ALTAI A2 Configuration Manual

ALTAI A2 Configuration Manual

Wifi access point/bridge
Hide thumbs Also See for A2:
Table of Contents

Advertisement

20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc
Altai A2 WiFi Access Point/Bridge
Configuration Manual
for

Firmware Version 1.0.6.48

Version 1.1
Date: December 17, 2012
Commercially Confidential
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the A2 and is the answer not in the manual?

Questions and answers

Summary of Contents for ALTAI A2

  • Page 1: Firmware Version

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Altai A2 WiFi Access Point/Bridge Configuration Manual Firmware Version 1.0.6.48 Version 1.1 Date: December 17, 2012 Commercially Confidential...
  • Page 2 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Copyright © 2012 Altai Technologies Limited ALL RIGHTS RESERVED. Altai Technologies Limited Unit 209, 2 Floor, East Wing, Building 17, Phase 2, Hong Kong Science Park, Shatin, New Territories, Hong Kong Telephone: +852 2116 8087 Fax: +852 2607 4021 Web: www.altaitechnologies.com...
  • Page 3 Disclaimer All specifications are subject to change without prior notice. Altai Technologies assumes no responsibilities for any inaccuracies in this document or for any obligation to update information in this document. This document is provided for information purposes only. Altai Technologies reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
  • Page 4: Table Of Contents

    Check Access ..........................11 ...................... 12 CONFIGURATION WITH DMIN Web Browser Connection ......................12 Checking the A2 Versions ......................13 Setup – User Name, Password and System Name ..............14 Regulatory Domain Configuration ................... 14 NTP Configuration ........................15 SNMP Configuration ........................ 15 QoS Mode And Diffserv Tagging ....................
  • Page 5 ROTOCOL ROPERTIES IN INDOWS NTP C ..........................15 IGURE ONFIGURATION 10 SNMP C .......................... 15 IGURE ONFIGURATION A2 ............................17 IGURE TELNET TO 12 T ................17 IGURE YPE IN THE SERNAME AND ASSWORD OF TELNET A2 ............18 IGURE...
  • Page 6 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Manual Conventions Bold type within paragraph text indicates commands, files names, Bold directory names, paths, output, or returned values. Within commands, italics indicate a variable that the user must specify. Italic Titles of manuals or other published documents are also set in italics. _____ Underline means that the words you have to pay attention.
  • Page 7: Introduction

    By adopting MIMO technology, Altai A2 provides up to 300Mbps data rate to 802.11n clients. ARGE APACITY Altai A2 has two radios. Both radios can work as access radio to enhance the total capacity of A2 unit and as backhaul link. IFFERENT...
  • Page 8: Getting Start

    TART ETUP OCAL ONNECTION ON Altai A2 can be connected with your PC in wireless mode. In the followings, wireless mode will be introduced. Please kindly refer to the Altai A2 Installation Guide. Start Network Configuration on your PC. For Windows XP user, 1.
  • Page 9: Figure 2 Network Connections In Windows Xp

    5. Marking the “Internet Protocol (TCP/IP)” and click the “Properties”. 6. Type in an “IP address”, for example, 192.168.1.2, which is under the same subnet as the Default IP address of A2 (192.168.1.20). 7. Using the default “Subnet mask” (default: 255.255.255.0) setting at the first time.
  • Page 10: Figure 4 Internet Protocol (Tcp/Ip) Properties In Windows Xp

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 4 Internet Protocol (TCP/IP) Properties in Windows XP 11. Right-click on the “Wireless Network Connection” and select “View Available Wireless Networks”. Figure 5 Network Connections in Windows XP Commercially Confidential...
  • Page 11: Check Access

    NOTE: Using the same PC to ping different Altai A2 may cause ping failure. This is because the Altai A2 has the same default IP address but different MAC addresses. You need to type a command “arp –d” in DOS mode to clear ARP table on PC before each ping.
  • Page 12: Configuration With Eb Dmin

    A2 can be accessed through a Web Browser, for example, Internet Explorer (IE). 1. Open an IE session and type the IP address of the A2. Example: https://192.168.1.20, where 192.168.1.20 is the A2’s IP address. The A2 default IP Address is 192.168.1.20.
  • Page 13: Checking The A2 Versions

    3. Figure . A Menu Bar is located on the left hand side of the IE window. Different configurations can be chosen through the menu bar. Figure 8 Web-admin Login Page A2 V HECKING THE ERSIONS The running version can be checked by selecting About under Administration in the menu bar.
  • Page 14 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Firmware Version: v1.0.6.48 Figure 9 Firmware version of A2 Commercially Confidential...
  • Page 15: Setup - User Name, Password And System Name

    Password. Note: it is need to re-enter to confirm the password. Please press Change Password button to store the new password. The System Name is the name of A2. NOTE: Click the Update icon to store the changed settings.
  • Page 16: Ntp Configuration

    IP address by default. If NTP is needed, IP address of the NTP server must be added and A2 will synchronize with the NTP server. This measure is useful to maintain the network and make sure all APs using the same system time by setting the same NTP server.
  • Page 17: Qos Mode And Diffserv Tagging

    NOTE: Click the Update icon to store the changed settings. ELNET Administrator can login to the A2 by telnet command in Command Prompt via Ethernet or WiFi. For example, to telnet A2 with IP address of 192.168.1.20; telnet command is “telnet 192.168.1.20 2223”...
  • Page 18: Network Operation Mode

    ETWORK PERATION The default setting for the Network Operation Mode is Switch Mode. If the A2 is set to Switch Mode, it acts as a switch and routes traffic between the DS and wireless clients accordingly. When it is in Gateway mode, it acts as a gateway and the Local IP Address and Local IP Address Mask information must be entered to specify the A2 local interface for serving the wireless client.
  • Page 19: Switch Mode

    4.11 S WITCH 4.11.1 Static IP address In IP Assignation, there are two kinds of mode for A2: Static IP address and DHCP Client. In Switch mode, by clicking Network Configuration in the System page, users can configure the Address,...
  • Page 20: Figure 15 Network Configurations Under Gateway Mode

    NOTE: It is not recommended enabling DHCP client to allocate the IP address for A2 due to the fact that DHCP server may assign a dynamic IP address to the A2. Users associate A2 web-admin pages impossibly as the A2 IP address is unknown...
  • Page 21: Gateway Mode

    Default setting is "Ethernet". This control is used to specify the WAN interface. The Ethernet interface or 5G bridge interfaces can be used as the WAN interface when the A2 works in AP mode. Use the pull down menu to select either one. The 2.4G Radio Client interface is used as the WAN interface when the A2 works in Station mode.
  • Page 22: Figure 17 Configure Dhcp Server

    When last attempt failed, A2 will attempt to establish the PPPoE connection at Redial Period. 4.12.2 DNS Auto Update By setting DNS Auto Update to “Enabled” and clicking the icon Update, the A2 will acquire a DNS Server IP address via the DHCP Server after rebooting. User need not to set a DNS Server IP Address manually.
  • Page 23: Figure 18 Configure Dhcp Server Disable

    In Gateway Mode, A2 can be a DHCP server, a DHCP relay or none of them. When the DHCP Server Mode sets to Server, the A2 will act as a DHCP server and use the settings specified in the field Start IP Address, Maximum Number of DHCP Users and DNS to serve the wireless clients.
  • Page 24: Network Provider

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 14 Configure DHCP Server Disable 4.13 N ETWORK PROVIDER Network Provider is to build in Ethernet Virtual Interface. It is designed to establish a layer 2 tunnel with Ethernet Virtual Interface Concentrator. Ethernet Virtual Interface Concentrator has a trunk interface that connects to multiple VLAN (Network Provider) Ethernet Virtual Interface in Access Point will pick up all Layer 2 traffic that are generated by users, encapsulate it in an IP packet and forward it to the Ethernet Virtual Interface Concentrator (EVIC).
  • Page 25: Access Link Safe Mode/ Backhaul Link Self-Healing

    For example, when default backhaul is set to 5GHz Radio, once the 5GHz Bridge link is broken down, A2 will try Ethernet end as its new backhaul. Default setting is Disabled. After enabled the Backhaul Link Self-Healing, Default Backhaul Link can be configured.
  • Page 26 Wireless Radio Parameter Configuration 4.17.1 Wireless Mode and Radio Frequency Altai A2 can offer 2.4GHz radio access, the following tables list the operation mode and available frequency under the particularly wireless mode. Default setting of AP mode radio is working on 2.4GHz 300Mbps (802.11n HT 40ext ch+1) and default channel is channel 6 (2437MHz).
  • Page 27 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc 4.17.2 Auto Channel Selection By default, the Auto Channel Selection is disabled; the A2 is fixed on Channel 6. When Enabled of Auto Channel Selection is chosen, A2 can scan all available radio channels which are assigned to the regulatory domain. The “cleanest” channel is then selected as the operating channel.
  • Page 28: Figure 22 Vap Setting

    4.17.6 Service Set IDentifier (SSID) and Virtual Access Point (VAP) In order for the A2 and mobile clients to communicate, all of them must be configured to use the same SSID for communication both at the VAP and clients ends. SSID broadcast can be disabled by selecting Suppress SSID.
  • Page 29: Figure 24 Wireless Radio Security Configuration

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 172 VAP Setting 4.17.7 Access Control List (ACL) By selecting Access Configurations, a window, as shown in Figure 3, is brought up for choosing the ACL mode, adding MAC Address with ACL Type (Allow or Deny). There are three modes in the Access Control List (ACL). They are Disabled, Enabled-Allow and Strict-Deny: 1.
  • Page 30: Figure 25 Wep Key Settings

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 23 4.17.8 Encryption and Authentication By selecting Security Configurations, a window, as shown in Figure 184, is brought up for choosing the Authentication Mode and Cipher Mode. Figure 184 Wireless Radio Security Configuration After selecting Open or Shared-Key for Authentication Mode, WEP for Cipher Mode, the WEP key settings can be defined as shown in Figure 195.
  • Page 31: Figure 27 Wpa-Psk Settings

    RADIUS server port is 1812. RADIUS secret shared password between the RADIUS server and A2. A password up to 128 characters long can be added. The VLAN IP address and VLAN Subnet Mask configured on the VAP security web page will be used only when A2 runs in the following conditions.
  • Page 32: Figure 28 Station Mode Configuration

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc 3. The authentication mode is WPA. Figure 217 WPA-PSK Settings Commercially Confidential...
  • Page 33: Cpe Mode

    There are three different station modes: NAT mode, WDS mode and MAC address translation mode (MAT mode). When station works in NAT mode, A2 works in Gateway mode and the Station mode VAP is enabled. Repeater works in WDS mode when WDS is enabled and A2 works in Station mode.
  • Page 34: Repeater Mode

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc 4.19 R EPEATER The 2.4GHz Radio Repeater Mode is the combination of both AP mode and CPE Mode. CPE mode configuration can be found in the Remote VAP and AP Configuration in VAP 1-15 as shown in Figure 29. Figure 239 Repeater Mode Configuration 4.20 B...
  • Page 35 A2 can work under either 802.11a mode or 802.11na mode by selecting on pulling down list. If A2 is set to 802.11a mode, A2 allows only 802.11a bridges to connect as peers, if A2 work in 802.11a turbo static mode, A2 will allows only same 802.11na bridges to connect as peers.
  • Page 36 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc 5GHz Radio Mode Data Rate Channels 802.11a 54 Mbps 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161 802.11na HT20 130 Mbps 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 149, 153, 157, 161 802.11na HT40ext ch+1 300 Mbps 52, 60, 100, 108, 116, 124, 132, 149, 157...
  • Page 37: Figure 31 Advanced Bridge Radio Setting

    The power for 5GHz Radio is set in this area. The value of the Transmit Power depends on both the gain of the 5GHz antenna and the Max EIRP allowed by the country in which A2 is used. The Transmit Power can be configured within the given range (10 - 23dBm).
  • Page 38 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 24 Advanced Bridge Radio Setting Commercially Confidential...
  • Page 39: Figure 32 Bridge Encryption Setting

    Mbps) than commonly used (6 Mbps at IEEE 802.11g/a mode). This is ALTAI's A2 proprietary feature thus it may be incompatible with the devices from other vendors. Both A2 based devices the sender and the receiver must have the same Multicast Rate configured in order to achieve better multicast packet throughput performance RTS/CTS Threshold: RTS is a flow control mechanism to prevent collision between 802.11b...
  • Page 40: Disable Mode

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 252 Bridge encryption setting_AES 4.21 D ISABLE The particular radio of A2 can be disabled by click the Disable icon. There is no need to configure the Transmit Power and Advanced Settings. Commercially Confidential...
  • Page 41: Reboot

    Reboot under Administration in the menu bar. It is required to select Reboot A2 WiFi Access Point/Bridge to confirm this action, as shown in Figure 27. When the A2 is rebooting, a message “Please wait... A2 WiFi Access Point/Bridge is Rebooting”...
  • Page 42: Restore Configuration To Default Setting

    Default (address retained) or Reset to Factory Default, as shown in Figure . Please reboot the A2 afterwards. Note: after resetting to factory default without address retained, please type <https://192.168.1.20> to open A2 web-admin. Figure 29 Reset to Factory Default Setting in Web-admin...
  • Page 43: Erformance Anagement Onitoring In Eb Dmin

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc ERFORMANCE ANAGEMENT ONITORING IN DMIN YSTEM The statistics can be monitored by selecting System under Status in the menu bar. All details are shown on the window, as shown in Figure . Figure 30 Details of the system The status of each VAP can be shown by clicking Vap under the field of Wireless Radio, as shown in Figure .
  • Page 44 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 31 Statuses of the Vaps The status and MAC address of each remote bridge can be shown by selecting Remote Bridge under the field of 5GHz Radio, as shown in Figure 32. Figure 32 Statuses of the Remote Bridges Commercially Confidential...
  • Page 45: Clients Statistics

    Click the Start Scan button to initialize the Channel Scan. A2 can detect Rogue AP by configuring Legitimate AP BSSID and Legitimate AP SSID. For example, the Legitimate AP SSID is set to “*voip”, then click the scan button. When scan status shows Success, then press Channel Scan Result.
  • Page 46: Radio Association-Ap Mode

    Figure 34. A more detailed 2.4GHz Association Statistic of each station can be brought up by selecting the related Mac Address as shown in Figure 35. Status Description Station ID, a number randomly generated by A2 to represent a mobile client Mac Address Station Mac Address...
  • Page 47: Figure 42 Radio Association Bridge List

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Figure 34 Radio Association Table Figure 35 Radio Statistics per MAC Address (data is cumulative) Commercially Confidential...
  • Page 48: Radio Association-Bridge Mode

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc ADIO SSOCIATION RIDGE The bridge radio association can be monitored by selecting 5G radio Association Bridge under the field of Status in the menu bar, as shown in Figure 36 Radio Association Bridge List and Figure 37. Figure 36 Radio Association Bridge List Figure 37 Bridge Association Statistics per MAC address...
  • Page 49: Software Upgrade Through Web -Admin And Customization

    3. If the firmware upgrade is successful, a window will appear as Figure 417. A2 will reboot automatically. 4. Type in URL with https://<ip address of A2>, note ‘http’ cannot link to the web admin of A2 under the new firmware version.
  • Page 50 Note: If press Reset to Factory Default with address retained, the IP address of A2 web-admin will not be changed after rebooting the AP. While Reset to Factory Default is chosen, IP address of A2 will be changed into 192.168.1.20 .
  • Page 51 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Successful Firmware Update – Web-admin Figure 417 Commercially Confidential...
  • Page 52: Glossary

    20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc LOSSARY 802.1q IEEE 802.1Q was a project in the IEEE 802 standards process to develop a mechanism to allow multiple bridged networks to transparently share the same physical network link without leakage of information between networks (i.e. trunking). IEEE 802.1Q is also the name of the standard issued by this process, and in common usage the name of the encapsulation protocol used to implement this mechanism over Ethernet networks.
  • Page 53 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc ad-hoc mode An 802.11 networking framework in which devices or stations communicate directly with each other, without the use of an Access Point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.
  • Page 54 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc DSSS Direct Sequence Spread Spectrum: One of two types of spread spectrum radio technology used in wireless LAN (WLAN) transmissions. To increase a data signal's resistance to interference, the signal at the sending station is combined with a higher-rate bit sequence that spreads the user data in frequency by a factor equal to the spreading ratio.
  • Page 55 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc special-purpose device that performs an application-layer conversion of information from one protocol stack to another. handoff The process of transferring the handling of that cellular call to the new base station. host address Logical address configured by an administrator or server on a device. Logically identifies this device on an internetwork.
  • Page 56 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc (BIA) of the local LAN interface. Variously called “hardware address”, “physical address”, “burned-in address” or “MAC-layer address”. Maximum Transmission Unit: The largest packet size, measured in bytes, that an interface can handle. NAT Network Address Translation: An algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet, regardless, by translating those addresses into globally routable address space.
  • Page 57 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc required secret, shared key is presumed to have been delivered to participating STAs via a secure channel that is independent of IEEE 802.11. During the shared key authentication exchange, both the challenge and the encrypted challenge are transmitted. This facilitates unauthorized discovery of the pseudorandom number (PRN) sequence for the key/IV pair used for the exchange.
  • Page 58 20130115_rev1.1_A2_Configuration_Manual_-_1.0.6.48.doc Wired Equivalent Privacy: A security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat protected by the physicalities of their structure, having some or all part of the network inside a building that can be protected from unauthorized access.

Table of Contents