ALCON ACP24 User Manual

ALCON ACP24 User Manual

802.11n/b/g wireless outdoor high power access point system

Advertisement

802.11n/b/g Wireless Outdoor
High Power Access Point
System
version 1.0
User Manual
Apply to:
ALCON ACP24
ALCON AMU24
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ACP24 and is the answer not in the manual?

Questions and answers

Summary of Contents for ALCON ACP24

  • Page 1 802.11n/b/g Wireless Outdoor High Power Access Point System version 1.0 User Manual Apply to: ALCON ACP24 ALCON AMU24...
  • Page 2 FCC Notices This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. CAUTION: Change or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.
  • Page 3 Revision History Version Date Notes 0.2.4 August , 2013 Initial Version 0.2.8 January , 2014 Add some features 0.3.2 April , 2014 Released version...
  • Page 4 AP Configuration Using Locator While entering the Locator utility, the Locator will automatically search the AP available on the same network. Locator will show the Device Name, Device Type, IP Address, Ethernet MAC Address and Firmware Version in first page. Before start using Locator, make sure you disable personal firewall installed in you PC.
  • Page 5 Enter the factory default User name and Password as: User Name: Admin Password: (leave blank) then click OK. You will enter the Utility homepage. Start Setup by Locator... 1. You just need to click on the Web icon in Locator main page. The Locator will launch a default browser for you and lead you into web UI directly.
  • Page 6 Wireless Configuration - AP Mode System Information – The default operation mode is AP mode. And the first page appears in main page will show System Status -> System Summary automatically, you can find detail system configuration in this page.
  • Page 7 Client List – Automatically, this page can help user to identify current devices who already associated to the AP Throughput – This page shows the throughput for both LAN and WAN. It refreshes every 5 seconds.
  • Page 8 System Log – Click Event Log, the device automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained.
  • Page 9 want to extend the range of your original AP. Pt(M)P Bridge mode allows Bridge point to point or point to multi-point network architecture, In order to establish the wireless link between bridge radios, the MAC address of remotes bridge(s) need to be registered in the address table. Enter the MAC address with format xx:xx:xx:xx:xx:xx (x is the hexadecimal digit).
  • Page 10 Otherwise, you can manually setup IP address.  IP Address – The IP address need to be unique to your network. We would like to recommend you stay with default IP address 192.168.x.x. This is private address and should work well with your original environment.
  • Page 11 Spanning Tree Settings – Click Spanning Tree Settings under System Configuration menu, Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. Spanning Tree Status: Choose to enable or disable the spanning tree feature. Bridge Hello Time: Specify the number of seconds for the hello time.
  • Page 12 In Wireless page, each option is described below Wireless Network - Wireless Network page allows you to configure the Wireless Mode, Channel / Frequency, SSID and Security etc.  Wireless Mode – Default setting is 802.11g/n HT20. This will support all 802.11g clients connect to the AP.
  • Page 13 Click Apply to save the changes.
  • Page 14 Wireless Security - The wireless security settings configure the security type of your wireless network. There are different wireless security mode options supported by the Access Point. In Wireless Security page, you can configure the AP to work with Disabled (means no security), WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2 and WPA-Mixed mode.
  • Page 15 choose usually means the encryption is stronger. After all changes are made, click Save to make sure all changes are saved into system. WPA-PSK stands for Wi-Fi Protected Access – Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment.
  • Page 16 the Access point how often it should change the encryption keys. Usually the security level will be higher if you set the period shorter to change encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page.
  • Page 17  Group Key Update Interval – This column indicate how often should the Access Point change the encryption key. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Wireless MAC Filter – In this page, you can filter the MAC address by allowing or blocking access the network.
  • Page 18  This table lists the blocked or allowed MAC addresses; you may delete selected MAC address or delete all the addresses from the table by clicking Delete. Remember to click Apply to make sure all the changes are saved to system. Wireless Advanced Settings - The page below can help users to configure advanced wireless setting.
  • Page 19  Transmit Power – You can reduce RF output power by selecting adjustable transmit power by 1dBm step from 28 to 3 dBm. Changing transmit power may decrease your wireless signal coverage. This feature can be helpful in restricting the coverage area of the wireless network. You can arrange the different data rate in distance in Access Point mode.
  • Page 21 Management Administration – In the administration page, you can modify the Name and Password for administrator. Changing the login user name and password is as easy as entering the string you wish in the column. Then enter the password in the second column to confirm.
  • Page 22 SNMP Settings– Under System Configuration, click SNMP to display and change settings for the Simple Network Management Protocol. To communicate with the access point, the SNMP agent must first be enabled and the Network Management Station must submit a valid community string for authentication.
  • Page 23 Backup/Restore and Reset to factory default Settings– In this section, you can Backup/Restore Setting and Revert to Factory Default Settings:  Save A Copy of Current Settings – Click Backup, the system will prompt you where to save the backup file. You can choose the directory to save your configuration file.
  • Page 24 Firmware Upgrade – Enter the location of the firmware upgrade file in the file path field, or click Browse to find the firmware upgrade file. Click Upgrade, and follow the instructions. The whole firmware upgrade process will take around 1 minute. Before upgrade, make sure you are using correct version.
  • Page 25 Time Settings – This page allows you to configure the time on the device. You may do this manually or by connecting to a NTP server.  Manually Set Date and Time: Setup the date and time  Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server.
  • Page 26 Log Settings – This page displays a list of events that are triggered on the Ethernet and Wireless interface. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes.
  • Page 27 Diagnostics –  Target IP: Specify the IP address you would like to search.  Ping Packet Size: Specify the packet size of each ping.  Number of Pings: Specify how many times of ping.  Traceroute Target: Specify an IP address or Domain name you would like to trace.
  • Page 28 Factory Default.
  • Page 29 Wireless Configuration – Pt(M)P Bridge Mode (Point to Point & Point to Multi-Point) Pt(M)P Bridge is used for wirelessly connect several Access Points, and in doing so extend a wired infrastructure to locations where cabling is not possible or inefficient to implement (be sure you understand the purpose of bridge mode before proceed configuration).
  • Page 30 Considerations before installation –  Loop Prevention – Be careful to plan you Wireless Bridge connections, prevent your wireless network topology to have loop. Once loop shows up, you network traffic will become unstable.  Performance – The system can support up to 8 Wireless Bridge links. But all links and wireless stations that operate at the same time will all share single radio bandwidth (Ex.
  • Page 31 Wireless Bridge (WDS) Security – Wireless Bridge (WDS) now only supports limit wireless security protocol. Here lists Wireless Bridge (WDS) security settings below:  None – Both Point to Point and Point to Multi-Point traffic transmit without encryption.  AES – Both Point to Point and Point to Multi-Point traffic are encrypted by the same AES key.
  • Page 32 After all changes are made, click Apply to save into system.
  • Page 33 Wireless Configuration – Wireless Client Mode This device can also work as a client device. In order to setup this device to work in such mode, you need to choose Wireless Client mode and click Apply. After the system reboot is done, you can see the page as below. Status page show the device is now working in Wireless Client mode.
  • Page 34 Connection Status - This column show current connection status. If this device already connects to an Access Point or station, here will show the MAC address of the associated Access Point or station. Otherwise, connection column will show N/A which means no connection to any Access Point or station. ...
  • Page 35 Wireless Setting  Wireless Client Type – Default setting is Universal Client which will send out the MAC address of this device. The WDS Client, on the other hand, will send out the MAC address which connected to the device. ...
  • Page 36 After you determine which AP (SSID) to join, you can click on the BSSID column your want to choose. The system will automatically join the SSID you specified after reboot.
  • Page 37 Wireless Security – WEP is a basic encryption method, which is not as secure as WPA. To use WEP as a client, you will need to enter a transmit key and a level of WEP encryption exactly the same as the Access Point. ...
  • Page 38 WPA-PSK stands for Wi-Fi Protected Access – Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment. WPA can provide better security level than WEP without difficult setting procedure.  Encryption – there are two encryption methods: TKIP and AES, with dynamic encryption keys.
  • Page 40 Wireless Configuration – Repeater Mode When you set the device to Repeater mode, the device is able to talk with one remote access point within its range and retransmit its signal. In order to setup the device to work in such mode, you need to choose Repeater and click Apply in System Settings page.
  • Page 41 After enable the repeater mode, you can click Wireless Network and choose Site Survey to pick one of the SSIDs you would like to retransmit its signal (please be awarded that while using the repeater mode, the throughput performance maybe nearly only half compare with access point mode. Because the repeater needs to communicate with original AP and also the clients associate to the repeater at the same time).
  • Page 42 After Site Survey, you can choose the Access Point you need to extend its range by clicking BSSID column. Then click Apply to make sure system working properly with new setting. After all the changes are made, you can check the Connect Status page to check current SSID and link quality / signal strength.
  • Page 43 WEP is a basic encryption method, which is not as secure as WPA. To use WEP, you will need to select a default transmit key and a level of WEP encryption.  Auth Type: Select an authentication method. Options available are Open System or Shared Key.
  • Page 44  Default Key: You may use up to four different keys for four different networks. Select the current key that will be used.  Key table – You can enter 4 different WEP encryption keys into the table and by choosing the radio button to decide which one is valid now. The AP supports 64, 128 and 152bit key length.
  • Page 45 encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page.
  • Page 46 Appendix A: Notice Please refer to the following system grounding diagram for your installation reference. When in doubt, refer to the NEC code to determine proper grounding techniques. For detailed information regarding grounding the outdoor wireless system.

This manual is also suitable for:

Amu24

Table of Contents