57. UpnP settings. UpnP (Universal Plug and Play) enables a Wi ndows XP user to automatically discover peripheral devices by HTTP. When the UpnP functionality is enabled, you can see the AP in My Network Places of Wi ndows XP. The AP can be given a friend name that will be shown in My Network Places. Double-cli[...]
-
Page 61
53 3.6.2.2 System Log Fig. 58. System log settings. System events can be logged to the on-board RAM of the AP ( Local log ) or sent to a remote computer on which an SNMP trap monitor program runs ( Remote log by SNMP trap ). See the next subsection for more information about SNMP trap settings. The system events are divided into the following categ[...]
-
Page 62
54 3.6.2.3 SNMP Fig. 59. SNMP settings. The SNMP (Simple Network Management Protocol) functionality can be disabled, and you can specify the name (used as a password ) of the read-only and read-write com- munity. In addition, up to 5 SNMP trap targets can be set in the SNMP Trap Table . To specify a trap target: 1. Type the IP address of the target[...]
-
Page 63
55 Appendix A: Default Settings TIP: Press the Default ( SF-Reset , or Soft-Reset ) switch on the housing of a pow- ered-on AP to reset the configuration settings to factory-default values. Setting Name Default Value Global User Name root Password root IEEE 802.11g Regulatory Domain FCC (U.S.) Channel Number 11 SSID wireless SSID Broadcasts Enabled[...]
-
Page 64
56 System Log Local Log SNMP Enabled SNMP read community public SNMP write community private Telnet Enabled[...]
-
Page 65
57 Appendix B: Troubleshooting Check the following first: • Make sure that the power of the AP is on and the Ethernet cables are connected firmly to the RJ-45 jacks of the AP. • Make sure that the LED ALV of the AP is blinking to indicate the AP is working. • Make sure the types of t he Ethernet cables are correc t. Recall that there are two [...]
-
Page 66
58 B-2: TCP/IP Settings Problems Defa ul t Gate way of Client C omputer AP IEEE 802.1 1g S tage A State B Cor responden t Host S tage D Client Comput er DNS Server of Clie nt Comput er Ethernet LAN Internet Fig. 60. Communication stages for a client to re ach its corre spondent host. For a wireless client computer to communi cate with a corresponde[...]
-
Page 67
59 Use the OS-provided command-line network tool, route.exe , to modify the contents of the routing table. Use Windows-provided Device Manager to disable unnecessary NICs. Is the underlying link (Ethernet or IEEE 802.11g) established? Make sure the Ethernet link is OK. Make sure the wireless settings of t he wireless client computer and of the [...]
-
Page 68
60 B-3: Unknown Problems • The AP has been set to obtain an IP address automaticall y by DHCP. How can I know its acquired IP address so that I can manage it using a Web browser? Use the utility, Wireless Router/AP Browser ( WLBrw sr.exe ), in the “ Utilities ” folder on the companion CD-ROM disc. This utility can discover nearby APs and [...]
-
Page 69
61 Appendix C: Additional Information C-1: Firmware Upgrade Using Xmodem Upgrade Fig. 62. Xmodem Upgrade. To upgrade the firmware of AP using Xmodem Upgrade over RS232: 1. Power off the AP whose firmware will be upgraded. 2. Connect the managing PC and the AP with an RS232 Null Modem cable. 3. Select the serial port (COM1 or COM2) you use for conne[...]
-
Page 70
62 90000435 Rev A[...]