Page 1
Wireless LAN Device Series High-Power 400mW 802.11b/g Router AIP-610H User Manual Version. 6.1...
Page 2
Preface This guide is for the networking professional who installs and manages the AIP-W610H product hereafter referred to as the “device”. To use this guide, you should have experience working with the TCP/IP configuration and be familiar with the concepts and terminology of wireless local area networks.
Ch 1. AIP-W610H Pack Packing List Before you start to install the AIP-W610H, make sure the package contains the following items: User CD 12VDC Power Adapter 2dBi Antenna AIP-W610H Device...
Ch 2. First Time Configuration Before Start to Configure There are two ways to configure the device, one is through web-browser, and the other is through Secure Shell CLI interface. To access the configuration interfaces, make sure you are using a computer connected to the same network as the device. The default IP address of the device is 192.168.2.1, and the subnet-mask is 255.255.255.0.
Page 5
3. Choose Internet Protocol (TCP/IP) and click Properties.
Page 6
4. You need to choose “Use the following IP address” to specify IP addresses manually. Please click the OK button after your configuration. The device has three operation modes (Router/Bridge/WISP). In bridge mode, also known as AP Client, you can access the device by both WLAN (Wireless Local Area Network) and wired LAN.
Knowing the Network Application AIP-W610H can act as the following roles ● Gateway ● Bridge ● WISP Client ● Router (WAN Ethernet) ● Router (WAN Wireless) The device provides 5 different operation modes and the wireless radio of device can act as Gateway/Bridge/WISP Client/Router/Router.
Page 8
Gateway The device is supposed to connect to internet via Ethernet port. The NAT is enabled and PCs in LAN ports share the same IP to ISP through WAN port. The connection type can be setup in WAN page by using PPPoE, DHCP client, PPTP client or static IP. Bridge The wired Ethernet and wireless NIC are bridged together.
Basic Settings Disable Wireless LAN Interface: The device supports 2.4GHz(B), 2.4GHz(G) and 2.4GHz(B+G) mixed modes. Band: The radio of device supports different modes as following: Mode: AP : The radio of device acts as an Access Point to serves all wireless clients to join a wireless local network.
Page 10
Infrastructure : This type requires the presence of 802.11b/g Access Point. All communication is done This type provides a peer-to-peer communication between wireless Ad Hoc : stations. All the communication is done from Client to Client without any Access Point involved. Ad Hoc networking must use the same SSID and channel for establishing the wireless connection.
Channel Number : The following table is the available frequencies (in MHz) for the 2.4-GHz radio: When set to “Auto”, the device will find the least-congested channel for use. Associated Client : Show the information of active wireless client stations that connected to the device.
Advanced Settings These settings are only for more technically advanced users who have sufficient knowledge about wireless LAN. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation.
The RTS threshold determines the packet size at which the radio issues a request to send (RTS) before sending the packet. A low RTS Threshold setting can be useful in areas where many client devices are associating with the device, or in areas where the clients are far apart and can detect only the device and not each other.
If you use the 802.1x authentication, you need to have the user profile in these devices for the roaming station. Block WLAN Relay (Isolate Client) The device supports isolation function. If you are building a public Wireless Network, enable this function can provide better security. The device will block packets between wireless clients (relay).
Configuring Wireless Security This device provides complete wireless security function include WEP, 802.1x, WPA-TKIP, WPA2-AES and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need. WEP Encryption Setting Wired Equivalent Privacy (WEP) is implemented in this device to prevent unauthorized access to your wireless network.
When you decide to use the WEP encryption to secure your WLAN, please refer to the following setting of the WEP encryption: 64-bit WEP Encryption:64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars.
server to check the admission of the users. By this way every user must use a valid account before accessing the Wireless LAN and requires a RADIUS or other authentication server on the network. An example is shown as following. You should choose WEP 64 or 128 bit encryption to fit with your network environment first.
Page 18
Pre-shared Key to enhance your security setting. This mode requires only an access point and client station that supports WPA-PSK. For Enterprise, authentication is achieved via WPA RADIUS Server. You need a RADIUS or other authentication server on the network. Enterprise (RADIUS): When WPA Authentication mode is Enterprise (RADIUS), you have to add user accounts and the...
Configuring as WLAN Client Adapter This device can be configured as a wireless Ethernet adapter. In this mode, the device can connect to the other wireless stations (Ad-Hoc network type) or Access Point (Infrastructure network type) and you don’t need to install any driver.
Page 20
The alternative way to configure as following: Step 1. In “Wireless Site Survey” page, select one of the SSIDs you want to connect and then press “Connect” button to establish the link.
Step 2. If the linking is established successfully. It will show the message”Connect successfully”. Then press “OK”. Step 3. Then you can check the linking information in “Status” page. Note: If the available network requires authentication and data encryption, you need to setup the authentication and encryption before step1 and all the settings must be as same as the Access Point or Station.
Data Encryption In client mode, the device supports WEP and WPA Personal/Enterprise except WPA2 mixed mode data encryption. About the detail data encryption settings, please refer the security section.
Ch 3. Configuring WDS Wireless Distribution System (WDS) uses wireless media to communicate with the other devices, like the Ethernet does. This function allows one or more remote LANs connect with the local LAN. To do this, you must set these devices in the same channel and set MAC address of other devices you want to communicate with in the WDS AP List and then enable the WDS.
WDS Application Wireless Repeater Wireless Repeater can be used to increase the coverage area of another device (Parent AP). Between the Parent AP and the Wireless Repeater, wireless stations can move among the coverage areas of both devices. When you decide to use the WDS as a Repeater, please refer the following instructions for configuration.
You must set these connected devices with the same radio channel and SSID. Choose “WDS+AP” mode. Using the bus or star network topology. Wireless Bridge Wireless Bridge can establish a wireless connection between two or more Wired LANs. When you decide to use the WDS as a Wireless Bridge, please refer the following instructions for configuration.
Ch 4. Advanced Configurations Configuring LAN to WAN Firewall Filtering function is used to block packets from LAN to WAN. The device supports three kinds of filter Port Filtering, IP Filtering and MAC Filtering. All the entries in current filter table are used to restrict certain types of packets from your local network to through the device.
IP Filtering When you enable the IP Filtering function, you can specify local IP Addresses in current filter table. Once the source IP address of outgoing packets match the IP Addresses in the table, the firewall will block this packet from LAN to WAN. MAC Filtering When you enable the MAC Filtering function, you can specify the MAC Addresses in current filter table.
Configuring Port Forwarding (Virtual Server) This function allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind the device's NAT firewall.
Configuring DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. So that all inbound packets will be redirected to the computer you set.
Configuring WAN Interface The device supports four kinds of IP configuration for WAN interface, including Static IP, DHCP Client, PPPoE and PPTP. You can select one of the WAN Access Types depend on your ISP required. The default WAN Access Type is “Static IP”. Static IP You can get the IP configuration data of Static-IP from your ISP.
names in your Internet requests to other servers on the Internet until the specified web site is found. DHCP Client (Dynamic IP) All IP configuration data besides DNS will obtain from the DHCP server when DHCP-Client WAN Access Type is selected. DNS1~3: The IP addresses of DNS provided by your ISP.
Page 35
PPPoE When the PPPoE (Point to Point Protocol over Ethernet) WAN Access Type is selected, you must fill the fields of User Name, Password provided by your ISP. The IP configuration will be done when the device successfully authenticates with your ISP. User Name: The account provided by your ISP Password: The password for your account.
Page 36
The IP addresses of DNS provided by your ISP. DNS1~3: DNS (Domain Name Server) is used to map domain names to IP addresses. DNS maintain central lists of domain name/IP addresses and map the domain names in your Internet requests to other servers on the Internet until the specified web site is found.
Page 37
PPTP Point to Point Tunneling Protocol (PPTP) is a service that applies to connections in IP Address: The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier besides your local network. Subnet Mask: The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
Page 38
User Name: The account provided by your ISP Password: The password of your account MTU Size: Maximum Transmission Unit, 1412 is the default setting, you may need to change the MTU for optimal performance with your specific ISP. DNS1~3: The IP addresses of DNS provided by your ISP. DNS (Domain Name Server) is used to map domain names to IP addresses.
Configuring DHCP Server To use the DHCP server inside the device, please make sure there is no other DHCP server existed in the same network as the device. Enable the DHCP Server option and assign the client range of IP addresses as following page.
Traffic Control This functionality can control Traffic of Up/Downstream 1. Enable Traffic Control and then enter LAN output Rate 、WAN output Rate in the specific field. It can control maximum rate by interface, IP and MAC address...
Firmware Upgrade Upgrading Firmware The Web-Browser upgrading interface is the simplest and safest way for user, it will check the firmware checksum and signature, and the wrong firmware won’t be accepted. After upgrading, the device will reboot and please note that depends on the version of firmware, the upgrading may cause the device configuration to be restored to the factory default setting, and the original configuration data will be lost! To upgrade firmware, just assign the file name with full path then click ”...
Configuration Data Backup & Restore Rest Setting to Factory Default Value Since the device is designed for outdoor used, there is no interface outside the housing to reset the configuration value to the factory default value. The device provides the Web-Browser interface to rest the configuration data.
Page 43
Enable MESH (OLSRD): When enable MESH. This means that when a route is needed, the route is already known and can be immediately used.
Page 44
HOW To List for all detail control and script => HOW TO USE BANDWIDTH CONTROL NOTE: This control uses QoS with HTB. Bandwidth control it's done through Traffic Control menu, via web interface or via /etc/cbu.conf file. You can limit all traffic via Interface control or you can control via IP and/or MAC basis.
Page 45
NAT function enabled or not. CASE 2: You are going to install this equipment for an inn establishment, which have 3 clients. Each client wants to have their own speed rate. With this scenario, you can control them via IP or MAC address. To do it so, enable you desired option (IP/MAC control) and put your client's IP/MAC address.
Page 46
Group ID: 1 -> Member of QoS group ID 1 IP: 192.168.x.x -> machine's 1 IP LAN Out rate: 0 -> 0 for equal sharing WAN Out rate: 0 -> 0 for equal sharing Group ID: 1 -> Member of QoS group ID 1 IP: 192.168.x.x ->...
Page 47
We will use this example to show how easy is to guarantee bandwidth for a voip system for instance. The main objective here is, to set up simple scenario with no effort. The scenario is: -Internet connection of 300 kbit - Guarantee 64 kbit for Voip machine - Don't need to enter every single machine as group member You are going to install this equipment, for some company which has a voip system and...
Page 48
But, if the boss machine wants to have 128 kbit guaranteed as well? Proceed as follow: Group ID: 1 LAN Out rate: 300 WAN Out rate: 300 Group ID: 1 IP: 192.168.x.x LAN Out rate: 64 WAN Out rate: 64 Group ID: 1 IP: 192.168.x.x LAN Out rate: 128 WAN Out rate: 128 Group ID: 1 IP: 0.0.0.0 LAN Out rate: 0 ->...
Page 49
=> NOTES ABOUT SSH ACCESS This firmware version comes with SSH2 server. As default, we have the user "root" with password "root". To change the root's password, proceed as follow: - Access the equipment through SSH terminal ( putty for example ) -type: "passwd"...
Page 50
After that, save it. Now, type "salvar". To put it to work straightaway, type: "init.sh gw all" With this file, the DHCP server will give IP ADDR based on MAC ADDR. Further more, the equipment will only respond for that IP ADDR with that MAC ADDR. =>...
Need help?
Do you have a question about the AIP-610H and is the answer not in the manual?
Questions and answers