Do you have a question about the CA8-PRO and is the answer not in the manual?
Questions and answers
Subscribe to Our Youtube Channel
Summary of Contents for Wistron CA8-PRO
Page 1
IEEE802.11 A/G Access Point User Guide V3, March 2008...
Page 2
Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise without the prior writing of the publisher. Windows ™ 95/98 and Windows ™ 2000 are trademarks of Microsoft ® Corp. Pentium is trademark of Intel.
Page 3
Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Introduction 1.1 Overview The 802.11A/G ACCESS POINT is an access-point based on IEEE 802.11a/g based 2.4-GHz and 5-GHz radio technology. It contains an 802.11a/g and three half/full-duplex 10/100 LAN interfaces. The 802.11A/G ACCESS POINT features a total of 6 wireless modes: Access Point, WDS Repeater, WDS Bridge, Client Infrastructure, Client Adhoc and WISP Router.
1.2 Features Compliant with 802.11a, 802.11b and 802.11g, Super A™ and Super G™ standards with roaming capability. Supports 6 wireless multi-function modes: Access Point, WDS Repeater, WDS Bridge, Client Infrastructure, Client Adhoc and WISP Router. Static assignment or DHCP client to set the device IP address. Multiple security measures: SSID hiding, Access Control List, WEP based encryption (64, 128, 152 bits), enhanced Security with 802.1x using a primary and a backup Radius Server with/without dynamic WEP keys,...
1.3.1 Access Point Mode When configured in the Access Point mode, the 802.11A/G ACCESS POINT allows a group of wireless stations to communicate with each other through it. Such a network is called an Infrastructure BSS. The 802.11A/G ACCESS POINT further provides bridging functions between the wireless network and the wired LAN network.
1.3.2 WDS Repeater Mode In Repeater mode, the 802.11A/G ACCESS POINT set as a repeater extends the range of wireless LAN. The remote wireless AP/Router must also support WDS. Note that an 802.11A/G ACCESS POINT runs in the WDS Repeater mode can also support wireless stations simultaneously.
1.3.4 Client Infrastructure Mode In Client Infrastructure mode, the 802.11A/G ACCESS POINT is connected to a computer and acts like a wireless station, so that the computer can wirelessly access the other network’s services, such as Internet. Client Mode AP Mode User can access Internet Router...
1.3.6 WISP Router Mode In WISP Router Mode, 802.11A/G ACCESS POINT is connected to several computers and acts like a Client mode AP. With IP sharing function, the computers can share the WISP connection via 802.11A/G ACCESS POINT. Computer Computer Outdoor Client Router...
1.4.1 STATIC IP The default IP address of the LAN interface of an 802.11A/G ACCESS POINT is a private IP address of 192.168.1.1, and a network mask of 255.255.255.0. This means IP addresses of other devices on the LAN should be in the range of 192.168.1.2 to 192.168.1.254.
Install the 802.11 A/G Access Point This section describes the installation procedure for the 802.11A/G ACCESS POINT. It starts with a summary of the content of the package you have purchased, followed by steps of how to power up and connect the 802.11A/G ACCESS POINT.
You can reset the Access Point’s Settings to factory defaults by pushing a paperclip in the RESET hole. Push and hold until the lights at the front of the Access Point are off. 2.3 Configuration steps This section describes configuration required for the 802.11A/G ACCESS POINT before it can work properly in your network.
POINT, the PC client may not be able to reach the ACCESS POINT. This is because they may no longer belong to the same IP network address space. Step 3. Change the setting of the PC back to “obtain IP addresses dynamically”.
Page 17
Otherwise, select Add to install it now. Step 4. In the new Network Component Type window, select Protocol. In the new Select Network Protocol window, select Microsoft in the Manufacturers area. Step 5. In the Network Protocols area of the same window, select TCP/IP, then click OK.
2.5 Front panel The LEDs on the front of the 802.11A/G ACCESS POINT reflect the operational status of the unit. The status of the LAN, the WLAN, and Power can be monitored from this display. POWER WLAN 802.11A/G Access Point LED Description Label WLAN POWER...
Basic Configuration This section describes the basic configuration procedure for the 802.11A/G ACCESS POINT. It describes how to set up the 802.11A/G ACCESS POINT for wireless connections, and the configuration of the local LAN environment. All basic configurations may be effected through a standard Web browser such as Microsoft Internet Explorer.
Log On If you attempt to access a configuration item from the browser menu, an administrator logon screen, shown below, will appear. If you are logging on for the first time, you should use the factory default setting “password”. The password is always displayed as a string of dots. Click the LOG ON button to start the configuration session.
3.1.2 DEVICE IP SETTINGS The Device IP Settings screen allows you to configure the IP address and subnet of the device. Although you can rely on a DHCP server to assign an IP address to the 802.11A/G ACCESS POINT automatically, it is recommended that you configure a static IP address manually in most applications.
the DHCP client protocol to automatically get the IP address for this device”. Then click Next to go to the next screen. Again, as a reminder, it is recommended that your 802.11A/G ACCESS POINT should be assigned a static IP address in order to make it easy for you to manage the device later 3.1.3 WIRELESS SETTINGS Network ID (SSID): The SSID is the network name used to identify a wireless network.
WLAN Mode: Select “11g/b”, “11g only”, “11b”, “11a”, “SuperG” or “SuperA”. The wireless module is IEEE 802.11g and 802.11b compliant, and choosing “11g/b” allows both 802.11b and 802.11g client stations to get associated. However, choosing “11g” allows only 802.11g client stations to get associated and get better overall performance.
3.2.1 SYSTEM LOG The 802.11A/G ACCESS POINT maintains a system log that you can use to track events that have occurred in the system. Such event messages can sometimes be helpful in determining the cause of a problem that you may have encountered.
Channel, Assoc. Tx Pkts, Rx Pkts and Error. 3.2.4 SITE SURVEY The Site Survey table shows the wireless Access Point and Adhoc stations in your environment detected by the 802.11 A/G Access Point. You can click the REFRESH button to get latest environment information. Site Survey list will indicate the following information: ESSID, MAC Address, Conn Mode, Channel, Turbo, Super, XR, WME, Signal strength (%), Security and Network...
3.3 Advanced Settings The advanced settings tab on the top row of the window allows you to perform modifications that normally you may not need to do for general operations except changing your password from the default factory setting (this is highly recommended for security purposes).
3.3.2 SYSTEM MANAGEMENT Clicking the System Management button to configure system related parameters to for the 802.11A/G ACCESS POINT. HTTP Port No.: HTTP stands for Hyper Text Transfer Protocol. The default port for the HTTP Web server is 80. Time-out: This setting specifies the duration of idle time (inactivity) before a web browser or telnet management session times out.
Syslog server IP address: System event messages generated by the wireless access point will be sent to a Syslog daemon running on a server identified by this IP address. 3.3.3 SNMP SETTINGS This screen allows you to configure SNMP parameters including the system name, the location and contact information.
Page 29
Community String For Read: If you intend the router to be managed from a remote SNMP management station, you need to configure a read-only “community string” for read-only operation. The community string is an alphanumeric string of up to 15 characters. Community String For Write: For read-write operation, you need to configure a write “community string”.
3.3.4 MAC FILTERING SETTINGS The 802.11A/G ACCESS POINT allows you to define a list of MAC addresses that are allowed or denied to access the wireless network. Disable MAC address control list: When selected, no MAC address filtering will be performed. Enable GRANT address control list: When selected, data traffic from only the specified devices in the table will be allowed in the network.
3.3.5 OPERATIONAL MODE The 802.11A/G ACCESS POINT can be configured to operate in one of the following modes as mentioned previously in Chapter 1: (1) Access Point (2) WDS Repeater (3) WDS Bridge (4) Client Infrastructure (5) Client Adhoc (6) WISP Router (7) Gateway (AP-Router) 3.3.5 (1) Access Point Mode Settings Select “Access Point”...
-Wireless Settings Beacon Interval: The 802.11A/G ACCESS POINT broadcasts beacon frames regularly to announce its existence. The beacon Interval specifies how often beacon frames are transmitted in time unit of milliseconds. The default value is 100, and a valid value should be between 1 and 65,535. RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission.
Page 33
threshold must be transmitted following the RTS/CTS handshake exchange mechanism. The RTS threshold should have a value between 256-2347 bytes, with a default of 2347. It is recommended that this value does not deviate from the default too much. Fragmentation: When the size of a unicast frame exceeds the fragmentation threshold, it will be fragmented before the transmission.
-SSID Settings SSID, a name for an access point (or a network), differentiates one WLAN from another. All devices in a same specific WLAN must use the same SSID. To Enable VLAN for all SSIDs, four SSID Name(s) can be set. Click the SSID name and VLAN ID, VLAN IP, VLAN NetMask, 802.1p priority (0:Best Effort;...
-QoS Settings QoS stands for Quality of Service which attempts to provide different levels of quality to different types of network traffic. WMM stands for Wi-Fi Multimedia. WMM defines quality of service (QoS) in wireless networks. WMM improves audio, video and voice applications transmitted over wireless networks.
-RADIUS Settings Radius servers provide centralized authentication services to wireless clients. Two Radius servers can be defined: one acts as a primary, and the other acts as a backup. MAC address filtering based authentication requires a MAC address filter table to be created in either the 802.11A/G ACCESS POINT (as described in Chapter 3.2.3 MAC Filtering Settings) and/or the Radius server.
in Radius protocol messages. The shared secret configured in the 802.11A/G ACCESS POINT must match the shared secret configured in the RADIUS server. The shared secret can contain up to 64 alphanumeric characters. RADIUS Server Reattempt Period: The number of times the 802.11A/G ACCESS POINT should attempt to contact the primary server before giving up Enter the information for a second RADIUS server in case that there are 2 on your network which you are using authenticate wireless clients.
-Wireless Settings Beacon Interval: The 802.11A/G ACCESS POINT broadcasts beacon frames regularly to announce its existence. The beacon Interval specifies how often beacon frames are transmitted in time unit of milliseconds. The default value is 100, and a valid value should be between 1 and 65,535. RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission.
Page 39
threshold, it will be fragmented before the transmission. It should have a value of 256-2346 bytes, with a default of 2346. If you experience a high packet error rate, you should slightly decrease the Fragmentation Threshold. DTIM Interval: The 802.11A/G ACCESS POINT buffers packets for stations that operate in the power-saving mode.
-QoS Settings QoS stands for Quality of Service which attempts to provide different levels of quality to different types of network traffic. QoS stands for Quality of Service which attempts to provide different levels of quality to different types of network traffic. WMM stands for Wi-Fi Multimedia.
-RADIUS Settings Radius servers provide centralized authentication services to wireless clients. Two Radius servers can be defined: one acts as a primary, and the other acts as a backup. MAC address filtering based authentication requires a MAC address filter table to be created in either the 802.11A/G ACCESS POINT (as described in Chapter 3.2.3 MAC Filtering Settings) and/or the Radius server.
Radius Type: RADIUS Shared Secret: This is used by your RADIUS server in the Shared Secret field in Radius protocol messages. The shared secret configured in the 802.11A/G ACCESS POINT must match the shared secret configured in the RADIUS server. The shared secret can contain up to 64 alphanumeric characters. RADIUS Server Reattempt Period: The number of times the 802.11A/G ACCESS POINT should attempt to contact the primary server before giving up.
-Wireless Settings RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission. Any unicast (data or control) frames larger than specified RTS threshold must be transmitted following the RTS/CTS handshake exchange mechanism. The RTS threshold should have a value between 256-2347 bytes, with a default of 2347.
3.3.5 (4) Client Infrastructure Mode Settings Select “Client Infrastructure” mode and then click APPLY button. -Wireless Settings RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission. Any unicast (data or control) frames larger than specified RTS threshold must be transmitted following the RTS/CTS handshake exchange mechanism.
with a default of 2347. It is recommended that this value does not deviate from the default too much. Fragmentation: When the size of a unicast frame exceeds the fragmentation threshold, it will be fragmented before the transmission. It should have a value of 256-2346 bytes, with a default of 2346.
-Wireless Settings Preamble: Select a preamble type. “Short and Long” or “Long Only”. RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission. Any unicast (data or control) frames larger than specified RTS threshold must be transmitted following the RTS/CTS handshake exchange mechanism.
3.3.5 (6) WISP Router Mode Settings Select “WISP Router” mode and then click APPLY button. -Wireless Settings RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission. Any unicast (data or control) frames larger than specified RTS threshold must be transmitted following the RTS/CTS handshake exchange mechanism.
with a default of 2347. It is recommended that this value does not deviate from the default too much. Fragmentation: When the size of a unicast frame exceeds the fragmentation threshold, it will be fragmented before the transmission. It should have a value of 256-2346 bytes, with a default of 2346.
Select the check box of “Enable DHCP Server” to enable DHCP server function. The range of Clients’ IP addresses is from 192.168.1.2 to 192.168.1.254. You can assign an IP address to a specified MAC address. -Multiple DMZ Select a DMZ type and then enter the local DMZ IP address. Note: A DMZ server is a common term used to describe the default virtual server.
-Virtual Server Settings This allows you to specify one or more applications running on server computers on the LAN that may be accessed by any Internet user. Internet data destined for the specified public port will be directed to the specified private port number on the LAN client with the specified private IP address.
-Special Applications Some Internet application such as Instant Messaging or Games in particular use groups of ports, and are not easy to work behind a firewall. To work well with these special applications we will open ports to let traffic pass through. Note: You can use up to 3 sets of opened ports for a specific application.
-IP Filtering Settings IP filtering is simply a mechanism that decides which types of IP datagrams will be processed normally and which will be discarded. This allows you to define rules for allowing / denying access from / to the Internet.
Page 53
Deny IP access: Data traffic satisfying rules below are denied/filtered. You can also define IP filtering rule, such as: Name; IP Protocol; Apply to either Outbound to the Internet or Inbound from the Internet; Source IP Address and Dest. (Destination) IP Address. To grant or deny IP address, select ADD or Delete Selected.
Static Routing: This allows you to manually configure static network routes. Static routes will override routes learned by standard routing protocol discover methods. IP Routing Table: To delete a static route from the table, select the route and click DELETE SELECTED.
3.3.5 (7) Gateway (AP-Router) Mode Settings Select “Gateway (AP+Router)” mode and then click APPLY button. -ISP Settings For configuring ISP settings, go to Setup Wizard and click ISP Settings from menu bar. Please note that the ISP Settings page can be browsed only when the computer is connected wirelessly to 802.11A/G ACCESS POINT.
Page 57
Click SET PRIMARY to set the selected ISP as the primary ISP. The current connection will be highlighted in light green. For the ISP configuration, get information from your ISP. Enter an ISP Name and then decide which of the following methods to use to set up Internet connection: Static IP, PPPoE, DHCP, or PPTP.
Page 58
Cloned MAC Address: If your ISP requires you to use a specific WAN Ethernet MAC address for identification purposes, check this box and enter the MAC address. After setting up the connection, click ADD to add it to the ISP table. Go back to Advanced Settings for further configurations.
-Wireless Settings Beacon Interval: The 802.11A/G ACCESS POINT broadcasts beacon frames regularly to announce its existence. The beacon Interval specifies how often beacon frames are transmitted in time unit of milliseconds. The default value is 100, and a valid value should be between 1 and 65,535. RTS Threshold: RTS/CTS frames are used to gain control of the medium for transmission.
Page 60
threshold must be transmitted following the RTS/CTS handshake exchange mechanism. The RTS threshold should have a value between 256-2347 bytes, with a default of 2347. It is recommended that this value does not deviate from the default too much. Fragmentation: When the size of a unicast frame exceeds the fragmentation threshold, it will be fragmented before the transmission.
-SSID Settings SSID, a name for an access point (or a network), differentiates one WLAN from another. All devices in a same specific WLAN must use the same SSID. To Enable VLAN for all SSIDs, four SSID Name(s) can be set. Click the SSID name and VLAN ID, VLAN IP, VLAN NetMask, 802.1p priority (0:Best Effort;...
-QoS Settings QoS stands for Quality of Service which attempts to provide different levels of quality to different types of network traffic. WMM stands for Wi-Fi Multimedia. WMM defines quality of service (QoS) in wireless networks. WMM improves audio, video and voice applications transmitted over wireless networks.
-RADIUS Settings Radius servers provide centralized authentication services to wireless clients. Two Radius servers can be defined: one acts as a primary, and the other acts as a backup. MAC address filtering based authentication requires a MAC address filter table to be created in either the 802.11A/G ACCESS POINT (as described in Chapter 3.2.3 MAC Filtering Settings) and/or the Radius server.
in Radius protocol messages. The shared secret configured in the 802.11A/G ACCESS POINT must match the shared secret configured in the RADIUS server. The shared secret can contain up to 64 alphanumeric characters. RADIUS Server Reattempt Period: The number of times the 802.11A/G ACCESS POINT should attempt to contact the primary server before giving up Enter the information for a second RADIUS server in case that there are 2 on your network which you are using authenticate wireless clients.
-Multiple DMZ Select a DMZ type and then enter the local DMZ IP address. Note: A DMZ server is a common term used to describe the default virtual server. If the DMZ server is selected, Internet traffic not destined for a valid virtual server is redirected to this privately addressed LAN client.
-Virtual Server Settings This allows you to specify one or more applications running on server computers on the LAN that may be accessed by any Internet user. Internet data destined for the specified public port will be directed to the specified private port number on the LAN client with the specified private IP address.
-Special Applications Some Internet application such as Instant Messaging or Games in particular use groups of ports, and are not easy to work behind a firewall. To work well with these special applications we will open ports to let traffic pass through. Note: You can use up to 3 sets of opened ports for a specific application.
-IP Filtering Settings IP filtering is simply a mechanism that decides which types of IP datagrams will be processed normally and which will be discarded. This allows you to define rules for allowing / denying access from / to the Internet.
Page 69
Deny IP access: Data traffic satisfying rules below are denied/filtered. You can also define IP filtering rule, such as: Name; IP Protocol; Apply to either Outbound to the Internet or Inbound from the Internet; Source IP Address and Dest. (Destination) IP Address. To grant or deny IP address, select ADD or Delete Selected.
Static Routing: This allows you to manually configure static network routes. Static routes will override routes learned by standard routing protocol discover methods. IP Routing Table: To delete a static route from the table, select the route and click DELETE SELECTED.
3.4 System Tools 3.4.1 Firmware Upgrade You can upgrade the firmware of your 802.11A/G ACCESS POINT (the software that controls your 802.11A/G ACCESS POINT’s operation). Normally, this is done when a new version of firmware offers new features that you want, or solves problems that you have encountered with the current version.
3.4.2 Configuration Save and Restore You can save system configuration settings to a file, and later download it back to the 802.11A/G ACCESS POINT by following the steps. Step 1. Select from the System Tools menu. Step 2. Enter the path of the configuration file to save-to/restore-from (or click the Browse button to locate the configuration file).
3.4.4 Reboot System You can reset your 802.11A/G ACCESS POINT from the Browser. To reset it: Step 1. Select Reboot System from the System Tools menu. Step 2. Click YES to reboot the 802.11A/G ACCESS POINT. Rebooting the 802.11A/G ACCESS POINT disconnects any active clients, and therefore will disrupt any current data traffic.
3.5 What if you forgot the password? If you forgot the password, the only way to recover is to clear the device configuration and return the unit to its original state as shipped from the factory. You can reset the Access Point’s Settings to factory defaults by pushing a paperclip in the RESET hole on the back panel.
Need help?
Do you have a question about the CA8-PRO and is the answer not in the manual?
Questions and answers