xTo configure Virtual Servers based on IP Forwarding ...129Bandwidth Control...
89DDEELLEETTEEAAMMAACCAADDDDRREESSSSFFRROOMMIINNDDIIVVIIDDUUAALLAACCCCEESSSSPPOOIINNTT..SStteepp11::SelectMMAACCFFiilltteerriinngg from WWLLAANNSSeett
90SStteepp22::MAC Filter Address List page displays. Select the checkbox of the MAC address you wish to delete. Click the DDeelleettee button.SStteepp
91EEDDIITTMMAACCAADDDDRREESSSSFFRROOMMTTHHEEMMAACCAADDDDRREESSSSLLIISSTT..SStteepp11::SelectMMAACCFFiilltteerriinngg from WWLLAANNSSeettuupp((aa//bb//
92SStteepp33::The Edit MAC Address page displays. Edit the MAC address settings accordingly. Click SSaavvee.SStteepp44::MAC Filter Address List page d
93CChhaapptteerr55::WWLLAANNSSeeccuurriittyyThis section illustrates how to make your WLAN more secure. All the nodes in your network MUS
94HHOOWWTTOOSSEETTUUPPWWEEPPThe guidelines below will help you to set up your access point for using WEP. At the WEP Setup page,
95SStteepp11::Specify thekkeeyyeennttrryyttyyppee, by selecting either: !!UUsseeHHeexxaaddeecciimmaall:: !!UUsseeAASSCCIIIISStteepp22::Select the T
96HHOOWWTTOOSSEETTUUPPWWPPAA--PPEERRSSOONNAALL(Only available in Access Point mode) The guidelines below will help you to set up the access
97SStteepp33::For WPA-Personal Set the CCiipphheerrTTyyppee toTTKKIIPP.WPA replaces WEP with a strong encryption technology called Temporal Key Integr
98HHOOWWTTOOSSEETTUUPP880022..11XX//RRAADDIIUUSS(Only available in Access Point mode) The guidelines below will help you to set up the acces
xi APPENDIX I: FIRMWARE RECOVERY ...176APPENDIX II: TCP/IP CONFIGURATION...178For
99SStteepp44::Enter the SShhaarreeddSSeeccrreettKKeeyy in the field provided. SStteepp55::By default, the BBrrooaaddccaassttKKeeyyRRoottaattiioonn is
100HHOOWWTTOOSSEETTUUPPWWPPAAEENNTTEERRPPRRIISSEE(Only Access Point mode supports WPA2-Enterprise and WPA-Enterprise-AUTO) The guidelines below will h
101SStteepp33::By default, the value for AAccccoouunnttiinnggPPoorrtt is 11881133. You can leave this value as it is. This value must be set to be the
102SStteepp77::Enter the GGTTKK((GGrroouuppTTrraannssiieennttKKeeyy))UUppddaatteess.This is the length of time after which the access point
103CChhaapptteerr66::WWiirreelleessssEExxtteennddeeddFFeeaattuurreessThis section illustrates how to configure the wireless extended features. To
104WWIIRREELLEESSSSPPSSEEUUDDOOVVLLAANNPPEERRNNOODDEEWhen implemented, this mode isolates each wireless client into its own pseudo VLAN. Wireless clie
105The following steps demonstrate how to set up a Wireless Pseudo VLAN per Node. SStteepp11::FromWWLLAANNSSeettuupp under Configuration,
106SStteepp44::Select the PPeerrnnooddee radio button and click on the AAppppllyy button.The Wireless Pseudo VLAN has configured as Per node.
107WWIIRREELLEESSSSPPSSEEUUDDOOVVLLAANNPPEERRGGRROOUUPPThe access point can configure up to 32 ‘groups’ of wireless clients identified by their MAC
108The following steps demonstrate how to set up Wireless Pseudo VLAN Groups. CCRREEAATTEEAACCLLIIEENNTTIINNAAPPSSEEUUDDOOVVLLAANNGGRROOUUPPSStteepp11
1CChhaapptteerr11::PPrroodduuccttOOvveerrvviieewwIINNTTRROODDUUCCTTIIOONNThe Wireless Access Point is a high-performance access point (AP) t
109SStteepp33::Select a group number from theGGrroouupp drop-down list. SStteepp44::Fill in the HHaarrddwwaarreeAAddddrreessss field with the MAC
110AADDDDAANNOOTTHHEERRCCLLIIEENNTTIINNAAPPSSEEUUDDOOVVLLAANNGGRROOUUPPFollow the procedures mentioned in Steps 3-5. You can create up to
111WWIIRREELLEESSSSSSEETTUUPP--TTHHEEWWIIRREELLEESSSSDDIISSTTRRIIBBUUTTEEDDSSYYSSTTEEMM(Only in Access Point mode) A wireless distribution system crea
112Chain Configuration WDSA chain configuration WDS spans an area in length, for instance a long corridor. Satellite access points are chained togethe
113The following steps will guide you in setting up WDS in your access point. CCRREEAATTEEAACCLLIIEENNTTIINNAAWWDDSSSStteepp11::FromWWLLAANNSSeettuupp
114SStteepp33::As illustrated on the WWDDSSSSeettuupp, the WWDDSS feature is disabled by default. Click on the CChhaannggee button.SStteepp44::From t
115SStteepp66::Fill up the HHaarrddwwaarreeAAddddrreessss field with the wireless MAC address of the device to include in your WDS, using the
116EEDDIITT//DDEELLEETTEEAACCLLIIEENNTTIINNAAWWDDSSSStteepp11::Click on the MMAACCaaddddrreessss in the table as shown below. SStteepp22::From the EEd
117LLOONNGGDDIISSTTAANNCCEEPPAARRAAMMEETTEERRSSThis setup allows the access point to calculate and display suggested values for certain parameters t
118SStteepp33::As illustrated on the LLoonnggDDiissttaanncceePPaarraammeetteerrss Setup page, the OOuuttddoooorrfeature is disabled by default.
2FFEEAATTUURREESSAANNDDBBEENNEEFFIITTSSThe access point has been designed for high performance and offers a rich suite of features, with w
119SStteepp55::You can enter the parameters according to the recommended values in the pop-up window, click on the AAppppllyy button to update the cha
120CChhaapptteerr77::AAddvvaanncceeddCCoonnffiigguurraattiioonnRROOUUTTIINNGG(only supported by Wireless Routing Client and Gateway) The access point
121The diagram below illustrates a case in which you have two routers in the network. One router is used for broadband Internet sharing w
122TTOOCCOONNFFIIGGUURREESSTTAATTIICCRROOUUTTIINNGGWith an understanding of how adding a static routing entry can facilitate a network se
123NNAATT(only supported by Wireless Routing Client and Gateway) The basic purpose of NAT is to share a single public IP address when there are multip
124TTOOCCOONNFFIIGGUURREEVVIIRRTTUUAALLSSEERRVVEERRSSBBAASSEEDDOONNDDEE--MMIILLIITTAARRIIZZEEDDZZOONNEEHHOOSSTTHaving gone through the NAT Technology
125You may wish to set up a DMZ host if you intend to use a special-purpose Internet Service such as an online game for which no i NOTE1. When you en
126TTOOCCOONNFFIIGGUURREEVVIIRRTTUUAALLSSEERRVVEERRSSBBAASSEEDDOONNPPOORRTTFFOORRWWAARRDDIINNGGVirtual Server based on Port Forwarding is imple
127Step 4: On the following AAddddPPoorrttFFoorrwwaarrddEEnnttrryy screen, you can set up a Virtual Server for a KKnnoowwnnSSeerrvveerr typ
128Known Server Server Type : Select from the drop-down list of known server types: (HTTP, FTP, POP3 or Netmeeting). Private IP Address: Specify t
3 !!HHTTTTPPSSThe access point supports HTTPS (SSL) in addition to the standard HTTP. HTTP (SSL) features additional authentication and encrypt
129TTOOCCOONNFFIIGGUURREEVVIIRRTTUUAALLSSEERRVVEERRSSBBAASSEEDDOONNIIPPFFOORRWWAARRDDIINNGG When you have subscribed for more than one IP addr
130BBAANNDDWWIIDDTTHHCCOONNTTRROOLL(only supported by Wireless Routing Client and Gateway) The access point is designed to support simple band
131Step 2: By default,BBaannddwwiiddtthhCCoonnttrrooll is disabled. Select EEnnaabbllee, followed by clicking theAAppppllyy button.TTOOCCOONNFF
132TTOOCCOONNFFIIGGUURREELLAANNBBAANNDDWWIIDDTTHHCCOONNTTRROOLLSSEETTTTIINNGGThe access point can allow you to limit the LAN user’s through
133This table describes the parameters that can be modified in the Add Bandwidth Control Entry page. Parameters DescriptionRule Name The rule descri
134RREEMMOOTTEEMMAANNAAGGEEMMEENNTT(only supported by Wireless Routing Client and Gateway) The advanced network administrator will be delighted
135PPAARRAALLLLEELLBBRROOAADDBBAANNDD(only supported by Gateway)The access point is equipped with the exclusive Parallel Broadband technology to prov
136TTOOEENNAABBLLEEPPAARRAALLLLEELLBBRROOAADDBBAANNDDBefore you begin, ensure that each of the access point within the network is properl
137EEMMAAIILLNNOOTTIIFFIICCAATTIIOONNThe access point provides this feature to notify you by email when there is a change in the WAN IP
138 ! Email address of Receiver: This is the email address of the receiver to whom the message would be sent. ! IP address of Email Server: This is
4WWHHEENNTTOOUUSSEEWWHHIICCHHMMOODDEEThe access point is versatile in the sense that it may operate in six different types of modes: Access Point
139SSTTAATTIICCAADDDDRREESSSSTTRRAANNSSLLAATTIIOONN(only supported by Wireless Routing Client and Gateway) If you use a notebook for work at the offic
140Step 1: Under the HHoommeeUUsseerrFFeeaattuurreess command menu, click on SSttaattiiccAAddddrreessssTTrraannssllaattiioonn.Step 2: You may th
141DDNNSSRREEDDIIRREECCTTIIOONN(only supported by Wireless Routing Client and Gateway) When you enter a URL in your Internet browser, the br
142NOTEFor Internet access, please do NOT leave the DNS Server field of the PC’s TCP/IP Properties blank. Simply key in any legal IP address
143TTOOEENNAABBLLEE//DDIISSAABBLLEEDDNNSSRREEDDIIRREECCTTIIOONNStep 1: Under the HHoommeeUUsseerrFFeeaattuurreess command menu, click on DDNNSSRReeddi
144TTOOEENNAABBLLEE//DDIISSAABBLLEEDDYYNNAAMMIICCDDNNSSSSEETTUUPPStep 1: Under the HHoommeeUUsseerrFFeeaattuurreess command menu, click on DDyynnaammi
145Step 3: To add a new Dynamic DNS to the list, click on the Add button and you will see the CChhooiicceeDDDDNNSSPPrroovviiddeerr page appe
146dynamic WAN IP connection is used. For instance, If your ISP connection service uses the dynamic WAN IP, tick the AAuuttooDDeetteecc
147Step 6: Click on the Add button to save the new addition. Step 7: The new domain is added to the Dynamic DNS list table. Step 8: It will a
148To select DtDNS as DDNS Service Provider Step 1: Under theCChhooiiccee column in the table of CChhooiicceeDDDDNNSSPPrroovviiddeerrcheck the r
5AACCCCEESSSSPPOOIINNTTCCLLIIEENNTTMMOODDEEIn Access Point Client mode, the device acts as a wireless client. When connected to an access point, it wi
149Step 5: In our example, while the new domain name, ccooooll..33dd--ggaammee..ccoommis being added to the list, the message ‘Waiting i
150CChhaapptteerr88::SSeeccuurriittyyCCoonnffiigguurraattiioonn !This chapter describes the security configuration mainly found in the Wirel
151Step 4: Click on the AAdddd button and you will be able to define the details of your PPaacckkeettFFiilltteerrRRuullee from the scre
152 !A Range of TCP portsIn this case, you will have to define (From) which port (To)which port, your rule applies. !ASingle TCP port Here,
153 !Any timeHere, you may leave both (From) and (To) fields blank. Step 5: Click on the AAppppllyy button to make the new rule effective. The
154UURRLLFFIILLTTEERRIINNGGThe access point supports URL Filtering, which allows you to easily set up rules to block objectionable web sites from your
155FFIIRREEWWAALLLLCCOONNFFIIGGUURRAATTIIOONNMore than just a “NAT” firewall, there is a powerful Stateful Packet Inspection (SPI) firewal
156Step 4: You may add more firewall rules for specific security purposes. Click on the AAddddradio button at the screen shown above, followed by th
157ICMP Packet Type Description Echo request Determines whether an IP node (a host or a router) is available on the network. Echo reply Replies to
158range of IP addresses. Source Port : You can control requests for using a specific application by entering its port number here. Us
6PPOOIINNTTTTOOPPOOIINNTTMMOODDEEIn Point to Point mode, the access point allows point-to-point communication between different buildings.
159FFIIRREEWWAALLLLLLOOGGSSWhen the access point’s SPI firewall is in operation, valuable traffic patterns in your network will be captured and s
160CChhaapptteerr99::SSyysstteemmUUttiilliittiieessUUSSIINNGGTTHHEESSYYSSTTEEMMTTOOOOLLSSMMEENNUUPPIINNGGUUTTIILLIITTYYThis feature lets you deter
161SSYYSSLLOOGGSyslog forwards system log messages in a network to a machine running a Syslog listening application. It is used to help in
162SStteepp22::Select to EEnnaabblleeSSyysslloogg.SStteepp33::Enter the RReemmootteeIIPPAAddddrreessssoorrDDoommaaiinnNNaammeeSStteepp44::Enter the RR
163SStteepp44::Install Syslog listening application. SStteepp55::View logged information on Syslog listening application.
164SSYYSSTTEEMMIIDDEENNTTIITTYYIf your network operates with several access points, you would find it useful to have a means of identifying each indiv
165SSYYSSTTEEMMCCLLOOCCKKSSEETTUUPPSStteepp11::Click on SSyysstteemmCClloocckkSSeettuupp from the SSYYSSTTEEMMTTOOOOLLSS menu. SStteepp22::Select the
166FFIIRRMMWWAARREEUUPPGGRRAADDEEYou can check the types and version of your firmware by clicking on AboutSystem from the HELP menu. To
167Follow the instructions given during the upgrading process. SStteepp44::You need to reboot the system after the firmware upgrade. NOTEThe firmware
168BBAACCKKUUPPOORRRREESSEETTSSEETTTTIINNGGSSYou may choose to save the current configuration profile, to make a backup of it onto your hard disk,
7PPOOIINNTTTTOOMMUULLTTIIPPLLEEPPOOIINNTTMMOODDEEIn Point to Multiple Point mode, this mode is similar to that of the Point-to-Point mode. But the acc
169BBAACCKKUUPPYYOOUURRSSEETTTTIINNGGSSSStteepp11::Click on BBaacckkuuppoorrRReesseettSSeettttiinnggss from the SSYYSSTTEEMMTTOOOOLLSS menu. SStteepp2
170RREESSTTOORREEYYOOUURRSSEETTTTIINNGGSSSStteepp11::Click on BBaacckkuuppoorrRReesseettSSeettttiinnggss from the SSYYSSTTEEMMTTOOOOLLSS menu. SStteep
171RREEBBOOOOTTSSYYSSTTEEMMMost of the changes you make to the system’s settings require a system reboot before the new parameters can take effect. SS
172CCHHAANNGGEEPPAASSSSWWOORRDDIt is recommended that you change the default login password, which is case sensitive and is set by default, to passwor
173LLOOGGOOUUTTTo exit the Web interface, follow the next few steps. SStteepp11::Click on LLooggoouutt from the SSYYSSTTEEMMTTOOOOLLSS menu. SStteepp2
174UUSSIINNGGTTHHEEHHEELLPPMMEENNUUGGEETTTTEECCHHNNIICCAALLSSUUPPPPOORRTTThis page presents the contact information of technical support centres aroun
175AABBOOUUTTSSYYSSTTEEMMThe About System page displays a summary of your system configuration information. Support technicians might requi
176AAppppeennddiixxII::FFiirrmmwwaarreeRReeccoovveerryyThis section demonstrates how to reload the firmware to the access point should the
177SStteepp55::From the Start menu, click Run and type cmd. When the command prompt window appears, type in the following command: X:\recovery\TFTP -
178AAppppeennddiixxIIII::TTCCPP//IIPPCCoonnffiigguurraattiioonnOnce the hardware has been set up, you need to assign an IP address to your PC so tha
8WWIIRREELLEESSSSRROOUUTTIINNGGCCLLIIEENNTTMMOODDEEAn application of this mode would be for the Ethernet port of the WirelessRouting Cli
179SStteepp44::Select the radio button for Specify an IP address.Enter the IP Address and Subnet Mask as 192.168.168.X and 255.255.255.0,
180menu, select Run, and enter the command winipcfg.Select your respective Ethernet Adapter from the drop down list and click OK.Now, you
181FFOORRWWIINNDDOOWWSSXXPP//22000000SStteepp11::Go to your desktop, right-click on My Network Places icon and select Properties.SStteepp22
182SStteepp44::Select the radio button for Use the following IP address. Enter the IP Address and Subnet Mask as 192.168.168.X and 25
183SStteepp66::Next, in order to check if the IP address has been correctly assigned to your PC, go to Start menu, Accessories, select C
184AAppppeennddiixxIIIIII::PPaanneellVViieewwss&&DDeessccrriippttiioonnssFront View of Access PointName DescriptionSteady Blue The device is
185Steady Green Wireless interface up and running. Ready for operation. 4 LED (WLAN Link/Act LED) Flashing Green Activity is detected in the wi
1868 Ethernet Port 1 Connection for computer with NIC (Network Interface Card) or Ethernet network card. If using PoE, connect to this po
187AAppppeennddiixxIIVV::CCoommmmaannddLLiinneeIInntteerrffaacceeCCoommmmaannddssGet Operation ListSYNTAXDESCRIPTIONGet tasks Display all active proc
188TX Rate SYNTAXDESCRIPTIONSet txrate <string> Values are: (default auto) (802.11a)-- 6, 9, 12, 18, 24, 36, 48, 54, auto (802.11b/g mixed)--
ii© Copyright 2007 Compex Systems Pte Ltd All Rights Reserved This document contains information, which is protected by copyright. Reproductio
9GGAATTEEWWAAYYMMOODDEEOr put it more simply, Broadband Internet sharing in a wireless network! Since the access point supports several types of b
189 {CTRY_EGYPT, "EG" }, {CTRY_EL_SALVADOR, "SV" }, {CTRY_ESTONIA, "EE" }, {CTRY_FINLAND, "FI&
190 {CTRY_SLOVENIA, "SI" }, {CTRY_SOUTH_AFRICA, "ZA" }, {CTRY_SPAIN, "ES" }, {CTRY_SWEDEN, "SE
191WLAN StateSYNTAXDESCRIPTIONGet wlanstate Display whether status of current wireless operation is Enabled or Disabled. Set wlanstate enable/disable
192AAppppeennddiixxVV::TTeecchhnniiccaallSSppeecciiffiiccaattiioonnssSafety and ElectromagneticConformance ! FCC Part 15 SubPart B and SubPart
193Security ! 64 - bit / 128 - bit WEP ! WPA-Enterprise, WPA-Personal, WPA2-Enterprise, WPA2-Personal, WPA-Auto-Enterprise, WPA-Auto-Personal ! P
194Management ! HTTP Web Management ! SNMP - SNMP (RFC1157) - SNMP (RFC1213) ! Telnet ! SSH ! Syslog Built-in DHCP Server Yes DHCP Reservation
10PPP over Ethernet (PPPoE)Select this type of connection if you are using ADSL services in a country utilising standard PPP over Ethernet for authent
11WWIIRREELLEESSSSAADDAAPPTTEERRMMOODDEESimilarly to the Access Point Client mode, the access point used in this mode, is able to communicate wirel
12CChhaapptteerr22::HHaarrddwwaarreeIInnssttaallllaattiioonnSSEETTUUPPRREEQQUUIIRREEMMEENNTTSSBefore starting, please verify that the following is ava
13SStteepp22::Insert one end of the Ethernet cable to any of the Ethernet ports on your access point, and the other end of the cabl
14OOPPTTIIOONNTTWWOO::UUSSIINNGGPPOOEETTOOSSUUPPPPLLYYPPOOWWEERRTTOOTTHHEEUUNNIITTThe access point is fully compatible with a Power-Over-Ethernet (PoE
15SStteepp33::Next, connect the RJ45 Ethernet cable attached to the PoE Injector to your PC’s Ethernet network adapter. Once you have fin
16SStteepp55::Turn on your power supply. Notice that the Power LED has lighted up. This indicates that the access point is receivin
17OOPPTTIIOONNAALL::MMOOUUNNTTIINNGGOONNTTHHEEWWAALLLLSStteepp11::Screw the mount onto the unit. SStteepp22::Align the unit and mount to the wall. Us
18CChhaapptteerr33::AAcccceessssttooWWeebb--bbaasseeddIInntteerrffaacceeThere are two methods to access to the web-based Interface of your acces
iiiFCC NOTICE This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Ru
19SStteepp33::When the utility has been installed, double-click on the uuCCoonnffiigg icon. The following screen will appear, click on the YY
20SStteepp55::Do not exit the uConfig program while accessing to the web-based interface. This will disconnect you from the device. Click on the OOKK
21SStteepp77::You will then reach the home page of your access point’s web-based interface.
22MMAANNUUAALLAACCCCEESSSSTTOOWWEEBB--BBAASSEEDDIINNTTEERRFFAACCEEVVIIAAIINNTTEERRNNEETTEEXXPPLLOORREERRFor this method, you need to assign an IP addr
23SStteepp33::Highlight IInntteerrnneettPPrroottooccooll((TTCCPP//IIPP)) and click on the PPrrooppeerrttiieess button. SStteepp44::Select the radio
24SStteepp55::Click on the OOKK button to close all windows. SStteepp66::Next, in order to check if the IP address has been correctly assigned t
25SStteepp88::Open the CCoonnnneeccttiioonnss tab and in the LLAANNSSeettttiinnggss section, disable all the option boxes. Click on the OOKK bu
26You will then reach the home page of your access point’s Web interface.
27CChhaapptteerr44::CCoommmmoonnCCoonnffiigguurraattiioonnThis chapter illustrates the following features, which are available in ALL the o
28SSEETTTTIINNGGUUPPYYOOUURRLLAANNYou can opt to adjust the default values of your access point and customize them to your network settings.
ivICES 003 Statement This Class B digital apparatus complies with Canadian ICES-003. Declaration of Conformity Compex, Inc. declares the following: P
29This table describes the parameters that can be modified in the Management Port Setup page. Parameters DescriptionIP Address When the DHCP server o
30Parameters DescriptionDHCP Gateway IP AddressThough usually, the DHCP server also acts as the Default Gateway of the DHCP client, th
31TTOOVVIIEEWWTTHHEEAACCTTIIVVEEDDHHCCPPLLEEAASSEESSThe following will guide you to a page display of the active IP address leases that have
32TTOORREESSEERRVVEESSPPEECCIIFFIICCIIPPAADDDDRREESSSSEESSFFOORRPPRREEDDEETTEERRMMIINNEEDDDDHHCCPPCCLLIIEENNTTSSMaking an IP address reservation
33SStteepp33::Fill in: The host portion of the IP Address to reserve. The Hardware Address, in pairs of two hex values Press the AAppppllyy button to
34DDEELLEETTEEDDHHCCPPSSEERRVVEERRRREESSEERRVVAATTIIOONNIf you do not need the DHCP server to reserve an IP address anymore, you can del
35WWLLAANNSSEETTUUPPThis section shows how to perform the following functions: Basic:This function performs a basic setup of the wireless modes of ope
36TTOOCCOONNFFIIGGUURREETTHHEEBBAASSIICCSSEETTUUPPOOFFTTHHEEWWIIRREELLEESSSSMMOODDEEThe following will guide you to configure the basic setup of th
37SStteepp22::((OOppttiioonnaall::CChhaannggeeCCuurrrreennttmmooddee))If you wish to change the current mode of your access point, click
38SStteepp33::Enter the parameters in their respective fields, click on the AAppppllyy button and reboot your device to let your changes take effect.
vTechnical Support Information The warranty information and registration form are found in the Quick Install Guide. For technical support
39If you wish to set the access point in the PPooiinnttttooMMuullttiipplleePPooiinntt mode, click on CChhaannggee to select PPooiinnttttooMMuullttii
40This table describes the parameters that can be modified in the WWLLAANNBBaassiiccSSeettuupp page. ParametersDescriptionThe Current Mode
41 !!880022..1111bb//ggmmiixxeeddThis mode supports both wireless B and G clients. !!880022..1111ggoonnllyyThis mode supports wireless-G client
42SSCCAANNFFOORRSSIITTEESSUURRVVEEYY((OONNLLYYFFOORRCCLLIIEENNTTMMOODDEEAANNDDWWIIRREELLEESSSSRROOUUTTIINNGGCCLLIIEENNTTMMOODDEE))SStteepp11::In the M
43SStteepp22::To connect the client to one of the access points detected: Select the radio button corresponding to the access point you want
44NOTEThe purpose of using Site Survey is to scan and display all access points based on the current security setting of your access point. For instan
45SSHHOOWWLLIINNKKIINNFFOORRMMAATTIIOONN((OONNLLYYFFOORRCCLLIIEENNTTMMOODDEEAANNDDWWIIRREELLEESSSSRROOUUTTIINNGGCCLLIIEENNTTMMOODDEE))SStteepp11::To
46This table describes the parameters that can be viewed from the LLiinnkkIInnffoorrmmaattiioonn page. ParametersDescriptionState Refers to
47SSCCAANNFFOORRCCHHAANNNNEELLSSUURRVVEEYY((AAVVAAIILLAABBLLEEFFOORRAACCCCEESSSSPPOOIINNTTMMOODDEEAANNDDGGAATTEEWWAAYYMMOODDEE))Channel Survey provide
48The values indicate the level of interference. The higher the value, the higher the interference. If the value is zero, there is no interference. SS
viAbout This Document The product described in this document, Wireless Access Point with PoE, WP54AG is a licensed product of Compex
49This table describes the read-only parameters of all channels that can be viewed from the Channel Survey page. ParametersDescriptionFreq
50AANNTTEENNNNAAAALLIIGGNNMMEENNTT((AAVVAAIILLAABBLLEEFFOORRAALLLLMMOODDEESS))The Antenna Alignment feature in the access point is designed
51NOTEIf no MAC address is entered, the Antenna Alignment tool will make use of the SSID to align the antenna. Please make sure that the co
52TTOOCCOONNFFIIGGUURREETTHHEESSEECCUURRIITTYYSSEETTUUPPOOFFTTHHEEWWIIRREELLEESSSSMMOODDEEKindly refer to Chapter 5 on WLAN Security for deta
53This table describes the parameters that can be modified in the WWLLAANNAAddvvaanncceeddSSeettuupp page. ParametersDescriptionBeacon Inter
54Antenna Control The Antenna Control function allows you to control whether to use the: ! Main antenna ! Aux (auxiliary) antenna ! Auto (
55SStteepp33::To check the details on individual wireless client, click on the MAC Address in the WLAN Station List. The following screen will show th
56IINNCCLLIIEENNTTMMOODDEEClick on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-menus expanded under WWLLAA
57IINNPPOOIINNTTTTOOPPOOIINNTTMMOODDEEClick on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-menus expanded
58IINNPPOOIINNTTTTOOMMUULLTTIIPPLLEEPPOOIINNTTMMOODDEEClick on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub
viiConventionsIn this document, special conventions are used to help and present the information clearly. The Wireless Access Point w
59IINNWWIIRREELLEESSSSRROOUUTTIINNGGCCLLIIEENNTTMMOODDEEClick on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the s
60IINNGGAATTEEWWAAYYMMOODDEEClick on WWLLAANNSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. You will see the sub-menus expanded under WWLL
61WWAANNSSEETTUUPP(only supported by Wireless Routing Client and Gateway) A correct WAN Setup allows you to successfully share your Internet connectio
62Step 3: Simply select DDyynnaammiiccIIPPAAddddrreessssand hit the AAppppllyy button. Please remember to click RReebboooottSSyysstteemm under SSY
63Click on SSyysstteemmIIddeennttiittyy under the SSYYSSTTEEMMTTOOOOLLSS command menu. Step 5: On the following screen, key in the your ISP
64WAN Setup - Cable Internet with Static IP Assignment If you have an ISP that leases a static WAN IP for your subscription, you will need to configur
65WAN Setup - ADSL Internet using PPP over Ethernet (PPPoE) If you subscribe to an ADSL service using PPP over Ethernet (PPPoE) authenticat
66You can limit the maximum size a packet can be in a network by setting the MMTTUU(Maximum Transmissible Unit). Click the MMTTUU Button in AAddvvaann
67WAN Setup – ADSL Internet using PPTP If you subscribe to an ADSL service using Point-to-Point Tunneling Protocol (PPTP) authentication, you can s
68WAN Setup – L2TP If you’re using Layer 2 Tunneling Protocol (L2TP) authentication, you can set up your access point’s WAN type from the steps that f
viiiCopyrights © 2007 Compex Systems Pte Ltd ... i Trademark Information ...
69TTEELLNNEETT//SSSSHHSSEETTUUPPTelnet allows a computer to remotely connect to the access point CLI (Command Line Interface) for control a
70To add user: 1. Click Add button.2. In Add User Entry Page, enter User Name, Password, and specify whether user is granted permission
71User Management list refreshes to update users. To Refresh User Management list: Click Refresh to refresh User Management list.
72TTEELLNNEETTCCOOMMMMAANNDDLLIINNEEIINNTTEERRFFAACCEETelnet CLI (Command Line Interface) The user may connect to the CLI (Command Line Interface) via
73SSEECCUURREESSHHEELLLLHHOOSSTTCCOOMMMMAANNDDLLIINNEEIINNTTEERRFFAACCEESSH CLI (Secure Shell Host Command Line Interface) SSH is designed and creat
74SSH CLI has a command line interface like shown below for example.
75WWEEBBMMOODDEEThe access point supports HTTPS (SSL) in addition to the standard HTTP. HTTPS (SSL) features additional authentication and encry
76SSNNMMPPSSEETTUUPPSimple Network Management Protocol (SNMP) is a set of communication protocols that separates the management architect
77SSTTPPSSEETTUUPP(Only available in Access Point, Point to Point and Point to Multiple Point modes) Spanning Tree Protocol (STP) is
78In short, the main purpose of activating STP is to prevent looping when you have redundant paths in the network. Without activat
ix Setting up your LAN ...28To view the active DHCP leases...
79The path with the smallest cost will be used and extra redundant paths will be disabled. To explain the effect of STP & Pseudo VLAN on
80Scenario #2 – (With STP, No Pseudo VLAN) When STP is enabled, extra redundant network paths between APs will be disabled, hence preventin
81Scenario #3 – (With STP and Pseudo VLAN) In this example, both STP and Pseudo VLAN Per Node are implemented in this network. When Pseudo VLAN Pe
82SStteepp11::Click on SSTTPPSSeettuupp from the CCOONNFFIIGGUURRAATTIIOONN menu. SStteepp22::Select EEnnaabbllee from the SSTTPPSSttaattuuss radio b
83MMAACCFFIILLTTEERRIINNGGMAC Filtering acts as a security measure by controlling the users accessing to the network through their MAC address
84Add a MAC address to the MAC Address List.SStteepp11::SelectMMAACCFFiilltteerriinngg from WWLLAANNSSeettuupp((aa//bb//gg)).MAC Address Filtering pag
85SStteepp22::MAC Filter Address List page displays. Click the AAdddd button.SStteepp33::Add MAC Address page displays.
86SStteepp44::Enter the MAC Address of the client in the format xx-xx-xx-xx-xx-xx, where x can take any value in the range 0-9 or a-f.Ente
87NOTEPlease reboot to effect all changes and new MAC address entries. DDEELLEETTEEAAMMAACCAADDDDRREESSSSFFRROOMMAALLLLAACCCCEESSSSPPOOIINNTT
88SStteepp22::MAC Filter Address List page displays. Select the checkbox of the MAC address you wish to delete. Click the DDeelleettee button.SStteepp
Commentaires sur ces manuels