5 Chapter 1: Introduction Introducing the access point His access point is a Wireless 54Mbps A+G Dualband Access Point. It doesn’t just operat
95 WAN Setup The configuration for each type of broadband Internet connection is shown in the following individual sections. The system has to be
96 Static IP If you have subscribed to a specific IP address or to a fixed range of IP addresses from your ISP, follow these steps. Static IP
97 Dynamic IP This is the default WAN Type of the access point. In this connection mode, your ISP will automatically assign its IP address. T
98 PPPoE Select this connection type if you have subscribed to ADSL in a country utilising standard PPPoE for authentication, for instance: If
99 Follow these steps to setup PPPoE. PPPoE Configuration Select PPP over Ethernet from the Select WAN Type menu.
100 PPTP The Point-to-Point Tunneling Protocol (PPTP) enables the implementation of secure multi-protocol Virtual Private Networks (VPNs) through
101 L2TP L2TP (Layer 2 Tunneling Protocol) is an extension to the PPP protocol used for Virtual Private Networks (VPNs) that supports multiple pr
102 Email Notification This feature notifies you by email if there is a change in the WAN IP address. Follow these steps to setup Email Notific
103 Email address of Sender: This is the email address that will appear as the sender. Needs Authentication specifies whether the SMTP server r
104 MAC Address Cloning The access point has the ability to clone MAC addresses. Follow these steps to clone MAC address. MAC Address Cloning
6 Chapter 2: Getting to know the Access Point The following will help you get more acquainted with the rich suite of features offered by the ac
105 Link Speed & Duplex The access point supports connection link speeds of 100Mbps at full duplex and 10Mbps at half duplex, and can also au
106 Using NAT NAT (Network Address Translation) functions by transforming the private IP address of packets originating from hosts on your LAN so
107 When NAT is enabled, your LAN is not accessible to the WAN. However, implementing virtual servers allows you to host Internet servers such as
108 DMZ 1. Click NAT from theCONFIGURATION menu. 2. Ensure that NAT Status is setto Enable. At the Advanced NAT
109 To Setup Port Forwarding Port forwarding allows the access point to redirect any incoming Internet request bearing a public IP address to a
110 Follow these steps to setup port forwarding. Port Forwarding 1. Click NAT from theCONFIGURATION menu. 2. Ensure that NAT Statu
111 The Port Forward Entries table displaysthe list of current port-based entries
112 NAT Static Port Based Entries reflects the new entry. To assign more servers in your LAN: 1. Click Add. This will bring yo
113 The following is a non-exhaustive list of well-known port numbers: Application Port Number Echo 7 Daytime 13 FTP 21 SMTP (Simple Mail Trans
114 IP Forwarding If you have subscribed to more than one IP address from your ISP, you may define Virtual Servers based on their IP address so
7 Easy Management & Configuration You can browse or uConfig to the web interface of the access point for ef
115 NAT Static IP Address Entries reflectsyour new entry. To assign more servers in your LAN: 1. Click Add. This will bring
116 Routing The access point supports both static routing for manual routing table entry addition, and dynamic routing for automatic routing tabl
117 Static Routing Follow these steps to add entries to your access point’s routing table for rerouting of IP packets to another network. Static
118 The IP Routing Table reflects the newentry. To add more routes: 1. Click Add. This will bring you back to Add IPRoute GUI. 2
119 Bandwidth Control for WAN Bandwidth Control allows you to decide the available bandwidth in levels of 1kbit. Follow these steps to setup Ban
120 Bandwidth Control for LAN Bandwidth Control allows you to decide the available bandwidth in levels of 1kbit. Follow these steps to setup Ban
121 1. Enter the Bandwidth Control Rule Name. 2. Enter the Committed Rate in kbit. This sets the bandwidth committed. 3. En
122 Remote Management This feature is especially helpful for users who work away from the office or from home. The user only requires Internet a
123 Universal Plug and Play (UPnP) The following are issues that can arise when using NAT: • Some network applications assume the IP address and
124 Although NAT traversal does not solve all NAT-related issues, it allows several applications to run behind NAT-enabled devices. It is recomme
8 Security Features Security elements have been put in place to better protect your data and privacy. 64-bit / 128-bit WEP Encryption
125 Parallel Broadband The access point is equipped with the exclusive Parallel Broadband technology, which features scalable Internet bandwidth,
126 To Enable Parallel Broadband Parallel Broadband can be implemented when: More than one access point is interconnected (LAN port to LAN por
127 DNS Redirection DNS Redirection allows you to redirect DNS requests to a local or closer DNS server. This improves the response time and enab
128 Dynamic DNS Setup It is difficult to remember the IP addresses used by computers to communicate on the Internet. It gets even more complicate
129 On Enable/Disable Dynamic DNS page, Dynamic DNS Status is disabled by default. If you have already created a list earlier, click R
130 There are two predefined DDNS providers. Please note that you need to be connected to the Internet to register your DDNS account. To select
131 Optional: In the Mail Exchanger field, enter the Static WAN IP address of the mail server configured to handle email for your domain. Sel
132 To select DtDNS as DDNS Service Provider Under the Choice column in the Choice DDNS Provider check the radio button for DtDNS. Click Next.
133 SNMP Setup SNMP (Simple Network Management Protocol) is a set of protocols that facilitates the exchange of management information between ne
134 SNMP Trap The SNMP Trap provides notification of significant network events through unsolicited SNMP messages. This results in substantial s
9 Additional Features These features reveal the comprehensive range of advanced routing functionalities. Static IP, Dynam
135 Telnet/SSH Setup Telnet allows a computer to remotely connect to the access point CLI (Command Line Interface) for control and monitoring.
136 Follow these steps to setup Telnet/SSH. Telnet/SSH Setup 1 Click Telnet/SSH Setup from the Device Access Managementmenu.
137 User Management User Management To add user: 1. Click Add button. 2. In Add User Entry Page, enter User Name, Password, Confirm P
138 TELNET CLI Telnet CLI (Command Line Interface) The user may connect to the CLI (Command Line Interface) via a TELNET session to the default
139 SSH CLI (Secure Shell Host Command Line Interface) SSH CLI (Secure Shell Host Command Line Interface) SSH is designed and created to provid
140 SSH CLI has a command line interface like shown below for example.
141 Web Management Setup HTTPS (SSL) is supported in addition to the standard HTTP. HTTP (SSL) features additional authentication and encrypti
142 Web service restarts automatically. Web session logouts. You may reconnect using the new web service using the relogin link displayed on
143 Chapter 10: Web Interface Utilities This chapter describes the use of: The System Tools menu The Help menu Using the SYSTEM TOOLS Men
144 The Ping Utility pings the target with 10 packets of 56 bytes data and displays the results and statistics at the end. Click Back to re
10 Panel Views The access point can either be placed standing upright on the 2 rest feet included or mounted onto a wall. LED indicators denot
145 Syslog Syslog forwards system log messages in a network to a machine running a Syslog listening application. It is used to help in managing
146 SStteepp 22:: Select to EEnnaabbllee SSyysslloogg. SStteepp 33:: Enter the RReemmoottee IIPP AAddddrreessss oorr DDoommaaiinn NN
147 SStteepp 44:: Install Syslog listening application. SStteepp 55:: View logged information on Syslog listening application.
148 To Identify Your System If your network operates with several access points, a means of identifying each individual access point would be us
149 Follow these steps to set your system’s clock. System Clock Setup To Upgrade the Firmware Version The products are
150 Settings Profile A profile is the set of parameters with which the access point is configured. You may choose to: Sav
151 Backup Browse To return system to earlierconfiguration using backup file: 1. Click Browse to searc
152 To Reboot Most changes in system settings require rebooting to take effect. Follow these steps to reboot the access point. Reboot System
153 Change Your Login Password The login password is required to access the web configuration interface, through which the access point settings
154 To Logout Follow these steps to logout. Logout Click Logout from the System Tools menu. A login prompt displays.
11 Front View 7 8 9 10 11 12
155 Using the HELP Menu To Get Technical Support This page contains the contact information of worldwide technical support centres. Follow these
156 About Your System The About System page displays a summary of system configuration information that might be required by support technicians
157 Appendix A: Configuring Your PC for Network Access This section illustrates the configuration of your computer’s TCP/IP settings for communi
158 Double-click the Network icon. The network configuration screendisplays. Check your list of networkcomponents in th
159 Configuring Dynamic IP Address Allocation Microsoft Windows 98/98SE/ME/2000 Follow these steps to configure your PC for dynamic IP address al
160 1. Click IP Address. 2. Select Obtain an IP addressautomatically. 3. Click Gateway. 4. Check that InstalledGateways list is bl
161 Configuring Static IP Address Allocation Microsoft Windows 98/98SE/ME/2000 Follow these steps to enable static IP address allocation. Stati
162 1. Click IP Address. 2. Select Specify an IP address. 3. In IP Address enter192.168.168.X, where X isany value fr
163 Configuring Wireless Network Settings for Windows XP It is recommended to configure the wireless client PC or notebook with automatic IP addr
164 Appendix B: Dual Card Application Example This is an application example for a dual WLAN card access point installed with the following s
12 Panel Description Name Description Steady Green The device is powered up. 1 Power (LED) Off No power is supplied to the device. Steady G
165 How it works 1. The connection path when WPC-1 is connected to VAP-WLAN1 flows from AP to the Ethernet port of the access point to switch V
Appendix C: Troubleshooting Solutions to Common Problems In this section we list suggested steps to rectify some common problems that may arise d
167 2. I am unable to surf the Internet. A. Make sure that the Ethernet cable is properly connecting your Cable/ADSL modem to the WAN port of th
168 ♦ For Netscape 4.7 or later versions Start Netscape Navigator. From the Edit menu bar, select Preferences, then Advanced, and finally Pro
169 If it does, click on it and press the Properties button. Check whether Device Status displays this message “This device is working properl
170 Appendix D Command Line Interface Commands Get Operation List SYNTAX DESCRIPTION Get tasks Display all active process/tasks. Get sysinfo Di
171 TX Rate SYNTAX DESCRIPTION Set txrate <string> Values are: (default auto) (802.11a)-- 6, 9, 12, 18, 24, 36, 48, 54, auto (802.11b/g m
172 {CTRY_EL_SALVADOR, "SV" }, {CTRY_ESTONIA, "EE" }, {CTRY_FINLAND, "FI" }, {CTRY_FRANCE, "
173 {CTRY_SPAIN, "ES" }, {CTRY_SWEDEN, "SE" }, {CTRY_SWITZERLAND, "CH" }, {CTRY_SYRIA, "
174 WLAN State SYNTAX DESCRIPTION Get wlanstate Display whether status of current wireless operation is Enabled or Disabled. Set wlanstate enabl
13 6 Rest Feet These rest feet hold the access point in the standing position. 7 External Antennas SMA antennas 8 R232 (Integrated Serial I
175 Appendix E Glossary of Terms List of Commonly Used Terms 10Base-T An IEEE Ethernet standard for 10Mbps data transmission using unshielde
176 DSSS Direct Sequence Spread Spectrum is a modulation scheme employed by the 802.11b standard that uses a chipping code (redundant bit
177 protocol allow a host to inform its local access point, using Host Membership Reports, that it wants to receive messages addressed to a spec
178 PPTP Point-to-Point Tunneling Protocol supports the creation of Virtual Private Networks by ensuring that messages transmitted from one V
179 WEP Wired Equivalent Privacy is a wireless data privacy encryption protocol based on a 64-bit or 128-bit shared key algorithm. WLA
180 Appendix F Technical Specifications Safety and Electromagnetic Conformance • FCC Part 15 SubPart B and SubPart C [for wireless module] •
181 Network Interface WAN Interface: 1 x 10/100 Mbps LAN Interface: 3 x 10/100 Mbps Power over Ethernet: 1 x PoE Security • 64 - bit /
182 Certifications • FCC • CE Mark • Gost • C-tick N 12030 Environment Requirements Operating Temp: Storage Temp: Operating Humidity: 0
14 ! NOTE: Although the Ethernet ports are numbered 1 to 4, they DO NOT have to be connected sequentially. For example: in a network
© Copyright 2006 Compex Systems Pte Ltd All Rights Reserved This document contains information that is protected by copyright. Reproduction, adapt
15 Chapter 3: Hardware Setup The access point can be powered using either the power adapter, or PoE* or IEEE 802.3af PoE. The installation proc
16 Insert one end of the RJ45 Ethernet cable to any of the LAN ports (1, 2, 3, or 4) on the access point and the other end to your PC’s Ethernet
17 Option 2: Using PoE to Supply Power PoE (Power-Over-Ethernet) can be used to power the access point. This accessory supplies operational power
18 Connect the RJ45 Ethernet cable attached to the PoE Injector to your PC’s Ethernet network adapter. Once you have finished configuring the a
19 Turn on your power supply. Notice that the Power LEDs have lighted up. This indicates that the access point is receiving power through the Po
20 Chapter 4: Accessing the Web Interface This chapter consists of the following: Overview of alternatives to access the web interface How
21 After installation, your PC will automatically detect connected products. Double-click on the uConfig utility icon to run the program. Runn
22 How to Browse to the Web Interface Browsing to the web interface You will then reach the home page of the access point
23 Chapter 5: Setting up a WLAN This chapter applies exclusively to Wireless Setup (a/b/g) and Wireless Setup (b/g). Wireless Setup (a/b/g) s
24 Operation Modes Access Point Mode This is the default mode of your access point. The Access Point mode enables you to bridge wireless clients
FCC Compliance Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. This devi
25 Client Mode In Client mode, the device acts as a wireless Client. When connected to an access point, it will create a network link between th
26 Wireless Routing Client Mode An application of this mode would be for the Ethernet port of the Wireless Routing Client to be used for connecti
27 Transparent Client Mode In Transparent Client Mode, the access point provides connection with an AP* acting as Root AP. This operation mode i
28 Difference Between other client modes and Transparent Client Mode Other client modes Transparent Client Mode Connectivity with any standard A
29 To Set Up a Wireless LAN Follow these steps to setup your wireless LAN. WLAN Setup (a/b/g) Click on WLA
30 Operation Mode : These operation modes are supported: • Access Point • Client Mode • Wireless Routing Client •
31 Wireless mode : Select from the list of wireless modes available: 802.11a (not supported by WLAN Setup for b/g) This mode support
32 Point-to-Point & Point-to-MultiPoint Setup You can implement Point-to-Point connection by simply setting one access point as RootAP in Ac
33 RRoooottAAPP SStteepp 22:: Select AAcctt aass RRoooottAAPP, click on the AAppppllyy button and reboot your device to let your changes tak
34 Follow these steps to setup Transparent Client/s. TTrraannssppaarreenntt CClliieenntt SStteepp 11:: Click on WWLLAANN SSeettuupp from the
Technical Support Information The warranty information and registration form are found in the Quick Install Guide. For technical support, you may
35 TTrraannssppaarreenntt CClliieenntt SStteepp 22:: Select the RReemmoottee AAPP MMAACC checkbox. Enter the RReemmoottee AAPP MMAACC.
36 Channel Survey Follow these steps to perform a channel survey to get the recommended channel for the access point. Channel Survey Click
37 Channel Survey This table describes the read-only parameters of all channels that can be viewed from the Channel Survey page. Parameters
38 How to Make Your WLAN More Secure All your network clients MUST share the same wireless settings as the access point to be able to communicat
39 WPA2 Enterprise WPA2 Enterprise mode implements the full IEEE 802.11i standard and 802.1X authentication. There MUST be a RADIUS server on
40 The subsequent sections illustrate how to configure each security mode. Begin with following the two common preliminary steps shown below to
41 How to Setup WEP WEP You can define up to 4 WEPkeys. For each key, you can specify: The Key Entry Method, byselectin
42 For hexadecimal key entry: 1. Select the Hex radio button. 2. Select the radio button ofthe k
43 For ASCII key entry: 1. Select the ASCII radiobutton. 2. Select the radio buttonof the key to beentered. 3. Select the keyencryp
44 How to Setup 802.1x 802.1x 1. Key in the IP address of thePrimary RADIUS S
About This Document This document may be superseded, in which case you may find its latest version at: http://www.compex.com.sg The product desc
45 How to Setup WPA Enterprise Modes Follow these steps to setup the access point to use WPA Enterprise, WPA2 Enterprise, and WPA Auto Enterprise
46 How to Setup WPA Personal Follow these steps to setup the access point for using WPA Personal, WPA2 Personal, and WPA Auto Personal. WPA Pers
47 Advanced WLAN Settings Follow these steps to change the radio settings of the access point. Editing Advanced Settings
48 6. Select whether to enable StationIsolation. This security feature implementsisolation, in order to prevent
49 Long Distance Parameters It is necessary to adjust the long distance parameters, only if the distance is 100 meters and beyond. Follow these s
50 1. Select whether to Enable or Disable Outdoor operation. 2. Enter Distance of the unit in meters. 3. Enter the SlotTime. 4. Enter the
51 WMM Wireless Multimedia (WMM) is a QoS (Quality of Service) standard in IEEE802.11E that we have adopted to improve and support the user expe
52 Follow these steps to change the setup Wireless Multimedia on your access point. Setting WMM Click WMM Settings. 1. Select
53 WMM Parameters (for advanced users) AIFs (Arbitrary Inter-Frame Space) Arbitrary Inter-Frame Space is the minimum wait time interval between
54 Statistics Follow these steps to view the WLAN detailed connections statistics per WLAN station. Statistics 1. Click on WLAN Setup (a/b/g
i TABLE OF CONTENTS © COPYRIGHT 2006 COMPEX SYSTEMS PTE LTD... I TRADEMARK INFORMATION ...
55 Virtual AP (Multiple SSID) Virtual AP implements mSSID (Multi-SSID) whereby a single wireless card can be setup with up to 16 virtual AP conne
56 Virtual AP 1. Click on WLAN Setup (a/b/g) from the CONFIGURATION menu. 2. Select Virtual AP. Virtual AP List page dis
57 Preferred APs (Only available in Client Mode) When there is more than one AP with the same SSID, the Preferred APs function allows you defin
58 Antenna Alignment The Antenna Alignment function helps you find the best alignment for the access point antenna by measuring the quality of th
59 Chapter 6: Configuration This chapter describes the different features of the access point and explains how to customise them to meet your ne
60 respectively, the DHCP End IP Address should be 192.168.168.X where X is any value from 2 to 254. It is preset as 192.168.168.254. DHCP Gat
61 Setting Up Your LAN Follow these steps to change the values and customise them for your LAN settings. LAN Setup Click
62 To View the Active DHCP Leases Follow these steps to display the active IP address leases allocated by the built-in DHCP server. To view the
63 To Reserve Specific IP Addresses for Predetermined DHCP Clients You can reserve a fixed IP address for a predetermined client (identified by i
64 If you do not need the DHCPserver to reserve an IP addressanymore, you can delete theDHCP Server Reservation: 1. Select the reserved IPad
ii How to Setup WPA Enterprise Modes ...45 How to Setup WPA Personal ...
65 Spanning Tree Protocol Spanning Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops
66 STP Status: Spanning Tree Protocol (STP) function makes your network more resilient to link failure and avoids loop formation. Priority: S
67 MAC Filtering MAC Filtering acts as a security measure by controlling the users accessing to the network through their MAC address. Each WLAN
68 Add a MAC address to the MAC Address List. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Addr
69 SStteepp 22:: MAC Filter Address List page displays. Click the AAdddd button. SStteepp 33:: Add MAC Address page displays.
70 SStteepp 44:: Enter the MAC Address of the client in the format xx-xx-xx-xx-xx-xx, where x can take any value in the range 0-9 or a-f. E
71 Delete a MAC address from all access points. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Ad
72 SStteepp 33:: MAC Filter Address List page displays with updated MAC Address List.
73 Delete a MAC address from individual access point. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)).
74 SStteepp 33:: MAC Filter Address List page displays with updated MAC Address List.
iii To Setup a De-Militarised Zone Host ...107 To Setup Port Forwarding...
75 Edit MAC address from the MAC Address List. SStteepp 11:: Select MMAACC FFiilltteerriinngg from WWLLAANN SSeettuupp((aa//bb//gg)). MAC Add
76 SStteepp 33:: The Edit MAC Address page displays. Edit the MAC address settings accordingly. Click SSaavvee. SStteepp 44:: MAC Filter
77 Chapter 7: Security Configuration The Security Configuration chapter covers: Firewall Configuration Firewall Logs Packet Filtering
78 Firewall Configuration Follow these steps to configure the firewall. Firewall Configuration 1. Enable the firewall. You c
79 5. More firewall rules can be added for specific security purposes. Rule Name : Enter a unique name to identify this firewall rule. Disp
80 it sends datagrams because of congestion. Redirect Informs the host of a preferred route. Time exceeded Indicates that the Time-to-Live (TTL
81 Check Options : This parameter refers to the options in the packet header. The available selection options are abbreviated as follows: SEC
82 1. Rule Number ranges from 1 to40. Precedence is determined inascending order such that rule
83 9. Similarly, determine theDestination Port. 10. Select from Check Options. 11. Select whether to
84 Firewall Logs As described previously, from the Firewall Configuration page the data traffic to be logged by the access point can be defined.
iv HOW IT WORKS...165 Appendix C: Troubleshooting.
85 Packet Filtering With Packet Filtering enabled, the access point examines all outgoing packets before deciding - according to predefined rules
86 Follow these steps to setup packet filtering. Packet Filtering Clicking Change select Packet Filter Type. Select from three
87 4b). From the IP Address dropdown list, select whether to apply the rule to: A Range of IP addresses. Defin
88 The format is HH:MM - where HH can take any value from 00 to 23, and MM can take any value from 00 to 59. Any time Both (From) and (T
89 URL Filtering The URL Filtering feature of the access point makes it easy to block certain websites from LAN users. URL Filtering
90 Selecting Allow In Host Name, enter the web site address to be blocked. For example: www.objectionableweb
91 Multicast Filtering This feature lets you allow or disallow streaming over the Internet, if you have registered to ISP services providing vi
92 Chapter 8: Enabling and Disabling Router The unit can operate either as: Access Point Access Point and Router (when routing is enabled)
93 Setting Up as Access Point Follow these steps to disable the unit as a router and switch back as an access point. Disable Router
94 Chapter 9: Router Setup This chapter describes the different features when it is set to operate as a router. Broadband Internet Using N
Commentaires sur ces manuels