Page 1
802.11n/b/g Wireless Outdoor High Power Access Point System version 1.0 User Manual Apply to: ALCON ACP24 ALCON AMU24...
Page 2
FCC Notices This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. CAUTION: Change or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.
Page 3
Revision History Version Date Notes 0.2.4 August , 2013 Initial Version 0.2.8 January , 2014 Add some features 0.3.2 April , 2014 Released version...
Page 4
AP Configuration Using Locator While entering the Locator utility, the Locator will automatically search the AP available on the same network. Locator will show the Device Name, Device Type, IP Address, Ethernet MAC Address and Firmware Version in first page. Before start using Locator, make sure you disable personal firewall installed in you PC.
Page 5
Enter the factory default User name and Password as: User Name: Admin Password: (leave blank) then click OK. You will enter the Utility homepage. Start Setup by Locator... 1. You just need to click on the Web icon in Locator main page. The Locator will launch a default browser for you and lead you into web UI directly.
Page 6
Wireless Configuration - AP Mode System Information – The default operation mode is AP mode. And the first page appears in main page will show System Status -> System Summary automatically, you can find detail system configuration in this page.
Page 7
Client List – Automatically, this page can help user to identify current devices who already associated to the AP Throughput – This page shows the throughput for both LAN and WAN. It refreshes every 5 seconds.
Page 8
System Log – Click Event Log, the device automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained.
Page 9
want to extend the range of your original AP. Pt(M)P Bridge mode allows Bridge point to point or point to multi-point network architecture, In order to establish the wireless link between bridge radios, the MAC address of remotes bridge(s) need to be registered in the address table. Enter the MAC address with format xx:xx:xx:xx:xx:xx (x is the hexadecimal digit).
Page 10
Otherwise, you can manually setup IP address. IP Address – The IP address need to be unique to your network. We would like to recommend you stay with default IP address 192.168.x.x. This is private address and should work well with your original environment.
Page 11
Spanning Tree Settings – Click Spanning Tree Settings under System Configuration menu, Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. Spanning Tree Status: Choose to enable or disable the spanning tree feature. Bridge Hello Time: Specify the number of seconds for the hello time.
Page 12
In Wireless page, each option is described below Wireless Network - Wireless Network page allows you to configure the Wireless Mode, Channel / Frequency, SSID and Security etc. Wireless Mode – Default setting is 802.11g/n HT20. This will support all 802.11g clients connect to the AP.
Page 14
Wireless Security - The wireless security settings configure the security type of your wireless network. There are different wireless security mode options supported by the Access Point. In Wireless Security page, you can configure the AP to work with Disabled (means no security), WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2 and WPA-Mixed mode.
Page 15
choose usually means the encryption is stronger. After all changes are made, click Save to make sure all changes are saved into system. WPA-PSK stands for Wi-Fi Protected Access – Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment.
Page 16
the Access point how often it should change the encryption keys. Usually the security level will be higher if you set the period shorter to change encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page.
Page 17
Group Key Update Interval – This column indicate how often should the Access Point change the encryption key. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Wireless MAC Filter – In this page, you can filter the MAC address by allowing or blocking access the network.
Page 18
This table lists the blocked or allowed MAC addresses; you may delete selected MAC address or delete all the addresses from the table by clicking Delete. Remember to click Apply to make sure all the changes are saved to system. Wireless Advanced Settings - The page below can help users to configure advanced wireless setting.
Page 19
Transmit Power – You can reduce RF output power by selecting adjustable transmit power by 1dBm step from 28 to 3 dBm. Changing transmit power may decrease your wireless signal coverage. This feature can be helpful in restricting the coverage area of the wireless network. You can arrange the different data rate in distance in Access Point mode.
Page 21
Management Administration – In the administration page, you can modify the Name and Password for administrator. Changing the login user name and password is as easy as entering the string you wish in the column. Then enter the password in the second column to confirm.
Page 22
SNMP Settings– Under System Configuration, click SNMP to display and change settings for the Simple Network Management Protocol. To communicate with the access point, the SNMP agent must first be enabled and the Network Management Station must submit a valid community string for authentication.
Page 23
Backup/Restore and Reset to factory default Settings– In this section, you can Backup/Restore Setting and Revert to Factory Default Settings: Save A Copy of Current Settings – Click Backup, the system will prompt you where to save the backup file. You can choose the directory to save your configuration file.
Page 24
Firmware Upgrade – Enter the location of the firmware upgrade file in the file path field, or click Browse to find the firmware upgrade file. Click Upgrade, and follow the instructions. The whole firmware upgrade process will take around 1 minute. Before upgrade, make sure you are using correct version.
Page 25
Time Settings – This page allows you to configure the time on the device. You may do this manually or by connecting to a NTP server. Manually Set Date and Time: Setup the date and time Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server.
Page 26
Log Settings – This page displays a list of events that are triggered on the Ethernet and Wireless interface. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.
Page 27
Diagnostics – Target IP: Specify the IP address you would like to search. Ping Packet Size: Specify the packet size of each ping. Number of Pings: Specify how many times of ping. Traceroute Target: Specify an IP address or Domain name you would like to trace.
Page 29
Wireless Configuration – Pt(M)P Bridge Mode (Point to Point & Point to Multi-Point) Pt(M)P Bridge is used for wirelessly connect several Access Points, and in doing so extend a wired infrastructure to locations where cabling is not possible or inefficient to implement (be sure you understand the purpose of bridge mode before proceed configuration).
Page 30
Considerations before installation – Loop Prevention – Be careful to plan you Wireless Bridge connections, prevent your wireless network topology to have loop. Once loop shows up, you network traffic will become unstable. Performance – The system can support up to 8 Wireless Bridge links. But all links and wireless stations that operate at the same time will all share single radio bandwidth (Ex.
Page 31
Wireless Bridge (WDS) Security – Wireless Bridge (WDS) now only supports limit wireless security protocol. Here lists Wireless Bridge (WDS) security settings below: None – Both Point to Point and Point to Multi-Point traffic transmit without encryption. AES – Both Point to Point and Point to Multi-Point traffic are encrypted by the same AES key.
Page 32
After all changes are made, click Apply to save into system.
Page 33
Wireless Configuration – Wireless Client Mode This device can also work as a client device. In order to setup this device to work in such mode, you need to choose Wireless Client mode and click Apply. After the system reboot is done, you can see the page as below. Status page show the device is now working in Wireless Client mode.
Page 34
Connection Status - This column show current connection status. If this device already connects to an Access Point or station, here will show the MAC address of the associated Access Point or station. Otherwise, connection column will show N/A which means no connection to any Access Point or station. ...
Page 35
Wireless Setting Wireless Client Type – Default setting is Universal Client which will send out the MAC address of this device. The WDS Client, on the other hand, will send out the MAC address which connected to the device. ...
Page 36
After you determine which AP (SSID) to join, you can click on the BSSID column your want to choose. The system will automatically join the SSID you specified after reboot.
Page 37
Wireless Security – WEP is a basic encryption method, which is not as secure as WPA. To use WEP as a client, you will need to enter a transmit key and a level of WEP encryption exactly the same as the Access Point. ...
Page 38
WPA-PSK stands for Wi-Fi Protected Access – Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment. WPA can provide better security level than WEP without difficult setting procedure. Encryption – there are two encryption methods: TKIP and AES, with dynamic encryption keys.
Page 40
Wireless Configuration – Repeater Mode When you set the device to Repeater mode, the device is able to talk with one remote access point within its range and retransmit its signal. In order to setup the device to work in such mode, you need to choose Repeater and click Apply in System Settings page.
Page 41
After enable the repeater mode, you can click Wireless Network and choose Site Survey to pick one of the SSIDs you would like to retransmit its signal (please be awarded that while using the repeater mode, the throughput performance maybe nearly only half compare with access point mode. Because the repeater needs to communicate with original AP and also the clients associate to the repeater at the same time).
Page 42
After Site Survey, you can choose the Access Point you need to extend its range by clicking BSSID column. Then click Apply to make sure system working properly with new setting. After all the changes are made, you can check the Connect Status page to check current SSID and link quality / signal strength.
Page 43
WEP is a basic encryption method, which is not as secure as WPA. To use WEP, you will need to select a default transmit key and a level of WEP encryption. Auth Type: Select an authentication method. Options available are Open System or Shared Key.
Page 44
Default Key: You may use up to four different keys for four different networks. Select the current key that will be used. Key table – You can enter 4 different WEP encryption keys into the table and by choosing the radio button to decide which one is valid now. The AP supports 64, 128 and 152bit key length.
Page 45
encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page.
Page 46
Appendix A: Notice Please refer to the following system grounding diagram for your installation reference. When in doubt, refer to the NEC code to determine proper grounding techniques. For detailed information regarding grounding the outdoor wireless system.
Need help?
Do you have a question about the ACP24 and is the answer not in the manual?
Questions and answers